full_path
stringlengths
31
232
filename
stringlengths
4
167
content
stringlengths
0
48.3M
combined_dataset/train/non-malicious/2778.ps1
2778.ps1
[CmdletBinding()] Param( [Parameter(Mandatory=$True,Position=0)] [String]$FileNamePattern ) function Get-Files { Param( [Parameter(Mandatory=$True,Position=0)] [String]$FileNamePattern ) Write-Verbose "Entering $($MyInvocation.MyCommand)" Write-Verbose "Looking for files matching user supplied pattern, $FileNamePattern" Write-Verbose "This process traverses subdirectories so it may take some time." $Files = @(ls -r $FileNamePattern) if ($Files) { Write-Verbose "File(s) matching pattern, ${FileNamePattern}:`n$($Files -join "`n")" $Files } else { Write-Error "No input files were found matching the user supplied pattern, ` ${FileNamePattern}." Write-Verbose "Exiting $($MyInvocation.MyCommand)" exit } Write-Verbose "Exiting $($MyInvocation.MyCommand)" } $files = Get-Files $FileNamePattern $files | Select-Object BaseName, Length | Sort-Object Length | ConvertTo-Csv -Delimiter "`t"
combined_dataset/train/non-malicious/1011.ps1
1011.ps1
$random = (New-Guid).ToString().Substring(0,8) $subscriptionId = "my-azure-subscription-id" $apimServiceName = "apim-$random" $resourceGroupName = "apim-rg-$random" $location = "Japan East" $organisation = "Contoso" $adminEmail = "admin@contoso.com" Select-AzSubscription -SubscriptionId $subscriptionId New-AzResourceGroup -Name $resourceGroupName -Location $location New-AzApiManagement -ResourceGroupName $resourceGroupName -Name $apimServiceName -Location $location -Organization $organisation -AdminEmail $adminEmail Get-AzApiManagementSsoToken -ResourceGroupName $resourceGroupName -Name $apimServiceName
combined_dataset/train/non-malicious/sample_57_89.ps1
sample_57_89.ps1
# region Generated # Load the private module dll $null = Import-Module -PassThru -Name (Join-Path $PSScriptRoot '..\bin\Az.Functions.private.dll') # Get the private module's instance $instance = [Microsoft.Azure.PowerShell.Cmdlets.Functions.Module]::Instance # Export nothing to clear implicit exports Export-ModuleMember # Export proxy cmdlet scripts $exportsPath = $PSScriptRoot $directories = Get-ChildItem -Directory -Path $exportsPath $profileDirectory = $null if($instance.ProfileName) { if(($directories | ForEach-Object { $_.Name }) -contains $instance.ProfileName) { $profileDirectory = $directories | Where-Object { $_.Name -eq $instance.ProfileName } } else { # Don't export anything if the profile doesn't exist for the module $exportsPath = $null Write-Warning "Selected Azure profile '$($instance.ProfileName)' does not exist for module '$($instance.Name)'. No cmdlets were loaded." } } elseif(($directories | Measure-Object).Count -gt 0) { # Load the last folder if no profile is selected $profileDirectory = $directories | Select-Object -Last 1 } if($profileDirectory) { Write-Information "Loaded Azure profile '$($profileDirectory.Name)' for module '$($instance.Name)'" $exportsPath = $profileDirectory.FullName } if($exportsPath) { Get-ChildItem -Path $exportsPath -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName } $cmdletNames = Get-ScriptCmdlet -ScriptFolder $exportsPath Export-ModuleMember -Function $cmdletNames -Alias (Get-ScriptCmdlet -ScriptFolder $exportsPath -AsAlias) } # endregion # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCW8pSzs/LD3Np7 # xk5xTtwXcyHIkknEaUUUyo4SpNgjn6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGzmlAVDtDuJGgpkFds+A5YG # OSuEe7r3U0cC+8jWxwkzMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAdE0R1CNRYSvtglLD5O6uJboVjwLQUL5xcKpHsRUE9NtebBApaTx0vGpa # 88TllXYCIdidYu3d97ohw2ltW/ZiuaDp8MvbLXHcTOF6r0kKwHCKT8rIzPozmp1T # Km29/So5ahx+aJze8lXrF0BuPg2b2CmPOBSQCIT3akRGuHuoL7KsB2MHd2GFfVqL # RFKH7MqcyKfm6GHhxMclyHffmnxriXtv9T6CBEi6yHAerwLqkXiGhG36W4PQgipK # ten86GnO/Y56cJ8rIDTaZXx5/wu13zw7oKRiJXZIM3gFDJtcmSjxb9ZLL2U7+p0b # Y/AZl7N0s9hd8ShBbOdnWoKkOcUmhaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAZnk82srR7R8BxZCrdFYv/3DI7wEpQTNT4ew76kNmjTQIGZnLU8zmL # GBMyMDI0MDcwNDA4MzA1MC4xMTlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC # ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9 # aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2 # +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C # cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH # +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD # K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5 # HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD # kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN # x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA # ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS # +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc # v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi # fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk # EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi # MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI # yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU # OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi # xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH # Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71 # RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq # xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp # O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR # NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr # xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz # QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOowb6wwIhgPMjAyNDA3MDQwODQ3NDBaGA8yMDI0MDcwNTA4NDc0MFowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6jBvrAIBADAHAgEAAgIDjTAHAgEAAgIS7DAKAgUA # 6jHBLAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAFjqMfrR+15hqaKa0fQc # uO46Lx3Vxgba3Lw/q0PL9ul/ubNj7ZveMa2Yt3grNK7G8M1zxOTNgpXclr1Fa2Ej # +rt0h5/H5VoKEpQivohV5/OjfTufRK0dwDXZqLuIxi9G5jCWSY96KT1ngupUPwds # 2/zEnKFjqm5OCMazixLERMJ2MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQg0l/atc0JXnMAeisZybdCxcxPH+fSqTZrvt4upX3y8IwwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69 # 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q # wPM9tAujAAEAAAHlMCIEID0JprgRwnDZv31CtiT5RFyADY9xhbnLbSoJaGtO5gOj # MA0GCSqGSIb3DQEBCwUABIICADRxgk64bEzi4ybLIbQ4tv8/q3VvqYYDIjIkN09W # i653sQLquHq3aFds0pV8LO0MeJlGhVvZ1MeGsSjcVlXlam1+AdAEbL2Eukly0qGQ # GV+0ewLmei4SJMevQVSqN4IdlJ1cvRMPxCd4xov+kzQ06f1vS9h2KKnRK9TFFsiF # zxG90R8CR785WsuUgbX7n5yp4RaRyjmh8wyNN1JJfnWtHnt9ArSX2ylrl2Xnukm/ # imhMjQgSGBg5V53jQ9eCxKwfAFLUQcIKT7FXtFoBJWrZxaCFADPUuZw9dEanDkgd # zhLqtyXgkGfUkM1JL0yxeOrO8Fw3ccASyqifpem5+ZQsJIMAwceMJrdclzZHkgqx # 5Iyla2cB0ZQMcbihyw5mYW7RcISY0haEQJqDnin+jl9vahW/XUMCUmys5TUUabJU # Z5Qfpm6YTsMB+ZasMALP+UmrzTXz+Q3Xx9g5NEI8AsZ9joJhZMlk02jBCbzPFW8w # /E98goLxNyOKmDss959rKOYHPrdOBAwW3JkOFejRHNngPSdu+vNzQKlJLLQf95/n # 10KwcbaD6VJIw7RV3KTwkwE6KwrFe2SjYlk4tXbbZHD4al7INUj+EniIuoBR3LjQ # RazJjCi1hvpIYfaV/Fa1WMqQuQ9tutJSNqvW9mZd0fyd9FwstaR8x8qPrkd5lFhd # TQfp # SIG # End signature block
combined_dataset/train/non-malicious/1966.ps1
1966.ps1
. (Join-Path -Path $PSScriptRoot -ChildPath Test-Mocks.ps1) Add-TestDynamicType Describe "Select-Object" -Tags "CI" { BeforeEach { $dirObject = GetFileMock $TestLength = 3 } It "Handle piped input without error" { { $dirObject | Select-Object } | Should -Not -Throw } It "Should treat input as a single object with the inputObject parameter" { $result = $(Select-Object -inputObject $dirObject -last $TestLength).Length $expected = $dirObject.Length $result | Should -Be $expected } It "Should be able to use the alias" { { $dirObject | select } | Should -Not -Throw } It "Should have same result when using alias" { $result = $dirObject | select $expected = $dirObject | Select-Object $result | Should -Be $expected } It "Should return correct object with First parameter" { $result = $dirObject | Select-Object -First $TestLength $result.Length | Should -Be $TestLength for ($i=0; $i -lt $TestLength; $i++) { $result[$i].Name | Should -Be $dirObject[$i].Name } } It "Should return correct object with Last parameter" { $result = $dirObject | Select-Object -Last $TestLength $result.Length | Should -Be $TestLength for ($i=0; $i -lt $TestLength; $i++) { $result[$i].Name | Should -Be $dirObject[$dirObject.Length - $TestLength + $i].Name } } It "Should work correctly with Unique parameter" { $result = ("a","b","c","a","a","a" | Select-Object -Unique).Length $expected = 3 $result | Should -Be $expected } It "Should return correct object with Skip parameter" { $result = $dirObject | Select-Object -Skip $TestLength $result.Length | Should -Be ($dirObject.Length - $TestLength) for ($i=0; $i -lt $TestLength; $i++) { $result[$i].Name | Should -Be $dirObject[$TestLength + $i].Name } } It "Should return an object with selected columns" { $result = $dirObject | Select-Object -Property Name, Size $result.Length | Should -Be $dirObject.Length $result[0].Name | Should -Be $dirObject[0].Name $result[0].Size | Should -Be $dirObject[0].Size $result[0].Mode | Should -BeNullOrEmpty } It "Should send output to pipe properly" { {$dirObject | Select-Object -Unique | pipelineConsume} | Should -Not -Throw } It "Should select array indices with Index parameter" { $firstIndex = 2 $secondIndex = 4 $result = $dirObject | Select-Object -Index $firstIndex, $secondIndex $result[0].Name | Should -Be $dirObject[$firstIndex].Name $result[1].Name | Should -Be $dirObject[$secondIndex].Name } It "Should not wait when used without -Wait option" { $orig1 = $dirObject[0].Size $orig2 = $dirObject[$TestLength].Size $result = $dirObject | addOneToSizeProperty | Select-Object -First $TestLength $result[0].Size | Should -Be ($orig1 + 1) $dirObject[0].Size | Should -Be ($orig1 + 1) $dirObject[$TestLength].Size | Should -Be $orig2 } It "Should wait when used with -Wait option" { $orig1 = $dirObject[0].Size $orig2 = $dirObject[$TestLength].Size $result = $dirObject | addOneToSizeProperty | Select-Object -First $TestLength -Wait $result[0].Size | Should -Be ($orig1 + 1) $dirObject[0].Size | Should -Be ($orig1 + 1) $dirObject[$TestLength].Size | Should -Be ($orig2 + 1) } It "Should not leak 'StopUpstreamCommandsException' internal exception for stopping upstream" { 1,2 | Select-Object -First 1 -ErrorVariable err $err | Should -BeNullOrEmpty } } Describe "Select-Object DRT basic functionality" -Tags "CI" { BeforeAll { $employees = [pscustomobject]@{"FirstName"="joseph"; "LastName"="smith"; "YearsInMS"=15}, [pscustomobject]@{"FirstName"="paul"; "LastName"="smith"; "YearsInMS"=15}, [pscustomobject]@{"FirstName"="mary"; "LastName"="soe"; "YearsInMS"=5}, [pscustomobject]@{"FirstName"="edmund"; "LastName"="bush"; "YearsInMS"=9} } It "Select-Object with empty script block property should throw"{ $e = { "bar" | select-object -Prop {} -ErrorAction Stop } | Should -Throw -ErrorId "EmptyScriptBlockAndNoName,Microsoft.PowerShell.Commands.SelectObjectCommand" -PassThru $e.CategoryInfo | Should -Match "PSArgumentException" } It "Select-Object with string property should work"{ $result = "bar" | select-object -Prop foo | Measure-Object $result.Count | Should -Be 1 } It "Select-Object with Property First Last Overlap should work"{ $results = $employees | Select-Object -Property "YearsInMS", "L*" -First 2 -Last 3 $results.Count | Should -Be 4 $results[0].LastName | Should -Be $employees[0].LastName $results[1].LastName | Should -Be $employees[1].LastName $results[2].LastName | Should -Be $employees[2].LastName $results[3].LastName | Should -Be $employees[3].LastName $results[0].YearsInMS | Should -Be $employees[0].YearsInMS $results[1].YearsInMS | Should -Be $employees[1].YearsInMS $results[2].YearsInMS | Should -Be $employees[2].YearsInMS $results[3].YearsInMS | Should -Be $employees[3].YearsInMS } It "Select-Object with Property First Last should work"{ $results = $employees | Select-Object -Property "YearsInMS", "L*" -First 2 -Last 1 $results.Count | Should -Be 3 $results[0].LastName | Should -Be $employees[0].LastName $results[1].LastName | Should -Be $employees[1].LastName $results[2].LastName | Should -Be $employees[3].LastName $results[0].YearsInMS | Should -Be $employees[0].YearsInMS $results[1].YearsInMS | Should -Be $employees[1].YearsInMS $results[2].YearsInMS | Should -Be $employees[3].YearsInMS } It "Select-Object with Property First should work"{ $results = $employees | Select-Object -Property "YearsInMS", "L*" -First 2 $results.Count | Should -Be 2 $results[0].LastName | Should -Be $employees[0].LastName $results[1].LastName | Should -Be $employees[1].LastName $results[0].YearsInMS | Should -Be $employees[0].YearsInMS $results[1].YearsInMS | Should -Be $employees[1].YearsInMS } It "Select-Object with Property First Zero should work"{ $results = $employees | Select-Object -Property "YearsInMS", "L*" -First 0 $results.Count | Should -Be 0 } It "Select-Object with Property Last Zero should work"{ $results = $employees | Select-Object -Property "YearsInMS", "L*" -Last 0 $results.Count | Should -Be 0 } It "Select-Object with Unique should work"{ $results = $employees | Select-Object -Property "YearsInMS", "L*" -Unique:$true $results.Count | Should -Be 3 $results[0].LastName | Should -Be $employees[1].LastName $results[1].LastName | Should -Be $employees[2].LastName $results[2].LastName | Should -Be $employees[3].LastName $results[0].YearsInMS | Should -Be $employees[1].YearsInMS $results[1].YearsInMS | Should -Be $employees[2].YearsInMS $results[2].YearsInMS | Should -Be $employees[3].YearsInMS } It "Select-Object with Simple should work"{ $employee1 = [pscustomobject]@{"FirstName"="joesph"; "LastName"="smith"; "YearsInMS"=15} $employee2 = [pscustomobject]@{"FirstName"="paul"; "LastName"="smith"; "YearsInMS"=15} $employee3 = [pscustomobject]@{"FirstName"="mary"; "LastName"="soe"; "YearsInMS"=15} $employees3 = @($employee1,$employee2,$employee3,$employee4) $results = $employees3 | Select-Object -Property "FirstName", "YearsInMS" $results.Count | Should -Be 3 $results[0].FirstName | Should -Be $employees3[0].FirstName $results[1].FirstName | Should -Be $employees3[1].FirstName $results[2].FirstName | Should -Be $employees3[2].FirstName $results[0].YearsInMS | Should -Be $employees3[0].YearsInMS $results[1].YearsInMS | Should -Be $employees3[1].YearsInMS $results[2].YearsInMS | Should -Be $employees3[2].YearsInMS } It "Select-Object with no input should work"{ $results = $null | Select-Object -Property "FirstName", "YearsInMS", "FirstNa*" $results.Count | Should -Be 0 } It "Select-Object with Start-Time In Idle Process should work" { $results = Get-Process * | Select-Object ProcessName $results.Count | Should -Not -Be 0 } It "Select-Object with Skip should work"{ $results = "1","2","3" | Select-Object -Skip 1 $results.Count | Should -Be 2 $results[0] | Should -Be 2 $results[1] | Should -Be 3 } It "Select-Object with Index should work"{ $results = "1","2","3" | Select-Object -Index 2 $results.Count | Should -Be 1 $results[0] | Should -BeExactly "3" } It "Select-Object with SkipIndex should work" { $results = "1", "2", "3" | Select-Object -SkipIndex 0, 2 $results | Should -HaveCount 1 $results[0] | Should -BeExactly "2" } It "Select-Object with SkipIndex should work with index out of range" { $results = 0..10 | Select-Object -SkipIndex 5, 6, 7, 8, 11 $results | Should -HaveCount 7 $results -join ',' | Should -BeExactly "0,1,2,3,4,9,10" } It "Select-Object should handle dynamic (DLR) properties"{ $dynObj = [TestDynamic]::new() $results = $dynObj, $dynObj | Select-Object -ExpandProperty FooProp $results.Count | Should -Be 2 $results[0] | Should -Be 123 $results[1] | Should -Be 123 } It "Select-Object should handle dynamic (DLR) properties without GetDynamicMemberNames hint"{ $dynObj = [TestDynamic]::new() $results = $dynObj, $dynObj | Select-Object -ExpandProperty HiddenProp $results.Count | Should -Be 2 $results[0] | Should -Be 789 $results[1] | Should -Be 789 } It "Select-Object should handle wildcarded dynamic (DLR) properties when hinted by GetDynamicMemberNames"{ $dynObj = [TestDynamic]::new() $results = $dynObj, $dynObj | Select-Object -ExpandProperty FooP* $results.Count | Should -Be 2 $results[0] | Should -Be 123 $results[1] | Should -Be 123 } It "Select-Object should work when multiple dynamic (DLR) properties match"{ $dynObj = [TestDynamic]::new() $results = $dynObj, $dynObj | Select-Object *Prop $results.Count | Should -Be 2 $results[0].FooProp | Should -Be 123 $results[0].BarProp | Should -Be 456 $results[1].FooProp | Should -Be 123 $results[1].BarProp | Should -Be 456 } It "Select-Object -ExpandProperty should yield errors if multiple dynamic (DLR) properties match"{ $dynObj = [TestDynamic]::new() $e = { $results = $dynObj, $dynObj | Select-Object -ExpandProperty *Prop -ErrorAction Stop} | Should -Throw -PassThru -ErrorId "MutlipleExpandProperties,Microsoft.PowerShell.Commands.SelectObjectCommand" $e.CategoryInfo | Should -Match "PSArgumentException" } } Describe "Select-Object with Property = '*'" -Tags "CI" { It "Select-Object with implicit Property = '*' don't return property named '*'"{ $results = [pscustomobject]@{Thing="thing1"} | Select-Object -ExcludeProperty thing $results.psobject.Properties.Item("*") | Should -BeNullOrEmpty } It "Select-Object with explicit Property = '*' don't return property named '*'"{ $results = [pscustomobject]@{Thing="thing1"} | Select-Object -Property * -ExcludeProperty thing $results.psobject.Properties.Item("*") | Should -BeNullOrEmpty } It "Select-Object with implicit Property = '*' exclude single property"{ $results = [pscustomobject]@{Thing="thing1"} | Select-Object -ExcludeProperty thing $results.psobject.Properties.Item("Thing") | Should -BeNullOrEmpty $results.psobject.Properties.Item("*") | Should -BeNullOrEmpty } It "Select-Object with explicit Property = '*' exclude single property"{ $results = [pscustomobject]@{Thing="thing1"} | Select-Object -Property * -ExcludeProperty thing $results.psobject.Properties.Item("Thing") | Should -BeNullOrEmpty $results.psobject.Properties.Item("*") | Should -BeNullOrEmpty } It "Select-Object with implicit Property = '*' exclude not single property"{ $results = [pscustomobject]@{Thing="thing1";Param2="param2"} | Select-Object -ExcludeProperty Param2 $results.Param2 | Should -BeNullOrEmpty $results.Thing | Should -BeExactly "thing1" } It "Select-Object with explicit Property = '*' exclude not single property"{ $results = [pscustomobject]@{Thing="thing1";Param2="param2"} | Select-Object -Property * -ExcludeProperty Param2 $results.Param2 | Should -BeNullOrEmpty $results.Thing | Should -BeExactly "thing1" } It "Select-Object with ExpandProperty and Property don't skip processing ExcludeProperty" { $p = Get-Process -Id $pid | Select-Object -Property Process* -ExcludeProperty ProcessorAffinity -ExpandProperty Modules $p[0].psobject.Properties.Item("ProcessorAffinity") | Should -BeNullOrEmpty } }
combined_dataset/train/non-malicious/1061.ps1
1061.ps1
Set-StrictMode -Version 'Latest' & (Join-Path -Path $PSScriptRoot -ChildPath 'Initialize-CarbonTest.ps1' -Resolve) $tempDir = $null Describe 'Get-DscError' { BeforeEach { $tempDir = New-TempDirectory -Prefix $PSCommandPath [Diagnostics.Eventing.Reader.EventLogSession]::GlobalSession.ClearLog('Microsoft-Windows-DSC/Operational') } AfterEach { Remove-Item $tempDir.FullName -Recurse } configuration IAmBroken { Set-StrictMode -Off Import-DscResource -ModuleName 'PSDesiredStateConfiguration' node 'localhost' { Script Fails { GetScript = { Write-Error 'GetScript' } SetScript = { Write-Error 'SetScript' } TestScript = { Write-Error 'TestScript' ; return $false } } } } It 'should get dsc errors' { [Diagnostics.Eventing.Reader.EventLogRecord[]]$errorsAtStart = Get-DscError $errorsAtStart | Should BeNullOrEmpty $startTime = Get-Date & IAmBroken -OutputPath $tempDir.FullName Start-Sleep -Milliseconds 400 Start-DscConfiguration -Wait -ComputerName 'localhost' -Path $tempDir.FullName -ErrorAction SilentlyContinue -Force $dscError = Get-DscError -StartTime $startTime -Wait $dscError | Should Not BeNullOrEmpty $dscError | Should BeOfType ([Diagnostics.Eventing.Reader.EventLogRecord]) [Diagnostics.Eventing.Reader.EventLogRecord[]]$dscErrors = Get-DscError $dscErrors | Should Not BeNullOrEmpty $dscErrors.Count | Should BeGreaterThan 0 [Diagnostics.Eventing.Reader.EventLogRecord[]]$dscErrorsBefore = Get-DscError -EndTime $startTime $dscErrorsBefore | Should BeNullOrEmpty Start-Sleep -Milliseconds 800 $Error.Clear() $dscErrors = Get-DscError -StartTime (Get-Date) $Global:Error.Count | Should Be 0 $dscErrors | Should BeNullOrEmpty $startedAt = Get-Date $dscErrors = Get-DscError -StartTime (Get-Date) -Wait -WaitTimeoutSeconds 1 $Global:Error.Count | Should Be 0 ((Get-Date) -gt $startedAt.AddSeconds(1)) | Should Be $true $result = Get-DscError -ComputerName 'fubar' -ErrorAction SilentlyContinue $Global:Error.Count | Should BeGreaterThan 0 $Global:Error[0] | Should Match 'not found' $result | Should BeNullOrEmpty $dscError = Get-DscError -ComputerName 'localhost',$env:COMPUTERNAME $dscError | Should Not BeNullOrEmpty } }
combined_dataset/train/non-malicious/sample_66_96.ps1
sample_66_96.ps1
var OfficeaicopilotStringsEnum,OfficeaicopilotStringsArray,OfficeaicopilotStrings={ChatContainerKeepItActionButtonText:"Giữ lại",ChatContainerUndoActionButtonText:"Hoàn tác",ChatContainerInsertActionButtonText:"Chèn",ChatContainerFeedbackNudgeContent:"Vui lòng giúp chúng tôi tìm hiểu và đào tạo các mô hình của mình bằng cách cung cấp phản hồi thông qua các nút điều khiển thích và không thích đối với mỗi đầu ra mà LLM tạo ra.",ChatContainerFeedbackNudgeContentTitle:"Nội dung nhắc phản hồi",ChatContainerFeedbackNudgeHeader:"Cung cấp phản hồi",ChatContainerFeedbackNudgeHeaderTitle:"CHỈ DÀNH CHO NỘI BỘ MICROSOFT",ChatCardFooterDisclaimer:"Nội dung do AI tạo có thể không chính xác.",AIGenerated:"AI được tạo ra",ChatCardFooterDisclaimerPowered:"Các đề xuất hoạt động trên nền tảng AI có thể không chính xác",AIPowered:"Đề xuất hoạt động trên nền tảng",ChatCardSourceStockContent:"Từ thư viện nội dung sáng tạo Microsoft 365",ChatCardSourceEnterprise:"Từ thư viện nội dung %s",ChatCardSourceDALLE:"Hoạt động trên nền tảng DALL-E 3",ChatInputDefaultPlaceholder:"Chọn một yêu cầu bắt đầu hoặc nhập yêu cầu của riêng bạn",FREHeaderText:"Copilot sẵn sàng trợ giúp",FREButtonText:"Bắt đầu",StarterPromptMenuItemDefaultPrefix:"Menu Hướng dẫn về yêu cầu",ShowMeButtonText:"Chỉ dẫn cho tôi",HelpButtonText:"Trợ giúp",ShowMeChatMessage:'Hiện tại, tôi không thể đưa thông tin đó vào cuộc trò chuyện của chúng ta nhưng bạn có thể tìm thấy tính năng "$1(commandName)" trong tab $2(tabName) của dải băng',ShowMeUpdatedMessage:'Bạn có thể tìm thấy tính năng "$1(commandName)" trên tab $2(tabName) của dải băng nhưng tôi không thể truy nhập trực tiếp tính năng này. Bạn có muốn tôi chỉ cho bạn vị trí của tính năng không?',ShowMeErrorMessage:"Rất tiếc, tôi không biết cách thực hiện điều đó. Hãy thử diễn đạt lại yêu cầu của bạn hoặc hỏi tôi về một tính năng khác.",ShowMeUpdatedMessageWithoutAction:'Bạn có thể tìm thấy tính năng "$1(commandName)" trên tab $2(tabName) của dải băng, nhưng tôi không thể truy nhập trực tiếp vào nó.',ChatContainerTitle:"Bộ chứa trò chuyện",ChatContainerDefaultMessageTitle:"Tin nhắn trò chuyện mặc định",ChatContainerListEmbeddedMessageTitle:"Liệt kê tin nhắn trò chuyện được nhúng",ChatContainerLinkEmbeddedMessageTitle:"Liên kết tin nhắn trò chuyện được nhúng",ChatInputTitle:"Khu vực yêu cầu",StarterPromptMenuTitle:"Hướng dẫn về yêu cầu",SubmitButtonTitle:"Gửi",FREHeaderTextLabel:"freSharedHeaderText",FREDescriptionTextLabel:"freSharedDescription",HintCardHeaderTextLabel:"hintCardHeaderText",HintCardDescriptionTextLabel:"hintCardDescriptionText",LoadingUiTextLabel:"loadingUiText",ZQMHeaderTextLabel:"zqmHeaderText",ChatMessagesLabel:"Tin nhắn Trò chuyện",RegenerateButtonLabel:"Tạo lại",CopyButtonLabel:"Sao chép",LikeButtonLabel:"Thích",DislikeButtonLabel:"Không thích",SuggestionPaneLabel:"Yêu cầu được đề xuất",SuggestionPaneRefreshButtonLabel:"Làm mới",StopGeneratingButtonLabel:"Dừng tạo",InputToolTipSuggestion:"Thêm các chi tiết như độ dài, âm điệu và kiểu để hoàn tất lời nhắc",MicrophonPermissionErrorTitle:"Không có quyền micrô",MicrophonPermissionErrorText:"Copilot không thể truy cập micrô của bạn. Bấm vào biểu tượng khóa trong thanh địa chỉ trình duyệt ở trên, đặt quyền của bạn để cho phép truy nhập vào micrô, rồi thử lại.",NeedHelpLink:"Bạn cần trợ giúp?",NotNowMicrophoneButton:"Để sau",TryAgainMicrophoneButton:"Thử lại",MicrophoneTooltip:"Micrô",MicrophonPermissionErrorTitleWin32:"Rất tiếc, không thể ghi lại âm thanh của bạn",MicrophonPermissionErrorTextWin32:"Đã xảy ra sự cố với micrô của bạn. Vui lòng kiểm tra cài đặt quyền micrô của bạn.",MicrophonePausedStatus:"Micrô đã tạm dừng",MicrophoneListeningStatus:"Đang nghe Micrô",MicrophoneDisabledStatus:"Đã tắt Micrô",MicrophoneLoadingStatus:"Đang tải Micrô",ImagePickerHeader:"Sau đây là {0} khả năng...",ImagePickerInsert:"Đã thêm một hình ảnh.",DesignerDialogHeader:"Designer",DesignerFallbackToStockApologyMessage:"Xin lỗi, tôi chưa thể thực hiện việc này. Dưới đây là một số hình ảnh nguyên liệu khớp với tìm kiếm của bạn có thể hữu ích.",DesignerFallbackToDalleApologyMessage:"Xin lỗi, tôi chưa thể thực hiện việc này. Dưới đây là một số hình ảnh được tạo phù hợp với tìm kiếm của bạn và có thể hữu ích.",CopilotSwitcherMenuTriggerTitle:"Chuyển đổi copilot",CopilotPromptLibraryHeader:"Gợi ý từ Copilot Lab",CopilotLabLaunchertext:"Xem tất cả gợi ý trong Copilot Lab",CopilotLabMenuSubItem:"Xem các yêu cầu khác",PromptGuideMenuSectionHeader:"Ví dụ để giúp bạn %s",CitationTitleReference:"Tài liệu tham khảo",CitationTitleReferences:"Tài liệu tham khảo",DefaultCIQButtonTitle:"Đính kèm",DefaultGroundingButtonTitle:"Quản lý tìm kiếm và phần bổ trợ",DefaultMenuButtonTitle:"Xem yêu cầu",DefaultGhostText:"Hãy đặt câu hỏi hoặc cho tôi biết bạn muốn làm gì. Để có ý tưởng về cách tôi có thể trợ giúp, hãy chọn hướng dẫn về yêu cầu.",ErrorOffensiveInputContent:"Rất tiếc, tôi không thể xử lý nội dung đó. Hãy thử tạo yêu cầu mới",ErrorOffensiveOutputContent:"Rất tiếc tôi không thể tạo nội dung cho yêu cầu này. Hãy thử đưa ra yêu cầu mới.",ErrorInputBlockedByDynamicGuardList:"Có vẻ như có một số nội dung ở đây mà tôi không thể xử lý được. Hãy thử yêu cầu tôi làm điều gì đó khác.",ErrorInvalidSignal:"Đã xảy ra lỗi. Vui lòng thử lại sau giây lát.",ErrorTimeout:"Tôi không thể xử lý yêu cầu của bạn ngay bây giờ. Hãy thử lại sau một lát. ",ErrorThrottled:"Đã đạt đến số lượng yêu cầu tối đa mỗi giờ. Hãy thử lại sau giây lát.",ErrorUserThrottled:"Bạn chỉ được phép có một số lượng yêu cầu nhất định mỗi giây. Hãy thử lại sau một lát.",ErrorInputTooLong:"Đây là quá nhiều thông tin để tôi có thể xử lý. Hãy thử lại với yêu cầu ít hơn 15.000 từ.",ErrorInvalidLanguage:"Yêu cầu của bạn bao gồm ngôn ngữ mà tôi hiện không hỗ trợ.",ChatHistoryHydrationError:"Nếu đây là hoạt động tiếp tục của cuộc trò chuyện trước đó và bạn muốn sử dụng lịch sử trò chuyện, hãy thử đóng và mở lại ngăn.",DisengagedError:"Tôi không thể làm việc với nội dung này. Bấm vào Thay đổi Chủ đề để đặt câu hỏi khác.",LearnMoreString:"Tìm hiểu thêm",CopyButtonPopover:"Đã sao chép vào bảng tạm",MicrophoneListeningGhostText:"Đang lắng nghe...",ChangeTopicButtonLabel:"Thay đổi chủ đề",ManageChatsButtonLabel:"Quản lý các cuộc trò chuyện",WorkingOnItString:"Đang thực hiện...",TopicChangedResponseText:"Ok, hãy thay đổi chủ đề. Bạn muốn nói về điều gì?",DKEAndNotExtractLabelErrorString:"Copilot không thể tham chiếu nội dung này vì chính sách của tổ chức bạn không cho phép điều đó.",BlockingCookiesErrorMessage:"Cài đặt trình duyệt của bạn đang chặn các cookie được yêu cầu cho Copilot. Vui lòng sử dụng trình duyệt thay thế hoặc Ứng dụng dành cho máy tính để bàn.",LicenseValidationErrorMessage:"Chúng tôi đã gặp sự cố khi xác thực giấy phép Copilot của bạn. Để biết thêm thông tin, hãy xem https://aka.ms/copilotlicensecheck",RequestTooLongErrorMessage:"Tôi không thể giúp bạn với điều này vì mô tả của bạn quá dài. Vui lòng cân nhắc việc rút ngắn yêu cầu của bạn và thử lại.",DesignerPreviewLabel:"Bản xem trước trình thiết kế",CseSelfHelpSkillContentRetrievedMultipleArticles:"Đây là nội dung tôi đã tìm thấy:",CseSelfHelpSkillContentRetrievedQuickAnswer:"Đây là nội dung tôi đã tìm thấy:",CseSelfHelpSkillContentRetrievedSingleArticle:"Đây là nội dung tôi đã tìm thấy:",CseSelfHelpSkillErrorOrNoContentRetrieved:"Rất tiếc, tôi gặp sự cố khi tìm thông tin về nội dung đó. Vui lòng diễn đạt lại yêu cầu của bạn, rồi thử lại.",CseSelfHelpSkillLaunchHelpPaneTextArticle:"Xem bài viết",LoadingUIStringFinishingUp:"Đang hoàn tất...",LoadingUIStringGettingReady:"Đang chuẩn bị sẵn sàng...",LoadingUIStringGettingEverythingReady:"Đang chuẩn bị sẵn sàng mọi thứ...",LoadingUIStringCraftingContent:"Đang tạo nội dung của bạn...",LoadingUIStringFinishingTouches:"Đang áp dụng các bước hoàn thiện cuối cùng...",LoadingUIStringWorkingOnRequest:"Đang làm việc theo yêu cầu của bạn...",LoadingUIStringGatheringResources:"Đang thu thập tài nguyên...",PaneLoadingUIString:"Vui lòng chờ pa nen hoàn tất quá trình tải",GroundingSearchAndPlugins:"Tìm kiếm và plugin",GroundingPluginFlyoutInfoTooltip:"Dữ liệu Microsoft 365 Enterprise bao gồm các ứng dụng Office, trang web SharePoint, tệp trên đám mây, thông tin liên lạc và nhiều nội dung khác. Tất cả đều được người quản trị CNTT của bạn cấu hình.",GroundingPluginFlyoutInfo:"Phần bổ trợ cho phép Copilot thay mặt bạn tham khảo các ứng dụng. Copilot có thể chia sẻ một số dữ liệu doanh nghiệp Microsoft 365 của bạn với các plugin bạn đã bật.",GroundingPluginFlyoutInfoLabel:"Thông tin",PreviewFlagLabel:"Bản xem trước",AdminBlockedPluginInfoTooltipLabel:"Dịch vụ cần thiết để sử dụng bổ trợ này đã bị tắt cho tổ chức của bạn.",WorkPluginLabel:"Dữ liệu Microsoft 365",WebContentPluginLabel:"Nội dung web",CIQDefaultPlaceholder:"Bắt đầu nhập để tìm kiếm",ProactiveSuggestionTitleText:"Tô sáng dữ liệu",ProactiveSuggestionIconText:"Ý tưởng",ProactiveSuggestionBodyText:"Để có bản trình bày hấp dẫn hơn, đây là thiết kế có thể tô sáng tốt hơn số liệu thống kê trong trang chiếu của bạn.",ProactiveSuggestionApplyBtnText:"Áp dụng",ProactiveSuggestionImageAltText:"img thẻ đề xuất chủ động",RestrictiveSearchMessageTitleText:"Người quản trị của tổ chức bạn đã hạn chế Copilot truy nhập vào một số site SharePoint.",RestrictiveSearchMessageBodyText:"Điều này giới hạn nội dung Copilot có thể tìm kiếm và tham chiếu khi phản hồi yêu cầu của bạn.",ChatInputCharacterLimitExceededMessage:"Đã vượt quá giới hạn ký tự",InActiveChatSessionErrorString:"Phiên trò chuyện này đã kết thúc. Vui lòng đóng và mở lại ứng dụng này cho phiên mới.",BadTokenErrorMessage:"Đã xảy ra sự cố khi bạn đăng nhập. Hãy thử đóng và mở lại ngăn Copilot, rồi làm theo hướng dẫn để đăng nhập."},OfficeaicopilotStringsManager=(OfficeaicopilotStringsEnum||("undefined"!=typeof window&&!0===window.g_NewStringsInfra?(OfficeaicopilotStringsEnum=Object.keys(OfficeaicopilotStrings).reduce((function(n,t,i){return n[t]=i,n}),{}),OfficeaicopilotStringsArray=OfficeaicopilotStringsArray||Object.values(OfficeaicopilotStrings)):OfficeaicopilotStringsEnum=OfficeaicopilotStrings),{OfficeaicopilotStringsArray:OfficeaicopilotStringsArray,get:function(n){return"undefined"!=typeof window&&!0===window.g_NewStringsInfra?OfficeaicopilotStringsArray[n]:n}});
combined_dataset/train/non-malicious/SharpSsh Functions_3.ps1
SharpSsh Functions_3.ps1
## USING the binaries from: ## http://downloads.sourceforge.net/sharpssh/SharpSSH-1.1.1.13.bin.zip [void][reflection.assembly]::LoadFrom( (Resolve-Path "~\\Documents\\WindowsPowerShell\\Libraries\\Tamir.SharpSSH.dll") ) ## NOTE: These are bare minimum functions, and only cover ssh, not scp or sftp ## also, if you "expect" something that doesn't get output, you'll be completely stuck. ## ## As a suggestion, the best way to handle the output is to "expect" your prompt, and then do ## select-string matching on the output that was captured before the prompt. function New-SshSession { Param( [string]$UserName , [string]$HostName , [string]$RSAKeyFile , [switch]$Passthru ) if($RSAKeyFile -and (Test-Path $RSAKeyFile)){ $global:LastSshSession = new-object Tamir.SharpSsh.SshShell ` $cred.GetNetworkCredential().Domain, $cred.GetNetworkCredential().UserName $global:LastSshSession.AddIdentityFile( (Resolve-Path $RSAKeyFile) ) } else { $cred = $host.UI.PromptForCredential("SSH Login Credentials", "Please specify credentials in user@host format", "$UserName@$HostName","") $global:LastSshSession = new-object Tamir.SharpSsh.SshShell ` $cred.GetNetworkCredential().Domain, $cred.GetNetworkCredential().UserName, $cred.GetNetworkCredential().Password } $global:LastSshSession.Connect() $global:LastSshSession.RemoveTerminalEmulationCharacters = $true if($Passthru) { return $global:LastSshSession } } function Remove-SshSession { Param([Tamir.SharpSsh.SshShell]$SshShell=$global:LastSshSession) $SshShell.WriteLine( "exit" ) sleep -milli 500 if($SshShell.ShellOpened) { Write-Warning "Shell didn't exit cleanly, closing anyway." } $SshShell.Close() $SshShell = $null } function Invoke-Ssh { Param( [string]$command , [regex]$expect ## there ought to be a non-regex parameter set... , [Tamir.SharpSsh.SshShell]$SshShell=$global:LastSshSession ) if($SshShell.ShellOpened) { $SshShell.WriteLine( $command ) if($expect) { $SshShell.Expect( $expect ).Split("`n") } else { sleep -milli 500 $SshShell.Expect().Split("`n") } } else { throw "The ssh shell isn't open!" } } function Send-Ssh { Param( [string]$command , [Tamir.SharpSsh.SshShell]$SshShell=$global:LastSshSession ) if($SshShell.ShellOpened) { $SshShell.WriteLine( $command ) } else { throw "The ssh shell isn't open!" } } function Receive-Ssh { Param( [RegEx]$expect ## there ought to be a non-regex parameter set... , [Tamir.SharpSsh.SshShell]$SshShell=$global:LastSshSession ) if($SshShell.ShellOpened) { if($expect) { $SshShell.Expect( $expect ).Split("`n") } else { sleep -milli 500 $SshShell.Expect().Split("`n") } } else { throw "The ssh shell isn't open!" } }
combined_dataset/train/non-malicious/Get-Netstat 0.9.ps1
Get-Netstat 0.9.ps1
$null, $null, $null, $null, $netstat = netstat -a -n -o [regex]$regex = '\\s+(?<Protocol>\\S+)\\s+(?<LocalAddress>\\S+)\\s+(?<RemoteAddress>\\S+)\\s+(?<State>\\S+)\\s+(?<PID>\\S+)' $netstat | ForEach-Object { if ( $_ -match $regex ) { $process = "" | Select-Object Protocol, LocalAddress, RemoteAddress, State, PID $process.Protocol = $matches.Protocol $process.LocalAddress = $matches.LocalAddress $process.RemoteAddress = $matches.RemoteAddress $process.State = $matches.State $process.PID = $matches.PID $process } }
combined_dataset/train/non-malicious/sample_29_16.ps1
sample_29_16.ps1
#!/usr/bin/env pwsh $basedir=Split-Path $MyInvocation.MyCommand.Definition -Parent $exe="" $pathsep=":" $env_node_path=$env:NODE_PATH $new_node_path="D:\a\1\s\node_modules\.pnpm\typescript@4.9.5\node_modules\typescript\bin\node_modules;D:\a\1\s\node_modules\.pnpm\typescript@4.9.5\node_modules\typescript\node_modules;D:\a\1\s\node_modules\.pnpm\typescript@4.9.5\node_modules;D:\a\1\s\node_modules\.pnpm\node_modules" if ($PSVersionTable.PSVersion -lt "6.0" -or $IsWindows) { # Fix case when both the Windows and Linux builds of Node # are installed in the same directory $exe=".exe" $pathsep=";" } else { $new_node_path="/mnt/d/a/1/s/node_modules/.pnpm/typescript@4.9.5/node_modules/typescript/bin/node_modules:/mnt/d/a/1/s/node_modules/.pnpm/typescript@4.9.5/node_modules/typescript/node_modules:/mnt/d/a/1/s/node_modules/.pnpm/typescript@4.9.5/node_modules:/mnt/d/a/1/s/node_modules/.pnpm/node_modules" } if ([string]::IsNullOrEmpty($env_node_path)) { $env:NODE_PATH=$new_node_path } else { $env:NODE_PATH="$new_node_path$pathsep$env_node_path" } $ret=0 if (Test-Path "$basedir/node$exe") { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "$basedir/node$exe" "$basedir/../typescript/bin/tsc" $args } else { & "$basedir/node$exe" "$basedir/../typescript/bin/tsc" $args } $ret=$LASTEXITCODE } else { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "node$exe" "$basedir/../typescript/bin/tsc" $args } else { & "node$exe" "$basedir/../typescript/bin/tsc" $args } $ret=$LASTEXITCODE } $env:NODE_PATH=$env_node_path exit $ret
combined_dataset/train/non-malicious/2ee1612d-7a4e-467a-8ae1-8c310bb1cba0.ps1
2ee1612d-7a4e-467a-8ae1-8c310bb1cba0.ps1
#Purpose: To remotely query select machines for system information #Author: Alex Smith #Created: 6/11/2010 #Arguments: IP Addresses or Hostnames of target PCs then path and file name #Examples: To query based on hostname or ip: C:\\>powershell .\\WMIQuery.ps1 host1 # To print to a file: C:\\>powershell .\\WMIQuery.ps1 host1 > file.txt ######################################################################################################### ##########Program Start########## #Runs script for each argument given in commandline foreach ($comp in $args) { echo "" echo "" echo "" echo "System data for $comp " echo "" get-wmiObject win32_computerSystem -Computer $comp | format-table Manufacturer, Model -autosize #Manufacturer (Computer Manufacturer), Model (Computer Model) get-wmiObject win32_operatingSystem -Computer $comp | format-table Name, OSArchitecture -autosize #Name (OS Name and Drive Intalled On), OSArchitecture (OS Architecture) get-wmiObject win32_bios -Computer $comp | format-table SerialNumber -autosize #SerialNumber (Computer Serial Number) get-wmiObject win32_processor -Computer $comp | format-table Name -autosize #Name (CPU Name, Model, Clockspeed) get-wmiObject win32_operatingSystem -Computer $comp | format-table TotalVisibleMemorySize, FreePhysicalMemory -autosize #TotalVisibleMemorySize (Total memory), FreePhysicalMemory (Memory Available) get-wmiObject win32_diskDrive -Computer $comp | format-table Model, InterfaceType, DeviceID, Partitions -autosize #Model (Device Model), InterfaceType (IDE, SCSI, Etc.), DeviceID (Divice ID #), Partitions (Number of Partitions on Disk) get-wmiObject win32_volume -Computer $comp | format-table FileSystem, Label, DriveLetter, Capacity, FreeSpace -autosize #FileSystem (File System Type), Label (Drive Label), DriveLetter (C:, d:, Etc.), Capacity (Total Space), FreeSpace (Space Available) get-wmiObject win32_operatingSystem -Computer $comp | format-table NumberOfUsers -autosize #NumberOfUsers (Total of Local User Accounts) get-wmiObject win32_computerSystem -Computer $comp | format-table UserName -autosize #UserName (Hostname\\Current User) get-wmiObject win32_networkAdapterConfiguration -Computer $comp | format-table MACAddress, IPAddress, DefaultIPGateway -autosize #MacAddress (MAC Address), IPAddress (IP Address), DefaultIPGateway (Default Gateway) }
combined_dataset/train/non-malicious/sample_3_27.ps1
sample_3_27.ps1
#************************************************ # DC_NetworkConnections-Component.ps1 # Version 1.0 # Version 1.1: Altered the runPS function correctly a column width issue. # Version 1.2 (4/26/14): Added table of contents. # Date: 2012-2014 # Author: Boyd Benson (bbenson@microsoft.com) # Description: # Called from: Networking Diags #******************************************************* Trap [Exception] { # Handle exception and throw it to the stdout log file. Then continue with function and script. $Script:ExceptionMessage = $_ "[info]: Exception occurred." | WriteTo-StdOut "[info]: Exception.Message $ExceptionMessage." | WriteTo-StdOut $Error.Clear() continue # later use return to return the exception message to an object: return $Script:ExceptionMessage } Import-LocalizedData -BindingVariable ScriptVariable Write-DiagProgress -Activity $ScriptVariable.ID_CTSNetworkConnections -Status $ScriptVariable.ID_CTSNetworkConnectionsDescription # detect OS version and SKU $wmiOSVersion = Get-CimInstance -Namespace "root\cimv2" -Class Win32_OperatingSystem [int]$bn = [int]$wmiOSVersion.BuildNumber function RunPS ([string]$RunPScmd="", [switch]$ft) { $RunPScmdLength = $RunPScmd.Length "-" * ($RunPScmdLength) | Out-File -FilePath $OutputFile -append "$RunPScmd" | Out-File -FilePath $OutputFile -append "-" * ($RunPScmdLength) | Out-File -FilePath $OutputFile -append if ($ft) { # This format-table expression is useful to make sure that wide ft output works correctly Invoke-Expression $RunPScmd |format-table -autosize -outvariable $FormatTableTempVar | Out-File -FilePath $outputFile -Width 500 -append } else { Invoke-Expression $RunPScmd | Out-File -FilePath $OutputFile -append } "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append } $sectionDescription = "Network Connections" $outputFile = $Computername + "_NetworkConnections_info_pscmdlets.TXT" "====================================================" | Out-File -FilePath $OutputFile -append "Network Connections Powershell Cmdlets" | Out-File -FilePath $OutputFile -append "====================================================" | Out-File -FilePath $OutputFile -append "Overview" | Out-File -FilePath $OutputFile -append "----------------------------------------------------" | Out-File -FilePath $OutputFile -append " 1. Get-NetConnectionProfile" | Out-File -FilePath $OutputFile -append "====================================================" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append if ($bn -gt 9000) { RunPS "Get-NetConnectionProfile" # W8/WS2012, W8.1/WS2012R2 # fl } else { "The Windows OS version is W2008.R2 or earlier. Not running ps cmdlets." | Out-File -FilePath $OutputFile -append } CollectFiles -filesToCollect $outputFile -fileDescription "Network Connections Information" -SectionDescription $sectionDescription #----------Registry $sectionDescription = "Network Connections" $outputFile = $Computername + "_NetworkConnections_reg_.TXT" $CurrentVersionKeys = "HKLM\SYSTEM\CurrentControlSet\services\Netman" RegQuery -Registrykeys $CurrentVersionKeys -Recursive $true -OutputFile $OutputFile -fileDescription "Network Connections Registry Keys" -SectionDescription $sectionDescription # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAy6qtD6dPLhrui # SQfGWjEGHEsj9Ts8AdXQKXKqmccogKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPie # UrLbU5JnFPZPrgQJNFrLO7UVpE9yzsZWBxGoBI/OMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAX4BBzo1PEuv5O2O7WW58p22HiSZ6xPApwpDq # OvjRSRfclnkTsQv+D04WEPnIacQvpsKTOxH6WQobe53Acaa/cq2abswKXhZHqYLy # 6OAGvoi9HLebQwy2Rhd6u35P1JeEr+t4w7hG7JAvkHB66rLYHtBeg4OXAe8lRAdW # C4WsLvxvye7CIVrlypMuSvYF7GoSsOO3hX9IO3INayE9yB8Gc9YhIdl11sFIirx9 # PcLWAK59O9l7fXnpeWZDc30QRaps90QEhDK6p7sIRnkeCm0Dz0a+N/Rs/KNrrhom # qsJcnKxemL1c3qzTb7+jemVREPV7iveYJG/9BxcXuXd2rEhfJ6GCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDX6zLRC/9eN1U3dGnzfq5eTCrtGBCbX6sf # eFBy/TMeIgIGZv8ZfhInGBMyMDI0MTAyODExNDA0NC45NTJaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9oMv # JmpUXSLBAAEAAAH2MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwNFoXDTI1MTAyMjE4MzEwNFowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjZCMDUtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # 0UJeLMR/N9WPBZhuKVFF+eWJZ68Wujdj4X6JR05cxO5CepNXo17rVazwWLkm5Aja # Vh19ZVjDChHzimxsoaXxNu8IDggKwpXvpAAItv4Ux50e9S2uVwfKv57p9JKG+Q7V # ONShujl1NCMkcgSrPdmd/8zcsmhzcNobLomrCAIORZ8IwhYy4siVQlf1NKhlyAzm # kWJD0N+60IiogFBzg3yISsvroOx0x1xSi2PiRIQlTXE74MggZDIDKqH/hb9FT2kK # /nV/aXjuo9LMrrRmn44oYYADe/rO95F+SG3uuuhf+H4IriXr0h9ptA6SwHJPS2Vm # bNWCjQWq5G4YkrcqbPMax7vNXUwu7T65E8fFPd1IuE9RsG4TMAV7XkXBopmPNfvL # 0hjxg44kpQn384V46o+zdQqy5K9dDlWm/J6vZtp5yA1PyD3w+HbGubS0niEQ1L6w # GOrPfzIm0FdOn+xFo48ERl+Fxw/3OvXM5CY1EqnzEznPjzJc7OJwhJVR3VQDHjBc # EFTOvS9E0diNu1eocw+ZCkz4Pu/oQv+gqU+bfxL8e7PFktfRDlM6FyOzjP4zuI25 # gD8tO9zJg6g6fRpaZc439mAbkl3zCVzTLDgchv6SxQajJtvvoQaZxQf0tRiPcbr2 # HWfMoqqd9uiQ0hTUEhG44FBSTeUPZeEenRCWadCW4G8CAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBRIwZsJuOcJfScPWcXZuBA4B89K8jAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEA13kBirH1cHu1WYR1ysj125omGtQ0PaQkEzwGb70xtqSoI+svQihsgdTY # xaPfp2IVFdgjaMaBi81wB8/nu866FfFKKdhdp3wnMZ91PpP4Ooe7Ncf6qICkgSuw # gdIdQvqE0h8VQ5QW5sDV4Q0Jnj4f7KHYx4NiM8C4jTw8SQtsuxWiTH2Hikf3QYB7 # 1a7dB9zgHOkW0hgUEeWO9mh2wWqYS/Q48ASjOqYw/ha54oVOff22WaoH+/Hxd9NT # EU/4vlvsRIMWT0jsnNI71jVArT4Q9Bt6VShWzyqraE6SKUoZrEwBpVsI0LMg2X3h # OLblC1vxM3+wMyOh97aFOs7sFnuemtI2Mfj8qg16BZTJxXlpPurWrG+OBj4BoTDk # C9AxXYB3yEtuwMs7pRWLyxIxw/wV9THKUGm+x+VE0POLwkrSMgjulSXkpfELHWWi # CVslJbFIIB/4Alv+jQJSKAJuo9CErbm2qeDk/zjJYlYaVGMyKuYZ+uSRVKB2qkEP # cEzG1dO9zIa1Mp32J+zzW3P7suJfjw62s3hDOLk+6lMQOR04x+2o17G3LceLkkxJ # m41ErdiTjAmdClen9yl6HgMpGS4okjFCJX+CpOFX7gBA3PVxQWubisAQbL5HgTFB # tQNEzcCdh1GYw/6nzzNNt+0GQnnobBddfOAiqkzvItqXjvGyK1QwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFU9eSpdxs0a0 # 6JFIuGFHIj/I+36ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJ4u8wIhgPMjAyNDEwMjgxMDE2MTVaGA8yMDI0 # MTAyOTEwMTYxNVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sni7wIBADAHAgEA # AgIV+jAHAgEAAgISoDAKAgUA6ss0bwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQBpUFU4+vZJFyUmVb+WZWIYm85wWkaqUQMIXDa89AJRdEINZBYYuKJZHwGX # evIycaqI5McGg28UnXlT85+VLHcRb2BqTBqlUDfyWMDDSi4/Ny1o+ihFohhs/ujQ # uxkh2lsfu3f8RO+rHyvyoc6aVYoXpbsYsPsvWhlP5VIY3yXO7ztB9TdvoXXfsSMI # GgIOURNjC5+mH+r4R0gkgrO/9ZkBSWax/DoAQGEOAQy9s6WfhPW9PTxIBkjbYnEx # w84j1PW/7aPVhavzoHfT0fP7eh9eCNY9ax+AXoa/pOOruFzpjML3/3o9VRglqy6j # vcBxO0h6Uf9FkqnHwg7BsMcIWiqvMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH2gy8malRdIsEAAQAAAfYwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQguZGf7UJN4+00xlSQ5wkL5XH20UfACNIOvGZSpLGKeWcwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCArYUzxlF6m5USLS4f8NXL/8aoNEVdsCZRmF+Ll # QjG2ojCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 9oMvJmpUXSLBAAEAAAH2MCIEIFraBgk4xXajMAI68rUQCySUOKGDReEAQUOAuvhI # wwAlMA0GCSqGSIb3DQEBCwUABIICAB5XwbLAU/Abp1Q/1h92hglCS+pt/36C7P9i # MfG4UP6ZsN0XxhH8oP6NFoSg5l7Fsu/vZpPsvCtJliwQuHH7RPFF3fLvjCmkDyqT # 1T9MuGpeJANQGhz5MjcXDzUiWOB6xSUokmeXamLnPqiZbDxA/6rksmAyBQ3D/guw # hqCLxL5WqiTHTlipMHqIDbQWxflqgNCI6fJicHTiVJQmgfobawLENueYkcbB+wfB # elFE8oBazbriLHb7T5L55wvSOQsOZua9knedCW9Eah8GjexzXXsU2FdsDZvZlePl # YsDv6zSG9E2CH2Pon8uFTS1jL9JNVOqFJ9QerLg9STcgSJTZK25hZ4bDxVkYmZIW # C1283SAIipe+3iysZ8Zx69n6ijbjxF8NbZM32JEoyDLwSDebP7zolvPMD5jF0s/D # JS7CdFN4IwXfZogUXoBm404t4hlR7rwUmBtEs2PbodrPZVP7p8sJsbiuWwxtPCmB # W6UUIKtihWiNsqI5K0fPH+nu7PK/bekoVCs82Xc1w93qeH8QRbUI+byzuwOUr0JM # uFoPTld5nTVH2haZPxx5YvDLYf+AhHPhvUBRmaFimMDukUg4zyy83sQZRBKxFLMh # h+mWIDfIsDs21btVU83zubTc+8rXiTmGq4KUn8rmB7UOhySDLCLlbITi0Jy2csaI # ShPomebz # SIG # End signature block
combined_dataset/train/non-malicious/sample_67_34.ps1
sample_67_34.ps1
# # Module manifest for module 'OCI.PSModules.Vnmonitoring' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Vnmonitoring.dll' # Version number of this module. ModuleVersion = '87.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'ca53b640-70c1-4d8a-a7c2-5fbd89718e19' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Vnmonitoring Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '87.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Vnmonitoring.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIVnmonitoringPathAnalysis', 'Get-OCIVnmonitoringPathAnalyzerTest', 'Get-OCIVnmonitoringPathAnalyzerTestsList', 'Get-OCIVnmonitoringWorkRequest', 'Get-OCIVnmonitoringWorkRequestErrorsList', 'Get-OCIVnmonitoringWorkRequestLogsList', 'Get-OCIVnmonitoringWorkRequestResultsList', 'Get-OCIVnmonitoringWorkRequestsList', 'Move-OCIVnmonitoringPathAnalyzerTestCompartment', 'New-OCIVnmonitoringPathAnalyzerTest', 'Remove-OCIVnmonitoringPathAnalyzerTest', 'Update-OCIVnmonitoringPathAnalyzerTest' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Vnmonitoring' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_1_89.ps1
sample_1_89.ps1
ConvertFrom-StringData @' id_dosdev=MS-DOS device names (symbolic links) id_dosdevrunning=Gathering MS-DOS device names information (dosdev) id_dosdevoutput=DOSDev Output id_dosdevoutputdesc=MS-DOS device names information '@ # SIG # Begin signature block # MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCASP40Aatia8xNX # Z5Q/0HdQDHkumLIzBQRgTmUH+JcPG6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIo3CpmR+RsqMcXU0W3VS8mm # qlCe01JblKNkHAH25Cq1MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAjXfEXsYx5GTcWJeDgtC8nwqonn1WjdO4RBb67vl0gSvDq9XZZCCgtKnH # xCNaamUveT4vVZh367/wwQqC/+hygCe+KlLlruf91rTCfxGjPiI4xR+qCphvE0fP # bmpla+/p/ks6vgGQBY3JcTFJWKa2Xt0lNmrRCmqX27ebE6Q2h4paIj1AjtOrOfYi # oTXBmw5dmuRWYSvxpPoOTfdT6PnC7hcK1CFIXA1cgIir+9fRrtuyy1wobo0A0uX7 # 33fPnpWjYo38oAvDX/BrbCDANCLN+Y+jQk7K9WOoQZ4dOB2vp033+mnTfnBd6RHg # 9lrxuRlEP+3JPAN9EJmgFlYZ7MXwIaGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC # F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBRgFd/FrycvTQoeIjdLjhdI7cjgJeZaIMFM1BX9nzvlwIGZus6esnc # GBMyMDI0MTAyODExNDA0Mi4zNjVaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB+R9njXWrpPGxAAEAAAH5MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzEwOVoXDTI1MTAyMjE4MzEwOVowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjJBMUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtD1MH3yAHWHNVslC+CBT # j/Mpd55LDPtQrhN7WeqFhReC9xKXSjobW1ZHzHU8V2BOJUiYg7fDJ2AxGVGyovUt # gGZg2+GauFKk3ZjjsLSsqehYIsUQrgX+r/VATaW8/ONWy6lOyGZwZpxfV2EX4qAh # 6mb2hadAuvdbRl1QK1tfBlR3fdeCBQG+ybz9JFZ45LN2ps8Nc1xr41N8Qi3KVJLY # X0ibEbAkksR4bbszCzvY+vdSrjWyKAjR6YgYhaBaDxE2KDJ2sQRFFF/egCxKgogd # F3VIJoCE/Wuy9MuEgypea1Hei7lFGvdLQZH5Jo2QR5uN8hiMc8Z47RRJuIWCOeyI # J1YnRiiibpUZ72+wpv8LTov0yH6C5HR/D8+AT4vqtP57ITXsD9DPOob8tjtsefPc # QJebUNiqyfyTL5j5/J+2d+GPCcXEYoeWZ+nrsZSfrd5DHM4ovCmD3lifgYnzjOry # 4ghQT/cvmdHwFr6yJGphW/HG8GQd+cB4w7wGpOhHVJby44kGVK8MzY9s32Dy1THn # Jg8p7y1sEGz/A1y84Zt6gIsITYaccHhBKp4cOVNrfoRVUx2G/0Tr7Dk3fpCU8u+5 # olqPPwKgZs57jl+lOrRVsX1AYEmAnyCyGrqRAzpGXyk1HvNIBpSNNuTBQk7FBvu+ # Ypi6A7S2V2Tj6lzYWVBvuGECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSJ7aO6nJXJ # I9eijzS5QkR2RlngADAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAZiAJgFbkf7jf # hx/mmZlnGZrpae+HGpxWxs8I79vUb8GQou50M1ns7iwG2CcdoXaq7VgpVkNf1uvI # hrGYpKCBXQ+SaJ2O0BvwuJR7UsgTaKN0j/yf3fpHD0ktH+EkEuGXs9DBLyt71iut # Vkwow9iQmSk4oIK8S8ArNGpSOzeuu9TdJjBjsasmuJ+2q5TjmrgEKyPe3TApAio8 # cdw/b1cBAmjtI7tpNYV5PyRI3K1NhuDgfEj5kynGF/uizP1NuHSxF/V1ks/2tCEo # riicM4k1PJTTA0TCjNbkpmBcsAMlxTzBnWsqnBCt9d+Ud9Va3Iw9Bs4ccrkgBjLt # g3vYGYar615ofYtU+dup+LuU0d2wBDEG1nhSWHaO+u2y6Si3AaNINt/pOMKU6l4A # W0uDWUH39OHH3EqFHtTssZXaDOjtyRgbqMGmkf8KI3qIVBZJ2XQpnhEuRbh+Agpm # Rn/a410Dk7VtPg2uC422WLC8H8IVk/FeoiSS4vFodhncFetJ0ZK36wxAa3FiPgBe # bRWyVtZ763qDDzxDb0mB6HL9HEfTbN+4oHCkZa1HKl8B0s8RiFBMf/W7+O7EPZ+w # MH8wdkjZ7SbsddtdRgRARqR8IFPWurQ+sn7ftEifaojzuCEahSAcq86yjwQeTPN9 # YG9b34RTurnkpD+wPGTB1WccMpsLlM0wggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAqs5WjWO7zVAKmIcdwhqgZvyp6UaggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJyZcwIhgPMjAyNDEwMjgwODI4MDdaGA8yMDI0MTAyOTA4MjgwN1owdDA6 # BgorBgEEAYRZCgQBMSwwKjAKAgUA6snJlwIBADAHAgEAAgIIXjAHAgEAAgITcTAK # AgUA6ssbFwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAZdq+OU23EaUch # wQu035tSDnKZla9uDo94iOGMUfYSHoIxASsf3js2DewxIzsFz1t8ELbs/7V+b+lL # Z25UDy5WhMuAaUF0DBK6D2JnsjyJVSbcc+48j6Z/7Fh84y9kT8c5HUYL5kF2NJiq # gHKNRTLdZqHB42I4bV/fz8/Dm/29GW+DR2IGYSsvL2e72AvfpKtUZO94WfnvRVAu # 4KwHlImGRd30JUiW0qFBDvmA12wAg8FJ/+mk6nhJjEpUqnrIVhOqTZE0I5GJiVJy # dAFpWGQeNwWigEbM5AlvSrgyoQMhnagRV/BHhjphFgGEu6OFzH+g6bBiUu/Bsmlo # dM49zQAgMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAH5H2eNdauk8bEAAQAAAfkwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgNMR4XQhCr/JP # /mVM1IODn18uxWKOCZ8tA9sVa8SXIrswgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCA5I4zIHvCN+2T66RUOLCZrUEVdoKlKl8VeCO5SbGLYEDCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+R9njXWrpPGxAAEAAAH5 # MCIEICZrvjThT7ljhfyqrm1E5STdGnS3QHMrZ/lFHJkHB7rdMA0GCSqGSIb3DQEB # CwUABIICAGgquXQENNUtd659zgvuCU1WHkk+FiekcDnXhdPCTadoAzwuYNi6dTWY # innKmQcjzEmnt6GrmEbjgCVMu7ANlyaznds9T2tcBvNAJ9V/HbTht13qipMKShAq # UgmP2Pk1/CrbmDUIzBDArstJMIJktb516Wo9SYn22+q41HUPWQZytuqAdac7pCb1 # a8m0n7uxfJ0f7NNiAJucjCeW9kPfH+aRr+I0ss0v6gPqicLNihbSFouNDlIYSxe2 # Rpz3xzZkyHVK/oGVlZaLMKmxAM9pPgY493bozDWxUauesN4Kux9ovk7TpeOLDxWq # luRT2pUe6n/SziJs9ElOQ7HIM3Ssklfi2nLXn8QwMaCTgFwIcEO+CFmVM1guP4yt # AOXRjF3oexYo/wBeNk6H7fHld44IaM3BxR2V144tfOHXenAcoR//bVgPPKYqnQz3 # XAgS7CrFsJGM2SO71WMgHNyzmpBOId5CIowrovovaUCifGi5VzLBs/7E1i81873Q # wNTAJDxfAlL3fybCqmxyl6QeFG4MXz/dvQe3id9yby8gIaO+Y/3MgM2B7o9BqWs8 # v47LHaqghOOdGB2smzjyg2TgbcVr3styUVQHD2BR06uVEJlfYdX4grvzHtZSLZEF # 5YQ+cF1K7nPuJoch4vQ/vC3Du+8pDY+hLgRR8Uyi6nDRWrfiEwQr # SIG # End signature block
combined_dataset/train/non-malicious/3791.ps1
3791.ps1
function Verify-Gallery { param($gallery, [string] $rgname, [string] $galleryName, [string] $loc, [string] $description) Assert-AreEqual $rgname $gallery.ResourceGroupName; Assert-AreEqual $galleryName $gallery.Name; Assert-AreEqual $loc $gallery.Location; Assert-AreEqual "Microsoft.Compute/galleries" $gallery.Type; Assert-AreEqual $description $gallery.Description; Assert-NotNull $gallery.Identifier.UniqueName; Assert-NotNull $gallery.Id; } function Verify-GalleryImageDefinition { param($imageDefinition, [string] $rgname, [string] $imageDefinitionName, [string] $loc, [string] $description, [string] $eula, [string] $privacyStatementUri, [string] $releaseNoteUri, [string] $osType, [string] $osState, $endOfLifeDate, [string] $publisherName, [string] $offerName, [string] $skuName, [int] $minVCPU, [int] $maxVCPU, [int] $minMemory, [int] $maxMemory, [string] $disallowedDiskType, [string] $purchasePlanName, [string] $purchasePlanPublisher, [string] $purchasePlanProduct) Assert-AreEqual $rgname $imageDefinition.ResourceGroupName; Assert-AreEqual $imageDefinitionName $imageDefinition.Name; Assert-AreEqual $loc $imageDefinition.Location; Assert-AreEqual "Microsoft.Compute/galleries/images" $imageDefinition.Type; Assert-AreEqual $description $imageDefinition.Description; Assert-NotNull $imageDefinition.Id; Assert-AreEqual $eula $imageDefinition.Eula; Assert-AreEqual $privacyStatementUri $imageDefinition.PrivacyStatementUri; Assert-AreEqual $releaseNoteUri $imageDefinition.ReleaseNoteUri; Assert-AreEqual $osType $imageDefinition.OsType; Assert-AreEqual $osState $imageDefinition.OsState; Assert-AreEqual $endOfLifeDate $imageDefinition.EndOfLifeDate; Assert-AreEqual $publisherName $imageDefinition.Identifier.Publisher; Assert-AreEqual $offerName $imageDefinition.Identifier.Offer; Assert-AreEqual $skuName $imageDefinition.Identifier.Sku; Assert-AreEqual $minVCPU $imageDefinition.Recommended.VCPUs.Min; Assert-AreEqual $maxVCPU $imageDefinition.Recommended.VCPUs.Max; Assert-AreEqual $minMemory $imageDefinition.Recommended.Memory.Min; Assert-AreEqual $maxMemory $imageDefinition.Recommended.Memory.Max; Assert-AreEqual $disallowedDiskType $imageDefinition.Disallowed.DiskTypes[0]; Assert-AreEqual $purchasePlanName $imageDefinition.PurchasePlan.Name; Assert-AreEqual $purchasePlanPublisher $imageDefinition.PurchasePlan.Publisher; Assert-AreEqual $purchasePlanProduct $imageDefinition.PurchasePlan.Product; } function Verify-GalleryImageVersion { param($imageVersion, [string] $rgname, [string] $imageVersionName, [string] $loc, [string] $sourceImageId, [int] $replicaCount, $endOfLifeDate, $targetRegions) Assert-AreEqual $rgname $imageVersion.ResourceGroupName; Assert-AreEqual $imageVersionName $imageVersion.Name; Assert-AreEqual $loc $imageVersion.Location; Assert-AreEqual "Microsoft.Compute/galleries/images/versions" $imageVersion.Type; Assert-NotNull $imageVersion.Id; Assert-AreEqual $sourceImageId $imageVersion.StorageProfile.Source.Id; Assert-AreEqual $replicaCount $imageVersion.PublishingProfile.ReplicaCount; Assert-False { $imageVersion.PublishingProfile.ExcludeFromLatest }; Assert-NotNull $imageVersion.PublishingProfile.PublishedDate; Assert-AreEqual $endOfLifeDate $imageVersion.PublishingProfile.EndOfLifeDate; for ($i = 0; $i -lt $targetRegions.Count; ++$i) { Assert-AreEqual $targetRegions[$i].Name $imageVersion.PublishingProfile.TargetRegions[$i].Name; if ($targetRegions[$i].ReplicaCount -eq $null) { Assert-AreEqual 1 $imageVersion.PublishingProfile.TargetRegions[$i].RegionalReplicaCount; } else { Assert-AreEqual $targetRegions[$i].ReplicaCount $imageVersion.PublishingProfile.TargetRegions[$i].RegionalReplicaCount; } } } function Test-Gallery { $rgname = Get-ComputeTestResourceName; $galleryName = 'gallery' + $rgname; $galleryImageName = 'galleryimage' + $rgname; $galleryImageVersionName = 'imageversion' + $rgname; try { [string]$loc = Get-ComputeVMLocation; $loc = $loc.Replace(' ', ''); New-AzResourceGroup -Name $rgname -Location $loc -Force; $description1 = "Original Description"; $description2 = "Updated Description"; New-AzGallery -ResourceGroupName $rgname -Name $galleryName -Description $description1 -Location $loc; $wildcardRgQuery = ($rgname -replace ".$") + "*" $wildcardNameQuery = ($galleryName -replace ".$") + "*" $galleryList = Get-AzGallery; $gallery = $galleryList | ? {$_.Name -eq $galleryName}; Verify-Gallery $gallery $rgname $galleryName $loc $description1; $galleryList = Get-AzGallery -ResourceGroupName $rgname; $gallery = $galleryList | ? {$_.Name -eq $galleryName}; Verify-Gallery $gallery $rgname $galleryName $loc $description1; $galleryList = Get-AzGallery -ResourceGroupName $wildcardRgQuery; $gallery = $galleryList | ? {$_.Name -eq $galleryName}; Verify-Gallery $gallery $rgname $galleryName $loc $description1; $gallery = Get-AzGallery -Name $galleryName; Verify-Gallery $gallery $rgname $galleryName $loc $description1; $output = $gallery | Out-String; $gallery = Get-AzGallery -Name $wildcardNameQuery; Verify-Gallery $gallery $rgname $galleryName $loc $description1; $output = $gallery | Out-String; $gallery = Get-AzGallery -ResourceGroupName $rgname -Name $wildcardNameQuery; Verify-Gallery $gallery $rgname $galleryName $loc $description1; $output = $gallery | Out-String; $gallery = Get-AzGallery -ResourceGroupName $wildcardRgQuery -Name $wildcardNameQuery; Verify-Gallery $gallery $rgname $galleryName $loc $description1; $output = $gallery | Out-String; $gallery = Get-AzGallery -ResourceGroupName $wildcardRgQuery -Name $galleryName; Verify-Gallery $gallery $rgname $galleryName $loc $description1; $output = $gallery | Out-String; $gallery = Get-AzGallery -ResourceGroupName $rgname -Name $galleryName; Verify-Gallery $gallery $rgname $galleryName $loc $description1; $output = $gallery | Out-String; Update-AzGallery -ResourceGroupName $rgname -Name $galleryName -Description $description2; $gallery = Get-AzGallery -ResourceGroupName $rgname -Name $galleryName; Verify-Gallery $gallery $rgname $galleryName $loc $description2; $publisherName = "galleryPublisher20180927"; $offerName = "galleryOffer20180927"; $skuName = "gallerySku20180927"; $eula = "eula"; $privacyStatementUri = "https://www.microsoft.com"; $releaseNoteUri = "https://www.microsoft.com"; $disallowedDiskTypes = "Premium_LRS"; $endOfLifeDate = [DateTime]::ParseExact('12 07 2025 18 02', 'HH mm yyyy dd MM', $null); $minMemory = 1; $maxMemory = 100; $minVCPU = 2; $maxVCPU = 32; $purchasePlanName = "purchasePlanName"; $purchasePlanProduct = "purchasePlanProduct"; $purchasePlanPublisher = ""; $osState = "Generalized"; $osType = "Windows"; New-AzGalleryImageDefinition -ResourceGroupName $rgname -GalleryName $galleryName -Name $galleryImageName ` -Location $loc -Publisher $publisherName -Offer $offerName -Sku $skuName ` -OsState $osState -OsType $osType ` -Description $description1 -Eula $eula ` -PrivacyStatementUri $privacyStatementUri -ReleaseNoteUri $releaseNoteUri ` -DisallowedDiskType $disallowedDiskTypes -EndOfLifeDate $endOfLifeDate ` -MinimumMemory $minMemory -MaximumMemory $maxMemory ` -MinimumVCPU $minVCPU -MaximumVCPU $maxVCPU ` -PurchasePlanName $purchasePlanName ` -PurchasePlanProduct $purchasePlanProduct ` -PurchasePlanPublisher $purchasePlanPublisher; $wildcardNameQuery = ($galleryImageName -replace ".$") + "*" $galleryImageDefinitionList = Get-AzGalleryImageDefinition -ResourceGroupName $rgname -GalleryName $galleryName -Name $wildcardNameQuery; $definition = $galleryImageDefinitionList | ? {$_.Name -eq $galleryImageName}; Verify-GalleryImageDefinition $definition $rgname $galleryImageName $loc $description1 ` $eula $privacyStatementUri $releaseNoteUri ` $osType $osState $endOfLifeDate ` $publisherName $offerName $skuName ` $minVCPU $maxVCPU $minMemory $maxMemory ` $disallowedDiskTypes ` $purchasePlanName $purchasePlanPublisher $purchasePlanProduct; $definition = Get-AzGalleryImageDefinition -ResourceGroupName $rgname -GalleryName $galleryName -Name $galleryImageName; $output = $definition | Out-String; Verify-GalleryImageDefinition $definition $rgname $galleryImageName $loc $description1 ` $eula $privacyStatementUri $releaseNoteUri ` $osType $osState $endOfLifeDate ` $publisherName $offerName $skuName ` $minVCPU $maxVCPU $minMemory $maxMemory ` $disallowedDiskTypes ` $purchasePlanName $purchasePlanPublisher $purchasePlanProduct; Update-AzGalleryImageDefinition -ResourceGroupName $rgname -GalleryName $galleryName -Name $galleryImageName ` -Description $description2; $definition = Get-AzGalleryImageDefinition -ResourceGroupName $rgname -GalleryName $galleryName -Name $galleryImageName; Verify-GalleryImageDefinition $definition $rgname $galleryImageName $loc $description2 ` $eula $privacyStatementUri $releaseNoteUri ` $osType $osState $endOfLifeDate ` $publisherName $offerName $skuName ` $minVCPU $maxVCPU $minMemory $maxMemory ` $disallowedDiskTypes ` $purchasePlanName $purchasePlanPublisher $purchasePlanProduct; $galleryImageVersionName = "1.0.0"; $vmsize = 'Standard_A4'; $vmname = 'vm' + $rgname; $p = New-AzVMConfig -VMName $vmname -VMSize $vmsize; Assert-AreEqual $p.HardwareProfile.VmSize $vmsize; $subnet = New-AzVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24"; $vnet = New-AzVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet; $vnet = Get-AzVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname; $subnetId = $vnet.Subnets[0].Id; $pubip = New-AzPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname); $pubip = Get-AzPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname; $pubipId = $pubip.Id; $nic = New-AzNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id; $nic = Get-AzNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname; $nicId = $nic.Id; $p = Add-AzVMNetworkInterface -VM $p -Id $nicId; $p = Add-AzVMNetworkInterface -VM $p -Id $nicId -Primary; $stoname = 'sto' + $rgname; $stotype = 'Standard_LRS'; New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype; $stoaccount = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; $osDiskName = 'osDisk'; $osDiskCaching = 'ReadWrite'; $osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd"; $dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd"; $dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd"; $dataDiskVhdUri3 = "https://$stoname.blob.core.windows.net/test/data3.vhd"; $p = Set-AzVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage; $p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty; $p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty; $p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk3' -Caching 'ReadOnly' -DiskSizeInGB 12 -Lun 3 -VhdUri $dataDiskVhdUri3 -CreateOption Empty; $p = Remove-AzVMDataDisk -VM $p -Name 'testDataDisk3'; $user = "Foo12"; $password = $PLACEHOLDER; $securePassword = ConvertTo-SecureString $password -AsPlainText -Force; $cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword); $computerName = 'test'; $vhdContainer = "https://$stoname.blob.core.windows.net/test"; $p = Set-AzVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred; $imgRef = Get-DefaultCRPImage -loc $loc; $p = ($imgRef | Set-AzVMSourceImage -VM $p); New-AzVM -ResourceGroupName $rgname -Location $loc -VM $p; $imageName = 'image' + $rgname; $imageConfig = New-AzImageConfig -Location $loc; Set-AzImageOsDisk -Image $imageConfig -OsType 'Windows' -OsState 'Generalized' -BlobUri $osDiskVhdUri; $imageConfig = Add-AzImageDataDisk -Image $imageConfig -Lun 1 -BlobUri $dataDiskVhdUri1; $imageConfig = Add-AzImageDataDisk -Image $imageConfig -Lun 2 -BlobUri $dataDiskVhdUri2; $imageConfig = Add-AzImageDataDisk -Image $imageConfig -Lun 3 -BlobUri $dataDiskVhdUri2; Assert-AreEqual 3 $imageConfig.StorageProfile.DataDisks.Count; $imageConfig = Remove-AzImageDataDisk -Image $imageConfig -Lun 3; Assert-AreEqual 2 $imageConfig.StorageProfile.DataDisks.Count; $image = New-AzImage -Image $imageConfig -ImageName $imageName -ResourceGroupName $rgname $targetRegions = @(@{Name='South Central US';ReplicaCount=1},@{Name='East US';ReplicaCount=2},@{Name='Central US'}); $tag = @{test1 = "testval1"; test2 = "testval2" }; New-AzGalleryImageVersion -ResourceGroupName $rgname -GalleryName $galleryName ` -GalleryImageDefinitionName $galleryImageName -Name $galleryImageVersionName ` -Location $loc -SourceImageId $image.Id -ReplicaCount 1 ` -PublishingProfileEndOfLifeDate $endOfLifeDate ` -TargetRegion $targetRegions; $wildcardNameQuery = ($galleryImageVersionName -replace ".$") + "*" $galleryImageVersionList = Get-AzGalleryImageVersion -ResourceGroupName $rgname -GalleryName $galleryName ` -GalleryImageDefinitionName $galleryImageName -Name $wildcardNameQuery; $version = $galleryImageVersionList | ? {$_.Name -eq $galleryImageVersionName}; Verify-GalleryImageVersion $version $rgname $galleryImageVersionName $loc ` $image.Id 1 $endOfLifeDate $targetRegions; $version = Get-AzGalleryImageVersion -ResourceGroupName $rgname -GalleryName $galleryName ` -GalleryImageDefinitionName $galleryImageName -Name $galleryImageVersionName; Verify-GalleryImageVersion $version $rgname $galleryImageVersionName $loc ` $image.Id 1 $endOfLifeDate $targetRegions; Update-AzGalleryImageVersion -ResourceGroupName $rgname -GalleryName $galleryName ` -GalleryImageDefinitionName $galleryImageName -Name $galleryImageVersionName ` -Tag $tag; $version = Get-AzGalleryImageVersion -ResourceGroupName $rgname -GalleryName $galleryName ` -GalleryImageDefinitionName $galleryImageName -Name $galleryImageVersionName; Verify-GalleryImageVersion $version $rgname $galleryImageVersionName $loc ` $image.Id 1 $endOfLifeDate $targetRegions; $output = $version | Out-String; $version | Remove-AzGalleryImageVersion -Force; Wait-Seconds 300; $definition | Remove-AzGalleryImageDefinition -Force; Wait-Seconds 300; $gallery | Remove-AzGallery -Force; } finally { Clean-ResourceGroup $rgname } } function Test-GalleryCrossTenant { $imageId = "/subscriptions/97f78232-382b-46a7-8a72-964d692c4f3f/resourceGroups/xwRg/providers/Microsoft.Compute/galleries/galleryForCirrus/images/xwGalleryImageForCirrusWindows/versions/1.0.0"; $rgname = Get-ComputeTestResourceName; try { $loc = Get-ComputeVMLocation; New-AzResourceGroup -Name $rgname -Location $loc -Force; $vmsize = 'Standard_D2_v2'; $vmname = 'vm' + $rgname; $p = New-AzVMConfig -VMName $vmname -VMSize $vmsize; $subnet = New-AzVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24"; $vnet = New-AzVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet; $vnet = Get-AzVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname; $subnetId = $vnet.Subnets[0].Id; $pubip = New-AzPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname); $pubip = Get-AzPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname; $nic = New-AzNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id; $nic = Get-AzNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname; $nicId = $nic.Id; $p = Add-AzVMNetworkInterface -VM $p -Id $nicId -Primary; $user = "Foo12"; $password = $PLACEHOLDER; $securePassword = ConvertTo-SecureString $password -AsPlainText -Force; $cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword); $computerName = 'test'; $p = Set-AzVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred; $p = Set-AzVMSourceImage -VM $p -Id $imageId; New-AzVM -ResourceGroupName $rgname -Location $loc -VM $p; $vm = Get-AzVM -ResourceGroupName $rgname -Name $vmname; Assert-AreEqual $imageId $vm.StorageProfile.ImageReference.Id; } finally { Clean-ResourceGroup $rgname } } function Test-GalleryImageVersion { $rgname = Get-ComputeTestResourceName; $galleryName = 'gallery' + $rgname; $galleryImageName = 'galleryimage' + $rgname; $galleryImageVersionName = 'imageversion' + $rgname; try { [string]$loc = Get-ComputeVMLocation; $loc = $loc.Replace(' ', ''); New-AzResourceGroup -Name $rgname -Location $loc -Force; $description1 = "Original Description"; New-AzGallery -ResourceGroupName $rgname -Name $galleryName -Description $description1 -Location $loc; $gallery = Get-AzGallery -ResourceGroupName $rgname -Name $galleryName; Verify-Gallery $gallery $rgname $galleryName $loc $description1; $output = $gallery | Out-String; $publisherName = "galleryPublisher20180927"; $offerName = "galleryOffer20180927"; $skuName = "gallerySku20180927"; $eula = "eula"; $privacyStatementUri = "https://www.microsoft.com"; $releaseNoteUri = "https://www.microsoft.com"; $disallowedDiskTypes = "Premium_LRS"; $endOfLifeDate = [DateTime]::ParseExact('12 07 2025 18 02', 'HH mm yyyy dd MM', $null); $minMemory = 1; $maxMemory = 100; $minVCPU = 2; $maxVCPU = 32; $purchasePlanName = "purchasePlanName"; $purchasePlanProduct = "purchasePlanProduct"; $purchasePlanPublisher = ""; $osState = "Generalized"; $osType = "Windows"; New-AzGalleryImageDefinition -ResourceGroupName $rgname -GalleryName $galleryName -Name $galleryImageName ` -Location $loc -Publisher $publisherName -Offer $offerName -Sku $skuName ` -OsState $osState -OsType $osType ` -Description $description1 -Eula $eula ` -PrivacyStatementUri $privacyStatementUri -ReleaseNoteUri $releaseNoteUri ` -DisallowedDiskType $disallowedDiskTypes -EndOfLifeDate $endOfLifeDate ` -MinimumMemory $minMemory -MaximumMemory $maxMemory ` -MinimumVCPU $minVCPU -MaximumVCPU $maxVCPU ` -PurchasePlanName $purchasePlanName ` -PurchasePlanProduct $purchasePlanProduct ` -PurchasePlanPublisher $purchasePlanPublisher; $definition = Get-AzGalleryImageDefinition -ResourceGroupName $rgname -GalleryName $galleryName -Name $galleryImageName; $output = $definition | Out-String; Verify-GalleryImageDefinition $definition $rgname $galleryImageName $loc $description1 ` $eula $privacyStatementUri $releaseNoteUri ` $osType $osState $endOfLifeDate ` $publisherName $offerName $skuName ` $minVCPU $maxVCPU $minMemory $maxMemory ` $disallowedDiskTypes ` $purchasePlanName $purchasePlanPublisher $purchasePlanProduct; $galleryImageVersionName = "1.0.0"; $vmsize = 'Standard_A4'; $vmname = 'vm' + $rgname; $p = New-AzVMConfig -VMName $vmname -VMSize $vmsize; Assert-AreEqual $p.HardwareProfile.VmSize $vmsize; $subnet = New-AzVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24"; $vnet = New-AzVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet; $vnet = Get-AzVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname; $subnetId = $vnet.Subnets[0].Id; $pubip = New-AzPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname); $pubip = Get-AzPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname; $nic = New-AzNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id; $nic = Get-AzNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname; $p = Add-AzVMNetworkInterface -VM $p -Id $nic.Id -Primary; $stoname = 'sto' + $rgname; $stotype = 'Standard_LRS'; New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype; $stoaccount = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname; $osDiskName = 'osDisk'; $osDiskCaching = 'ReadWrite'; $osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd"; $dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd"; $dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd"; $p = Set-AzVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage; $p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty; $p = Add-AzVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty; $user = "Foo12"; $password = $PLACEHOLDER; $securePassword = ConvertTo-SecureString $password -AsPlainText -Force; $cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword); $computerName = 'test'; $vhdContainer = "https://$stoname.blob.core.windows.net/test"; $p = Set-AzVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred; $imgRef = Get-DefaultCRPImage -loc $loc; $p = ($imgRef | Set-AzVMSourceImage -VM $p); New-AzVM -ResourceGroupName $rgname -Location $loc -VM $p; $imageName = 'image' + $rgname; $imageConfig = New-AzImageConfig -Location $loc; Set-AzImageOsDisk -Image $imageConfig -OsType 'Windows' -OsState 'Generalized' -BlobUri $osDiskVhdUri; $imageConfig = Add-AzImageDataDisk -Image $imageConfig -Lun 1 -BlobUri $dataDiskVhdUri1; $imageConfig = Add-AzImageDataDisk -Image $imageConfig -Lun 2 -BlobUri $dataDiskVhdUri2; $image = New-AzImage -Image $imageConfig -ImageName $imageName -ResourceGroupName $rgname $targetRegions = @(@{Name='South Central US';ReplicaCount=1;StorageAccountType='Standard_LRS'},@{Name='East US';ReplicaCount=2},@{Name='Central US'}); $tag = @{test1 = "testval1"; test2 = "testval2" }; New-AzGalleryImageVersion -ResourceGroupName $rgname -GalleryName $galleryName ` -GalleryImageDefinitionName $galleryImageName -Name $galleryImageVersionName ` -Location $loc -SourceImageId $image.Id -ReplicaCount 1 ` -PublishingProfileEndOfLifeDate $endOfLifeDate ` -StorageAccountType Standard_LRS ` -TargetRegion $targetRegions; $version = Get-AzGalleryImageVersion -ResourceGroupName $rgname -GalleryName $galleryName ` -GalleryImageDefinitionName $galleryImageName -Name $galleryImageVersionName; Verify-GalleryImageVersion $version $rgname $galleryImageVersionName $loc ` $image.Id 1 $endOfLifeDate $targetRegions; Update-AzGalleryImageVersion -ResourceGroupName $rgname -GalleryName $galleryName ` -GalleryImageDefinitionName $galleryImageName -Name $galleryImageVersionName ` -Tag $tag; $version = Get-AzGalleryImageVersion -ResourceGroupName $rgname -GalleryName $galleryName ` -GalleryImageDefinitionName $galleryImageName -Name $galleryImageVersionName; Verify-GalleryImageVersion $version $rgname $galleryImageVersionName $loc ` $image.Id 1 $endOfLifeDate $targetRegions; $version | Remove-AzGalleryImageVersion -Force; Wait-Seconds 300; $definition | Remove-AzGalleryImageDefinition -Force; Wait-Seconds 300; $gallery | Remove-AzGallery -Force; } finally { Clean-ResourceGroup $rgname } }
combined_dataset/train/non-malicious/2587.ps1
2587.ps1
function SQL-NONQuery{ param([string]$Statement, [string]$SqlServer = $DEFAULT_SQL_SERVER, [string]$DB = $DEFAULT_SQL_DB ) $conn_options = ("Data Source=$SqlServer; Initial Catalog=$DB;" + "Integrated Security=SSPI") $conn = New-Object System.Data.SqlClient.SqlConnection($conn_options) $conn.Open() $cmd = $conn.CreateCommand() $cmd.CommandText = $Statement $Server = $cmd.ExecuteNonQuery() if(-not $?) { $lineno = Get-CurrentLineNumber ./logerror.ps1 $Output $date $lineno $title } $Server } $ENV = $args[0] if ($ENV -eq $null){ $ENV = "PA-PROD" } switch ($ENV) { "PA-PROD"{ $DBServer = "XSQLUTIL18"; $ArchiveDrive = "E" $DB = "Status"; $ServerQuery = "SELECT server_name , s.server_id , domain , ip_address , dns_host_name FROM t_server s INNER JOIN t_server_properties sp ON s.server_id = sp.server_id WHERE Active = '1' ORDER BY server_name "; $UpdateQuery = "UPDATE t_server_properties SET ip_address = $IP.IPAddress WHERE server_id = $($s.server_id)" } } $Servers = ( Invoke-SQLCmd -query $ServerQuery -Server $DBServer -Database $DB ) Foreach($s in $servers) { $ServerName = $($s.dns_host_name) if(!(Test-Connection -Cn $ServerName -BufferSize 16 -Count 1 -ea 0 -quiet)){ "Problem connecting to $ServerName" } else { "Connection to $ServerName succeeded!" $IP = Get-IPAddress -ComputerName $ServerName -IPV4only | Select IPAddress $IP.IPAddress "`tDoing a GetHostEntry on $($s.server_name)..." $UpdateQuery = "UPDATE t_server_properties SET ip_address = '" + $IP.IPAddress + "' WHERE server_id = $($s.server_id)" $UpdateQuery try { Invoke-SqlCmd -Query $UpdateQuery -Server $DBServer -Database $DB } catch [System.Exception] { Write-Host "Exception connecting to $Server(System.Exception)" $_.Exception Write-Host if ($_.Exception.InnerException) { Write-Host "Inner Exception: " $_.Exception.InnerException } } } }
combined_dataset/train/non-malicious/Upgrade Templates to v7.ps1
Upgrade Templates to v7.ps1
Function Convert-TemplateToVM($template){ Write-Host "Converting" $vm -ForegroundColor Yellow Set-Template $template -ToVM -RunAsync | out-null } Function PowerOn-VM($vm){ Start-VM -VM $vm -Confirm:$false -RunAsync do { $vmview = get-VM $vm | Get-View $status = $vmview.Guest.ToolsStatus Write-Host $vm is starting! -ForegroundColor Yellow sleep 5 }until(($status -match "toolsOld") -or ($status -match "toolsOk")) if ($status -match "Ok"){ $Startup = "Ok"} elseif($status -match "toolsOld"){ $Startup = "ToolsOld"} else{ $Startup = "Not Ready"} return $Startup } Function Check-ToolsStatus($vm){ $vmview = get-VM $vm | Get-View $status = $vmview.Guest.ToolsStatus if ($status -match "toolsOld"){ $vmTools = "Old"} elseif($status -match "toolsNotRunning"){ $vmTools = "Not Running"} else{ $vmTools = "Ok"} return $vmTools } Function Check-VMHardwareVersion($vm){ $vmView = get-VM $vm | Get-View $vmVersion = $vmView.Config.Version $v4 = "vmx-04" $v7 = "vmx-07" if ($vmVersion -eq $v4){ $vmHardware = "Old"} elseif($vmVersion -eq $v7){ $vmHardware = "Ok"} else{Write-Host "Error!!" -ForegroundColor Red $vmHardware = "Error"} return $vmHardware } Function PowerOff-VM($vm){ sleep 20 Shutdown-VMGuest -VM $vm -Confirm:$false do { $vmview = Get-VM $vm | Get-View $status = $vmview.Guest.ToolsStatus Write-Host $vm is stopping! -ForegroundColor Yellow sleep 5 }until($status -match "toolsNotRunning") if ($status -match "toolsNotRunning"){ $Shutdown = "Ok"} else{ $Shutdown = "Not Ready"} return $Shutdown } Function ConvertTo-Template($vm){ Write-Host "Converting" $vm -ForegroundColor Yellow $vmview = Get-VM $vm | Get-View $vmview.MarkAsTemplate() | Out-Null } Function Upgrade-VMHardware($vm){ $vmview = Get-VM $vm | Get-View $vmVersion = $vmView.Config.Version $v4 = "vmx-04" $v7 = "vmx-07" if ($vmVersion -eq $v4){ Write-Host "Version 4 detected" -ForegroundColor Red # Update Hardware Write-Host "Upgrading Hardware on" $vm -ForegroundColor Yellow Get-View ($vmView.UpgradeVM_Task($v7)) | Out-Null } } $vCenter = Read-Host "Enter your vCenter servername" Connect-VIServer $vCenter $tmpfile = "$env:temp\\tmpfile.csv" $templates = Get-Template -Name * | Export-Csv -NoTypeInformation $tmpfile $csv = Import-CSV $tmpfile foreach($item in $csv){ $template = $item.Name #Convert Template back to VM Convert-TemplateToVM $template } foreach($item in $csv){ $vm = $item.Name $vmHardware = Check-VMHardwareVersion $vm if ($vmHardware -eq "Ok"){ Write-Host $vm "is up to date" -ForegroundColor Green ConvertTo-Template $vm } else{Write-Host "Hardware is old" -ForegroundColor Red if(PowerOn-VM $vm -eq "Ok"){ Write-Host "PowerOn Complete" -ForegroundColor Green sleep 10 $vmToolsStatus = Check-ToolsStatus $vm if($vmToolsStatus -eq "Old"){ Write-Host "The VMware Tools are old" -ForegroundColor Red Sleep 20 Get-VMGuest $vm | Update-Tools Sleep 120 Write-Host "VMware Tools are installed on:" $vm -ForegroundColor Cyan $vmToolsStatus = Check-ToolsStatus $vm if($vmToolsStatus -eq "Ok"){ $PowerOffVM = PowerOff-VM $vm if($PowerOffVM -eq "Ok"){ Write-Host $vm "is down" -ForegroundColor Yellow Upgrade-VMHardware $vm ConvertTo-Template $vm Write-Host $vm "is up to date" -ForegroundColor Green } } } else{ $PowerOffVM = PowerOff-VM $vm if($PowerOffVM -eq "Ok"){ Upgrade-VMHardware $vm ConvertTo-Template $vm Write-Host $vm "is up to date" -ForegroundColor Green } } } } } Remove-Item $tmpfile -Confirm:$false Disconnect-VIServer -Confirm:$false
combined_dataset/train/non-malicious/Close by window title.ps1
Close by window title.ps1
using System; using System.Text; using System.Drawing; using System.Reflection; using System.Diagnostics; using System.Windows.Forms; using System.ComponentModel; using System.Runtime.InteropServices; [assembly: AssemblyTitle("CloseByTitle")] [assembly: AssemblyVersion("3.5.0.0")] namespace CloseByTitle { internal static class WinAPI { [DllImport("user32.dll")] [return: MarshalAs(UnmanagedType.Bool)] internal static extern bool EnumWindows(EnumWindowsProc lpEnumFunc, IntPtr lParam); [DllImport("user32.dll", CharSet = CharSet.Unicode)] internal static extern int GetWindowText(IntPtr hWnd, StringBuilder lpString, int nMaxCount); [DllImport("user32.dll")] internal static extern int GetWindowTextLength(IntPtr hWnd); [DllImport("user32.dll")] internal static extern int GetWindowThreadProcessId(IntPtr hWnd, out int lpdwProcessId); internal delegate bool EnumWindowsProc(IntPtr hWnd, IntPtr lParam); } internal class frmMain : Form { public frmMain() { InitializeComponent(); } private TextBox txtTitle; private Button btnClose; private void InitializeComponent() { this.txtTitle = new TextBox(); this.btnClose = new Button(); // //txtTitle // this.txtTitle.Location = new Point(16, 16); this.txtTitle.Width = 190; // //btnClose // this.btnClose.Location = new Point(220, 15); this.btnClose.Text = "Close it!"; this.btnClose.Click += new EventHandler(btnClose_Click); // //frmMain // this.Controls.AddRange(new Control[] {this.txtTitle, this.btnClose}); this.ClientSize = new Size(310, 65); this.MaximizeBox = false; this.MinimizeBox = false; this.StartPosition = FormStartPosition.CenterScreen; this.Load += new EventHandler(frmMain_Load); } private static string GetText(IntPtr hWnd) { int len = WinAPI.GetWindowTextLength(hWnd); StringBuilder sb = new StringBuilder(len + 1); len = WinAPI.GetWindowText(hWnd, sb, sb.Capacity); return sb.ToString(0, len); } private void btnClose_Click(object sender, EventArgs e) { int pid, res; string search = txtTitle.Text, window = null; if (!WinAPI.EnumWindows(new WinAPI.EnumWindowsProc((hWnd, lParam) => { window = GetText(hWnd); if (!string.IsNullOrEmpty(window) && window.Contains(search)) { res = WinAPI.GetWindowThreadProcessId(hWnd, out pid); //there is an exception if rights are not enough if (res != 0) Process.GetProcessById(pid).Kill(); } return true; }), IntPtr.Zero)) { throw new Win32Exception(Marshal.GetLastWin32Error()); } } private void frmMain_Load(object sender, EventArgs e) { Assembly assem = typeof(frmMain).Assembly; string title = ((AssemblyTitleAttribute)Attribute.GetCustomAttribute(assem, typeof(AssemblyTitleAttribute))).Title; this.Text = title; } } internal sealed class Program { [STAThread] static void Main() { Application.EnableVisualStyles(); Application.Run(new frmMain()); } } }
combined_dataset/train/non-malicious/473.ps1
473.ps1
function Start-PPScript{ [CmdletBinding()] param( [Parameter(Mandatory=$true)] [String] $Name, [Parameter(Mandatory=$false)] [String] $Arguments ) $ScriptShortcut = Get-PPScript -Name $Name -Shortcut $(if( -not $ScriptShortcut){ Get-PPScript -Name $Name | select -First 1 }else{ Get-PPScript -Name $ScriptShortcut.Filename }) | %{ iex "& `"$($_.Fullname)`" $(if($Arguments){$Arguments})" } }
combined_dataset/train/non-malicious/sample_54_54.ps1
sample_54_54.ps1
########################################################### # # 'ServiceHelper' module # ########################################################### $ErrorActionPreference = 'Stop' Set-StrictMode -Version Latest $global:GCServiceName = "GCService" $script:GCServiceBinaryName = "gc_service.exe" $script:GCServiceDisplayName = "Guest Configuration Service" $script:GCServiceDescription = "This service monitors desired state of the machine." $global:GCArcServiceName = "GCArcService" $script:GCArcServiceBinaryName = "gc_arc_service.exe" $script:GCArcServiceDisplayName = "Guest Configuration Arc Service" $script:GCArcServiceDescription = "This service monitors desired state of the machine." $global:ExtServiceName = "ExtensionService" $script:ExtServiceBinaryName = "gc_extension_service.exe" $script:ExtDisplayName = "Guest Configuration Extension service" $script:ExtDescription = "The service installs the requested extensions" $script:GCInstallPath = "$PSScriptRoot\..\..\.." $script:GCBinariesFolderName = "GC" $script:MigratedDataFolderName = "MigratedData" $script:GCBinariesPath = Join-Path $script:GCInstallPath $script:GCBinariesFolderName <# .SYNOPSIS Install GC Service. By default it calculates the GC Service Binary Path based on this GC Install Module location. .Example Install-ServiceInternal #> Function Install-ServiceInternal { [CmdletBinding()] Param( [Parameter()] [string] $ServiceType = "GC" ) Write-Verbose -Message "In Install-ServiceInternal" if ($ServiceType -eq "GC" -and (CheckServiceExists($global:GCServiceName))) { Write-Error "GC service already exists, can not install new service" } elseif ($ServiceType -eq "Extension" -and (CheckServiceExists($global:ExtServiceName))) { Write-Error "Extension service already exists, can not install new service" } elseif ($ServiceType -eq "GCArc" -and (CheckServiceExists($global:GCArcServiceName))) { Write-Error "GC Arc service already exists, can not install new service" } else { # Default values for GC Azure Service $serviceName = $global:GCServiceName $serviceBinaryName = $script:GCServiceBinaryName $displayName = $script:GCServiceDisplayName $description = $script:GCServiceDescription if ($ServiceType -eq "Extension") { $serviceName = $global:ExtServiceName $serviceBinaryName = $script:ExtServiceBinaryName $displayName = $script:ExtDisplayName $description = $script:ExtDescription } elseif ($ServiceType -eq "GCArc") { $serviceName = $global:GCArcServiceName $serviceBinaryName = $script:GCArcServiceBinaryName $displayName = $script:GCArcServiceDisplayName $description = $script:GCArcServiceDescription } $serviceBinaryPath = Join-Path $script:GCBinariesPath $serviceBinaryName $absolutePath = [System.IO.Path]::GetFullPath($serviceBinaryPath) Write-Verbose -Message "GC Service binary path : $absolutePath." $serviceApplication = Get-Command -Name $absolutePath -TotalCount 1 if ($serviceApplication.CommandType -ne "Application") { Write-Error "Service binary type is not as expected" } $servicePathWithQuotes = '"{0}"' -f $absolutePath $serviceBinaryPathCommand = $servicePathWithQuotes + " -k netsvcs" New-Service -Name $serviceName -BinaryPathName $serviceBinaryPathCommand -DisplayName $displayName -Description $description -StartupType Automatic $command = "sc.exe config $ServiceName start= delayed-auto" $Output = Invoke-Expression -Command $Command -ErrorAction Stop if ($LASTEXITCODE -ne 0) { Write-Warning "Failed to set $ServiceName to delayed start. More details: $Output" } else { Write-Verbose "Successfully changed $ServiceName service to delayed start" } # For windows 2008 R2 + sp1 start-process with -Wait parameter does not work. Hence sleep for 10 sec instead. $osVersion=[Environment]::OSVersion.Version if (($osVersion.Major -eq 6) -and ($osVersion.Minor -eq 1) -and ($osVersion.Build -le 7601)) { # configure recovery of the service during failure. $configureProcess = Start-Process sc.exe -ArgumentList "failure $serviceName reset= 30 actions= restart/10000/restart/20000/restart/30000" -PassThru Start-Sleep -Seconds 10 } else { # configure recovery of the service during failure. $configureProcess = Start-Process sc.exe -ArgumentList "failure $serviceName reset=30 actions=restart/10000/restart/20000/restart/30000" -PassThru -Wait } if ($null -eq $configureProcess) { Write-Error "Failed to start sc.exe process to configure $serviceName service." } # on 2008R2 ExitCode is not set. if (($configureProcess.ExitCode -ne 0) -and ($null -ne $configureProcess.ExitCode)) { Write-Warning "configuring service recovery options failed with exit-code:- $($configureProcess.ExitCode)" } Write-Verbose -Message "Successfully Installed new $serviceName." } Write-Verbose -Message "Validating $serviceName Properties." # Validate service Properties as returend by Get-Service. $serviceObject = Get-Service -Name $serviceName if ($serviceObject.Status -eq 'Stopped') { Write-Verbose -Message "$serviceName is in Stopped State." } else { Write-Error -Message "$serviceName is in unexpected state: $($serviceObject.Status)" } if ($serviceObject.CanPauseAndContinue -eq $false) { Write-Verbose -Message "$serviceName has correct CanPauseAndContinue State." } else { Write-Error -Message "$serviceName has unexpected CanPauseAndContinue: $($serviceObject.CanPauseAndContinue)" } if ($serviceObject.CanShutdown -eq $false) { Write-Verbose -Message "$serviceName has correct CanShutdown State." } else { Write-Error -Message "$serviceName has unexpected CanShutdown: $($serviceObject.CanShutdown)" } if ($serviceObject.CanStop -eq $false) { Write-Verbose -Message "$serviceName has correct CanStop State." } else { Write-Error -Message "$serviceName has unexpected CanStop: $($serviceObject.CanStop)" } if ($serviceObject.ServiceType -eq "Win32OwnProcess") { Write-Verbose -Message "$serviceName will run as Win32OwnProcess." } else { Write-Error -Message "$serviceName has unexpected ServiceType: $($serviceObject.ServiceType)" } # For windows 2008 R2 + sp1 Get-Service cmdlet does not populate StartType if ($serviceObject.PSObject.Properties['StartType']) { if ($serviceObject.StartType -eq "Automatic") { Write-Verbose -Message "$serviceName will be started Automatically." } else { Write-Warning -Message "$serviceName has unexpected StartType: $($serviceObject.StartType)" } } else { # Configure recovery of the service during failure. We need to look for the value of the start type because the type will be localized based on # the language of the machine. Since we're only looking for one startType: '(DELAYED)' we can just search for that and assume that if we can't # find it then it is configured incorrectly. $ServiceStartType = ([string](sc.exe qc $serviceName | Select-String '(DELAYED)')).Split(' ',[System.StringSplitOptions]::RemoveEmptyEntries)[-1] if ($ServiceStartType -imatch '(DELAYED)') { Write-Verbose -Message "$serviceName will be started Automatically." } else { Write-Warning -Message "$serviceName has unexpected StartType or the StartType cannot be found on the object. StartType: $ServiceStartType" } } # Also validate some service properties from the registry database of scm. $serviceRegistryData = Get-ItemProperty hklm:\SYSTEM\CurrentControlSet\Services\$serviceName if ($serviceRegistryData.ImagePath -eq $serviceBinaryPathCommand) { Write-Verbose -Message "$serviceName Binary is Installed Correctly." } else { Write-Error -Message "$serviceName binary is not Installed correctly: $($serviceRegistryData.ImagePath)" } if ($serviceRegistryData.ObjectName -eq "LocalSystem") { Write-Verbose -Message "$serviceName will run under LocalSystem Account." } else { Write-Error -Message "$serviceName has unexpected AccountType: $($serviceRegistryData.ObjectName)" } if ($ServiceType -eq "GC") { if ($serviceRegistryData.DisplayName -eq $script:GCServiceDisplayName) { Write-Verbose -Message "$serviceName has correct Display Name." } else { Write-Error -Message "$serviceName has unexpected DisplayName: $($serviceRegistryData.DisplayName)" } if ($serviceRegistryData.Description -eq $script:GCServiceDescription) { Write-Verbose -Message "$serviceName has correct Description Data." } else { Write-Error -Message "$serviceName has unexpected Description: $($serviceRegistryData.Description)" } } elseif ($ServiceType -eq "GCArc") { if ($serviceRegistryData.DisplayName -eq $script:GCArcServiceDisplayName) { Write-Verbose -Message "$serviceName has correct Display Name." } else { Write-Error -Message "$serviceName has unexpected DisplayName: $($serviceRegistryData.DisplayName)" } if ($serviceRegistryData.Description -eq $script:GCArcServiceDescription) { Write-Verbose -Message "$serviceName has correct Description Data." } else { Write-Error -Message "$serviceName has unexpected Description: $($serviceRegistryData.Description)" } } elseif ($ServiceType -eq "Extension") { if ($serviceRegistryData.DisplayName -eq $script:ExtDisplayName) { Write-Verbose -Message "$serviceName has correct Display Name." } else { Write-Error -Message "$serviceName has unexpected DisplayName: $($serviceRegistryData.DisplayName)" } if ($serviceRegistryData.Description -eq $script:ExtDescription) { Write-Verbose -Message "$serviceName has correct Description Data." } else { Write-Error -Message "$serviceName has unexpected Description: $($serviceRegistryData.Description)" } } } <# .Synopsis Get Guest Config data path. #> function Get-GuestConfigDataPath { [CmdletBinding()] param () return Join-Path $env:ProgramData 'GuestConfig' } <# .Synopsis Set Acl permissions on given path #> function Set-AclPermissions { [CmdletBinding()] Param ( [Parameter()] [string] $ServiceType, [Parameter()] [string] $Path ) try { Write-Verbose -Message "Attempting to set ACL permissions on the path '$Path' with PowerShell..." if ($ServiceType -eq 'GC') { Write-Verbose -Message "Using Get-Acl" $acl = Get-Acl $Path } else { # Ext deployment fails in azure with "[System.IO.DirectoryInfo] does not contain a method named 'GetAccessControl'" error # So we are calling this only for Hybrid scenarios. Write-Verbose -Message "Using Get-Item GetAccessControl" $acl = (Get-Item $Path).GetAccessControl('Access') } # Removing inherited access rules Write-Verbose -Message "Clearing existing ACL permissions" $acl.SetAccessRuleProtection($True, $False) # Adding new access rules for the target directory Write-Verbose -Message "Setting ACL permissions for the built-in Administrator" $BuiltinAdminSID = New-Object System.Security.Principal.SecurityIdentifier 'S-1-5-32-544' #Built-in Administrators SID $rule = New-Object System.Security.AccessControl.FileSystemAccessRule($BuiltinAdminSID, 'FullControl', 'ContainerInherit, ObjectInherit', 'None', 'Allow') $acl.AddAccessRule($rule) Set-Acl $Path $acl Write-Verbose -Message "Setting ACL permissions for the Local System" $BuiltinLocalSystemSID = New-Object System.Security.Principal.SecurityIdentifier 'S-1-5-18' #Local System SID $rule = New-Object System.Security.AccessControl.FileSystemAccessRule($BuiltinLocalSystemSID, 'FullControl', 'ContainerInherit, ObjectInherit', 'None', 'Allow') $acl.AddAccessRule($rule) Set-Acl $Path $acl Write-Verbose -Message "Suceeded setting ACL permissions with PowerShell" } catch { Write-Verbose -Message "Failed to set ACL permissions with PowerShell. Attempting with icacls..." # For windows 2008 R2 + sp1 start-process with -Wait parameter does not work. Hence sleep for 5 sec instead. $osVersion=[Environment]::OSVersion.Version if (($osVersion.Major -eq 6) -and ($osVersion.Minor -eq 1) -and ($osVersion.Build -le 7601)) { $processGrantAdminUserAccess = Start-Process icacls.exe -ArgumentList "$Path /grant *S-1-5-32-544:(OI)(CI)F" -PassThru $processGrantLocalSystemUserAccess = Start-Process icacls.exe -ArgumentList "$Path /grant *S-1-5-18:(OI)(CI)F" -PassThru Start-Sleep -Seconds 5 } else { $processGrantAdminUserAccess = Start-Process icacls.exe -ArgumentList "$Path /grant *S-1-5-32-544:(OI)(CI)F" -PassThru -Wait $processGrantLocalSystemUserAccess = Start-Process icacls.exe -ArgumentList "$Path /grant *S-1-5-18:(OI)(CI)F" -PassThru -Wait } if ($null -eq $processGrantAdminUserAccess) { Write-Error "Failed to start icacls.exe process to set Administrator user permission on $Path." } if ($null -eq $processGrantLocalSystemUserAccess) { Write-Error "Failed to start icacls.exe process to set LocalSystem user permission on $Path." } # on 2008R2 ExitCode is not set. if (($processGrantAdminUserAccess.ExitCode -ne 0) -and ($null -ne $processGrantAdminUserAccess.ExitCode)) { Write-Error "icacls.exe failed to set Administrator user permission on $Path. Exit code: $($processGrantAdminUserAccess.ExitCode)" } if (($processGrantLocalSystemUserAccess.ExitCode -ne 0) -and ($null -ne $processGrantLocalSystemUserAccess.ExitCode)) { Write-Error "icacls.exe failed to set LocalSystem user permission on $Path. Exit code: $($processGrantLocalSystemUserAccess.ExitCode)" } } } <# .SYNOPSIS Start the GC Service. Report Failure if service is not able to start. .Example Start-ServiceInternal #> Function Start-ServiceInternal { [CmdletBinding()] Param( [Parameter()] [string] $ServiceType = "GC" ) Write-Verbose -Message "In Start-ServiceInternal" if ($ServiceType -eq "GC") { $serviceName = $global:GCServiceName } elseif ($ServiceType -eq "GCArc") { $serviceName = $global:GCArcServiceName } elseif ($ServiceType -eq "Extension") { $serviceName = $global:ExtServiceName } # Start GC Timer Service, may be retry on failure. Start-Service $serviceName $serviceObject = Get-Service -Name $serviceName if ($serviceObject.Status -eq 'Running') { Write-Verbose -Message "$serviceName is running." } else { Write-Error "$serviceName can not be started." } } <# .SYNOPSIS Stop the GC service and then uninstall it. .Example Uninstall-ServiceInternal #> Function Uninstall-ServiceInternal { [CmdletBinding()] Param( [Parameter()] [string] $ServiceType = "GC" ) Write-Verbose -Message "In Uninstall-ServiceInternal" if ($ServiceType -eq "GC") { $serviceName = $global:GCServiceName } elseif ($ServiceType -eq "GCArc") { $serviceName = $global:GCArcServiceName } elseif ($ServiceType -eq "Extension") { $serviceName = $global:ExtServiceName } # Unregister GC Service $timeOut = [timespan]::FromMinutes(5) $stopRetry = [DateTime]::Now.Add($timeOut) $secondsBetweenRetry = 3 Stop-Service $serviceName -ErrorAction SilentlyContinue -ErrorVariable stopTimeError if (Get-Service $serviceName -ErrorAction SilentlyContinue) { if (Get-Service -Name $serviceName -ErrorAction SilentlyContinue) { while (((Get-Service -Name $serviceName).Status -ne 'Stopped') -and ([dateTime]::Now -le $stopRetry)) { Write-Verbose "Wait for service to stop" -Verbose Start-Sleep -Seconds $secondsBetweenRetry } } $serviceObject = Get-Service -Name $serviceName if ($serviceObject.Status -eq 'Stopped') { Write-Verbose -Message "$serviceName is stopped." sc.exe delete $serviceName } else { Write-Error "$serviceName can not be Uninstalled because we are not able to stop it." } } else { Write-Verbose "Service already stopped" -Verbose } # some basic validation to check service is Uninstalled. $serviceRegistryExists = Get-ItemProperty hklm:\SYSTEM\CurrentControlSet\Services\$serviceName -ErrorAction SilentlyContinue if ($serviceRegistryExists -ne $null) { # sometimes the registry clean up does not happen right away. Hence do retry for the check. while (($serviceRegistryExists -ne $null) -and ([dateTime]::Now -le $stopRetry)) { Start-Sleep -Seconds $secondsBetweenRetry $serviceRegistryExists = Get-ItemProperty hklm:\SYSTEM\CurrentControlSet\Services\$serviceName -ErrorAction SilentlyContinue } # if service registry entry still exist. if ($serviceRegistryExists -ne $null) { Write-Error "$serviceName is not Uninstalled correctly. Information is Present in Registry Database." } } $getService = Get-Service $serviceName -ErrorAction SilentlyContinue if ($getService -ne $null) { Write-Error "$serviceName is not Uninstalled correctly. Service is reporting status." } } Function CheckServiceExists { [CmdletBinding()] Param( [Parameter()] [string] $ServiceName = $global:GCServiceName ) if (Get-Service $serviceName -ErrorAction SilentlyContinue) { return $true } return $false } function Invoke-ScriptWithRetry { [CmdletBinding()] param( [Parameter(Mandatory = $true, Position = 0)] [ScriptBlock] $Script = {}, [Parameter()] [int] $RetryCount = 3 ) $results = $null $exceptionObject = $null $keepRetrying = $true Write-Verbose "Invoke-ScriptWithRetry:: Start time : $((Get-Date).ToString())" for($i = 0; (($i -lt $RetryCount) -and ($keepRetrying -eq $true)); $i++) { try { $exceptionObject = $null $results = Invoke-Command -ScriptBlock $Script $keepRetrying = $false } catch { Write-Verbose "Retry Count $i" Write-Warning "$_" $exceptionObject = $_ } try { # Processor utilization $processorObj = Get-WmiObject -Class win32_processor -ErrorAction SilentlyContinue if($processorObj -ne $null) { $cpuUsage = ($processorObj | Measure-Object -Property LoadPercentage -Average | Select-Object Average).Average Write-Verbose "CPU Usage : '$($cpuUsage)%'" } # Memory utilization $computerMemory = Get-WmiObject -Class win32_operatingsystem -ErrorAction SilentlyContinue if($computerMemory -ne $null) { $memory = ((($computerMemory.TotalVisibleMemorySize - $computerMemory.FreePhysicalMemory)*100)/ $computerMemory.TotalVisibleMemorySize) Write-Verbose "Memory Usage : '$($memory)%'" } } catch { Write-Warning "Failed to compute Memory/CPU usage. Error : $_" } } Write-Verbose "Invoke-ScriptWithRetry:: End time : $((Get-Date).ToString())" if($exceptionObject -ne $null) { throw $exceptionObject } return $results } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBI071bx7Qv02kc # Weh4vvZKzNcnYWFqPkN3/xZky5fV4aCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMssvOiwDaWmswar3r1SHuBO # B1NIyHWOe9fjKR9gTfsZMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAurqLR9T6TfXUUnbq0D8DlgzSkRKjA5KISDa2f0PwZG+KSm0utU/3cM0s # PZSIBF3ZaxG5wMQwXGiw+IDYGdcuUWpQuemVCZGkB9E6fkiVg1T58GuT2PASswuz # YQ/VDgV9MJdQ/m825LHBDPlFeQjM1vZfFOlphiyJljCFooSKFdhiqAm2VXGU/xDS # 7CSU7W9/BKJxw65rwTy6DKXnZWu4pv3nfjJhfmYspRiV9wwoOI5X4pZRGCEThHH1 # UmTMPx7N1mpCHY7RyZFnaKIFWER1PM41UiS5YvSwgzG1Axa67dvjw73TlR10T7AN # oxkK6BMxpzeFla9lKidN2Lnr22LGYqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDZ40uAzAE4DAso5cMHK4iVkMJ+i5WF6TROLzjWaY9kXAIGZldUeSeo # GBMyMDI0MDYxNzIyMTQzMi40MjJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC # RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis # DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI # ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z # ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR # IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE # lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s # /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4 # aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB # fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT # me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy # qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui # hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds # lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf # sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t # Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU # +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7 # qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6 # Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+ # x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4 # 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5 # ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV # PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4 # y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk # 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG # QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOoa3D0wIhgPMjAyNDA2MTgwMDAxMDFaGA8yMDI0MDYxOTAwMDEwMVowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6hrcPQIBADAHAgEAAgIcpTAHAgEAAgIfhjAKAgUA # 6hwtvQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAA32MtNyryDNDrYWoRWS # NxyHqAPVp6lzFUM8ZNF1Hx1W5OgnqNWT5x7TOP7Bk+ZhMkDC3cC8OSL71CWWNS5J # FA5Tlu9gvpDcMPzlORZg5n6wInIpL/DqVB0F5Y2ZeyzhLtuX8D52Nn69sGzwHkRE # hcWvD77NgI6/UpM5XhHd/2bXMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgr7ludhqp45ktZFVYg8VJY7GDhuZ642MJvGwpyz5z2p8wgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJCI9/ # /zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4pmZ # lfHc4yDrAAEAAAHiMCIEIBLGc26YPCfAJemWXgOvpsFNV884G73fXEwbncimydNH # MA0GCSqGSIb3DQEBCwUABIICACa5XMLfnEwpN8S2j4S3XEvFjhiU/rEjN1fr+k4L # 4pL5su7Vd9FfPzckGlf3nMf/J7CWHl6HR0BOIhBozRgelXwEm7peoBBedUpHG1Zt # ryHBMuI6WEemWH7P6sOrm+LhcIMdmM/igOsAsYsjFcz6H0DEPWcLfW2KkrHQbadB # dPrmbKVNyc6iqgFlH2+wjaOwPbBHa+3SjRuDmZFyqFBCeAh47btQ4lOOzG9+UDc1 # EmsEjsKQOAFpW4tb3V6pJ3FS5eDWpZtBMqTbU4t9cj6o/IlNF0yiAodafA12GDDl # H1gtinhjCoEFmXWbuxw9cgF1VxAauiGuGQEjO3e+WG6syJj6P2/e6JUeaca46PTP # tNlqspI6v7wf/hE+7CMmShc1nA/OkLi2/K83xvY/+0BnPwNyR2sYVk5RDfS7WG1W # EaKc/CS6H7qhH86W5XsNWefPe8vW93ZlB5ZCdJHMhTNk1Eg8ARF7482Tj27h3tQ1 # lFlSp4DllLsS0heQh8+zf4pi/f3G0rWXd7lhMerw9R3xU2GJSfDjTXTuUp5Lwbqc # aXjIAQ5U1hmaB+h/QtF2azhbUl+QJ0ABNzix/jO0IFyOvajz/+IOJDBVfEjWxI0D # sfgGp36VPHwfXKi47tp45QlaaUW8Xkut3oNg8nag7vYjYZNKDkxsRtXiUUbD9LBy # 91Mc # SIG # End signature block
combined_dataset/train/non-malicious/sample_18_70.ps1
sample_18_70.ps1
[CmdletBinding()] param ( [Parameter(Mandatory, ValueFromPipeline, ValueFromPipelineByPropertyName)] [Alias("FullName")] [string]$path, [Parameter()] [int]$GoBack = 0, [Parameter()] [string]$After, [Parameter()] [string]$NewStart="", [Parameter()] [string]$Body = "", [Parameter()] [string]$Sha="" ) $PSModuleAutoLoadingPreference = "ModuleQualified" Function Test-Empty { [CmdletBinding()] [OutputType([boolean])] param ( [Parameter(Mandatory=$true)] [AllowNull()] [AllowEmptyString()] [string]$content ) return [string]::IsNullOrEmpty($content) -or [string]::IsNullOrWhiteSpace($content) } function Get-PatchHistory { [CmdletBinding()] param ( [Parameter(Mandatory, ValueFromPipeline)] [string]$Path, [Parameter()] [string]$After ) process { if (!(Test-Empty $After)) { $fileLog = $(git log -p -U10000 --output-indicator-new=~ --output-indicator-old=^ --reverse "$After..HEAD" -- $path) } else { $fileLog = $(git log -p --output-indicator-new=~ --output-indicator-old=^ --reverse -- $path) } $fileLog = $fileLog -join "`r`n" return $fileLog } } function Get-Matches { param( [Parameter(Mandatory=$true)] $Pattern, [Parameter(ValueFromPipeline=$true)] $InputObject, [Parameter()] [int]$Timeout=$(5 * 60) ) begin { try { $regex = Microsoft.PowerShell.Utility\New-Object Regex($pattern, [System.Text.RegularExpressions.RegexOptions]::None ,[System.TimeSpan]::FromSeconds($Timeout)) } catch { Throw "Get-Matches: Pattern not correct. $_" } $groups = @($regex.GetGroupNames() | Microsoft.PowerShell.Core\Where-Object { ($_ -as [Int32]) -eq $null } | Microsoft.PowerShell.Core\ForEach-Object { $_.toString() }) } process { foreach ($line in $InputObject) { foreach ($match in ($regex.Matches($line))) { if ($groups.Count -eq 0) { ([Object[]]$match.Groups)[-1].Value } else { $rv = 1 | Select-Object -Property $groups $groups | ForEach-Object { $rv.$_ = $match.Groups[$_].Value } $rv } } } } } class IndexedMatch { [string]$Text; [int]$StartIndex; [int]$EndIndex; [int]$Length; IndexedMatch() { } } function ConvertTo-DateTime { [CmdletBinding()] param ( [Parameter(Mandatory, ValueFromPipeline)] [string] $DateTimeString ) process { if ($DateTimeString -match "(?mi)^[A-Z]{3} (?<month>[A-Z]{3}) (?<day>\d+) (?<hour>\d+):(?<minute>\d+):(?<second>\d+) (?<year>\d+)") { return $("$($matches.month) $($matches.day) $($matches.year) $($matches.hour):$($matches.minute):$($matches.second)") } else { return $([DateTime]::Parse("1900/01/01")) } } } function Get-ContentIndexedMatches { [CmdletBinding()] param ( [Parameter()] [string] $Pattern, [Parameter(Mandatory, ValueFromPipeline)] [AllowNull()] [AllowEmptyString()] [string]$InputObject ) process { $startingElement = 1 $keyedMatches = @() try { $options = [System.Text.RegularExpressions.RegexOptions]::IgnoreCase -bor [System.Text.RegularExpressions.RegexOptions]::Multiline $RE = Microsoft.PowerShell.Utility\New-Object Regex -ArgumentList $Pattern, $options [System.Text.RegularExpressions.MatchCollection]$theMatches = [Regex]::Matches($InputObject, $Pattern, $options); foreach ($m in $theMatches) { $match = [IndexedMatch]::New() $match.StartIndex = [int32]$m.Index; $match.Length = [int32]$m.Length; $match.EndIndex = [int32]$m.Index + [int32]$m.Length; for ($counter = $startingElement; $counter -lt $m.Groups.Count; $counter++) { if ($m.Groups[$counter].Success) { $match | Microsoft.PowerShell.Utility\Add-Member -MemberType NoteProperty -Name $RE.GroupNameFromNumber($counter) -Value $m.Groups[$counter].Value -Force } } $match | Microsoft.PowerShell.Utility\Add-Member -MemberType NoteProperty -Name "0" -Value $m.Groups[0].Value -Force $keyedMatches += $match; } } catch { } return @($keyedMatches); } } try { $regexString = "(?mi)^commit[ ][a-z0-9]{40}\r\n^Author:[ ][^\r]+\r\n^Date:[ ]+[^\r]+(\r\n)+([ ]+[\u0020-\u007E]*\r\n)+\r\ndiff[ ]--git[ ][^\r]+\r\n[^-]+---[ ][^\r]+\r\n\+\+\+\s[^\r]+" $commitData_Capture = "(?mi)^commit[ ](?<sha>[a-z0-9]{40})\r\n(^Merge:[^\r]+\r\n)?^Author:[ ](?<author>[^\r]+)\r\n^Date:[ ]+(?<date>[^\r]+)(\r\n)+(?<body>([ ]+[\u0020-\u007E]*(\r\n|\Z))+)(\r\n|\Z)(?<diff>diff[ ]--git[ ][^\r]+\r\n([^-]+---[ ](?<old_filename>[^\r]+)\r\n\+\+\+\s(?<new_filename>[^\r]+))?)?" $patchLine = "(?mi)@@ [-\+]{1}(?<oldLine>\d+),(?<oldCount>\d+) [-\+]{1}(?<newLine>\d+)(,(?<newCount>\d+))?" $changedLine = "(?mi)^(?<changed>[\^~]{1})" $buildMasterList = $false if (!(Test-Empty $After)) { $fileLog = Get-PatchHistory -path $path -After $After $buildMasterList = $true } else { $fileLog = Get-PatchHistory -path $path } $filelog = $filelog -replace "[^\u0020-\u007E\r\n]", "" $commitDatas = $fileLog | Get-Matches $commitData_Capture | ?{!(Test-Empty $_.Diff)} $filelog = $fileLog -replace $commitData_Capture, "~~~~~~" $commits = @(@($fileLog -split "~~~~~~") | Where-Object { !([string]::IsNullOrEmpty($_)) }) $commitMaster = @{} $masterList = @() $addtoMaster = @() $latestMaster = @() $results = @() $LastCommitSha = "" $addtoMaster = @() $removeFromMaster = @() $updateCount = 0 # Need to update index of stuff not in patch data (did it come before (Add lines) or after) ignore for ($l = 0; $l -lt $commits.Count; $l++) { $commitData = $commitDatas[$l] $commit = $commits[$l] while ((Test-Empty $commit)) { $l++ $commitData = $commitDatas[$l] $commit = $commits[$l] } if (Test-Empty $commitData.new_filename) { continue } $updateCount++; $LastCommitSha = $commitData.Sha.Trim(" ") if (!(Test-Empty $Body) -and $commitData.Body -match $Body) { #Microsoft.PowerShell.Utility\Write-Host "BreakHere" } elseif (!(Test-Empty $Sha) -and $commitData.Sha.StartsWith($Sha)) { #Microsoft.PowerShell.Utility\Write-Host "BreakHere" } $currentLine = 0 $oldLine = 0 $lines = $commit -split "\r\n" | Microsoft.PowerShell.Core\Where-Object {$_ -notmatch "(?mi)^\\ No newline at end of file"} | Microsoft.PowerShell.Core\ForEach-Object {"$_`r`n"} if ($buildMasterList) { $buildLines = @($lines | Microsoft.PowerShell.Core\Where-Object {$_ -match "(?mi)^[^~]"}) $breakIt = $false do { $line = $buildLines[0] $buildLines = $buildLines[1..$($buildLines.Count - 1)] if ($line -match $patchLine) { $breakIt = $true } } while (!$breakIt) $buildMasterList = $false for ($i = 0; $i -lt $buildLines.Count;$i++) { $lineNumber = $i + 1 $masterList += [pscustomobject]@{ OldLine = $lineNumber FirstLine = $lineNumber NewLine = $lineNumber Line = $lines[$i] -replace $changedLine, "" Added = $null Removed = $null LastChanged = $null LastChangedDate = $([DateTime]::Parse("1900/01/01")) AddedDate = $([DateTime]::Parse("1900/01/01")) RemovedDate = $([DateTime]::Parse("1900/01/01")) Commit = $null Sha = "" Path = $Path Changes = @() ChangesCount = 0 IsRemoved = $false UpdateType = "LineChange" IndexUpdated = $false }.Clone() } } [System.Collections.ArrayList]$removedLines = @() [System.Collections.ArrayList]$changedLines = @() [System.Collections.ArrayList]$addedLines = @() [System.Collections.ArrayList]$updatedLines = @() $index = 0 $oldIndex = 0 $removedLine = $false $OLDcontentByLines = $oldContent -split "\r\n" $NEWcontentByLines = $newContent -split "\r\n" $tmpHash = @{} if ($l -ge 55) { #Microsoft.PowerShell.Utility\Write-Host "BreakHere" } for ($i = 0; $i -lt $lines.count; $i++) { $lines[$i] = ($lines[$i] -replace "^\s+", "") + "`r`n" $tmpHash = @{ OldLine = $oldLine FirstLine = $oldline OldStart = $oldIndex NewStart = $index Length = $lines[$i].Length NewLine = $currentLine Line = $lines[$i] -replace $changedLine, "" Added = $null Removed = $null LastChanged = $null LastChangedDate = $([DateTime]::Parse("1900/01/01")) AddedDate = $([DateTime]::Parse("1900/01/01")) RemovedDate = $([DateTime]::Parse("1900/01/01")) Commit = [pscustomobject]$commitData Sha = $commitData.Sha Path = $Path Changes = @() ChangesCount = 0 IsRemoved = $false UpdateType = "" IndexUpdated = $false } if ($lines[$i] -match $patchLine) { $ThispatchLine = $lines[$i] $currentLine = [int]$Matches.newLine $oldLine = [int]$Matches.oldLine if ($currentLine -le 0) { $currentLine = 1 } if ($oldline -lt 1) { $oldLine = 0 } $tmpHash.OldLine = $oldLine $tmpHash.OldStart = ($OLDcontentByLines[0..($oldLine - 1)] -join "`r`n").Length + 2 $tmpHash.NewLine = $currentLine $tmpHash.NewStart = ($NEWcontentByLines[0..($currentLine - 1)] -join "`r`n").Length + 2 $index = $tmpHash.NewStart $oldIndex = $tmpHash.OldStart $removedLine = $false continue } if ($lines[$i] -match $changedLine) { $tstLine = $lines[$i] -replace $changedLine, "" if ($Matches.changed -eq "~") { if ($removedLine) { $updatedLines.RemoveAt($updatedLines.Count - 1) > $null $tmpRemovedLine = $removedLines[-1] $removedLines.RemoveAt($removedLines.Count - 1) > $null $removedLine = $false $tmpHash["UpdateType"] = "Changed" $tmpHash.OldLine = $tmpRemovedLine.OldLine $tmpHash.OldStart = $tmpRemovedLine.OldStart $tmpHash.Length = $tmpHash.Length - 1 $tmpHash.Difference = $tmpHash.Length - $tmpRemovedLine.Length $changedLines += [pscustomobject]($tmpHash.Clone()) $updatedLines += [pscustomobject]($tmpHash.Clone()) <#$removeFromMaster | Where-Object { $_.NewLine -eq $tmpHash.OldLine} | ForEach-Object { $_.oldline = $_.Newline $_.newline = $tmpHash.newLine $_.IndexUpdated = $true }#> $oldValue = $removeFromMaster | ?{$tmpHash.NewLine -eq $_.NewLine} if (@($oldValue).Count -gt 1) { if ($lines[$i + 1] -notmatch "(?mi)^~") { $combined = $oldValue $oldValue = $combined[0] $combined[1..$($combined.Count - 1)] | ForEach-Object { $oldValue.line += $_.line } } else { $tmp = $oldValue[0] $tmp.IsRemoved = $false $oldValue | ?{$_.IsRemoved} | %{ $_.NewLine++ } $oldValue = $tmp $removedLine = $true } } if ($null -ne $oldValue) { $tmpitem = $tmpHash.Clone() $tmpItem.LastChanged = [pscustomobject]@{ Commit = $commitData LastChangedDate = $commitData.Date | ConvertTo-DateTime } #$tmpItem.Changes = @($oldValue) + $oldValue.Changes $tmpItem.ChangesCount = $oldValue.ChangesCount + 1 $tmpitem.LastChangedDate = $commitData.Date | ConvertTo-DateTime $tmpitem.AddedDate = $commitData.Date | ConvertTo-DateTime $tmpitem.IndexUpdated = $true $tmpItem.FirstLine = $oldValue.FirstLine $tmpItem.UpdateType = "Changed" $oldValue.Removed = [pscustomobject]@{ Commit = $commitData LastChangedDate = $commitData.Date | ConvertTo-DateTime } $oldValue.IsRemoved = $false $removeFromMaster = @($removeFromMaster | ?{$_.IsRemoved}) $addtoMaster += [pscustomobject]($tmpitem.Clone()) } $masterList | Microsoft.PowerShell.Core\Where-Object {$_.oldline -ge $tmpHash.OldLine} | Microsoft.PowerShell.Core\ForEach-Object { $_.NewLine = $_.NewLine + 1 } } else { $tmpHash["UpdateType"] = "Added" $tmpHash.Length = $tmpHash.Length - 1 $tmpHash.Difference = $tmpHash.Length $addedLines += [pscustomobject]($tmpHash.Clone()) $updatedLines += [pscustomobject]($tmpHash.Clone()) $tmpItem = $tmpHash.Clone() $tmpItem.FirstLine = $tmpItem.NewLine $tmpItem.Added = [pscustomobject]@{ Commit = $commitData LastChangedDate = $commitData.Date | ConvertTo-DateTime } $tmpitem.AddedDate = $commitData.Date | ConvertTo-DateTime $tmpitem.LastChangedDate = $commitData.Date | ConvertTo-DateTime $tmpItem.OldLine = $tmpItem.NewLine $tmpitem.ChangesCount = 1 if ($commitData.old_filename -match "dev/null") { $tmpItem.OldLine = $tmpItem.NewLine } $addtoMaster += [pscustomobject]($tmpItem.Clone()) $masterList | Microsoft.PowerShell.Core\Where-Object {$_.oldline -ge $tmpHash.OldLine} | Microsoft.PowerShell.Core\ForEach-Object { $_.NewLine = $_.NewLine + 1 } } $index += $lines[$i].length - 1 $currentLine++; } elseif ($matches.Changed = "^") { $removedLine = $true $tmpHash.Length = $tmpHash.Length - 1 $tmpHash["UpdateType"] = "Removed" $tmpHash.Difference = 0 - $tmpHash.Length $removedLines += [pscustomobject]($tmpHash.Clone()) $updatedLines += [pscustomobject]($tmpHash.Clone()) $oldValue = $masterList | ?{$tmpHash.NewLine -eq $_.NewLine -and !$_.IndexUpdated} if ($null -ne $oldValue) { $oldValue.IsRemoved = $true $oldValue.Removed = [pscustomobject]@{ Commit = $commitData LastChangedDate = $commitData.Date | ConvertTo-DateTime } $oldValue.RemovedDate = $commitData.Date | ConvertTo-DateTime $oldValue.LastChangedDate = $commitData.Date | ConvertTo-DateTime $masterList = $masterList | ?{!$_.IsRemoved} $removeFromMaster += $oldValue } $oldLine++ $oldIndex += $lines[$i].length - 1 $masterList | Microsoft.PowerShell.Core\Where-Object {$_.oldline -ge $tmpHash.OldLine} | Microsoft.PowerShell.Core\ForEach-Object { $_.NewLine = $_.NewLine -1 } } } else { $currentLine++;$oldLine++; $removedLine = $false $index += $lines[$i].length $oldIndex += $lines[$i].length } if (!(Test-Empty $NewStart)) { $masterList | Microsoft.PowerShell.Core\Where-Object {"$($_.NewStart)" -eq $NewStart} | Microsoft.PowerShell.Core\ForEach-Object { # Write-Host "[$($_.oldline), $($_.newline)]: $($_.line)" } } } $indexes = $indexes | Microsoft.PowerShell.Utility\Get-Unique if ($addtoMaster.Count -gt 0) { $masterList = @($masterList) + $addtoMaster } $addtoMaster = @() $removeFromMaster = @() if ($masterList.Count -gt 0) { $masterList | Microsoft.PowerShell.Core\ForEach-Object { $_.OldLine = $_.NewLine $_.IndexUpdated = $false } } Write-Verbose "$($commitData.Body)" $masterlist | sort newline | %{ Write-Verbose "[$($_.oldline), $($_.newline)]: $($_.line)"} $commitMaster[$commitData.sha] = @($masterList | Microsoft.PowerShell.Core\Where-Object {$_.Sha -eq $commitData.Commit}).Clone() $latestMaster = @($masterList).Clone() } if (@($masterList).Count -gt 0 -and @($commitDatas).Count -gt 0) { $updates = @($latestMaster | Microsoft.PowerShell.Core\Where-Object {!(Test-Empty $_.Sha)}) $updates += $latestMaster | Microsoft.PowerShell.Core\Where-Object {(Test-Empty $_.Sha)} | Microsoft.PowerShell.Core\ForEach-Object { [pscustomobject]@{ FirstLine = $_.FirstLine NewLine = $_.NewLine UpdateType = "LineChange" } } return [pscustomobject]@{ LatestContent = $masterlist | Microsoft.PowerShell.Utility\Sort-Object newline | %{ "[$($_.oldline), $($_.newline)]: $($_.line)"} LatestMasterList = @($latestMaster).Clone() LastCommitSha = $LastCommitSha Updates = @($updates).Clone() CreatedDate = $commitDatas[0].Date | ConvertTo-DateTime LastTouchedDate = $commitDatas[-1].Date | ConvertTo-DateTime UpdateCount = $updateCount } | Microsoft.PowerShell.Utility\ConvertTo-Json -Depth 20 } } catch { $_.InvocationInfo Microsoft.PowerShell.Core\Get-Command ConvertTo-DateTime | Microsoft.PowerShell.Utility\Select-Object * } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDSA/8T3jl54Llx # eahkSdB4ah03HDnAjN41t7KLAPcuLKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILpaVXGEXmI3RkDo7bDRzufU # oPpk3EiUR+DrCccMh1R4MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEASASKmK6afQgFQOLMU2r1dlbc+hiTTLwxuNodAfIxCqdtP6M7K+9mDnfG # 7jPoGd1ARh7deSbYym7KgzFq4+jDt89x5pO7dr5blRgVU+gWhnVjFyQUMVrw41MJ # 2ScX6j3UwfVlBIfOT8WqSDc02/hDSOEuSoewfkYq5rre3YnJyT5/yLClZxcAZ0b0 # 4H4Mgx28Odf5Jj0Bj9ZpOU7pkG21KShTyiuzda360ZgwqjXfS9WipjhHwPmaEbm5 # avQrsthew2LeQ+zDjEG2laPDCkc1q/VXURA4fX3fXLHZfgOphua1EpXtzUXNSSWE # 0/cgXPb23aOeik2fNO2n/h0R5NVFP6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCB3MSom8NyAatu2XFO+oT7aavxzzpq18QVW/Kn0hu+F6wIGZdXkCF/q # GBMyMDI0MDIyMjE4NTc0My45NjVaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOmBs84wIhgPMjAyNDAyMjIxOTUxNDJaGA8yMDI0MDIyMzE5NTE0MlowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6YGzzgIBADAHAgEAAgIErTAHAgEAAgITiTAKAgUA # 6YMFTgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAHwVFIs1ZfXu7OMdCbi1 # IIaSs555U7ja7EWL/txU+pat/qCtyWa45ux+Qpv/3voMiuYNmXr3fsezJox1HY8a # qj2Hnq1AN2Ih8rTLXTVwoIqJ8cMaDyH6vlx8aDsgI3TUVOfbLqS0GYGkIY/87i1A # eqyat0I7FXuEKRe+NdZRpUiJMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgsNnMAildlqMlHCxGvM+/adUl+nfmXBNbqiQHoeobCWowgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9 # xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V # yVoA0RGxAAEAAAHaMCIEIGemrmcMhTTe1YlezFljCXK+EtFr+kEk/Drx3w5X8/sx # MA0GCSqGSIb3DQEBCwUABIICAFyZFVdNMlZD66MvRUrxL6NlPXIB+sMuE6aRtw8T # hwc0ltq9xztI2IoMjfCk45/cEMdDMhFVHi03qvavBi1BVTMYPuBw9Z59RurHQ8tj # l5dUEd8iXy0DQ4YZwILjbcsoqXLrWQLrSjb7pgSesJY0G745lDVaz7ZgzJWy1+QI # 4e+4ILbU/EVd9i7xobhnd6q7jlEwdr/w/pjd8RIEaC31xj9X+0CsEYWQzzV/QYF6 # 4O/jkmjUARdr/4jGwLJRHNnL/3cLpeRiXrWnA8b+IGW9bH7gs59EvVnJi9On8JBt # J70LRS5xGGN2NZqAON8PG9LXr/+fHc379JfiF/QOBgOH1m3bSV9sMm7DaXPhol28 # gJLUhSH8re+bK8qkjFUNJXd9fq2+USgQxWa1V2i/Fmim3XltCNQgTeGFJEDcvwFk # JV8Hnz35yM5yWnf8d90nlnTS1gAtig6c8jXnPWLuaC5EAu9Q+JMUDS+NvbpkT+/b # yYzqei727/dW2Fg7aC5EkyS50InczMPzh4ibxgo2ySHfshwM645hVkGZDzsJS6oh # JJuf2D3sOXvI8yQmWZVE0S41BsYVCKnnvrAeyaeObL/51kuy+Q7YPs9advSHspo8 # NWEKeCUtyRYFy+fwyMOn239FZ0z4CLwdxOniTUTAfhXIbAZaZ+GqeMoZJPCPSYv9 # /rTh # SIG # End signature block
combined_dataset/train/non-malicious/Get-Exchange-Mail.ps1
Get-Exchange-Mail.ps1
[Reflection.Assembly]::LoadFile("C:\\Program Files\\Microsoft\\Exchange\\Web Services\\1.1\\Microsoft.Exchange.WebServices.dll") | Out-Null $s = New-Object Microsoft.Exchange.WebServices.Data.ExchangeService([Microsoft.Exchange.WebServices.Data.ExchangeVersion]::Exchange2007_SP1) $s.Credentials = New-Object Net.NetworkCredential('email@domain', 'password') $s.Url = new-object Uri("https://red001.mail.microsoftonline.com/ews/exchange.asmx") $inbox = [Microsoft.Exchange.WebServices.Data.Folder]::Bind($s,[Microsoft.Exchange.WebServices.Data.WellKnownFolderName]::Inbox) $mails = $inbox.FindItems(5) $mails | % {$_.Load()} $mails
combined_dataset/train/non-malicious/sample_2_65.ps1
sample_2_65.ps1
#************************************************ # TS_TCPIPSettingsCheck.ps1 # Version 1.0.1 # Date: 03-27-2011 # Author: v-anecho # Description: Checks if a Kyocera print driver is installed then checks if KB982728 is installed #************************************************ Import-LocalizedData -BindingVariable PrinterCheck Display-DefaultActivity -Rule -RuleNumber 2387 $RootCauseDetected = $false $RootCauseName = "RC_PrinterKB982728Check" #Rule ID 1449 #----------- # http://sharepoint/sites/rules/Rule%20Submissions/Forms/DispForm.aspx?ID=1449 # #Description #----------- # This issue occurs because, after the printer is installed, Windows 7 or Windows Server 2008 R2 incorrectly looks for the Mscms.dll file in a subfolder different than the windows\system32 subfolder. # #Related KB #---------- # 982728 # #Script Author #------------- # anecho #******************** #Data gathering #******************** if(($OSVersion.Build) -eq 7600) { $InformationCollected = new-object PSObject $HasIssue = $false $System32Folder = Join-Path $env:windir "System32" Function Search-RegKeyValue() { # <# # .SYNOPSIS # Searches a specific value from the selected key # .DESCRIPTION # Uses Get-Child Item to pull the value out of the key path # .NOTES # .LINK # .EXAMPLE # .OUTPUTS # PSObject # .PARAMETER file # #> $keyPath = "HKLM:\SYSTEM\CurrentControlSet\Control\Print\Environments" $isKyoceraPresent = @() $isKyoceraPresent = Get-ChildItem $keyPath -Recurse -ErrorAction SilentlyContinue | Where-Object {$_.Name -match "Kyocera"} if(($isKyoceraPresent.count -gt 0)) { return $true } else { return $false } } Function OSandHotfixInstalled { # <# # .SYNOPSIS # Checks to see if hotfix is installed and if the system is the right OS # .DESCRIPTION # Uses CheckMinimalFileVersion to check the version number of the hotfix files and checks the OS # .NOTES # .LINK # .EXAMPLE # .OUTPUTS # Boolean value: [true] if the hotfix is present, [false] if it is not # .PARAMETER file # #> #Now we need to check for the binaries specified @ KB982728 if ((CheckMinimalFileVersion "$System32Folder\Localspl.dll" 6 1 7600 20707) -and (CheckMinimalFileVersion "$System32Folder\Winprint.dll" 6 1 7600 16385)) { return $true } else { return $false } } #******************** #Detection Logic #******************** $KyoceraRegKey = Search-RegKeyValue if ((-not(OSandHotfixInstalled)) -and ($KyoceraRegKey)) { $HasIssue = $true } #******************** #Alert Evaluation #******************** if($HasIssue) { #Localspl file version $LocalsplVersion = Get-FileVersionString("$System32Folder\Localspl.dll") add-member -inputobject $InformationCollected -membertype noteproperty -name "Localspl.dll current version" -value $LocalsplVersion add-member -inputobject $InformationCollected -membertype noteproperty -name "Localspl.dll required version" -value "6.1.7600.20707" Update-DiagRootCause -id $RootCauseName -Detected $true Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL "http://support.microsoft.com/kb/982728" -Verbosity "Error" -InformationCollected $InformationCollected -Visibility 4 -SupportTopicsID 8060 -MessageVersion 2 -SolutionTitle $PrinterCheck.ID_PrinterKB982728CheckRT } else { if((($OSVersion.Build) -eq 7600) -and ($KyoceraRegKey)) { Update-DiagRootCause -id $RootCauseName -Detected $false } } } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCADYppW+Xokdyqp # gRFF5812E4ZRVQVSYBGLG9VGHySvA6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILkxMWKh95smeQ+WHmBgFLl9 # 03R65FF76wWyRfKD6wmoMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAUo51fgLnp6goDdMWjJwJCETduBNuXLmxY3NOeeUrqfkGiV6xa7Y4WSNV # 3pRmTvprhSbIwu5dcsGTSth6XHW2VkIY+Q32oJEh4FnIFAQHm0fsxp/fBeLPpfcC # eRVeRsZJULAJLM4cGmi53Scs0yE34fYXF6QyaylD0Ttr2oQn7rUUm6sL+SmqoQfF # n4qnnQm23siRVD3PPsxMfq3HxI96spm9/gJXHDJMVaQeujHEKgYoEtvRenmXUIWU # kP03kWVRA7/gOTDa2mqacC7EN0XSZ/kmYTqowpkcoNQ+VF1IDz1CSYqp0Jx60HXd # pDNNZLbRqmWJEMf4j1N68DbcofFXtqGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAlc+K/HGaeLjBaSmnYdZKk6XtqS8ihS+faXhatDEIYnAIGZxp9zsnm # GBMyMDI0MTAyODExNDAzOC4zMjFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2 # MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfX # hlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjH # tivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQ # SmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56x # YPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhb # w+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvni # P7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+s # yO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E4 # 1j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA # 7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj # 8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+X # xwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w6 # 1FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4 # Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEB # PJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRAB # TUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxe # wCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1r # gReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3 # ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QT # STtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRi # KsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8 # nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCAL # t0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu # +gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smZTzAiGA8yMDI0MTAyODA1MDIw # N1oYDzIwMjQxMDI5MDUwMjA3WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqyZlP # AgEAMAoCAQACAgMdAgH/MAcCAQACAhM2MAoCBQDqyurPAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAKdpPIdnmDurw1W3KjddEyaQMnw+EyRSLq+zprTP8t/0 # ieGI79w2e6dpTuLIeBbTED1C/5vFaZhn3mit4LVJEIdMu9b2d8cWo3hrWDMqssZA # AGH3NNXRuQwPBIwzaTXVg8edpOImVomm0IlTA6TpSFjiSAij1Vxwohz3Men9w/M4 # fV0H5QtmVhWsq9bthffWvfyFz7mf6eSXX6VsSUsp/U8wwe3Z+xy/ccjeORHi3Um6 # IgANr2SLaO4c8JKNi9YyCO450ksm8NLZx2wEh8rG5dOylqGX8SZTVNxQg8uGM0FR # AEmTVQHT+Dvp3RsLMVX2f+49GvWR4VL26Voga63vAFkxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfPFCkOuA8wdMQABAAAB # 8zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCCuVdH/k1RiiA6uxQYemmz6ngjgmxav1l1PIGwNC+gz # XjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi82TSLtuG4Vkp8wBmJk/T+ # RAh841sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQg9GCVSbXiruUvANYshaHmkS8a # AUtp4TeTu/csllVDepIwDQYJKoZIhvcNAQELBQAEggIATYWe9AJyjcPwoqgF/oqB # 23DoVZYY0N+QvINXghigo6m84EZEol4TGReQNecVDz27t3yNL8xU/mbUmQLHaNeh # gtLWwTN4tPp1nUELRXBYFbXupaH/KIpvgsrIT/+TBwSTtruqGbkz3YdmPsOS11aj # 57Dk40iy9+NpWvGsr4gouA/J5kOmB7c/DfGA1yWndq0yuo4/lqnILQgYuYBvkJ3Q # DAkqKe0O5OCjKyYi+m3ZMOYvuNPdGhQIlaEuQiAzXqiNq9tQsOtImkfkZgUaLGL9 # U1VtvBbkC3Bjcozo6bItGL3xDDHnrEo95LIbLQu56RSyQJz71nBnwlZrSXoik8dr # pHmMrGvN5Gn1oHu/DsUU5g+wq2OCHed2TbTKFUUbOT7Vf0u/EQDoyhcmIy91RBBG # skxkRi3yAdW/Ld5QlRGwkvkx9JAMIh4URHEHPhRzgwUvtubxx3t9mcP4BA4u12OE # Of9CHTif6Udf4F8LeehwUECY42y2Z7Dt5vlAsKqw1f6IX8j6599G7pwhDnx7ReRc # lh7bNbNQtpgEFUqWg8MOIrZmWaikfYqG5gPgno797HdITo7rlgNdhRyKWq9yuqtl # bVXga0+z2+WXTo5ejwDkrkqZlaR7zx7k1G7RWQI9uobyGHEMmaVxiV5Fc5GhTcxV # KGltW/sg+3SEHTXD3NmsB7M= # SIG # End signature block
combined_dataset/train/non-malicious/sample_1_66.ps1
sample_1_66.ps1
[dynamic, provider("dcismprovider"), Description( "DCIM_AlertIndication is a derivation of " "CIM_ProcessIndication.")] class DCIM_AlertIndication : CIM_AlertIndication { [Description ("The time at which indication is generated")] datetime IndicationTime; [Description ("Description of the Lifecycle job")] string Description; [Description ("The type of the alert")] uint16 AlertType; [Description ("A string describing the Alert type - used when the AlertType " "property is set to 1, \"Other State Change\"." )] string OtherAlertType; [Description ("The severity of the indication ")] uint16 PerceivedSeverity; [Description ("Category of event ")] string Category; [Description ("Category of event ")] string SubCategory; [Description ("The severity of the indication ")] uint16 Severity; [Description ("The system service tag ")] string SystemServicetag; [Description ("The system FQDN ")] string SystemFQDN; [Description ("The Fully qualified domain name ")] string FQDD; //[Description ("The Event ID")] // uint32 EventID; [Description ("The alert message string")] string Message; [Description ("The alert message ID string")] string MessageID; [Description ("The message arguments of the event")] string MessageArguments[]; uint16 AlertingElementFormat; string OtherAlertingElementFormat; string AlertingManagedElement; string OwningEntity; uint16 ProbableCause; string SystemName; }; /* SIG # Begin signature block */ /* MIItDQYJKoZIhvcNAQcCoIIs/jCCLPoCAQExDzANBglghkgBZQMEAgEFADB5Bgor */ /* BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG */ /* KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCgDhqNflecliUM */ /* juhT1XNjdy9FZDx0baLdjzh7x+xd8qCCEmMwggXfMIIEx6ADAgECAhBOQOQ3VO3m */ /* jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE */ /* ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s */ /* ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv */ /* ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy */ /* dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx */ /* MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu */ /* MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp */ /* b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK */ /* AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq */ /* gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l */ /* OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr */ /* +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d */ /* vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 */ /* HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn */ /* DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig */ /* nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z */ /* HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK */ /* Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u */ /* DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC */ /* AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw */ /* FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG */ /* AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn */ /* MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp */ /* MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O */ /* BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp */ /* UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 */ /* BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ */ /* LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv */ /* 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF */ /* VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX */ /* bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG */ /* CDCCA/CgAwIBAgIQBu9mzEaGqLK0hNoZKy1rYTANBgkqhkiG9w0BAQ0FADBPMQsw */ /* CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 */ /* cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yNDA0MTkwOTE2MDlaFw0y */ /* NTA1MTIwOTE2MDhaMIGEMQswCQYDVQQGEwJVUzEOMAwGA1UECBMFVGV4YXMxEzAR */ /* BgNVBAcTClJvdW5kIFJvY2sxEjAQBgNVBAoTCURlbGwgSW5jLjEoMCYGA1UECxMf */ /* U2VydmVyIFN5c3RlbXMgTWdtdCBFbmdpbmVlcmluZzESMBAGA1UEAxMJRGVsbCBJ */ /* bmMuMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAvFatHoJS1lbvBD4U */ /* x/jt6hrhOHlGpntV/TPJbKwAdvG6SCT6MfdFasEGShyzypfx8adv3v+sFWo84yYB */ /* GqnqH/Kkj48BTKNREXjN3x/jLZrv+rVRQJYG79us7u3vQVSBX0ds0Jcd9f7u2REE */ /* aLBKrd7ZwxmsHoiAaqKYBm8nMo4kmH4xOw6cOXxUW6mkYxNQxn60nxV5A2ZJvUKn */ /* YvanuULo5jGrl+t2A5jInOLyxSmNU62DdLbyhtE3B6cEhe5yQ54hi7d6c5IM2fNH */ /* FNrQkRavAWUyAxPPBpTSsR0g/IkNymbNPCTjgvDQOIJBcMp0C+q158RIBiE+IMwq */ /* QGi7aUvUUhzTQG9NcSDQan3hMmYfevU3RLQMw4OcoGIT/jOSYmgtcLHiB6lnOG/h */ /* iJ8EsQgW1s2yJ7vG2Fo/IHvQjbfFxefO+gluw4UjcLZgIqACIlFNYGaq4rzKtTeF */ /* 1NNy6DjjbJV2nt/JlD68YlFg0pU9rGDKglZFWvfWiLId8IJnAgMBAAGjggEoMIIB */ /* JDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRFrXrMchlvXUnwqKV0rQOPRSgzqzAf */ /* BgNVHSMEGDAWgBTvn7p5sHPyJR54nANSnBtThN6N7TBnBggrBgEFBQcBAQRbMFkw */ /* IwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAC */ /* hiZodHRwOi8vYWlhLmVudHJ1c3QubmV0L292Y3MyLWNoYWluLnA3YzAxBgNVHR8E */ /* KjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L292Y3MyLmNybDAOBgNV */ /* HQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwEwYDVR0gBAwwCjAIBgZn */ /* gQwBBAEwDQYJKoZIhvcNAQENBQADggIBACoeAWs2aV9gf+TF4AGOKc454/E55mVR */ /* Yz42M1ksqASl2j+ulObFIWcuy/paLjWhMSulehEA8Zb+YQ89fR6Y0TgJ0Eh09aK5 */ /* +GARB7q/+a+gRIw7nfrwmjMkXAwL+9lmbc1X64fEUuKY2NVdksjKC7xRKNMb5i50 */ /* NQyVN9neCJKIVSQDiBMXGgtDkAqPe1sH7/NGGQZKCXhIg3f3caq7dr/mZoiVAIOB */ /* XtHr++65DqG61aWyZV5tCfzSvXFvLpL0dbu14gH6gEo5Zvlp226Vk+HKr/cQ2Ynj */ /* /xXw/5UWHvmKwDOAkA/ld64jA4m466aoP2tKse8z1kSa/zw1wRSp0bwPn23gj2IO */ /* NmEG9dM9Lv3c5FH+oBKNuqJ2Vj5viCHVZEcw40UDQqdfboVK+Y1XSkNfa1CUjzCu */ /* Q2J3XMrfVK9ZCecopoCAXzYem7e/G/Md3rTQky2PTf7Z1hgYlqxisPoGEV3nguIg */ /* ooMbBkHbl/4iWAB237woZFlX0imdO5se7el67/nx58CSLYjNmj82Y4cthnFOrwP4 */ /* mUW7zVXlq9sZP9fCcrdrNMUF4KYS2x7/IIgHURKvOTjyT6f+ZRedEfwOlM1D12/l */ /* eL1OX+dPZq5BGGHal3r1xbLdLxHUlMg+IJJk0wmMwmSF3kzbqbMUTaM1FX9x0+E8 */ /* 4YVlsJB1ttLHMIIGcDCCBFigAwIBAgIQce9VdK81VMNaLGn2b0trzTANBgkqhkiG */ /* 9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFC */ /* MEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9u */ /* IEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjA0NVoXDTQwMTIyOTIzNTkw */ /* MFowTzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNV */ /* BAMTH0VudHJ1c3QgQ29kZSBTaWduaW5nIENBIC0gT1ZDUzIwggIiMA0GCSqGSIb3 */ /* DQEBAQUAA4ICDwAwggIKAoICAQCemXYXGp5WFwhjLJNNg2GEMzQCttlioN7CDrkg */ /* TMhXnQ/dVFsNDNYB3S9I4ZEJ4dvIFQSCtnvw2NYwOxlxcPuoppf2KV2kDKn0Uz5X */ /* 2wxObvx2218k6apfQ+OT5w7PyiW8xEwwC1oP5gb05W4MmWZYT4NhwnN8XCJvAUXF */ /* D/dAT2RL0BcKqQ4eAi+hj0zyZ1DbPuSfwk8/dOsxpNCU0Jm8MJIJasskzaLYdlLQ */ /* TnWYT2Ra0l6D9FjAXWp1xNg/ZDqLFA3YduHquWvnEXBJEThjE27xxvq9EEU1B+Z2 */ /* FdB1FqrCQ1f+q/5jc0YioLjz5MdwRgn5qTdBmrNLbB9wcqMH9jWSdBFkbvkC1cCS */ /* lfGXWX4N7qIl8nFVuJuNv83urt37DOeuMk5QjaHf0XO/wc5/ddqrv9CtgjjF54jt */ /* om06hhG317DhqIs7DEEXml/kW5jInQCf93PSw+mfBYd5IYPWC+3RzAif4PHFyVi6 */ /* U1/Uh7GLWajSXs1p0D76xDkJr7S17ec8+iKH1nP5F5Vqwxz1VXhf1PoLwFs/jHgV */ /* DlpMOm7lJpjQJ8wg38CGO3qNZUZ+2WFeqfSuPtT8r0XHOrOFBEqLyAlds3sCKFnj */ /* hn2AolhAZmLgOFWDq58pQSa6u+nYZPi2uyhzzRVK155z42ZMsVGdgSOLyIZ3srYs */ /* NyJwIQIDAQABo4IBLDCCASgwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU */ /* 75+6ebBz8iUeeJwDUpwbU4Teje0wHwYDVR0jBBgwFoAUgrrWPZfOn89x6JI3r/2z */ /* tWk1V88wMwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5l */ /* bnRydXN0Lm5ldDAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3Qu */ /* bmV0L2NzYnIxLmNybDAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUH */ /* AwMwRQYDVR0gBD4wPDAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cu */ /* ZW50cnVzdC5uZXQvcnBhMAgGBmeBDAEEATANBgkqhkiG9w0BAQ0FAAOCAgEAXvOG */ /* mTXBee7wEK/XkkPShdBb4Jig4HFRyRTLUJpgDrAEJkmxz+m6mwih2kNd1G8jorn4 */ /* QMdH/k0BC0iQP8jcarQ+UzUovkBKR4VqHndAzIB/YbQ8T3mo5qOmoH5EhnG/EhuV */ /* gXL3DaXQ3mefxqK48Wr5/P50ZsZk5nk9agNhTksfzCBiywIY7GPtfnE/lroLXmgi */ /* Z+wfwNIFFmaxsqTq/MWVo40SpfWN7xsgzZn35zLzWXEf3ZTmeeVSIxBWKvxZOL+/ */ /* eSWSasf9q2d3cbEEfTWtFME+qPwjF1YIGHzXeiJrkWrMNUVtTzudQ50FuJ3z/DQh */ /* XAQYMlc4NMHKgyNGpogjIcZ+FICrse+7C6wJP+5TkTGz4lREqrV9MDwsI5zoP6NY */ /* 6kAIF6MgX3rADNuq/wMWAw10ZCKalF4wNXYT9dPh4+AHytnqRYhGnFTVEOLzMglA */ /* tudcFzL+zK/rbc9gPHXz7lxgQFUbtVmvciNoTZx0BAwQya9QW6cNZg+W5ZqV4CCi */ /* GtCw7jhJnipnnpGWbJjbxBBtYHwebkjntn6vMwcSce+9lTu+qYPUQn23pzTXX4aR */ /* ta9WWNpVfRe927zNZEEVjTFRBk+0LrKLPZzzTeNYA1TMrIj4UjxOS0YJJRn/Feen */ /* mEYufbrq4+N8//m5GZW+drkNebICURpKyJ+IwkMxghoAMIIZ/AIBATBjME8xCzAJ */ /* BgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQDEx9FbnRy */ /* dXN0IENvZGUgU2lnbmluZyBDQSAtIE9WQ1MyAhAG72bMRoaosrSE2hkrLWthMA0G */ /* CWCGSAFlAwQCAQUAoIGsMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG */ /* AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCBebjB4ClL3 */ /* Mh5OySA9t03R0wrqM2m/JaYPejKARhISmjBABgorBgEEAYI3AgEMMTIwMKAWgBQA */ /* RABlAGwAbAAsACAASQBuAGMALqEWgBRodHRwOi8vd3d3LmRlbGwuY29tIDANBgkq */ /* hkiG9w0BAQEFAASCAYCVF/OI8ZdQ88LDIiIDU7l2uog6h7dXpJpsJ1Bau7neddvz */ /* 0fU00RpEP//nvNmAgHKYO2fd6G+NfcXJJZHN4Rfis8Fvbv66ZaZaas6A+ugA8DCK */ /* T65E2OX3rwZU9YZh2Ejgj9p0fLAGn78IfTJu6/A1PI2DS43N8sktT+Is8gfwa8uX */ /* KI9cV9v2xhpmJOKvur1RqA/tcRxKSDEAqKJCCbvT+LhZPcXgS+yWJSWKLz/+dawI */ /* g32UVcve3apamZsvrLSLY2L4kQgmZMMZ0Cy4S4SuPE0SFV9TlxbvlmgSMwgb81KN */ /* WtWjmhJF52eP2ko7cGMH14cW5EG06afQ7tgHDG1U69lpimMt2qtgopW0SkD8DjxY */ /* 0nDt5C3NZIXRGXfGOzdEgJ0Xl0I8pGJmYQJpqYLDcmr7XdheEhzQIEkaI3IX8t8s */ /* dKamZLK0kc+YhDdqkKMay+7JAQAfl1O7Ik0JloouPiaaA+FokU8crFPtGpluYxha */ /* sltACJ+aWITXX7jV7W2hghc/MIIXOwYKKwYBBAGCNwMDATGCFyswghcnBgkqhkiG */ /* 9w0BBwKgghcYMIIXFAIBAzEPMA0GCWCGSAFlAwQCAQUAMHcGCyqGSIb3DQEJEAEE */ /* oGgEZjBkAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgL4npSoywXVDT */ /* 4OZ87iwKzWCc1OZqfFwAngaBjzhRsdcCEBm4ljmUNhFqLXKG8oiL5CYYDzIwMjQw */ /* OTIwMDcwMDIxWqCCEwkwggbCMIIEqqADAgECAhAFRK/zlJ0IOaa/2z9f5WEWMA0G */ /* CSqGSIb3DQEBCwUAMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg */ /* SW5jLjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1 */ /* NiBUaW1lU3RhbXBpbmcgQ0EwHhcNMjMwNzE0MDAwMDAwWhcNMzQxMDEzMjM1OTU5 */ /* WjBIMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xIDAeBgNV */ /* BAMTF0RpZ2lDZXJ0IFRpbWVzdGFtcCAyMDIzMIICIjANBgkqhkiG9w0BAQEFAAOC */ /* Ag8AMIICCgKCAgEAo1NFhx2DjlusPlSzI+DPn9fl0uddoQ4J3C9Io5d6OyqcZ9xi */ /* FVjBqZMRp82qsmrdECmKHmJjadNYnDVxvzqX65RQjxwg6seaOy+WZuNp52n+W8PW */ /* KyAcwZeUtKVQgfLPywemMGjKg0La/H8JJJSkghraarrYO8pd3hkYhftF6g1hbJ3+ */ /* cV7EBpo88MUueQ8bZlLjyNY+X9pD04T10Mf2SC1eRXWWdf7dEKEbg8G45lKVtUfX */ /* eCk5a+B4WZfjRCtK1ZXO7wgX6oJkTf8j48qG7rSkIWRw69XloNpjsy7pBe6q9iT1 */ /* HbybHLK3X9/w7nZ9MZllR1WdSiQvrCuXvp/k/XtzPjLuUjT71Lvr1KAsNJvj3m5k */ /* GQc3AZEPHLVRzapMZoOIaGK7vEEbeBlt5NkP4FhB+9ixLOFRr7StFQYU6mIIE9Np */ /* HnxkTZ0P387RXoyqq1AVybPKvNfEO2hEo6U7Qv1zfe7dCv95NBB+plwKWEwAPoVp */ /* dceDZNZ1zY8SdlalJPrXxGshuugfNJgvOuprAbD3+yqG7HtSOKmYCaFxsmxxrz64 */ /* b5bV4RAT/mFHCoz+8LbH1cfebCTwv0KCyqBxPZySkwS0aXAnDU+3tTbRyV8IpHCj */ /* 7ArxES5k4MsiK8rxKBMhSVF+BmbTO77665E42FEHypS34lCh8zrTioPLQHsCAwEA */ /* AaOCAYswggGHMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB */ /* /wQMMAoGCCsGAQUFBwMIMCAGA1UdIAQZMBcwCAYGZ4EMAQQCMAsGCWCGSAGG/WwH */ /* ATAfBgNVHSMEGDAWgBS6FtltTYUvcyl2mi91jGogj57IbzAdBgNVHQ4EFgQUpbbv */ /* E+fvzdBkodVWqWUxo97V40kwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDovL2NybDMu */ /* ZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVT */ /* dGFtcGluZ0NBLmNybDCBkAYIKwYBBQUHAQEEgYMwgYAwJAYIKwYBBQUHMAGGGGh0 */ /* dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBYBggrBgEFBQcwAoZMaHR0cDovL2NhY2Vy */ /* dHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRp */ /* bWVTdGFtcGluZ0NBLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAgRrW3qCptZgXvHCN */ /* T4o8aJzYJf/LLOTN6l0ikuyMIgKpuM+AqNnn48XtJoKKcS8Y3U623mzX4WCcK+3t */ /* PUiOuGu6fF29wmE3aEl3o+uQqhLXJ4Xzjh6S2sJAOJ9dyKAuJXglnSoFeoQpmLZX */ /* eY/bJlYrsPOnvTcM2Jh2T1a5UsK2nTipgedtQVyMadG5K8TGe8+c+njikxp2oml1 */ /* 01DkRBK+IA2eqUTQ+OVJdwhaIcW0z5iVGlS6ubzBaRm6zxbygzc0brBBJt3eWpdP */ /* M43UjXd9dUWhpVgmagNF3tlQtVCMr1a9TMXhRsUo063nQwBw3syYnhmJA+rUkTfv */ /* TVLzyWAhxFZH7doRS4wyw4jmWOK22z75X7BC1o/jF5HRqsBV44a/rCcsQdCaM0qo */ /* NtS5cpZ+l3k4SF/Kwtw9Mt911jZnWon49qfH5U81PAC9vpwqbHkB3NpE5jreODsH */ /* XjlY9HxzMVWggBHLFAx+rrz+pOt5Zapo1iLKO+uagjVXKBbLafIymrLS2Dq4sUaG */ /* a7oX/cR3bBVsrquvczroSUa31X/MtjjA2Owc9bahuEMs305MfR5ocMB3CtQC4Fxg */ /* uyj/OOVSWtasFyIjTvTs0xf7UGv/B3cfcZdEQcm4RtNsMnxYL2dHZeUbc7aZ+Wss */ /* BkbvQR7w8F/g29mtkIBEr4AQQYowggauMIIElqADAgECAhAHNje3JFR82Ees/Shm */ /* Kl5bMA0GCSqGSIb3DQEBCwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdp */ /* Q2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERp */ /* Z2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMjAzMjMwMDAwMDBaFw0zNzAzMjIy */ /* MzU5NTlaMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7 */ /* MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1l */ /* U3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDGhjUG */ /* SbPBPXJJUVXHJQPE8pE3qZdRodbSg9GeTKJtoLDMg/la9hGhRBVCX6SI82j6ffOc */ /* iQt/nR+eDzMfUBMLJnOWbfhXqAJ9/UO0hNoR8XOxs+4rgISKIhjf69o9xBd/qxkr */ /* PkLcZ47qUT3w1lbU5ygt69OxtXXnHwZljZQp09nsad/ZkIdGAHvbREGJ3HxqV3rw */ /* N3mfXazL6IRktFLydkf3YYMZ3V+0VAshaG43IbtArF+y3kp9zvU5EmfvDqVjbOSm */ /* xR3NNg1c1eYbqMFkdECnwHLFuk4fsbVYTXn+149zk6wsOeKlSNbwsDETqVcplicu */ /* 9Yemj052FVUmcJgmf6AaRyBD40NjgHt1biclkJg6OBGz9vae5jtb7IHeIhTZgirH */ /* kr+g3uM+onP65x9abJTyUpURK1h0QCirc0PO30qhHGs4xSnzyqqWc0Jon7ZGs506 */ /* o9UD4L/wojzKQtwYSH8UNM/STKvvmz3+DrhkKvp1KCRB7UK/BZxmSVJQ9FHzNklN */ /* iyDSLFc1eSuo80VgvCONWPfcYd6T/jnA+bIwpUzX6ZhKWD7TA4j+s4/TXkt2ElGT */ /* yYwMO1uKIqjBJgj5FBASA31fI7tk42PgpuE+9sJ0sj8eCXbsq11GdeJgo1gJASgA */ /* DoRU7s7pXcheMBK9Rp6103a50g5rmQzSM7TNsQIDAQABo4IBXTCCAVkwEgYDVR0T */ /* AQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxqII+eyG8wHwYD */ /* VR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMG */ /* A1UdJQQMMAoGCCsGAQUFBwMIMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYY */ /* aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2Fj */ /* ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNV */ /* HR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRU */ /* cnVzdGVkUm9vdEc0LmNybDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s */ /* BwEwDQYJKoZIhvcNAQELBQADggIBAH1ZjsCTtm+YqUQiAX5m1tghQuGwGC4QTRPP */ /* MFPOvxj7x1Bd4ksp+3CKDaopafxpwc8dB+k+YMjYC+VcW9dth/qEICU0MWfNthKW */ /* b8RQTGIdDAiCqBa9qVbPFXONASIlzpVpP0d3+3J0FNf/q0+KLHqrhc1DX+1gtqpP */ /* kWaeLJ7giqzl/Yy8ZCaHbJK9nXzQcAp876i8dU+6WvepELJd6f8oVInw1YpxdmXa */ /* zPByoyP6wCeCRK6ZJxurJB4mwbfeKuv2nrF5mYGjVoarCkXJ38SNoOeY+/umnXKv */ /* xMfBwWpx2cYTgAnEtp/Nh4cku0+jSbl3ZpHxcpzpSwJSpzd+k1OsOx0ISQ+UzTl6 */ /* 3f8lY5knLD0/a6fxZsNBzU+2QJshIUDQtxMkzdwdeDrknq3lNHGS1yZr5Dhzq6YB */ /* T70/O3itTK37xJV77QpfMzmHQXh6OOmc4d0j/R0o08f56PGYX/sr2H7yRp11LB4n */ /* LCbbbxV7HhmLNriT1ObyF5lZynDwN7+YAN8gFk8n+2BnFqFmut1VwDophrCYoCvt */ /* lUG3OtUVmDG0YgkPCr2B2RP+v6TR81fZvAT6gt4y3wSJ8ADNXcL50CN/AAvkdgIm */ /* 2fBldkKmKYcJRyvmfxqkhQ/8mJb2VVQrH4D6wPIOK+XW+6kvRBVK5xMOHds3OBqh */ /* K/bt1nz8MIIFjTCCBHWgAwIBAgIQDpsYjvnQLefv21DiCEAYWjANBgkqhkiG9w0B */ /* AQwFADBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYD */ /* VQQLExB3d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVk */ /* IElEIFJvb3QgQ0EwHhcNMjIwODAxMDAwMDAwWhcNMzExMTA5MjM1OTU5WjBiMQsw */ /* CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu */ /* ZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQw */ /* ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz */ /* 7MKnJS7JIT3yithZwuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS */ /* 5F/WBTxSD1Ifxp4VpX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7 */ /* bXHiLQwb7iDVySAdYyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfI */ /* SKhmV1efVFiODCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jH */ /* trHEtWoYOAMQjdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14 */ /* Ztk6MUSaM0C/CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2 */ /* h4mXaXpI8OCiEhtmmnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt */ /* 6zPZxd9LBADMfRyVw4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPR */ /* iQfhvbfmQ6QYuKZ3AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ER */ /* ElvlEFDrMcXKchYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4K */ /* Jpn15GkvmB0t9dmpsh3lGwIDAQABo4IBOjCCATYwDwYDVR0TAQH/BAUwAwEB/zAd */ /* BgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wHwYDVR0jBBgwFoAUReuir/SS */ /* y4IxLVGLp6chnfNtyA8wDgYDVR0PAQH/BAQDAgGGMHkGCCsGAQUFBwEBBG0wazAk */ /* BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsGAQUFBzAC */ /* hjdodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURS */ /* b290Q0EuY3J0MEUGA1UdHwQ+MDwwOqA4oDaGNGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0 */ /* LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcmwwEQYDVR0gBAowCDAGBgRV */ /* HSAAMA0GCSqGSIb3DQEBDAUAA4IBAQBwoL9DXFXnOF+go3QbPbYW1/e/Vwe9mqyh */ /* hyzshV6pGrsi+IcaaVQi7aSId229GhT0E0p6Ly23OO/0/4C5+KH38nLeJLxSA8hO */ /* 0Cre+i1Wz/n096wwepqLsl7Uz9FDRJtDIeuWcqFItJnLnU+nBgMTdydE1Od/6Fmo */ /* 8L8vC6bp8jQ87PcDx4eo0kxAGTVGamlUsLihVo7spNU96LHc/RzY9HdaXFSMb++h */ /* UD38dglohJ9vytsgjTVgHAIDyyCwrFigDkBjxZgiwbJZ9VVrzyerbHbObyMt9H5x */ /* aiNrIv8SuFQtJ37YOtnwtoeW/VvRXKwYw02fc7cBqZ9Xql4o4rmUMYIDdjCCA3IC */ /* AQEwdzBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5 */ /* BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0 */ /* YW1waW5nIENBAhAFRK/zlJ0IOaa/2z9f5WEWMA0GCWCGSAFlAwQCAQUAoIHRMBoG */ /* CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG9w0BCQUxDxcNMjQwOTIw */ /* MDcwMDIxWjArBgsqhkiG9w0BCRACDDEcMBowGDAWBBRm8CsywsLJD4JdzqqKycZP */ /* GZzPQDAvBgkqhkiG9w0BCQQxIgQgk4wVZliG224lNsfObC/Ax/x+yedeZPjYTscC */ /* Zb6fSCMwNwYLKoZIhvcNAQkQAi8xKDAmMCQwIgQg0vbkbe10IszR1EBXaEE2b4KK */ /* 2lWarjMWr00amtQMeCgwDQYJKoZIhvcNAQEBBQAEggIAoCBC7xx4j1UTyHynu4Nr */ /* ONYMCCtWDc2gs2BdktIMiElec+GQS07u3T8dPfJ0Az9NUM74MFYEOE3PAoUI7cRN */ /* kBGgS9IQE8D7rOLkWphDKY1imZ8hqXFvbFfQebZuY9915eRuKM6VMaRVgzJaR/JG */ /* Wb48LY318PdeDM9AaCsWHViIG9j3h7V/ixhlokY70NZ5Eglup76Z0V+7x8VR/1xf */ /* VqNapu8WaDQtQSn6zR4UvF4yx6Qd/ax+ceD+UNF5QYZaNtp4M2VPn8gug0TnhRIl */ /* 8Ctf7iI75TP+fMcsoBgEKYZd9lUGQPbZTthCIr1oSNZUGnvbJQss7IAt4ax9RXJF */ /* 4bErLP51lEQOgyA6lERqAEalQGcRUjjwnNPG6uioBgg/zUzJYKgVOUSTolmBz//I */ /* 7Rkw+5vDTYOLALOR+ewl2QigovgcSEg0cV2UWmrVyjzyJM0Srf0fS4Z3WN7f8kda */ /* 719bEf1clBFvK+pwPpiYxSB7+rKzu5Dlu+1lWKgly3qUthIH6GD8uXMWX/Xeqy7k */ /* /dssZio8o+iQpjN55eiuvEBMmq7Y+eRPmlXeTo/GnF4DXxSZStAvTCrrdXDnL+vF */ /* NJND7kxFezL9WWN57oIU9L6/0PpGawTF82fw8Ng1Js7zwm1LY0ydLAaWfV+hepBS */ /* 78xTy02wHHDAPBbZvgKIkQI= */ /* SIG # End signature block */
combined_dataset/train/non-malicious/1216.ps1
1216.ps1
Import-Module -Name (Join-Path -Path $PSScriptRoot -ChildPath 'CarbonDscTest' -Resolve) -Force Describe 'Carbon_IniFile' { $testConfigName = 'CarbonIniFileOption' $tempDir = $null $iniPath = $null $sectionName = $null $defaultValue = $null $defaultValue2 = $null function Assert-IniFile { param( $Section, $Name = $testConfigName, [Parameter(Position=0)] $Value, [Switch] $CaseSensitive = $false ) Set-StrictMode -Version 'Latest' $ini = Split-Ini -Path $iniPath -AsHashtable -CaseSensitive:$CaseSensitive $key = $Name if( $Section ) { $key = '{0}.{1}' -f $Section,$Name } if( $Value -eq $null ) { ($ini.ContainsKey( $key )) | Should Be $false } else { ($ini.ContainsKey( $key )) | Should Be $true $ini[$key].Value | Should Be $Value } } BeforeAll { Start-CarbonDscTestFixture 'IniFile' } BeforeEach { $Global:Error.Clear() $tempDir = New-TempDir -Prefix $PSCommandPath $iniPath = Join-Path -Path $tempDir -ChildPath 'ini' $defaultValue = [Guid]::NewGuid().ToString() $defaultValue2 = [Guid]::NewGuid().ToString() $sectionName = [Guid]::NewGuid().ToString() $null = New-Item -Path $iniPath -ItemType 'File' @' prefix = {0} [{1}] prefix = {2} '@ -f $defaultValue,$sectionName,$defaultValue2 | Set-Content -Path $iniPath } AfterEach { Remove-Item -Path $tempDir -Recurse } AfterAll { Stop-CarbonDscTestFixture } It 'should get config value' { $value = Get-TargetResource -Path $iniPath -Name 'prefix' $value | Should Not BeNullOrEmpty $value.Path | Should Be $iniPath 'prefix' | Should Be $value.Name $value.Value | Should Be $defaultValue $value.CaseSensitive | Should Be $false $value.Force | Should Be $false Assert-IniFile -Name 'prefix' -Value $value.Value Assert-DscResourcePresent $value } It 'should get section config value' { $value = Get-TargetResource -Path $iniPath -Section $sectionName -Name 'prefix' $value | Should Not BeNullOrEmpty $value.Section | Should Be $sectionName $value.Name | Should Be 'prefix' $value.Value | Should Be $defaultValue2 Assert-IniFile -Section $sectionName -Name 'prefix' -Value $value.Value Assert-DscResourcePresent $value } It 'should pass along case sensitive and force args' { $value = Get-TargetResource -Path $iniPath -Name 'prefix' -CaseSensitive -Force $value.CaseSensitive | Should Be $true $value.Force | Should Be $true } It 'should get missing config value' { $value = Get-TargetResource -Path $iniPath -Name 'fubar' $value | Should Not BeNullOrEmpty $value.Value | Should BeNullOrEmpty Assert-DscResourceAbsent $value } It 'should throw error if path does not exist' { $bogusPath = Join-Path -Path $tempDir -ChildPath 'bogus' $bogusPath | Should Not Exist $value = Get-TargetResource -Path $bogusPath -Name 'prefix' -ErrorAction SilentlyContinue $Global:Error.Count | Should BeGreaterThan 0 $Global:Error[0] | Should Match 'not found' $value | Should BeNullOrEmpty } It 'should be absent if path does not exist and force' { $bogusPath = Join-Path -Path $tempDir -ChildPath 'bogus' $bogusPath | Should Not Exist $value = Get-TargetResource -Path $bogusPath -Name 'prefix' -Force $Global:Error.Count | Should Be 0 $value | Should Not BeNullOrEmpty $value.Path | Should Be $bogusPath } It 'should test config' { (Test-TargetResource -Path $iniPath -Name 'prefix' -Value (Get-TargetResource -Path $iniPath -Name 'prefix').Value) | Should Be $true (Test-TargetResource -Path $iniPath -Name 'prefix' -Value 'C:\I\Do\Not\Exist') | Should Be $false } It 'test missing config' { (Test-TargetResource -Path $iniPath -Name 'fubar' -Value 'fubar' -Ensure 'Absent') | Should Be $true (Test-TargetResource -Path $iniPath -Name 'fubar' -Value 'fubar') | Should Be $false } It 'should test missing ini path' { $bogusPath = Join-Path -Path $tempDir -ChildPath 'bogus' $bogusPath | Should Not Exist (Test-TargetResource -Path $bogusPath -Name 'prefix' -Value $defaultValue -ErrorAction SilentlyContinue) | Should Be $false $Global:Error.Count | Should BeGreaterThan 0 $Global:Error[0] | Should Match 'not foun' $Error.Clear() (Test-TargetResource -Path $bogusPath -Name 'prefix' -Value $defaultValue -Force) | Should Be $false $Global:Error.Count | Should Be 0 } It 'should test value in section' { (Test-TargetResource -Path $iniPath -Section $sectionName -Name 'prefix' -Value $defaultValue2) | Should Be $true (Test-TargetResource -Path $iniPath -Section $sectionName -Name 'prefix' -Value $defaultValue) | Should Be $false } It 'should setup config' { $name = 'CarbonIniFile' $value = [Guid]::NewGuid().ToString() Set-TargetResource -Path $iniPath -Name $name -Value $value Assert-IniFile -Name $name -Value $value $newValue = [guid]::NewGuid().ToString() Set-TargetResource -Path $iniPath -Name $name -Value $newValue Assert-IniFile -Name $name -Value $newValue Set-TargetResource -Path $iniPath -Name $name -Ensure 'Absent' (Get-TargetResource -Path $iniPath -Name $name).Value | Should BeNullOrEmpty } It 'should treat name as case sensitive' { $value1 = [Guid]::NewGuid() $value2 = [Guid]::NewGuid() Set-TargetResource -Path $iniPath -Name $testConfigName -Value $value1 -CaseSensitive Set-TargetResource -Path $iniPath -Name $testConfigName.ToUpper() -Value $value2 -CaseSensitive Assert-IniFile -Name $testConfigName -Value $value1 -CaseSensitive Assert-IniFile -Name $testConfigName.ToUpper() -Value $value2 -CaseSensitive } It 'should treat value as case sensitive' { $value1 = 'fubar' Set-TargetResource -Path $iniPath -Name $testConfigName -Value $value1 (Test-TargetResource -Path $iniPath -Name $testConfigName -Value $value1 -CaseSensitive) | Should Be $true (Test-TargetResource -Path $iniPath -Name $testConfigName -Value $value1.ToUpper()) | Should Be $true (Test-TargetResource -Path $iniPath -Name $testConfigName -Value $value1.ToUpper() -CaseSensitive) | Should Be $false } It 'should not create missing ini file' { $bogusPath = Join-Path -Path $tempDir -ChildPath 'bogus' $bogusPath | Should Not Exist Set-TargetResource -Path $bogusPath -Name 'prefix' -Value $defaultValue2 -ErrorAction SilentlyContinue $Global:Error.Count | Should BeGreaterThan 0 $Global:Error[0] | Should Match 'not found' $bogusPath | Should Not Exist } It 'should create missing ini file' { $bogusPath = Join-Path -Path $tempDir -ChildPath 'bogusParent\bogusFile' $bogusPath | Should Not Exist Set-TargetResource -Path $bogusPath -Name 'prefix' -Value $defaultValue2 -Force $Global:Error.Count | Should Be 0 $bogusPath | Should Exist $ini = Split-Ini -Path $bogusPath -AsHashtable $ini.ContainsKey('prefix') | Should Be $true $ini['prefix'].Value | Should Be $defaultValue2 } It 'should set value in section' { $newValue = [Guid]::NewGuid().ToString() Set-TargetResource -Path $iniPath -Section $sectionName -Name 'prefix' -Value $newValue Assert-IniFile -Section $sectionName -Name 'prefix' -Value $newValue } It 'should remove value in section' { Set-TargetResource -Path $iniPath -Section $sectionName -Name 'prefix' -Ensure Absent $ini = Split-Ini -Path $iniPath -AsHashtable $ini.ContainsKey( ('{0}.prefix' -f $sectionName) ) | Should Be $false $ini.ContainsKey('prefix') | Should Be $true } configuration DscConfiguration { param( $Value, $Ensure = 'Present' ) Set-StrictMode -Off Import-DscResource -Name '*' -Module 'Carbon' node 'localhost' { Carbon_IniFile set { Path = $iniPath; Name = $testConfigName Value = $Value; Ensure = $Ensure; } } } It 'should run through dsc' { $value = [Guid]::NewGuid().ToString() & DscConfiguration -Value $value -OutputPath $CarbonDscOutputRoot Start-DscConfiguration -Wait -ComputerName 'localhost' -Path $CarbonDscOutputRoot -Force $Global:Error.Count | Should Be 0 Assert-IniFile $value & DscConfiguration -Ensure 'Absent' -OutputPath $CarbonDscOutputRoot Start-DscConfiguration -Wait -ComputerName 'localhost' -Path $CarbonDscOutputRoot -Force $Global:Error.Count | Should Be 0 Assert-IniFile $null $result = Get-DscConfiguration $Global:Error.Count | Should Be 0 $result | Should BeOfType ([Microsoft.Management.Infrastructure.CimInstance]) $result.PsTypeNames | Where-Object { $_ -like '*Carbon_IniFile' } | Should Not BeNullOrEmpty } }
combined_dataset/train/non-malicious/sample_45_3.ps1
sample_45_3.ps1
# # Script module for module 'Az.ArcResourceBridge' that is executed when 'Az.ArcResourceBridge' is imported in a PowerShell session. # # Generated by: Microsoft Corporation # # Generated on: 04/23/2024 13:01:39 # $PSDefaultParameterValues.Clear() Set-StrictMode -Version Latest function Test-DotNet { try { if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 }))) { throw ".NET Framework versions lower than 4.7.2 are not supported in Az. Please upgrade to .NET Framework 4.7.2 or higher." } } catch [System.Management.Automation.DriveNotFoundException] { Write-Verbose ".NET Framework version check failed." } } function Preload-Assembly { param ( [string] $AssemblyDirectory ) if($PSEdition -eq 'Desktop' -and (Test-Path $AssemblyDirectory -ErrorAction Ignore)) { try { Get-ChildItem -ErrorAction Stop -Path $AssemblyDirectory -Filter "*.dll" | ForEach-Object { try { Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null } catch { Write-Verbose $_ } } } catch {} } } if ($true -and ($PSEdition -eq 'Desktop')) { if ($PSVersionTable.PSVersion -lt [Version]'5.1') { throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher." } Test-DotNet } if ($true -and ($PSEdition -eq 'Core')) { if ($PSVersionTable.PSVersion -lt [Version]'6.2.4') { throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher." } } if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore) { Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object { . $_.FullName } } # [windows powershell] preload assemblies # [windows powershell] preload module alc assemblies $preloadPath = (Join-Path $PSScriptRoot -ChildPath "ModuleAlcAssemblies") Preload-Assembly -AssemblyDirectory $preloadPath if (Get-Module AzureRM.profile -ErrorAction Ignore) { Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.") throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.") } $module = Get-Module Az.Accounts if ($module -ne $null -and $module.Version -lt [System.Version]"2.19.0") { Write-Error "This module requires Az.Accounts version 2.19.0. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop } elseif ($module -eq $null) { Import-Module Az.Accounts -MinimumVersion 2.19.0 -Scope Global } if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore) { Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object { . $_.FullName } } $FilteredCommands = @() if ($Env:ACC_CLOUD -eq $null) { $FilteredCommands | ForEach-Object { $existingDefault = $false foreach ($key in $global:PSDefaultParameterValues.Keys) { if ($_ -like "$key") { $existingDefault = $true } } if (!$existingDefault) { $global:PSDefaultParameterValues.Add($_, { if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null) { $context = Get-AzureRmContext } else { $context = Get-AzContext } if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) { $context.ExtendedProperties["Default Resource Group"] } }) } } } # SIG # Begin signature block # MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCXunqkIptLeBSo # c8IeSID7qVm/AAPeNHHogTRKhwkQiaCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIO4L # Qb74RXfPEHXB2IkaD9EwH50gfQghgEPVjBF24ApHMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAGsYOBdaAfLWm3fWfC/XkjZAiz6/evhlHAzz4 # Z28LhiJ4UJu+QtrabOPiSii+pT8KNwClT7j4qxwDwjbEu76LPI9o11nRx5W4yVeX # I3BgrGY46QXJEUMVgA3/aVM4aPraR1Hfr+xWtaMxpdErJYC+teoF2CKrt3M4kag4 # UWrno8vIT88SzMjD0MwX6DB7VodRAO3nF2JjKZWmGgczEBsj4FYvSo9OixbOoQTi # PTbTmVnRu/o2YMdFuO/RiBMgUTy9Z+z1BYaYBNZx0qZ+jwC1M2cOePuQiNiL+Odj # eOPkjPaPuEOyxhxBKF9pzzir/oc6Df5CBXh2CTNiSSm3FVEv9aGCF5cwgheTBgor # BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDVyjjl0AXbQGugL478ab9L1ToIJGwRkNLl # NBONvQB0fAIGZhfWS4fIGBMyMDI0MDQyMzEzMTUxNS4wNDlaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAecujy+TC08b6QAB # AAAB5zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MTlaFw0yNTAzMDUxODQ1MTlaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDCV58v4IuQ659XPM1DtaWM # v9/HRUC5kdiEF89YBP6/Rn7kjqMkZ5ESemf5Eli4CLtQVSefRpF1j7S5LLKisMWO # GRaLcaVbGTfcmI1vMRJ1tzMwCNIoCq/vy8WH8QdV1B/Ab5sK+Q9yIvzGw47TfXPE # 8RlrauwK/e+nWnwMt060akEZiJJz1Vh1LhSYKaiP9Z23EZmGETCWigkKbcuAnhvh # 3yrMa89uBfaeHQZEHGQqdskM48EBcWSWdpiSSBiAxyhHUkbknl9PPztB/SUxzRZj # UzWHg9bf1mqZ0cIiAWC0EjK7ONhlQfKSRHVLKLNPpl3/+UL4Xjc0Yvdqc88gOLUr # /84T9/xK5r82ulvRp2A8/ar9cG4W7650uKaAxRAmgL4hKgIX5/0aIAsbyqJOa6OI # GSF9a+DfXl1LpQPNKR792scF7tjD5WqwIuifS9YUiHMvRLjjKk0SSCV/mpXC0BoP # kk5asfxrrJbCsJePHSOEblpJzRmzaP6OMXwRcrb7TXFQOsTkKuqkWvvYIPvVzC68 # UM+MskLPld1eqdOOMK7Sbbf2tGSZf3+iOwWQMcWXB9gw5gK3AIYK08WkJJuyzPqf # itgubdRCmYr9CVsNOuW+wHDYGhciJDF2LkrjkFUjUcXSIJd9f2ssYitZ9CurGV74 # BQcfrxjvk1L8jvtN7mulIwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM/+4JiAnzY4 # dpEf/Zlrh1K73o9YMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB0ofDbk+llWi1c # C6nsfie5Jtp09o6b6ARCpvtDPq2KFP+hi+UNNP7LGciKuckqXCmBTFIhfBeGSxvk # 6ycokdQr3815pEOaYWTnHvQ0+8hKy86r1F4rfBu4oHB5cTy08T4ohrG/OYG/B/gN # nz0Ol6v7u/qEjz48zXZ6ZlxKGyZwKmKZWaBd2DYEwzKpdLkBxs6A6enWZR0jY+q5 # FdbV45ghGTKgSr5ECAOnLD4njJwfjIq0mRZWwDZQoXtJSaVHSu2lHQL3YHEFikun # bUTJfNfBDLL7Gv+sTmRiDZky5OAxoLG2gaTfuiFbfpmSfPcgl5COUzfMQnzpKfX6 # +FkI0QQNvuPpWsDU8sR+uni2VmDo7rmqJrom4ihgVNdLaMfNUqvBL5ZiSK1zmaEL # BJ9a+YOjE5pmSarW5sGbn7iVkF2W9JQIOH6tGWLFJS5Hs36zahkoHh8iD963LeGj # ZqkFusKaUW72yMj/yxTeGEDOoIr35kwXxr1Uu+zkur2y+FuNY0oZjppzp95AW1le # hP0xaO+oBV1XfvaCur/B5PVAp2xzrosMEUcAwpJpio+VYfIufGj7meXcGQYWA8Um # r8K6Auo+Jlj8IeFS6lSvKhqQpmdBzAMGqPOQKt1Ow3ZXxehK7vAiim3ZiALlM0K5 # 46k0sZrxdZPgpmz7O8w9gHLuyZAQezCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCzcgTnGasSwe/dru+cPe1NF/vwQ6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dIknDAi # GA8yMDI0MDQyMzEyMTQyMFoYDzIwMjQwNDI0MTIxNDIwWjB3MD0GCisGAQQBhFkK # BAExLzAtMAoCBQDp0iScAgEAMAoCAQACAgyFAgH/MAcCAQACAhNGMAoCBQDp03Yc # AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh # CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAAtBkyUdrM1hwbTBWCK48MGm # KRxZss6LPFkY42ZOWnXsVX6ZpU1Gl/LHGQnpRZk6/hinddMaf7iclXFbDMTro7W5 # 8hCrRegPfWwTzs8g1aOMYXNAwJW30fwOsS6mecLg5zfkvBReOfq509wnpa0Ndwg6 # EQMGwD/BAq7tdePiGcewKasjknLTpYY7fgoW2Ncb0sgNMRHJId/wLrHwD90VtvkC # Enw9OPR+IbvMfWkyCTqpPJ3Y0U/m/Oeqqoo9GDlFnX17f/az0HZjr4SZ9LXRqz8Q # a4zlmb79kpVqf6nLoXJr9P9oeI7iFIEHkb+mYdtENFDUMyhhduOhsqZHXwrf3QQx # ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA # Aecujy+TC08b6QABAAAB5zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD # MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDCgo9NCBffSdfj4Lq+8/7B # bAFmue+0E0xjxABpu8WXdjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOU2 # XQ12aob9DeDFXM9UFHeEX74Fv0ABvQMG7qC51nOtMIGYMIGApH4wfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHnLo8vkwtPG+kAAQAAAecwIgQgUj1W # 10UOl24tqW0PGjrhbdiG0wEdX5mXIsSe+QniYO0wDQYJKoZIhvcNAQELBQAEggIA # aZHHPJQ/fWb6eoFjhG2DeM9OZz4hKiS0mYGJx4vMbQ+CbyCuA1iyd6vNT2hF1GG5 # 5PkGtTpDLW7kPqr/G1xRJLC0qhhyNGwMDUQ1e1jI/H6C+t1h0snOSDX5kPtmBne5 # w5xFLbyKbPm1d1Ol1v4uHC9bT6Aco7NMcjAjzBROsyUsuROnUUFwZhw2NHJz25QA # FiDFw+mTG1AQlDTBTuXm1kK9np/09HnLVZULznKqoYdssIUbaoGdvs1dV69htFiL # ZjTecXUacXB1g1oa3WbsYUy1ITuTFKWhKgouTbgBF/+ol+bfxQ4ZPree2EklB5vI # 7pxZ+S1Lx93FPeO8cYm1eEyGHooFfYNRku/na1jNLaVkLAOdh1cvwZaoH+CPnWaF # Cuekk9IMX1onHoDhSQ7n1eKX6X9mXxw3QEayFydIQ9+WxvTZcjwWPC7+Oumk3R6K # 7M0AoTj2vUmLsAD7d1jVC8uKAnHSauB/A3FJ/lpbld2Kl1aOVJSAcHQ+tnwKGgOS # mHhGXtWGU42WaxW9jTDui7QFe63vVw0CX2tFWPMayHuPVY6AvzrzKibbb3LNPTQl # be4R0wn/cqIuSW8KKvj/vnJV6f5ShM6lvAk3h+AYdyarX1U5SLR7V9qNq/PrSrHi # 8tBnPt48d4MEVQS1m03hvsbUZgFdAX/Wi5ef/ET3Y64= # SIG # End signature block
combined_dataset/train/non-malicious/sample_60_54.ps1
sample_60_54.ps1
# # Module manifest for module 'OCI.PSModules.Vnmonitoring' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Vnmonitoring.dll' # Version number of this module. ModuleVersion = '86.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'ca53b640-70c1-4d8a-a7c2-5fbd89718e19' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Vnmonitoring Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Vnmonitoring.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIVnmonitoringPathAnalysis', 'Get-OCIVnmonitoringPathAnalyzerTest', 'Get-OCIVnmonitoringPathAnalyzerTestsList', 'Get-OCIVnmonitoringWorkRequest', 'Get-OCIVnmonitoringWorkRequestErrorsList', 'Get-OCIVnmonitoringWorkRequestLogsList', 'Get-OCIVnmonitoringWorkRequestResultsList', 'Get-OCIVnmonitoringWorkRequestsList', 'Move-OCIVnmonitoringPathAnalyzerTestCompartment', 'New-OCIVnmonitoringPathAnalyzerTest', 'Remove-OCIVnmonitoringPathAnalyzerTest', 'Update-OCIVnmonitoringPathAnalyzerTest' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Vnmonitoring' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Find Local Group Members_10.ps1
Find Local Group Members_10.ps1
# Author: Hal Rottenberg # Purpose: Find matching members in a local group # Used tip from RichS here: http://powershellcommunity.org/Forums/tabid/54/view/topic/postid/1528/Default.aspx # Change these two to suit your needs $ChildGroups = "Domain Admins", "Group Two" $LocalGroup = "Administrators" $MemberNames = @() # uncomment this line to grab list of computers from a file # $Servers = Get-Content serverlist.txt $Servers = $env:computername # for testing on local computer foreach ( $Server in $Servers ) { # Put $MemberNames = @() here to clear out the MemberNames variable between servers, otherwise we start to get incorrect results $MemberNames = @() $Group= [ADSI]"WinNT://$Server/$LocalGroup,group" $Members = @($Group.psbase.Invoke("Members")) $Members | ForEach-Object { $MemberNames += $_.GetType().InvokeMember("Name", 'GetProperty', $null, $_, $null) } $ChildGroups | ForEach-Object { $output = "" | Select-Object Server, Group, InLocalAdmin $output.Server = $Server $output.Group = $_ $output.InLocalAdmin = $MemberNames -contains $_ Write-Output $output } }
combined_dataset/train/non-malicious/FTP upload_3.ps1
FTP upload_3.ps1
$File = "D:\\Dev\\somefilename.zip" $ftp = "ftp://username:password@example.com/pub/incoming/somefilename.zip" "ftp url: $ftp" $webclient = New-Object System.Net.WebClient $uri = New-Object System.Uri($ftp) "Uploading $File..." $webclient.UploadFile($uri, $File)
combined_dataset/train/non-malicious/sample_45_47.ps1
sample_45_47.ps1
# # Script module for module 'Az.Aks' that is executed when 'Az.Aks' is imported in a PowerShell session. # # Generated by: Microsoft Corporation # # Generated on: 04/23/2024 13:01:39 # $PSDefaultParameterValues.Clear() Set-StrictMode -Version Latest function Test-DotNet { try { if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 }))) { throw ".NET Framework versions lower than 4.7.2 are not supported in Az. Please upgrade to .NET Framework 4.7.2 or higher." } } catch [System.Management.Automation.DriveNotFoundException] { Write-Verbose ".NET Framework version check failed." } } function Preload-Assembly { param ( [string] $AssemblyDirectory ) if($PSEdition -eq 'Desktop' -and (Test-Path $AssemblyDirectory -ErrorAction Ignore)) { try { Get-ChildItem -ErrorAction Stop -Path $AssemblyDirectory -Filter "*.dll" | ForEach-Object { try { Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null } catch { Write-Verbose $_ } } } catch {} } } if ($true -and ($PSEdition -eq 'Desktop')) { if ($PSVersionTable.PSVersion -lt [Version]'5.1') { throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher." } Test-DotNet } if ($true -and ($PSEdition -eq 'Core')) { if ($PSVersionTable.PSVersion -lt [Version]'6.2.4') { throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher." } } if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore) { Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object { . $_.FullName } } # [windows powershell] preload assemblies # [windows powershell] preload module alc assemblies $preloadPath = (Join-Path $PSScriptRoot -ChildPath "ModuleAlcAssemblies") Preload-Assembly -AssemblyDirectory $preloadPath if (Get-Module AzureRM.profile -ErrorAction Ignore) { Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.") throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.") } $module = Get-Module Az.Accounts if ($module -ne $null -and $module.Version -lt [System.Version]"2.19.0") { Write-Error "This module requires Az.Accounts version 2.19.0. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop } elseif ($module -eq $null) { Import-Module Az.Accounts -MinimumVersion 2.19.0 -Scope Global } Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.Aks.dll) if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore) { Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object { . $_.FullName } } $FilteredCommands = @() if ($Env:ACC_CLOUD -eq $null) { $FilteredCommands | ForEach-Object { $existingDefault = $false foreach ($key in $global:PSDefaultParameterValues.Keys) { if ($_ -like "$key") { $existingDefault = $true } } if (!$existingDefault) { $global:PSDefaultParameterValues.Add($_, { if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null) { $context = Get-AzureRmContext } else { $context = Get-AzContext } if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) { $context.ExtendedProperties["Default Resource Group"] } }) } } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCPPTiUj2A/LaCH # uhbB6Hl1KvLLgeY24JKknfMs5kFPhqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGdR49+5TLWM9JUyJIzToXG0 # o76jRREL2ZYa7W+gpk9uMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAly4BqBJNQnkVF4iMyyWUiH+ce3nDq070PBMQlflbKxcPsc3Q+cAQ7KHe # DXJwYLUQsVQSaxe3f71BIbFHZFm7HDZRW4KFPTaCAKD4MxtX6iG7aPzaEGAYbN73 # f3j/3LXhNcyDViSo0PaEVBG3R5OYhJfHeZ4kqaxhhUrAdGvo+omx8Gh0Ji4RnEIQ # LER1b6YlK7VIyUOeHSnUPH+KOiX1rx3Hm8lezKJ0YM+FvMKeP4aVxiqRajfUvfSL # tNsgOyqBfbe2nZnHvKN3ua/0NTFRX1pxyq4j3VeR2L9f6uEaMPriTuQv9YBiVwUS # Kg7tXWL4O07hPrfjl7W8W5gBi3nqD6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCA5sf48az/qSJVbcFqjxblhn3k6dm2jaXKyLYHekLXA0wIGZh/+xT8P # GBMyMDI0MDQyMzEzMTUyMS4yNjVaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # Ojg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4NkRGLTRC # QkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKhOA5RE6i53nHURH4lnfKLp # +9JvipuTtctairCxMUSrPSy5CWK2DtriQP+T52HXbN2g7AktQ1pQZbTDGFzK6d03 # vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzIHHLaiAaobE5vFJuoxZ0ZWdKMCs8acjhH # UmfaY+79/CR7uN+B4+xjJqwvdpU/mp0mAq3earyH+AKmv6lkrQN8zgrcbCgHwsqv # vqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5EW6NVnXMYOTRKuGPfyfBKdShualLo88k # G7qa2mbA5l77+X06JAesMkoyYr4/9CgDFjHUpcHSODujlFBKMi168zRdLerdpW0b # BX9EDux2zBMMaEK8NyxawCEuAq7++7ktFAbl3hUKtuzYC1FUZuUl2Bq6U17S4CKs # qR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5gpv+YcvBM834bXFNwytd3ujDD24P9Dd8 # xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSvtFVi5Sa/ubGuYEpS8gF6GDWN5/KbveFk # dsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zljEjKz5WW7BA4wpmFm24fhBmRjV4Nbp+n7 # 8cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnSeOXePT6hMF0Il598LMu0rw35ViUWcAQk # UNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUbqL1toyPUdpF # yyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAC5U2bINLgXIHWbM # cqVuf9jkUT/K8zyLBvu5h8JrqYR2z/eaO2yo1Ooc9Shyvxbe9GZDu7kkUzxSyJ1I # ZksZZw6FDq6yZNT3PEjAEnREpRBL8S+mbXg+O4VLS0LSmb8XIZiLsaqZ0fDEcv3H # eA+/y/qKnCQWkXghpaEMwGMQzRkhGwcGdXr1zGpQ7HTxvfu57xFxZX1MkKnWFENJ # 6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+zvGJNAF+5/5qBk7nr079zICbFXvxtidN # N5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+OdAquBiDkYQ5kVfUMKS31yHQOGgmFxuCO # zTpWHalrqpdIllsy8KNsj5U9sONiWAd9PNlyEHHbQZDmi9/BNlOYyTt0YehLbDov # mZUNazk79Od/A917mqCdTqrExwBGUPbMP+/vdYUqaJspupBnUtjOf/76DAhVy8e/ # e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM9Rm6hUDBBkvYh+YjmGdcQ5HB6WT9Rec8 # +qDHmbhLhX4Zdaard5/OXeLbgx2f7L4QQQj3KgqjqDOWInVhNE1gYtTWLHe4882d # /k7Lui0K1g8EZrKD7maOrsJLKPKlegceJ9FCqY1sDUKUhRa0EHUW+ZkKLlohKrS7 # FwjdrINWkPBgbQznCjdE2m47QjTbMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4 # NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUANiNHGWXbNaDPxnyiDbEOciSjFhCggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnRvQQwIhgPMjAyNDA0MjMxMjUyMjBaGA8yMDI0MDQyNDEyNTIyMFowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6dG9BAIBADAHAgEAAgIH/zAHAgEAAgISKDAKAgUA # 6dMOhAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAEtAJf9QQUkfnjakWpA/ # WTJ4s59d1ydd1YCu0doiQ7zKrtg+fPXaO+UnceDABE97pgPadQ3qu9K0ikm1c/cM # Waf6FyR3t7zee3PwsEGTk2CPIUwLCYrMasurESYCykjmcyo5aeimsVVRSCr36tnZ # YZLeD4pEzDs6hAxbbMfDl26nMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgldHjyQhsQJ/7L6jxB0Cty+wtDrXUKGJQZASDCYxk7IUwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCBh/w4tmmWsT3iZnHtH0Vk37UCN02lRxY+RiON6wDFj # ZjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3V1X # HZXUraobAAEAAAHdMCIEIOmVHNIZrArpRiTxre+ot/ScGrSRpjA9BFR2kZJAoOaA # MA0GCSqGSIb3DQEBCwUABIICAAKTQONDfeQzPDTi9RkyHhHTt+qaYTeNNq7DcqN0 # oTc4wv1Bs0f7/KUAmuPb62U6sfgy9qldL2/F0sqAgVpB2h+jzvNFXqKjHGLEmeIk # 8rRceija6pWTkN0SWGpbFTmPVoP2U1DT9e+tNg2YpTN/p8AFUErX49nOcuQYAcY7 # CUohljwMwcYGuqAz46rEU4pSqaBLXJrewmnc6cGQmyhjqyifStVsuU62vKGyavm2 # 89mjc9ML23izzqAREljbVVyxGh/TM4pByAKRhOLL26rMYFzaQtypVRnyBOksYMBH # bijlpmK8sgagUV15Ap48fIBxKdHFe3K+NzzzNsHuuYC9ab9Dj/QkEEn/uvn4t/Lw # HJbGrxDFIMwvo+Uot2ugoLIgdPWKPvSii7GwiGI2TZULEW3F/xSaN+dRVrxf892l # 9UNSZC7OtpNwuD/kmbhFevHVvKF0kBFxm2M5U9vYzLOGrjPilJKKI9e1atNE7IJi # 584AZsCTWPQiremObe9pzD548QMufW2XJXg+4qOYiu8LcAr16Ft+p2j9WNVR8U+a # 91EJSAuvZP3cF3Qo5UWdd/OvIerlYeW5vwvt0q3k3NA3u3/xY1hCvuM0Kws7WqVg # l0KvM5xe1d5ySIqb+rLucPB0ZrxYCFsPk8UlsifHpLr1beKEbIfYRA9/PDW1eJU3 # LVSA # SIG # End signature block
combined_dataset/train/non-malicious/sample_45_64.ps1
sample_45_64.ps1
param($installPath, $toolsPath, $package, $project) Import-Module (Join-Path $toolsPath common.psm1) -Force try { # Indicates if the current project is a VB project if ([string]::IsNullOrEmpty($project.CodeModel.Language)) { $IsVbProject = $project.FullName -like "*.vbproj" } else { $IsVbProject = ($project.CodeModel.Language -eq [EnvDTE.CodeModelLanguageConstants]::vsCMLanguageVB) } # Indicates if the current project is an MVC project $IsMvcProject = ($project.Object.References | Where-Object { $_.Identity -eq "System.Web.Mvc" }) -ne $null # The filters folder. $FiltersProjectItem = $project.ProjectItems.Item("Filters"); if ($IsVbProject) { # For VB project, delete TokenHelper.cs, SharePointContext.cs and SharePointContextFilterAttribute.cs $project.ProjectItems | Where-Object { ($_.Name -eq "TokenHelper.cs") -or ($_.Name -eq "SharePointContext.cs") } | ForEach-Object { $_.Delete() } $FiltersProjectItem.ProjectItems | Where-Object { ($_.Name -eq "SharePointContextFilterAttribute.cs") } | ForEach-Object { $_.Delete() } # Delete SharePointContextFilterAttribute.vb if the web project is not MVC. if (!$IsMvcProject) { $FiltersProjectItem.ProjectItems | Where-Object { $_.Name -eq "SharePointContextFilterAttribute.vb" } | ForEach-Object { $_.Delete() } } # Add Imports for VB project $VbImports | ForEach-Object { if (!($project.Object.Imports -contains $_)) { $project.Object.Imports.Add($_) } } } else { # For CSharp project, delete TokenHelper.vb, SharePointContext.vb and SharePointContextFilterAttribute.vb $project.ProjectItems | Where-Object { ($_.Name -eq "TokenHelper.vb") -or ($_.Name -eq "SharePointContext.vb") } | ForEach-Object { $_.Delete() } $FiltersProjectItem.ProjectItems | Where-Object { ($_.Name -eq "SharePointContextFilterAttribute.vb") } | ForEach-Object { $_.Delete() } # Delete SharePointContextFilterAttribute.cs if the web project is not MVC. if (!$IsMvcProject) { $FiltersProjectItem.ProjectItems | Where-Object { $_.Name -eq "SharePointContextFilterAttribute.cs" } | ForEach-Object { $_.Delete() } } } # Delete the Filters folder if there is no item in it. if ($FiltersProjectItem.ProjectItems.Count -eq 0) { try { $FiltersProjectItem.Delete() } catch { Write-Host "Error while deleting the Filters folder: " + $_.Exception -ForegroundColor Yellow } } # Set CopyLocal = True as needed Foreach ($spRef in $CopyLocalReferences) { $project.Object.References | Where-Object { $_.Identity -eq $spRef } | ForEach-Object { $_.CopyLocal = $True } } } catch { Write-Host "Error while installing package: " + $_.Exception -ForegroundColor Red exit } # SIG # Begin signature block # MIImHgYJKoZIhvcNAQcCoIImDzCCJgsCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCD6qhoLGq68dNF # mJh/bjSuZUHhdY1z/Y5sxCS/QO/zuKCCC2cwggTvMIID16ADAgECAhMzAAAFV8+Q # 3cfRwIiMAAAAAAVXMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTAwHhcNMjMxMDE5MTk1MTEyWhcNMjQxMDE2MTk1MTEyWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCs0/kFGrFBPJjNzuVjixsArYe7PjsMayjyn3AS8PHH7QmCeCIh2iH6OGSizwdy # /HSU5bfZcxZn25YEyff6mBQplp064tc7cue5Win7lqQKjCq5eExLe7M9Ms42HJ48 # 2nviJZvVK1qNDe4Y7H58TDTSatOk0agN5GP9xQc6opv9NPHZMK3vPfbKP85w2nmm # T7wDkaDVLoMxmEmNnf2zYtUauyrx+zzLVE/dkFvaKuwxqYg5QVJNqvxqx7FoCCg1 # q5WdAyp4B0S01JxTFPqb9w185mOsIi0dk7uJ6JoOT2WOsJL1BUuV2MgmFp1Z2OIB # rwkdeB55wG8mF7az1dWGjk5NAgMBAAGjggFuMIIBajAfBgNVHSUEGDAWBgorBgEE # AYI3PQYBBggrBgEFBQcDAzAdBgNVHQ4EFgQUZUiwqCE+1UNl9kCzINVmNMKtebcw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwODY1KzUwMTU5NzAfBgNVHSMEGDAWgBTm/F97uyIAWORyTrX0 # IXQjMubvrDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5j # b20vcGtpL2NybC9wcm9kdWN0cy9NaWNDb2RTaWdQQ0FfMjAxMC0wNy0wNi5jcmww # WgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpL2NlcnRzL01pY0NvZFNpZ1BDQV8yMDEwLTA3LTA2LmNydDAMBgNV # HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IBAQDKLsNC5lAhZ0LL2vbh5pbhYDM1 # htEg3+di/58fDvtTcT+oLwq+eRPuIleUaK37eaEeynCJA7WvdJK9FjvZBC4Fbkqh # Lu6lSqplUUeJzxn620qcful+phcUszQYDyAsh4fjdTzJtx2jGeiJcD193yIoIzjN # rllXCtGVMSjryy2jiU4pczp1WOjWrCL9fz0ZvR811YZAnhyP6zu1V8pdYqeA668h # KvdfZzVp60F8ZkqnucOpa1WKiQEYEwkG5vOQdxoOxZWc+MJ6cmcNgA+7SfJbb0XX # +hsKIzK7Tb/E9dELF88573stY+AuuApvZLAsG76aU/jvqlyreUWX5M3uW2ShMIIG # cDCCBFigAwIBAgIKYQxSTAAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDE3 # WhcNMjUwNzA2MjA1MDE3WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDEw # MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6Q5kUHlntcTj/QkATJ6U # rPdWaOpE2M/FWE+ppXZ8bUW60zmStKQe+fllguQX0o/9RJwI6GWTzixVhL99COMu # K6hBKxi3oktuSUxrFQfe0dLCiR5xlM21f0u0rwjYzIjWaxeUOpPOJj/s5v40mFfV # HV1J9rIqLtWFu1k/+JC0K4N0yiuzO0bj8EZJwRdmVMkcvR3EVWJXcvhnuSUgNN5d # pqWVXqsogM3Vsp7lA7Vj07IUyMHIiiYKWX8H7P8O7YASNUwSpr5SW/Wm2uCLC0h3 # 1oVH1RC5xuiq7otqLQVcYMa0KlucIxxfReMaFB5vN8sZM4BqiU2jamZjeJPVMM+V # HwIDAQABo4IB4zCCAd8wEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFOb8X3u7 # IgBY5HJOtfQhdCMy5u+sMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud # DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjR # PZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0 # LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNy # bDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9z # b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGd # BgNVHSAEgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggr # BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQA # ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAGnTvV08pe8QWhXi4UNMi # /AmdrIKX+DT/KiyXlRLl5L/Pv5PI4zSp24G43B4AvtI1b6/lf3mVd+UC1PHr2M1O # HhthosJaIxrwjKhiUUVnCOM/PB6T+DCFF8g5QKbXDrMhKeWloWmMIpPMdJjnoUdD # 8lOswA8waX/+0iUgbW9h098H1dlyACxphnY9UdumOUjJN2FtB91TGcun1mHCv+KD # qw/ga5uV1n0oUbCJSlGkmmzItx9KGg5pqdfcwX7RSXCqtq27ckdjF/qm1qKmhuyo # EESbY7ayaYkGx0aGehg/6MUdIdV7+QIjLcVBy78dTMgW77Gcf/wiS0mKbhXjpn92 # W9FTeZGFndXS2z1zNfM8rlSyUkdqwKoTldKOEdqZZ14yjPs3hdHcdYWch8ZaV4XC # v90Nj4ybLeu07s8n07VeafqkFgQBpyRnc89NT7beBVaXevfpUk30dwVPhcbYC/GO # 7UIJ0Q124yNWeCImNr7KsYxuqh3khdpHM2KPpMmRM19xHkCvmGXJIuhCISWKHC1g # 2TeJQYkqFg/XYTyUaGBS79ZHmaCAQO4VgXc+nOBTGBpQHTiVmx5mMxMnORd4hzbO # TsNfsvU9R1O24OXbC2E9KteSLM43Wj5AQjGkHxAIwlacvyRdUQKdannSF9PawZSO # B3slcUSrBmrm1MbfI5qWdcUxghoNMIIaCQIBATCBlTB+MQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT # aWduaW5nIFBDQSAyMDEwAhMzAAAFV8+Q3cfRwIiMAAAAAAVXMA0GCWCGSAFlAwQC # AQUAoIGuMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsx # DjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCAdhpszzPJKK7pPhpccCHLA # k+VRpuh1kCeHu0MvceMh8DBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBpAGMAcgBv # AHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3DQEB # AQUABIIBAGdHdC+fx1EIOM+KZ0Hr95nTvW7JVafbOelWbB4DG4UBK0DbiZ2x5tnC # SmY11cAtP7pIqBHhy28HAiMxHrwd1V6FRIxeqCnnqY13PJCs4SmcFpUNFwe7p+yX # 3xFKYa7p1DUf1b83qXqUT2a6PLD1C/pRbIPRPhY6rjuKu1wkNADYo4m3gGUdEabz # 3L1rYEkKwAxKfidED63a8dUOvWLLt/vhUPB19Wrr2QxfYWWDUSixwMDySZNZp4Rv # 7XYQnfuKeXpB11ioLY5RO3SRvDSRVhuS+38yIGafjrOuCckAMozBySpAzKNI7nkH # iDcYQbKp3YnFw9JC0+xffqQtRCKJ/duhgheXMIIXkwYKKwYBBAGCNwMDATGCF4Mw # ghd/BgkqhkiG9w0BBwKgghdwMIIXbAIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBUgYL # KoZIhvcNAQkQAQSgggFBBIIBPTCCATkCAQEGCisGAQQBhFkKAwEwMTANBglghkgB # ZQMEAgEFAAQgpGp7jigFTi78viGl4i5ZAbm5kGxuOLTXNy/xVcwzmHsCBmXN9Ybp # oRgTMjAyNDAyMjcxMzQ5MTEuMDI0WjAEgAIB9KCB0aSBzjCByzELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFt # ZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # oIIR7TCCByAwggUIoAMCAQICEzMAAAHs4CukgtCRUoAAAQAAAewwDQYJKoZIhvcN # AQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV # BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG # A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMjA2MTg0 # NTM4WhcNMjUwMzA1MTg0NTM4WjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9u # czEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYD # VQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEAsEf0bgk24MVFlZv1XbpdtrsHRGZtCKABbOqCK9/V # SvyLT/NHJ/vE5rT+u4mmweA5gCifRh+nSRoRDyaWOL0ykUjsK0TcVSCqDz3lBd3+ # FchxHKP7tUFGnZcA9d9jbmQsW54ejItpSxu6Q77M2ajBu0tzAotm5Np77RinXgCC # /h++4C+K9NU0lm+67BNiW9T/zemP1tQqg4tfyG9/80all7eM8b3SBnD40uGSskBB # d0hGQKuFyI4sqMDx2qjW2cXX9pFjv2o3X01PObfd+AlwIp29KPrkPSrWijS1VXDX # +UKUuH+vzLFzryBbgmDEXSg46Zr6MAHi/tY9u2wsQgaQ0B61pHz82af1/m7fQuxO # YTz+h1UaKgWEe7tYFH+RhKvua9RwNI2o59EOjr32HJBNB3Tr+ilmvrAJiRuzw702 # Wnu+4aJs8eiD6oIFaTWbgpO/Un1ZpyrvRefFAJ1OfE6gxxMxrEJzFECrLUt845+k # lNDSxBTQnrZbmipKlg0VSxFm7t9vSBId7alz138ukYf8Am8HvUgiSKKrQXsQaz8k # GANl2s9XyvcrE7MdJAPVdScFVeOCGvXPjMLQEerKinQIEaP27P17vILmvCw3uils # rve+HvZhlu2TvJ2qwxawE9RFxhw7nsoEir79iu8AfJQIDBiY+9wkL6/o6qFsMel3 # cnkCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBT0WtBHZP4r9cIWELFfFIBH+EyFhjAf # BgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQ # hk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQl # MjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBe # MFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2Nl # cnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAM # BgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQE # AwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAkrzEpDEq745Qz2oPAEW9DhawELUizA6T # dFGNxY7z4cBig664sZp7jH465lY0atbvCIZA7xhf2332xU6/iAJw0noPEwfc3xv+ # Mm5J7qKZJW3ho27ezC8aX4aJQhEchHNtDzGSic/Ur837jtZ+ca6yzi/JtJ5r+ZAX # L/stQFyeUHC4nJoXtiKd/w+uxHeqD6kCNN5g42GktTUIQTbbue8Dyl2dRKDU6AZP # GwOvN/cNdfW/mvVk6KiLJHURqD+cYwyL/pnNLwR4WRpCVb3yIZuAKfM6bQu8VQJc # tI3jr+XVBjAmIGY76E5oHeOW6gMLp3Zj5Rrq+3pXlmHnS0H+7Ny+fqn2mP8RIf/b # qNe0pzP4B1UhgM7563hoTqwdi7XSqFUnuS22KYoV3LQ3u+omLS/pocVzxKc3Wt2y # ZYT0zkNyjhGQKVREQaOcpbVozwlpV8cgqZeY4/Z2NJ33dO9W3pp6LvAN61Ga3YCi # GrrbB+0hzojnm2RqjbvuttrybWt3gGLAgGsQHAfQYiT5Wu12nfaq02HU+OVZQmE7 # QUmOKFUbHnUgA7/fY7/4mCABstWwsrbmtKP0Kr/Xqyps0Ak1TF2g3NuQ0y3DBia0 # bmtytMYr3bZ6AXsc1Sa+sl6jPgWtsISFUbxnK4gZCl9BSRXlu69vV1/pNHuA5xuo # gRykI3nOlTcwggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqG # SIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkg # MjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYT # AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD # VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBU # aW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKC # AgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4X # YDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTz # xXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7 # uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlw # aQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedG # bsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXN # xF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03 # dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9 # ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5 # UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReT # wDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZ # MBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8 # RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAE # VTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1p # Y3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAww # CgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQD # AgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb # 186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29t # L3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoG # CCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZI # hvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9 # MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2Lpyp # glYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OO # PcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8 # DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA # 0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1Rt # nWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjc # ZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq7 # 7EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJ # C4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328 # y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYID # UDCCAjgCAQEwgfmhgdGkgc4wgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx # JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpBNDAwLTA1RTAtRDk0NzElMCMGA1UE # AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA # jhz7YFXc/RFtIjzS/wV6iaKlTH+ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFt # cCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsFAAIFAOmIRa0wIhgPMjAyNDAyMjcxMTI3 # NDFaGA8yMDI0MDIyODExMjc0MVowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6YhF # rQIBADAKAgEAAgICDgIB/zAHAgEAAgIStDAKAgUA6YmXLQIBADA2BgorBgEEAYRZ # CgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0G # CSqGSIb3DQEBCwUAA4IBAQCVB5J5WO56rNFu+VcZ+HR0v6bvwfQ87625sJdavbrj # Zi8GQQybb08+BmY9Q4sn3jhfHJMxvDqOFLvCIcSY6p/VqGsRrKoqDiWtMRbvUzDH # An0ozm9Rhjws0q/LD9eNhEvyOL1mcf612avF+przXsYdoPcqx1lULxYlP1owcgy8 # rb0l6azE2zcU9AD9EKe82wlLUdDPBdyak850bUqTla2NA2P1Kvx2ftQDlU8r85ng # vSy5FYiV59c2wJtvD+K8yabCMJviQaUFAtf8VClgNgJJygKmZxL7fbnYv1lUycdJ # 6DHXbtoTvr075FBlvuLXOz5nFoszhNlwSDFVqo/2muFkMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHs4CukgtCRUoAAAQAA # AewwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQg2bDLaQBD5iAXJElTk5rgLohZQikW74KLwOt6vzbq # sm8wgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAnCeb1an03yIcdtUAQWysq # P8XIkCF2qDFlC3owBNUKgzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB7OArpILQkVKAAAEAAAHsMCIEIK+iYlwHL9W9kb0h9EWxVNkN # 1YfAXXRgPD3fwo6kW7fLMA0GCSqGSIb3DQEBCwUABIICAGumTse5EDZzpP7fAA1P # tbPGJnVfYY3bbTnuS1yXpB3jHnmyIQFRE7GZagp/wSqnAxnQIGlgBPPDyuyn7jTb # dDkXgkPYnIh9qQtXYA12JBngi6hBAmwbZS59swk3O5JObWr35DiV8mixJzZQF7tL # hDBYJjZoOfBqIhwP9XjfqHHIBdluUfb6xKApD8JgPJMa3/Kf3p1jJJFDFuz/OVKh # 2rBjnA9N3cddA4yPmv42EBIEVNVBKFi7x302HPqyyJI8ysNgKdAJm7qvIqAnaO7c # IHSgqS/DeeuaXAuZXWFHWZ83u2NQU3WUTpQB+HhaEQukHqL80YGRB98hsUdPcuKf # hlTVZ+eh5lbiyvpcDlIUDmWMCGOecMF5gwO6Z81QTnGRYpRa/i17lM/eS1zqRuNv # V3uNLKEKKNzFKH7WCH56GNfETx3ykFOP0/XhaOUnQiUYkJGCgbGO7RK7lJwfTnZj # Eh+PG8KPxLvI8WARLF0J31Rhe6MTjIV9Ck2etHZzBYVqsIRSbLVCuG2zUkTm7n9o # pmz7nbL605n8P/tQtZffKBsBwyP6i96vRg4gSh9YDy4YMrRu495r6Wu13u7AAYbf # QvMqoC6R/RfD+1t0M8hAA8G/DOFee5DEa27FVE84+TrEN7+EnEd8zCR7VCXaQauF # A1oHEb8rOLafEctrXanmm+2c # SIG # End signature block
combined_dataset/train/non-malicious/Save-Credentials_2.ps1
Save-Credentials_2.ps1
<# .SYNOPSIS The script saves a username and password, encrypted with a custom key to to a file. .DESCRIPTION The script saves a username and password, encrypted with a custom key to to a file. The key is coded into the script but should be changed before use. The key allows the password to be decrypted by any user who has the key, on any machine. if the key parameter is omitted from ConvertFrom-SecureString, only the user who generated the file on the computer that generated the file can decrypt the password. see http://bsonposh.com/archives/254 for more info. To retrieve the password: $key = [byte]57,86,59,11,72,75,18,52,73,46,0,21,56,76,47,12 $VCCred = Import-Csv 'C:\\PATH\\FILE.TXT' $VCCred.Password = ($VCCred.Password| ConvertTo-SecureString -Key $key) $VCCred = (New-Object -typename System.Management.Automation.PSCredential -ArgumentList $VCCred.Username,$VCCred.Password) .NOTES File Name : SaveCredentials.ps1 Author : Samuel Mulhearn Version History: Version 1.0 28 Jun 2012. Release .LINK http://poshcode.org/3485 .EXAMPLE Call the script with .\\Save-Credentials.ps1 no arguments or parameters are required #> $key = [byte]57,86,59,11,72,75,18,52,73,46,0,21,56,76,47,12 Write-Host "Key length is:" $key.length "The key length is acceptable if 16 or 32" Write-Host "This script saves a username and password into a file" Write-Host "Select an output file:" [System.Reflection.Assembly]::LoadWithPartialName("System.windows.forms") |Out-Null $SaveFileDialog = New-Object System.Windows.Forms.SaveFileDialog $SaveFileDialog.initialDirectory = $initialDirectory $SaveFileDialog.filter = "All files (*.*)| *.*" $SaveFileDialog.ShowDialog() | Out-Null $OutFile = $SaveFileDialog.filename $null | Out-File -FilePath $Outfile $credential = Get-Credential #| ConvertFrom-SecureString -Key $key) $obj = New-Object -typename System.Object $obj | Add-Member -MemberType noteProperty -name Username -value $credential.UserName $obj | Add-Member -MemberType noteProperty -name Password -value ($credential.Password | ConvertFrom-SecureString -key $key) $obj | Export-Csv -Path $OutFile write-host "Username and password have been saved to $outfile"
combined_dataset/train/non-malicious/sample_48_70.ps1
sample_48_70.ps1
# Localized PlasterResources.psd1 ConvertFrom-StringData @' ###PSLOC DestPath_F1=Destination path: {0} ErrorFailedToLoadStoreFile_F1=Failed to load the default value store file: '{0}'. ErrorProcessingDynamicParams_F1=Failed to create dynamic parameters from the template's manifest file. Template-based dynamic parameters will not be available until the error is corrected. The error was: {0} ErrorTemplatePathIsInvalid_F1=The TemplatePath parameter value must refer to an existing directory. The specified path '{0}' does not. ErrorUnencryptingSecureString_F1=Failed to unencrypt value for parameter '{0}'. ErrorPathDoesNotExist_F1=Cannot find path '{0}' because it does not exist. ErrorPathMustBeRelativePath_F2=The path '{0}' specified in the {1} directive in the template manifest cannot be an absolute path. Change the path to a relative path. ErrorPathMustBeUnderDestPath_F2=The path '{0}' must be under the specified DestinationPath '{1}'. ExpressionInvalid_F2=The expression '{0}' is invalid or threw an exception. Error: {1} ExpressionNonTermErrors_F2=The expression '{0}' generated error output - {1} ExpressionExecError_F2=PowerShell expression failed execution. Location: {0}. Error: {1} ExpressionErrorLocationFile_F2=<{0}> attribute '{1}' ExpressionErrorLocationModify_F1=<modify> attribute '{0}' ExpressionErrorLocationNewModManifest_F1=<newModuleManifest> attribute '{0}' ExpressionErrorLocationParameter_F2=<parameter> name='{0}', attribute '{1}' ExpressionErrorLocationRequireModule_F2=<requireModule> name='{0}', attribute '{1}' ExpressionInvalidCondition_F3=The Plaster manifest condition '{0}' failed. Location: {1}. Error: {2} InterpolationError_F3=The Plaster manifest attribute value '{0}' failed string interpolation. Location: {1}. Error: {2} FileConflict=Plaster file conflict ManifestFileMissing_F1=The Plaster manifest file '{0}' was not found. ManifestMissingDocElement_F2=The Plaster manifest file '{0}' is missing the document element. It should be specified as <plasterManifest xmlns="{1}"></plasterManifest>. ManifestMissingDocTargetNamespace_F2=The Plaster manifest file '{0}' is missing or has an invalid target namespace on the document element. It should be specified as <plasterManifest xmlns="{1}"></plasterManifest>. ManifestPlasterVersionNotSupported_F2=The template file '{0}' specifies a plasterVersion of {1} which is greater than the installed version of Plaster. Update the Plaster module and try again. ManifestSchemaInvalidAttrValue_F5=Invalid '{0}' attribute value '{1}' on '{2}' element in file '{3}'. Error: {4} ManifestSchemaInvalidCondition_F3=Invalid condition '{0}' in file '{1}'. Error: {2} ManifestSchemaInvalidChoiceDefault_F3=Invalid default attribute value '{0}' for parameter '{1}' in file '{2}'. The default value must specify a zero-based integer index that corresponds to the default choice. ManifestSchemaInvalidMultichoiceDefault_F3=Invalid default attribute value '{0}' for parameter '{1}' in file '{2}'. The default value must specify one or more zero-based integer indexes in a comma separated list that correspond to the default choices. ManifestSchemaInvalidRequireModuleAttrs_F2=The requireModule attribute 'requiredVersion' for module '{0}' in file '{1}' cannot be used together with either the 'minimumVersion' or 'maximumVersion' attribute. ManifestSchemaValidationError_F2=Plaster manifest schema error in file '{0}'. Error: {1} ManifestSchemaVersionNotSupported_F2=The template's manifest schema version ({0}) in file '{1}' requires a newer version of Plaster. Update the Plaster module and try again. ManifestErrorReading_F1=Error reading Plaster manifest: {0} ManifestNotValid_F1=The Plaster manifest '{0}' is not valid. ManifestNotValidVerbose_F1=The Plaster manifest '{0}' is not valid. Specify -Verbose to see the specific schema errors. ManifestNotWellFormedXml_F2=The Plaster manifest '{0}' is not a well-formed XML file. {1} ManifestWrongFilename_F1=The Plaster manifest filename '{0}' is not valid. The value of the Path argument must refer to a file named 'plasterManifest.xml' or 'plasterManifest_<culture>.xml'. Change the Plaster manifest filename and then try again. MissingParameterPrompt_F1=<Missing prompt value for parameter '{0}'> NewModManifest_CreatingDir_F1=Creating destination directory for module manifest: {0} OpConflict=Conflict OpCreate=Create OpForce=Force OpIdentical=Identical OpMissing=Missing OpModify=Modify OpUpdate=Update OpVerify=Verify OverwriteFile_F1=Overwrite {0} ParameterTypeChoiceMultipleDefault_F1=Parameter name {0} is of type='choice' and can only have one default value. RequireModuleVerified_F2=The required module {0}{1} is already installed. RequireModuleMissing_F2=The required module {0}{1} was not found. RequireModuleMinVersion_F1=minimum version: {0} RequireModuleMaxVersion_F1=maximum version: {0} RequireModuleRequiredVersion_F1=required version: {0} ShouldCreateNewPlasterManifest=Create Plaster manifest ShouldProcessCreateDir=Create directory ShouldProcessExpandTemplate=Expand template file ShouldProcessNewModuleManifest=Create new module manifest TempFileOperation_F1={0} into temp file before copying to destination TempFileTarget_F1=temp file for '{0}' TestPlasterNoXmlSchemaValidationWarning=The version of .NET Core that PowerShell is running on does not support XML schema-based validation. Test-PlasterManifest will operate in "limited validation" mode primarily verifying the specified manifest file is well-formed XML. For full, XML schema-based validation, run this command on Windows PowerShell. UnrecognizedParametersElement_F1=Unrecognized manifest parameters child element: {0}. UnrecognizedParameterType_F2=Unrecognized parameter type '{0}' on parameter name '{1}'. UnrecognizedContentElement_F1=Unrecognized manifest content child element: {0}. ###PSLOC '@ # SIG # Begin signature block # MIIr5AYJKoZIhvcNAQcCoIIr1TCCK9ECAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBztQmdoKGTvdyv # wtUQVqO4mor3UUoF0uu6xvq1MrHxGKCCEW4wggh+MIIHZqADAgECAhM2AAAB33OB # lxa+Mv0NAAIAAAHfMA0GCSqGSIb3DQEBCwUAMEExEzARBgoJkiaJk/IsZAEZFgNH # QkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxFTATBgNVBAMTDEFNRSBDUyBDQSAwMTAe # Fw0yNDAxMjAwMTMzNDRaFw0yNTAxMTkwMTMzNDRaMCQxIjAgBgNVBAMTGU1pY3Jv # c29mdCBBenVyZSBDb2RlIFNpZ24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK # AoIBAQDVucAmkbIWpspYysyydQyyRh2L8q5igYFcy2vDk8xGvVMRBhxwbOsJIEd0 # wY8N7WU/xgkYMnSsM4vmc2B49DGdrAjSJqbsx0zf+DLFjrBITUecdRhlq0VKGX8U # bVOkg0aIfFNLRs4DSrCZYh26zyB8qkL/jUmB7DhcBEhhgOlXRQ4LHnUv7qf+iXqD # uwFz9tUTAh8JGsgLRBK0oSsRfUB+FJF2KyUxzmeFXJKiEynsWz4kqoM91ag1Yw0U # 8d0e+RgAKi3Ft1cXA+3qKM6I1H11e/NdIjh7oThvrBtfEngwlwbTF3KZOHdhLBFZ # 18U4v8VeTlb4r94346CY2+SKnQa7AgMBAAGjggWKMIIFhjApBgkrBgEEAYI3FQoE # HDAaMAwGCisGAQQBgjdbAQEwCgYIKwYBBQUHAwMwPQYJKwYBBAGCNxUHBDAwLgYm # KwYBBAGCNxUIhpDjDYTVtHiE8Ys+hZvdFs6dEoFgg93NZoaUjDICAWQCAQ4wggJ2 # BggrBgEFBQcBAQSCAmgwggJkMGIGCCsGAQUFBzAChlZodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F # JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDEu # YW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUy # MDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDIuYW1lLmdibC9haWEv # QlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBS # BggrBgEFBQcwAoZGaHR0cDovL2NybDMuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAx # LkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZG # aHR0cDovL2NybDQuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F # JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDCBrQYIKwYBBQUHMAKGgaBsZGFwOi8vL0NO # PUFNRSUyMENTJTIwQ0ElMjAwMSxDTj1BSUEsQ049UHVibGljJTIwS2V5JTIwU2Vy # dmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1BTUUsREM9R0JM # P2NBQ2VydGlmaWNhdGU/YmFzZT9vYmplY3RDbGFzcz1jZXJ0aWZpY2F0aW9uQXV0 # aG9yaXR5MB0GA1UdDgQWBBSO7i0qme7tjtjFjyuIjlmGM6cbCTAOBgNVHQ8BAf8E # BAMCB4AwRQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEWMBQGA1UEBRMNMjM2MTY3KzUwMTk3MDCCAeYGA1UdHwSCAd0wggHZMIIB # 1aCCAdGgggHNhj9odHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ1JM # L0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwxLmFtZS5nYmwv # Y3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwyLmFtZS5n # YmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwzLmFt # ZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmw0 # LmFtZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGgb1sZGFwOi8v # L0NOPUFNRSUyMENTJTIwQ0ElMjAwMSgyKSxDTj1CWTJQS0lDU0NBMDEsQ049Q0RQ # LENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZp # Z3VyYXRpb24sREM9QU1FLERDPUdCTD9jZXJ0aWZpY2F0ZVJldm9jYXRpb25MaXN0 # P2Jhc2U/b2JqZWN0Q2xhc3M9Y1JMRGlzdHJpYnV0aW9uUG9pbnQwHwYDVR0jBBgw # FoAUllGE4Gtve/7YBqvD8oXmKa5q+dQwHwYDVR0lBBgwFgYKKwYBBAGCN1sBAQYI # KwYBBQUHAwMwDQYJKoZIhvcNAQELBQADggEBAJe/YXNSCoXitLf/X5pfJZpep3cs # jdqmBgg+8Kr++8XMjWwdm4tiLasJMUPCgmp5NYn3wC4GefGYwfF7Xm2FMSR2i6QU # HjigGu6BjdWQh4EwGaNqXLkXlUM7Ww2Z0KrRtpCL16DCOTNZuCFPAytSHFskPWrr # 6q3EBuiM6P5VLgFSKiAxcunldJorbrBrvZSZib1OINzFGAQszUR0ytovW6FOp+uo # VhiQCqnOheC1ppnZPss7vnXoogyO0xgSW40bRlltGfwnlOd3IZ/43ZOj5XeeShg5 # 2SzVEiyYrZjD17MSNzQM1JKI07+mtAC7D+eZ/+g2pM/91oHcrDq9Nq4QrS0wggjo # MIIG0KADAgECAhMfAAAAUeqP9pxzDKg7AAAAAABRMA0GCSqGSIb3DQEBCwUAMDwx # EzARBgoJkiaJk/IsZAEZFgNHQkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxEDAOBgNV # BAMTB2FtZXJvb3QwHhcNMjEwNTIxMTg0NDE0WhcNMjYwNTIxMTg1NDE0WjBBMRMw # EQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQD # EwxBTUUgQ1MgQ0EgMDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDJ # mlIJfQGejVbXKpcyFPoFSUllalrinfEV6JMc7i+bZDoL9rNHnHDGfJgeuRIYO1LY # /1f4oMTrhXbSaYRCS5vGc8145WcTZG908bGDCWr4GFLc411WxA+Pv2rteAcz0eHM # H36qTQ8L0o3XOb2n+x7KJFLokXV1s6pF/WlSXsUBXGaCIIWBXyEchv+sM9eKDsUO # LdLTITHYJQNWkiryMSEbxqdQUTVZjEz6eLRLkofDAo8pXirIYOgM770CYOiZrcKH # K7lYOVblx22pdNawY8Te6a2dfoCaWV1QUuazg5VHiC4p/6fksgEILptOKhx9c+ia # piNhMrHsAYx9pUtppeaFAgMBAAGjggTcMIIE2DASBgkrBgEEAYI3FQEEBQIDAgAC # MCMGCSsGAQQBgjcVAgQWBBQSaCRCIUfL1Gu+Mc8gpMALI38/RzAdBgNVHQ4EFgQU # llGE4Gtve/7YBqvD8oXmKa5q+dQwggEEBgNVHSUEgfwwgfkGBysGAQUCAwUGCCsG # AQUFBwMBBggrBgEFBQcDAgYKKwYBBAGCNxQCAQYJKwYBBAGCNxUGBgorBgEEAYI3 # CgMMBgkrBgEEAYI3FQYGCCsGAQUFBwMJBggrBgEFBQgCAgYKKwYBBAGCN0ABAQYL # KwYBBAGCNwoDBAEGCisGAQQBgjcKAwQGCSsGAQQBgjcVBQYKKwYBBAGCNxQCAgYK # KwYBBAGCNxQCAwYIKwYBBQUHAwMGCisGAQQBgjdbAQEGCisGAQQBgjdbAgEGCisG # AQQBgjdbAwEGCisGAQQBgjdbBQEGCisGAQQBgjdbBAEGCisGAQQBgjdbBAIwGQYJ # KwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMBIGA1UdEwEB/wQI # MAYBAf8CAQAwHwYDVR0jBBgwFoAUKV5RXmSuNLnrrJwNp4x1AdEJCygwggFoBgNV # HR8EggFfMIIBWzCCAVegggFToIIBT4YxaHR0cDovL2NybC5taWNyb3NvZnQuY29t # L3BraWluZnJhL2NybC9hbWVyb290LmNybIYjaHR0cDovL2NybDIuYW1lLmdibC9j # cmwvYW1lcm9vdC5jcmyGI2h0dHA6Ly9jcmwzLmFtZS5nYmwvY3JsL2FtZXJvb3Qu # Y3JshiNodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9hbWVyb290LmNybIaBqmxkYXA6 # Ly8vQ049YW1lcm9vdCxDTj1BTUVSb290LENOPUNEUCxDTj1QdWJsaWMlMjBLZXkl # MjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPUFNRSxE # Qz1HQkw/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNz # PWNSTERpc3RyaWJ1dGlvblBvaW50MIIBqwYIKwYBBQUHAQEEggGdMIIBmTBHBggr # BgEFBQcwAoY7aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL2NlcnRz # L0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6Ly9jcmwyLmFt # ZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6 # Ly9jcmwzLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUH # MAKGK2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQw # gaIGCCsGAQUFBzAChoGVbGRhcDovLy9DTj1hbWVyb290LENOPUFJQSxDTj1QdWJs # aWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9u # LERDPUFNRSxEQz1HQkw/Y0FDZXJ0aWZpY2F0ZT9iYXNlP29iamVjdENsYXNzPWNl # cnRpZmljYXRpb25BdXRob3JpdHkwDQYJKoZIhvcNAQELBQADggIBAFAQI7dPD+jf # XtGt3vJp2pyzA/HUu8hjKaRpM3opya5G3ocprRd7vdTHb8BDfRN+AD0YEmeDB5HK # QoG6xHPI5TXuIi5sm/LeADbV3C2q0HQOygS/VT+m1W7a/752hMIn+L4ZuyxVeSBp # fwf7oQ4YSZPh6+ngZvBHgfBaVz4O9/wcfw91QDZnTgK9zAh9yRKKls2bziPEnxeO # ZMVNaxyV0v152PY2xjqIafIkUjK6vY9LtVFjJXenVUAmn3WCPWNFC1YTIIHw/mD2 # cTfPy7QA1pT+GPARAKt0bKtq9aCd/Ym0b5tPbpgCiRtzyb7fbNS1dE740re0COE6 # 7YV2wbeo2sXixzvLftH8L7s9xv9wV+G22qyKt6lmKLjFK1yMw4Ni5fMabcgmzRvS # jAcbqgp3tk4a8emaaH0rz8MuuIP+yrxtREPXSqL/C5bzMzsikuDW9xH10graZzSm # PjilzpRfRdu20/9UQmC7eVPZ4j1WNa1oqPHfzET3ChIzJ6Q9G3NPCB+7KwX0OQmK # yv7IDimj8U/GlsHD1z+EF/fYMf8YXG15LamaOAohsw/ywO6SYSreVW+5Y0mzJutn # BC9Cm9ozj1+/4kqksrlhZgR/CSxhFH3BTweH8gP2FEISRtShDZbuYymynY1un+Ry # fiK9+iVTLdD1h/SxyxDpZMtimb4CgJQlMYIZzDCCGcgCAQEwWDBBMRMwEQYKCZIm # iZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQDEwxBTUUg # Q1MgQ0EgMDECEzYAAAHfc4GXFr4y/Q0AAgAAAd8wDQYJYIZIAWUDBAIBBQCgga4w # GQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisG # AQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKhUDRb4DdClaAqOokmd98Ucu32l/SqA # lm+TFmpt1oTDMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYA # dKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEA # jvh58LdkJQHvPfnp+eKORi+GuKJvU2qEWwsDJdIpc9UCaGrZn78wWFYxUnsvtU7p # Xhk8hrIZ6+9DEqu1wE7IctjRmdBJCuNPgFMTW2rU+thqJJkWkzdvAx31KLa0oogi # 37bQex00qiAwF+w28GIwkzTbXnp/gwYfsR6XYRaQa+BnNl0XcZv/zhduHyoEj/HH # CZdVKm3XCb3TkI3CU7JZ1iGdptrTHFvF3kDVO6h8WLXhUJwDi1z+9dmy9L5+36vr # fbY1MOYBgCciq70L87MKz3fCkIJpf8TUPn3r29c8vTigldx+srPPeNR92RePrvXI # r0oqKxSbBEr0elQkOF4l2KGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCCF3wGCSqG # SIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0B # CRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUA # BCDwoNzJXaTY/i04VAo0xh8efclbA17ycuxmS6xmzkb3rgIGZfLh3Qr3GBMyMDI0 # MDQwMzIxMzQwNC44NzlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBP # cGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5 # NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHqMIIH # IDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAABAAAB7DANBgkqhkiG9w0BAQsFADB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1MzhaFw0y # NTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYD # VQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4IC # DwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22uwdEZm0IoAFs6oIr39VK/ItP80cn # +8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4VyHEco/u1 # QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+H77gL4r0 # 1TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3SEZAq4XI # jiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAinb0o+uQ9KtaKNLVVcNf5QpS4f6/M # sXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5hPP6HVRoq # BYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZae77homzx # 6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDHEzGsQnMUQKstS3zjn6SU0NLEFNCe # tluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQYA2Xaz1fK # 9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu974e9mGW # 7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgMGJj73CQvr+jqoWwx6XdyeQIDAQAB # o4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1whYQsV8UgEf4TIWGMB8GA1UdIwQY # MBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6 # Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUt # U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYB # BQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj # cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB # /wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0G # CSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0UY3FjvPh # wGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbFTr+IAnDSeg8TB9zfG/4ybknuopkl # beGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv+y1AXJ5Q # cLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhBNtu57wPKXZ1EoNToBk8bA6839w11 # 9b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0jeOv5dUG # MCYgZjvoTmgd45bqAwundmPlGur7eleWYedLQf7s3L5+qfaY/xEh/9uo17SnM/gH # VSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe76iYtL+mhxXPEpzda3bJlhPTOQ3KO # EZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd071bemnou8A3rUZrdgKIautsH7SHO # iOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla7Xad9qrTYdT45VlCYTtBSY4oVRse # dSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRua3K0xivd # tnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJFeW7r29XX+k0e4DnG6iBHKQjec6V # NzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQEL # BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNV # BAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4X # DTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzAR # BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p # Y3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3Rh # bXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM # 57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm # 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzB # RMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBb # fowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCO # Mcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYw # XE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW # /aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/w # EPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPK # Z6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2 # BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfH # CBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYB # BAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v # BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYM # KwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEF # BQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBW # BgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUH # AQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtp # L2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsF # AAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518Jx # Nj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+ # iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2 # pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefw # C2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7 # T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFO # Ry3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhL # mm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3L # wUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5 # m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE # 0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNNMIICNQIB # ATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UE # CxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNy # b3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCOHPtgVdz9 # EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX # YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg # Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy # MDEwMA0GCSqGSIb3DQEBCwUAAgUA6be7PjAiGA8yMDI0MDQwMzExMjU1MFoYDzIw # MjQwNDA0MTEyNTUwWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpt7s+AgEAMAcC # AQACAgCFMAcCAQACAhPwMAoCBQDpuQy+AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwG # CisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEL # BQADggEBAGOEGg2aN3xyURELmw+L+GX8p2GLWI15sn26L5zZ1RCMYvrrEPzbIkBT # j1NL0yFvaXLZb68bd179ylRdRB49JdGqFq0JlXlDpduzp+W9aX4OsZcimqvnX/aV # v8vpwR0bkwQiF36Wlw3TXbw2aZdv/KnRY/COKkaoKxQxC9rgkNw5MLAx+GJfJFYx # lMwxRj+jQkox5WIar2zQ+etv9rPjBrUmC2eDaY7gc8q8+3N/aVk/bE/j6LWpX5d5 # zJSjmZLTCPvHFakF75DP7NBXDK6u3RQgxwqvcQBdP3SXpw0P72aW5NEI3EAbdjiL # caVi+qcCb/mHcVEsE/IQWfbRiTzLslgxggQNMIIECQIBATCBkzB8MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg # VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezgK6SC0JFSgAABAAAB7DANBglghkgB # ZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3 # DQEJBDEiBCBOFUqnLW6mNFInj2TvUhW3otNoJMHvGcLWECrZVcqK1jCB+gYLKoZI # hvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVqfTfIhx21QBBbKyo/xciQIXaoMWUL # ejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 # b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMA # AAHs4CukgtCRUoAAAQAAAewwIgQgKz3kSreOLui1ENgzHV9zHDupRYY2KLepgApY # ryRPCEkwDQYJKoZIhvcNAQELBQAEggIAZPmddtZiDDhYRtHK9KcgV2K5YwlYrt1L # 4uOF2ViSpt3PwaM0GBpzhkWXGrMR5EGnkU9sK/QH6sFreKT7oyZTr/UWiFEQtJ7f # AexaTacyq3ygYQLpdqGWLSQn6YXnPAuu6jlb5Os/u/3KLhZPQxeboR7ZmCC0sDPY # 1/0nj9YdV6mr6BQhfiWNC4da9REHa0L8Bhkdbl231GhHSKaBkFk6GzFeVov0q8zN # hdqXYy4o4P7Biyvazsfc1vwRkk8siu1vKJ7oNUsNun1FJPJKlsJ5KuIIXHsM1slP # PY5AcycXZA3kEnJEviLMme0riLNi5Sz2nhQtffRoV8aWKJxd+cBoxaLspQAGW8Mm # sT+iUn7vtoEtU0RShrDb52y5xtCF6uy6Kv0P//DlnpLpcqwFL1srrIWe+UOBCuqA # VX6YqN84VGnb9UP6ppSXsqBMPDRib1R0TQrsJ3qfFj1xd+LKv26vAPPxd7+fvmIF # 0R7bd2L1tMSfzm+bReXiOo5N1CdlTrEg10XCnGCvbRBTefqhUQK1GuMDjO1Ptq4j # B9KF6Y1xmECcPdKxSX6rYeUSlEtPNhj3+dGrNt1Ah/YMAaruyqJwl+mhxsER9TnP # i38ctBR6lhtkImOYHCjIiGQmbZjksnc+VPYTd5qyti2EaBSHtxdO0fWApRx2UxMl # Hldyz3awg/4= # SIG # End signature block
combined_dataset/train/non-malicious/GPRS Online log_8.ps1
GPRS Online log_8.ps1
<# .SYNOPSIS Get-GprsTime (V4.0 Update for Windows 7 and allow time correction) (V4.2 'Interval' now incorporate previous 'FormatSpan' function) Check the total connect time of any GPRS SIM devices from a specified date. Use 'Get-Help .\\Get-GprsTime -full' to view Help for this script. .DESCRIPTION Display all the GPRS modem Event Log entries. While applications issued by the mobile phone manufacturers will invariably monitor only their own usage, this will show any logged GPRS activity, be it via PCMCIA, USB, mobile phone, etc. Use the -Verbose switch for some extra information if desired. A default value can be set with the -Monthly switch but can be temporarily overridden with any -Start value and deleted by entering an invalid date. Now uses .NET Parse to use any culture date input. Switches -M and -S cannot be used together. A Balloon prompt will be issued in the Notification area for the 5 days before the nominal month end. NOTE: this can effectively be suppressed by using a value higher than the SIM card term, ie something like -Account 90 for a 30 day card which will override the default setting. Define a function in $profile to set any permanent switches, for example to remove 1hour 15 minutes from the total each time. function GPRS { Invoke-Expression ".\\Get-GprsTime -Adjust 1:15:00- $args" } .EXAMPLE .\\Get-GprsTime.ps1 -Monthly 4/8/2011 This will set the default search date to start from 4/8/2011 and is used to reset the start date each month for the average 30/31 day SIM card. .EXAMPLE .\\Get-GprsTime.ps1 -Start 12/07/2009 -Account 100 -Verbose Search from 12/07/2011 and also show (Verbose) details for each session. The Account switch will override any balloon prompt near the SIM expiry date. .EXAMPLE .\\Get-GprsTime.ps1 5/9/2011 -v Search one day only and show session details. .EXAMPLE .\\Get-GprsTime.ps1 -Today Show all sessions for today. This always defaults to verbose output. .EXAMPLE .\\Get-GprsTime.ps1 -Debug This shows the first available Event Log record & confirms switch settings. (Note that it will probably not be the first 'RemoteAccess' or 'RasClient' record). .EXAMPLE .\\Get-GprsTime -Adjust 1:20:00 If the same SIM card is used on another computer then such times will have to be added here manually (this should be put in a function in $profile so that it will automatically be included - see example above). To remove an amount of time, just put a '-' sign after the desired figure. .NOTES A shorter total time than that actually used will result if the Event Log does not contain earlier dates; just increase the log size in such a case. The author can be contacted at www.SeaStarDevelopment.Bravehost.com and a (binary compiled) Module version of this procedure is included in the file Gprs3xxx.zip download there; the execution time of the module being about 10 times faster than this script. Use '(measure-Command {.\\Get-GprsTime}).TotalSeconds' to confirm the times. For the Event Log to record connect & disconnect events, the modem software should be set to RAS rather than NDIS if possible. #> Param ([String] $start, [alias("PERIOD")][string] $adjust, [String] $monthly, [Int] $account = 0, [Switch] $today, [Switch] $verbose, [Switch] $debug) Trap [System.Management.Automation.MethodInvocationException] { [Int]$line = $error[0].InvocationInfo.ScriptLineNumber [System.Media.SystemSounds]::Hand.Play() if ($line -eq 206) { Write-Warning "[$name] Current GPRS variable has been deleted." $monthly = "" [Environment]::SetEnvironmentVariable("GPRS",$monthly,"User") } else { Write-Warning "[$name] Date is missing or invalid $SCRIPT:form" } exit 1 } #Establish the Operating System...We only need to confirm XP here. #The result will be written to the 'out' variable '$osv'. function Get-OSVersion($computer,[ref]$osv) { $os = Get-WmiObject -class Win32_OperatingSystem -computerName $computer Switch -regex ($os.Version) { '^5\\.1\\.(\\d{1,4})$' { $osv.value = "xp" } #Find XP & variants. default { $osv.value = "unknown" } } } $osv = $null Get-OSVersion -computer 'localhost' -osv ([ref]$osv) if ($osv -eq 'xp') { $logname = 'System' $connEvent = 20158 $discEvent = 20159 $source = 'RemoteAccess' } else { #Treat As Vista or Windows 7. $logname = 'Application' $connEvent = 20225 $discEvent = 20226 $source = 'RasClient' } $entryType = 'Information' $logEntry = $null $oldest = Get-eventlog -LogName $logname | #Get the earliest Log record. Sort-Object TimeGenerated | Select-Object -first 1 if ($oldest.TimeGenerated) { $logEntry = "System Event records available from - $($oldest.TimeGenerated.ToLongDateString())" } $name = $myInvocation.MyCommand $newLine = "[$name] The switches -Start and -Monthly can only be used separately." if ($debug) { $DebugPreference = 'Continue' } if ($start -and $monthly) { [System.Media.SystemSounds]::Hand.Play() Write-Warning "$newLine" exit 1 } $SCRIPT:form = "" #In certain cases Culture & UICulture can be different and have been known to # return conflicting results regarding '-is [DateTime]' queries, etc. if ($Host.CurrentCulture -eq $Host.CurrentUICulture) { $SCRIPT:form = '-Use format mm/dd/year' [Int]$culture = "{0:%d}" -f [DateTime] "6/5/2009" #Returns local day. if ($culture -eq 6) { $SCRIPT:form = '-Use format dd/mm/year' } } $ErrorActionPreference = 'SilentlyContinue' $VerbosePreference = 'SilentlyContinue' $WarningPreference = 'Continue' $conn = $disc = $default = $print = $null $timeNow = [DateTime]::Now $total = $timeNow - $timeNow #Set initial value to 00:00:00. $insert = "since" if ($verbose) { $VerbosePreference = 'Continue' } function CreditMsg ($value, $value2) { $value = [Math]::Abs($value) $prefix = "CURRENT" [DateTime] $creditDT = $value2 $creditDT = $creditDT.AddDays($value) #Add the -Account days. $thisDay = "{0:M/d/yyyy}" -f [DateTime]::Now #Force US format. #If we use '$number = $creditDT - (Get-Date)' instead of the line below we #can sometimes get a value of 1 returned instead 2, hence the above lines. $number = $creditDT - [DateTime] $thisDay [String] $credit = $creditDT $credit = $credit.Replace('00:00:00','') #Remove any trailing time. $credit = "{0:d}" -f [DateTime]$credit Switch($number.Days) { 1 {$prefix = "($value days) will expire tomorrow"; break} 0 {$prefix = "($value days) will expire today"; break} -1 {$prefix = "($value days) expired yesterday"; break} {($_ -lt 0)} {$prefix = "($value days) expired on $credit"; break} {($_ -le 5)} {$prefix = "($value days) will expire on $credit"} Default {$prefix = "CURRENT"} #Only come here if over 5 days. } return $prefix } function Interval ([String] $value) { #Convert returns of '1.11:00:00'. Switch -regex ($value) { '^00?:00?:\\d+(.*)$' {$suffix = "seconds"; break} '^00?:\\d+:\\d+(.*)$' {$suffix = "minutes"; break} '^\\d+:\\d+:\\d+(.*)$' {$suffix = " hours"; break} '^(\\d+)\\.(\\d+)(\\D.*)$' {$suffix = " hours" $pDays = $matches[1] $pHours = $matches[2] [string]$pRest = $matches[3] [string]$tHours = (([int]$pDays) * 24)+[int]$pHours $value = $tHours + $pRest; break} default {$suffix = " hours"} #Should never come here! } return "$value $suffix" } function CheckSetting ($value) { if ($value) { #Correct for local culture. $print = $default.ToShortDateString() } else { $print = "(Value not set)" } return $print } #The Script effectively starts here............................................. $getGprs = [Environment]::GetEnvironmentVariable("GPRS","User") #First check for GPRS variable and change from US date format to current locale. if ([DateTime]::TryParse($getGprs, [Ref]$timeNow)) { #No error as date is valid. $default = "{0:d}" -f [datetime]$getGprs $default = [DateTime]::Parse($default) $checkParts = "{0:yyyy},{0:%M}" -f $default $times = $checkParts.Split(',') $dayCount = [DateTime]::DaysInMonth($times[0],$times[1]) #Range 28-31. if($account -eq 0) { $account = $dayCount $summary = "$($dayCount.ToString()) days" } else { $summary = "$($account.Tostring()) days" } $text = CreditMsg $account $getGprs #Check if within 5 days of expiry date. if ($text -ne "CURRENT") { [void] [System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms") $objNotifyIcon = New-Object System.Windows.Forms.NotifyIcon $objNotifyIcon.Icon = [System.Drawing.SystemIcons]::Exclamation $objNotifyIcon.BalloonTipIcon = "Info" $objNotifyIcon.BalloonTipTitle = "GPRS online account" $objNotifyIcon.BalloonTipText = "Credit $text" $objNotifyIcon.Visible = $True $objNotifyIcon.ShowBalloonTip(10000) } } else { $summary = "(Days not set)" if ((!$today) -and (!$monthly) -and (!$start)) { [System.Media.SystemSounds]::Hand.Play() Write-Warning("Monthly date is either invalid or not set.") exit 1 } } if ($start) { $start = [DateTime]::Parse($start) #Trigger TRAP if invalid! [DateTime]$limit = $start $convert = "{0:D}" -f $limit $print = CheckSetting $default } if ($monthly) { $start = [DateTime]::Parse($monthly) #Trigger TRAP if invalid! Write-Output "Setting GPRS (monthly) environment variable to: $monthly" $gprs = [String]$start.Replace('00:00:00','') [Environment]::SetEnvironmentVariable("GPRS",$gprs,"User") [DateTime] $limit = $start #Change to required US date format. $convert = "{0:D}" -f $limit $print = $limit.ToShortDateString() $summary = "(Days undetermined)" #Will show next time around. } if ($today) { $verBosePreference = 'Continue' #Show VERBOSE by default. [DateTime] $limit = (Get-Date) $convert = "{0:D}" -f $limit $limit = $limit.Date #Override any start date if using -Today input. $insert = "for today" $print = CheckSetting $default } if ((!$today) -and (!$monthly) -and (!$start)) { if ($default) { $monthly = $default [DateTime] $limit = $monthly $convert = "{0:D}" -f $limit $print = CheckSetting $default } } $adjustment = $null #Otherwise 'Set-Strictmode -Version latest' will catch. if ($adjust) { $pattern = '^(\\d{1,3}):(\\d{1,2}):(\\d{1,2})-?$' if ($adjust -notmatch $pattern ) { Write-Warning "Invalid format - use <hours>:<minutes>:<seconds>" return } #Now create the 'adjustment' to add later. $adjustment = New-TimeSpan -hours $matches[1] -minutes $matches[2] -seconds $matches[3] $outString = $adjust.Replace('-','') $outString = interval $outString } Write-Verbose "All records $($insert.Replace('for ','')) - $convert" Write-Verbose "Script activation - User [$($env:UserName)] Computer [$($env:ComputerName)]" Write-Output "" Write-Output "Calculating total connect time of all GPRS modem devices..." #We cannot proceed beyond here without a valid $limit value. Write-Debug "Using - [Search date] $($limit.ToShortDateString()) [Account] $summary [GPRS Monthly] $print" if ($logEntry) { Write-Debug "$logEntry" } $lines = Get-EventLog $logname | Where-Object {($_.TimeGenerated -ge $limit) -and ` ($_.EventID -eq $discEvent -or $_.EventID -eq $connEvent)} if ($lines) { Write-Verbose "A total of $([Math]::Truncate($lines.Count/2)) online sessions extracted from the System Event Log." } else { Write-Output "(There are no events indicated in the System Event Log)" } $lines | ForEach-Object { try { $source = $_.Source } catch { return } if ($_.EventID -eq $discEvent) { #Event 20159 is Disconnect. $disc = $_.TimeGenerated } else { #Event 20158 is Connect. $conn = $_.TimeGenerated } #We are only interested in matching pairs of DISC/CONN... if ($disc -ne $null -and $conn -ne $null -and $disc -gt $conn) { $diff = $disc - $conn $total += $diff $convDisc = "{0:G}" -f $disc $convConn = "{0:G}" -f $conn $period = Interval $diff Write-Verbose "Disconnect at $convDisc. Online - $period" Write-Verbose " Connect at $convConn." } } #End ForEach if (!$source) { $source = '(Undetermined)' } Write-Verbose "Using local event source - System Event Log [$source]" $period = Interval $total if ($adjustment -and ($total -match $pattern)) { $outDate = New-TimeSpan -hours $matches[1] -minutes $matches[2] -seconds $matches[3] if (!$adjust.EndsWith('-')) { $period = $outDate + $adjustment #The '-adjust' value added at start. $temp = [String]$period #Extract any 1.0:00:00 values if + 24 hours. Write-Debug "Processing (Timespan) string: $temp" $show = (interval $temp).Replace(' ',' ') Write-Output "Total online usage $insert $convert is $show" Write-Output "(Including $($outString.Replace(' ',' ')) adjustment time)" } else { if ($outDate.TotalSeconds -gt $adjustment.TotalSeconds) { $period = $outDate - $adjustment $temp = [String]$period Write-Debug "Processing (Timespan) string: $temp" $show = (interval $temp).Replace(' ',' ') Write-Output "Total online usage $insert $convert is $show" Write-Output "(Excluding $($outString.Replace(' ',' ')) adjustment time)" } else { Write-Output "Total online usage $insert $convert is $($period.ToString().Replace(' ',' '))." $adjust = $adjust.Replace('-','') Write-Warning "Invalid amount entered ($adjust) - no adjustment performed" } } } else { Write-OutPut "Total online usage $insert $convert is $($period.ToString().Replace(' ',' '))." } Write-Output ""
combined_dataset/train/non-malicious/Run-Query (SharePoint)_3.ps1
Run-Query (SharePoint)_3.ps1
function Run-Query($siteUrl, $queryText) { [reflection.assembly]::loadwithpartialname("microsoft.sharePOint") | out-null [reflection.assembly]::loadwithpartialname("microsoft.office.server") | out-null [reflection.assembly]::loadwithpartialname("microsoft.office.server.search") | out-null $s = [microsoft.sharepoint.spsite]$siteUrl $q = new-object microsoft.office.server.search.query.fulltextsqlquery -arg $s $q.querytext = $queryText $q.RowLimit = 100 $q.ResultTypes = "RelevantResults" $dt = $q.Execute() $r = $dt["RelevantResults"] $output = @() while ($r.Read()) { $o = new-object PSObject 0..($r.FieldCount-1) | foreach { add-member -inputObject $o -memberType "NoteProperty" -name $r.GetName($_) -value $r[$_].ToString() } $output += $o } return $output } @@ @@ @@#Sample usage: @@#Run-Query -siteUrl "http://dev/" -queryText "SELECT PreferredName, WorkPhone FROM SCOPE() WHERE PreferredName LIKE '%JIM%'" @@# @@#
combined_dataset/train/non-malicious/2222.ps1
2222.ps1
[CmdletBinding(SupportsShouldProcess=$true)] param( [parameter(Mandatory=$true, HelpMessage="Site server where the SMS Provider is installed")] [ValidateScript({Test-Connection -ComputerName $_ -Count 1 -Quiet})] [ValidateNotNullOrEmpty()] [string]$SiteServer, [parameter(Mandatory=$true, HelpMessage="Select an option to clean either ExpiredOnly, SupersededOnly or ExpiredSuperseded Software Updates from each Software Update Group")] [ValidateNotNullOrEmpty()] [ValidateSet("ExpiredOnly","SupersededOnly","ExpiredSuperseded")] [string]$Option, [parameter(Mandatory=$false, HelpMessage="Remove the content for those Software Updates that will be removed from a Software Upgrade Group")] [ValidateNotNullOrEmpty()] [switch]$RemoveContent, [parameter(Mandatory=$false, HelpMessage="Show a progressbar displaying the current operation")] [ValidateNotNullOrEmpty()] [switch]$ShowProgress ) Begin { try { Write-Verbose "Determining Site Code for Site server: '$($SiteServer)'" $SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer -ErrorAction Stop foreach ($SiteCodeObject in $SiteCodeObjects) { if ($SiteCodeObject.ProviderForLocalSite -eq $true) { $SiteCode = $SiteCodeObject.SiteCode Write-Verbose -Message "Site Code: $($SiteCode)" } } } catch [System.UnauthorizedAccessException] { Write-Warning -Message "Access denied" ; break } catch [System.Exception] { Write-Warning -Message "Unable to determine Site Code" ; break } $ErrorActionPreference = "Stop" if ($PSBoundParameters["ShowProgress"]) { $ProgressCount = 0 } } Process { try { $StartTime = [Diagnostics.Stopwatch]::StartNew() $SUGResults = (Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_AuthorizationList -ComputerName $SiteServer -ErrorAction SilentlyContinue | Measure-Object).Count if ($SUGResults -ge 1) { switch ($Option) { "ExpiredOnly" { $Query = "SELECT SU.CI_ID FROM SMS_SoftwareUpdate AS SU JOIN SMS_CIRelation AS CIR ON SU.CI_ID = CIR.ToCIID WHERE CIR.RelationType = 1 AND SU.IsExpired = 1 AND SU.IsSuperseded = 0" } "SupersededOnly" { $Query = "SELECT SU.CI_ID FROM SMS_SoftwareUpdate AS SU JOIN SMS_CIRelation AS CIR ON SU.CI_ID = CIR.ToCIID WHERE CIR.RelationType = 1 AND SU.IsExpired = 0 AND SU.IsSuperseded = 1" } "ExpiredSuperseded" { $Query = "SELECT SU.CI_ID FROM SMS_SoftwareUpdate AS SU JOIN SMS_CIRelation AS CIR ON SU.CI_ID = CIR.ToCIID WHERE CIR.RelationType = 1 AND SU.IsExpired = 1 AND SU.IsSuperseded = 1" } } try { $RemovableUpdates = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Query $Query -ComputerName $SiteServer -ErrorAction Stop $RemovableUpdatesList = New-Object -TypeName System.Collections.ArrayList foreach ($RemovableUpdate in $RemovableUpdates) { $RemovableUpdatesList.Add($RemovableUpdate.CI_ID) | Out-Null } } catch [System.Exception] { Write-Warning -Message "Unable to determine removable Software Updates from selected option" } $AuthorizationLists = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_AuthorizationList -ComputerName $SiteServer -ErrorAction Stop foreach ($AuthorizationList in $AuthorizationLists) { Write-Verbose -Message "Start processing '$($AuthorizationList.LocalizedDisplayName)'" if ($PSBoundParameters["ShowProgress"]) { $ProgressCount++ } Write-Progress -Activity "Processing Software Updates Groups" -Id 1 -Status "$($ProgressCount) / $($SUGResults)" -CurrentOperation "Current Software Update Group: '$($AuthorizationList.LocalizedDisplayName)'" -PercentComplete (($ProgressCount / $SUGResults) * 100) $AuthorizationList = [wmi]"$($AuthorizationList.__PATH)" $UpdatesCount = $AuthorizationList.Updates.Count $UpdatesList = New-Object -TypeName System.Collections.ArrayList $RemovedUpdatesList = New-Object -TypeName System.Collections.ArrayList foreach ($Update in ($AuthorizationList.Updates)) { if ($Update -notin $RemovableUpdatesList) { $UpdatesList.Add($Update) | Out-Null } else { $RemovedUpdatesList.Add($Update) | Out-Null } } if ($UpdatesCount -gt $UpdatesList.Count) { try { if ($PSCmdlet.ShouldProcess("$($AuthorizationList.LocalizedDisplayName)","Clean '$($UpdatesCount - ($UpdatesList.Count))' updates")) { $AuthorizationList.Updates = $UpdatesList $AuthorizationList.Put() | Out-Null Write-Verbose -Message "Successfully cleaned up $($UpdatesCount - ($UpdatesList.Count)) updates from '$($AuthorizationList.LocalizedDisplayName)'" } if ($PSBoundParameters["RemoveContent"]) { try { $DeploymentPackageList = New-Object -TypeName System.Collections.ArrayList foreach ($CI_ID in $RemovedUpdatesList) { Write-Verbose -Message "Collecting content data for CI_ID: $($CI_ID)" $ContentQuery = "SELECT SMS_PackageToContent.ContentID,SMS_PackageToContent.PackageID from SMS_PackageToContent JOIN SMS_CIToContent ON SMS_CIToContent.ContentID = SMS_PackageToContent.ContentID WHERE SMS_CIToContent.CI_ID IN ($($CI_ID))" $ContentData = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Query $ContentQuery -ComputerName $SiteServer -ErrorAction Stop Write-Verbose -Message "Found '$(($ContentData | Measure-Object).Count)' objects" foreach ($Content in $ContentData) { $ContentID = $Content | Select-Object -ExpandProperty ContentID $PackageID = $Content | Select-Object -ExpandProperty PackageID $DeploymentPackage = [wmi]"\\$($SiteServer)\root\SMS\site_$($SiteCode):SMS_SoftwareUpdatesPackage.PackageID='$($PackageID)'" if ($DeploymentPackage.PackageID -notin $DeploymentPackageList) { $DeploymentPackageList.Add($DeploymentPackage.PackageID) | Out-Null } if ($PSCmdlet.ShouldProcess("$($PackageID)","Remove ContentID '$($ContentID)'")) { Write-Verbose -Message "Attempting to remove ContentID '$($ContentID)' from PackageID '$($PackageID)'" $ReturnValue = $DeploymentPackage.RemoveContent($ContentID, $false) if ($ReturnValue.ReturnValue -eq 0) { Write-Verbose -Message "Successfully removed ContentID '$($ContentID)' from PackageID '$($PackageID)'" } } } } } catch [Exception] { Write-Warning -Message "An error occured when attempting to remove ContentID '$($ContentID)' from '$($PackageID)'" } } } catch [Exception] { Write-Warning -Message "Unable to save changes to '$($AuthorizationList.LocalizedDisplayName)'" ; break } } else { Write-Verbose -Message "No changes detected, will not update '$($AuthorizationList.LocalizedDisplayName)'" } if (($DeploymentPackageList.Count -ge 1) -and ($PSBoundParameters["RemoveContent"])) { foreach ($DPackageID in $DeploymentPackageList) { if ($PSCmdlet.ShouldProcess("$($DPackageID)","Refresh content source")) { $DPackage = [wmi]"\\$($SiteServer)\root\SMS\site_$($SiteCode):SMS_SoftwareUpdatesPackage.PackageID='$($DPackageID)'" Write-Verbose -Message "Attempting to refresh content source for Deployment Package '$($DPackage.Name)'" $ReturnValue = $DPackage.RefreshPkgSource() if ($ReturnValue.ReturnValue -eq 0) { Write-Verbose -Message "Successfully refreshed content source for Deployment Package '$($DPackage.Name)'" } } } } } } else { Write-Warning -Message "Unable to locate any Software Update Groups" } } catch [Exception] { Write-Error -Message $_.Exception.Message } } End { $ErrorActionPreference = "Continue" if ($PSBoundParameters["ShowProgress"]) { Write-Progress -Activity "Processing Software Update Groups" -Completed -ErrorAction SilentlyContinue } $StartTime.Stop() Write-Verbose -Message "Script execution: $($StartTime.Elapsed.Minutes) min and $($StartTime.Elapsed.Seconds) seconds" }
combined_dataset/train/non-malicious/sample_22_41.ps1
sample_22_41.ps1
# # Module manifest for module 'OCI.PSModules' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. # RootModule = '' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core', 'Desktop' # ID used to uniquely identify this module GUID = '5ee167f1-0abc-4d85-b9b3-6d354fcaaa35' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'Oracle Cloud Infrastructure (OCI) PowerShell Modules - Cmdlets to manage resources in OCI. For more information, please visit: https://docs.oracle.com/en-us/iaas/Content/API/SDKDocs/powershell.htm' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Accessgovernancecp'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Adm'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Aianomalydetection'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Aidocument'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Ailanguage'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Aispeech'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Aivision'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Analytics'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Announcementsservice'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Apigateway'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Apmconfig'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Apmcontrolplane'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Apmsynthetics'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Apmtraces'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Appmgmtcontrol'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Artifacts'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Audit'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Autoscaling'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Bastion'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Bds'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Blockchain'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Budget'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Capacitymanagement'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Certificates'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Certificatesmanagement'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Cims'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Cloudbridge'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Cloudguard'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Cloudmigrations'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Clusterplacementgroups'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Computecloudatcustomer'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Computeinstanceagent'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Containerengine'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Containerinstances'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Core'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Dashboardservice'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Database'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Databasemanagement'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Databasemigration'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Databasetools'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Datacatalog'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Dataflow'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Dataintegration'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Datalabelingservice'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Datalabelingservicedataplane'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Datasafe'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Datascience'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Desktops'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Devops'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Disasterrecovery'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Dns'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Dts'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Email'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Emaildataplane'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Emwarehouse'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Events'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Filestorage'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Fleetsoftwareupdate'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Functions'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Fusionapps'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Generativeai'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Generativeaiinference'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Genericartifactscontent'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Globallydistributeddatabase'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Goldengate'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Governancerulescontrolplane'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Healthchecks'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Identity'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Identitydataplane'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Identitydomains'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Integration'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Jms'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Jmsjavadownloads'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Keymanagement'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Licensemanager'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Limits'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Loadbalancer'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Lockbox'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Loganalytics'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Logging'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Loggingingestion'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Loggingsearch'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Managementagent'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Managementdashboard'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Marketplace'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Marketplacepublisher'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Mediaservices'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Monitoring'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Mysql'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Networkfirewall'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Networkloadbalancer'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Nosql'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Objectstorage'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Oce'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Ocicontrolcenter'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Ocvp'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Oda'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Onesubscription'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Ons'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Opa'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Opensearch'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Operatoraccesscontrol'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Opsi'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Optimizer'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Osmanagement'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Osmanagementhub'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Ospgateway'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Osubbillingschedule'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Osuborganizationsubscription'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Osubsubscription'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Osubusage'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Psql'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Queue'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Recovery'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Redis'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Resourcemanager'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Resourcesearch'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Rover'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Sch'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Secrets'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Servicecatalog'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Servicemanagerproxy'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Servicemesh'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Stackmonitoring'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Streaming'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Tenantmanagercontrolplane'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Threatintelligence'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Usage'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Usageapi'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Vault'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Vbsinst'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Visualbuilder'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Vnmonitoring'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Vulnerabilityscanning'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Waa'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Waas'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Waf'; RequiredVersion = '82.0.0'; }, @{ModuleName = 'OCI.PSModules.Workrequests'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module # RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = @() # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = '*' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/PowerShell CMatrix_1.ps1
PowerShell CMatrix_1.ps1
Set-StrictMode -off # # Module: PowerShell Console ScreenSaver Version 0.1 # Author: Oisin Grehan ( http://www.nivot.org ) # # A PowerShell CMatrix-style screen saver for true-console hosts. # # This will not work in Micrisoft's ISE, Quest's PowerGUI or other graphical hosts. # It should work fine in PowerShell+ from Idera which is a true console. # if ($host.ui.rawui.windowsize -eq $null) { write-warning "Sorry, I only work in a true console host like powershell.exe." throw } # # Console Utility Functions # function New-Size { param([int]$width, [int]$height) new-object System.Management.Automation.Host.Size $width,$height } function New-Rectangle { param( [int]$left, [int]$top, [int]$right, [int]$bottom ) $rect = new-object System.Management.Automation.Host.Rectangle $rect.left= $left $rect.top = $top $rect.right =$right $rect.bottom = $bottom $rect } function New-Coordinate { param([int]$x, [int]$y) new-object System.Management.Automation.Host.Coordinates $x, $y } function Get-BufferCell { param([int]$x, [int]$y) $rect = new-rectangle $x $y $x $y [System.Management.Automation.Host.buffercell[,]]$cells = $host.ui.RawUI.GetBufferContents($rect) $cells[0,0] } function Set-BufferCell { [outputtype([System.Management.Automation.Host.buffercell])] param( [int]$x, [int]$y, [System.Management.Automation.Host.buffercell]$cell ) $rect = new-rectangle $x $y $x $y # return previous get-buffercell $x $y # use "fill" overload with single cell rect $host.ui.rawui.SetBufferContents($rect, $cell) } function New-BufferCell { param( [string]$Character, [consolecolor]$ForeGroundColor = $(get-buffercell 0 0).foregroundcolor, [consolecolor]$BackGroundColor = $(get-buffercell 0 0).backgroundcolor, [System.Management.Automation.Host.BufferCellType]$BufferCellType = "Complete" ) $cell = new-object System.Management.Automation.Host.BufferCell $cell.Character = $Character $cell.ForegroundColor = $foregroundcolor $cell.BackgroundColor = $backgroundcolor $cell.BufferCellType = $buffercelltype $cell } function log { param($message) [diagnostics.debug]::WriteLine($message, "PS ScreenSaver") } # # Main entry point for starting the animation # function Start-CMatrix { param( [int]$maxcolumns = 8, [int]$frameWait = 100 ) $script:winsize = $host.ui.rawui.WindowSize $script:columns = @{} # key: xpos; value; column $script:framenum = 0 $prevbg = $host.ui.rawui.BackgroundColor $host.ui.rawui.BackgroundColor = "black" cls $done = $false while (-not $done) { Write-FrameBuffer -maxcolumns $maxcolumns Show-FrameBuffer sleep -milli $frameWait $done = $host.ui.rawui.KeyAvailable } $host.ui.rawui.BackgroundColor = $prevbg cls } # TODO: actually write into buffercell[,] framebuffer function Write-FrameBuffer { param($maxColumns) # do we need a new column? if ($columns.count -lt $maxcolumns) { # incur staggering of columns with get-random # by only adding a new one 50% of the time if ((get-random -min 0 -max 10) -lt 5) { # search for a column not current animating do { $x = get-random -min 0 -max ($winsize.width - 1) } while ($columns.containskey($x)) $columns.add($x, (new-column $x)) } } $script:framenum++ } # TODO: setbuffercontent with buffercell[,] framebuffer function Show-FrameBuffer { param($frame) $completed=@() # loop through each active column and animate a single step/frame foreach ($entry in $columns.getenumerator()) { $column = $entry.value # if column has finished animating, add to the "remove" pile if (-not $column.step()) { $completed += $entry.key } } # cannot remove from collection while enumerating, so do it here foreach ($key in $completed) { $columns.remove($key) } } function New-Column { param($x) # return a new module that represents the column of letters and its state # we also pass in a reference to the main screensaver module to be able to # access our console framebuffer functions. new-module -ascustomobject -name "col_$x" -script { param( [int]$startx, [PSModuleInfo]$parentModule ) $script:xpos = $startx $script:ylimit = $host.ui.rawui.WindowSize.Height [int]$script:head = 1 [int]$script:fade = 0 [int]$script:fadelen = [math]::Abs($ylimit / 3) $script:fadelen += (get-random -min 0 -max $fadelen) function Step { # reached the bottom yet? if ($head -lt $ylimit) { & $parentModule Set-BufferCell $xpos $head ( & $parentModule New-BufferCell -Character ` ([char](get-random -min 65 -max 122)) -Fore white) > $null & $parentModule Set-BufferCell $xpos ($head - 1) ( & $parentModule New-BufferCell -Character ` ([char](get-random -min 65 -max 122)) -Fore green) > $null $script:head++ } # time to start rendering the darker green "tail?" if ($head -gt $fadelen) { & $parentModule Set-BufferCell $xpos $fade ( & $parentModule New-BufferCell -Character ` ([char](get-random -min 65 -max 122)) -Fore darkgreen) > $null $script:fade++ } # are we done animating? if ($fade -lt $ylimit) { return $true } $false } Export-ModuleMember -function Step } -args $x, $executioncontext.sessionstate.module } function Start-ScreenSaver { # feel free to tweak maxcolumns and frame delay # currently 8 columns with 50ms wait Start-CMatrix -max 8 -frame 50 } function Register-Timer { # prevent prompt from reregistering if explicit disable if ($_ssdisabled) { return } if (-not (Test-Path variable:global:_ssjob)) { # register our counter job $global:_ssjob = Register-ObjectEvent $_sstimer elapsed -action { $global:_sscount++; $global:_sssrcid = $event.sourceidentifier # hit timeout yet? if ($_sscount -eq $_sstimeout) { # disable this event (prevent choppiness) Unregister-Event -sourceidentifier $_sssrcid Remove-Variable _ssjob -scope Global sleep -seconds 1 # start ss Start-ScreenSaver } } } } function Enable-ScreenSaver { if (-not $_ssdisabled) { write-warning "Screensaver is not disabled." return } $global:_ssdisabled = $false } function Disable-ScreenSaver { if ((Test-Path variable:global:_ssjob)) { $global:_ssdisabled = $true Unregister-Event -SourceIdentifier $_sssrcid Remove-Variable _ssjob -Scope global } else { write-warning "Screen saver is not enabled." } } function Get-ScreenSaverTimeout { new-timespan -seconds $global:_sstimeout } function Set-ScreenSaverTimeout { [cmdletbinding(defaultparametersetname="int")] param( [parameter(position=0, mandatory=$true, parametersetname="int")] [int]$Seconds, [parameter(position=0, mandatory=$true, parametersetname="timespan")] [Timespan]$Timespan ) if ($pscmdlet.parametersetname -eq "int") { $timespan = new-timespan -seconds $Seconds } if ($timespan.totalseconds -lt 1) { throw "Timeout must be greater than 0 seconds." } $global:_sstimeout = $timespan.totalseconds } # # Eventing / Timer Hooks, clean up and Prompt injection # # timeout [int]$global:_sstimeout = 180 # default 3 minutes # tick count [int]$global:_sscount = 0 # modify current prompt function to reset ticks counter to 0 and # to reregister timer, while saving for later on module onload $self = $ExecutionContext.SessionState.Module $function:global:prompt = $self.NewBoundScriptBlock( [scriptblock]::create( ("{0}`n`$global:_sscount = 0`nRegister-Timer" ` -f ($global:_ssprompt = gc function:prompt)))) # configure our timer $global:_sstimer = new-object system.timers.timer $_sstimer.Interval = 1000 # tick once a second $_sstimer.AutoReset = $true $_sstimer.start() # we start out disabled - use enable-screensaver $global:_ssdisabled = $true # arrange clean up on module remove $ExecutionContext.SessionState.Module.OnRemove = { # restore prompt $function:global:prompt = [scriptblock]::Create($_ssprompt) # kill off eventing subscriber, if one exists if ($_sssrcid) { Unregister-Event -SourceIdentifier $_sssrcid } # clean up timer $_sstimer.Dispose() # clear out globals remove-variable _ss* -scope global } Export-ModuleMember -function Start-ScreenSaver, Get-ScreenSaverTimeout, ` Set-ScreenSaverTimeout, Enable-ScreenSaver, Disable-ScreenSaver
combined_dataset/train/non-malicious/sample_43_20.ps1
sample_43_20.ps1
let pluginUrl = window.chrome.webview.hostObjects.sync.external.GetPluginUrl(); let scripts = [pluginUrl, "Scripts/common.eventHandlers.js", "Scripts/aspire.eventHandlers.js"]; let currentScriptElement = document.querySelector("script[src='Scripts/aspire.plugin.js']"); if (currentScriptElement !== null) { scripts.forEach(element => { let newScriptElement = document.createElement("script"); newScriptElement.setAttribute("src", element); newScriptElement.setAttribute("type", "text/javascript"); newScriptElement.async = false; currentScriptElement.parentNode.insertBefore(newScriptElement, currentScriptElement.nextSibling); currentScriptElement = newScriptElement; }); } // SIG // Begin signature block // SIG // MIInvQYJKoZIhvcNAQcCoIInrjCCJ6oCAQExDzANBglg // SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor // SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC // SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg // SIG // UxB0+L8e5mCO3kWXMDVZYdvMUiDr+vyn6eq4Ov+KTVKg // SIG // gg12MIIF9DCCA9ygAwIBAgITMwAAA68wQA5Mo00FQQAA // SIG // AAADrzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT // SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDkwMFoX // SIG // DTI0MTExNDE5MDkwMFowdDELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA // SIG // zkvLNa2un9GBrYNDoRGkGv7d0PqtTBB4ViYakFbjuWpm // SIG // F0KcvDAzzaCWJPhVgIXjz+S8cHEoHuWnp/n+UOljT3eh // SIG // A8Rs6Lb1aTYub3tB/e0txewv2sQ3yscjYdtTBtFvEm9L // SIG // 8Yv76K3Cxzi/Yvrdg+sr7w8y5RHn1Am0Ff8xggY1xpWC // SIG // XFI+kQM18njQDcUqSlwBnexYfqHBhzz6YXA/S0EziYBu // SIG // 2O2mM7R6gSyYkEOHgIGTVOGnOvvC5xBgC4KNcnQuQSRL // SIG // iUI2CmzU8vefR6ykruyzt1rNMPI8OqWHQtSDKXU5JNqb // SIG // k4GNjwzcwbSzOHrxuxWHq91l/vLdVDGDUwIDAQABo4IB // SIG // czCCAW8wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB // SIG // BQUHAwMwHQYDVR0OBBYEFEcccTTyBDxkjvJKs/m4AgEF // SIG // hl7BMEUGA1UdEQQ+MDykOjA4MR4wHAYDVQQLExVNaWNy // SIG // b3NvZnQgQ29ycG9yYXRpb24xFjAUBgNVBAUTDTIzMDAx // SIG // Mis1MDE4MjYwHwYDVR0jBBgwFoAUSG5k5VAF04KqFzc3 // SIG // IrVtqMp1ApUwVAYDVR0fBE0wSzBJoEegRYZDaHR0cDov // SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNybDBhBggr // SIG // BgEFBQcBAQRVMFMwUQYIKwYBBQUHMAKGRWh0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj // SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNydDAMBgNV // SIG // HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQCEsRbf // SIG // 80dn60xTweOWHZoWaQdpzSaDqIvqpYHE5ZzuEMJWDdcP // SIG // 72MGw8v6BSaJQ+a+hTCXdERnIBDPKvU4ENjgu4EBJocH // SIG // lSe8riiZUAR+z+z4OUYqoFd3EqJyfjjOJBR2z94Dy4ss // SIG // 7LEkHUbj2NZiFqBoPYu2OGQvEk+1oaUsnNKZ7Nl7FHtV // SIG // 7CI2lHBru83e4IPe3glIi0XVZJT5qV6Gx/QhAFmpEVBj // SIG // SAmDdgII4UUwuI9yiX6jJFNOEek6MoeP06LMJtbqA3Bq // SIG // +ZWmJ033F97uVpyaiS4bj3vFI/ZBgDnMqNDtZjcA2vi4 // SIG // RRMweggd9vsHyTLpn6+nXoLy03vMeebq0C3k44pgUIEu // SIG // PQUlJIRTe6IrN3GcjaZ6zHGuQGWgu6SyO9r7qkrEpS2p // SIG // RjnGZjx2RmCamdAWnDdu+DmfNEPAddYjaJJ7PTnd+PGz // SIG // G+WeH4ocWgVnm5fJFhItjj70CJjgHqt57e1FiQcyWCwB // SIG // hKX2rGgN2UICHBF3Q/rsKOspjMw2OlGphTn2KmFl5J7c // SIG // Qxru54A9roClLnHGCiSUYos/iwFHI/dAVXEh0S0KKfTf // SIG // M6AC6/9bCbsD61QLcRzRIElvgCgaiMWFjOBL99pemoEl // SIG // AHsyzG6uX93fMfas09N9YzA0/rFAKAsNDOcFbQlEHKiD // SIG // T7mI20tVoCcmSIhJATCCB3owggVioAMCAQICCmEOkNIA // SIG // AAAAAAMwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT // SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH // SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y // SIG // cG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290 // SIG // IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDExMB4XDTEx // SIG // MDcwODIwNTkwOVoXDTI2MDcwODIxMDkwOVowfjELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9zb2Z0 // SIG // IENvZGUgU2lnbmluZyBQQ0EgMjAxMTCCAiIwDQYJKoZI // SIG // hvcNAQEBBQADggIPADCCAgoCggIBAKvw+nIQHC6t2G6q // SIG // ghBNNLrytlghn0IbKmvpWlCquAY4GgRJun/DDB7dN2vG // SIG // EtgL8DjCmQawyDnVARQxQtOJDXlkh36UYCRsr55JnOlo // SIG // XtLfm1OyCizDr9mpK656Ca/XllnKYBoF6WZ26DJSJhIv // SIG // 56sIUM+zRLdd2MQuA3WraPPLbfM6XKEW9Ea64DhkrG5k // SIG // NXimoGMPLdNAk/jj3gcN1Vx5pUkp5w2+oBN3vpQ97/vj // SIG // K1oQH01WKKJ6cuASOrdJXtjt7UORg9l7snuGG9k+sYxd // SIG // 6IlPhBryoS9Z5JA7La4zWMW3Pv4y07MDPbGyr5I4ftKd // SIG // gCz1TlaRITUlwzluZH9TupwPrRkjhMv0ugOGjfdf8NBS // SIG // v4yUh7zAIXQlXxgotswnKDglmDlKNs98sZKuHCOnqWbs // SIG // YR9q4ShJnV+I4iVd0yFLPlLEtVc/JAPw0XpbL9Uj43Bd // SIG // D1FGd7P4AOG8rAKCX9vAFbO9G9RVS+c5oQ/pI0m8GLhE // SIG // fEXkwcNyeuBy5yTfv0aZxe/CHFfbg43sTUkwp6uO3+xb // SIG // n6/83bBm4sGXgXvt1u1L50kppxMopqd9Z4DmimJ4X7Iv // SIG // hNdXnFy/dygo8e1twyiPLI9AN0/B4YVEicQJTMXUpUMv // SIG // dJX3bvh4IFgsE11glZo+TzOE2rCIF96eTvSWsLxGoGyY // SIG // 0uDWiIwLAgMBAAGjggHtMIIB6TAQBgkrBgEEAYI3FQEE // SIG // AwIBADAdBgNVHQ4EFgQUSG5k5VAF04KqFzc3IrVtqMp1 // SIG // ApUwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD // SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j // SIG // BBgwFoAUci06AjGQQ7kUBU7h6qfHMdEjiTQwWgYDVR0f // SIG // BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5taWNyb3NvZnQu // SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0 // SIG // MjAxMV8yMDExXzAzXzIyLmNybDBeBggrBgEFBQcBAQRS // SIG // MFAwTgYIKwYBBQUHMAKGQmh0dHA6Ly93d3cubWljcm9z // SIG // b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0MjAx // SIG // MV8yMDExXzAzXzIyLmNydDCBnwYDVR0gBIGXMIGUMIGR // SIG // BgkrBgEEAYI3LgMwgYMwPwYIKwYBBQUHAgEWM2h0dHA6 // SIG // Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvZG9jcy9w // SIG // cmltYXJ5Y3BzLmh0bTBABggrBgEFBQcCAjA0HjIgHQBM // SIG // AGUAZwBhAGwAXwBwAG8AbABpAGMAeQBfAHMAdABhAHQA // SIG // ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA // SIG // Z/KGpZjgVHkaLtPYdGcimwuWEeFjkplCln3SeQyQwWVf // SIG // Liw++MNy0W2D/r4/6ArKO79HqaPzadtjvyI1pZddZYSQ // SIG // fYtGUFXYDJJ80hpLHPM8QotS0LD9a+M+By4pm+Y9G6XU // SIG // tR13lDni6WTJRD14eiPzE32mkHSDjfTLJgJGKsKKELuk // SIG // qQUMm+1o+mgulaAqPyprWEljHwlpblqYluSD9MCP80Yr // SIG // 3vw70L01724lruWvJ+3Q3fMOr5kol5hNDj0L8giJ1h/D // SIG // Mhji8MUtzluetEk5CsYKwsatruWy2dsViFFFWDgycSca // SIG // f7H0J/jeLDogaZiyWYlobm+nt3TDQAUGpgEqKD6CPxNN // SIG // ZgvAs0314Y9/HG8VfUWnduVAKmWjw11SYobDHWM2l4bf // SIG // 2vP48hahmifhzaWX0O5dY0HjWwechz4GdwbRBrF1HxS+ // SIG // YWG18NzGGwS+30HHDiju3mUv7Jf2oVyW2ADWoUa9WfOX // SIG // pQlLSBCZgB/QACnFsZulP0V3HjXG0qKin3p6IvpIlR+r // SIG // +0cjgPWe+L9rt0uX4ut1eBrs6jeZeRhL/9azI2h15q/6 // SIG // /IvrC4DqaTuv/DDtBEyO3991bWORPdGdVk5Pv4BXIqF4 // SIG // ETIheu9BCrE/+6jMpF3BoYibV3FWTkhFwELJm3ZbCoBI // SIG // a/15n8G9bW1qyVJzEw16UM0xghmfMIIZmwIBATCBlTB+ // SIG // MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv // SIG // bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj // SIG // cm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNy // SIG // b3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExAhMzAAAD // SIG // rzBADkyjTQVBAAAAAAOvMA0GCWCGSAFlAwQCAQUAoIGu // SIG // MBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG // SIG // AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3 // SIG // DQEJBDEiBCCgSZ0QxzPX610jQf8z2jZZzRsNUMdZZ5cM // SIG // Ew9FRhQ31TBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBp // SIG // AGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNy // SIG // b3NvZnQuY29tMA0GCSqGSIb3DQEBAQUABIIBAC8Ot1Gu // SIG // L0nqNOtKn1vCMWyHq+KFz84Xcnzk4btvoxqd0X6HeAOT // SIG // PwyXrk84k6SmX/VWAJV675mCZm2vX4sMn+RXqVGdQy5Q // SIG // anYuMPSbPpNRk+Gk3MPlpmohaqIKcwE7KN1VK3Ggu7/7 // SIG // OZtl4KQw+W7SahQmtRs56IHSIPPAhQBruwR/99vWcfvk // SIG // dFHfVpTJBr6RRsTF7j8U8dn2VNN9eBXiSAiilJ1WpTbt // SIG // YizdYIHGLCc6LsOph2AnUo5bgvQnmryo9RuaIgC+SgRz // SIG // HCxQb01U7EPLjMZaneBmsU9rDlCSyVIG9QpZtlleyvcA // SIG // ofolhkcKkNflylKBhFci+FpvcNyhghcpMIIXJQYKKwYB // SIG // BAGCNwMDATGCFxUwghcRBgkqhkiG9w0BBwKgghcCMIIW // SIG // /gIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBWQYLKoZIhvcN // SIG // AQkQAQSgggFIBIIBRDCCAUACAQEGCisGAQQBhFkKAwEw // SIG // MTANBglghkgBZQMEAgEFAAQgGEdr48ms6hYBpPL2hi1l // SIG // ulCQqmW5aPAZSFySFN0CsKUCBmYf0qLF2hgTMjAyNDA0 // SIG // MjMyMTA2MzEuMTg0WjAEgAIB9KCB2KSB1TCB0jELMAkG // SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO // SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m // SIG // dCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0 // SIG // IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYD // SIG // VQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRCODAtNjlD // SIG // MzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg // SIG // U2VydmljZaCCEXgwggcnMIIFD6ADAgECAhMzAAAB5Y9q // SIG // wPM9tAujAAEAAAHlMA0GCSqGSIb3DQEBCwUAMHwxCzAJ // SIG // BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw // SIG // DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv // SIG // ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29m // SIG // dCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTAxMjE5 // SIG // MDczNVoXDTI1MDExMDE5MDczNVowgdIxCzAJBgNVBAYT // SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH // SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y // SIG // cG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs // SIG // YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMd // SIG // VGhhbGVzIFRTUyBFU046M0JENC00QjgwLTY5QzMxJTAj // SIG // BgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZp // SIG // Y2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC // SIG // AQCpe+A62rtjuiy6yTtx8k7zvWl2ov/3jcj+TC1ma5lB // SIG // jTiTD8DCNPFfcwX0TzXLnK3iGEsiR45DCFBprodKz1ef // SIG // 9vlAixqzdT++5/X6v5nc1zDdRc6mjx3ShJSp3iUPEenD // SIG // +Ha7thspprda6xnDXvNNAnA+nfzXaKJppHdfelajrY2R // SIG // QNV1rvhrBQXlh4ns/z5ZanDP3lp7ZEDLNJStM5gnx/gb // SIG // u4tYfhQ0UfBe1s1K/+zN44VXT6QH6ts2AgPGVSzYBIs2 // SIG // PrxZoMfsw7rlPxgoQyu5JQ3AsPv4FaBLkjpeXJULMnVk // SIG // IySV+2dslftSguhtSVaqT93aSjwD/+LnTaqUeRyHm/E2 // SIG // tSX40VM0r96ko3ucvUWE/wI1jWEO4LHs7g1jP/HGddZH // SIG // KNSb1MjkPMfyQ5DBakkcI9b/pnOiyipY//3Vghvx8Paa // SIG // XZViV+qbA3rELkEexVe3gqlf5X2o6C6Tzcf/cxdXb/Ml // SIG // wXc5liT3gontl2kJ6wCg6pRt817sfbTUJs9i/ek3cZyD // SIG // tjhpmMQQAGQFqCm5rWCPgos+AmMjtBZuWd0+NGuXeyib // SIG // n7Regk6HHHP1Kf46RX0IrS343e9XEvnCwnqEPqtJ9CAC // SIG // 71fmnGxDaLkjq47/0LWOBSIx5SOc3ScyZxrJFSeaM4Y4 // SIG // tGEbHL9VsCRQLssgjELy3Zj3XQIDAQABo4IBSTCCAUUw // SIG // HQYDVR0OBBYEFN//n4e7TXMxInxF5QkIBTl4DIeqMB8G // SIG // A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G // SIG // A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9z // SIG // b2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRp // SIG // bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggr // SIG // BgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj // SIG // cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAo // SIG // MSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAww // SIG // CgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqG // SIG // SIb3DQEBCwUAA4ICAQAz+sIThYw9WnfBpBCfaCwbr345 // SIG // 3TMhkPUeB4ASkpT7d6WtF1S3IpqyZQ5yhoBQYlsCOlzo // SIG // MPNoXaJQ4jAwSy1kTEyR1lXlGNYFOFwfDjiMQXPf0PN8 // SIG // 29XNEVhLqYAuPCPm/tsdlTYBiVLECMj0dj4l0IU+T8nq // SIG // zIGoPTkqHUIxcKTXRoq52tq6VdtxFMBXjuft6El+CXgj // SIG // Wb4MlDsyqcjL6lWrm6PhpX/6bH1ubSHDI2VbdHpbMH6t // SIG // KiTUIKGIqW2k77+8ZosVCRk24sWIn08AIrz3CjXXorGZ // SIG // rbbOzh2wDO/eWbyi0hKl4kVIw2Gcnh8gMrDBAC2yIXV4 // SIG // BxIetCqGcs5QV891cRIqxO54bnDcDNrVYjpcCOxJHlOY // SIG // bnXLZ1whueSbjMP8G+3O9USopmQPyl5VqZgb5CZAdAWR // SIG // EvDghg3fs2P0/QZ06fLIt+k6pfOFX6WHvYh5suz6qsaj // SIG // Bdgp+KtmtJhDJ6Qa7gxhP4EfXPElSdp7ZAEcuUn5brif // SIG // zAetckb09ZlMd5cqaTttnj4wY58KBL1cWw409Y4XTDXX // SIG // rzrg3iRs0SyvRzZkwwvk3WUJY/lTICJvGXhCETRdKGr4 // SIG // hfkGXFGS1s1m2Kusg6JPBGShYkUeaLQaBi72mBacQWVB // SIG // PJpyyrg5WKG468Ye5Z8K8Vf3zMtBfX0qNicRZrS4LTCC // SIG // B3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUw // SIG // DQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMw // SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt // SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp // SIG // b24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRp // SIG // ZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4 // SIG // MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC // SIG // VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT // SIG // B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw // SIG // b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt // SIG // U3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUA // SIG // A4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC // SIG // 0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm // SIG // 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNE // SIG // t6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZT // SIG // fDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQ // SIG // HJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5 // SIG // LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVV // SIG // mG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKy // SIG // zbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpG // SIG // dc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2 // SIG // TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZ // SIG // fD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q // SIG // GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL // SIG // W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLU // SIG // HMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXb // SIG // GjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQID // SIG // AQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAj // SIG // BgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v // SIG // BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1Gely // SIG // MFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYI // SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv // SIG // bS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNV // SIG // HSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4K // SIG // AFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/ // SIG // BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2U // SIG // kFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8v // SIG // Y3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0 // SIG // cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI // SIG // KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v // SIG // d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jv // SIG // b0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0B // SIG // AQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwU // SIG // tj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTC // SIG // j/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+ // SIG // iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhT // SIG // dSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYS // SIG // EhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qB // SIG // woEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0 // SIG // DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxy // SIG // bxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARx // SIG // v2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+k // SIG // KNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2 // SIG // tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4 // SIG // O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL // SIG // jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm // SIG // dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/Z // SIG // cGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggLUMIIC // SIG // PQIBATCCAQChgdikgdUwgdIxCzAJBgNVBAYTAlVTMRMw // SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt // SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp // SIG // b24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w // SIG // ZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVz // SIG // IFRTUyBFU046M0JENC00QjgwLTY5QzMxJTAjBgNVBAMT // SIG // HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoB // SIG // ATAHBgUrDgMCGgMVAPeNohrmBa7BOMM1g3fORKTOkYsK // SIG // oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG // SIG // A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw // SIG // MTAwDQYJKoZIhvcNAQEFBQACBQDp0jl5MCIYDzIwMjQw // SIG // NDIzMjE0MzIxWhgPMjAyNDA0MjQyMTQzMjFaMHQwOgYK // SIG // KwYBBAGEWQoEATEsMCowCgIFAOnSOXkCAQAwBwIBAAIC // SIG // GfswBwIBAAICEpwwCgIFAOnTivkCAQAwNgYKKwYBBAGE // SIG // WQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAweh // SIG // IKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQCR // SIG // ikdaiSpf/pluVNodpeJYgXhqW84jWLSp6QQjKd9B2IXV // SIG // ShWqYdE8bARmiS2C60Nku8AV+SVRb0yp08mM3qSXIAAv // SIG // WJCCbe/Gv3uR3bE4qsnXJ727kcJSWKMBob650/05zFtq // SIG // uW0IuVO43ceEPQwl5tAKOroneDShgN9h9EY4tjGCBA0w // SIG // ggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI // SIG // EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w // SIG // HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAk // SIG // BgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy // SIG // MDEwAhMzAAAB5Y9qwPM9tAujAAEAAAHlMA0GCWCGSAFl // SIG // AwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcN // SIG // AQkQAQQwLwYJKoZIhvcNAQkEMSIEIPYwnggOQHbzQC3s // SIG // xAHt1WigCqXziwUXW9e9tD4jzbozMIH6BgsqhkiG9w0B // SIG // CRACLzGB6jCB5zCB5DCBvQQgFanT//6o8RhYXtmG6BF3 // SIG // m/CP6QKH9NQsIW8VB/VOve0wgZgwgYCkfjB8MQswCQYD // SIG // VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G // SIG // A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 // SIG // IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg // SIG // VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeWPasDzPbQL // SIG // owABAAAB5TAiBCCxP2Qws+k2T3Az4I+GYFjSl0YHIZ4r // SIG // c5VcoGt56qANjzANBgkqhkiG9w0BAQsFAASCAgCT+Thv // SIG // 3AF5yGMy+ppbqmUqfa2Vkn+VTXjQmaw0aj6rW3VKJaz3 // SIG // NcGOuy8m8TrZTN6hXkBURObifx8nSD7f2gNODaEztYdT // SIG // WtMjXNPTx90bxW2T2hA48GXZwzPslNPRVyd8Jga2AuBY // SIG // z/uuFwp4mAcA0XpgXC5+urMjPjcJounoT0xxJAKv5Y8T // SIG // dopeONSsdAq4XZwVr0N7gPB2SGNTM8V2bk7splWo7qbL // SIG // 7AsnKp11DavgDvBi3bJqsh7zu5ESvAw23kbqOaOrFSWY // SIG // jiaBPXdkQtpw510DtVXKoyxjfVfTNE5ABBzGDEVS7ZQR // SIG // nhg1t0oaGkoKNs2/Y9lzjGpW3WczNJItYiiM/m8kHVzK // SIG // xAEQWF/zkbWLipcRMc7h5vfXF3tvqermyaveBGZQXPIY // SIG // 2+qmIBlP82QOewtcvuB3j/4cMEUn6uqONZZgpEPN9k0h // SIG // q3vJbTsnLJPoZI49PsncGXoJSRHKY6JIXiea2BwGNqoO // SIG // L97iz+1VMQ5xPiNlAI2bKylRWGtuajDDGX7akbTE1j/e // SIG // f89f1KyiDPRRumNI8oFlb5RPze4lfB61J4XqutTr53xt // SIG // k+HOZhB/K4zCaacthukh3QZW+tVRtEev+SSjVBQS8Z5W // SIG // gX18Qv1KZm2orC+klwwr1iUBk5WxPM8HjZvTjbFXGfSf // SIG // tGXYrCU/RviEXATAYg== // SIG // End signature block
combined_dataset/train/non-malicious/sample_51_51.ps1
sample_51_51.ps1
# Copyright (C) Intel Corporation, 2021 All Rights Reserved. function Invoke-ConfigureTLSMutualAuthentication { <# .Synopsis Configures AMT connection to TLS with mutual authentication .Description This cmdlet configures the AMT connection to TLS with mutual authentication. The cmdlet adds the AMT certificate, client certificate and enables TLS. Use the -AcceptNonSecure parameter to allow also non secure connection. .Notes Supported AMT Firmware Versions: 3.2 and higher AMT Provisioning: The vPro client AMT firmware must be provisioned prior to accessing AMT functionality. This CMDLet will fail if it is run against a vPro client that has not been provisioned. AMT Client Authentication: To invoke commands against AMT enabled clients credentials to authenticate must be specified. When no credential is provided as a parameter, the script will use the local logged on Kerberos credential. When only the username (Kerberos or Digest) parameter is included the user will be prompted to provide the associated password. Credentials should be stored as a PowerShell variable then passed into the Cmdlet with the credential parameter. $AMTCredential = get-credential AMT Client Encryption: If the Intel vPro client has been configured to use TLS (a web server certificate has been issued to the Intel Management Engine) the Cmdlet must be called with a -TLS switch. When managing an Intel vPro client over TLS (Port 16993) it is important that the computername parameter matchs the primary subject name of the issued TLS certificate. Typically this is the fully qualified domain name (FQDN). If Mutual TLS is desired, the Cmdlet must be called with -TLS switch and with a valid certificate name from the certificate store in the -CertificateName parameter. Status: Status output designates if the Cmdlet was run successfully. For failed attempts additional status may be provided. .Link http:\\vproexpert.com http:\\www.intel.com\vpro http:\\www.intel.com .Example Invoke-ConfigureTLSMutualAuthentication -ComputerName 192.168.168.10 -Username admin -Password Admin!98 -CertificateFilePath ".\leaf.cer" -TrustedRootCertificateFilePath ".\trusted_cert.cer" Add public key certificate - certificate added successfully! Add trusted root certificate - certificate added successfully! Mutual Authentication configuration succeeded! .Example Invoke-ConfigureTLSMutualAuthentication -ComputerName dut.vprodemo.com -Username admin -Password Admin!98 -CertificateFilePath ".\leaf.cer" -TrustedRootCertificateFilePath ".\trusted_cert.cer" -AcceptNonSecure Add public key certificate - certificate added successfully! Add trusted root certificate - certificate added successfully! Mutual Authentication configuration succeeded! #> [CmdletBinding()] Param ( [Parameter(Mandatory = $true, position = 0,HelpMessage = "Hostname, FQDN, or IP Address")] [String[]] $ComputerName, [Parameter(Mandatory = $false, position = 1,HelpMessage = "Digest User")] [string] $Username, [Parameter(Mandatory = $false, position = 2,HelpMessage = "Digest Password")] [string] $Password, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true, ValueFromPipeline=$false, position=3, HelpMessage="Valid Ports are 16992 (non-TLS) or 16993 (TLS)")][ValidateSet("16992", "16993")] [String] $Port, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=4, HelpMessage="Use TLS (Port 16993)")] [switch] $TLS, [Parameter(Mandatory = $true, position = 5,HelpMessage = "Path to Certificate file")] [string] $CertificateFilePath, [Parameter(Mandatory = $true, position = 6,HelpMessage = "Path to client Trusted root certificate file")] [string] $TrustedRootCertificateFilePath, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=7, HelpMessage="Accept non secure connections")] [switch] $AcceptNonSecure, [Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=9, HelpMessage="PS Credential")] [System.Management.Automation.PSCredential] $Credential ) PROCESS { function CommitChanges { $setupAndConfigurationServiceRef = $wsmanConnectionObject.NewReference("SELECT * FROM AMT_SetupAndConfigurationService WHERE Name='Intel(r) AMT Setup and Configuration Service'") $inputObject = $setupAndConfigurationServiceRef.CreateMethodInput("CommitChanges") $outputObject = $setupAndConfigurationServiceRef.InvokeMethod($inputObject) if(-not ($outputObject.GetProperty("ReturnValue") -like "0")) { $Results += "Commit Changes operation failed.`n" return "false" } return "true" } #### Get Certificate Blob #### function GetCertificateBlob($path) { $readFile = [System.IO.File]::OpenText($path) # These are the certificate opening and closing tags we use for this PS script, user can add more types $BEGIN = "-----BEGIN CERTIFICATE-----" $END = "-----END CERTIFICATE-----" [bool]$read = $false While(!$readFile.EndOfStream) { $line = $readFile.ReadLine() IF($line -match $BEGIN) { $read = $true $certificateBlob = $null While($read -and !$readFile.EndOfStream) { $line = $readFile.ReadLine() IF($line -notmatch $END) { $certificateBlob += $line } ELSE { $read = $false } } } } $readFile.Close() if($read) # Incorrect or missing opening or closing tag { throw "Incorrect file content`n" return } return $certificateBlob } try { $Results = @() $Results += "`n" # Create a connection object $wsmanConnectionObject = New-Object Intel.Management.Wsman.WsmanConnection if ($Credential.username.Length -gt 0) { $wsmanConnectionObject.SetCredentials($Credential.Username, $Credential.Password) } elseif ($Username.length -gt 0) { if ($Password.length -gt 0) { $wsmanConnectionObject.SetCredentials($Username, $Password) } else { $Cred = Get-Credential $Username $wsmanConnectionObject.SetCredentials($Cred.Username, $Cred.Password) } } if ($Port -ne "16993") { if ($TLS.IsPresent) { $Port = 16993; } else { $Port = 16992; } } ForEach ($Comp in $ComputerName) { # Attempt Connection with Client $wsmanConnectionObject.SetHost($Comp, $Port) if( -not $wsmanConnectionObject) { $Results += "Cannot connenct `n" } # Add certificate $publicKeyManagementServiceRef = $wsmanConnectionObject.NewReference("SELECT * FROM AMT_PublicKeyManagementService WHERE Name='Intel(r) AMT Public Key Management Service'") $inputCertificate = $publicKeyManagementServiceRef.CreateMethodInput("AddCertificate") $certificateBlob = GetCertificateBlob($CertificateFilePath) $inputCertificate.AddProperty("CertificateBlob", $certificateBlob) $outputObject = $publicKeyManagementServiceRef.InvokeMethod($inputCertificate) $returnValue = $outputObject.GetProperty("ReturnValue") if(($returnValue -like "0") -Or ($returnValue -like "2058")) { if($returnValue -like "0") # Certificate added successfully { $Results += "Add public key certificate - certificate added successfully! `n" # The $publicKeyCertificateRef is an EPR to the new AMT_PublicKeyCertificate object. $publicKeyCertificateRef = $outputObject.GetProperty("CreatedCertificate").Ref } elseif($returnValue -like "2058") # Certificate already exists { $Results += "Add public key certificate - Certificate already exists. `n" $certRef_Enum = $wsmanConnectionObject.NewReference("AMT_PublicKeyCertificate").Enumerate() foreach ($certificateInstance in $certRef_Enum) { # $certificateBlob_str = $certificateBlob.replace("`n","").replace("`r","") if($certificateInstance.Object.GetProperty("X509Certificate").ToString() -eq $certificateBlob) { $certificateInstanceID = $certificateInstance.Object.GetProperty("InstanceID").ToString() $publicKeyCertificateRef = $wsmanConnectionObject.NewReference("SELECT * FROM AMT_PublicKeyCertificate") $publicKeyCertificateRef.AddSelector("InstanceID", $certificateInstanceID) break } } } # Add Trusted root certificate $publicKeyManagementServiceRef = $wsmanConnectionObject.NewReference("SELECT * FROM AMT_PublicKeyManagementService WHERE Name='Intel(r) AMT Public Key Management Service'") $inputObject = $publicKeyManagementServiceRef.CreateMethodInput("AddTrustedRootCertificate") $trustedRootcertificateBlob = GetCertificateBlob($TrustedRootCertificateFilePath) $inputObject.AddProperty("CertificateBlob", $TrustedRootCertificateBlob) $outputObject1 = $publicKeyManagementServiceRef.InvokeMethod($inputObject) $returnValue = $outputObject1.GetProperty("ReturnValue") if(($returnValue -like "0") -Or ($returnValue -like "2058")) { if($returnValue -like "0"){ $Results += "Add trusted root certificate - certificate added successfully! `n" } else{ $Results += "Add trusted root certificate - certificate already exists. `n" } # Set TLS Credentials certificate $tlsProtocolEndpointCollectionRef = $wsmanConnectionObject.NewReference("SELECT * FROM AMT_TLSProtocolEndpointCollection WHERE ElementName='TLSProtocolEndpoint Instances Collection'") $tlsCredentialContextInstance = $wsmanConnectionObject.NewInstance("AMT_TLSCredentialContext") # $publicKeyCertificateRef is an EPR to the AMT_PublicKeyCertificate object $tlsCredentialContextInstance.SetProperty("ElementInContext", $publicKeyCertificateRef) $tlsCredentialContextInstance.SetProperty("ElementProvidingContext", $tlsProtocolEndpointCollectionRef) try { $outputObject = $tlsCredentialContextInstance.Create() } catch { $returnValue = $outputObject.GetProperty("ReturnValue") if($returnValue -like "2058") { $Results += "AMT_TLSCredentialContext instance already exists `n" } } # Update the remote interface. $tlsSettingDataRef = $wsmanConnectionObject.NewReference("SELECT * FROM AMT_TLSSettingData WHERE InstanceID='Intel(r) AMT 802.3 TLS Settings'") $tlsSettingDataInstance = $tlsSettingDataRef.Get() $tlsSettingDataInstance.SetProperty("Enabled", "true") $tlsSettingDataInstance.SetProperty("MutualAuthentication", "true") if($AcceptNonSecure.IsPresent -like "true") { $tlsSettingDataInstance.SetProperty("AcceptNonSecureConnections", "true") } else { $tlsSettingDataInstance.SetProperty("AcceptNonSecureConnections", "false") } $putRes = $tlsSettingDataRef.Put($tlsSettingDataInstance) $tlsSettingDataRef = $wsmanConnectionObject.NewReference("SELECT * FROM AMT_TLSSettingData WHERE InstanceID='Intel(r) AMT LMS TLS Settings'") $tlsSettingDataInstance = $tlsSettingDataRef.Get() $tlsSettingDataInstance.SetProperty("Enabled", "false") $tlsSettingDataInstance.SetProperty("MutualAuthentication", "false") $putRes = $tlsSettingDataRef.Put($tlsSettingDataInstance) $commitChangesRes = CommitChanges if($commitChangesRes -like "false") { $Results += "Commit changes - failed to commit changes.`n" } else { $Results += "Mutual Authentication configuration succeeded!`n" } } else # Add trusted root certificate { $Results += "Add trusted root certificate - Failed." } } else #Add Certificate { $Results += "Add Certificate - Failed." } } } catch { $Results += "Exception Thrown:" $Results += $_.Exception.Message } Write-Output $Results } } # SIG # Begin signature block # MIIo1gYJKoZIhvcNAQcCoIIoxzCCKMMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBNQXe1Gb/TZpwe # cjJvZ81+vEbV4dJ6ihfsEqnD0fnaTaCCEe8wggWIMIIEcKADAgECAhAK3oEU12eb # Bm8tst/S9nrCMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAkdCMRswGQYDVQQI # ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoT # D1NlY3RpZ28gTGltaXRlZDEkMCIGA1UEAxMbU2VjdGlnbyBSU0EgQ29kZSBTaWdu # aW5nIENBMB4XDTIxMDQwNTAwMDAwMFoXDTIzMDQwNTIzNTk1OVowcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFDASBgNVBAcMC1NhbnRhIENsYXJh # MRowGAYDVQQKDBFJbnRlbCBDb3Jwb3JhdGlvbjEaMBgGA1UEAwwRSW50ZWwgQ29y # cG9yYXRpb24wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDjUVXd0eS2 # a1cJleh4bp6C5ngpid1fyZl3x1O7UH31slBxqjtjD45nsKBbDATVW/ZH0zqbLQ0P # pQLpLbBVHEFasianjtLSjFXs1pJJ14rfuZCyiOaFFCGYqb/fLQ2ZBq/0riDFgwfC # YS80SIV7V+hq+XJhpsUms/5QPqRilRnk+OPlbikQktkUVWi1qN7pkjkC5NgTDLnz # oxGP3OYA6x+ac3/NMQYnRXzbjACLUq70L2hDC8sDwaCQXavaUG29FF4MjwE8MzMx # DqcjpZmaO/jbTpExgMBfkDa+vqWSb99gdAeJI/JZXAeuYgGQ+66aIhwmRGsqQIXT # z4ofo+mRQMgSXatXEOtuBrC5q5GZUnWTTrdfnkdxg0oD9CsttmZg6Fhu5mTLYbJ+ # lKrV/JtSjKNgtQdYXCtnV5FRRzlqcjXqsXG+Q1YaY/n0lTEwCAqJyRMyJLuK/S/U # MUfPw9BvDQbpyB3ARSD4FJ3glwv9UDKd/BmQ2SVGpS+3/7whm633YIMCAwEAAaOC # AZAwggGMMB8GA1UdIwQYMBaAFA7hOqhTOjHVir7Bu61nGgOFrTQOMB0GA1UdDgQW # BBS5qxx6xBgtLKbRn3jrB6dtnHz6VDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/ # BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYD # VR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9z # ZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6 # Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQUNvZGVTaWduaW5nQ0EuY3JsMHMG # CCsGAQUFBwEBBGcwZTA+BggrBgEFBQcwAoYyaHR0cDovL2NydC5zZWN0aWdvLmNv # bS9TZWN0aWdvUlNBQ29kZVNpZ25pbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6 # Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBAdvRj4EEZ88QF # gAGQZABeZB6XbzWNZaFrDGmZMTqREok2QqB6QxdyPSsAFEL5mVfwnD5f8F8iHx+W # aZXjKHbSvn1f1CAMFMc/i7Byrr984Obp2raebwFNRUO7l2lewLCgkRBlb3+W7Hud # eTGoTzhJL/Qcvy1jLT0VmhLJbvYjEpBuQ62z7MQH7HltsfjRnDu1RpqKsYWJuCt6 # tOSNn7MZ8vb5nsZEIqRoonucy4Yp1ItP/uXuLc4KcdLh+TzNUiXWWK6qQ6TqeeJp # Z34IjoS1FvjXLV4ACypUuUvmEIq691NseI4ByVHCZyMa59A6Scpp+kadDUEw0LZj # t9LGvtWIMIIF9TCCA92gAwIBAgIQHaJIMG+bJhjQguCWfTPTajANBgkqhkiG9w0B # AQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNV # BAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx # LjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw # HhcNMTgxMTAyMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjB8MQswCQYDVQQGEwJHQjEb # MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgw # FgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJDAiBgNVBAMTG1NlY3RpZ28gUlNBIENv # ZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIYi # jTKFehifSfCWL2MIHi3cfJ8Uz+MmtiVmKUCGVEZ0MWLFEO2yhyemmcuVMMBW9aR1 # xqkOUGKlUZEQauBLYq798PgYrKf/7i4zIPoMGYmobHutAMNhodxpZW0fbieW15dR # hqb0J+V8aouVHltg1X7XFpKcAC9o95ftanK+ODtj3o+/bkxBXRIgCFnoOc2P0tbP # BrRXBbZOoT5Xax+YvMRi1hsLjcdmG0qfnYHEckC14l/vC0X/o84Xpi1VsLewvFRq # nbyNVlPG8Lp5UEks9wO5/i9lNfIi6iwHr0bZ+UYc3Ix8cSjz/qfGFN1VkW6KEQ3f # BiSVfQ+noXw62oY1YdMCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFFN5v1qqK0rP # VIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQO4TqoUzox1Yq+wbutZxoDha00DjAOBgNV # HQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF # BQcDAwYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBD # oEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZp # Y2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKG # M2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENB # LmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkq # hkiG9w0BAQwFAAOCAgEATWNQ7Uc0SmGk295qKoyb8QAAHh1iezrXMsL2s+Bjs/th # AIiaG20QBwRPvrjqiXgi6w9G7PNGXkBGiRL0C3danCpBOvzW9Ovn9xWVM8Ohgyi3 # 3i/klPeFM4MtSkBIv5rCT0qxjyT0s4E307dksKYjalloUkJf/wTr4XRleQj1qZPe # a3FAmZa6ePG5yOLDCBaxq2NayBWAbXReSnV+pbjDbLXP30p5h1zHQE1jNfYw08+1 # Cg4LBH+gS667o6XQhACTPlNdNKUANWlsvp8gJRANGftQkGG+OY96jk32nw4e/gdR # EmaDJhlIlc5KycF/8zoFm/lv34h/wCOe0h5DekUxwZxNqfBZslkZ6GqNKQQCd3xL # S81wvjqyVVp4Pry7bwMQJXcVNIr5NsxDkuS6T/FikyglVyn7URnHoSVAaoRXxrKd # sbwcCtp8Z359LukoTBh+xHsxQXGaSynsCz1XUNLK3f2eBVHlRHjdAd6xdZgNVCT9 # 8E7j4viDvXK6yz067vBeF5Jobchh+abxKgoLpbn0nu6YMgWFnuv5gynTxix9vTp3 # Los3QqBqgu07SqqUEKThDfgXxbZaeTMYkuO1dfih6Y4KJR7kHvGfWocj/5+kUZ77 # OYARzdu1xKeogG/lU9Tg46LC0lsa+jImLWpXcBw8pFguo/NbSwfcMlnzh6cabVgw # ggZmMIIETqADAgECAhMzAAAARLc//O9az6J6AAAAAABEMA0GCSqGSIb3DQEBBQUA # MH8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAMT # IE1pY3Jvc29mdCBDb2RlIFZlcmlmaWNhdGlvbiBSb290MB4XDTE1MDcyMjIxMDM0 # OVoXDTI1MDcyMjIxMDM0OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg # SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU # UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp # b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl # FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco # EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j # BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm # p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u # TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH # a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax # KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN # hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81 # VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10 # Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW # X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB0DCBzTATBgNVHSUE # DDAKBggrBgEFBQcDAzASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBRTeb9a # qitKz1SA4dibwJ3ysgNmyzALBgNVHQ8EBAMCAYYwHwYDVR0jBBgwFoAUYvsKIVt/ # Q24R2glUUGv10pZx8Z4wVQYDVR0fBE4wTDBKoEigRoZEaHR0cDovL2NybC5taWNy # b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0Q29kZVZlcmlmUm9v # dC5jcmwwDQYJKoZIhvcNAQEFBQADggIBAGsikzw9OVRxZGsO8uQ8MBHFIEpLhg+S # 8f8zeTrZ5JinDkCgIoB+YbLgpxnPJpUxKmXUak8xhurAxi7FZIw9SFnNCy90PZQm # ExBC1JeYJ148dtJ4aR0aZOcFcnXg62ZAQ5+PDEb/l2CmyGetEAibYqbpvjqK0wdN # n3KTJbwGEeAskDg+Zxz9GdeekM49wuDnYazA5QT1HplUDJENAVZxN64n1J5DIqXJ # J81N5XESOSSlQVaH/7xVFA8lyonux5fl0hP/PX4aoI8/yCzXo3DQx2DA/Ng+UeeX # xj477c94vorK48Typ6ftnq4IAo+gUttyHtU7w02fjvqbcMf4479sP5Kb5Dc+7GqM # KfnBor+LPhppZvscY08mAckCxD7S/8NDqBv9mfrUvKW54pMvOwHF0fQ6L2jD4GS3 # WpVeRswHg2m7PAWSVnM1c0WYTnzYEqW3QumiY/ZCYBhw0TtvMcCHx+Zx4fNGFun1 # uHKz6W0fYiZJo0mL3WjHi2hW9978+ockuAOBF4/l8WdqHa7TdPeMpV2zC45CKZbO # ScR3fmZ8ARcabBQkw7AXdwXYGkC3hmvY5HtArH7fTm8k+SCAgowz5+X6Kdid2otw # XSvJHYJMC2fLhEGe5wZ+EYNELYoZ7vR/mt15HDcZHp8/jCm6DVwQhjdsSM1FXc1w # vLzRTV3Yxbh2MYIWPTCCFjkCAQEwgZAwfDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT # EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMP # U2VjdGlnbyBMaW1pdGVkMSQwIgYDVQQDExtTZWN0aWdvIFJTQSBDb2RlIFNpZ25p # bmcgQ0ECEAregRTXZ5sGby2y39L2esIwDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEE # AYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3 # AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgNPf6sbdToOh/eQRY # DSE8bpQXPB0nfwpUPlDTJgk4QKowDQYJKoZIhvcNAQEBBQAEggGATv/pPE3gry9/ # pe7hxeAwE7exRkztf1jTFePZsywSAf74QKVtarCW+UBIk+MPBxDmUgei/qbe528C # MpJbxdwEkRAUd/cN3W4RRWZIDgxjSTTP763xMswLzWn5qTV8a1hBMLHG3mKJgUoI # ngbe5AWXSYnSGu8uLPysGLcOA8xrqo6c63/asgRkMFvTPSWW7nVeSbgXY+JFC9BS # 5qi78ICtYZ9dGHS0DvZSRyWeRToohDACTvnwcDxHn8SO7N4v3ukSxF36Uk8SFRyb # 17Tk9LigkR8/mLqMIddLNbxIdJDT7hQmMyllM59/Gh0eU4gz3hJb6VbZLwtEadGr # IbuKU01kLb0bU5DNl8nJEce84o9KnsHINPG0WzdaT92rSOvUnERW9GcIp0JQ4mLT # 4J6+bgtYBSOB7+ctQqAWZh5n2sCc7gwkueTFtsep8CKrVag2ek53ZxJfYPY0xmoa # tYsYRGQsuw0jI4CQqKEb66+tHl3UcvSSlcB0wrCqbag7gEqCsiIsoYITfzCCE3sG # CisGAQQBgjcDAwExghNrMIITZwYJKoZIhvcNAQcCoIITWDCCE1QCAQMxDzANBglg # hkgBZQMEAgIFADCCAQwGCyqGSIb3DQEJEAEEoIH8BIH5MIH2AgEBBgorBgEEAbIx # AgEBMDEwDQYJYIZIAWUDBAIBBQAEIHJVQChWInbGPxip3rvy8WenKUNN6eLQSM+V # qAMbTXHoAhRuB35HdzJiGiw1wSGRwQ8CA0NZqxgPMjAyMTEwMjcxMjEyMjRaoIGK # pIGHMIGEMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVy # MRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLDAq # BgNVBAMMI1NlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgU2lnbmVyICMyoIIN+zCC # BwcwggTvoAMCAQICEQCMd6AAj/TRsMY9nzpIg41rMA0GCSqGSIb3DQEBDAUAMH0x # CzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNV # BAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMGA1UEAxMc # U2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTAeFw0yMDEwMjMwMDAwMDBaFw0z # MjAxMjIyMzU5NTlaMIGEMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBN # YW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExp # bWl0ZWQxLDAqBgNVBAMMI1NlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgU2lnbmVy # ICMyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAkYdLLIvB8R6gntMH # xgHKUrC+eXldCWYGLS81fbvA+yfaQmpZGyVM6u9A1pp+MshqgX20XD5WEIE1OiI2 # jPv4ICmHrHTQG2K8P2SHAl/vxYDvBhzcXk6Th7ia3kwHToXMcMUNe+zD2eOX6csZ # 21ZFbO5LIGzJPmz98JvxKPiRmar8WsGagiA6t+/n1rglScI5G4eBOcvDtzrNn1AE # HxqZpIACTR0FqFXTbVKAg+ZuSKVfwYlYYIrv8azNh2MYjnTLhIdBaWOBvPYfqnzX # wUHOrat2iyCA1C2VB43H9QsXHprl1plpUcdOpp0pb+d5kw0yY1OuzMYpiiDBYMby # AizE+cgi3/kngqGDUcK8yYIaIYSyl7zUr0QcloIilSqFVK7x/T5JdHT8jq4/pXL0 # w1oBqlCli3aVG2br79rflC7ZGutMJ31MBff4I13EV8gmBXr8gSNfVAk4KmLVqsrf # 7c9Tqx/2RJzVmVnFVmRb945SD2b8mD9EBhNkbunhFWBQpbHsz7joyQu+xYT33Qqd # 2rwpbD1W7b94Z7ZbyF4UHLmvhC13ovc5lTdvTn8cxjwE1jHFfu896FF+ca0kdBss # 3Pl8qu/CdkloYtWL9QPfvn2ODzZ1RluTdsSD7oK+LK43EvG8VsPkrUPDt2aWXpQy # +qD2q4lQ+s6g8wiBGtFEp8z3uDECAwEAAaOCAXgwggF0MB8GA1UdIwQYMBaAFBqh # +GEZIA/DQXdFKI7RNV8GEgRVMB0GA1UdDgQWBBRpdTd7u501Qk6/V9Oa258B0a7e # 0DAOBgNVHQ8BAf8EBAMCBsAwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggr # BgEFBQcDCDBABgNVHSAEOTA3MDUGDCsGAQQBsjEBAgEDCDAlMCMGCCsGAQUFBwIB # FhdodHRwczovL3NlY3RpZ28uY29tL0NQUzBEBgNVHR8EPTA7MDmgN6A1hjNodHRw # Oi8vY3JsLnNlY3RpZ28uY29tL1NlY3RpZ29SU0FUaW1lU3RhbXBpbmdDQS5jcmww # dAYIKwYBBQUHAQEEaDBmMD8GCCsGAQUFBzAChjNodHRwOi8vY3J0LnNlY3RpZ28u # Y29tL1NlY3RpZ29SU0FUaW1lU3RhbXBpbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0 # dHA6Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBKA3iQQjPs # exqDCTYzmFW7nUAGMGtFavGUDhlQ/1slXjvhOcRbuumVkDc3vd/7ZOzlgreVzFdV # cEtO9KiH3SKFple7uCEn1KAqMZSKByGeir2nGvUCFctEUJmM7D66A3emggKQwi6T # qb4hNHVjueAtD88BN8uNovq4WpquoXqeE5MZVY8JkC7f6ogXFutp1uElvUUIl4DX # VCAoT8p7s7Ol0gCwYDRlxOPFw6XkuoWqemnbdaQ+eWiaNotDrjbUYXI8DoViDaBe # cNtkLwHHwaHHJJSjsjxusl6i0Pqo0bglHBbmwNV/aBrEZSk1Ki2IvOqudNaC58CI # uOFPePBcysBAXMKf1TIcLNo8rDb3BlKao0AwF7ApFpnJqreISffoCyUztT9tr59f # ClbfErHD7s6Rd+ggE+lcJMfqRAtK5hOEHE3rDbW4hqAwp4uhn7QszMAWI8mR5UID # S4DO5E3mKgE+wF6FoCShF0DV29vnmBCk8eoZG4BU+keJ6JiBqXXADt/QaJR5oaCe # jra3QmbL2dlrL03Y3j4yHiDk7JxNQo2dxzOZgjdE1CYpJkCOeC+57vov8fGP/lC4 # eN0Ult4cDnCwKoVqsWxo6SrkECtuIf3TfJ035CoG1sPx12jjTwd5gQgT/rJkXumx # PObQeCOyCSziJmK/O6mXUczHRDKBsq/P3zCCBuwwggTUoAMCAQICEDAPb6zdZph0 # fKlGNqd4LbkwDQYJKoZIhvcNAQEMBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpOZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhl # IFVTRVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRp # ZmljYXRpb24gQXV0aG9yaXR5MB4XDTE5MDUwMjAwMDAwMFoXDTM4MDExODIzNTk1 # OVowfTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQ # MA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSUwIwYD # VQQDExxTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIENBMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEAyBsBr9ksfoiZfQGYPyCQvZyAIVSTuc+gPlPvs1rA # dtYaBKXOR4O168TMSTTL80VlufmnZBYmCfvVMlJ5LsljwhObtoY/AQWSZm8hq9Vx # EHmH9EYqzcRaydvXXUlNclYP3MnjU5g6Kh78zlhJ07/zObu5pCNCrNAVw3+eolzX # OPEWsnDTo8Tfs8VyrC4Kd/wNlFK3/B+VcyQ9ASi8Dw1Ps5EBjm6dJ3VV0Rc7NCF7 # lwGUr3+Az9ERCleEyX9W4L1GnIK+lJ2/tCCwYH64TfUNP9vQ6oWMilZx0S2UTMiM # PNMUopy9Jv/TUyDHYGmbWApU9AXn/TGs+ciFF8e4KRmkKS9G493bkV+fPzY+DjBn # K0a3Na+WvtpMYMyou58NFNQYxDCYdIIhz2JWtSFzEh79qsoIWId3pBXrGVX/0DlU # LSbuRRo6b83XhPDX8CjFT2SDAtT74t7xvAIo9G3aJ4oG0paH3uhrDvBbfel2aZMg # HEqXLHcZK5OVmJyXnuuOwXhWxkQl3wYSmgYtnwNe/YOiU2fKsfqNoWTJiJJZy6hG # wMnypv99V9sSdvqKQSTUG/xypRSi1K1DHKRJi0E5FAMeKfobpSKupcNNgtCN2mu3 # 2/cYQFdz8HGj+0p9RTbB942C+rnJDVOAffq2OVgy728YUInXT50zvRq1naHelUF6 # p4MCAwEAAaOCAVowggFWMB8GA1UdIwQYMBaAFFN5v1qqK0rPVIDh2JvAnfKyA2bL # MB0GA1UdDgQWBBQaofhhGSAPw0F3RSiO0TVfBhIEVTAOBgNVHQ8BAf8EBAMCAYYw # EgYDVR0TAQH/BAgwBgEB/wIBADATBgNVHSUEDDAKBggrBgEFBQcDCDARBgNVHSAE # CjAIMAYGBFUdIAAwUAYDVR0fBEkwRzBFoEOgQYY/aHR0cDovL2NybC51c2VydHJ1 # c3QuY29tL1VTRVJUcnVzdFJTQUNlcnRpZmljYXRpb25BdXRob3JpdHkuY3JsMHYG # CCsGAQUFBwEBBGowaDA/BggrBgEFBQcwAoYzaHR0cDovL2NydC51c2VydHJ1c3Qu # Y29tL1VTRVJUcnVzdFJTQUFkZFRydXN0Q0EuY3J0MCUGCCsGAQUFBzABhhlodHRw # Oi8vb2NzcC51c2VydHJ1c3QuY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBtVIGlM10W # 4bVTgZF13wN6MgstJYQRsrDbKn0qBfW8Oyf0WqC5SVmQKWxhy7VQ2+J9+Z8A70DD # rdPi5Fb5WEHP8ULlEH3/sHQfj8ZcCfkzXuqgHCZYXPO0EQ/V1cPivNVYeL9IduFE # Z22PsEMQD43k+ThivxMBxYWjTMXMslMwlaTW9JZWCLjNXH8Blr5yUmo7Qjd8Fng5 # k5OUm7Hcsm1BbWfNyW+QPX9FcsEbI9bCVYRm5LPFZgb289ZLXq2jK0KKIZL+qG9a # JXBigXNjXqC72NzXStM9r4MGOBIdJIct5PwC1j53BLwENrXnd8ucLo0jGLmjwkcd # 8F3WoXNXBWiap8k3ZR2+6rzYQoNDBaWLpgn/0aGUpk6qPQn1BWy30mRa2Coiwkud # 8TleTN5IPZs0lpoJX47997FSkc4/ifYcobWpdR9xv1tDXWU9UIFuq/DQ0/yysx+2 # mZYm9Dx5i1xkzM3uJ5rloMAMcofBbk1a0x7q8ETmMm8c6xdOlMN4ZSA7D0GqH+mh # QZ3+sbigZSo04N6o+TzmwTC7wKBjLPxcFgCo0MR/6hGdHgbGpm0yXbQ4CStJB6r9 # 7DDa8acvz7f9+tCjhNknnvsBZne5VhDhIG7GrrH5trrINV0zdo7xfCAMKneutaIC # hrop7rRaALGMq+P5CslUXdS5anSevUiumDGCBC0wggQpAgEBMIGSMH0xCzAJBgNV # BAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1Nh # bGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMGA1UEAxMcU2VjdGln # byBSU0EgVGltZSBTdGFtcGluZyBDQQIRAIx3oACP9NGwxj2fOkiDjWswDQYJYIZI # AWUDBAICBQCgggFrMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG # 9w0BCQUxDxcNMjExMDI3MTIxMjI0WjA/BgkqhkiG9w0BCQQxMgQwXI2I9/+CGZOA # QWVgrkCgTQWuaNPTXKX/ZjumBs3b0OsTmn6r/2zwEAkbDoOjKkrWMIHtBgsqhkiG # 9w0BCRACDDGB3TCB2jCB1zAWBBSVETcQHYgvMb1RP5Sa2kxorYwI9TCBvAQUAtZb # leKDcMFXAJX6iPkj3ZN/rY8wgaMwgY6kgYswgYgxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpOZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMV # VGhlIFVTRVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENl # cnRpZmljYXRpb24gQXV0aG9yaXR5AhAwD2+s3WaYdHypRjaneC25MA0GCSqGSIb3 # DQEBAQUABIICADjzQ88HRf7JqA6aP116DllLqctG8hnjvSotEnKGolU90G/njmKl # 3I786+KL34lkEIojg84VUqSWE0dH4xj60/hRpjHpAV0n+zb4wGQIswG0D1oKGRTv # 2iTtgvYozg2HG9GQ2aEzMMIYgoV1AQeis0JcY15WF5BS6jAGzZ2znkuv2yoeIRBY # BRgLs/lMRaSd5ZcsiChdwy4xZ6Kl2etuHVGgkAerdH98VJOsS5f6qvICuEUKKDFB # ohGsCHdBVXgpMKq4IE6vliMR0CZ4/5PKqjGI5cfJUbrXwcwCH/DWF7Y5MJ1TLfTU # DdYfVg8L03rCZU9PnAHPtIWV5G5N2zF5TBIhd1q7eNwwS+tPDulOQHb6AZ6ijxQM # HfwxfkmxkIuEgmsMAYN2ibQhxvViiAz2Io5PPmpo5drP3nKLD+Sz9ZfKrRXrPe+Q # UvRSNw+sKQZmbrtjt3824bMGz1+jf6hEgOCZLPojbO0x5DyzwCaDGTvlqiIC+QjL # Dpbdx6ad7jSlLAcRFxwG75F+/dXZ7p8AzQGYX9vs4HRlroOHAZ/Vnk205cLjNu+O # GJcsdC8WJ9SVDyLqIW4DuHhHpfHJTBkKu8zKbGgjyBFg1sH7VKm8dQulho3FdJLU # ET0EKcX9Wo3X5Dqc0sLyDvY+qxyA7D1znQZG9XyE0nBmRE0QEodBluwr # SIG # End signature block
combined_dataset/train/non-malicious/sample_33_49.ps1
sample_33_49.ps1
/* Language: PowerShell Description: PowerShell is a task-based command-line shell and scripting language built on .NET. Author: David Mohundro <david@mohundro.com> Contributors: Nicholas Blumhardt <nblumhardt@nblumhardt.com>, Victor Zhou <OiCMudkips@users.noreply.github.com>, Nicolas Le Gall <contact@nlegall.fr> Website: https://docs.microsoft.com/en-us/powershell/ Category: scripting */ function powershell(hljs) { const TYPES = [ "string", "char", "byte", "int", "long", "bool", "decimal", "single", "double", "DateTime", "xml", "array", "hashtable", "void" ]; // https://docs.microsoft.com/en-us/powershell/scripting/developer/cmdlet/approved-verbs-for-windows-powershell-commands const VALID_VERBS = 'Add|Clear|Close|Copy|Enter|Exit|Find|Format|Get|Hide|Join|Lock|' + 'Move|New|Open|Optimize|Pop|Push|Redo|Remove|Rename|Reset|Resize|' + 'Search|Select|Set|Show|Skip|Split|Step|Switch|Undo|Unlock|' + 'Watch|Backup|Checkpoint|Compare|Compress|Convert|ConvertFrom|' + 'ConvertTo|Dismount|Edit|Expand|Export|Group|Import|Initialize|' + 'Limit|Merge|Mount|Out|Publish|Restore|Save|Sync|Unpublish|Update|' + 'Approve|Assert|Build|Complete|Confirm|Deny|Deploy|Disable|Enable|Install|Invoke|' + 'Register|Request|Restart|Resume|Start|Stop|Submit|Suspend|Uninstall|' + 'Unregister|Wait|Debug|Measure|Ping|Repair|Resolve|Test|Trace|Connect|' + 'Disconnect|Read|Receive|Send|Write|Block|Grant|Protect|Revoke|Unblock|' + 'Unprotect|Use|ForEach|Sort|Tee|Where'; const COMPARISON_OPERATORS = '-and|-as|-band|-bnot|-bor|-bxor|-casesensitive|-ccontains|-ceq|-cge|-cgt|' + '-cle|-clike|-clt|-cmatch|-cne|-cnotcontains|-cnotlike|-cnotmatch|-contains|' + '-creplace|-csplit|-eq|-exact|-f|-file|-ge|-gt|-icontains|-ieq|-ige|-igt|' + '-ile|-ilike|-ilt|-imatch|-in|-ine|-inotcontains|-inotlike|-inotmatch|' + '-ireplace|-is|-isnot|-isplit|-join|-le|-like|-lt|-match|-ne|-not|' + '-notcontains|-notin|-notlike|-notmatch|-or|-regex|-replace|-shl|-shr|' + '-split|-wildcard|-xor'; const KEYWORDS = { $pattern: /-?[A-z\.\-]+\b/, keyword: 'if else foreach return do while until elseif begin for trap data dynamicparam ' + 'end break throw param continue finally in switch exit filter try process catch ' + 'hidden static parameter', // "echo" relevance has been set to 0 to avoid auto-detect conflicts with shell transcripts built_in: 'ac asnp cat cd CFS chdir clc clear clhy cli clp cls clv cnsn compare copy cp ' + 'cpi cpp curl cvpa dbp del diff dir dnsn ebp echo|0 epal epcsv epsn erase etsn exsn fc fhx ' + 'fl ft fw gal gbp gc gcb gci gcm gcs gdr gerr ghy gi gin gjb gl gm gmo gp gps gpv group ' + 'gsn gsnp gsv gtz gu gv gwmi h history icm iex ihy ii ipal ipcsv ipmo ipsn irm ise iwmi ' + 'iwr kill lp ls man md measure mi mount move mp mv nal ndr ni nmo npssc nsn nv ogv oh ' + 'popd ps pushd pwd r rbp rcjb rcsn rd rdr ren ri rjb rm rmdir rmo rni rnp rp rsn rsnp ' + 'rujb rv rvpa rwmi sajb sal saps sasv sbp sc scb select set shcm si sl sleep sls sort sp ' + 'spjb spps spsv start stz sujb sv swmi tee trcm type wget where wjb write' // TODO: 'validate[A-Z]+' can't work in keywords }; const TITLE_NAME_RE = /\w[\w\d]*((-)[\w\d]+)*/; const BACKTICK_ESCAPE = { begin: '`[\\s\\S]', relevance: 0 }; const VAR = { className: 'variable', variants: [ { begin: /\$\B/ }, { className: 'keyword', begin: /\$this/ }, { begin: /\$[\w\d][\w\d_:]*/ } ] }; const LITERAL = { className: 'literal', begin: /\$(null|true|false)\b/ }; const QUOTE_STRING = { className: "string", variants: [ { begin: /"/, end: /"/ }, { begin: /@"/, end: /^"@/ } ], contains: [ BACKTICK_ESCAPE, VAR, { className: 'variable', begin: /\$[A-z]/, end: /[^A-z]/ } ] }; const APOS_STRING = { className: 'string', variants: [ { begin: /'/, end: /'/ }, { begin: /@'/, end: /^'@/ } ] }; const PS_HELPTAGS = { className: "doctag", variants: [ /* no paramater help tags */ { begin: /\.(synopsis|description|example|inputs|outputs|notes|link|component|role|functionality)/ }, /* one parameter help tags */ { begin: /\.(parameter|forwardhelptargetname|forwardhelpcategory|remotehelprunspace|externalhelp)\s+\S+/ } ] }; const PS_COMMENT = hljs.inherit( hljs.COMMENT(null, null), { variants: [ /* single-line comment */ { begin: /#/, end: /$/ }, /* multi-line comment */ { begin: /<#/, end: /#>/ } ], contains: [ PS_HELPTAGS ] } ); const CMDLETS = { className: 'built_in', variants: [ { begin: '('.concat(VALID_VERBS, ')+(-)[\\w\\d]+') } ] }; const PS_CLASS = { className: 'class', beginKeywords: 'class enum', end: /\s*[{]/, excludeEnd: true, relevance: 0, contains: [ hljs.TITLE_MODE ] }; const PS_FUNCTION = { className: 'function', begin: /function\s+/, end: /\s*\{|$/, excludeEnd: true, returnBegin: true, relevance: 0, contains: [ { begin: "function", relevance: 0, className: "keyword" }, { className: "title", begin: TITLE_NAME_RE, relevance: 0 }, { begin: /\(/, end: /\)/, className: "params", relevance: 0, contains: [ VAR ] } // CMDLETS ] }; // Using statment, plus type, plus assembly name. const PS_USING = { begin: /using\s/, end: /$/, returnBegin: true, contains: [ QUOTE_STRING, APOS_STRING, { className: 'keyword', begin: /(using|assembly|command|module|namespace|type)/ } ] }; // Comperison operators & function named parameters. const PS_ARGUMENTS = { variants: [ // PS literals are pretty verbose so it's a good idea to accent them a bit. { className: 'operator', begin: '('.concat(COMPARISON_OPERATORS, ')\\b') }, { className: 'literal', begin: /(-){1,2}[\w\d-]+/, relevance: 0 } ] }; const HASH_SIGNS = { className: 'selector-tag', begin: /@\B/, relevance: 0 }; // It's a very general rule so I'll narrow it a bit with some strict boundaries // to avoid any possible false-positive collisions! const PS_METHODS = { className: 'function', begin: /\[.*\]\s*[\w]+[ ]??\(/, end: /$/, returnBegin: true, relevance: 0, contains: [ { className: 'keyword', begin: '('.concat( KEYWORDS.keyword.toString().replace(/\s/g, '|' ), ')\\b'), endsParent: true, relevance: 0 }, hljs.inherit(hljs.TITLE_MODE, { endsParent: true }) ] }; const GENTLEMANS_SET = [ // STATIC_MEMBER, PS_METHODS, PS_COMMENT, BACKTICK_ESCAPE, hljs.NUMBER_MODE, QUOTE_STRING, APOS_STRING, // PS_NEW_OBJECT_TYPE, CMDLETS, VAR, LITERAL, HASH_SIGNS ]; const PS_TYPE = { begin: /\[/, end: /\]/, excludeBegin: true, excludeEnd: true, relevance: 0, contains: [].concat( 'self', GENTLEMANS_SET, { begin: "(" + TYPES.join("|") + ")", className: "built_in", relevance: 0 }, { className: 'type', begin: /[\.\w\d]+/, relevance: 0 } ) }; PS_METHODS.contains.unshift(PS_TYPE); return { name: 'PowerShell', aliases: [ "pwsh", "ps", "ps1" ], case_insensitive: true, keywords: KEYWORDS, contains: GENTLEMANS_SET.concat( PS_CLASS, PS_FUNCTION, PS_USING, PS_ARGUMENTS, PS_TYPE ) }; } export { powershell as default };
combined_dataset/train/non-malicious/sample_50_8.ps1
sample_50_8.ps1
# # Module manifest for module 'OCI.PSModules.Jms' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Jms.dll' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '7a9fc2a3-fd30-429b-bb7a-b66e5815c207' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Jms Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Jms.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIJmsFleetInstallationSites', 'Disable-OCIJmsDrs', 'Enable-OCIJmsDrs', 'Get-OCIJmsAnnouncementsList', 'Get-OCIJmsBlocklistsList', 'Get-OCIJmsCryptoAnalysisResult', 'Get-OCIJmsCryptoAnalysisResultsList', 'Get-OCIJmsDrsFile', 'Get-OCIJmsDrsFilesList', 'Get-OCIJmsExportSetting', 'Get-OCIJmsExportStatus', 'Get-OCIJmsFleet', 'Get-OCIJmsFleetAdvancedFeatureConfiguration', 'Get-OCIJmsFleetAgentConfiguration', 'Get-OCIJmsFleetDiagnosesList', 'Get-OCIJmsFleetsList', 'Get-OCIJmsInstallationSitesList', 'Get-OCIJmsJavaFamiliesList', 'Get-OCIJmsJavaFamily', 'Get-OCIJmsJavaMigrationAnalysisResult', 'Get-OCIJmsJavaMigrationAnalysisResultsList', 'Get-OCIJmsJavaRelease', 'Get-OCIJmsJavaReleasesList', 'Get-OCIJmsJreUsageList', 'Get-OCIJmsPerformanceTuningAnalysisResult', 'Get-OCIJmsPerformanceTuningAnalysisResultsList', 'Get-OCIJmsWorkItemsList', 'Get-OCIJmsWorkRequest', 'Get-OCIJmsWorkRequestErrorsList', 'Get-OCIJmsWorkRequestLogsList', 'Get-OCIJmsWorkRequestsList', 'Invoke-OCIJmsRequestCryptoAnalyses', 'Invoke-OCIJmsRequestJavaMigrationAnalyses', 'Invoke-OCIJmsRequestJfrRecordings', 'Invoke-OCIJmsRequestPerformanceTuningAnalyses', 'Invoke-OCIJmsScanJavaServerUsage', 'Invoke-OCIJmsScanLibraryUsage', 'Invoke-OCIJmsSummarizeApplicationInstallationUsage', 'Invoke-OCIJmsSummarizeApplicationUsage', 'Invoke-OCIJmsSummarizeDeployedApplicationInstallationUsage', 'Invoke-OCIJmsSummarizeDeployedApplicationUsage', 'Invoke-OCIJmsSummarizeInstallationUsage', 'Invoke-OCIJmsSummarizeJavaServerInstanceUsage', 'Invoke-OCIJmsSummarizeJavaServerUsage', 'Invoke-OCIJmsSummarizeJreUsage', 'Invoke-OCIJmsSummarizeLibraryUsage', 'Invoke-OCIJmsSummarizeManagedInstanceUsage', 'Invoke-OCIJmsSummarizeResourceInventory', 'Move-OCIJmsFleetCompartment', 'New-OCIJmsAgentDeployScript', 'New-OCIJmsBlocklist', 'New-OCIJmsDrsFile', 'New-OCIJmsFleet', 'Remove-OCIJmsBlocklist', 'Remove-OCIJmsCryptoAnalysisResult', 'Remove-OCIJmsDrsFile', 'Remove-OCIJmsFleet', 'Remove-OCIJmsFleetInstallationSites', 'Remove-OCIJmsJavaMigrationAnalysisResult', 'Remove-OCIJmsPerformanceTuningAnalysisResult', 'Stop-OCIJmsWorkRequest', 'Update-OCIJmsDrsFile', 'Update-OCIJmsExportSetting', 'Update-OCIJmsFleet', 'Update-OCIJmsFleetAdvancedFeatureConfiguration', 'Update-OCIJmsFleetAgentConfiguration' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Jms' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_2_8.ps1
sample_2_8.ps1
# <copyright> # INTEL CONFIDENTIAL # # Copyright 2021 Intel Corporation # # This software and the related documents are Intel copyrighted materials, and your use of # them is governed by the express license under which they were provided to you ("License"). # Unless the License provides otherwise, you may not use, modify, copy, publish, distribute, # disclose or transmit this software or the related documents without Intel's prior written # permission. # # This software and the related documents are provided as is, with no express or implied # warranties, other than those that are expressly stated in the License. # # <copyright> # Suppress irrelevant PS Script Analyzer warnings (trailing Param() is needed to help PSSA parse the file) [Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSAvoidGlobalVars', 'Global:FormatEnumerationLimit')] [Diagnostics.CodeAnalysis.SuppressMessageAttribute("PSAvoidUsingPositionalParameters", "", Scope="function")] [Diagnostics.CodeAnalysis.SuppressMessageAttribute("PSUseShouldProcessForStateChangingFunctions", "", Scope="function")] Param() #.ExternalHelp IntelEthernetCmdlets.dll-Help.xml function Get-IntelEthernetLogConfig { [CmdletBinding()] Param( [parameter(Mandatory=$false)] [SupportsWildcards()] [ValidateNotNullOrEmpty()] [String[]] $Name = '', [parameter(Mandatory=$false,Position=0,ValueFromPipeline=$true)] [ValidateNotNullOrEmpty()] [object[]] $Adapter = $null, [parameter(Mandatory=$false,Position=1)] [SupportsWildcards()] [ValidateNotNullOrEmpty()] [String[]] $Module = '', [parameter(Mandatory=$false)] [SupportsWildcards()] [ValidateNotNullOrEmpty()] [String[]] $Configuration = '', [parameter(Mandatory=$false)] [ValidateNotNullOrEmpty()] [String[]] $SubModule = '' ) Begin { $AdapterName = $Name $ModuleNames = $Module $ConfigurationNames = $Configuration $SubModuleSum = $SUBMODULE_DEFAULT_SUM $script:ErrorMessagesGet = @() $script:WarningMessagesGet = @() $LogConfigs = @() $DefaultFormatEnumLimit = $global:FormatEnumerationLimit $global:FormatEnumerationLimit = -1 GetIntelEthernetDevices if ($script:SupportedAdapters) { $script:MSNetAdapters = @(Get-NetAdapter -InterfaceDescription $script:SupportedAdapters.Name -ErrorAction SilentlyContinue) } } Process { $Adapters = $Adapter $PreProcessedAdapterNames = ValidateGetAdapterNameParams $AdapterName $Adapters ([ref]$script:ErrorMessagesGet) $AdapterNames = @(GetSupportedAdapters $PreProcessedAdapterNames ([ref]$script:WarningMessagesGet)) foreach ($a in $AdapterNames) { $TmpStatusMsg = CheckDeviceError $a if (-not [string]::IsNullOrEmpty($TmpStatusMsg)) { $script:WarningMessagesGet += $TmpStatusMsg continue } $Local:IntelLogConfigurations = @{} $IntelLogConfigurations = GetConfigHashTable $a "\AdditionalConfiguration\INTEL_LOG_CONFIGURATIONS" $Local:IntelLogConfigModules = @{} $IntelLogConfigModules = GetConfigHashTable $a "\AdditionalConfiguration\INTEL_LOG_CONFIG_MODULES" $Local:IntelLogConfigLevels = @{} $IntelLogConfigLevels = GetConfigHashTable $a "\AdditionalConfiguration\INTEL_LOG_CONFIG_LEVELS" if ($IntelLogConfigLevels.Count -eq 0) { $IntelLogConfigLevels = $DRIVER_LOG_LEVEL_MAP } $DisplayConfigNames = @() if (!(ValidateConfigurationParam $ConfigurationNames $ModuleNames ([ref]$DisplayConfigNames) "Get" $a)) { if ($script:ErrorMessagesGet.Count -gt 0) { break } continue } $DisplayModules = @() $DisplayLevels = @() $DriverPassed = $null if ($DisplayConfigNames) { $MethodOutput = InvokeCimMethod "IntlLan_SetGenData" $a "WmiGetFwLogLevels" if (!(ValidateMethodOutput $MethodOutput "Get")) { continue } GetConfigLogs $DisplayConfigNames ([ref]$DisplayModules) ([ref]$DisplayLevels) $MethodOutput } else { $DriverPassed = $ModuleNames.Where({$DRIVER_MODULE_NAME -like $_}) if (-Not $DriverPassed -and $SubModule) { $script:ErrorMessagesGet += $Messages.InvalidParams break } elseif ($SubModule) { $SubModuleSum = GetSubModuleBitmask $SubModule ([ref]$script:ErrorMessagesGet) if ($SubModuleSum -eq -1) { break } } if ($DriverPassed -or -Not $ModuleNames) { $LogConfigs += GetDriverLogConfig $DriverPassed $SubModuleSum $a ([ref]$script:ErrorMessagesGet) } $MethodOutput = $null if ($IntelLogConfigModules.Count -gt 0) { $MethodOutput = InvokeCimMethod "IntlLan_SetGenData" $a "WmiGetFwLogLevels" if (!(ValidateMethodOutput $MethodOutput "Get")) { continue } } # ValidateGetModuleParam will error if Driver is passed and not present here. $IntelLogConfigModules[$DRIVER_MODULE_NAME] = $DRIVER_MODULE_ID ValidateGetModuleParam ([ref]$DisplayModules) ([ref]$DisplayLevels) $ModuleNames $MethodOutput $a } if ($DisplayModules -and $DisplayLevels) { $LogConfigs += GatherOutput $a $DisplayModules $DisplayLevels $DriverPassed } } } End { $global:FormatEnumerationLimit = $DefaultFormatEnumLimit if ($LogConfigs) { Write-Output $LogConfigs } foreach ($WarningMessage in $script:WarningMessagesGet) { Write-Warning $WarningMessage } foreach ($ErrorMessage in $script:ErrorMessagesGet) { Write-Error $ErrorMessage } } } #.ExternalHelp IntelEthernetCmdlets.dll-Help.xml function Set-IntelEthernetLogConfig { [CmdletBinding()] Param( [parameter(Mandatory=$false)] [SupportsWildcards()] [ValidateNotNullOrEmpty()] [String[]] $Name = '', [parameter(Mandatory=$false,Position=0,ValueFromPipeline=$true)] [ValidateNotNullOrEmpty()] [object[]] $Adapter = $null, [parameter(Mandatory=$false,Position=1)] [SupportsWildcards()] [ValidateNotNullOrEmpty()] [String[]] $Module = '', [parameter(Mandatory=$false,Position=2)] [SupportsWildcards()] [ValidateNotNullOrEmpty()] [String] $Level = '', [parameter(Mandatory=$false)] [SupportsWildcards()] [ValidateNotNullOrEmpty()] [String[]] $Configuration = '', [parameter(Mandatory=$false)] [ValidateNotNullOrEmpty()] [String[]] $SubModule = '' ) Begin { $ModuleNames = $Module $LevelName = $Level $ConfigurationNames = $Configuration $SubModuleSum = $SUBMODULE_DEFAULT_SUM $script:WarningMessagesSet = @() $script:ErrorMessagesSet = @() $LogConfigs = @() GetIntelEthernetDevices if ($script:SupportedAdapters) { $script:MSNetAdapters = @(Get-NetAdapter -InterfaceDescription $script:SupportedAdapters.Name -ErrorAction SilentlyContinue) } } Process { do { $PreProcessedAdapterNames = ValidateSetAdapterNameParams $Name $Adapter ([ref]$script:ErrorMessagesSet) $AdapterNames = @(GetSupportedAdapters $PreProcessedAdapterNames ([ref]$script:ErrorMessagesSet)) if ([string]::IsNullOrEmpty($ConfigurationNames) -and ([string]::IsNullOrEmpty($ModuleNames))) { $script:ErrorMessagesSet += $Messages.InvalidParamsConfigOrModule break } foreach($a in $AdapterNames) { $TmpStatusMsg = CheckDeviceError $a if (-not [string]::IsNullOrEmpty($TmpStatusMsg)) { $script:ErrorMessagesSet += $TmpStatusMsg continue } $DisplayModules = @() $DisplayLevels = @() $InputModulesId = [uint32[]]::new(64) $InputLevelId = [uint32[]]::new(64) $Local:IntelLogConfigurations = @{} $IntelLogConfigurations = GetConfigHashTable $a "\AdditionalConfiguration\INTEL_LOG_CONFIGURATIONS" $Local:IntelLogConfigModules = @{} $IntelLogConfigModules = GetConfigHashTable $a "\AdditionalConfiguration\INTEL_LOG_CONFIG_MODULES" $IntelLogConfigModules[$DRIVER_MODULE_NAME] = $DRIVER_MODULE_ID $Local:IntelLogConfigLevels = @{} $IntelLogConfigLevels = GetConfigHashTable $a "\AdditionalConfiguration\INTEL_LOG_CONFIG_LEVELS" if ($IntelLogConfigLevels.Count -eq 0) { $IntelLogConfigLevels = $DRIVER_LOG_LEVEL_MAP } $ModuleCount = 0 $DisplayConfigNames = @() if (!(ValidateConfigurationParam $ConfigurationNames $ModuleNames ([ref]$DisplayConfigNames) "Set" $a)) { break } $bDriverPassed = $false $InputConfigurationIDs = $null if ($DisplayConfigNames) { $InputConfigurationIDs = $IntelLogConfigurations[$DisplayConfigNames] } else { ValidateSetModuleParam ([ref]$InputModulesId) ([ref]$DisplayModules) $ModuleNames $a if ($DisplayModules -contains $DRIVER_MODULE_NAME) { $bDriverPassed = $true } elseif ($SubModule) { $script:ErrorMessagesSet += $Messages.InvalidParams break } $ModuleCount = $DisplayModules.Count } if ($ModuleCount -ne 0) { if (!(ValidateLevelParam ([ref]$InputLevelId) ([ref]$DisplayLevels) $LevelName $ModuleCount $a $bDriverPassed)) { break } if ($bDriverPassed) { # Driver module is not included in Wmi method params $ModuleCount -= 1 if ($InputLevelId[0] -lt 3) { $script:ErrorMessagesSet += $Messages.InvalidDriverLevel break } if ($SubModule) { $SubModuleSum = GetSubModuleBitmask $SubModule ([ref]$script:ErrorMessagesSet) if ($SubModuleSum -eq -1) { break } } if (-not (SetSubModuleRegistryValue $a $SubModuleSum)) { $script:ErrorMessagesSet += $Messages.InvalidSystemConfigFailure break } $LevelName = GetLevelName($InputLevelId[0]) if (-Not (SetDriverLogLevel $a $LevelName)) { $script:ErrorMessagesSet += $Messages.InvalidSystemConfigFailure break } } if ($ModuleCount -gt 0) { $params = @{Count = [uint32]$ModuleCount; ModuleID = $InputModulesId; Loglevel = $InputLevelId} $MethodOutput = InvokeCimMethod "IntlLan_SetGenData" $a "WmiSetFwLogLevels" $params } if ($bDriverPassed) { # Driver is set, display it. Avoid call to Validate if no other modules passed. if ($ModuleCount -eq 0 -or (ValidateMethodOutput $MethodOutput "Set")) { $LogConfigs += Get-IntelEthernetLogConfig -Name $a -Module $DisplayModules -SubModule $SubModuleSum } else { $LogConfigs += Get-IntelEthernetLogConfig -Name $a -Module $DRIVER_MODULE_NAME -SubModule $SubModuleSum } } elseif (ValidateMethodOutput $MethodOutput "Set") { $LogConfigs += Get-IntelEthernetLogConfig -Name $a -Module $DisplayModules } } elseif ($null -ne $InputConfigurationIDs) { $count = 1 if (!(ValidateLevelParam ([ref]$InputLevelId) ([ref]$DisplayLevels) $LevelName $count $a)) { break } $bContinue = $true foreach ($ConfigID in $InputConfigurationIDs) { $params = @{ConfigurationID = [uint32]$ConfigID; Level = $InputLevelId[0]} $MethodOutput = InvokeCimMethod "IntlLan_SetGenData" $a "WmiSetFwLogConfiguration" $params if (!(ValidateMethodOutput $MethodOutput "Set")) { $bContinue = $false break } } if (!$bContinue) { break } $LogConfigs += Get-IntelEthernetLogConfig -Name $a -Configuration $DisplayConfigNames } } } while ($false) } End { if ($LogConfigs) { Write-Output $LogConfigs } foreach ($WarningMessage in $script:WarningMessagesSet) { Write-Warning $WarningMessage } foreach ($ErrorMessage in $script:ErrorMessagesSet) { Write-Error $ErrorMessage } } } #.ExternalHelp IntelEthernetCmdlets.dll-Help.xml function Start-IntelEthernetLog { [CmdletBinding()] Param( [parameter(Mandatory=$false)] [ValidateNotNullOrEmpty()] [String] $Name = '', [parameter(Mandatory=$false,Position=0,ValueFromPipeline=$true)] [ValidateNotNullOrEmpty()] [object] $Adapter = $null, [parameter(Mandatory=$false,Position=1)] [ValidateNotNullOrEmpty()] [string] $Path = '', [parameter(Mandatory=$false)] [switch] $Force, [parameter(Mandatory=$false)] [switch] $Append ) Begin { $SubModuleSum = 0xFFFF # Set LogmanLevel to Normal by default $LogmanLevel = 4 $script:ErrorMessagesStart = @() $script:WarningMessagesStart = @() GetIntelEthernetDevices if ($script:SupportedAdapters) { $script:MSNetAdapters = @(Get-NetAdapter -InterfaceDescription $script:SupportedAdapters.Name -ErrorAction SilentlyContinue) } } End { do { if ($Name -match '\*') { $script:ErrorMessagesStart += $Messages.AdapterNotFound -f $Name break } $PreProcessedAdapterNames = ValidateSetAdapterNameParams $Name $Adapter ([ref]$script:ErrorMessagesStart) $AdapterName = GetSupportedAdapters $PreProcessedAdapterNames ([ref]$script:ErrorMessagesStart) if (([string]::IsNullOrEmpty($AdapterName))) { break } if (-not (ValidateSingleAdapter $input $AdapterName ([ref]$script:ErrorMessagesStart))) { break } $TmpStatusMsg = CheckDeviceError $AdapterName if (-not [string]::IsNullOrEmpty($TmpStatusMsg)) { $script:ErrorMessagesStart += $TmpStatusMsg break } $UseDefaultPath = $false if (([string]::IsNullOrEmpty($Path))) { $UseDefaultPath = $true } $LogmanGUID = GetLogmanGUID $AdapterName ([ref]$script:ErrorMessagesStart) $LogName = GetLogName $AdapterName ([ref]$script:ErrorMessagesStart) if ($null -eq $LogmanGUID -or $null -eq $LogName) { break } if (LogmanProcessRunning $AdapterName $LogName $LogmanGUID) { break } $LogmanPath = '' if (-not (ValidatePathParams ([ref]$LogmanPath) $UseDefaultPath $LogName ([ref]$script:ErrorMessagesStart))) { break } $DriverLogLevel = GetDriverLogLevel $AdapterName if ($DriverLogLevel) { $Local:IntelLogConfigLevels = @{} $IntelLogConfigLevels = GetConfigHashTable $AdapterName "\AdditionalConfiguration\INTEL_LOG_CONFIG_LEVELS" if ($IntelLogConfigLevels.Count -eq 0) { $IntelLogConfigLevels = $DRIVER_LOG_LEVEL_MAP } # Driver log levels are normal levels value + 1 $LogmanLevel = $IntelLogConfigLevels[$DriverLogLevel] + 1 $LogMetadataName = "$LogName.txt" $LogMetadataPath = '' if (-Not $UseDefaultPath) { if ([IO.Path]::GetExtension($Path) -eq ".txt") { $Path += ".txt" } else { $Path = [IO.Path]::ChangeExtension($Path, ".txt") } } $iBeforeErrorCount = $script:ErrorMessagesStart.Count if (-not (ValidatePathParams ([ref]$LogMetadataPath) $UseDefaultPath $LogMetadataName ([ref]$script:ErrorMessagesStart))) { if ($iBeforeErrorCount -lt $script:ErrorMessagesStart.Count -and $script:ErrorMessagesStart[-1] -eq $Messages.LogmanFileExists -f $AdapterName) { # Driver Metadata File is always replaced if it exists. $script:ErrorMessagesStart = $script:ErrorMessagesStart | Select-Object -First ($script:ErrorMessagesStart.Count - 1) } else { break } } $AdapterRegistryPath = GetAdapterRegistryConfigPath $AdapterName "" if ($null -eq $AdapterRegistryPath) { $script:ErrorMessagesStart += $Messages.NoCmdletSupport -f $AdapterName break } $SubModuleRegistryValue = Get-ItemProperty -Path $AdapterRegistryPath -Name $SUBMODULE_REGISTRYVAR_NAME -ErrorAction SilentlyContinue if ($SubModuleRegistryValue) { $SubModuleSum = $SubModuleRegistryValue.SubModule if (-Not (CreateDriverLogMetadataFile $AdapterName)) { break } } } LogmanStart $LogmanPath $LogName $LogmanGUID $SubModuleSum $LogmanLevel if (ValidateLogmanStart $AdapterName) { $LogmanPath = Resolve-Path -Path $LogmanPath -ErrorAction SilentlyContinue Write-Output $LogmanPath } break } while ($false) foreach ($WarningMessage in $script:WarningMessagesStart) { Write-Warning $WarningMessage } foreach ($ErrorMessage in $script:ErrorMessagesStart) { Write-Error $ErrorMessage } } } #.ExternalHelp IntelEthernetCmdlets.dll-Help.xml function Stop-IntelEthernetLog { [CmdletBinding()] Param( [parameter(Mandatory=$false)] [ValidateNotNullOrEmpty()] [String] $Name = '', [parameter(Mandatory=$false,Position=0,ValueFromPipeline=$true)] [ValidateNotNullOrEmpty()] [object] $Adapter = $null ) Begin { $script:ErrorMessagesStop = @() $script:WarningMessagesStop = @() $bErrorObtained = $false GetIntelEthernetDevices if ($script:SupportedAdapters) { $script:MSNetAdapters = @(Get-NetAdapter -InterfaceDescription $script:SupportedAdapters.Name -ErrorAction SilentlyContinue) } } Process { $PreProcessedAdapterNames = ValidateGetAdapterNameParams $Name $Adapter ([ref]$script:ErrorMessagesStop) $AdapterNames = @(GetSupportedAdapters $PreProcessedAdapterNames ([ref]$script:WarningMessagesStop)) foreach ($a in $AdapterNames) { $TmpStatusMsg = CheckDeviceError $a if (-not [string]::IsNullOrEmpty($TmpStatusMsg)) { $script:WarningMessagesStop += $TmpStatusMsg continue } if (-Not $bErrorObtained) { $LogName = GetLogName $a ([ref]$script:ErrorMessagesStop) } else { $LogName = GetLogName $a ([ref]@()) } if ($null -eq $LogName) { $bErrorObtained = $true continue } LogmanStop $LogName if (-Not $bErrorObtained) { if (-Not (ValidateLogmanStop $a ([ref]$script:ErrorMessagesStop))) { $bErrorObtained = $true } } } } End { foreach ($WarningMessage in $script:WarningMessagesStop) { Write-Warning $WarningMessage } foreach ($ErrorMessage in $script:ErrorMessagesStop) { Write-Error $ErrorMessage } } } #.ExternalHelp IntelEthernetCmdlets.dll-Help.xml function Disable-IntelEthernetLogConfig { [CmdletBinding()] Param( [parameter(Mandatory=$false)] [SupportsWildcards()] [ValidateNotNullOrEmpty()] [String[]] $Name = '', [parameter(Mandatory=$false,Position=0,ValueFromPipeline=$true)] [ValidateNotNullOrEmpty()] [object[]] $Adapter = $null ) Begin { $AdapterName = $Name $script:ErrorMessagesDisable = @() $script:WarningMessagesDisable = @() $LogConfigs = @() $DefaultFormatEnumLimit = $global:FormatEnumerationLimit $global:FormatEnumerationLimit = -1 GetIntelEthernetDevices if ($script:SupportedAdapters) { $script:MSNetAdapters = @(Get-NetAdapter -InterfaceDescription $script:SupportedAdapters.Name -ErrorAction SilentlyContinue) } } Process { $Adapters = $Adapter $PreProcessedAdapterNames = ValidateGetAdapterNameParams $AdapterName $Adapters ([ref]$script:ErrorMessagesDisable) $AdapterNames = @(GetSupportedAdapters $PreProcessedAdapterNames ([ref]$script:WarningMessagesDisable)) foreach ($a in $AdapterNames) { $TmpStatusMsg = CheckDeviceError $a if (-not [string]::IsNullOrEmpty($TmpStatusMsg)) { $script:ErrorMessagesDisable += $TmpStatusMsg continue } $DriverConfig = Set-IntelEthernetLogConfig -Name $a -Module $DRIVER_MODULE_NAME -SubModule @($SUB_MODULE_MAP.Keys)[0] -Level "Normal" if (-Not $DriverConfig) { continue } $MethodOutput = InvokeCimMethod "IntlLan_SetGenData" $a "WmiDisableFwLogLevels" if ($null -ne $MethodOutput) { if (!(ValidateMethodOutput $MethodOutput "Disable")) { continue } } # Will pass Driver as module, so returns IntelDriverLogConfiguration $LogConfigs += Get-IntelEthernetLogConfig -Name $a -Module "*" -SubModule @($SUB_MODULE_MAP.Keys)[0] } } End { $global:FormatEnumerationLimit = $DefaultFormatEnumLimit if ($LogConfigs) { Write-Output $LogConfigs } foreach ($WarningMessage in $script:WarningMessagesDisable) { Write-Warning $WarningMessage } foreach ($ErrorMessage in $script:ErrorMessagesDisable) { Write-Error $ErrorMessage } } } #.ExternalHelp IntelEthernetCmdlets.dll-Help.xml function Reset-IntelEthernetLogConfig { [CmdletBinding()] Param( [parameter(Mandatory=$false)] [SupportsWildcards()] [ValidateNotNullOrEmpty()] [String[]] $Name = '', [parameter(Mandatory=$false,Position=0,ValueFromPipeline=$true)] [ValidateNotNullOrEmpty()] [object[]] $Adapter = $null ) Begin { $AdapterName = $Name $script:ErrorMessagesReset = @() $script:WarningMessagesReset = @() $LogConfigs = @() $DefaultFormatEnumLimit = $global:FormatEnumerationLimit $global:FormatEnumerationLimit = -1 GetIntelEthernetDevices if ($script:SupportedAdapters) { $script:MSNetAdapters = @(Get-NetAdapter -InterfaceDescription $script:SupportedAdapters.Name -ErrorAction SilentlyContinue) } } Process { $Adapters = $Adapter $PreProcessedAdapterNames = ValidateGetAdapterNameParams $AdapterName $Adapters ([ref]$script:ErrorMessagesReset) $AdapterNames = @(GetSupportedAdapters $PreProcessedAdapterNames ([ref]$script:WarningMessagesReset)) foreach ($a in $AdapterNames) { $TmpStatusMsg = CheckDeviceError $a if (-not [string]::IsNullOrEmpty($TmpStatusMsg)) { $script:ErrorMessagesReset += $TmpStatusMsg continue } # Set driver level back to Normal $null = Set-IntelEthernetLogConfig -Name $a -Module $DRIVER_MODULE_NAME $MethodOutput = InvokeCimMethod "IntlLan_SetGenData" $a "WmiResetFwLogLevels" if ($null -ne $MethodOutput) { if (!(ValidateMethodOutput $MethodOutput "Reset")) { continue } } $LogConfigs += Get-IntelEthernetLogConfig -Name $a -Module "*" } } End { $global:FormatEnumerationLimit = $DefaultFormatEnumLimit if ($LogConfigs) { Write-Output $LogConfigs } foreach ($WarningMessage in $script:WarningMessagesReset) { Write-Warning $WarningMessage } foreach ($ErrorMessage in $script:ErrorMessagesReset) { Write-Error $ErrorMessage } } } Function GatherOutput($AdapterName, $DisplayModules, $DisplayLevels, $DriverPassed) { $LogConfigs = @() $ValidLevels = $IntelLogConfigLevels.Keys $LogConfigCount = $DisplayModules.Count for ($i = 0; $i -lt $LogConfigCount; $i++) { if ($DriverPassed) { $LogConfigs += [PsCustomObject] @{ PSTypeName = 'IntelDriverLogConfiguration'; Name = $AdapterName; Module = $DisplayModules[$i]; SubModule = ""; Level = $DisplayLevels[$i]; ValidSubModules = @(); ValidLevels = $ValidLevels} } else { $LogConfigs += [PsCustomObject] @{ PSTypeName = 'IntelLogConfiguration'; Name = $AdapterName; Module = $DisplayModules[$i]; Level = $DisplayLevels[$i]; ValidSubModules = @(); ValidLevels = $ValidLevels} } } return $LogConfigs } Function GetModuleName($ModuleId) { return $IntelLogConfigModules.GetEnumerator().Where({$_.Value -eq $ModuleId}).Name } Function GetLevelName($LevelId) { return $IntelLogConfigLevels.GetEnumerator().Where({$_.Value -eq $LevelId}).Name } Function GetDriverLogLevel($AdapterName) { $DriverRegistryValue = $null $AdapterRegistryPath = GetAdapterRegistryConfigPath $AdapterName "" if ($null -ne $AdapterRegistryPath) { $DriverRegistryValue = Get-ItemProperty -Path $AdapterRegistryPath -Name $DRIVERLOG_REGISTRYVAR_NAME -ErrorAction SilentlyContinue } if ($null -ne $DriverRegistryValue) { $DriverRegistryValue = $DriverRegistryValue.DriverLogLevel } return $DriverRegistryValue } Function GetDriverLogConfig($DriverPassed, $SubModuleSum, $AdapterName, [ref]$ErrorMessages) { $LogConfigs = @() $InactiveSubModuleArray = @() $ActiveSubModuleArray = @() $DriverLevel = GetDriverLogLevel $AdapterName if (-Not $DriverLevel) { # Set to Normal by default $DriverLevel = @($DRIVER_LOG_LEVEL_MAP.Keys)[1] if (-Not (SetDriverLogLevel $AdapterName $DriverLevel)) { $ErrorMessages.Value += $Messages.InvalidSystemConfigFailure break } } $AdapterRegistryPath = GetAdapterRegistryConfigPath $AdapterName "" if ($null -eq $AdapterRegistryPath) { $ErrorMessages.Value += $Messages.NoCmdletSupport -f $AdapterName break } $SubModuleRegistryValue = Get-ItemProperty -Path $AdapterRegistryPath -Name $SUBMODULE_REGISTRYVAR_NAME -ErrorAction SilentlyContinue if (-Not $SubModuleRegistryValue -or [string]::IsNullOrEmpty($SubModuleRegistryValue.SubModule)) { # If driver passed but set has not been used, enable default driver logging if (-not (SetSubModuleRegistryValue $a $SUBMODULE_DEFAULT_SUM)) { $ErrorMessages.Value += $Messages.InvalidSystemConfigFailure break } $RegistrySubModuleSum = $SUBMODULE_DEFAULT_SUM } else { $RegistrySubModuleSum = $SubModuleRegistryValue.SubModule } foreach ($DisplayName in $SUB_MODULE_MAP.Keys) { if ($SUB_MODULE_MAP[$DisplayName] -band $SubModuleSum) { if ($SUB_MODULE_MAP[$DisplayName] -band $RegistrySubModuleSum) { $ActiveSubModuleArray += $DisplayName } else { $InactiveSubModuleArray += $DisplayName } } } if ($DriverPassed) { foreach ($ActiveSubModule in $ActiveSubModuleArray) { $LogConfigs += [PsCustomObject] @{ PSTypeName = 'IntelDriverLogConfiguration'; Name = $AdapterName; Module = $DRIVER_MODULE_NAME; SubModule = $ActiveSubModule; Level = $DriverLevel; ValidSubModules = $SUB_MODULE_MAP.Keys; ValidLevels = @($DRIVER_LOG_LEVEL_MAP.Keys)[0,1] } } foreach ($InactiveSubModule in $InactiveSubModuleArray) { $LogConfigs += [PsCustomObject] @{ PSTypeName = 'IntelDriverLogConfiguration'; Name = $AdapterName; Module = $DRIVER_MODULE_NAME; SubModule = $InactiveSubModule; Level = @($DRIVER_LOG_LEVEL_MAP.Keys)[-1]; # Disabled ValidSubModules = $SUB_MODULE_MAP.Keys; ValidLevels = @($DRIVER_LOG_LEVEL_MAP.Keys)[0,1] } } } else { $LogConfigs += [PsCustomObject] @{ PSTypeName = 'IntelLogConfiguration'; Name = $AdapterName; Module = $DRIVER_MODULE_NAME; SubModule = @($ActiveSubModuleArray); Level = $DriverLevel; ValidSubModules = $SUB_MODULE_MAP.Keys; ValidLevels = @($DRIVER_LOG_LEVEL_MAP.Keys)[0,1] } } return $LogConfigs } Function GetSubModuleBitmask($SubModuleArray, [ref]$ErrorMessages) { $iSubModuleSum = 0 foreach ($SubModule in $SubModuleArray) { if ($SubModule -match "^0[xX][A-Fa-f0-9]+$" -or $SubModule -match "^[1-9]\d*$") { if ([int]$SubModule -le $SUM_SUBMODULES) { $iSubModuleSum = $iSubModuleSum -bor $SubModule } else { $iSubModuleSum = $SUM_SUBMODULES continue } } elseif ($SUB_MODULE_MAP.Keys -Contains $SubModule) { $iSubModuleSum = $iSubModuleSum -bor $SUB_MODULE_MAP[$SubModule] } else { $ErrorMessages.Value += $Messages.InvalidSubModule -f $a, $SubModule $iSubModuleSum = -1 break } } return $iSubModuleSum } Function GetLogmanGUID($AdapterName, [ref]$ErrorMessages) { $CurrentAdapter = $script:PnpDevice.Where({ $_.FriendlyName -eq $AdapterName }) if ($CurrentAdapter) { switch ($CurrentAdapter.Service) { 'i40ea' { return $I40EA_WPP_GUID; break } 'i40eb' { return $I40EB_WPP_GUID; break } 'ixw' { return $IXW_WPP_GUID; break } 'icea' { $WppGuid = GetItemPropertyValue $AdapterName "\AdditionalConfiguration" "WPP_GUID" if (-Not $WppGuid) { $WppGuid = $ICEA_WPP_GUID } return $WppGuid break } 'iceb' { $WppGuid = GetItemPropertyValue $AdapterName "\AdditionalConfiguration" "WPP_GUID" if (-Not $WppGuid) { $WppGuid = $ICEB_WPP_GUID } return $WppGuid break } 'scea' { $WppGuid = GetItemPropertyValue $AdapterName "\AdditionalConfiguration" "WPP_GUID" if (-Not $WppGuid) { $WppGuid = $SCEA_WPP_GUID } return $WppGuid break } 'sceb' { $WppGuid = GetItemPropertyValue $AdapterName "\AdditionalConfiguration" "WPP_GUID" if (-Not $WppGuid) { $WppGuid = $SCEB_WPP_GUID } return $WppGuid break } 'ixw' { $WppGuid = GetItemPropertyValue $AdapterName "\AdditionalConfiguration" "WPP_GUID" if (-Not $WppGuid) { $WppGuid = $IXW_WPP_GUID } return $WppGuid break } default { $TmpErrorMsg = $Messages.NoCmdletSupport -f $AdapterName if (-not ($ErrorMessages.Value -contains $TmpErrorMsg)) { $ErrorMessages.Value += $TmpErrorMsg } break } } } return $null } Function GetLogName($AdapterName, [ref]$ErrorMessages) { $CurrentAdapter = $script:PnpDevice.Where({ $_.FriendlyName -eq $AdapterName }) if ($CurrentAdapter) { switch ($CurrentAdapter.Service) { 'i40ea' { return $I40EA_LOGNAME; break } 'i40eb' { return $I40EB_LOGNAME; break } 'ixw' { return $IXW_LOGNAME; break } 'icea' { $LogName = GetItemPropertyValue $AdapterName "\AdditionalConfiguration" "FW_LOG_NAME" if (-Not $LogName) { $LogName = $ICEA_LOGNAME } return $LogName break } 'iceb' { $LogName = GetItemPropertyValue $AdapterName "\AdditionalConfiguration" "FW_LOG_NAME" if (-Not $LogName) { $LogName = $ICEB_LOGNAME } return $LogName break } 'scea' { $LogName = GetItemPropertyValue $AdapterName "\AdditionalConfiguration" "FW_LOG_NAME" if (-Not $LogName) { $LogName = $SCEA_LOGNAME } return $LogName break } 'sceb' { $LogName = GetItemPropertyValue $AdapterName "\AdditionalConfiguration" "FW_LOG_NAME" if (-Not $LogName) { $LogName = $SCEB_LOGNAME } return $LogName break } 'ixw' { $LogName = GetItemPropertyValue $AdapterName "\AdditionalConfiguration" "FW_LOG_NAME" if (-Not $LogName) { $LogName = $IXW_LOGNAME } return $LogName break } default { $TmpErrorMsg = $Messages.NoCmdletSupport -f $AdapterName if (-not ($ErrorMessages.Value -contains $TmpErrorMsg)) { $ErrorMessages.Value += $TmpErrorMsg } break } } } return $null } Function SetDriverLogLevel($AdapterName, $DriverLevel) { $bSuccess = $false $SetDriverLogLevel = $null $AdapterRegistryPath = GetAdapterRegistryConfigPath $AdapterName "" if ($null -ne $AdapterRegistryPath) { $SetDriverLogLevel = Set-ItemProperty -Path $AdapterRegistryPath -Name $DRIVERLOG_REGISTRYVAR_NAME -Type "String" -Value $DriverLevel -PassThru -ErrorAction SilentlyContinue } if ($null -ne $SetDriverLogLevel -and -Not [string]::IsNullOrEmpty($SetDriverLogLevel.DriverLogLevel)) { $bSuccess = $true } return $bSuccess } Function SetSubModuleRegistryValue($AdapterName, $SubModuleValue) { $bSuccess = $false $SetSubModule = $null $AdapterRegistryPath = GetAdapterRegistryConfigPath $AdapterName "" if ($null -ne $AdapterRegistryPath) { $SetSubModule = Set-ItemProperty -Path $AdapterRegistryPath -Name $SUBMODULE_REGISTRYVAR_NAME -Value $SubModuleValue -Type "DWORD" -PassThru -ErrorAction SilentlyContinue } if ($null -ne $SetSubModule -and -Not [string]::IsNullOrEmpty($SetSubModule.SubModule)) { $bSuccess = $true } return $bSuccess } Function CreateDriverLogMetadataFile($AdapterName) { $strDriverName = ($script:SupportedAdapters.Where({ $_.Name -eq $AdapterName })).Service $strOSSpecificDriverName = (GetOSSpecificDriverName $strDriverName) if (-Not $strOSSpecificDriverName) { $script:ErrorMessagesStart += $Messages.NoCmdletSupport -f $AdapterName return $false } $DriverFolder = GetDriverInfParentFolder $strOSSpecificDriverName "Start" $DriverMetaData = Get-Item "$DriverFolder\$strOSSpecificDriverName.sys" -ErrorAction SilentlyContinue if ($DriverMetaData) { $DriverVersionInfo = $DriverMetaData.VersionInfo $DriverLength = "$strOSSpecificDriverName.sys Length: " + $DriverMetaData.Length $DriverChecksum = Get-FileHash $DriverMetaData try { Set-Content $LogMetadataPath -Value $DriverVersionInfo -ErrorAction Stop Add-Content $LogMetadataPath -Value $DriverLength -ErrorAction Stop Add-Content $LogMetadataPath -Value $DriverChecksum -ErrorAction Stop } catch { $script:ErrorMessagesStart += $Messages.PathIncorrect } } else { $script:ErrorMessagesStart += $Messages.NoCmdletSupport -f $AdapterName return $false } return $true } Function ValidateMethodOutput($MethodOutput, $Verb) { Write-Verbose -Message "MethodOutput: $MethodOutput verb: $Verb" do { $Result = $true if ($null -eq $MethodOutput) { switch ($Verb) { Get {$script:WarningMessagesGet += $Messages.NoCmdletSupport -f $a; break} Set {$script:WarningMessagesSet += $Messages.NoCmdletSupport -f $a; break} Start {$script:WarningMessagesStart += $Messages.NoCmdletSupport -f $AdapterName; break} Stop {$script:WarningMessagesStop += $Messages.NoCmdletSupport -f $a; break} Disable {$script:WarningMessagesDisable += $Messages.NoCmdletSupport -f $a; break} Reset {$script:WarningMessagesReset += $Messages.NoCmdletSupport -f $a; break} } $Result = $false break } if ($MethodOutput.OutStatus -ne 0) { switch ($Verb) { Get {$script:ErrorMessagesGet += $Messages.OperationFailed -f $a, $Verb; break} Set {$script:ErrorMessagesSet += $Messages.OperationFailed -f $a, $Verb; break} Start {$script:ErrorMessagesStart += $Messages.OperationFailed -f $AdapterName, $Verb; break} Stop {$script:ErrorMessagesStop += $Messages.OperationFailed -f $a, $Verb; break} Disable {$script:ErrorMessagesDisable += $Messages.OperationFailed -f $a, $Verb; break} Reset {$script:ErrorMessagesReset += $Messages.OperationFailed -f $a, $Verb; break} } $Result = $false } } while ($false) Return $Result } Function ValidateGetModuleParam([ref]$DisplayModules, [ref]$DisplayLevels, $ModuleNames, $MethodOutput, $AdapterName) { if ($ModuleNames) { foreach ($ModuleName in $ModuleNames) { $ModuleIds = $null $ModuleIDNames = $IntelLogConfigModules.Keys -Like $ModuleName $ModuleIDCount = $ModuleIDNames.Count if ($ModuleIDCount -gt 0) { $ModuleIDNames = $ModuleIDNames.Where({ $_ -NotLike $DRIVER_MODULE_NAME }) if ($ModuleIDNames -and $ModuleIDNames.Count -gt 0) { $ModuleIds = $IntelLogConfigModules[$ModuleIDNames] foreach ($ModuleId in $ModuleIds) { for ($i = 0; $i -lt $MethodOutput.ModuleID.count; $i++) { if ($ModuleId -eq $MethodOutput.ModuleID[$i]) { $DisplayModules.Value += GetModuleName($ModuleId) $DisplayLevels.Value += GetLevelName($MethodOutput.LogLevel[$i]) break } } } } } else { #if user passes in an array of modules and one (or more) is spelled incorrectly, #show error msg for that 1 and continue on getting the modules for the rest $script:ErrorMessagesGet += $Messages.InvalidModule -f $AdapterName, $ModuleName } } } else { GetAllModulesLevel $MethodOutput $DisplayModules $DisplayLevels } } Function GetAllModulesLevel($MethodOutput, [ref]$DisplayModules, [ref]$DisplayLevels) { if ($MethodOutput) { for ($i = 0; $i -lt $MethodOutput.ModuleID.count; $i++) { $DisplayModules.Value += GetModuleName($MethodOutput.ModuleID[$i]) $DisplayLevels.Value += GetLevelName($MethodOutput.LogLevel[$i]) # driver returns an array of 64 but only 31 modules populated if ($i -eq 31) { break } } } } Function ValidateLevelParam([ref]$InputLevelId, [ref]$DisplayLevels, $LevelName, $Count, $AdapterName, $DriverPassed) { do { $NewLevelId = $null $Result = $true $LevelMatchArray = $IntelLogConfigLevels.GetEnumerator().Where({$_.Name -like $LevelName}) if ($LevelMatchArray) { $NewLevelId = @($LevelMatchArray.Value) } # Handle default case of "Normal" if Level is not passed elseif ($DriverPassed -and -not $LevelName) { $NewLevelId = @($IntelLogConfigLevels["Normal"]) } if ($null -eq $NewLevelId -or 0 -eq $NewLevelId.Count) { $script:ErrorMessagesSet += $Messages.InvalidLevel -f $AdapterName, $LevelName, $ModuleNames[0] $Result = $false break } if ($NewLevelId.count -gt 1) { $script:ErrorMessagesSet += $Messages.InvalidLevelWildcard $Result = $false break } for ($i = 0; $i -lt $Count; $i++) { $InputLevelId.Value[$i] = $NewLevelId[0] $DisplayLevels.Value += GetLevelName($NewLevelId[0]) } } while ($false) Return $Result } Function ValidateSetModuleParam([ref]$InputModulesId, [ref]$DisplayModules, $ModuleNames, $AdapterName) { $count = 0 foreach ($ModuleName in $ModuleNames) { $ModuleIds = $null $ModuleIDNames = $IntelLogConfigModules.Keys -Like $ModuleName $ModuleIDCount = $ModuleIDNames.Count if ($ModuleIDCount -gt 0) { $ModuleIDNames = $ModuleIDNames.Where({ $_ -NotLike $DRIVER_MODULE_NAME }) if (-Not $ModuleIDNames -or $ModuleIDCount -gt $ModuleIDNames.Count) { $DisplayModules.Value += $DRIVER_MODULE_NAME } if ($ModuleIDNames -and $ModuleIDNames.Count -gt 0) { $ModuleIds = $IntelLogConfigModules[$ModuleIDNames] foreach ($ModuleId in $ModuleIds) { $InputModulesId.Value[$count] = $ModuleId $DisplayModules.Value += GetModuleName($ModuleId) $count++ } } } else { #if user passes in an array of modules and one (or more) is spelled incorrectly, #show error msg for that 1 and continue on getting the modules for the rest $script:ErrorMessagesSet += $Messages.InvalidModule -f $AdapterName, $ModuleName } } } Function LogmanProcessRunning($AdapterName, $LogName, $GUID) { $Result = $false $LogmanQueryString = logman query $LogName -ets if ($LogmanQueryString -match ($GUID)) { $script:ErrorMessagesStart += $Messages.LogmanRunning -f $AdapterName $Result = $true } return $Result } Function LogmanStart($LogmanPath, $LogName, $GUID, $SubModuleSum, $Level) { if ($Append) { $null = logman start $LogName -ets -o $LogmanPath -p $GUID $SubModuleSum $Level -a } else { $null = logman start $LogName -ets -o $LogmanPath -p $GUID $SubModuleSum $Level } } Function LogmanStop($LogName) { $null = logman stop $LogName -ets } Function ValidateLogmanStart($AdapterName) { $Result = $true # -2147024629, -2147024773, -2147024893, -2147024891 error codes mean directory name is invalid # or filename, directory name, or volume label syntax is incorrect or permission is denied. if ($LASTEXITCODE -eq 0) { $Result = $true } elseif ($LASTEXITCODE -eq -2147024629 -or $LASTEXITCODE -eq -2147024773 -or $LASTEXITCODE -eq -2147024893 -or $LASTEXITCODE -eq -2147024891) { $script:ErrorMessagesStart += $Messages.PathIncorrect $Result = $false } else { $script:ErrorMessagesStart += $Messages.OperationFailed -f $AdapterName, "Start" $Result = $false } return $Result } Function ValidateLogmanStop($AdapterName, [ref]$ErrorMessages) { $Result = $true if ($LASTEXITCODE -eq 0) { $Result = $true } elseif ($LASTEXITCODE -eq -2144337918) { $ErrorMessages.Value += $Messages.NoLogsStarted -f $AdapterName $Result = $false } else { $ErrorMessages.Value += $Messages.OperationFailed -f $AdapterName, "Stop" $Result = $false } Return $Result } Function ValidateConfigurationParam($ConfigurationNames, $ModuleNames, [ref]$DisplayConfigNames, $Verb, $a) { $Result = $true do { if ($ConfigurationNames) { if ($ModuleNames) { switch ($Verb) { Set { $script:ErrorMessagesSet += $Messages.InvalidParamsConfigAndModule; break } Get { $script:ErrorMessagesGet += $Messages.InvalidParamsConfigAndModule; break } } $Result = $false break } if ($IntelLogConfigurations.Count -eq 0) { if ($Verb -eq "Set") { $script:ErrorMessagesSet += $Messages.NoConfigurationSupport -f $a } elseif ($Verb -eq "Get") { $script:WarningMessagesGet += $Messages.NoConfigurationSupport -f $a } $Result = $false break } foreach ($ConfigName in $ConfigurationNames) { $TmpDisplayConfigNames = $IntelLogConfigurations.Keys -Like $ConfigName if ($TmpDisplayConfigNames.Count -gt 0) { $DisplayConfigNames.Value += $TmpDisplayConfigNames } else { #if user passes in an array of configs and one (or more) is spelled incorrectly, #show error msg for that 1 and continue on getting the config for the rest switch ($Verb) { Set { $script:ErrorMessagesSet += $Messages.InvalidConfigurationName -f $a, [string]$ConfigName; break } Get { $script:ErrorMessagesGet += $Messages.InvalidConfigurationName -f $a, [string]$ConfigName; break } } $Result = $false } } } } while ($false) return $Result } Function GetConfigLogs($DisplayConfigNames, [ref]$DisplayModules, [ref]$DisplayLevels, $MethodOutput) { $ConfigurationID = $IntelLogConfigurations[$DisplayConfigNames] foreach ($ConfigID in $ConfigurationID) { $params = @{ConfigurationID = [uint32]$ConfigID} $GetConfigMethodOutput = InvokeCimMethod "IntlLan_SetGenData" $a "WmiGetFwLogLevelsForConfiguration" $params for ($i = 0; $i -lt $GetConfigMethodOutput.count; $i++) { $DisplayModules.Value += GetModuleName($MethodOutput.ModuleID[$GetConfigMethodOutput.ModuleID[$i]]) $DisplayLevels.Value += GetLevelName($MethodOutput.LogLevel[$GetConfigMethodOutput.ModuleID[$i]]) } } } function GetConfigHashTable($AdapterName, $ConfigPath) { $ConfigHashTable = @{} $FWLogConfigPath = GetAdapterRegistryConfigPath $AdapterName $ConfigPath if ($null -ne $FWLogConfigPath) { $LogConfigs = Get-Item $FWLogConfigPath -ErrorAction SilentlyContinue if ($null -ne $LogConfigs) { $LogConfigs = $LogConfigs.Property foreach ($Config in $LogConfigs) { $ConfigHashTable.add($Config, (Get-ItemProperty -Path $FWLogConfigPath -Name $Config -ErrorAction SilentlyContinue).$Config) } } } return $ConfigHashTable } function GetAdapterRegistryConfigPath($AdapterName, $Path) { $ConfigPath = $null $AdapterObject = $script:MSNetAdapters.Where({$_.ifDesc -eq $AdapterName}) $972Key = @(Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\*" -Name "NetCfgInstanceId" -ErrorAction SilentlyContinue) $Adapter972Key = $972Key.Where({$_.NetCfgInstanceId -eq $AdapterObject.InterfaceGuid}) if ($Adapter972Key) { $ConfigPath = $Adapter972Key.PSPath + $Path } return $ConfigPath } function GetItemPropertyValue($AdapterName, $Path, $PropertyName) { $PropertyItem = $null $FWLogConfigPath = GetAdapterRegistryConfigPath $AdapterName $Path if ($null -ne $FWLogConfigPath) { $PropertyItem = Get-ItemProperty -Path $FWLogConfigPath -Name $PropertyName -ErrorAction SilentlyContinue } $PropertyValue = $null if ($null -ne $PropertyItem) { $PropertyValue = $PropertyItem.$PropertyName } return $PropertyValue } # SIG # Begin signature block # MIIocQYJKoZIhvcNAQcCoIIoYjCCKF4CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCEenELO73pkerg # CVscnR5Dj0buVXp72TU72vUMynyFbKCCEfIwggVvMIIEV6ADAgECAhBI/JO0YFWU # jTanyYqJ1pQWMA0GCSqGSIb3DQEBDAUAMHsxCzAJBgNVBAYTAkdCMRswGQYDVQQI # DBJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcMB1NhbGZvcmQxGjAYBgNVBAoM # EUNvbW9kbyBDQSBMaW1pdGVkMSEwHwYDVQQDDBhBQUEgQ2VydGlmaWNhdGUgU2Vy # dmljZXMwHhcNMjEwNTI1MDAwMDAwWhcNMjgxMjMxMjM1OTU5WjBWMQswCQYDVQQG # EwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMS0wKwYDVQQDEyRTZWN0aWdv # IFB1YmxpYyBDb2RlIFNpZ25pbmcgUm9vdCBSNDYwggIiMA0GCSqGSIb3DQEBAQUA # A4ICDwAwggIKAoICAQCN55QSIgQkdC7/FiMCkoq2rjaFrEfUI5ErPtx94jGgUW+s # hJHjUoq14pbe0IdjJImK/+8Skzt9u7aKvb0Ffyeba2XTpQxpsbxJOZrxbW6q5KCD # J9qaDStQ6Utbs7hkNqR+Sj2pcaths3OzPAsM79szV+W+NDfjlxtd/R8SPYIDdub7 # P2bSlDFp+m2zNKzBenjcklDyZMeqLQSrw2rq4C+np9xu1+j/2iGrQL+57g2extme # me/G3h+pDHazJyCh1rr9gOcB0u/rgimVcI3/uxXP/tEPNqIuTzKQdEZrRzUTdwUz # T2MuuC3hv2WnBGsY2HH6zAjybYmZELGt2z4s5KoYsMYHAXVn3m3pY2MeNn9pib6q # RT5uWl+PoVvLnTCGMOgDs0DGDQ84zWeoU4j6uDBl+m/H5x2xg3RpPqzEaDux5mcz # mrYI4IAFSEDu9oJkRqj1c7AGlfJsZZ+/VVscnFcax3hGfHCqlBuCF6yH6bbJDoEc # QNYWFyn8XJwYK+pF9e+91WdPKF4F7pBMeufG9ND8+s0+MkYTIDaKBOq3qgdGnA2T # OglmmVhcKaO5DKYwODzQRjY1fJy67sPV+Qp2+n4FG0DKkjXp1XrRtX8ArqmQqsV/ # AZwQsRb8zG4Y3G9i/qZQp7h7uJ0VP/4gDHXIIloTlRmQAOka1cKG8eOO7F/05QID # AQABo4IBEjCCAQ4wHwYDVR0jBBgwFoAUoBEKIz6W8Qfs4q8p74Klf9AwpLQwHQYD # VR0OBBYEFDLrkpr/NZZILyhAQnAgNpFcF4XmMA4GA1UdDwEB/wQEAwIBhjAPBgNV # HRMBAf8EBTADAQH/MBMGA1UdJQQMMAoGCCsGAQUFBwMDMBsGA1UdIAQUMBIwBgYE # VR0gADAIBgZngQwBBAEwQwYDVR0fBDwwOjA4oDagNIYyaHR0cDovL2NybC5jb21v # ZG9jYS5jb20vQUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwNAYIKwYBBQUHAQEE # KDAmMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20wDQYJKoZI # hvcNAQEMBQADggEBABK/oe+LdJqYRLhpRrWrJAoMpIpnuDqBv0WKfVIHqI0fTiGF # OaNrXi0ghr8QuK55O1PNtPvYRL4G2VxjZ9RAFodEhnIq1jIV9RKDwvnhXRFAZ/ZC # J3LFI+ICOBpMIOLbAffNRk8monxmwFE2tokCVMf8WPtsAO7+mKYulaEMUykfb9gZ # pk+e96wJ6l2CxouvgKe9gUhShDHaMuwV5KZMPWw5c9QLhTkg4IUaaOGnSDip0TYl # d8GNGRbFiExmfS9jzpjoad+sPKhdnckcW67Y8y90z7h+9teDnRGWYpquRRPaf9xH # +9/DUp/mBlXpnYzyOmJRvOwkDynUWICE5EV7WtgwggYcMIIEBKADAgECAhAz1wio # kUBTGeKlu9M5ua1uMA0GCSqGSIb3DQEBDAUAMFYxCzAJBgNVBAYTAkdCMRgwFgYD # VQQKEw9TZWN0aWdvIExpbWl0ZWQxLTArBgNVBAMTJFNlY3RpZ28gUHVibGljIENv # ZGUgU2lnbmluZyBSb290IFI0NjAeFw0yMTAzMjIwMDAwMDBaFw0zNjAzMjEyMzU5 # NTlaMFcxCzAJBgNVBAYTAkdCMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLjAs # BgNVBAMTJVNlY3RpZ28gUHVibGljIENvZGUgU2lnbmluZyBDQSBFViBSMzYwggGi # MA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQC70f4et0JbePWQp64sg/GNIdMw # hoV739PN2RZLrIXFuwHP4owoEXIEdiyBxasSekBKxRDogRQ5G19PB/YwMDB/NSXl # wHM9QAmU6Kj46zkLVdW2DIseJ/jePiLBv+9l7nPuZd0o3bsffZsyf7eZVReqskmo # PBBqOsMhspmoQ9c7gqgZYbU+alpduLyeE9AKnvVbj2k4aOqlH1vKI+4L7bzQHkND # brBTjMJzKkQxbr6PuMYC9ruCBBV5DFIg6JgncWHvL+T4AvszWbX0w1Xn3/YIIq62 # 0QlZ7AGfc4m3Q0/V8tm9VlkJ3bcX9sR0gLqHRqwG29sEDdVOuu6MCTQZlRvmcBME # Jd+PuNeEM4xspgzraLqVT3xE6NRpjSV5wyHxNXf4T7YSVZXQVugYAtXueciGoWnx # G06UE2oHYvDQa5mll1CeHDOhHu5hiwVoHI717iaQg9b+cYWnmvINFD42tRKtd3V6 # zOdGNmqQU8vGlHHeBzoh+dYyZ+CcblSGoGSgg8sCAwEAAaOCAWMwggFfMB8GA1Ud # IwQYMBaAFDLrkpr/NZZILyhAQnAgNpFcF4XmMB0GA1UdDgQWBBSBMpJBKyjNRsjE # osYqORLsSKk/FDAOBgNVHQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAT # BgNVHSUEDDAKBggrBgEFBQcDAzAaBgNVHSAEEzARMAYGBFUdIAAwBwYFZ4EMAQMw # SwYDVR0fBEQwQjBAoD6gPIY6aHR0cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdv # UHVibGljQ29kZVNpZ25pbmdSb290UjQ2LmNybDB7BggrBgEFBQcBAQRvMG0wRgYI # KwYBBQUHMAKGOmh0dHA6Ly9jcnQuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0Nv # ZGVTaWduaW5nUm9vdFI0Ni5wN2MwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLnNl # Y3RpZ28uY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBfNqz7+fZyWhS38Asd3tj9lwHS # /QHumS2G6Pa38Dn/1oFKWqdCSgotFZ3mlP3FaUqy10vxFhJM9r6QZmWLLXTUqwj3 # ahEDCHd8vmnhsNufJIkD1t5cpOCy1rTP4zjVuW3MJ9bOZBHoEHJ20/ng6SyJ6UnT # s5eWBgrh9grIQZqRXYHYNneYyoBBl6j4kT9jn6rNVFRLgOr1F2bTlHH9nv1HMePp # GoYd074g0j+xUl+yk72MlQmYco+VAfSYQ6VK+xQmqp02v3Kw/Ny9hA3s7TSoXpUr # OBZjBXXZ9jEuFWvilLIq0nQ1tZiao/74Ky+2F0snbFrmuXZe2obdq2TWauqDGIgb # MYL1iLOUJcAhLwhpAuNMu0wqETDrgXkG4UGVKtQg9guT5Hx2DJ0dJmtfhAH2KpnN # r97H8OQYok6bLyoMZqaSdSa+2UA1E2+upjcaeuitHFFjBypWBmztfhj24+xkc6Zt # CDaLrw+ZrnVrFyvCTWrDUUZBVumPwo3/E3Gb2u2e05+r5UWmEsUUWlJBl6MGAAjF # 5hzqJ4I8O9vmRsTvLQA1E802fZ3lqicIBczOwDYOSxlP0GOabb/FKVMxItt1UHeG # 0PL4au5rBhs+hSMrl8h+eplBDN1Yfw6owxI9OjWb4J0sjBeBVESoeh2YnZZ/WVim # VGX/UUIL+Efrz/jlvzCCBlswggTDoAMCAQICEDB3Np9sRenync55S1/V2zEwDQYJ # KoZIhvcNAQELBQAwVzELMAkGA1UEBhMCR0IxGDAWBgNVBAoTD1NlY3RpZ28gTGlt # aXRlZDEuMCwGA1UEAxMlU2VjdGlnbyBQdWJsaWMgQ29kZSBTaWduaW5nIENBIEVW # IFIzNjAeFw0yNDAxMTYwMDAwMDBaFw0yNTAxMTUyMzU5NTlaMIG7MRAwDgYDVQQF # EwcyMTg5MDc0MRMwEQYLKwYBBAGCNzwCAQMTAlVTMRkwFwYLKwYBBAGCNzwCAQIT # CERlbGF3YXJlMR0wGwYDVQQPExRQcml2YXRlIE9yZ2FuaXphdGlvbjELMAkGA1UE # BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExGjAYBgNVBAoMEUludGVsIENvcnBv # cmF0aW9uMRowGAYDVQQDDBFJbnRlbCBDb3Jwb3JhdGlvbjCCAaIwDQYJKoZIhvcN # AQEBBQADggGPADCCAYoCggGBALUx6h43Sbt+ZfuTa/V0GFWgAAfUIWg9ruenPoc8 # FTqJxPdbqYRlGKEK2vCSQyBTn7tGV54Y/hMGvRTBQce4dMFe7R5wL9p92J3R4jkR # MadZxJ4HuWalG13CpjQZP1Jg61Wx0KjsCPd2VdbBTpTiLRI+PKjokE6I/TLuA2bA # tqy1phe2/82SRlx/fVGuIzI1BOQCaC9Olao3kJ9JwKt6VZidIgmzXAYLpzZ2VhW9 # HTRLaqTLTKxgO2mtpMTbfqc7RR/oYHG2cbGCoW3KB5Tlgjhm85ZsMEMV48O7JWeB # wQoNy9admwqsdUzr5HdDbM7/EuiNHvP+sIauOmHEkLtqxM37sSgDBQX3V+vqiR5b # H6xTcfIceaa4ukwKuVmfWrB35TGSEkWFzZu3ZUYGKRCI9WZ8GixV/5PHm571xSrD # jbrigtkHtPahVVC8EUojnIGiDXovnm7ZG0FEXKuVybNOSpD3BzE2Pw3j/evKHuIr # hWCzdPBOkbbEoYFBxts6UtJNFwIDAQABo4IBvDCCAbgwHwYDVR0jBBgwFoAUgTKS # QSsozUbIxKLGKjkS7EipPxQwHQYDVR0OBBYEFKRLkSq7xH/Ru5kWUgmDt9ZZsJHj # MA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUF # BwMDMEkGA1UdIARCMEAwNQYMKwYBBAGyMQECAQYBMCUwIwYIKwYBBQUHAgEWF2h0 # dHBzOi8vc2VjdGlnby5jb20vQ1BTMAcGBWeBDAEDMEsGA1UdHwREMEIwQKA+oDyG # Omh0dHA6Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0NvZGVTaWduaW5n # Q0FFVlIzNi5jcmwwewYIKwYBBQUHAQEEbzBtMEYGCCsGAQUFBzAChjpodHRwOi8v # Y3J0LnNlY3RpZ28uY29tL1NlY3RpZ29QdWJsaWNDb2RlU2lnbmluZ0NBRVZSMzYu # Y3J0MCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5zZWN0aWdvLmNvbTAuBgNVHREE # JzAloCMGCCsGAQUFBwgDoBcwFQwTVVMtREVMQVdBUkUtMjE4OTA3NDANBgkqhkiG # 9w0BAQsFAAOCAYEAI6NvLiKQmXol9qHiDAxrF41RjhawR5g4ZQuWIxU2uMkjL9Eh # NV16cKJjZ+KSPebFErInVlf/NLvKCfSUpf+2olf7Phu1pbb2p2R1mFtGYIA1Bcwa # UmIsA/XsQ+ZHYlVdqBcpJCdc/jTzfAQen0gv1hFOIfk0vOKjjAAuTIgQNkG3c5Sw # FMZjhu+wrSXx9Qvv85BhIX/xF1xYkKN4iBwqqebxAhmaE2tZUI7X/kKDx9QexONP # Wo5Vw9b3P9I9pP8pWS/Txa4AC8x5AcZ8f6FUkl5Y750Ma6XEeHJZlUGkf1d/Ph9M # c6bg5/P4wuXceTd4iqu3sK4ZxbiXWiFD+PtZ9UbzDarUNCqskSwudIzEcgwt7glZ # YUNC+gD64uddohltoXXIasQNs/LK+qzOuqZKhFkRf+v4+Q28EQYuVIcJDHspW1CV # k3Y4zhEb1dhCAPZ9jyXyz827Uji6HD5dnGO2lPCcEvM/aWEjYYM285g0CZix3LeB # XQydSyjK95klPc99MYIV1TCCFdECAQEwazBXMQswCQYDVQQGEwJHQjEYMBYGA1UE # ChMPU2VjdGlnbyBMaW1pdGVkMS4wLAYDVQQDEyVTZWN0aWdvIFB1YmxpYyBDb2Rl # IFNpZ25pbmcgQ0EgRVYgUjM2AhAwdzafbEXp8p3OeUtf1dsxMA0GCWCGSAFlAwQC # AQUAoGowGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARYwLwYJKoZIhvcNAQkEMSIEIH2retUxE2VWTTUAfij6CbK3 # GhZf3HFKh2vMW5CwgwEPMA0GCSqGSIb3DQEBAQUABIIBgAvxiMN3h3vdExnI+p10 # tXNuJ8cKNIc0JPLxSR0YwOruGX8kHWCLm24C5XrKCYipr6hEM3cAtTDRcCaiYEgd # aeY4ISucQh+qv62nwyNsOjXiGndAAJkxrQSTEt4dJfG7ycmQkPeP/ciOayxSa62S # Y2r0v1YeCkOZRroY+DM7U11o6gt+rY1x6u2hlFEZ13yHQ9nDTorQQIOexF2cJGc2 # CTVfJckdMPx+IfBWySNTHBtKd+T7cL5kmgYj0c63qX1nsMh+LYhx/R5hP/2aem5M # ah9s3wAKuKMyRL5D7r5Zoh3l/3nmTIOWDPW0WVeW12g1d4eyKlbYVnhO6HrQArFy # kljaeoBEsqZweYNwMAMfkFPD+TVTcYsPtHsQvno4UfZBJuaAyEytYeHkLvVfbIrR # 4U5ut2DGGvV279uTAOdWScGe9SDfCSPtnzR9wGEjOXfOk/msF+WiJ6zBQLU2bziZ # /e4Ducsd8k15xTgPIzXwOKjL8D5vgfDo4O5N/8Y/gc0CgqGCE08wghNLBgorBgEE # AYI3AwMBMYITOzCCEzcGCSqGSIb3DQEHAqCCEygwghMkAgEDMQ8wDQYJYIZIAWUD # BAICBQAwgfAGCyqGSIb3DQEJEAEEoIHgBIHdMIHaAgEBBgorBgEEAbIxAgEBMDEw # DQYJYIZIAWUDBAIBBQAEIIeCGTR8kh8IICyIwUZqch4Ibm/H58CZFM3nXMNXdSZA # AhUA0TqLvfXzY3+U5P+y9RbTRiM8DiUYDzIwMjQwMzE4MTgyMDQ3WqBupGwwajEL # MAkGA1UEBhMCR0IxEzARBgNVBAgTCk1hbmNoZXN0ZXIxGDAWBgNVBAoTD1NlY3Rp # Z28gTGltaXRlZDEsMCoGA1UEAwwjU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBT # aWduZXIgIzSggg3pMIIG9TCCBN2gAwIBAgIQOUwl4XygbSeoZeI72R0i1DANBgkq # hkiG9w0BAQwFADB9MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5j # aGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0 # ZWQxJTAjBgNVBAMTHFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwHhcNMjMw # NTAzMDAwMDAwWhcNMzQwODAyMjM1OTU5WjBqMQswCQYDVQQGEwJHQjETMBEGA1UE # CBMKTWFuY2hlc3RlcjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSwwKgYDVQQD # DCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNpZ25lciAjNDCCAiIwDQYJKoZI # hvcNAQEBBQADggIPADCCAgoCggIBAKSTKFJLzyeHdqQpHJk4wOcO1NEc7GjLAWTk # is13sHFlgryf/Iu7u5WY+yURjlqICWYRFFiyuiJb5vYy8V0twHqiDuDgVmTtoeWB # IHIgZEFsx8MI+vN9Xe8hmsJ+1yzDuhGYHvzTIAhCs1+/f4hYMqsws9iMepZKGRNc # rPznq+kcFi6wsDiVSs+FUKtnAyWhuzjpD2+pWpqRKBM1uR/zPeEkyGuxmegN77tN # 5T2MVAOR0Pwtz1UzOHoJHAfRIuBjhqe+/dKDcxIUm5pMCUa9NLzhS1B7cuBb/Rm7 # HzxqGXtuuy1EKr48TMysigSTxleGoHM2K4GX+hubfoiH2FJ5if5udzfXu1Cf+hgl # TxPyXnypsSBaKaujQod34PRMAkjdWKVTpqOg7RmWZRUpxe0zMCXmloOBmvZgZpBY # B4DNQnWs+7SR0MXdAUBqtqgQ7vaNereeda/TpUsYoQyfV7BeJUeRdM11EtGcb+Re # DZvsdSbu/tP1ki9ShejaRFEqoswAyodmQ6MbAO+itZadYq0nC/IbSsnDlEI3iCCE # qIeuw7ojcnv4VO/4ayewhfWnQ4XYKzl021p3AtGk+vXNnD3MH65R0Hts2B0tEUJT # cXTC5TWqLVIS2SXP8NPQkUMS1zJ9mGzjd0HI/x8kVO9urcY+VXvxXIc6ZPFgSwVP # 77kv7AkTAgMBAAGjggGCMIIBfjAfBgNVHSMEGDAWgBQaofhhGSAPw0F3RSiO0TVf # BhIEVTAdBgNVHQ4EFgQUAw8xyJEqk71j89FdTaQ0D9KVARgwDgYDVR0PAQH/BAQD # AgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwSgYDVR0g # BEMwQTA1BgwrBgEEAbIxAQIBAwgwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9zZWN0 # aWdvLmNvbS9DUFMwCAYGZ4EMAQQCMEQGA1UdHwQ9MDswOaA3oDWGM2h0dHA6Ly9j # cmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQVRpbWVTdGFtcGluZ0NBLmNybDB0Bggr # BgEFBQcBAQRoMGYwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQuc2VjdGlnby5jb20v # U2VjdGlnb1JTQVRpbWVTdGFtcGluZ0NBLmNydDAjBggrBgEFBQcwAYYXaHR0cDov # L29jc3Auc2VjdGlnby5jb20wDQYJKoZIhvcNAQEMBQADggIBAEybZVj64HnP7xXD # Mm3eM5Hrd1ji673LSjx13n6UbcMixwSV32VpYRMM9gye9YkgXsGHxwMkysel8Cbf # +PgxZQ3g621RV6aMhFIIRhwqwt7y2opF87739i7Efu347Wi/elZI6WHlmjl3vL66 # kWSIdf9dhRY0J9Ipy//tLdr/vpMM7G2iDczD8W69IZEaIwBSrZfUYngqhHmo1z2s # IY9wwyR5OpfxDaOjW1PYqwC6WPs1gE9fKHFsGV7Cg3KQruDG2PKZ++q0kmV8B3w1 # RB2tWBhrYvvebMQKqWzTIUZw3C+NdUwjwkHQepY7w0vdzZImdHZcN6CaJJ5OX07T # jw/lE09ZRGVLQ2TPSPhnZ7lNv8wNsTow0KE9SK16ZeTs3+AB8LMqSjmswaT5qX01 # 0DJAoLEZKhghssh9BXEaSyc2quCYHIN158d+S4RDzUP7kJd2KhKsQMFwW5kKQPqA # bZRhe8huuchnZyRcUI0BIN4H9wHU+C4RzZ2D5fjKJRxEPSflsIZHKgsbhHZ9e2hP # jbf3E7TtoC3ucw/ZELqdmSx813UfjxDElOZ+JOWVSoiMJ9aFZh35rmR2kehI/shV # Cu0pwx/eOKbAFPsyPfipg2I2yMO+AIccq/pKQhyJA9z1XHxw2V14Tu6fXiDmCWp8 # KwijSPUV/ARP380hHHrl9Y4a1LlAMIIG7DCCBNSgAwIBAgIQMA9vrN1mmHR8qUY2 # p3gtuTANBgkqhkiG9w0BAQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5l # dyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNF # UlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNh # dGlvbiBBdXRob3JpdHkwHhcNMTkwNTAyMDAwMDAwWhcNMzgwMTE4MjM1OTU5WjB9 # MQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD # VQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMT # HFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUA # A4ICDwAwggIKAoICAQDIGwGv2Sx+iJl9AZg/IJC9nIAhVJO5z6A+U++zWsB21hoE # pc5Hg7XrxMxJNMvzRWW5+adkFiYJ+9UyUnkuyWPCE5u2hj8BBZJmbyGr1XEQeYf0 # RirNxFrJ29ddSU1yVg/cyeNTmDoqHvzOWEnTv/M5u7mkI0Ks0BXDf56iXNc48Ray # cNOjxN+zxXKsLgp3/A2UUrf8H5VzJD0BKLwPDU+zkQGObp0ndVXRFzs0IXuXAZSv # f4DP0REKV4TJf1bgvUacgr6Unb+0ILBgfrhN9Q0/29DqhYyKVnHRLZRMyIw80xSi # nL0m/9NTIMdgaZtYClT0Bef9Maz5yIUXx7gpGaQpL0bj3duRX58/Nj4OMGcrRrc1 # r5a+2kxgzKi7nw0U1BjEMJh0giHPYla1IXMSHv2qyghYh3ekFesZVf/QOVQtJu5F # GjpvzdeE8NfwKMVPZIMC1Pvi3vG8Aij0bdonigbSlofe6GsO8Ft96XZpkyAcSpcs # dxkrk5WYnJee647BeFbGRCXfBhKaBi2fA179g6JTZ8qx+o2hZMmIklnLqEbAyfKm # /31X2xJ2+opBJNQb/HKlFKLUrUMcpEmLQTkUAx4p+hulIq6lw02C0I3aa7fb9xhA # V3PwcaP7Sn1FNsH3jYL6uckNU4B9+rY5WDLvbxhQiddPnTO9GrWdod6VQXqngwID # AQABo4IBWjCCAVYwHwYDVR0jBBgwFoAUU3m/WqorSs9UgOHYm8Cd8rIDZsswHQYD # VR0OBBYEFBqh+GEZIA/DQXdFKI7RNV8GEgRVMA4GA1UdDwEB/wQEAwIBhjASBgNV # HRMBAf8ECDAGAQH/AgEAMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBEGA1UdIAQKMAgw # BgYEVR0gADBQBgNVHR8ESTBHMEWgQ6BBhj9odHRwOi8vY3JsLnVzZXJ0cnVzdC5j # b20vVVNFUlRydXN0UlNBQ2VydGlmaWNhdGlvbkF1dGhvcml0eS5jcmwwdgYIKwYB # BQUHAQEEajBoMD8GCCsGAQUFBzAChjNodHRwOi8vY3J0LnVzZXJ0cnVzdC5jb20v # VVNFUlRydXN0UlNBQWRkVHJ1c3RDQS5jcnQwJQYIKwYBBQUHMAGGGWh0dHA6Ly9v # Y3NwLnVzZXJ0cnVzdC5jb20wDQYJKoZIhvcNAQEMBQADggIBAG1UgaUzXRbhtVOB # kXXfA3oyCy0lhBGysNsqfSoF9bw7J/RaoLlJWZApbGHLtVDb4n35nwDvQMOt0+Lk # VvlYQc/xQuUQff+wdB+PxlwJ+TNe6qAcJlhc87QRD9XVw+K81Vh4v0h24URnbY+w # QxAPjeT5OGK/EwHFhaNMxcyyUzCVpNb0llYIuM1cfwGWvnJSajtCN3wWeDmTk5Sb # sdyybUFtZ83Jb5A9f0VywRsj1sJVhGbks8VmBvbz1kteraMrQoohkv6ob1olcGKB # c2NeoLvY3NdK0z2vgwY4Eh0khy3k/ALWPncEvAQ2ted3y5wujSMYuaPCRx3wXdah # c1cFaJqnyTdlHb7qvNhCg0MFpYumCf/RoZSmTqo9CfUFbLfSZFrYKiLCS53xOV5M # 3kg9mzSWmglfjv33sVKRzj+J9hyhtal1H3G/W0NdZT1QgW6r8NDT/LKzH7aZlib0 # PHmLXGTMze4nmuWgwAxyh8FuTVrTHurwROYybxzrF06Uw3hlIDsPQaof6aFBnf6x # uKBlKjTg3qj5PObBMLvAoGMs/FwWAKjQxH/qEZ0eBsambTJdtDgJK0kHqv3sMNrx # py/Pt/360KOE2See+wFmd7lWEOEgbsausfm2usg1XTN2jvF8IAwqd661ogKGuinu # tFoAsYyr4/kKyVRd1LlqdJ69SK6YMYIELDCCBCgCAQEwgZEwfTELMAkGA1UEBhMC # R0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9y # ZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSUwIwYDVQQDExxTZWN0aWdvIFJT # QSBUaW1lIFN0YW1waW5nIENBAhA5TCXhfKBtJ6hl4jvZHSLUMA0GCWCGSAFlAwQC # AgUAoIIBazAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkF # MQ8XDTI0MDMxODE4MjA0N1owPwYJKoZIhvcNAQkEMTIEMCc8hntqZxuxu1m1278H # Nmgb3hlnyJ9HZvNAsYfqgltetC8IQc39OUTApVfSS6LFnzCB7QYLKoZIhvcNAQkQ # Agwxgd0wgdowgdcwFgQUrmKvdQoMvUfWRh91aOK8jOfKT5QwgbwEFALWW5Xig3DB # VwCV+oj5I92Tf62PMIGjMIGOpIGLMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK # TmV3IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRoZSBV # U0VSVFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0aWZp # Y2F0aW9uIEF1dGhvcml0eQIQMA9vrN1mmHR8qUY2p3gtuTANBgkqhkiG9w0BAQEF # AASCAgA05vYN9Yo0PRlQkA8J7LWd+g5+VyCTDn+Kt+/5oL7FtYQQmRcitXW/YyQh # gLxmLx+BxAgJCpm6bWs3UlSuntSgNJwpF3gMexIdvtbhJRDu077z46M/dUyY6gl5 # jw4TqNwD7btR/t0L4R9A85P/+kspbaDVzXPOBUJgvLb4UT4xjrxhiTZZz/C1UOwV # R5ZrDcr5wh4z1wZJXZH9T6dH8qooodntoLiQJkit9nIVXH4DFeKxZzgQkBuAtVl9 # g3b9BNnVYH9xvBbCu07a2oQS8kB0rPLQJ9gUHlPyRx5LZT/qnFLWimhidMF/i17j # qoHVjP2nbWvMtn1oQXzNmzDhy4lwQDVB559pbhjfv0cW2c65C/29aff9eda9gJ/M # dN8J48XeKu+CdyFNr/xCxMj0UKgLgkD5xjv+PfTIzVACPqLSO3ixuF/w98i8NVTl # AjM0JoAsBknQHSwnGs5kXgCfqMGTk2tXAVa5jFB19Gz5RYNPChGduRNBoLIViP5U # XGqXN0l0RicWmkfUW6SlW/k7E1j+gZEG86rO1CilkgPPvCfmZDWWTK1ktgMh1mIO # AyY7xx/6JyHx9ad0eOSOAxZQiAeW151nuJNEBRWOu34aLoz+2/0Ba8qhs3EUZmZT # RayjwkRcEF5ocVOgTj7GzYSZ32WyXr8dp+UhYqrXoN+sbp4LdA== # SIG # End signature block
combined_dataset/train/non-malicious/app memory deltas.ps1
app memory deltas.ps1
## Use ps to measure Application Memory Deltas ## Run '.\\ws_diff [Interval in Seconds] [Process Name] or ## to log all processes continually every 10 seconds -- 'while (1) {.\\WS_diff.ps1 10 cmd >> ps_out.txt }' # Create args as Variables or Objects $sleep_time = $args[0] #$sleep_time = 10 # Create or define PS_Array. Default is ps is called without args. # Then take measurements $now, $then, $count if ($args[1] -eq $NULL ) { $then = ps | %{$_ | Select Name,ID,WorkingSet,PrivateMemorySize,VirtualMemorySize} sleep -seconds $sleep_time $now = ps | %{$_ | Select Name,ID,WorkingSet,PrivateMemorySize,VirtualMemorySize} $count = ($now | Select Name).count } else { $ps_array = ( ps $args[1] ) $then = ps -inputobject $ps_array | %{$_ | Select Name,ID,WorkingSet,PrivateMemorySize,VirtualMemorySize} sleep -seconds $sleep_time $now = ps -inputobject $ps_array | %{$_ | Select Name,ID,WorkingSet,PrivateMemorySize,VirtualMemorySize} $count = ($now | Select Name).count } # Declare Sample Time Measurement # Declare Hours.Minutes.Seconds.Milliseconds in body of loop for more accuracy $date = (get-date -format g) # Write output and find diffs. Check if process has multiple instances first if ( $count -gt 1 ) { $array_out = 0..$count | %{ $date + "," + [DateTime]::UtcNow.TimeOfDay.Hours + ":" + [DateTime]::UtcNow.TimeOfDay.Minutes + ":" + [DateTime]::UtcNow.TimeOfDay.Seconds + ":" + [DateTime]::UtcNow.TimeOfDay.Milliseconds + "," + $sleep_time + "," + $now[$_].Name + "," + $now[$_].ID + "," + $now[$_].WorkingSet + "," + $now[$_].PrivateMemorySize + "," + $now[$_].VirtualMemorySize + "," + ( ($now[$_].WorkingSet) - ($then[$_].WorkingSet) ) + "," + ( ($now[$_].PrivateMemorySize) - ($then[$_].PrivateMemorySize) ) + "," + ( ($now[$_].VirtualMemorySize) - ($then[$_].VirtualMemorySize) ) } } else { $array_out = $date + "," + [DateTime]::UtcNow.TimeOfDay.Hours + ":" + [DateTime]::UtcNow.TimeOfDay.Minutes + ":" + [DateTime]::UtcNow.TimeOfDay.Seconds + ":" + [DateTime]::UtcNow.TimeOfDay.Milliseconds + "," + $sleep_time + "," + $now.Name + "," + $now.ID + "," + $now.WorkingSet + "," + $now.PrivateMemorySize + "," + $now.VirtualMemorySize + "," + ( ($now.WorkingSet) - ($then.WorkingSet) ) + "," + ( ($now.PrivateMemorySize) - ($then.PrivateMemorySize) ) + "," + ( ($now.VirtualMemorySize) - ($then.VirtualMemorySize) ) } write $array_out
combined_dataset/train/non-malicious/Upgrade-VMToolsNoReboot.ps1
Upgrade-VMToolsNoReboot.ps1
#======================================================================== # Created on: 7/11/2012 3:59 PM # Created by: Clint Jones # Organization: Virtually Genius! # Filename: Upgrade-VMToolsNoReboot #======================================================================== Add-PSSnapin VMware.VimAutomation.Core Connect-VIServer -Server <vi server> -Credential (Get-Credential) $cluster = Read-Host "Cluster to upgrade:" $oldTools = Get-Cluster $cluster | Get-VM | % {Get-View $_.ID} | Where {$_.guest.toolsstatus -match "toolsOld"} foreach ($vm in $oldTools) { Get-VMGuest $vm.Name | Update-Tools -NoReboot -RunAsync }
combined_dataset/train/non-malicious/Xml Module 6.1.ps1
Xml Module 6.1.ps1
#requires -version 2.0 # Improves over the built-in Select-XML by leveraging Remove-XmlNamespace http`://poshcode.org/1492 # to provide a -RemoveNamespace parameter -- if it's supplied, all of the namespace declarations # and prefixes are removed from all XML nodes (by an XSL transform) before searching. # IMPORTANT: returned results *will not* have namespaces in them, even if the input XML did. # Also, only raw XmlNodes are returned from this function, so the output isn't completely compatible # with the built in Select-Xml. It's equivalent to using Select-Xml ... | Select-Object -Expand Node # Version History: # Select-Xml 2.0 This was the first script version I wrote. # it didn't function identically to the built-in Select-Xml with regards to parameter parsing # Select-Xml 2.1 Matched the built-in Select-Xml parameter sets, it's now a drop-in replacement # BUT only if you were using the original with: Select-Xml ... | Select-Object -Expand Node # Select-Xml 2.2 Fixes a bug in the -Content parameterset where -RemoveNamespace was *presumed* # Version 3.0 Added New-XDocument and associated generation functions for my XML DSL # Version 3.1 Fixed a really ugly bug in New-XDocument in 3.0 which I should not have released # Version 4.0 Never content to leave well enough alone, I've completely reworked New-XDocument # Version 4.1 Tweaked namespaces again so they don't cascade down when they shouldn't. Got rid of the unnecessary stack. # Version 4.2 Tightened xml: only cmdlet, function, and external scripts, with "-" in their names are exempted from being converted into xml tags. # Fixed some alias error messages caused when PSCX is already loaded (we overwrite their aliases for cvxml and fxml) # Version 4.3 Added a Path parameter set to Format-Xml so you can specify xml files for prety printing # Version 4.5 Fixed possible [Array]::Reverse call on a non-array in New-XElement (used by New-XDocument) # Work around possible variable slipping on null values by: # 1) allowing -param:$value syntax (which doesn't fail when $value is null) # 2) testing for -name syntax on the value and using it as an attribute instead # Version 4.6 Added -Arguments to Convert-Xml so that you can pass arguments to XSLT transforms! # Note: when using strings for xslt, make sure you single quote them or escape the $ signs. # Version 4.7 Fixed a typo in the namespace parameter of Select-Xml # Version 4.8 Fixed up some uses of Select-Xml -RemoveNamespace # Version 5.0 Added Update-Xml to allow setting xml attributes or node content # Version 6.0 Major cleanup, breaking changes. # - Added Get-XmlContent and Set-XmlContent for loading/saving XML from files or strings # - Removed Path and Content parameters from the other functions (it greatly simplifies thost functions, and makes the whole thing more maintainable) # - Updated Update-Xml to support adding nodes "before" and "after" other nodes, and to support "remove"ing nodes # Version 6.1 Update for PowerShell 3.0 function Add-Accelerator { <# .Synopsis Add a type accelerator to the current session .Description The Add-Accelerator function allows you to add a simple type accelerator (like [regex]) for a longer type (like [System.Text.RegularExpressions.Regex]). .Example Add-Accelerator list System.Collections.Generic.List``1 $list = New-Object list[string] Creates an accelerator for the generic List[T] collection type, and then creates a list of strings. .Example Add-Accelerator "List T", "GList" System.Collections.Generic.List``1 $list = New-Object "list t[string]" Creates two accelerators for the Generic List[T] collection type. .Parameter Accelerator The short form accelerator should be just the name you want to use (without square brackets). .Parameter Type The type you want the accelerator to accelerate (without square brackets) .Notes When specifying multiple values for a parameter, use commas to separate the values. For example, "-Accelerator string, regex". PowerShell requires arguments that are "types" to NOT have the square bracket type notation, because of the way the parsing engine works. You can either just type in the type as System.Int64, or you can put parentheses around it to help the parser out: ([System.Int64]) Also see the help for Get-Accelerator and Remove-Accelerator .Link http://huddledmasses.org/powershell-2-ctp3-custom-accelerators-finally/ #> [CmdletBinding()] param( [Parameter(Position=0,ValueFromPipelineByPropertyName=$true)] [Alias("Key","Name")] [string[]]$Accelerator , [Parameter(Position=1,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [Alias("Value","FullName")] [type]$Type ) process { # add a user-defined accelerator foreach($a in $Accelerator) { if($xlr8r::AddReplace) { $xlr8r::AddReplace( $a, $Type) } else { $null = $xlr8r::Remove( $a ) $xlr8r::Add( $a, $Type) } trap [System.Management.Automation.MethodInvocationException] { if($xlr8r::get.keys -contains $a) { if($xlr8r::get[$a] -ne $Type) { Write-Error "Cannot add accelerator [$a] for [$($Type.FullName)]`n [$a] is already defined as [$($xlr8r::get[$a].FullName)]" } Continue; } throw } } } } &{ $local:xlr8r = [psobject].assembly.gettype("System.Management.Automation.TypeAccelerators") $local:xlinq = [Reflection.Assembly]::Load("System.Xml.Linq, Version=3.5.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089") $xlinq.GetTypes() | ? { $_.IsPublic -and !$_.IsSerializable -and $_.Name -ne "Extensions" -and !$xlr8r::Get[$_.Name] } | Add-Accelerator Add-Accelerator "Dictionary" "System.Collections.Generic.Dictionary``2, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" Add-Accelerator "Dictionary", "System.Collections.Generic.Dictionary``2, mscorlib, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089" Add-Accelerator "PSParser", "System.Management.Automation.PSParser, System.Management.Automation, Version=1.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35" } function Get-XmlContent { #.Synopsis # Load an XML file as an XmlDocument param( # Specifies a string that contains the XML to load, or a path to a file which has the XML to load (wildcards are permitted). [Parameter(Position=1,Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [ValidateNotNullOrEmpty()] [Alias("PSPath","Path")] [String[]]$Content , # If set, loads XML with all namespace qualifiers removed, and all entities expanded. [Alias("Rn","Rm")] [Switch]$RemoveNamespace ) begin { [Text.StringBuilder]$XmlContent = [String]::Empty [bool]$Path = $true } process { if($Path -and ($Path = Test-Path @($Content)[0] -EA 0)) { foreach($file in Resolve-Path $Content) { $xml = New-Object System.Xml.XmlDocument; if($file.Provider.Name -eq "FileSystem") { Write-Verbose $file.ProviderPath $xml.Load( $file.ProviderPath ) } else { $ofs = "`n" $xml.LoadXml( ([String](Get-Content $file)) ) } if($RemoveNamespace) { [System.Xml.XmlNode[]]$Xml = @(Remove-XmlNamespace -Xml $node) } Write-Output $xml } } else { # If the "path" parameter isn't actually a path, assume that it's actually content foreach($line in $content) { $null = $XmlContent.AppendLine( $line ) } } } end { if(!$Path) { $xml = New-Object System.Xml.XmlDocument; $xml.LoadXml( $XmlContent.ToString() ) if($RemoveNamespace) { $Xml = @(Remove-XmlNamespace -Xml $xml) } Write-Output $xml } }} Set-Alias Import-Xml Get-XmlContent Set-Alias ipxml Get-XmlContent Set-Alias ipx Get-XmlContent Set-Alias Get-Xml Get-XmlContent Set-Alias gxml Get-XmlContent Set-Alias gx Get-XmlContent function Set-XmlContent { param( [Parameter(Mandatory=$true, Position=1)] [Alias("PSPath")] [String]$Path , # Specifies one or more XML nodes to search. [Parameter(Position=5,ParameterSetName="Xml",Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [ValidateNotNullOrEmpty()] [Alias("Node")] [Xml]$Xml ) process { $xml.Save( $Path ) } } Set-Alias Export-Xml Set-XmlContent Set-Alias epxml Set-XmlContent Set-Alias epx Set-XmlContent Set-Alias Set-Xml Set-XmlContent Set-Alias sxml Set-XmlContent Set-Alias sx Set-XmlContent function Format-Xml { #.Synopsis # Pretty-print formatted XML source #.Description # Runs an XmlDocument through an auto-indenting XmlWriter #.Parameter Xml # The Xml Document #.Parameter Path # The path to an xml document (on disc or any other content provider). #.Parameter Indent # The indent level (defaults to 2 spaces) #.Example # [xml]$xml = get-content Data.xml # C:\\PS>Format-Xml $xml #.Example # get-content Data.xml | Format-Xml #.Example # Format-Xml C:\\PS\\Data.xml #.Example # ls *.xml | Format-Xml # [CmdletBinding()] param( [Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true, ParameterSetName="Document")] [xml]$Xml , [Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true, ParameterSetName="File")] [Alias("PsPath")] [string]$Path , [Parameter(Mandatory=$false)] $Indent=2 ) process { ## Load from file, if necessary if($Path) { [xml]$xml = Get-Content $Path } $StringWriter = New-Object System.IO.StringWriter $XmlWriter = New-Object System.Xml.XmlTextWriter $StringWriter $xmlWriter.Formatting = "indented" $xmlWriter.Indentation = $Indent $xml.WriteContentTo($XmlWriter) $XmlWriter.Flush() $StringWriter.Flush() Write-Output $StringWriter.ToString() }} Set-Alias fxml Format-Xml -EA 0 Set-Alias fx Format-Xml -EA 0 function Select-XmlNodeInternal { [CmdletBinding()] param([Xml.XmlNode[]]$Xml, [String[]]$XPath, [Hashtable]$NamespaceManager) begin { Write-Verbose "XPath = $($XPath -join ',')" foreach($node in $xml) { if($NamespaceManager) { $nsManager = new-object System.Xml.XmlNamespaceManager $node.NameTable foreach($ns in $NamespaceManager.GetEnumerator()) { $nsManager.AddNamespace( $ns.Key, $ns.Value ) } Write-Verbose "Names = $($nsManager | % { @{ $_ = $nsManager.LookupNamespace($_) } } | Out-String)" } foreach($path in $xpath) { $node.SelectNodes($path, $nsManager) } } }} function Select-Xml { #.Synopsis # The Select-XML cmdlet lets you use XPath queries to search for text in XML strings and documents. Enter an XPath query, and use the Content, Path, or Xml parameter to specify the XML to be searched. #.Description # Improves over the built-in Select-XML by leveraging Remove-XmlNamespace to provide a -RemoveNamespace parameter -- if it's supplied, all of the namespace declarations and prefixes are removed from all XML nodes (by an XSL transform) before searching. # # However, only raw XmlNodes are returned from this function, so the output isn't currently compatible with the built in Select-Xml, but is equivalent to using Select-Xml ... | Select-Object -Expand Node # # Also note that if the -RemoveNamespace switch is supplied the returned results *will not* have namespaces in them, even if the input XML did, and entities get expanded automatically. [CmdletBinding(DefaultParameterSetName="Xml")] param( # Specifies an XPath search query. The query language is case-sensitive. This parameter is required. [Parameter(Position=1,Mandatory=$true,ValueFromPipeline=$false)] [ValidateNotNullOrEmpty()] [Alias("Query")] [String[]]$XPath , # Specifies a string that contains the XML to search. You can also pipe strings to Select-XML. [Parameter(ParameterSetName="Content",Mandatory=$true)] [ValidateNotNullOrEmpty()] [String[]]$Content , # Specifies the path and file names of the XML files to search. Wildcards are permitted. [Parameter(Position=5,ParameterSetName="Path",Mandatory=$true,ValueFromPipelineByPropertyName=$true)] [ValidateNotNullOrEmpty()] [Alias("PSPath")] [String[]]$Path , # Specifies one or more XML nodes to search. [Parameter(Position=5,ParameterSetName="Xml",Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [ValidateNotNullOrEmpty()] [Alias("Node")] [System.Xml.XmlNode[]]$Xml , # Specifies a hash table of the namespaces used in the XML. Use the format @{<namespaceName> = <namespaceUri>}. [Parameter(Position=10,Mandatory=$false)] [ValidateNotNullOrEmpty()] [Alias("Ns")] [Hashtable]$Namespace , # Allows the execution of XPath queries without namespace qualifiers. # # If you specify the -RemoveNamespace switch, all namespace declarations and prefixes are actually removed from the Xml before the XPath search query is evaluated, and your XPath query should therefore NOT contain any namespace prefixes. # # Note that this means that the returned results *will not* have namespaces in them, even if the input XML did, and entities get expanded automatically. [Alias("Rn","Rm")] [Switch]$RemoveNamespace ) begin { $NSM = $Null; if($PSBoundParameters.ContainsKey("Namespace")) { $NSM = $Namespace } $XmlNodes = New-Object System.Xml.XmlNode[] 1 if($PSCmdlet.ParameterSetName -eq "Content") { $XmlNodes = ConvertTo-Xml $Content -RemoveNamespace:$RemoveNamespace Select-XmlNodeInternal $XmlNodes $XPath $NSM } } process { switch($PSCmdlet.ParameterSetName) { "Path" { $node = ConvertTo-Xml $Path -RemoveNamespace:$RemoveNamespace Select-XmlNodeInternal $node $XPath $NSM } "Xml" { foreach($node in $Xml) { if($RemoveNamespace) { [Xml]$node = Remove-XmlNamespace -Xml $node } Select-XmlNodeInternal $node $XPath $NSM } } } }} Set-Alias slxml Select-Xml -EA 0 Set-Alias slx Select-Xml -EA 0 function Update-Xml { #.Synopsis # The Update-XML cmdlet lets you use XPath queries to replace text in nodes in XML documents. Enter an XPath query, and use the Content, Path, or Xml parameter to specify the XML to be searched. #.Description # Allows you to update an attribute value, xml node contents, etc. # #.Notes # We still need to implement RemoveNode and RemoveAttribute and even ReplaceNode [CmdletBinding(DefaultParameterSetName="Set")] param( # Specifies an XPath for an element where you want to insert the new node. [Parameter(ParameterSetName="Before",Mandatory=$true)] [ValidateNotNullOrEmpty()] [Switch]$Before , # Specifies an XPath for an element where you want to insert the new node. [Parameter(ParameterSetName="After",Mandatory=$true)] [ValidateNotNullOrEmpty()] [Switch]$After , # If set, the new value will be added as a new child of the node identified by the XPath [Parameter(ParameterSetName="Append",Mandatory=$true)] [Switch]$Append , # If set, the node identified by the XPath will be removed instead of set [Parameter(ParameterSetName="Remove",Mandatory=$true)] [Switch]$Remove , # If set, the node identified by the XPath will be Replace instead of set [Parameter(ParameterSetName="Replace",Mandatory=$true)] [Switch]$Replace , # Specifies an XPath for the node to update. This could be an element node *or* an attribute node (remember: //element/@attribute ) [Parameter(Position=1,Mandatory=$true)] [ValidateNotNullOrEmpty()] [String[]]$XPath , # The new value to place in the xml [Parameter(Position=2,Mandatory=$true,ValueFromPipeline=$false)] [ValidateNotNullOrEmpty()] [String]$Value , # Specifies one or more XML nodes to search. [Parameter(Position=5,Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [ValidateNotNullOrEmpty()] [Alias("Node")] [System.Xml.XmlNode[]]$Xml , # Specifies a hash table of the namespaces used in the XML. Use the format @{<namespaceName> = <namespaceUri>}. [Parameter(Position=10,Mandatory=$false)] [ValidateNotNullOrEmpty()] [Alias("Ns")] [Hashtable]$Namespace , # Output the XML documents after adding updating them [Switch]$Passthru ) process { foreach($XmlNode in $Xml) { $select = @{} $select.Xml = $XmlNode $select.XPath = $XPath if($Namespace) { $select.Namespace = $Namespace } $document = if($XmlNode -is [System.Xml.XmlDocument]) { $XmlNode } else { $XmlNode.get_OwnerDocument() } if($xValue = $Value -as [Xml]) { $xValue = $document.ImportNode($xValue.SelectSingleNode("/*"), $true) } $nodes = Select-Xml @Select | Where-Object { $_ } if(@($nodes).Count -eq 0) { Write-Warning "No nodes matched your XPath, nothing will be updated" } foreach($node in $nodes) { $select.XPath = "$XPath/parent::*" $parent = Select-Xml @Select if(!$xValue) { if($node -is [System.Xml.XmlAttribute] -and $Value.Contains("=")) { $aName, $aValue = $Value.Split("=",2) if($aName.Contains(":")){ $ns,$name = $aName.Split(":",2) $xValue = $document.CreateAttribute( $name, $Namespace[$ns] ) } else { $xValue = $document.CreateAttribute( $aName ) } $xValue.Value = $aValue } } switch($PSCmdlet.ParameterSetName) { "Before" { $null = $parent.InsertBefore( $xValue, $node ) } "After" { $null = $parent.InsertAfter( $xValue, $node ) } "Append" { $null = $parent.AppendChild( $xValue ) } "Remove" { $null = $parent.RemoveChild( $node ) } "Replace" { if(!$xValue) { $xValue = $document.CreateTextNode( $Value ) } $null = $parent.ReplaceChild( $xValue, $node ) } "Set" { if(!$xValue -and $node."#text") { $node."#text" = $Value } else { if($node -is [System.Xml.XmlElement]) { if(!$xValue) { $xValue = $document.CreateTextNode( $Value ) } $null = $node.set_innerXml("") $null = $node.AppendChild($xValue) } elseif($node -is [System.Xml.XmlAttribute]) { $node.Value = $Value } else { Write-Warning "$XPath selects a node of type $($node.GetType()), which we haven't handled. Please add that handler!" } } } } } if($Passthru) { Write-Output $XmlNode } } }} Set-Alias uxml Update-Xml -EA 0 Set-Alias ux Update-Xml -EA 0 function Convert-Node { #.Synopsis # Convert a single XML Node via XSL stylesheets [CmdletBinding(DefaultParameterSetName="Reader")] param( [Parameter(ParameterSetName="ByNode",Mandatory=$true,ValueFromPipeline=$true)] [System.Xml.XmlNode]$Node , [Parameter(ParameterSetName="Reader",Mandatory=$true,ValueFromPipeline=$true)] [System.Xml.XmlReader]$XmlReader , [Parameter(Position=1,Mandatory=$true,ValueFromPipeline=$false)] [System.Xml.Xsl.XslCompiledTransform]$StyleSheet , [Parameter(Position=2,Mandatory=$false)] [Alias("Parameters")] [hashtable]$Arguments ) PROCESS { if($PSCmdlet.ParameterSetName -eq "ByNode") { $XmlReader = New-Object Xml.XmlNodeReader $node } $output = New-Object IO.StringWriter $argList = $null if($Arguments) { $argList = New-Object System.Xml.Xsl.XsltArgumentList foreach($arg in $Arguments.GetEnumerator()) { $namespace, $name = $arg.Key -split ":" ## Fix namespace if(!$name) { $name = $Namespace $namespace = "" } Write-Verbose "ns:$namespace name:$name value:$($arg.Value)" $argList.AddParam($name,"$namespace",$arg.Value) } } $StyleSheet.Transform( $XmlReader, $argList, $output ) Write-Output $output.ToString() } } function Convert-Xml { #.Synopsis # The Convert-XML function lets you use Xslt to transform XML strings and documents. #.Description # Documentation TODO [CmdletBinding(DefaultParameterSetName="Xml")] param( # Specifies one or more XML nodes to process. [Parameter(Position=1,ParameterSetName="Xml",Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [ValidateNotNullOrEmpty()] [Alias("Node")] [System.Xml.XmlNode[]]$Xml , # Specifies an Xml StyleSheet to transform with... [Parameter(Position=0,Mandatory=$true,ValueFromPipeline=$false)] [ValidateNotNullOrEmpty()] [Alias("StyleSheet")] [String]$Xslt , # Specify arguments to the XSL Transformation [Alias("Parameters")] [hashtable]$Arguments ) begin { $StyleSheet = New-Object System.Xml.Xsl.XslCompiledTransform if(Test-Path $Xslt -EA 0) { Write-Verbose "Loading Stylesheet from $(Resolve-Path $Xslt)" $StyleSheet.Load( (Resolve-Path $Xslt) ) } else { $OFS = "`n" Write-Verbose "$Xslt" $StyleSheet.Load(([System.Xml.XmlReader]::Create((New-Object System.IO.StringReader $Xslt)))) } } process { foreach($node in $Xml) { Convert-Node -Xml (New-Object Xml.XmlNodeReader $node) $StyleSheet $Arguments } } } Set-Alias cvxml Convert-Xml -EA 0 function Remove-XmlNamespace { #.Synopsis # Removes namespace definitions and prefixes from xml documents #.Description # Runs an xml document through an XSL Transformation to remove namespaces from it if they exist. # Entities are also naturally expanded #.Parameter Content # Specifies a string that contains the XML to transform. #.Parameter Path # Specifies the path and file names of the XML files to transform. Wildcards are permitted. # # There will bne one output document for each matching input file. #.Parameter Xml # Specifies one or more XML documents to transform [CmdletBinding(DefaultParameterSetName="Xml")] PARAM( [Parameter(Position=1,ParameterSetName="Xml",Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [ValidateNotNullOrEmpty()] [Alias("Node")] [System.Xml.XmlNode[]]$Xml ) BEGIN { $StyleSheet = New-Object System.Xml.Xsl.XslCompiledTransform $StyleSheet.Load(([System.Xml.XmlReader]::Create((New-Object System.IO.StringReader @" <xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform"> <xsl:output method="xml" indent="yes"/> <xsl:template match="/|comment()|processing-instruction()"> <xsl:copy> <xsl:apply-templates/> </xsl:copy> </xsl:template> <xsl:template match="*"> <xsl:element name="{local-name()}"> <xsl:apply-templates select="@*|node()"/> </xsl:element> </xsl:template> <xsl:template match="@*"> <xsl:attribute name="{local-name()}"> <xsl:value-of select="."/> </xsl:attribute> </xsl:template> </xsl:stylesheet> "@)))) [Text.StringBuilder]$XmlContent = [String]::Empty } PROCESS { $Xml | Convert-Node $StyleSheet } } Set-Alias rmns Remove-XmlNamespace -EA 0 Set-Alias rmxns Remove-XmlNamespace -EA 0 ######## Helper functions for working with CliXml function ConvertFrom-CliXml { param( [Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true)] [ValidateNotNullOrEmpty()] [String[]]$InputObject ) begin { $OFS = "`n" [String]$xmlString = "" } process { $xmlString += $InputObject } end { $type = [psobject].assembly.gettype("System.Management.Automation.Deserializer") $ctor = $type.getconstructor("instance,nonpublic", $null, @([xml.xmlreader]), $null) $sr = new-object System.IO.StringReader $xmlString $xr = new-object System.Xml.XmlTextReader $sr $deserializer = $ctor.invoke($xr) $method = @($type.getmethods("nonpublic,instance") | where-object {$_.name -like "Deserialize"})[1] $done = $type.getmethod("Done", [System.Reflection.BindingFlags]"nonpublic,instance") while (!$done.invoke($deserializer, @())) { try { $method.invoke($deserializer, "") } catch { write-warning "Could not deserialize ${string}: $_" } } $xr.Close() $sr.Dispose() } } function ConvertTo-CliXml { param( [Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true)] [ValidateNotNullOrEmpty()] [PSObject[]]$InputObject ) begin { $type = [psobject].assembly.gettype("System.Management.Automation.Serializer") $ctor = $type.getconstructor("instance,nonpublic", $null, @([System.Xml.XmlWriter]), $null) $sw = new-object System.IO.StringWriter $xw = new-object System.Xml.XmlTextWriter $sw $serializer = $ctor.invoke($xw) $method = $type.getmethod("Serialize", "nonpublic,instance", $null, [type[]]@([object]), $null) $done = $type.getmethod("Done", [System.Reflection.BindingFlags]"nonpublic,instance") } process { try { [void]$method.invoke($serializer, $InputObject) } catch { write-warning "Could not serialize $($InputObject.gettype()): $_" } } end { [void]$done.invoke($serializer, @()) $sw.ToString() $xw.Close() $sw.Dispose() } } ######## From here down is all the code related to my XML DSL: function New-XDocument { #.Synopsis # Creates a new XDocument (the new xml document type) #.Description # This is the root for a new XML mini-dsl, akin to New-BootsWindow for XAML # It creates a new XDocument, and takes scritpblock(s) to define it's contents #.Parameter root # The root node name #.Parameter version # Optional: the XML version. Defaults to 1.0 #.Parameter encoding # Optional: the Encoding. Defaults to UTF-8 #.Parameter standalone # Optional: whether to specify standalone in the xml declaration. Defaults to "yes" #.Parameter args # this is where all the dsl magic happens. Please see the Examples. :) # #.Example # [string]$xml = New-XDocument rss -version "2.0" { # channel { # title {"Test RSS Feed"} # link {"http`://HuddledMasses.org"} # description {"An RSS Feed generated simply to demonstrate my XML DSL"} # item { # title {"The First Item"} # link {"http`://huddledmasses.org/new-site-new-layout-lost-posts/"} # guid -isPermaLink true {"http`://huddledmasses.org/new-site-new-layout-lost-posts/"} # description {"Ema Lazarus' Poem"} # pubDate {(Get-Date 10/31/2003 -f u) -replace " ","T"} # } # } # } # # C:\\PS>$xml.Declaration.ToString() ## I can't find a way to have this included in the $xml.ToString() # C:\\PS>$xml.ToString() # # <?xml version="1.0" encoding="UTF-8" standalone="yes"?> # <rss version="2.0"> # <channel> # <title>Test RSS Feed</title> # <link>http ://HuddledMasses.org</link> # <description>An RSS Feed generated simply to demonstrate my XML DSL</description> # <item> # <title>The First Item</title> # <link>http ://huddledmasses.org/new-site-new-layout-lost-posts/</link> # <guid isPermaLink="true">http ://huddledmasses.org/new-site-new-layout-lost-posts/</guid> # <description>Ema Lazarus' Poem</description> # <pubDate>2003-10-31T00:00:00Z</pubDate> # </item> # </channel> # </rss> # # # Description # ----------- # This example shows the creation of a complete RSS feed with a single item in it. # # NOTE that the backtick in the http`: in the URLs in the input is unecessary, and I added the space after the http: in the URLs in the output -- these are accomodations to PoshCode's spam filter. Backticks are not need in the input, and spaces do not appear in the actual output. # # #.Example # [XNamespace]$atom="http`://www.w3.org/2005/Atom" # C:\\PS>[XNamespace]$dc = "http`://purl.org/dc/elements/1.1" # # C:\\PS>New-XDocument ($atom + "feed") -Encoding "UTF-16" -$([XNamespace]::Xml +'lang') "en-US" -dc $dc { # title {"Test First Entry"} # link {"http`://HuddledMasses.org"} # updated {(Get-Date -f u) -replace " ","T"} # author { # name {"Joel Bennett"} # uri {"http`://HuddledMasses.org"} # } # id {"http`://huddledmasses.org/" } # # entry { # title {"Test First Entry"} # link {"http`://HuddledMasses.org/new-site-new-layout-lost-posts/" } # id {"http`://huddledmasses.org/new-site-new-layout-lost-posts/" } # updated {(Get-Date 10/31/2003 -f u) -replace " ","T"} # summary {"Ema Lazarus' Poem"} # link -rel license -href "http`://creativecommons.org/licenses/by/3.0/" -title "CC By-Attribution" # dc:rights { "Copyright 2009, Some rights reserved (licensed under the Creative Commons Attribution 3.0 Unported license)" } # category -scheme "http`://huddledmasses.org/tag/" -term "huddled-masses" # } # } | % { $_.Declaration.ToString(); $_.ToString() } # # <?xml version="1.0" encoding="UTF-16" standalone="yes"?> # <feed xml:lang="en-US" xmlns="http ://www.w3.org/2005/Atom"> # <title>Test First Entry</title> # <link>http ://HuddledMasses.org</link> # <updated>2009-07-29T17:25:49Z</updated> # <author> # <name>Joel Bennett</name> # <uri>http ://HuddledMasses.org</uri> # </author> # <id>http ://huddledmasses.org/</id> # <entry> # <title>Test First Entry</title> # <link>http ://HuddledMasses.org/new-site-new-layout-lost-posts/</link> # <id>http ://huddledmasses.org/new-site-new-layout-lost-posts/</id> # <updated>2003-10-31T00:00:00Z</updated> # <summary>Ema Lazarus' Poem</summary> # <link rel="license" href="http ://creativecommons.org/licenses/by/3.0/" title="CC By-Attribution" /> # <dc:rights>Copyright 2009, Some rights reserved (licensed under the Creative Commons Attribution 3.0 Unported license)</dc:rights> # <category scheme="http ://huddledmasses.org/tag/" term="huddled-masses" /> # </entry> # </feed> # # # Description # ----------- # This example shows the use of a default namespace, as well as additional specific namespaces for the "dc" namespace. It also demonstrates how you can get the <?xml?> declaration which does not appear in a simple .ToString(). # # NOTE that the backtick in the http`: in the URLs in the input is unecessary, and I added the space after the http: in the URLs in the output -- these are accomodations to PoshCode's spam filter. Backticks are not need in the input, and spaces do not appear in the actual output.# # [CmdletBinding()] Param( [Parameter(Mandatory = $true, Position = 0)] [System.Xml.Linq.XName]$root , [Parameter(Mandatory = $false)] [string]$Version = "1.0" , [Parameter(Mandatory = $false)] [string]$Encoding = "UTF-8" , [Parameter(Mandatory = $false)] [string]$Standalone = "yes" , [AllowNull()][AllowEmptyString()][AllowEmptyCollection()] [Parameter(Position=99, Mandatory = $false, ValueFromRemainingArguments=$true)] [PSObject[]]$args ) BEGIN { $script:NameSpaceHash = New-Object 'Dictionary[String,XNamespace]' if($root.NamespaceName) { $script:NameSpaceHash.Add("", $root.Namespace) } } PROCESS { New-Object XDocument (New-Object XDeclaration $Version, $Encoding, $standalone),( New-Object XElement $( $root while($args) { $attrib, $value, $args = $args if($attrib -is [ScriptBlock]) { # Write-Verbose "Preparsed DSL: $attrib" $attrib = ConvertFrom-XmlDsl $attrib Write-Verbose "Reparsed DSL: $attrib" &$attrib } elseif ( $value -is [ScriptBlock] -and "-CONTENT".StartsWith($attrib.TrimEnd(':').ToUpper())) { $value = ConvertFrom-XmlDsl $value &$value } elseif ( $value -is [XNamespace]) { New-Object XAttribute ([XNamespace]::Xmlns + $attrib.TrimStart("-").TrimEnd(':')), $value $script:NameSpaceHash.Add($attrib.TrimStart("-").TrimEnd(':'), $value) } else { Write-Verbose "XAttribute $attrib = $value" New-Object XAttribute $attrib.TrimStart("-").TrimEnd(':'), $value } } )) } } Set-Alias xml New-XDocument -EA 0 Set-Alias New-Xml New-XDocument -EA 0 function New-XAttribute { #.Synopsys # Creates a new XAttribute (an xml attribute on an XElement for XDocument) #.Description # This is the work-horse for the XML mini-dsl #.Parameter name # The attribute name #.Parameter value # The attribute value [CmdletBinding()] Param([Parameter(Mandatory=$true)]$name,[Parameter(Mandatory=$true)]$value) New-Object XAttribute $name, $value } Set-Alias xa New-XAttribute -EA 0 Set-Alias New-XmlAttribute New-XAttribute -EA 0 function New-XElement { #.Synopsys # Creates a new XElement (an xml tag for XDocument) #.Description # This is the work-horse for the XML mini-dsl #.Parameter tag # The name of the xml tag #.Parameter args # this is where all the dsl magic happens. Please see the Examples. :) [CmdletBinding()] Param( [Parameter(Mandatory = $true, Position = 0)] [System.Xml.Linq.XName]$tag , [AllowNull()][AllowEmptyString()][AllowEmptyCollection()] [Parameter(Position=99, Mandatory = $false, ValueFromRemainingArguments=$true)] [PSObject[]]$args ) PROCESS { New-Object XElement $( $tag while($args) { $attrib, $value, $args = $args if($attrib -is [ScriptBlock]) { # then it's content &$attrib } elseif ( $value -is [ScriptBlock] -and "-CONTENT".StartsWith($attrib.TrimEnd(':').ToUpper())) { # then it's content &$value } elseif ( $value -is [XNamespace]) { New-Object XAttribute ([XNamespace]::Xmlns + $attrib.TrimStart("-").TrimEnd(':')), $value $script:NameSpaceHash.Add($attrib.TrimStart("-").TrimEnd(':'), $value) } elseif($value -match "-(?!\\d)\\w") { $args = @($value)+@($args) } elseif($value -ne $null) { New-Object XAttribute $attrib.TrimStart("-").TrimEnd(':'), $value } } ) } } Set-Alias xe New-XElement Set-Alias New-XmlElement New-XElement function ConvertFrom-XmlDsl { Param([ScriptBlock]$script) $parserrors = $null $global:tokens = [PSParser]::Tokenize( $script, [ref]$parserrors ) [Array]$duds = $global:tokens | Where-Object { $_.Type -eq "Command" -and !$_.Content.Contains('-') -and ($(Get-Command $_.Content -Type Cmdlet,Function,ExternalScript -EA 0) -eq $Null) } [Array]::Reverse( $duds ) [string[]]$ScriptText = "$script" -split "`n" ForEach($token in $duds ) { # replace : notation with namespace notation if( $token.Content.Contains(":") ) { $key, $localname = $token.Content -split ":" $ScriptText[($token.StartLine - 1)] = $ScriptText[($token.StartLine - 1)].Remove( $token.StartColumn -1, $token.Length ).Insert( $token.StartColumn -1, "'" + $($script:NameSpaceHash[$key] + $localname) + "'" ) } else { $ScriptText[($token.StartLine - 1)] = $ScriptText[($token.StartLine - 1)].Remove( $token.StartColumn -1, $token.Length ).Insert( $token.StartColumn -1, "'" + $($script:NameSpaceHash[''] + $token.Content) + "'" ) } # insert 'xe' before everything (unless it's a valid command) $ScriptText[($token.StartLine - 1)] = $ScriptText[($token.StartLine - 1)].Insert( $token.StartColumn -1, "xe " ) } Write-Output ([ScriptBlock]::Create( ($ScriptText -join "`n") )) } ######## Xaml # if($PSVersionTable.CLRVersion -ge "4.0"){ # trap { continue } # [Reflection.Assembly]::LoadWithPartialName("System.Xaml") | Out-Null # if("System.Xaml.XamlServices" -as [type]) { # } # } Export-ModuleMember -alias * -function New-XDocument, New-XAttribute, New-XElement, Remove-XmlNamespace, Get-XmlContent, Set-XmlContent, ConvertTo-Xml, Select-Xml, Update-Xml, Format-Xml, ConvertTo-CliXml, ConvertFrom-CliXml # SIG # Begin signature block # MIIdZgYJKoZIhvcNAQcCoIIdVzCCHVMCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB # gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR # AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQU7i/4rcSOaFh6MGBAPJLn0Vpy # SVegghkkMIIDnzCCAoegAwIBAgIQeaKlhfnRFUIT2bg+9raN7TANBgkqhkiG9w0B # AQUFADBTMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xKzAp # BgNVBAMTIlZlcmlTaWduIFRpbWUgU3RhbXBpbmcgU2VydmljZXMgQ0EwHhcNMTIw # NTAxMDAwMDAwWhcNMTIxMjMxMjM1OTU5WjBiMQswCQYDVQQGEwJVUzEdMBsGA1UE # ChMUU3ltYW50ZWMgQ29ycG9yYXRpb24xNDAyBgNVBAMTK1N5bWFudGVjIFRpbWUg # U3RhbXBpbmcgU2VydmljZXMgU2lnbmVyIC0gRzMwgZ8wDQYJKoZIhvcNAQEBBQAD # gY0AMIGJAoGBAKlZZnTaPYp9etj89YBEe/5HahRVTlBHC+zT7c72OPdPabmx8LZ4 # ggqMdhZn4gKttw2livYD/GbT/AgtzLVzWXuJ3DNuZlpeUje0YtGSWTUUi0WsWbJN # JKKYlGhCcp86aOJri54iLfSYTprGr7PkoKs8KL8j4ddypPIQU2eud69RAgMBAAGj # geMwgeAwDAYDVR0TAQH/BAIwADAzBgNVHR8ELDAqMCigJqAkhiJodHRwOi8vY3Js # LnZlcmlzaWduLmNvbS90c3MtY2EuY3JsMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMI # MDQGCCsGAQUFBwEBBCgwJjAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AudmVyaXNp # Z24uY29tMA4GA1UdDwEB/wQEAwIHgDAeBgNVHREEFzAVpBMwETEPMA0GA1UEAxMG # VFNBMS0zMB0GA1UdDgQWBBS0t/GJSSZg52Xqc67c0zjNv1eSbzANBgkqhkiG9w0B # AQUFAAOCAQEAHpiqJ7d4tQi1yXJtt9/ADpimNcSIydL2bfFLGvvV+S2ZAJ7R55uL # 4T+9OYAMZs0HvFyYVKaUuhDRTour9W9lzGcJooB8UugOA9ZresYFGOzIrEJ8Byyn # PQhm3ADt/ZQdc/JymJOxEdaP747qrPSWUQzQjd8xUk9er32nSnXmTs4rnykr589d # nwN+bid7I61iKWavkugszr2cf9zNFzxDwgk/dUXHnuTXYH+XxuSqx2n1/M10rCyw # SMFQTnBWHrU1046+se2svf4M7IV91buFZkQZXZ+T64K6Y57TfGH/yBvZI1h/MKNm # oTkmXpLDPMs3Mvr1o43c1bCj6SU2VdeB+jCCA8QwggMtoAMCAQICEEe/GZXfjVJG # Q/fbbUgNMaQwDQYJKoZIhvcNAQEFBQAwgYsxCzAJBgNVBAYTAlpBMRUwEwYDVQQI # EwxXZXN0ZXJuIENhcGUxFDASBgNVBAcTC0R1cmJhbnZpbGxlMQ8wDQYDVQQKEwZU # aGF3dGUxHTAbBgNVBAsTFFRoYXd0ZSBDZXJ0aWZpY2F0aW9uMR8wHQYDVQQDExZU # aGF3dGUgVGltZXN0YW1waW5nIENBMB4XDTAzMTIwNDAwMDAwMFoXDTEzMTIwMzIz # NTk1OVowUzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMSsw # KQYDVQQDEyJWZXJpU2lnbiBUaW1lIFN0YW1waW5nIFNlcnZpY2VzIENBMIIBIjAN # BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqcqypMzNIK8KfYmsh3XwtE7x38EP # v2dhvaNkHNq7+cozq4QwiVh+jNtr3TaeD7/R7Hjyd6Z+bzy/k68Numj0bJTKvVIt # q0g99bbVXV8bAp/6L2sepPejmqYayALhf0xS4w5g7EAcfrkN3j/HtN+HvV96ajEu # A5mBE6hHIM4xcw1XLc14NDOVEpkSud5oL6rm48KKjCrDiyGHZr2DWFdvdb88qiaH # XcoQFTyfhOpUwQpuxP7FSt25BxGXInzbPifRHnjsnzHJ8eYiGdvEs0dDmhpfoB6Q # 5F717nzxfatiAY/1TQve0CJWqJXNroh2ru66DfPkTdmg+2igrhQ7s4fBuwIDAQAB # o4HbMIHYMDQGCCsGAQUFBwEBBCgwJjAkBggrBgEFBQcwAYYYaHR0cDovL29jc3Au # dmVyaXNpZ24uY29tMBIGA1UdEwEB/wQIMAYBAf8CAQAwQQYDVR0fBDowODA2oDSg # MoYwaHR0cDovL2NybC52ZXJpc2lnbi5jb20vVGhhd3RlVGltZXN0YW1waW5nQ0Eu # Y3JsMBMGA1UdJQQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIBBjAkBgNVHREE # HTAbpBkwFzEVMBMGA1UEAxMMVFNBMjA0OC0xLTUzMA0GCSqGSIb3DQEBBQUAA4GB # AEpr+epYwkQcMYl5mSuWv4KsAdYcTM2wilhu3wgpo17IypMT5wRSDe9HJy8AOLDk # yZNOmtQiYhX3PzchT3AxgPGLOIez6OiXAP7PVZZOJNKpJ056rrdhQfMqzufJ2V7d # uyuFPrWdtdnhV/++tMV+9c8MnvCX/ivTO1IbGzgn9z9KMIIETzCCA7igAwIBAgIE # BydYPTANBgkqhkiG9w0BAQUFADB1MQswCQYDVQQGEwJVUzEYMBYGA1UEChMPR1RF # IENvcnBvcmF0aW9uMScwJQYDVQQLEx5HVEUgQ3liZXJUcnVzdCBTb2x1dGlvbnMs # IEluYy4xIzAhBgNVBAMTGkdURSBDeWJlclRydXN0IEdsb2JhbCBSb290MB4XDTEw # MDExMzE5MjAzMloXDTE1MDkzMDE4MTk0N1owbDELMAkGA1UEBhMCVVMxFTATBgNV # BAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTErMCkG # A1UEAxMiRGlnaUNlcnQgSGlnaCBBc3N1cmFuY2UgRVYgUm9vdCBDQTCCASIwDQYJ # KoZIhvcNAQEBBQADggEPADCCAQoCggEBAMbM5XPm+9S75S0tMqbf5YE/yc0lSbZx # KsPVlDRnogocsF9ppkCxxLeyj9CYpKlBWTrT3JTWPNt0OKRKzE0lgvdKpVMSOO7z # SW1xkX5jtqumX8OkhPhPYlG++MXs2ziS4wblCJEMxChBVfvLWokVfnHoNb9Ncgk9 # vjo4UFt3MRuNs8ckRZqnrG0AFFoEt7oT61EKmEFBIk5lYYeBQVCmeVyJ3hlKV9Uu # 5l0cUyx+mM0aBhakaHPQNAQTXKFx01p8VdteZOE3hzBWBOURtCmAEvF5OYiiAhF8 # J2a3iLd48soKqDirCmTCv2ZdlYTBoSUeh10aUAsgEsxBu24LUTi4S8sCAwEAAaOC # AW8wggFrMBIGA1UdEwEB/wQIMAYBAf8CAQEwUwYDVR0gBEwwSjBIBgkrBgEEAbE+ # AQAwOzA5BggrBgEFBQcCARYtaHR0cDovL2N5YmVydHJ1c3Qub21uaXJvb3QuY29t # L3JlcG9zaXRvcnkuY2ZtMA4GA1UdDwEB/wQEAwIBBjCBiQYDVR0jBIGBMH+heaR3 # MHUxCzAJBgNVBAYTAlVTMRgwFgYDVQQKEw9HVEUgQ29ycG9yYXRpb24xJzAlBgNV # BAsTHkdURSBDeWJlclRydXN0IFNvbHV0aW9ucywgSW5jLjEjMCEGA1UEAxMaR1RF # IEN5YmVyVHJ1c3QgR2xvYmFsIFJvb3SCAgGlMEUGA1UdHwQ+MDwwOqA4oDaGNGh0 # dHA6Ly93d3cucHVibGljLXRydXN0LmNvbS9jZ2ktYmluL0NSTC8yMDE4L2NkcC5j # cmwwHQYDVR0OBBYEFLE+w2kD+L9HAdSYJhoIAu9jZCvDMA0GCSqGSIb3DQEBBQUA # A4GBAC52hdk3lm2vifMGeIIxxEYHH2XJjrPJVHjm0ULfdS4eVer3+psEwHV70Xk8 # Bex5xFLdpgPXp1CZPwVZ2sZV9IacDWejSQSVMh3Hh+yFr2Ru1cVfCadAfRa6SQ2i # /fbfVTBs13jGuc9YKWQWTKMggUexRJKEFhtvSrwhxgo97TPKMIIGnzCCBYegAwIB # AgIQDmkGmMIUyHq1tgS5FjzRkDANBgkqhkiG9w0BAQUFADBzMQswCQYDVQQGEwJV # UzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQu # Y29tMTIwMAYDVQQDEylEaWdpQ2VydCBIaWdoIEFzc3VyYW5jZSBDb2RlIFNpZ25p # bmcgQ0EtMTAeFw0xMjAzMjAwMDAwMDBaFw0xMzAzMjIxMjAwMDBaMG0xCzAJBgNV # BAYTAlVTMREwDwYDVQQIEwhOZXcgWW9yazEXMBUGA1UEBxMOV2VzdCBIZW5yaWV0 # dGExGDAWBgNVBAoTD0pvZWwgSC4gQmVubmV0dDEYMBYGA1UEAxMPSm9lbCBILiBC # ZW5uZXR0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2ogGAG89d1jM # fRJv2d3U1lCsW8ok7GkjnLYDn0zC1ALq11rWN5NVwVbn133i+KV0O8kM5vd2M7xE # 8CnVAgybjkrvRD2IqMtp4SrwQuiGiVGsNVWO3vSLHcWsS/I7N0UIpS5PhTuFB4Pc # Oy/MHR4F2g6JLMrAtkpYWxauAFZfFwuEfm6vqWobHTDt5wG+zqOTxMSi1UvL5fEM # DoejGqqriIx5mKDzrvUb/ALNKZ1rGPWlT7O0/UHrV5VuOfgij4XVKBAdcg9JLxky # AEIJ+VvVQ2Jn3lVONCCHbfu5IVhddMru81U/v5Wrj80Zrwh2TH25qlclUKr6eXRL # tP+xFm23CwIDAQABo4IDMzCCAy8wHwYDVR0jBBgwFoAUl0gD6xUIa7myWCPMlC7x # xmXSZI4wHQYDVR0OBBYEFJicRKq/XsBWRuKzU6eTUCBCCU65MA4GA1UdDwEB/wQE # AwIHgDATBgNVHSUEDDAKBggrBgEFBQcDAzBpBgNVHR8EYjBgMC6gLKAqhihodHRw # Oi8vY3JsMy5kaWdpY2VydC5jb20vaGEtY3MtMjAxMWEuY3JsMC6gLKAqhihodHRw # Oi8vY3JsNC5kaWdpY2VydC5jb20vaGEtY3MtMjAxMWEuY3JsMIIBxAYDVR0gBIIB # uzCCAbcwggGzBglghkgBhv1sAwEwggGkMDoGCCsGAQUFBwIBFi5odHRwOi8vd3d3 # LmRpZ2ljZXJ0LmNvbS9zc2wtY3BzLXJlcG9zaXRvcnkuaHRtMIIBZAYIKwYBBQUH # AgIwggFWHoIBUgBBAG4AeQAgAHUAcwBlACAAbwBmACAAdABoAGkAcwAgAEMAZQBy # AHQAaQBmAGkAYwBhAHQAZQAgAGMAbwBuAHMAdABpAHQAdQB0AGUAcwAgAGEAYwBj # AGUAcAB0AGEAbgBjAGUAIABvAGYAIAB0AGgAZQAgAEQAaQBnAGkAQwBlAHIAdAAg # AEMAUAAvAEMAUABTACAAYQBuAGQAIAB0AGgAZQAgAFIAZQBsAHkAaQBuAGcAIABQ # AGEAcgB0AHkAIABBAGcAcgBlAGUAbQBlAG4AdAAgAHcAaABpAGMAaAAgAGwAaQBt # AGkAdAAgAGwAaQBhAGIAaQBsAGkAdAB5ACAAYQBuAGQAIABhAHIAZQAgAGkAbgBj # AG8AcgBwAG8AcgBhAHQAZQBkACAAaABlAHIAZQBpAG4AIABiAHkAIAByAGUAZgBl # AHIAZQBuAGMAZQAuMIGGBggrBgEFBQcBAQR6MHgwJAYIKwYBBQUHMAGGGGh0dHA6 # Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBQBggrBgEFBQcwAoZEaHR0cDovL2NhY2VydHMu # ZGlnaWNlcnQuY29tL0RpZ2lDZXJ0SGlnaEFzc3VyYW5jZUNvZGVTaWduaW5nQ0Et # MS5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQUFAAOCAQEAHIfeYpO0Jtdi # /TpcI6eWQIYU2ALO847Q91jLE6WiU6u8wN6tkHqgeOls070SDUK+C1rVoXKKZ0Je # c2k1dYukKPkyf3qURPyh/aC3hJ0Wwbje7fK79Lt9ZHwJORpesJrwa8T63l3qLLLl # PaIYo/bqiMpNZRfOclukKg2hO67yMaQl8DEL/D5UP1XZShF2zbauH627zEC5KXGZ # Y2yUbmWG2N0oHxr+q4Gyfd0MPtU5avWOILB0ZsN+br+SCVVK6nKzauXMk4HXmKHa # X7cysqpmQiFb7/J7tPQ037KQKHCY/Z+fl0arRCiHih/Q/5owv51WSKPiaUrkBvdJ # 0mKVK+McHzCCBr8wggWnoAMCAQICEAgcV+5dcOuboLFSDHKcGwkwDQYJKoZIhvcN # AQEFBQAwbDELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcG # A1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTErMCkGA1UEAxMiRGlnaUNlcnQgSGlnaCBB # c3N1cmFuY2UgRVYgUm9vdCBDQTAeFw0xMTAyMTAxMjAwMDBaFw0yNjAyMTAxMjAw # MDBaMHMxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNV # BAsTEHd3dy5kaWdpY2VydC5jb20xMjAwBgNVBAMTKURpZ2lDZXJ0IEhpZ2ggQXNz # dXJhbmNlIENvZGUgU2lnbmluZyBDQS0xMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A # MIIBCgKCAQEAxfkj5pQnxIAUpIAyX0CjjW9wwOU2cXE6daSqGpKUiV6sI3HLTmd9 # QT+q40u3e76dwag4j2kvOiTpd1kSx2YEQ8INJoKJQBnyLOrnTOd8BRq4/4gJTyY3 # 7zqk+iJsiMlKG2HyrhBeb7zReZtZGGDl7im1AyqkzvGDGU9pBXMoCfsiEJMioJAZ # Gkwx8tMr2IRDrzxj/5jbINIJK1TB6v1qg+cQoxJx9dbX4RJ61eBWWs7qAVtoZVvB # P1hSM6k1YU4iy4HKNqMSywbWzxtNGH65krkSz0Am2Jo2hbMVqkeThGsHu7zVs94l # ABGJAGjBKTzqPi3uUKvXHDAGeDylECNnkQIDAQABo4IDVDCCA1AwDgYDVR0PAQH/ # BAQDAgEGMBMGA1UdJQQMMAoGCCsGAQUFBwMDMIIBwwYDVR0gBIIBujCCAbYwggGy # BghghkgBhv1sAzCCAaQwOgYIKwYBBQUHAgEWLmh0dHA6Ly93d3cuZGlnaWNlcnQu # Y29tL3NzbC1jcHMtcmVwb3NpdG9yeS5odG0wggFkBggrBgEFBQcCAjCCAVYeggFS # AEEAbgB5ACAAdQBzAGUAIABvAGYAIAB0AGgAaQBzACAAQwBlAHIAdABpAGYAaQBj # AGEAdABlACAAYwBvAG4AcwB0AGkAdAB1AHQAZQBzACAAYQBjAGMAZQBwAHQAYQBu # AGMAZQAgAG8AZgAgAHQAaABlACAARABpAGcAaQBDAGUAcgB0ACAARQBWACAAQwBQ # AFMAIABhAG4AZAAgAHQAaABlACAAUgBlAGwAeQBpAG4AZwAgAFAAYQByAHQAeQAg # AEEAZwByAGUAZQBtAGUAbgB0ACAAdwBoAGkAYwBoACAAbABpAG0AaQB0ACAAbABp # AGEAYgBpAGwAaQB0AHkAIABhAG4AZAAgAGEAcgBlACAAaQBuAGMAbwByAHAAbwBy # AGEAdABlAGQAIABoAGUAcgBlAGkAbgAgAGIAeQAgAHIAZQBmAGUAcgBlAG4AYwBl # AC4wDwYDVR0TAQH/BAUwAwEB/zB/BggrBgEFBQcBAQRzMHEwJAYIKwYBBQUHMAGG # GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBJBggrBgEFBQcwAoY9aHR0cDovL2Nh # Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0SGlnaEFzc3VyYW5jZUVWUm9vdENB # LmNydDCBjwYDVR0fBIGHMIGEMECgPqA8hjpodHRwOi8vY3JsMy5kaWdpY2VydC5j # b20vRGlnaUNlcnRIaWdoQXNzdXJhbmNlRVZSb290Q0EuY3JsMECgPqA8hjpodHRw # Oi8vY3JsNC5kaWdpY2VydC5jb20vRGlnaUNlcnRIaWdoQXNzdXJhbmNlRVZSb290 # Q0EuY3JsMB0GA1UdDgQWBBSXSAPrFQhrubJYI8yULvHGZdJkjjAfBgNVHSMEGDAW # gBSxPsNpA/i/RwHUmCYaCALvY2QrwzANBgkqhkiG9w0BAQUFAAOCAQEAggXpha+n # TL+vzj2y6mCxaN5nwtLLJuDDL5u1aw5TkIX2m+A1Av/6aYOqtHQyFDwuEEwomwqt # CAn584QRk4/LYEBW6XcvabKDmVWrRySWy39LsBC0l7/EpZkG/o7sFFAeXleXy0e5 # NNn8OqL/UCnCCmIE7t6WOm+gwoUPb/wI5DJ704SuaWAJRiac6PD//4bZyAk6ZsOn # No8YT+ixlpIuTr4LpzOQrrxuT/F+jbRGDmT5WQYiIWQAS+J6CAPnvImQnkJPAcC2 # Fn916kaypVQvjJPNETY0aihXzJQ/6XzIGAMDBH5D2vmXoVlH2hKq4G04AF01K8Ui # hssGyrx6TT0mRjGCA6wwggOoAgEBMIGHMHMxCzAJBgNVBAYTAlVTMRUwEwYDVQQK # EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xMjAwBgNV # BAMTKURpZ2lDZXJ0IEhpZ2ggQXNzdXJhbmNlIENvZGUgU2lnbmluZyBDQS0xAhAO # aQaYwhTIerW2BLkWPNGQMAkGBSsOAwIaBQCgeDAYBgorBgEEAYI3AgEMMQowCKAC # gAChAoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsx # DjAMBgorBgEEAYI3AgEVMCMGCSqGSIb3DQEJBDEWBBQi/t811+xfM0LNj5x8Yh4W # 4VVTRTANBgkqhkiG9w0BAQEFAASCAQA216Utho6PZL213Vbd+P5nXS9mRBz581vL # EkhYMvfduQeikLHIIP2CqEGcnwuwNWTzHlN0UkdsDtP9tLdXQt+czvhikd6rzrKH # VcrnfE4IPQt6QT+06PAb4Dwt2RVV9dpstHhKZIWn+GoFuLHuJQzPMgdulYeKMFO2 # ZLrEkmF5+DWzMpBC80WLlpwDJOoUmiuK4oQfzMzqFLBxpw5RAQcA+AA3ohWtQPuF # c7ywquc1c8dCxG5cYaRtFo+LLf6jx4FO24vreKWLbEOx0cTb8PNWvrT34lgnTgUI # pWLJkSRGzywnq3w+keexYi4GC16PfJKnVV8qsRri/wG/AdBQ+ovnoYIBfzCCAXsG # CSqGSIb3DQEJBjGCAWwwggFoAgEBMGcwUzELMAkGA1UEBhMCVVMxFzAVBgNVBAoT # DlZlcmlTaWduLCBJbmMuMSswKQYDVQQDEyJWZXJpU2lnbiBUaW1lIFN0YW1waW5n # IFNlcnZpY2VzIENBAhB5oqWF+dEVQhPZuD72to3tMAkGBSsOAwIaBQCgXTAYBgkq # hkiG9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0xMjA2MjEwNTAw # NTlaMCMGCSqGSIb3DQEJBDEWBBSODCUreYZBSE+ys+civTtfLRjcLjANBgkqhkiG # 9w0BAQEFAASBgFrvbqX/d1ys5yFuOrI2PeQOPEAkE5DdaU7KmGtYUR7B8aLQGXfw # EP3AoFVdswv8zHnZuMMiV3xhtzAT0w0xQKj+CQQ7iQLgyWpSU0zonMT/bRkDglKF # JfC6tpo0dJnqqLXfc3p9JJiSJyI5HneFwtbVSyhmWfYLBJ6kB6Ofypn+ # SIG # End signature block
combined_dataset/train/non-malicious/sample_42_93.ps1
sample_42_93.ps1
## Copyright (c) Microsoft Corporation. All rights reserved. <# .SYNOPSIS This cmdlet collects a performance recording of Microsoft Defender Antivirus scans. .DESCRIPTION This cmdlet collects a performance recording of Microsoft Defender Antivirus scans. These performance recordings contain Microsoft-Antimalware-Engine and NT kernel process events and can be analyzed after collection using the Get-MpPerformanceReport cmdlet. This cmdlet requires elevated administrator privileges. The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. .EXAMPLE New-MpPerformanceRecording -RecordTo:.\Defender-scans.etl #> function New-MpPerformanceRecording { [CmdletBinding(DefaultParameterSetName='Interactive')] param( # Specifies the location where to save the Microsoft Defender Antivirus # performance recording. [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$RecordTo, # Specifies the duration of the performance recording in seconds. [Parameter(Mandatory=$true, ParameterSetName='Timed')] [ValidateRange(0,2147483)] [int]$Seconds, # Specifies the PSSession object in which to create and save the Microsoft # Defender Antivirus performance recording. When you use this parameter, # the RecordTo parameter refers to the local path on the remote machine. [Parameter(Mandatory=$false)] [System.Management.Automation.Runspaces.PSSession[]]$Session, # Optional argument to specifiy a different tool for recording traces. Default is wpr.exe # When $Session parameter is used this path represents a location on the remote machine. [Parameter(Mandatory=$false)] [string]$WPRPath = $null ) [bool]$interactiveMode = ($PSCmdlet.ParameterSetName -eq 'Interactive') [bool]$timedMode = ($PSCmdlet.ParameterSetName -eq 'Timed') # Hosts [string]$powerShellHostConsole = 'ConsoleHost' [string]$powerShellHostISE = 'Windows PowerShell ISE Host' [string]$powerShellHostRemote = 'ServerRemoteHost' if ($interactiveMode -and ($Host.Name -notin @($powerShellHostConsole, $powerShellHostISE, $powerShellHostRemote))) { $ex = New-Object System.Management.Automation.ItemNotFoundException 'Cmdlet supported only on local PowerShell console, Windows PowerShell ISE and remote PowerShell console.' $category = [System.Management.Automation.ErrorCategory]::NotImplemented $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotImplemented',$category,$Host.Name $psCmdlet.WriteError($errRecord) return } if ($null -ne $Session) { [int]$RemotedSeconds = if ($timedMode) { $Seconds } else { -1 } Invoke-Command -Session:$session -ArgumentList:@($RecordTo, $RemotedSeconds) -ScriptBlock:{ param( [Parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [string]$RecordTo, [Parameter(Mandatory=$true)] [ValidateRange(-1,2147483)] [int]$RemotedSeconds ) if ($RemotedSeconds -eq -1) { New-MpPerformanceRecording -RecordTo:$RecordTo -WPRPath:$WPRPath } else { New-MpPerformanceRecording -RecordTo:$RecordTo -Seconds:$RemotedSeconds -WPRPath:$WPRPath } } return } if (-not (Test-Path -LiteralPath:$RecordTo -IsValid)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot record Microsoft Defender Antivirus performance recording to path '$RecordTo' because the location does not exist." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidPath',$category,$RecordTo $psCmdlet.WriteError($errRecord) return } # Resolve any relative paths $RecordTo = $psCmdlet.SessionState.Path.GetUnresolvedProviderPathFromPSPath($RecordTo) # Dependencies: WPR Profile [string]$wprProfile = "$PSScriptRoot\MSFT_MpPerformanceRecording.wprp" if (-not (Test-Path -LiteralPath:$wprProfile -PathType:Leaf)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency file '$wprProfile' because it does not exist." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprProfile $psCmdlet.WriteError($errRecord) return } # Dependencies: WPR Version try { # If user provides a valid string as $WPRPath we go with that. [string]$wprCommand = $WPRPath if (!$wprCommand) { $wprCommand = "wpr.exe" $wprs = @(Get-Command -All "wpr" 2> $null) if ($wprs -and ($wprs.Length -ne 0)) { $latestVersion = [System.Version]"0.0.0.0" $wprs | ForEach-Object { $currentVersion = $_.Version $currentFullPath = $_.Source $currentVersionString = $currentVersion.ToString() Write-Host "Found $currentVersionString at $currentFullPath" if ($currentVersion -gt $latestVersion) { $latestVersion = $currentVersion $wprCommand = $currentFullPath } } } } } catch { # Fallback to the old ways in case we encounter an error (ex: version string format change). [string]$wprCommand = "wpr.exe" } finally { Write-Host "`nUsing $wprCommand version $((Get-Command $wprCommand).FileVersionInfo.FileVersion)`n" } # # Test dependency presence # if (-not (Get-Command $wprCommand -ErrorAction:SilentlyContinue)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency command '$wprCommand' because it does not exist." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprCommand $psCmdlet.WriteError($errRecord) return } # Exclude versions that have known bugs or are not supported any more. [int]$wprFileVersion = ((Get-Command $wprCommand).Version.Major) -as [int] if ($wprFileVersion -le 6) { $ex = New-Object System.Management.Automation.PSNotSupportedException "You are using an older and unsupported version of '$wprCommand'. Please download and install Windows ADK:`r`nhttps://docs.microsoft.com/en-us/windows-hardware/get-started/adk-install`r`nand try again." $category = [System.Management.Automation.ErrorCategory]::NotInstalled $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotSupported',$category,$wprCommand $psCmdlet.WriteError($errRecord) return } function CancelPerformanceRecording { Write-Host "`n`nCancelling Microsoft Defender Antivirus performance recording... " -NoNewline & $wprCommand -cancel -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 {} 0xc5583000 { Write-Error "Cannot cancel performance recording because currently Windows Performance Recorder is not recording." return } default { Write-Error ("Cannot cancel performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has been cancelled." } # # Ensure Ctrl-C doesn't abort the app without cleanup # # - local PowerShell consoles: use [Console]::TreatControlCAsInput; cleanup performed and output preserved # - PowerShell ISE: use try { ... } catch { throw } finally; cleanup performed and output preserved # - remote PowerShell: use try { ... } catch { throw } finally; cleanup performed but output truncated [bool]$canTreatControlCAsInput = $interactiveMode -and ($Host.Name -eq $powerShellHostConsole) $savedControlCAsInput = $null $shouldCancelRecordingOnTerminatingError = $false try { if ($canTreatControlCAsInput) { $savedControlCAsInput = [Console]::TreatControlCAsInput [Console]::TreatControlCAsInput = $true } # # Start recording # Write-Host "Starting Microsoft Defender Antivirus performance recording... " -NoNewline $shouldCancelRecordingOnTerminatingError = $true & $wprCommand -start "$wprProfile!Scans.Light" -filemode -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 {} 0xc5583001 { $shouldCancelRecordingOnTerminatingError = $false Write-Error "Cannot start performance recording because Windows Performance Recorder is already recording." return } default { $shouldCancelRecordingOnTerminatingError = $false Write-Error ("Cannot start performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has started." -NoNewline if ($timedMode) { Write-Host "`n`n Recording for $Seconds seconds... " -NoNewline Start-Sleep -Seconds:$Seconds Write-Host "ok." -NoNewline } elseif ($interactiveMode) { $stopPrompt = "`n`n=> Reproduce the scenario that is impacting the performance on your device.`n`n Press <ENTER> to stop and save recording or <Ctrl-C> to cancel recording" if ($canTreatControlCAsInput) { Write-Host "${stopPrompt}: " do { $key = [Console]::ReadKey($true) if (($key.Modifiers -eq [ConsoleModifiers]::Control) -and (($key.Key -eq [ConsoleKey]::C))) { CancelPerformanceRecording $shouldCancelRecordingOnTerminatingError = $false # # Restore Ctrl-C behavior # [Console]::TreatControlCAsInput = $savedControlCAsInput return } } while (($key.Modifiers -band ([ConsoleModifiers]::Alt -bor [ConsoleModifiers]::Control -bor [ConsoleModifiers]::Shift)) -or ($key.Key -ne [ConsoleKey]::Enter)) } else { Read-Host -Prompt:$stopPrompt } } # # Stop recording # Write-Host "`n`nStopping Microsoft Defender Antivirus performance recording... " & $wprCommand -stop $RecordTo -instancename MSFT_MpPerformanceRecording $wprCommandExitCode = $LASTEXITCODE switch ($wprCommandExitCode) { 0 { $shouldCancelRecordingOnTerminatingError = $false } 0xc5583000 { $shouldCancelRecordingOnTerminatingError = $false Write-Error "Cannot stop performance recording because Windows Performance Recorder is not recording a trace." return } default { Write-Error ("Cannot stop performance recording: 0x{0:x08}." -f $wprCommandExitCode) return } } Write-Host "ok.`n`nRecording has been saved to '$RecordTo'." Write-Host ` ' The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. ' Write-Host ` ' The trace you have just captured may contain personally identifiable information, including but not necessarily limited to paths to files accessed, paths to registry accessed and process names. Exact information depends on the events that were logged. Please be aware of this when sharing this trace with other people. ' } catch { throw } finally { if ($shouldCancelRecordingOnTerminatingError) { CancelPerformanceRecording } if ($null -ne $savedControlCAsInput) { # # Restore Ctrl-C behavior # [Console]::TreatControlCAsInput = $savedControlCAsInput } } } function PadUserDateTime { [OutputType([DateTime])] param( [Parameter(Mandatory = $true, Position = 0)] [DateTime]$UserDateTime ) # Padding user input to include all events up to the start of the next second. if (($UserDateTime.Ticks % 10000000) -eq 0) { return $UserDateTime.AddTicks(9999999) } else { return $UserDateTime } } function ValidateTimeInterval { [OutputType([PSCustomObject])] param( [DateTime]$MinStartTime = [DateTime]::MinValue, [DateTime]$MinEndTime = [DateTime]::MinValue, [DateTime]$MaxStartTime = [DateTime]::MaxValue, [DateTime]$MaxEndTime = [DateTime]::MaxValue ) $ret = [PSCustomObject]@{ arguments = [string[]]@() status = $false } if ($MinStartTime -gt $MaxEndTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxEndTime '$MaxEndTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinStartTime -gt $MaxStartTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxStartTime '$MaxStartTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxStartTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinEndTime -gt $MaxEndTime) { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' should have been lower than MaxEndTime '$MaxEndTime'" $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinEndTime' .. '$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } if ($MinStartTime -gt [DateTime]::MinValue) { try { $MinStartFileTime = $MinStartTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinStartTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MinStartTime', $MinStartFileTime) } if ($MaxEndTime -lt [DateTime]::MaxValue) { try { $MaxEndFileTime = $MaxEndTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MaxEndTime '$MaxEndTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxEndTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MaxEndTime', $MaxEndFileTime) } if ($MaxStartTime -lt [DateTime]::MaxValue) { try { $MaxStartFileTime = $MaxStartTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MaxStartTime '$MaxStartTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxStartTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MaxStartTime', $MaxStartFileTime) } if ($MinEndTime -gt [DateTime]::MinValue) { try { $MinEndFileTime = $MinEndTime.ToFileTime() } catch { $ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' is not a valid timestamp." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinEndTime'" $psCmdlet.WriteError($errRecord) return $ret } $ret.arguments += @('-MinEndTime', $MinEndFileTime) } $ret.status = $true return $ret } function ParseFriendlyDuration { [OutputType([TimeSpan])] param( [Parameter(Mandatory = $true, Position = 0)] [string] $FriendlyDuration ) if ($FriendlyDuration -match '^(\d+)(?:\.(\d+))?(sec|ms|us)$') { [string]$seconds = $Matches[1] [string]$decimals = $Matches[2] [string]$unit = $Matches[3] [uint32]$magnitude = switch ($unit) { 'sec' {7} 'ms' {4} 'us' {1} } if ($decimals.Length -gt $magnitude) { throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration: $($decimals.Length) decimals specified for time unit '$unit'; at most $magnitude expected.") } return [timespan]::FromTicks([int64]::Parse($seconds + $decimals.PadRight($magnitude, '0'))) } [timespan]$result = [timespan]::FromTicks(0) if ([timespan]::TryParse($FriendlyDuration, [ref]$result)) { return $result } throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration; expected a value like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan.") } [scriptblock]$FriendlyTimeSpanToString = { '{0:0.0000}ms' -f ($this.Ticks / 10000.0) } function New-FriendlyTimeSpan { param( [Parameter(Mandatory = $true)] [uint64]$Ticks, [bool]$Raw = $false ) if ($Raw) { return $Ticks } $result = [TimeSpan]::FromTicks($Ticks) $result.PsTypeNames.Insert(0, 'MpPerformanceReport.TimeSpan') $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyTimeSpanToString $result } function New-FriendlyDateTime { param( [Parameter(Mandatory = $true)] [uint64]$FileTime, [bool]$Raw = $false ) if ($Raw) { return $FileTime } [DateTime]::FromFileTime($FileTime) } function Add-DefenderCollectionType { param( [Parameter(Mandatory = $true)] [ref]$CollectionRef ) if ($CollectionRef.Value.Length -and ($CollectionRef.Value | Get-Member -Name:'Processes','Files','Extensions','Scans','Folder')) { $CollectionRef.Value.PSTypeNames.Insert(0, 'MpPerformanceReport.NestedCollection') } } [scriptblock]$FriendlyScanInfoToString = { [PSCustomObject]@{ ScanType = $this.ScanType StartTime = $this.StartTime EndTime = $this.EndTime Duration = $this.Duration Reason = $this.Reason Path = $this.Path ProcessPath = $this.ProcessPath ProcessId = $this.ProcessId Image = $this.Image } } function Get-ScanComments { param( [PSCustomObject[]]$SecondaryEvents, [bool]$Raw = $false ) $Comments = @() foreach ($item in @($SecondaryEvents | Sort-Object -Property:StartTime)) { if (($item | Get-Member -Name:'Message' -MemberType:NoteProperty).Count -eq 1) { if (($item | Get-Member -Name:'Duration' -MemberType:NoteProperty).Count -eq 1) { $Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw $StartTime = New-FriendlyDateTime -FileTime:$item.StartTime -Raw:$Raw $Comments += "Expensive operation `"{0}`" started at {1} lasted {2}" -f ($item.Message, $StartTime, $Duration.ToString()) if (($item | Get-Member -Name:'Debug' -MemberType:NoteProperty).Count -eq 1) { $item.Debug | ForEach-Object { if ($_.EndsWith("is NOT trusted") -or $_.StartsWith("Not trusted, ") -or $_.ToLower().Contains("error") -or $_.Contains("Result of ValidateTrust")) { $Comments += "$_" } } } } else { if ($item.Message.Contains("subtype=Lowfi")) { $Comments += $item.Message.Replace("subtype=Lowfi", "Low-fidelity detection") } else { $Comments += $item.Message } } } elseif (($item | Get-Member -Name:'ScanType' -MemberType:NoteProperty).Count -eq 1) { $Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw $OpId = "Internal opertion" if (($item | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) { $OpId = $item.Path } elseif (($item | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) { $OpId = $item.ProcessPath } $Comments += "{0} {1} lasted {2}" -f ($item.ScanType, $OpId, $Duration.ToString()) } } $Comments } filter ConvertTo-DefenderScanInfo { param( [bool]$Raw = $false ) $result = [PSCustomObject]@{ ScanType = [string]$_.ScanType StartTime = New-FriendlyDateTime -FileTime:$_.StartTime -Raw:$Raw EndTime = New-FriendlyDateTime -FileTime:$_.EndTime -Raw:$Raw Duration = New-FriendlyTimeSpan -Ticks:$_.Duration -Raw:$Raw Reason = [string]$_.Reason SkipReason = [string]$_.SkipReason } if (($_ | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:([string]$_.Path) } if (($_ | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:([string]$_.ProcessPath) } if (($_ | Get-Member -Name:'Image' -MemberType:NoteProperty).Count -eq 1) { $result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]$_.Image) } elseif ($_.ProcessPath -and (-not $_.ProcessPath.StartsWith("pid"))) { try { $result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]([System.IO.FileInfo]$_.ProcessPath).Name) } catch { # Silently ignore. } } $ProcessId = if ($_.ProcessId -gt 0) { [int]$_.ProcessId } elseif ($_.ScannedProcessId -gt 0) { [int]$_.ScannedProcessId } else { $null } if ($ProcessId) { $result | Add-Member -NotePropertyName:'ProcessId' -NotePropertyValue:([int]$ProcessId) } if ($result.Image -and $result.ProcessId) { $ProcessName = "{0} ({1})" -f $result.Image, $result.ProcessId $result | Add-Member -NotePropertyName:'ProcessName' -NotePropertyValue:([string]$ProcessName) } if ((($_ | Get-Member -Name:'Extra' -MemberType:NoteProperty).Count -eq 1) -and ($_.Extra.Count -gt 0)) { $Comments = @(Get-ScanComments -SecondaryEvents:$_.Extra -Raw:$Raw) $result | Add-Member -NotePropertyName:'Comments' -NotePropertyValue:$Comments } if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanInfo') } $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScanInfoToString $result } filter ConvertTo-DefenderScanOverview { param( [bool]$Raw = $false ) $vals = [ordered]@{} foreach ($entry in $_.PSObject.Properties) { if ($entry.Value) { $Key = $entry.Name.Replace("_", " ") if ($Key.EndsWith("Time")) { $vals[$Key] = New-FriendlyDateTime -FileTime:$entry.Value -Raw:$Raw } elseif ($Key.EndsWith("Duration")) { $vals[$Key] = New-FriendlyTimeSpan -Ticks:$entry.Value -Raw:$Raw } else { $vals[$Key] = $entry.Value } } } # Remove duplicates if (($_ | Get-Member -Name:'PerfHints' -MemberType:NoteProperty).Count -eq 1) { $hints = [ordered]@{} foreach ($hint in $_.PerfHints) { $hints[$hint] = $true } $vals["PerfHints"] = @($hints.Keys) } $result = New-Object PSCustomObject -Property:$vals $result } filter ConvertTo-DefenderScanStats { param( [bool]$Raw = $false ) $result = [PSCustomObject]@{ Count = $_.Count TotalDuration = New-FriendlyTimeSpan -Ticks:$_.TotalDuration -Raw:$Raw MinDuration = New-FriendlyTimeSpan -Ticks:$_.MinDuration -Raw:$Raw AverageDuration = New-FriendlyTimeSpan -Ticks:$_.AverageDuration -Raw:$Raw MaxDuration = New-FriendlyTimeSpan -Ticks:$_.MaxDuration -Raw:$Raw MedianDuration = New-FriendlyTimeSpan -Ticks:$_.MedianDuration -Raw:$Raw } if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanStats') } $result } [scriptblock]$FriendlyScannedFilePathStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Path = $this.Path } } filter ConvertTo-DefenderScannedFilePathStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFilePathStats') } $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFilePathStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } $result } [scriptblock]$FriendlyScannedPathsStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Path = $this.Path Folder = $this.Folder } } filter ConvertTo-DefenderScannedPathsStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedPathStats') } $result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path) if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedPathsStatsToString if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } $result } [scriptblock]$FriendlyScannedFileExtensionStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration Extension = $this.Extension } } filter ConvertTo-DefenderScannedFileExtensionStats { param( [bool]$Raw = $false ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFileExtensionStats') } $result | Add-Member -NotePropertyName:'Extension' -NotePropertyValue:($_.Extension) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFileExtensionStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Processes) { $result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@( $_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes) } } if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } $result } [scriptblock]$FriendlyScannedProcessStatsToString = { [PSCustomObject]@{ Count = $this.Count TotalDuration = $this.TotalDuration MinDuration = $this.MinDuration AverageDuration = $this.AverageDuration MaxDuration = $this.MaxDuration MedianDuration = $this.MedianDuration ProcessPath = $this.ProcessPath } } filter ConvertTo-DefenderScannedProcessStats { param( [bool]$Raw ) $result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedProcessStats') } $result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:($_.Process) $result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedProcessStatsToString if ($null -ne $_.Scans) { $result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@( $_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans) } } if ($null -ne $_.Files) { $result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@( $_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Files) } } if ($null -ne $_.Extensions) { $result | Add-Member -NotePropertyName:'Extensions' -NotePropertyValue:@( $_.Extensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Extensions) } } if ($null -ne $_.Folder) { $result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@( $_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw ) if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder) } } $result } <# .SYNOPSIS This cmdlet reports the file paths, file extensions, and processes that cause the highest impact to Microsoft Defender Antivirus scans. .DESCRIPTION This cmdlet analyzes a previously collected Microsoft Defender Antivirus performance recording and reports the file paths, file extensions and processes that cause the highest impact to Microsoft Defender Antivirus scans. The performance analyzer provides insight into problematic files that could cause performance degradation of Microsoft Defender Antivirus. This tool is provided "AS IS", and is not intended to provide suggestions on exclusions. Exclusions can reduce the level of protection on your endpoints. Exclusions, if any, should be defined with caution. .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10 -Raw | ConvertTo-Json .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopScansPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3 -TopScansPerProcessPerFile:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopScansPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopScansPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3 -TopScansPerFilePerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3 -TopScansPerFilePerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopScansPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3 -TopScansPerPathPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopScansPerPathPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3 -TopScansPerFilePerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3 -TopScansPerProcessPerExtension:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopScansPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3 -TopScansPerExtensionPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3 -TopScansPerFilePerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3 -TopScansPerPathPerProcess:3 .EXAMPLE Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopScansPerPathPerProcess:3 .EXAMPLE # Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations between MinStartTime and MaxStartTime, possibly partially overlapping this period Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations that start at MinStartTime or later: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that start before or at MaxStartTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that end at MinEndTime or later: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations that end before or at MaxEndTime: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxEndTime:"5/14/2022 7:01:11 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that did not start or end between MaxStartTime and MinEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended later than MinEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started before MaxStartTime, and ended between MinEndTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM" .EXAMPLE # Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended between MinEndTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM" .EXAMPLE # Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:([DateTime]::FromFileTime(132969744714304340)) -MaxEndTime:([DateTime]::FromFileTime(132969745000971033)) .EXAMPLE # Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format: Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:([DateTime]::FromFileTime(132969744714304340)) -MaxStartTime:([DateTime]::FromFileTime(132969745000971033)) .EXAMPLE # Display a summary or overview of the scans captured in the trace, in addition to the information displayed regularly through other arguments. Output is influenced by time interval arguments MinStartTime and MaxEndTime. Get-MpPerformanceReport -Path:.\Defender-scans.etl [other arguments] -Overview #> function Get-MpPerformanceReport { [CmdletBinding()] param( # Specifies the location of Microsoft Defender Antivirus performance recording to analyze. [Parameter(Mandatory=$true, Position=0, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true, HelpMessage="Location of Microsoft Defender Antivirus performance recording.")] [ValidateNotNullOrEmpty()] [string]$Path, # Requests a top files report and specifies how many top files to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFiles = 0, # Specifies how many top scans to output for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFile = 0, # Specifies how many top processes to output for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerFile = 0, # Specifies how many top scans to output for each top process for each top file, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerFile = 0, # Requests a top paths report and specifies how many top entries to output, sorted by "Duration". This is called recursively for each directory entry. Scans are grouped hierarchically per folder and sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPaths = 0, # Specifies the maxmimum depth (path-wise) that will be used to grop scans when $TopPaths is used. [ValidateRange(1,1024)] [int]$TopPathsDepth = 0, # Specifies how many top scans to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPath = 0, # Specifies how many top files to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerPath = 0, # Specifies how many top scans to output for each top file for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerPath = 0, # Specifies how many top extensions to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensionsPerPath = 0, # Specifies how many top scans to output for each top extension for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtensionPerPath = 0, # Specifies how many top processes to output for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerPath = 0, # Specifies how many top scans to output for each top process for each top path, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerPath = 0, # Requests a top extensions report and specifies how many top extensions to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensions = 0, # Specifies how many top scans to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtension = 0, # Specifies how many top paths to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPathsPerExtension = 0, # Specifies how many top scans to output for each top path for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPathPerExtension = 0, # Specifies how many top files to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerExtension = 0, # Specifies how many top scans to output for each top file for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerExtension = 0, # Specifies how many top processes to output for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcessesPerExtension = 0, # Specifies how many top scans to output for each top process for each top extension, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcessPerExtension = 0, # Requests a top processes report and specifies how many top processes to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopProcesses = 0, # Specifies how many top scans to output for each top process in the Top Processes report, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerProcess = 0, # Specifies how many top files to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopFilesPerProcess = 0, # Specifies how many top scans to output for each top file for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerFilePerProcess = 0, # Specifies how many top extensions to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopExtensionsPerProcess = 0, # Specifies how many top scans to output for each top extension for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerExtensionPerProcess = 0, # Specifies how many top paths to output for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopPathsPerProcess = 0, # Specifies how many top scans to output for each top path for each top process, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScansPerPathPerProcess = 0, # Requests a top scans report and specifies how many top scans to output, sorted by "Duration". [ValidateRange(0,([int]::MaxValue))] [int]$TopScans = 0, ## TimeSpan format: d | h:m | h:m:s | d.h:m | h:m:.f | h:m:s.f | d.h:m:s | d.h:m:.f | d.h:m:s.f => d | (d.)?h:m(:s(.f)?)? | ((d.)?h:m:.f) # Specifies the minimum duration of any scans or total scan durations of files, extensions and processes included in the report. # Accepts values like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan. [ValidatePattern('^(?:(?:(\d+)(?:\.(\d+))?(sec|ms|us))|(?:\d+)|(?:(\d+\.)?\d+:\d+(?::\d+(?:\.\d+)?)?)|(?:(\d+\.)?\d+:\d+:\.\d+))$')] [string]$MinDuration = '0us', # Specifies the minimum start time of scans included in the report. Accepts a valid DateTime. [DateTime]$MinStartTime = [DateTime]::MinValue, # Specifies the minimum end time of scans included in the report. Accepts a valid DateTime. [DateTime]$MinEndTime = [DateTime]::MinValue, # Specifies the maximum start time of scans included in the report. Accepts a valid DateTime. [DateTime]$MaxStartTime = [DateTime]::MaxValue, # Specifies the maximum end time of scans included in the report. Accepts a valid DateTime. [DateTime]$MaxEndTime = [DateTime]::MaxValue, # Adds an overview or summary of the scans captured in the trace to the regular output. [switch]$Overview, # Specifies that the output should be machine readable and readily convertible to serialization formats like JSON. # - Collections and elements are not be formatted. # - TimeSpan values are represented as number of 100-nanosecond intervals. # - DateTime values are represented as number of 100-nanosecond intervals since January 1, 1601 (UTC). [switch]$Raw ) # # Validate performance recording presence # if (-not (Test-Path -Path:$Path -PathType:Leaf)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find path '$Path'." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$Path $psCmdlet.WriteError($errRecord) return } function ParameterValidationError { [CmdletBinding()] param ( [Parameter(Mandatory)] [string] $ParameterName, [Parameter(Mandatory)] [string] $ParentParameterName ) $ex = New-Object System.Management.Automation.ValidationMetadataException "Parameter '$ParameterName' requires parameter '$ParentParameterName'." $category = [System.Management.Automation.ErrorCategory]::MetadataError $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidParameter',$category,$ParameterName $psCmdlet.WriteError($errRecord) } # # Additional parameter validation # if ($TopFiles -eq 0) { if ($TopScansPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFile' -ParentParameterName:'TopFiles' } if ($TopProcessesPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerFile' -ParentParameterName:'TopFiles' } } if ($TopProcessesPerFile -eq 0) { if ($TopScansPerProcessPerFile -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerFile' -ParentParameterName:'TopProcessesPerFile' } } if ($TopPathsDepth -gt 0) { if (($TopPaths -eq 0) -and ($TopPathsPerProcess -eq 0) -and ($TopPathsPerExtension -eq 0)) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsDepth' -ParentParameterName:'TopPaths or TopPathsPerProcess or TopPathsPerExtension' } } if ($TopPaths -eq 0) { if ($TopScansPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPath' -ParentParameterName:'TopPaths' } if ($TopFilesPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerPath' -ParentParameterName:'TopPaths' } if ($TopExtensionsPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerPath' -ParentParameterName:'TopPaths' } if ($TopProcessesPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerPath' -ParentParameterName:'TopPaths' } } if ($TopFilesPerPath -eq 0) { if ($TopScansPerFilePerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerPath' -ParentParameterName:'TopFilesPerPath' } } if ($TopExtensionsPerPath -eq 0) { if ($TopScansPerExtensionPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerPath' -ParentParameterName:'TopExtensionsPerPath' } } if ($TopProcessesPerPath -eq 0) { if ($TopScansPerProcessPerPath -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerPath' -ParentParameterName:'TopProcessesPerPath' } } if ($TopExtensions -eq 0) { if ($TopScansPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtension' -ParentParameterName:'TopExtensions' } if ($TopFilesPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerExtension' -ParentParameterName:'TopExtensions' } if ($TopProcessesPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerExtension' -ParentParameterName:'TopExtensions' } if ($TopPathsPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerExtension' -ParentParameterName:'TopExtensions' } } if ($TopFilesPerExtension -eq 0) { if ($TopScansPerFilePerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerExtension' -ParentParameterName:'TopFilesPerExtension' } } if ($TopProcessesPerExtension -eq 0) { if ($TopScansPerProcessPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerExtension' -ParentParameterName:'TopProcessesPerExtension' } } if ($TopPathsPerExtension -eq 0) { if ($TopScansPerPathPerExtension -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerExtension' -ParentParameterName:'TopPathsPerExtension' } } if ($TopProcesses -eq 0) { if ($TopScansPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcess' -ParentParameterName:'TopProcesses' } if ($TopFilesPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerProcess' -ParentParameterName:'TopProcesses' } if ($TopExtensionsPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerProcess' -ParentParameterName:'TopProcesses' } if ($TopPathsPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerProcess' -ParentParameterName:'TopProcesses' } } if ($TopFilesPerProcess -eq 0) { if ($TopScansPerFilePerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerProcess' -ParentParameterName:'TopFilesPerProcess' } } if ($TopExtensionsPerProcess -eq 0) { if ($TopScansPerExtensionPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerProcess' -ParentParameterName:'TopExtensionsPerProcess' } } if ($TopPathsPerProcess -eq 0) { if ($TopScansPerPathPerProcess -gt 0) { ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerProcess' -ParentParameterName:'TopPathsPerProcess' } } if (($TopFiles -eq 0) -and ($TopExtensions -eq 0) -and ($TopProcesses -eq 0) -and ($TopScans -eq 0) -and ($TopPaths -eq 0) -and (-not $Overview)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "At least one of the parameters 'TopFiles', 'TopPaths', 'TopExtensions', 'TopProcesses', 'TopScans' or 'Overview' must be present." $category = [System.Management.Automation.ErrorCategory]::InvalidArgument $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidArgument',$category,$wprProfile $psCmdlet.WriteError($errRecord) return } # Dependencies [string]$PlatformPath = (Get-ItemProperty -Path:'HKLM:\Software\Microsoft\Windows Defender' -Name:'InstallLocation' -ErrorAction:Stop).InstallLocation # # Test dependency presence # [string]$mpCmdRunCommand = "${PlatformPath}MpCmdRun.exe" if (-not (Get-Command $mpCmdRunCommand -ErrorAction:SilentlyContinue)) { $ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find '$mpCmdRunCommand'." $category = [System.Management.Automation.ErrorCategory]::ObjectNotFound $errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$mpCmdRunCommand $psCmdlet.WriteError($errRecord) return } # assemble report arguments [string[]]$reportArguments = @( $PSBoundParameters.GetEnumerator() | Where-Object { $_.Key.ToString().StartsWith("Top") -and ($_.Value -gt 0) } | ForEach-Object { "-$($_.Key)"; "$($_.Value)"; } ) [timespan]$MinDurationTimeSpan = ParseFriendlyDuration -FriendlyDuration:$MinDuration if ($MinDurationTimeSpan -gt [TimeSpan]::FromTicks(0)) { $reportArguments += @('-MinDuration', ($MinDurationTimeSpan.Ticks)) } $MaxEndTime = PadUserDateTime -UserDateTime:$MaxEndTime $MaxStartTime = PadUserDateTime -UserDateTime:$MaxStartTime $ret = ValidateTimeInterval -MinStartTime:$MinStartTime -MaxEndTime:$MaxEndTime -MaxStartTime:$MaxStartTime -MinEndTime:$MinEndTime if ($false -eq $ret.status) { return } [string[]]$intervalArguments = $ret.arguments if (($null -ne $intervalArguments) -and ($intervalArguments.Length -gt 0)) { $reportArguments += $intervalArguments } if ($Overview) { $reportArguments += "-Overview" } $report = (& $mpCmdRunCommand -PerformanceReport -RecordingPath $Path @reportArguments) | Where-Object { -not [string]::IsNullOrEmpty($_) } | ConvertFrom-Json $result = [PSCustomObject]@{} if (-not $Raw) { $result.PSTypeNames.Insert(0, 'MpPerformanceReport.Result') } if ($TopFiles -gt 0) { $reportTopFiles = @(if ($null -ne $report.TopFiles) { @($report.TopFiles | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopFiles' -NotePropertyValue:$reportTopFiles if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopFiles) } } if ($TopPaths -gt 0) { $reportTopPaths = @(if ($null -ne $report.TopPaths) { @($report.TopPaths | ConvertTo-DefenderScannedPathsStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopPaths' -NotePropertyValue:$reportTopPaths if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopPaths) } } if ($TopExtensions -gt 0) { $reportTopExtensions = @(if ($null -ne $report.TopExtensions) { @($report.TopExtensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopExtensions' -NotePropertyValue:$reportTopExtensions if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopExtensions) } } if ($TopProcesses -gt 0) { $reportTopProcesses = @(if ($null -ne $report.TopProcesses) { @($report.TopProcesses | ConvertTo-DefenderScannedProcessStats -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopProcesses' -NotePropertyValue:$reportTopProcesses if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopProcesses) } } if ($TopScans -gt 0) { $reportTopScans = @(if ($null -ne $report.TopScans) { @($report.TopScans | ConvertTo-DefenderScanInfo -Raw:$Raw) } else { @() }) $result | Add-Member -NotePropertyName:'TopScans' -NotePropertyValue:$reportTopScans if (-not $Raw) { Add-DefenderCollectionType -CollectionRef:([ref]$result.TopScans) } } if ($Overview) { if ($null -ne $report.Overview) { $reportOverview = $report.Overview | ConvertTo-DefenderScanOverview -Raw:$Raw $result | Add-Member -NotePropertyName:'Overview' -NotePropertyValue:$reportOverview if (-not $Raw) { $result.Overview.PSTypeNames.Insert(0, 'MpPerformanceReport.Overview') } } } $result } $exportModuleMemberParam = @{ Function = @( 'New-MpPerformanceRecording' 'Get-MpPerformanceReport' ) } Export-ModuleMember @exportModuleMemberParam # SIG # Begin signature block # MIIlpgYJKoZIhvcNAQcCoIIllzCCJZMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCABOtUhuRLDSJsH # 5LjfiBWymKYbjYNumRKF78V/LI3Gd6CCC2IwggTvMIID16ADAgECAhMzAAAK69Nl # RIMWPjjtAAAAAArrMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD # QSAyMDEwMB4XDTIzMTAxOTE5MTgwMloXDTI0MTAxNjE5MTgwMlowcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0 # IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCfg+TEc3bT # Vvq+rfw2TA/Aluhr9MvjyW4v2sVY1+wdq98kJogwk5wRwMEPNKacaRJn02l8VCT5 # eblNMpXt3iD7AcYN+cSnvC4rBDCNKAJAf1ND9AYU9kpP3eKKrxjkbNq5I5uxrIRW # AP2K3gqGsN8peSb+7/BCINSMrmJ7Tx46PXz8asIJY3TEmq4x13zC5uXtIIb1s/d1 # PWrE9KDPyz16VZQx+ZlNEnFVXH6Cg2gw7AJMQLUHJgeLfLcBilLd/P+2j04e7dgD # s6fc0Wrw+Bz5EA/kV77PxHLEt7apceKqp5+dNMo1unzlZuMIh5+A6HA7aXbdF9KX # ujJ6b2MlurVnAgMBAAGjggF3MIIBczAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr # BgEFBQcDAzAdBgNVHQ4EFgQUU6kklw2HQNa4/ec1p2tW744uJekwVAYDVR0RBE0w # S6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGlt # aXRlZDEWMBQGA1UEBRMNMjMwMDI4KzUwMTcwNTAfBgNVHSMEGDAWgBTRT6mKBwjO # 9CQYmOUA//PWeR03vDBTBgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5j # cmwwVwYIKwYBBQUHAQEESzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpL2NlcnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNV # HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IBAQBks51pE8oGEEiS12JhhlAAD/Hf # E6sdGt6b37sp62b9mymV/X3pl4YjPxzeckToiB4SBLLCuG6PCFWBWvKF3QZV7p4L # fClCVjXz5SRXHzgZlXnEReG7r4GMXZ9i06zcSWcy/rFEINTZtPCwLYMNTEIpcW+t # ojVpI6X4FRV5YjfFirE4qmmLYyTQioPYJO5/n2/Xz/BcNj2GFvGycjAtuITmvlPH # g/ZTaTas8PD5loz8YKngKl/DvfTWEHDyYAdmNZcNRP2BuKf3kksHN20z6Lf/JCK1 # et2f5zMarFELgr12wrdI/8z4+hleNPf9cqU36jrEFauG+XaucS5UlnGp043TMIIG # azCCBFOgAwIBAgIKYQxqGQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIz # WhcNMjUwNzA2MjA1MDIzWjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSMwIQYDVQQDExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIw # DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+ # DZ0U5LGfwciUsDh8H9AzVfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdS # cFosHZSrGb+vlX2vZqFvm2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/ # OEbmisdzaXZVaZZM5NjwNOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMU # pUwIoIPXIx/zX99vLM/aFtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jA # vguTHijgc23SVOkoTL9rXZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEA # AaOCAeMwggHfMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQY # mOUA//PWeR03vDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0g # BIGVMIGSMIGPBgkrBgEEAYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cu # bWljcm9zb2Z0LmNvbS9QS0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUH # AgIwNB4yIB0ATABlAGcAYQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBl # AG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnC # lHDDZJTD2FamkI7+5Jr0bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz # /Q2QJCTj+dyWyvy4rL/0wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0b # jPMAYkG6SHSHgv1QyfSHKcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9 # TUj3bkFHUhy7G8JXOqiZVpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b # 3CLVFCNqQX/QQqbb7yV7BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9 # pE/oGw5rduS4j7DC6v119yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6Mj # ugagwI7RiE+TIPJwX9hrcqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpol # Vf1Ayq1kEOgx+RJUeRryDtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ # 239Q+J9iguymghZ8ZrzsmbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcN # Gw186/RayZXPhxIKXezFApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w # 3gI/h+5WoezrtUyFMYIZmjCCGZYCAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENB # IDIwMTACEzMAAArr02VEgxY+OO0AAAAACuswDQYJYIZIAWUDBAIBBQCgga4wGQYJ # KoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQB # gjcCARUwLwYJKoZIhvcNAQkEMSIEIP1nRydeaI+1iJEMHgjg/lvzEqkxTM+0Vgz1 # fU+wYXo6MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEa # gBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEALywn # CRgZ5Jbg9T+JXSXA/emxhO33D9HzChrgFT70wCgrW7tp1/URokTk75IG/8HGbtLX # iL3IXSOgyFttU/ir4H3aOcQeBjCqxkq6ssZdxADkj64m94v+te26Z+9T9k8IyiKf # t5AqbStTJwNPmNkJUhlsm5pl5IN/g/wrJRWAXz++Ljx1xx8fNNra6cECguorDdyQ # 5B6v+1hh2DQsxis+NcroiP9zsUgnq1TDIt7BZKF3sRQfiMn2NCvx1isCSIDCnJ4o # tPziMcJNVrXWBlNGDXdRJxIqiASkQ18u4R7PswEF2ObElDQc0qgx2fa7exbebIRh # EXe75cdB8DQWpA+ZgqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3 # DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0BCRAB # BKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCCi # mZCYuTux/SyAj/Wn6eH50nA2Xh+qWnS2SofY6yKtOgIGZjOqXqS9GBMyMDI0MDUw # OTAwNDEwMi4yNjVaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVy # YXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjE3OUUtNEJC # MC04MjQ2MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIR # eDCCBycwggUPoAMCAQICEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJKoZIhvcNAQEL # BQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkwNzE5 # WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBM # aW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRCQjAtODI0NjEl # MCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZI # hvcNAQEBBQADggIPADCCAgoCggIBAKyHnPOhxbvRATnGjb/6fuBhh3ZLzotAxAgd # LaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdKs+qIMUbvenlH+w53ssPa6rYP760ZuFrA # Brfserf0kFayNXVzwT7jarJOEjnFMBp+yi+uwQ2TnJuxczceG5FDHrII6sF6F879 # lP6ydY0BBZkZ9t39e/svNRieA5gUnv/YcM/bIMY/QYmd9F0B+ebFYi+PH4AkXahN # kFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/5/umBOKG4JoF # Y1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd9A9VsYMuZiCS # baFMk77LwVbklpnw4aHWJXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ2+WM/j50oblA # 0tCU53AauvUOZRoQBh89nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQMOmqLJz5l7MLq # GwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknKXonHGQacSCaLZot2kyJVRsFSxn0PlPvH # Vp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/obipX6uxjEpyUA9mbVPljlb3R4MWI0E2 # xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKCEI5wF1wxqr6T # 1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8SusoA1XXQ2TDS # mdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBU # oFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9z # b2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEB # BGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9w # cy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5j # cnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8B # Af8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAMATzg6R/A0ldO7MqGxD1VJji5yV # A1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64tD3+3NT1JkphWzaAWf2wKdAw35RxtQG1 # iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdfRcnJT3cLyawr # /kYjMWd63OP0Glq70ua4WUE/Po5pU7rQRbWEoQozY24hAqOcwuRcm6Cb0JBeTOCe # RBntEKgjKep4pRaQt7b9vusT97WeJcfaVosmmPtsZsawgnpIjbBa55tHfuk0vDkZ # tbIXjU4mr5dns9dnanBdBS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw8/eRJldtoukH # o16afE/AqP/smmGJh5ZR0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0SEbyrDZ/p2KO # uKAYNngljiOlllct0uJVz2agfczGjjsKi2AS1WaXvOhgZNmGw42SFB1qaloa8Kau # x9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyCqW/+rhPmp/n7 # Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJXxFs6lwc8D86qlUeGjUyo7hVy5VvyA+y # 0mGnEAuA85tsOcUPlzwWF5sv+B5fz35OW3X4Spk5SiNulnLFRPM5XCsSHqvcbC8R # 3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTAN # BgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 # b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9y # aXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3Nv # ZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCC # AgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDi # vbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5G # awcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUm # ZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjks # UZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvr # g0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31B # mkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PR # c6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRR # RuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSR # lJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflS # xIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHd # MIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSa # voKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYD # VR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1Ud # JQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud # DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjR # PZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0 # LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNy # bDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9z # b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0G # CSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHix # BpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjY # Ni6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe5 # 3Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BU # hUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QM # vOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1A # PMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsN # n6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFs # c/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue1 # 0CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6g # MTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm # 8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0 # aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRCQjAt # ODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEB # MAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCkfjB8MQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3Nv # ZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOnmEUIwIhgP # MjAyNDA1MDgyMjU3MDZaGA8yMDI0MDUwOTIyNTcwNlowdDA6BgorBgEEAYRZCgQB # MSwwKjAKAgUA6eYRQgIBADAHAgEAAgIVAjAHAgEAAgISMzAKAgUA6ediwgIBADA2 # BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIB # AAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBADTOJkh/TL5Fn8EcSEaNbWVVup28xUcX # KUtg59FqtVDIHp+1M2YFviGgScmzNUYMcvkeToGT5hVKnYa291jHwKa0O12IQ5bq # 4EU9jXjZOhFaQAb3iUU1Ro2q8JS95GXN6HjeZqgxOABr0EJig06dXLkjBeHxrTwU # DkRoPXnb96A2MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJYIZIAWUDBAIBBQCgggFKMBoG # CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgGLRwga9N # FUHIJlEnnU2Zz9jptKmzgwmoqOmBJ4PShSEwgfoGCyqGSIb3DQEJEAIvMYHqMIHn # MIHkMIG9BCDj7lK/8jnlbTjPvc77DCCSb4TZApY9nJm5whsK/2kKwTCBmDCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8HxMVH35dAAEA # AAHgMCIEIN8C5iBk11n3nDO0z5uZpRxjtTmUAnzh87/r5J0PfmweMA0GCSqGSIb3 # DQEBCwUABIICACbuUWi7ZZoUdnOSqyPQkyLKbmLiJY70PpdKZu3Mpfwkdp6ONnXL # w1aX4LdR75kGJy/mCft5IyZrOUYaYFjja0ENqMtd2gpPw295tZzX2wQi7Y+1AIp+ # TobcOtl66NBaqe0LFXcNj3Dh+eKFcpMAv8egqJ3yiCP+RGclvYrPd4/D0ayzI38t # F49ISKisnYOGaNcmwY/93Sx4m2kH7hMyO3faOOdl1KsK9Z7eWQ1TUJ99mtbNItAH # h3e7rQHZttYTterdxLmVzNqXsZ0tc1QZKIgCUYSWRThNS7GsETxaxk9innjT+w1E # N2JkUyu0PwgXZHGhmMwwz+0509f8YyUiZuElNfYyEp6v9t0g5OYHku5zT0eYFhwz # tXrPWCiUlus6pjY4gjpFqp5z/k/ufKEpq0S9nKrn2/A19oBAxr9ElGDOGbws4w5B # gZuvGvnEurIFFyaebLKHJBI5mueo6GAKMMa43vHxmj0eKsH9SN1DNMiJTaNULi79 # p/CaPFzeeuDF+kPBmc67SK9DAyIU3C3rbMiXZLz68YQ2sE/XcscSeMswpWpe37qc # URNZUyUjg0DVylw/yLQvB+mbGl1XD1NTQesG0rmq6xtI0EaoS7tUx9kw7rX7Ay30 # 4MEIRTZV1sfZ3zaML0Y+m8yQ3GCHm5LGmg7XsJ/ViYLl0wEa/T22k2vF # SIG # End signature block
combined_dataset/train/non-malicious/sample_13_71.ps1
sample_13_71.ps1
# *********************************************************************************************** # File: utils_ConfigMgr12-ps1 # Version 1.0 # Date: 02-17-2012 - Last edit 2022-06-01 # Author: Vinay Pamnani - vinpa@microsoft.com # Description: Utility Script to load common variables/functions. View utils_ConfigMgr07_ReadMe.txt for details. # 1. Defines commonly used functions in the Troubleshooter # 2. Defines global variables # 3. Detects Configuration Manager Client and Server Roles Installation Status # 4. Detects Install and Log Locations for Client, Server, Admin Console and WSUS # 5. Executes WSUSutil.exe checkhealth, if WSUS is installed. # *********************************************************************************************** trap [Exception] { WriteTo-ErrorDebugReport -ErrorRecord $_ continue } # Manifest Name - Used for Logging Set-Variable -Name ManifestName -Value "CM12" -Scope Global Set-Variable -Name ManifestLog -Value (Join-Path -Path ($PWD.Path) -ChildPath "..\_SDPExecution_log.txt") -Scope Global if (Test-Path $ManifestLog) { Remove-Item -Path $ManifestLog -Force } ########################## ## Function Definitions ## ########################## function TraceOut{ # To standardize Logging to StdOut.log param ( $WhatToWrite ) process { $SName = ([System.IO.Path]::GetFileName($MyInvocation.ScriptName)) $SName = $SName.Substring(0, $SName.LastIndexOf(".")) $SLine = $MyInvocation.ScriptLineNumber.ToString() $STime =Get-Date -Format G WriteTo-StdOut " $STime [$ManifestName][$ComputerName][$SName][$SLine] $WhatToWrite" "$STime [$ManifestName][$ComputerName][$SName][$SLine] $WhatToWrite" | Out-File -FilePath $ManifestLog -Append -ErrorAction SilentlyContinue } } function AddTo-CMClientSummary (){ # Adds the specified name/value to the appropriate CMClient PS Objects so that they can be dumped to File & Report in DC_FinishExecution. param ( $Name, $Value, [switch]$NoToSummaryFile, [switch]$NoToSummaryReport ) process { if(-not($NoToSummaryFile)) { Add-Member -InputObject $global:CMClientFileSummaryPSObject -MemberType NoteProperty -Name $Name -Value $Value } if (-not($NoToSummaryReport)) { Add-Member -InputObject $global:CMClientReportSummaryPSObject -MemberType NoteProperty -Name $Name -Value $Value } } } function AddTo-CMServerSummary (){ # Adds the specified name/value to the appropriate CMServer PS Objects so that they can be dumped to File & Report in DC_FinishExecution. param ( $Name, $Value, [switch]$NoToSummaryFile, [switch]$NoToSummaryReport ) process { if(-not($NoToSummaryFile)) { Add-Member -InputObject $global:CMServerFileSummaryPSObject -MemberType NoteProperty -Name $Name -Value $Value } if (-not($NoToSummaryReport)) { Add-Member -InputObject $global:CMServerReportSummaryPSObject -MemberType NoteProperty -Name $Name -Value $Value } } } function AddTo-CMDatabaseSummary (){ # Adds the specified name/value to the appropriate CMDatabase PS Objects so that they can be dumped to File & Report in DC_FinishExecution. param ( $Name, $Value, [switch]$NoToSummaryFile, [switch]$NoToSummaryReport, [switch]$NoToSummaryQueries ) process { if(-not($NoToSummaryFile)) { Add-Member -InputObject $global:CMDatabaseFileSummaryPSObject -MemberType NoteProperty -Name $Name -Value $Value } if (-not($NoToSummaryReport)) { Add-Member -InputObject $global:CMDatabaseReportSummaryPSObject -MemberType NoteProperty -Name $Name -Value $Value } if (-not($NoToSummaryQueries)) { Add-Member -InputObject $global:CMDatabaseQuerySummaryPSObject -MemberType NoteProperty -Name $Name -Value $Value } } } function Get-ADKVersion (){ process { TraceOut "Get-ADKVersion: Entering" $UninstallKey = "HKLM:\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall" $ADKKey = Get-ChildItem $UninstallKey -Recurse | ForEach-Object {Get-ItemProperty $_.PSPath} | Where-Object {$_.DisplayName -like '*Assessment and Deployment Kit*'} if ($ADKKey) { return $ADKKey.DisplayVersion } else { return "ADK Version Not Found." } TraceOut "Get-ADKVersion: Leaving" } } ######################################### ## SMS Provider and Database Functions ## ######################################### function Get-DBConnection (){ param ( $DatabaseServer, $DatabaseName ) process { TraceOut "Get-DBConnection: Entering" try { # Get NetBIOS name of the Database Server If ($DatabaseServer.Contains(".")) { $DatabaseServer = $DatabaseServer.Substring(0,$DatabaseServer.IndexOf(".")) } # Prepare a Connection String If ($DatabaseName.Contains("\")) { $InstanceName = $DatabaseName.Substring(0,$DatabaseName.IndexOf("\")) $DatabaseName = $DatabaseName.Substring($DatabaseName.IndexOf("\")+1) $strConnString = "Integrated Security=SSPI; Application Name=ConfigMgr Diagnostics; Server=$DatabaseServer\$InstanceName; Database=$DatabaseName" } Else { $strConnString = "Integrated Security=SSPI; Application Name=ConfigMgr Diagnostics; Server=$DatabaseServer; Database=$DatabaseName" } $SqlConnection = New-Object System.Data.SqlClient.SqlConnection $SqlConnection.ConnectionString = $strConnString TraceOut "SQL Connection String: $strConnString" $Error.Clear() $SqlConnection.Open() TraceOut "Get-DBConnection: Successful" # Reset Error Variable only when we're connecting to SCCM database and the connection is successful. # If SCCM database connection failed, TS_CheckSQLConfig will retry connection to MASTER, but we don't want to reset Error Variable in that case, if connection succeeds. if ($DatabaseName.ToUpper() -ne "MASTER") { $global:DatabaseConnectionError = $null } } catch [Exception] { $global:DatabaseConnectionError = $_ $SqlConnection = $null TraceOut "Get-DBConnection: Failed with Error: $global:DatabaseConnectionError" } TraceOut "Get-DBConnection: Leaving" return $SqlConnection } } ###################### ## Global Variables ## ###################### TraceOut "Script Started" TraceOut "Setting Global Variables..." # Get Current Time Set-Variable -Name CurrentTime -Scope Global $Temp = Get-CimInstance -Namespace root\cimv2 -Class Win32_OperatingSystem -ErrorAction SilentlyContinue If ($Temp -is [CimInstance]) { $CurrentTime = ($Temp.LocalDateTime).ToString() $Temp = Get-CimInstance -Namespace root\cimv2 -Class Win32_TimeZone -ErrorAction SilentlyContinue If ($Temp -is [CimInstance]) { $CurrentTime += " $($Temp.Description)" if ((Get-Date).IsDayLightSavingTime()) { $CurrentTime += " - Daylight Saving Time" } } } else { $CurrentTime = Get-Date -Format G } # Remote Execution Status Set-Variable RemoteStatus -Scope Global # Set Software\Microsoft Registry Key path Set-Variable Reg_MS -Value "HKLM\SOFTWARE\Microsoft" -Scope Global Set-Variable Reg_MS6432 -Value "HKLM\SOFTWARE\Wow6432Node\Microsoft" -Scope Global # Set SMS, CCM and WSUS Registry Key Path Set-Variable -Name Reg_CCM -Value ($REG_MS + "\CCM") -Scope Global Set-Variable -Name Reg_SMS -Value ($REG_MS + "\SMS") -Scope Global Set-Variable -Name Reg_WSUS -Value "HKLM\Software\Microsoft\Update Services" -Scope Global # Log Collection Variables and Flags Set-Variable -Name GetCCMLogs -Value $false -Scope Global Set-Variable -Name GetSMSLogs -Value $false -Scope Global # CCMLogPaths is defined as an array since CCM Log Path could be at various locations depending on Client/Role install status # We'll get all possible locations and parse through Get-Unique to a single value stored in CCMLogPath later since there will only be one CCM Log Location Set-Variable -Name CCMLogPaths -Value @() -Scope Global Set-Variable -Name CCMLogPath -Scope Global Set-Variable -Name CCMInstallDir -Scope Global Set-Variable -Name CCMSetupLogPath -Scope Global # Set Variables for Logs for CM12 Roles Set-Variable -Name Is_SiteSystem -Scope Global Set-Variable -Name SMSLogPath -Scope Global Set-Variable -Name AdminUILogPath -Scope Global Set-Variable -Name EnrollPointLogPath -Scope Global Set-Variable -Name EnrollProxyPointLogPath -Scope Global Set-Variable -Name AppCatalogLogPath -Scope Global Set-Variable -Name AppCatalogSvcLogPath -Scope Global Set-Variable -Name CRPLogPath -Scope Global Set-Variable -Name SMSSHVLogPath -Scope Global Set-Variable -Name DPLogPath -Scope Global Set-Variable -Name SMSProvLogPath -Scope Global Set-Variable -Name SQLBackupLogPathUNC -Scope Global # Site Server Globals Set-Variable -Name SMSInstallDir -Scope Global Set-Variable -Name SMSSiteCode -Scope Global Set-Variable -Name SiteType -Scope Global Set-Variable -Name SiteBuildNumber -Scope Global Set-Variable -Name ConfigMgrDBServer -Scope Global Set-Variable -Name ConfigMgrDBName -Scope Global Set-Variable -Name ConfigMgrDBNameNoInstance -Scope Global Set-Variable -Name SMSProviderServer -Scope Global Set-Variable -Name SMSProviderNamespace -Scope Global # Database Connection Globals Set-Variable -Name DatabaseConnection -Scope Global Set-Variable -Name DatabaseConnectionError -Scope Global ############################### ## Summary Files and Objects ## ############################### # Summary Objects Set-Variable -Name SummarySectionDescription -Scope Global -Value "ConfigMgr Data Collection Summary" Set-Variable -Name CMClientFileSummaryPSObject -Scope Global -Value (New-Object PSObject) Set-Variable -Name CMClientReportSummaryPSObject -Scope Global -Value (New-Object PSObject) Set-Variable -Name CMServerFileSummaryPSObject -Scope Global -Value (New-Object PSObject) Set-Variable -Name CMServerReportSummaryPSObject -Scope Global -Value (New-Object PSObject) Set-Variable -Name CMDatabaseFileSummaryPSObject -Scope Global -Value (New-Object PSObject) Set-Variable -Name CMDatabaseReportSummaryPSObject -Scope Global -Value (New-Object PSObject) Set-Variable -Name CMDatabaseQuerySummaryPSObject -Scope Global -Value (New-Object PSObject) Set-Variable -Name CMRolesStatusFilePSObject -Scope Global -Value (New-Object PSObject) Set-Variable -Name CMInstalledRolesStatusReportPSObject -Scope Global -Value (New-Object PSObject) ##################### ## Start Execution ## ##################### Import-LocalizedData -BindingVariable ScriptStrings Write-DiagProgress -Activity $ScriptStrings.ID_ACTIVITY_Utils -Status $ScriptStrings.ID_Utils_Init # Print Variable values TraceOut "Global Variable - OSArchitecture: $OSArchitecture" # $OSArchitecture is defined in utils_CTS.ps1 TraceOut "Global Variable - Reg_SMS: $Reg_SMS" TraceOut "Global Variable - Reg_CCM: $Reg_CCM" TraceOut "Global Variable - Reg_WSUS: $Reg_WSUS" # -------------------------------------------------------------------------------------------- # Get Remote Execution Status from Get-TSRemote. The following return values can be returned: # 0 - No TS_Remote environment # 1 - Under TS_Remote environment, but running on the local machine # 2 - Under TS_Remote environment and running on a remote machine # -------------------------------------------------------------------------------------------- $RemoteStatus = (Get-TSRemote) TraceOut "Global Remote Execution Status: $RemoteStatus" # ----------------------- # Set CCM Setup Log Path # ----------------------- $CCMSetupLogPath = Join-Path $Env:windir "ccmsetup" TraceOut "Global Variable - CCMSetupLogPath: $CCMSetupLogPath" # --------------------------------- # Set Site System Global Variables # --------------------------------- #$InstalledRolesStatus = New-Object PSObject # For Update-DiagReport #$RolesStatus = New-Object PSObject $RolesArray = @{ "Client" = "Configuration Manager Client"; "SiteServer" = "Configuration Manager Site Server"; "SMSProv" = "SMS Provider Server"; "AdminUI" = "Configuration Manager Admin Console"; "AWEBSVC" = "Application Catalog Web Service Point"; "PORTALWEB" = "Application Catalog Website Point"; "AIUS" = "Asset Intelligence Synchronization Point"; "AMTSP" = "Out of Band Service Point"; "CRP" = "Certificate Registration Point"; "DP" = "Distribution Point"; "DWSS" = "Data Warehouse Service Point"; "ENROLLSRV" = "Enrollment Point"; "ENROLLWEB" = "Enrollment Proxy Point"; "EP" = "Endpoint Protection Point"; "FSP" = "Fallback Status Point"; "IIS" = "IIS Web Server"; "MCS" = "Distribution Point - Multicast Enabled"; "MP" = "Management Point"; "PullDP" = "Distribution Point - Pull Distribution Point"; "PXE" = "Distribution Point - PXE Enabled"; "SMP" = "State Migration Point"; "SMS_CLOUD_PROXYCONNECTOR" = "CMG Connection Point"; "SMSSHV" = "System Health Validator Point"; "SRSRP" = "Reporting Services Point"; "WSUS" = "Software Update Point" } foreach ($Role in ($RolesArray.Keys | Sort-Object)) { Switch ($Role) { "Client" { $Installed = Check-RegValueExists ($Reg_SMS + "\Mobile Client") "ProductVersion" If ($Installed) { $GetCCMLogs = $true $CCMLogPaths += (Get-RegValue ($Reg_CCM + "\Logging\@Global") "LogDirectory") + "\" } } "SiteServer" { $Installed = Check-RegValueExists ($Reg_SMS + "\Setup") "Full Version" If ($Installed) { $GetSMSLogs = $true ; $Is_SiteSystem = $true } } "SMSProv" { $Installed = Check-RegKeyExists ($Reg_SMS + "\Providers") If ($Installed) { $SMSProvLogPath = (Get-RegValue ($Reg_SMS + "\Providers") "Logging Directory") } } "AdminUI" { $Installed = Check-RegKeyExists ($Reg_MS6432 + "\ConfigMgr10\AdminUI") If ($Installed) {$AdminUILogPath = (Get-RegValue ($Reg_MS6432 + "\ConfigMgr10\AdminUI") "AdminUILog")} } "AWEBSVC" { $Installed = Check-RegKeyExists ($Reg_SMS + "\" + $Role) If ($Installed) { $AppCatalogSvcLogPath = (Get-RegValue ($Reg_SMS + "\" + $Role + "\Logging") "AdminUILog") $Is_SiteSystem = $true } } "PORTALWEB" { $Installed = Check-RegKeyExists ($Reg_SMS + "\" + $Role) If ($Installed) { $AppCatalogLogPath = (Get-RegValue ($Reg_SMS + "\" + $Role + "\Logging") "AdminUILog") $Is_SiteSystem = $true } } "AIUS" { $Installed = Check-RegKeyExists ($Reg_SMS + "\" + $Role) If ($Installed) { $GetSMSLogs = $true ; $Is_SiteSystem = $true } } "AMTSP" { $Installed = Check-RegKeyExists ($Reg_SMS + "\" + $Role) If ($Installed) { $GetSMSLogs = $true ; $Is_SiteSystem = $true } } "CRP" { $Installed = Check-RegKeyExists ($Reg_SMS + "\" + $Role) If ($Installed) { $CRPLogPath = (Get-RegValue ($Reg_SMS + "\" + $Role + "\Logging") "AdminUILog") $Is_SiteSystem = $true } } "DP" { $Installed = Check-RegValueExists ($Reg_SMS + "\" + $Role) "NALPath" If ($Installed) { $GetSMSLogs = $true ; $Is_SiteSystem = $true } } "ENROLLSRV" { $Installed = Check-RegKeyExists ($Reg_SMS + "\" + $Role) If ($Installed) { $EnrollPointLogPath = (Get-RegValue ($Reg_SMS + "\" + $Role + "\Logging") "AdminUILog") $Is_SiteSystem = $true } } "ENROLLWEB" { $Installed = Check-RegKeyExists ($Reg_SMS + "\" + $Role) If ($Installed) { $EnrollProxyPointLogPath = (Get-RegValue ($Reg_SMS + "\" + $Role + "\Logging") "AdminUILog") $Is_SiteSystem = $true } } "EP" { $Installed = Check-RegKeyExists ($Reg_SMS + "\Operations Management\Components\SMS_ENDPOINT_PROTECTION_CONTROL_MANAGER") } "FSP" { $Installed = Check-RegKeyExists ($Reg_SMS + "\" + $Role) If ($Installed) { $GetCCMLogs = $true ; $GetSMSLogs = $true $CCMLogPaths += Get-RegValue ($Reg_SMS + "\" + $Role +"\Logging\@Global") "LogDirectory" $Is_SiteSystem = $true } } "MCS" { $Installed = Check-RegKeyExists ($Reg_SMS + "\" + $Role) If ($Installed) { $GetCCMLogs = $true ; $GetSMSLogs = $true ; $CCMLogPaths += Get-RegValue ($Reg_SMS + "\" + $Role +"\Logging\@Global") "LogDirectory" $Is_SiteSystem = $true } } "MP" { $Installed = Check-RegValueExists ($Reg_SMS + "\" + $Role) "MP Hostname" If ($Installed) { $GetCCMLogs = $true ; $GetSMSLogs = $true ; $Is_SiteSystem = $true $CCMLogPaths += (Get-RegValue ($Reg_CCM + "\Logging\@Global") "LogDirectory") + "\" } } "PullDP" { $Temp = Get-RegValue ($Reg_SMS + "\DP") "IsPullDP" If ($Temp) { $Installed = $true } Else { $Installed = $false } If ($Installed) { $GetCCMLogs = $true $Is_SiteSystem = $true $CCMLogPaths += (Get-RegValue ($Reg_CCM + "\Logging\@Global") "LogDirectory") + "\" } } "PXE" { $Temp = Get-RegValue ($Reg_SMS + "\DP") "IsPXE" If ($Temp) { $Installed = $true } Else { $Installed = $false } If ($Installed) { $GetCCMLogs = $true ; $GetSMSLogs = $true ; $Is_SiteSystem = $true $CCMLogPaths += Get-RegValue ($Reg_SMS + "\" + $Role +"\Logging\@Global") "LogDirectory" } } "SMP" { $Installed = Check-RegKeyExists ($Reg_SMS + "\" + $Role) If ($Installed) { $GetCCMLogs = $true ; $GetSMSLogs = $true ; $CCMLogPaths += Get-RegValue ($Reg_SMS + "\" + $Role +"\Logging\@Global") "LogDirectory" $Is_SiteSystem = $true } } "SMSSHV" { $Installed = Check-RegKeyExists ($Reg_MS + "\" + $Role) If ($Installed) { $GetSMSLogs = $true $SMSSHVLogPath = (Get-RegValue ($Reg_MS + "\" + $Role + "\Logging\@Global") "LogDirectory") $Is_SiteSystem = $true } } "SRSRP" { $Installed = Check-RegKeyExists ($Reg_SMS + "\" + $Role) If ($Installed) { $GetSMSLogs = $true ; $Is_SiteSystem = $true } } "WSUS" { $Installed = Check-RegKeyExists ($Reg_SMS + "\" + $Role) If ($Installed) { $GetSMSLogs = $true ; $Is_SiteSystem = $true } } Default { $Installed = Check-RegKeyExists ($Reg_SMS + "\" + $Role) } } # Set a Variable for each Role and it's Install Status Set-Variable -Name ("Is_" + $Role) -Value $Installed -Scope Global Add-Member -InputObject $global:CMRolesStatusFilePSObject -MemberType NoteProperty -Name ($RolesArray.Get_Item($Role)) -Value (Get-Variable ("Is_" + $Role) -ValueOnly) TraceOut ("Global Role Variable - Is_" + $Role + ": " + (Get-Variable ("Is_" + $Role) -ValueOnly)) if ($Installed) { Add-Member -InputObject $global:CMInstalledRolesStatusReportPSObject -MemberType NoteProperty -Name ($RolesArray.Item($Role)) -Value (Get-Variable ("Is_" + $Role) -ValueOnly) } } # Mark IIS installed, if WSUS is installed on CAS, since SMS\IIS registry is not set on CAS if ($Is_WSUS) { $Is_IIS = $true } # ----------------------------------------------------------------------------------------------------------------------------- # Parse CCMLogPaths, and get a unique path # To handle collection of CCM Logs even if Client is not installed, but a Role is installed which stores logs in CCM directory # ----------------------------------------------------------------------------------------------------------------------------- $CCMLogPath = $CCMLogPaths | Sort-Object | Get-Unique # Error Handling if Get-RegValue failed to obtain a valid CCMLogPath and returned null instead If (($CCMLogPath -eq "\") -or ($null -eq $CCMLogPath)) { $CCMLogPath = $null If ($GetCCMLogs) { TraceOut "ERROR: CCM Logs need to be collected but CCM Directory not found." } Else { TraceOut "WARNING: GetCCMLogs is set to False. CCM Log Path Not Required." } } Else { $CCMInstallDir = $CCMLogPath.Substring(0, $CCMLogPath.LastIndexOf("\Logs")) TraceOut "Global Variable - CCMInstallDir: $CCMInstallDir" TraceOut "Global Variable - CCMLogPath: $CCMLogPath" } If ($Is_Client) { Set-Variable -Name Is_Lantern -Scope Global -Value $true Set-Variable -Name LanternLogPath -Scope Global $LanternLogPath = Join-Path (Get-RegValue ($Reg_MS + "\PolicyPlatform\Client\Trace") "LogDir") (Get-RegValue ($Reg_MS + "\PolicyPlatform\Client\Trace") "LogFile") TraceOut "Global Variable - LanternLogPath: $LanternLogPath" } # ----------------------------- # Get SMSLogPath from Registry # ----------------------------- If ($GetSMSLogs) { $SMSInstallDir = (Get-RegValue ($Reg_SMS + "\Identification") "Installation Directory") If ($null -ne $SMSInstallDir) { $SMSLogPath = $SMSInstallDir + "\Logs" TraceOut "Global Variable - SMSInstallDir: $SMSInstallDir" TraceOut "Global Variable - SMSLogPath: $SMSLogPath" } Else { $SMSLogPath = $null TraceOut "ERROR: SMS Logs need to be collected but SMS Install Directory not Found" } } # ------------------------------- # Get Site Server Info From Registry # ------------------------------- If ($Is_SiteServer) { # Database Server and name $ConfigMgrDBServer = Get-RegValue ($Reg_SMS + "\SQL Server\Site System SQL Account") "Server" # Stored as FQDN $ConfigMgrDBName = Get-RegValue ($Reg_SMS + "\SQL Server\Site System SQL Account") "Database Name" # Stored as INSTANCE\DBNAME or just DBNAME if on Default instance # Get the database name without the Instance Name If ($ConfigMgrDBName.Contains("\")) { $ConfigMgrDBNameNoInstance = $ConfigMgrDBName.Substring($ConfigMgrDBName.IndexOf("\")+1) } Else { $ConfigMgrDBNameNoInstance = $ConfigMgrDBName } # Get Database connection. # If connection fails, DatabaseConnectionError will have the error. If connection is successful, DatabaseConnectionError will be $null. # Connection is closed in FinishExecution $global:DatabaseConnection = Get-DBConnection -DatabaseServer $ConfigMgrDBServer -DatabaseName $ConfigMgrDBName # Site Type $global:SiteType = Get-RegValue ($Reg_SMS + "\Setup") "Type" $global:SiteBuildNumber = Get-RegValue ($Reg_SMS + "\Setup") "Version" # Site Code and Provider Namespace $global:SMSProviderServer = Get-RegValue ($Reg_SMS + "\Setup") "Provider Location" $global:SMSSiteCode = Get-RegValue ($Reg_SMS + "\Identification") "Site Code" If (($null -ne $global:SMSSiteCode) -and ($null -ne $global:SMSProviderServer)) { $global:SMSProviderNamespace = "root\sms\site_$SMSSiteCode" } # Site Server FQDN $SiteServerFQDN = [System.Net.Dns]::GetHostByName(($ComputerName)).HostName # SQLBackup Log Location (SqlBkup.log) $RegKey = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey("LocalMachine", $ConfigMgrDBServer) $Key = $RegKey.OpenSubKey("SOFTWARE\Microsoft\SMS\Tracing\SMS_SITE_SQL_BACKUP_$SiteServerFQDN") if ($Key -ne $null) { $SQLBackupLogPath = $Key.GetValue("TraceFileName") $SQLBackupLogPathUNC = $SQLBackupLogPath -replace ":","$" $SQLBackupLogPathUNC = "\\$ConfigMgrDBServer\$SQLBackupLogPathUNC" $SQLBackupLogPathUNC = Split-Path $SQLBackupLogPathUNC } TraceOut "Global Variable - SiteType: $SiteType" TraceOut "Global Variable - SQLBackupLogPathUNC: $SQLBackupLogPathUNC" TraceOut "Global Variable - ConfigMgrDBServer: $ConfigMgrDBServer" TraceOut "Global Variable - ConfigMgrDBName: $ConfigMgrDBName" } # -------------------------------------------------------------------------------------------------------------------------- # Set WSUS Install Directory, if WSUS is installed. # Execute WSUSutil checkhealth. Running it now would ensure that it's finished by the time we collect Event Logs # Fails to run remotely, because it runs under Anonymous. Using psexec to execute, to ensure that it runs remotely as well. # -------------------------------------------------------------------------------------------------------------------------- If ($Is_WSUS) { $WSUSInstallDir = Get-RegValue ($Reg_WSUS + "\Server\Setup") "TargetDir" If ($null -ne $WSUSInstallDir) { TraceOut "Global Variable - WSUSInstallDir: $WSUSInstallDir" TraceOut "Running WSUSutil.exe checkhealth..." $CmdToRun = "psexec.exe /accepteula -s `"" + $WSUSInstallDir + "Tools\WSUSutil.exe`" checkhealth" RunCmd -commandToRun $CmdToRun -collectFiles $false } Else { TraceOut "ERROR: WSUS Role detected but WSUS Install Directory not found" } } # ----------------------------------------------------------------------- # Get DP Logs Directory, if DP is installed and remote from Site Server. # ----------------------------------------------------------------------- If ($Is_DP) { If ($Is_SiteServer -eq $false) { $DPLogPath = (Get-CimInstance Win32_Share -filter "Name LIKE 'SMS_DP$'").path + "\sms\Logs" TraceOut "Global Variable - DPLogPath = $DPLogPath" } } # ---------------------- # Remove Temp Variables # ---------------------- Remove-Variable -Name Role Remove-Variable -Name Installed TraceOut "Completed" # SIG # Begin signature block # MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC0q14USZymFauO # Cz7bFCzBT6EhOcFr1gRHKV29itfWgqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEs6 # Q9KAQxU8qUSw+EvxNKTqTEkKjGQMeIOioS64LGRKMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEARMKarFVWEVypwYkz65lJn5ddEubQEumi+61b # Mg7dp92Ep6EseGHVwtoG4wgzLzHGGLOW/l0zI1C6lH+vZrUQeuka9vM9G1bixwtC # C6FLrDi/yC1TiV7STXU3i5U6zN88tGUDDjggLTh/A2En4VBFMI2Al8fgbFAqcnK0 # yi2gMXaFjzL+UUQMx3p7m+laDmdAqFwgA4xa80/wape7rSjLxFHcDZtmwdBM8GGr # NIahnSBsTvhB0jPCxLs0oZIlPjivX+DRC3sWqmnkTuvNX8u+4kQlq+l4g2TyJ8CA # q6ZYJ/UqnsmdfmgE6NJh2+gvpKvrs/0Y/Pf0rx+IzFcV6QD/7qGCF7AwghesBgor # BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBqRb3ft5phxHS/7Bh3C45KQCZPUA8HdI8c # Dyag+bxxNwIGZut+oGFXGBMyMDI0MTAyODExNDA0MC4yNjZaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/Big # r8xpWoc6AAEAAAH8MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExNFoXDTI1MTAyMjE4MzExNFowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjZGMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # p1DAKLxpbQcPVYPHlJHyW7W5lBZjJWWDjMfl5WyhuAylP/LDm2hb4ymUmSymV0EF # RQcmM8BypwjhWP8F7x4iO88d+9GZ9MQmNh3jSDohhXXgf8rONEAyfCPVmJzM7yts # urZ9xocbuEL7+P7EkIwoOuMFlTF2G/zuqx1E+wANslpPqPpb8PC56BQxgJCI1LOF # 5lk3AePJ78OL3aw/NdlkvdVl3VgBSPX4Nawt3UgUofuPn/cp9vwKKBwuIWQEFZ83 # 7GXXITshd2Mfs6oYfxXEtmj2SBGEhxVs7xERuWGb0cK6afy7naKkbZI2v1UqsxuZ # t94rn/ey2ynvunlx0R6/b6nNkC1rOTAfWlpsAj/QlzyM6uYTSxYZC2YWzLbbRl0l # RtSz+4TdpUU/oAZSB+Y+s12Rqmgzi7RVxNcI2lm//sCEm6A63nCJCgYtM+LLe9pT # shl/Wf8OOuPQRiA+stTsg89BOG9tblaz2kfeOkYf5hdH8phAbuOuDQfr6s5Ya6W+ # vZz6E0Zsenzi0OtMf5RCa2hADYVgUxD+grC8EptfWeVAWgYCaQFheNN/ZGNQMkk7 # 8V63yoPBffJEAu+B5xlTPYoijUdo9NXovJmoGXj6R8Tgso+QPaAGHKxCbHa1QL9A # SMF3Os1jrogCHGiykfp1dKGnmA5wJT6Nx7BedlSDsAkCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBSY8aUrsUazhxByH79dhiQCL/7QdjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAT7ss/ZAZ0bTaFsrsiJYd//LQ6ImKb9JZSKiRw9xs8hwk5Y/7zign9gGt # weRChC2lJ8GVRHgrFkBxACjuuPprSz/UYX7n522JKcudnWuIeE1p30BZrqPTOnsc # D98DZi6WNTAymnaS7it5qAgNInreAJbTU2cAosJoeXAHr50YgSGlmJM+cN6mYLAL # 6TTFMtFYJrpK9TM5Ryh5eZmm6UTJnGg0jt1pF/2u8PSdz3dDy7DF7KDJad2qHxZO # RvM3k9V8Yn3JI5YLPuLso2J5s3fpXyCVgR/hq86g5zjd9bRRyyiC8iLIm/N95q6H # WVsCeySetrqfsDyYWStwL96hy7DIyLL5ih8YFMd0AdmvTRoylmADuKwE2TQCTvPn # jnLk7ypJW29t17Yya4V+Jlz54sBnPU7kIeYZsvUT+YKgykP1QB+p+uUdRH6e79Va # iz+iewWrIJZ4tXkDMmL21nh0j+58E1ecAYDvT6B4yFIeonxA/6Gl9Xs7JLciPCIC # 6hGdliiEBpyYeUF0ohZFn7NKQu80IZ0jd511WA2bq6x9aUq/zFyf8Egw+dunUj1K # tNoWpq7VuJqapckYsmvmmYHZXCjK1Eus7V1I+aXjrBYuqyM9QpeFZU4U01YG15uW # wUCaj0uZlah/RGSYMd84y9DCqOpfeKE6PLMk7hLnhvcOQrnxP6kwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUATkEpJXOaqI2w # fqBsw4NLVwqYqqqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJZP4wIhgPMjAyNDEwMjgwMTE4NTRaGA8yMDI0 # MTAyOTAxMTg1NFowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6slk/gIBADAKAgEA # AgIj+QIB/zAHAgEAAgIVOjAKAgUA6sq2fgIBADA2BgorBgEEAYRZCgQCMSgwJjAM # BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB # CwUAA4IBAQAqtLGFlstrsb+SvUvbr1hLCetkINEwDxfniiboUQVt4GeQLoY14M6l # eM9y61oAgIF33fHJalc0m6hRYHUUukHmnf8OOSaTiiX/nslEh3oTsZMRPqzR1k5L # fvMp3a2pIDntcYlMbl2oyGD7wib38kMuMk5xFDVhvCk9VkAOFUb8IsBonqOwm32M # Cwxu4PiML3KP595ks9mt6PxX1auBQ1gIcLfYEno+8vVKQpYBwZyizAA8LlxCwE+a # tWpPKH7AHBCaUnoWAwdkm5NtHKLBGrmDUjlyWtaRXvWXYJdFC3R4GSvWAAdmbfao # 2+coyd9IdOXkz3f7u7vYB3P4HYG5NEz1MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH8GKCvzGlahzoAAQAAAfwwDQYJYIZI # AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG # 9w0BCQQxIgQgfZREQ17uhpFyt8YeiNdC2OsClmLWzSSqV91Jr7uqyEMwgfoGCyqG # SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCVQq+Qu+/h/BOVP4wweUwbHuCUhh+T7hq3 # d5MCaNEtYjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz # AAAB/Bigr8xpWoc6AAEAAAH8MCIEINOFZp4mWvilNmu2oP8JaiDsbYhML+c3SwBU # R/vJ4UAWMA0GCSqGSIb3DQEBCwUABIICAFd3h6YXlMcoMFL1cGSk6Y1a5dihKtMy # YEcIrH6pX0MM9c84ICNltQ0JJPcUuGpb5Ab+OvTLfd7vZgJSJSJN8+QzGjS4y/yE # Wj1xVnHrLdg4zb8eVSm2sJRvetPFSlvEr+VPUMm/3Neq23IFtfTrkTVeWPKZzaT5 # ZhTZi55uPwA99dRQLMIjXbhBFE2hs46kiK+gRiKxKvAi0RjjEQDsqekD+DAIcykH # +suxJa87sNeUXMz07RSjQPKfKJYEic7M1mbj7KTXSJu+tbsurDbrxrAE0nknKob8 # /ZYy9+M5csCmzLTiFA6vxe43IEWJDoOZd85FdltbMrvJhJsD0gYn7DSnWfTSJODs # 7iBltyOyzwn69klILkY8XQAG6DK2lU5XMXOgPfo8qw+y9ifCR463mAdEJF/EaJn9 # 7TbyrhMxh0IEdbxGwEf0dVFjAsIVU5CeVZHvDEjZ3lygctuTfdwB7lqye8GG0N2F # OVoGITgSwRP7qkM/mUb0B6vw2kPBN6m1voE1wsHCqSVfWa93zMLqdVusOPuXXfjP # WERXtScAHtelWV2dZDgGz33JzSkit4uk3+fN4oGT2cUnNAo67EInRIipSeRz+bhM # 06hC9K5GL6nHBZce8AhB7xQaeokT/CFKhnn7OdZdzyWk2HOy3ZWGvgemJkYkEElw # jEC8FIL3pq8b # SIG # End signature block
combined_dataset/train/non-malicious/3882.ps1
3882.ps1
function Test-WorkspaceCreateUpdateDelete { $wsname = Get-ResourceName $rgname = Get-ResourceGroupName $wslocation = Get-ProviderLocation New-AzResourceGroup -Name $rgname -Location $wslocation -Force $workspace = New-AzOperationalInsightsWorkspace -ResourceGroupName $rgname -Name $wsname -Location $wslocation -Sku "STANDARD" -Tag @{"tag1" = "val1"} -Force Assert-AreEqual $rgname $workspace.ResourceGroupName Assert-AreEqual $wsname $workspace.Name Assert-AreEqual $wslocation $workspace.Location Assert-AreEqual "STANDARD" $workspace.Sku Assert-AreEqual 30 $workspace.RetentionInDays Assert-NotNull $workspace.ResourceId Assert-AreEqual 1 $workspace.Tags.Count Assert-NotNull $workspace.CustomerId Assert-NotNull $workspace.PortalUrl $workspace = Get-AzOperationalInsightsWorkspace -ResourceGroupName $rgname -Name $wsname Assert-AreEqual $rgname $workspace.ResourceGroupName Assert-AreEqual $wsname $workspace.Name Assert-AreEqual $wslocation $workspace.Location Assert-AreEqual "STANDARD" $workspace.Sku Assert-AreEqual 30 $workspace.RetentionInDays Assert-NotNull $workspace.ResourceId Assert-AreEqual 1 $workspace.Tags.Count Assert-NotNull $workspace.CustomerId Assert-NotNull $workspace.PortalUrl $wstwoname = Get-ResourceName $workspacetwo = New-AzOperationalInsightsWorkspace -ResourceGroupName $rgname -Name $wstwoname -Location $wslocation -Sku "PerNode" -RetentionInDays 60 -Force $workspacetwo = Get-AzOperationalInsightsWorkspace -ResourceGroupName $rgname -Name $wstwoname Assert-AreEqual 60 $workspacetwo.RetentionInDays $workspaces = Get-AzOperationalInsightsWorkspace Assert-AreEqual 1 ($workspaces | Where {$_.Name -eq $wsname}).Count Assert-AreEqual 1 ($workspaces | Where {$_.Name -eq $wstwoname}).Count $workspaces = Get-AzOperationalInsightsWorkspace -ResourceGroupName $rgname Assert-AreEqual 1 ($workspaces | Where {$_.Name -eq $wsname}).Count Assert-AreEqual 1 ($workspaces | Where {$_.Name -eq $wstwoname}).Count Remove-AzOperationalInsightsWorkspace -ResourceGroupName $rgName -Name $wstwoname -Force Assert-ThrowsContains { Get-AzOperationalInsightsWorkspace -ResourceGroupName $rgname -Name $wstwoname } "NotFound" $workspaces = Get-AzOperationalInsightsWorkspace Assert-AreEqual 1 ($workspaces | Where {$_.Name -eq $wsname}).Count Assert-AreEqual 0 ($workspaces | Where {$_.Name -eq $wstwoname}).Count $workspace = Set-AzOperationalInsightsWorkspace -ResourceGroupName $rgname -Name $wsname -Tag @{"foo" = "bar"; "foo2" = "bar2"} Assert-AreEqual 2 $workspace.Tags.Count $workspace = $workspace | New-AzOperationalInsightsWorkspace -Tag @{"foo" = "bar"} -Force Assert-AreEqual 1 $workspace.Tags.Count $workspace | Set-AzOperationalInsightsWorkspace -Tag @{} -Sku standalone -RetentionInDays 123 $workspace = Get-AzOperationalInsightsWorkspace -ResourceGroupName $rgname -Name $wsname Assert-AreEqual 0 $workspace.Tags.Count Assert-AreEqual standalone $workspace.Sku Assert-AreEqual 123 $workspace.RetentionInDays $workspace | Remove-AzOperationalInsightsWorkspace -Force $workspaces = Get-AzOperationalInsightsWorkspace -ResourceGroupName $rgname Assert-AreEqual 0 $workspaces.Count Assert-ThrowsContains { Get-AzOperationalInsightsWorkspace -ResourceGroupName $rgname -Name wsname } "NotFound" } function Test-WorkspaceActions { $wsname = Get-ResourceName $rgname = Get-ResourceGroupName $wslocation = Get-ProviderLocation New-AzResourceGroup -Name $rgname -Location $wslocation -Force $accounts = Get-AzOperationalInsightsLinkTargets Assert-AreEqual 0 $accounts.Count Assert-ThrowsContains { New-AzOperationalInsightsWorkspace -ResourceGroupName $rgname -Name $wsname -Location $wslocation -Sku "STANDARD" -CustomerId ([guid]::NewGuid()) } "BadRequest" $workspace = New-AzOperationalInsightsWorkspace -ResourceGroupName $rgname -Name $wsname -Location $wslocation -Sku "STANDARD" -Tag @{"tag1" = "val1"} -Force $keys = Get-AzOperationalInsightsWorkspaceSharedKeys -ResourceGroupName $rgname -Name $wsname Assert-NotNull $keys.PrimarySharedKey Assert-NotNull $keys.SecondarySharedKey $keys = $workspace | Get-AzOperationalInsightsWorkspaceSharedKeys Assert-NotNull $keys.PrimarySharedKey Assert-NotNull $keys.SecondarySharedKey $mgs = Get-AzOperationalInsightsWorkspaceManagementGroups -ResourceGroupName $rgname -Name $wsname Assert-AreEqual 0 $mgs.Count $mgs = $workspace | Get-AzOperationalInsightsWorkspaceManagementGroups Assert-AreEqual 0 $mgs.Count $usages = Get-AzOperationalInsightsWorkspaceUsage -ResourceGroupName $rgname -Name $wsname Assert-AreEqual 1 $usages.Count Assert-AreEqual "DataAnalyzed" $usages[0].Id Assert-NotNull $usages[0].Name Assert-NotNull $usages[0].NextResetTime Assert-AreEqual "Bytes" $usages[0].Unit Assert-AreEqual ([Timespan]::FromDays(1)) $usages[0].QuotaPeriod $usages = $workspace | Get-AzOperationalInsightsWorkspaceUsage Assert-AreEqual 1 $usages.Count Assert-AreEqual "DataAnalyzed" $usages[0].Id Assert-NotNull $usages[0].Name Assert-NotNull $usages[0].NextResetTime Assert-AreEqual "Bytes" $usages[0].Unit Assert-AreEqual ([Timespan]::FromDays(1)) $usages[0].QuotaPeriod } function Test-WorkspaceEnableDisableListIntelligencePacks { $wsname = Get-ResourceName $rgname = Get-ResourceGroupName $wslocation = Get-ProviderLocation New-AzResourceGroup -Name $rgname -Location $wslocation -Force $workspace = New-AzOperationalInsightsWorkspace -ResourceGroupName $rgname -Name $wsname -Location $wslocation -Sku "STANDARD" -Tag @{"tag1" = "val1"} -Force Assert-AreEqual $rgname $workspace.ResourceGroupName Assert-AreEqual $wsname $workspace.Name Assert-AreEqual $wslocation $workspace.Location Assert-AreEqual "STANDARD" $workspace.Sku Assert-NotNull $workspace.ResourceId Assert-AreEqual 1 $workspace.Tags.Count Assert-NotNull $workspace.CustomerId Assert-NotNull $workspace.PortalUrl Set-AzOperationalInsightsIntelligencePack -ResourceGroupName $rgname -WorkspaceName $wsname -IntelligencePackName "ChangeTracking" -Enabled $true Set-AzOperationalInsightsIntelligencePack -ResourceGroupName $rgname -WorkspaceName $wsname -IntelligencePackName "SiteRecovery" -Enabled $true $ipList = Get-AzOperationalInsightsIntelligencePacks -ResourceGroupName $rgname -WorkspaceName $wsname Foreach ($ip in $ipList) { if (($ip.Name -eq "ChangeTracking") -or ($ip.Name -eq "SiteRecovery") -or ($ip.Name -eq "LogManagement")) { Assert-AreEqual $ip.Enabled $true } else { Assert-AreEqual $ip.Enabled $false } } Set-AzOperationalInsightsIntelligencePack -ResourceGroupName $rgname -WorkspaceName $wsname -IntelligencePackName "ChangeTracking" -Enabled $false Set-AzOperationalInsightsIntelligencePack -ResourceGroupName $rgname -WorkspaceName $wsname -IntelligencePackName "SiteRecovery" -Enabled $false $ipList = Get-AzOperationalInsightsIntelligencePacks -ResourceGroupName $rgname -WorkspaceName $wsname Foreach ($ip in $ipList) { if ($ip.Name -eq "LogManagement") { Assert-AreEqual $ip.Enabled $true } else { Assert-AreEqual $ip.Enabled $false } } $workspace | Remove-AzOperationalInsightsWorkspace -Force $workspaces = Get-AzOperationalInsightsWorkspace -ResourceGroupName $rgname Assert-AreEqual 0 $workspaces.Count Assert-ThrowsContains { Get-AzOperationalInsightsWorkspace -ResourceGroupName $rgname -Name wsname } "NotFound" }
combined_dataset/train/non-malicious/Get-Parameter 2.6.ps1
Get-Parameter 2.6.ps1
#Requires -version 2.0 #.Synopsis # Enumerates the parameters of one or more commands #.Notes # With many thanks to Hal Rottenberg, Oisin Grehan and Shay Levy # Version 0.80 - April 2008 - By Hal Rottenberg http://poshcode.org/186 # Version 0.81 - May 2008 - By Hal Rottenberg http://poshcode.org/255 # Version 0.90 - June 2008 - By Hal Rottenberg http://poshcode.org/445 # Version 0.91 - June 2008 - By Oisin Grehan http://poshcode.org/446 # Version 0.92 - April 2008 - By Hal Rottenberg http://poshcode.org/549 # - ADDED resolving aliases and avoided empty output # Version 0.93 - Sept 24, 2009 - By Hal Rottenberg http://poshcode.org/1344 # Version 1.0 - Jan 19, 2010 - By Joel Bennett http://poshcode.org/1592 # - Merged Oisin and Hal's code with my own implementation # - ADDED calculation of dynamic paramters # Version 2.0 - July 22, 2010 - By Joel Bennett http://poshcode.org/get/2005 # - CHANGED uses FormatData so the output is objects # - ADDED calculation of shortest names to the aliases (idea from Shay Levy http://poshcode.org/1982, # but with a correct implementation) # Version 2.1 - July 22, 2010 - By Joel Bennett http://poshcode.org/2007 # - FIXED Help for SCRIPT file (script help must be separated from #Requires by an emtpy line) # - Fleshed out and added dates to this version history after Bergle's criticism ;) # Version 2.2 - July 29, 2010 - By Joel Bennett http://poshcode.org/2030 # - FIXED a major bug which caused Get-Parameters to delete all the parameters from the CommandInfo # Version 2.3 - July 29, 2010 - By Joel Bennett # - ADDED a ToString ScriptMethod which allows queries like: # $parameters = Get-Parameter Get-Process; $parameters -match "Name" # Version 2.4 - July 29, 2010 - By Joel Bennett http://poshcode.org/2032 # - CHANGED "Name" to CommandName # - ADDED ParameterName parameter to allow filtering parameters # - FIXED bug in 2.3 and 2.2 with dynamic parameters # Version 2.5 - December 13, 2010 - By Jason Archer http://poshcode.org/2404 # - CHANGED format temp file to have static name, prevents bloat of random temporary files # Version 2.6 - July 23, 2011 - By Jason Archer (This Version) # - FIXED miscalculation of shortest unique name (aliases count as unique names), # this caused some parameter names to be thrown out (like "Object") # - CHANGED code style cleanup # #.Description # Lists all the parameters of a command, by ParameterSet, including their aliases, type, etc. # # By default, formats the output to tables grouped by command and parameter set #.Example # Get-Command Select-Xml | Get-Parameter #.Example # Get-Parameter Select-Xml #.Parameter CommandName # The name of the command to get parameters for #.Parameter ParameterName # Wilcard-enabled filter for parameter names #.Parameter ModuleName # The name of the module which contains the command (this is for scoping) #.Parameter Force # Forces including the CommonParameters in the output [CmdletBinding()] param ( [Parameter(Position=1,ValueFromPipelineByPropertyName=$true,Mandatory=$true)] [Alias("Name")] [string[]]$CommandName , [Parameter(Position=2,ValueFromPipelineByPropertyName=$true,Mandatory=$false)] [string[]]$ParameterName="*" , [Parameter(ValueFromPipelineByPropertyName=$true,Mandatory=$false)] $ModuleName , [switch]$Force ) Function global:Get-Parameter { #.Synopsis # Enumerates the parameters of one or more commands #.Description # Lists all the parameters of a command, by ParameterSet, including their aliases, type, etc. # # By default, formats the output to tables grouped by command and parameter set #.Example # Get-Command Select-Xml | Get-Parameter #.Example # Get-Parameter Select-Xml #.Parameter CommandName # The name of the command to get parameters for #.Parameter ParameterName # Wilcard-enabled filter for parameter names #.Parameter ModuleName # The name of the module which contains the command (this is for scoping) #.Parameter Force # Forces including the CommonParameters in the output [CmdletBinding()] param( [Parameter(Position = 1, Mandatory = $true, ValueFromPipelineByPropertyName = $true)] [string[]]$CommandName , [Parameter(Position = 2, ValueFromPipelineByPropertyName=$true)] [string[]]$ParameterName = "*" , [Parameter(ValueFromPipelineByPropertyName = $true)] $ModuleName , [switch]$Force ) begin { $PropertySet = @( "Name", @{n="Position";e={if($_.Position -lt 0){"Named"}else{$_.Position}}}, "Aliases", @{n="Short";e={$_.Name}}, @{n="Type";e={$_.ParameterType.Name}}, @{n="ParameterSet";e={$paramset}}, @{n="Command";e={$command}}, @{n="Mandatory";e={$_.IsMandatory}}, @{n="Provider";e={$_.DynamicProvider}}, @{n="ValueFromPipeline";e={$_.ValueFromPipeline}}, @{n="ValueFromPipelineByPropertyName";e={$_.ValueFromPipelineByPropertyName}} ) function Join-Object { Param( [Parameter(Position=0)] $First , [Parameter(ValueFromPipeline=$true,Position=1)] $Second ) begin { [string[]] $p1 = $First | Get-Member -MemberType Properties | Select-Object -ExpandProperty Name } process { $Output = $First | Select-Object $p1 foreach ($p in $Second | Get-Member -MemberType Properties | Where-Object {$p1 -notcontains $_.Name} | Select-Object -ExpandProperty Name) { Add-Member -InputObject $Output -MemberType NoteProperty -Name $p -Value $Second."$p" } $Output } } } process { foreach ($cmd in $CommandName) { if ($ModuleName) {$cmd = "$ModuleName\\$cmd"} $commands = @(Get-Command $cmd) foreach ($command in $commands) { # resolve aliases (an alias can point to another alias) while ($command.CommandType -eq "Alias") { $command = @(Get-Command ($command.definition))[0] } if (-not $command) {continue} $Parameters = @{} foreach ($provider in Get-PSProvider) { $drive = "{0}\\{1}::\\" -f $provider.ModuleName, $provider.Name Write-Verbose ("Get-Command $command -Args $drive | Select -Expand Parameters") [Array]$MoreParameters = (Get-Command $command -Args $drive).Parameters.Values [Array]$Dynamic = $MoreParameters | Where-Object {$_.IsDynamic} foreach ($p in $MoreParameters | Where-Object{!$Parameters.ContainsKey($_.Name)}) {$Parameters.($p.Name) = $p} # Write-Verbose "Drive: $Drive | Parameters: $($Parameters.Count)" if ($dynamic) { foreach ($d in $dynamic) { if (Get-Member -InputObject $Parameters.($d.Name) -Name DynamicProvider) { Write-Debug ("ADD:" + $d.Name + " " + $provider.Name) $Parameters.($d.Name).DynamicProvider += $provider.Name } else { Write-Debug ("CREATE:" + $d.Name + " " + $provider.Name) $Parameters.($d.Name) = $Parameters.($d.Name) | Add-Member NoteProperty DynamicProvider @($provider.Name) -Passthru } } } } ## Calculate the shortest distinct parameter name -- do this BEFORE removing the common parameters or else. $Aliases = $Parameters.Values | Select-Object -ExpandProperty Aliases ## Get defined aliases foreach ($p in $($Parameters.Keys)) { $shortest = "^" foreach ($char in [char[]]$p) { $shortest += $char $Matches = (($Parameters.Keys + $Aliases) -match $Shortest).Count Write-Debug "$($shortest.SubString(1)) $Matches" if ($Matches -eq 1) { $Parameters.$p = $Parameters.$p | Add-Member NoteProperty Aliases ($Parameters.$p.Aliases + @($shortest.SubString(1).ToLower($PSUICulture))) -Force -Passthru break } } } Write-Verbose "Parameters: $($Parameters.Count)`n $($Parameters | ft | out-string)" foreach ($paramset in @($command.ParameterSets | Select-Object -ExpandProperty "Name")) { foreach ($parameter in $Parameters.Keys | Sort-Object) { Write-Verbose "Parameter: $Parameter" if (!$Force -and ($Parameters.$Parameter.Aliases -match '^(vb|db|ea|wa|ev|wv|ov|ob|wi|cf)$')) {continue} if ($Parameters.$Parameter.ParameterSets.ContainsKey($paramset) -or $Parameters.$Parameter.ParameterSets.ContainsKey("__AllParameterSets")) { if ($Parameters.$Parameter.ParameterSets.ContainsKey($paramset)) { $output = Join-Object $Parameters.$Parameter $Parameters.$Parameter.ParameterSets.$paramSet } else { $output = Join-Object $Parameters.$Parameter $Parameters.$Parameter.ParameterSets.__AllParameterSets } Write-Output $Output | Select-Object $PropertySet | ForEach-Object { $null = $_.PSTypeNames.Insert(0,"System.Management.Automation.ParameterMetadata") $null = $_.PSTypeNames.Insert(0,"System.Management.Automation.ParameterMetadataEx") Write-Verbose "$(($_.PSTypeNames.GetEnumerator()) -join ", ")" $_ } | Add-Member ScriptMethod ToString { $this.Name } -Force -Passthru | Where-Object {$(foreach($pn in $ParameterName) {$_ -like $Pn}) -contains $true} } } } } } } } # Since you can't update format data without a file that has a ps1xml ending, let's make one up... $tempFile = "$([System.IO.Path]::GetTempPath())Get-Parameter.ps1xml" Set-Content $tempFile @' <?xml version="1.0" encoding="utf-8" ?> <Configuration> <Controls> <Control> <Name>ParameterGroupingFormat</Name> <CustomControl> <CustomEntries> <CustomEntry> <CustomItem> <Frame> <LeftIndent>4</LeftIndent> <CustomItem> <Text>Command: </Text> <ExpressionBinding> <ScriptBlock>"{0}/{1}" -f $(if($_.command.ModuleName){$_.command.ModuleName}else{$_.Command.CommandType.ToString()+":"}),$_.command.Name</ScriptBlock> </ExpressionBinding> <NewLine/> <Text>Set: </Text> <ExpressionBinding> <ScriptBlock>if($_.ParameterSet -eq "__AllParameterSets"){"Default"}else{$_.ParameterSet}</ScriptBlock> </ExpressionBinding> <NewLine/> </CustomItem> </Frame> </CustomItem> </CustomEntry> </CustomEntries> </CustomControl> </Control> </Controls> <ViewDefinitions> <View> <Name>ParameterMetadataEx</Name> <ViewSelectedBy> <TypeName>System.Management.Automation.ParameterMetadataEx</TypeName> </ViewSelectedBy> <GroupBy> <PropertyName>ParameterSet</PropertyName> <CustomControlName>ParameterGroupingFormat</CustomControlName> </GroupBy> <TableControl> <TableHeaders> <TableColumnHeader> <Label>Name</Label> <Width>22</Width> </TableColumnHeader> <TableColumnHeader> <Label>Aliases</Label> <Width>12</Width> </TableColumnHeader> <TableColumnHeader> <Label>Position</Label> <Width>8</Width> </TableColumnHeader> <TableColumnHeader> <Label>Mandatory</Label> <Width>9</Width> </TableColumnHeader> <TableColumnHeader> <Label>Pipeline</Label> <Width>8</Width> </TableColumnHeader> <TableColumnHeader> <Label>ByName</Label> <Width>6</Width> </TableColumnHeader> <TableColumnHeader> <Label>Provider</Label> <Width>15</Width> </TableColumnHeader> <TableColumnHeader> <Label>Type</Label> </TableColumnHeader> </TableHeaders> <TableRowEntries> <TableRowEntry> <TableColumnItems> <TableColumnItem> <PropertyName>Name</PropertyName> </TableColumnItem> <TableColumnItem> <PropertyName>Aliases</PropertyName> </TableColumnItem> <TableColumnItem> <!--PropertyName>Position</PropertyName--> <ScriptBlock>if($_.Position -lt 0){"Named"}else{$_.Position}</ScriptBlock> </TableColumnItem> <TableColumnItem> <PropertyName>Mandatory</PropertyName> </TableColumnItem> <TableColumnItem> <PropertyName>ValueFromPipeline</PropertyName> </TableColumnItem> <TableColumnItem> <PropertyName>ValueFromPipelineByPropertyName</PropertyName> </TableColumnItem> <TableColumnItem> <!--PropertyName>Provider</PropertyName--> <ScriptBlock>if($_.Provider){$_.Provider}else{"All"}</ScriptBlock> </TableColumnItem> <TableColumnItem> <PropertyName>Type</PropertyName> </TableColumnItem> </TableColumnItems> </TableRowEntry> </TableRowEntries> </TableControl> </View> </ViewDefinitions> </Configuration> '@ Update-FormatData -Append $tempFile # This is nested stuff, so that you can call the SCRIPT, and after it defines the global function, we will call that. Get-Parameter @PSBoundParameters
combined_dataset/train/non-malicious/sample_59_22.ps1
sample_59_22.ps1
# # Module manifest for module 'OCI.PSModules.Osuborganizationsubscription' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Osuborganizationsubscription.dll' # Version number of this module. ModuleVersion = '87.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'e98d9d2f-0e34-4cf5-b62f-660dcfdc3e34' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Osuborganizationsubscription Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '87.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Osuborganizationsubscription.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIOsuborganizationsubscriptionOrganizationSubscriptionsList' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Osuborganizationsubscription' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/185.ps1
185.ps1
$childWI_ReviewerActivityHasReviewers_Class_id = '6e05d202-38a4-812e-34b8-b11642001a80' $childWI_ReviewerActivityHasReviewers_Class_obj = Get-SCSMRelationshipClass -id $childWI_ReviewerActivityHasReviewers_Class_id $childWI_ReviewerisUser_Class_id = '90da7d7c-948b-e16e-f39a-f6e3d1ffc921' $childWI_ReviewerisUser_Class_obj = Get-SCSMRelationshipClass -id $childWI_ReviewerisUser_Class_id $childWI_reviewers = Get-SCSMRelatedObject -SMObject $childWI_obj -Relationship $childWI_ReviewerActivityHasReviewers_Class_obj
combined_dataset/train/non-malicious/4222.ps1
4222.ps1
$sploaded = $null Function Get-ServicePerms { if ($sploaded -ne "TRUE") { $script:sploaded = "TRUE" echo "Loading Assembly" $i = "TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDAK47qFoAAAAAAAAAAOAAIiALATAAACQAAAAGAAAAAAAAwkMAAAAgAAAAYAAAAAAAEAAgAAAAAgAABAAAAAAAAAAEAAAAAAAAAACgAAAAAgAAAAAAAAMAQIUAABAAABAAAAAAEAAAEAAAAAAAABAAAAAAAAAAAAAAAHBDAABPAAAAAGAAALgDAAAAAAAAAAAAAAAAAAAAAAAAAIAAAAwAAAA4QgAAHAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAAACAAAAAAAAAAAAAAACCAAAEgAAAAAAAAAAAAAAC50ZXh0AAAAyCMAAAAgAAAAJAAAAAIAAAAAAAAAAAAAAAAAACAAAGAucnNyYwAAALgDAAAAYAAAAAQAAAAmAAAAAAAAAAAAAAAAAABAAABALnJlbG9jAAAMAAAAAIAAAAACAAAAKgAAAAAAAAAAAAAAAAAAQAAAQgAAAAAAAAAAAAAAAAAAAACkQwAAAAAAAEgAAAACAAUAHC0AABwVAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABswBQBTAgAAAQAAEQNvDgAACnIBAABwbw8AAAomA28OAAAKcgEAAHBvEAAACm8RAAAKchEAAHBvEgAACiYDbw4AAApyAQAAcG8QAAAKbxEAAApyHwAAcG8SAAAKJhQKFAsCbxMAAAoTBDiRAQAAEgQoFAAAChMFFAoUCxEFGHMVAAAKFxfQJwAAASgWAAAKbxcAAApvGAAAChMGOA0BAAARBm8ZAAAKdBQAAAETB3I3AABwChuNDwAAASUWEQdvGgAACqIlF3I5AABwoiUYEQdvGwAACowwAAABoiUZcjkAAHCiJRoRB28cAAAKjDEAAAGiKB0AAAoKBnI9AABwbx4AAAoGckkAAHBvHgAACl8sEXJXAABwBnKTAABwKB8AAAoKBnI9AABwbx4AAAoGcqkAAHBvHgAACl8sEXJXAABwBnKTAABwKB8AAAoKBnLBAABwbx4AAAoGckkAAHBvHgAACl8sEXJXAABwBnKTAABwKB8AAAoKBnLBAABwbx4AAAoGcqkAAHBvHgAACl8sEXJXAABwBnKTAABwKB8AAAoKBwZy0wAAcCgfAAAKCxEGbyAAAAo65/7//94VEQZ1FQAAARMIEQgsBxEIbyEAAArc3gMm3gADbw4AAApyAQAAcG8QAAAKbyIAAAoYjQ8AAAElFhEFoiUXB6JvIwAACiYSBCgkAAAKOmP+///eDhIE/hYCAAAbbyEAAArcKCUAAAomA28OAAAKct8AAHBvEAAACigDAAAGDANvDgAACnIBAABwbxAAAAooBAAABg1y8QAAcAgJKCYAAAooJwAACioAQUwAAAIAAACPAAAAIAEAAK8BAAAVAAAAAAAAAAAAAABvAAAAVwEAAMYBAAADAAAADwAAAQIAAABdAAAApAEAAAECAAAOAAAAAAAAABswCAAjBQAAAgAAESglAAAKJnMoAAAKJnMoAAAKCnMpAAAKCwdvDgAACnLfAABwbw8AAAomB28OAAAKct8AAHBvEAAACm8RAAAKchkBAHBvEgAACiYHbw4AAApy3wAAcG8QAAAKbxEAAApyMwEAcG8SAAAKJgdvDgAACnLfAABwbxAAAApvEQAACnJFAQBwbxIAAAomB28OAAAKct8AAHBvEAAACm8RAAAKch8AAHBvEgAACiYHbw4AAApy3wAAcG8QAAAKbxEAAApyWQEAcG8SAAAKJnKBAQBwcyoAAApzKwAACm8sAAAKby0AAAoMOBwEAAAIby4AAAp0GAAAAQ1yNwAAcBMECXK5AQBwby8AAApvMAAACnI3AABwKDEAAAosBd3oAwAACXK5AQBwby8AAApvMAAAChME3gMm3gByNwAAcBMFcjcAAHATBhEEcssBAHAXKDIAAAoTBxEHbzMAAAo5qAMAABEHbzQAAAoXbzUAAApvNgAACnLhAQBwKCYAAAoTCBEIcusBAHBvHgAACi0XEQhyOQAAcG8eAAAKLAly7wEAcBMGKwdyBQIAcBMGEQdvNAAAChdvNQAACm82AAAKcuEBAHAoJgAAChMFEQVy6wEAcHI3AABwbzcAAAoTBRQTCRQTChEFGHMVAAAKEQVzOAAACiYXF9AnAAABKBYAAApvFwAACm8YAAAKEw84IgEAABEPbxkAAAp0FAAAARMQcjcAAHATChuNDwAAASUWERBvGgAACqIlF3I5AABwoiUYERBvGwAACowwAAABoiUZcjkAAHCiJRoREG8cAAAKjDEAAAGiKB0AAAoTChEKcj0AAHBvHgAAChEKckkAAHBvHgAACl8sE3JXAABwEQpykwAAcCgfAAAKEwoRCnI9AABwbx4AAAoRCnKpAABwbx4AAApfLBNyVwAAcBEKcpMAAHAoHwAAChMKEQpywQAAcG8eAAAKEQpySQAAcG8eAAAKXywTclcAAHARCnKTAABwKB8AAAoTChEKcsEAAHBvHgAAChEKcqkAAHBvHgAACl8sE3JXAABwEQpykwAAcCgfAAAKEwoRCREKctMAAHAoHwAAChMJEQ9vIAAACjrS/v//3hURD3UVAAABExERESwHERFvIQAACtzeFiZyEQIAcBEFcjMCAHAoHwAAChMJ3gARBXI3AgBwFygyAAAKEwsRC28zAAAKLBMRC280AAAKF281AAAKbzAAAAomEQVzOAAACm85AAAKEwwrOQYRDG86AAAKbzAAAApvOwAACm88AAAKLRcGEQxvOgAACm8wAAAKbzsAAApvPQAAChEMbz4AAAoTDBEMLcNyNwAAcBMNCXJhAgBwby8AAApvMAAACnM/AAAKEw4RDm9AAAAKExUSFf4WHAAAAW8wAAAKEw0RDm9BAAAKExIRDm9CAAAKExMRDm9DAAAKExQdjTIAAAElFhENoiUXcmsCAHCiJRgSEihEAAAKoiUZcp0CAHCiJRoSEyhEAAAKoiUbcrkCAHCiJRwSFChEAAAKoihFAAAKEw3eFRMWctsCAHARFihGAAAKKEcAAAreAAdvDgAACnLfAABwbxAAAApvIgAAChuNDwAAASUWCXLnAgBwby8AAApvMAAACnL/AgBwCXJhAgBwby8AAApvMAAACnIFAwBwKEgAAAqiJRcRBqIlGAlyuQEAcG8vAAAKbzAAAAqiJRkRCaIlGhENom8jAAAKJghvSQAACjrZ+///3goILAYIbyEAAArcBgcoAQAABioAQXwAAAAAAAD7AAAANQAAADABAAADAAAADwAAAQIAAAAFAgAANQEAADoDAAAVAAAAAAAAAAAAAADdAQAAdAEAAFEDAAAWAAAADwAAAQAAAAD9AwAAfQAAAHoEAAAVAAAAHQAAAQIAAADjAAAALgQAABEFAAAKAAAAAAAAABswAwAMAgAAAwAAEQItC3IJAwBwc0oAAAp6c0sAAAoKBnIhAwBwb0wAAAomBnIvAwBwb0wAAAomBnI9AwBwb0wAAAomBnJNAwBwb0wAAAomBihNAAAKCxIB/hYgAAABbzAAAApvTAAACiYGclkDAHBvTAAACiYGcmsDAHBvTAAACiYGcnsDAHBvTAAACiYGcokDAHBvTAAACiYGciwEAHBvTAAACiYGcpYEAHBvTAAACiYGcv4EAHBvTAAACiYCbxEAAApvTgAACgwrMQhvGQAACnQhAAABDQZyPAUAcG9MAAAKJgYJb08AAApvTAAACiYGcnoFAHBvTAAACiYIbyAAAAotx94UCHUVAAABEwQRBCwHEQRvIQAACtwGcoYFAHBvTAAACiYCbyIAAApvTgAACgw4lAAAAAhvGQAACnQiAAABEwUGcv4EAHBvTAAACiYCbxEAAApvTgAAChMGK0ARBm8ZAAAKdCEAAAETBwZyPAUAcG9MAAAKJgYRBREHb08AAApvUAAACm8wAAAKb0wAAAomBnJ6BQBwb0wAAAomEQZvIAAACi233hURBnUVAAABEwQRBCwHEQRvIQAACtwGcoYFAHBvTAAACiYIbyAAAAo6Yf///94UCHUVAAABEwQRBCwHEQRvIQAACtwGcpIFAHBvTAAACiYGcqQFAHBvTAAACiYGcrQFAHBvTAAACiYGbzAAAAoqASgAAAIAvgA9+wAUAAAAAAIAUgFNnwEVAAAAAAIAJwGmzQEUAAAAABswAwAAAgAAAwAAEQItC3IJAwBwc0oAAAp6c0sAAAoKBnIhAwBwb0wAAAomBnIvAwBwb0wAAAomBnI9AwBwb0wAAAomBnJNAwBwb0wAAAomBihNAAAKCxIB/hYgAAABbzAAAApvTAAACiYGclkDAHBvTAAACiYGcmsDAHBvTAAACiYGcnsDAHBvTAAACiYGciwEAHBvTAAACiYGcpYEAHBvTAAACiYGcv4EAHBvTAAACiYCbxEAAApvTgAACgwrMQhvGQAACnQhAAABDQZyPAUAcG9MAAAKJgYJb08AAApvTAAACiYGcnoFAHBvTAAACiYIbyAAAAotx94UCHUVAAABEwQRBCwHEQRvIQAACtwGcoYFAHBvTAAACiYCbyIAAApvTgAACgw4lAAAAAhvGQAACnQiAAABEwUGcv4EAHBvTAAACiYCbxEAAApvTgAAChMGK0ARBm8ZAAAKdCEAAAETBwZyPAUAcG9MAAAKJgYRBREHb08AAApvUAAACm8wAAAKb0wAAAomBnJ6BQBwb0wAAAomEQZvIAAACi233hURBnUVAAABEwQRBCwHEQRvIQAACtwGcoYFAHBvTAAACiYIbyAAAAo6Yf///94UCHUVAAABEwQRBCwHEQRvIQAACtwGcpIFAHBvTAAACiYGcqQFAHBvTAAACiYGcrQFAHBvTAAACiYGbzAAAAoqASgAAAIAsgA97wAUAAAAAAIARgFNkwEVAAAAAAIAGwGmwQEUAAAAAEJTSkIBAAEAAAAAAAwAAAB2Mi4wLjUwNzI3AAAAAAUAbAAAAAAFAAAjfgAAbAUAAIwHAAAjU3RyaW5ncwAAAAD4DAAAxAUAACNVUwC8EgAAEAAAACNHVUlEAAAAzBIAAFACAAAjQmxvYgAAAAAAAAACAAABRxUCCAkAAAAA+gEzABYAAAEAAABDAAAAAgAAAAQAAAAEAAAAUAAAAA0AAAADAAAAAgAAAAEAAAAFAAAAAAAvAwEAAAAAAAYAWQI/BQYAxgI/BQYApgEKBQ8AbAUAAAYAzgGcAwYAPAKcAwYAHQKcAwYArQKcAwYAeQKcAwYAkgKcAwYA5QGcAwYAugEgBQYAmAEgBQYAAAKcAwYAuAaCAwYAAQBIAAoAzgYzAEMA+QQAAAYAzwQEBgYA+QBbAwYAqgCCAw4AAwTWBlsA2wQAAA4ArgbWBhIADwPPBQYAbgQpABYAtQQ7BhYAcQY7BgYAPASCAwoAlAAzAAYAjgQdBwYAagCCAwoAkQMzAAoANgczAAoArgMzAAoA3gMzAAYAagdbAwYA7gVbAwYA/wYVAwYAUQGCAwYAtgCCAwYAdwdbAwYAwgNbAwYAeQEEBgYA5wBbAwYAggAVAwYAAwFbAwYARAFbAwYAVQZbAwYACAOCAwoAHgQzABIAtgXDBgYA2gApAA4ARAfWBg4AnATWBg4AmQbWBhIAPgfPBRIAFwbPBRIAiATPBRIA8wPPBRIAVgHPBQYAVgQpAAYAXwQpAAYAiQOCAwYA3wCCAwYAMASCAwoAXgEzAAAAAAAgAAAAAAABAAEAgQEQAJkFAAA9AAEAAQBQIAAAAACWAKYFnAEBAPwiAAAAAJYAXwWnAQMAqCgAAAAAlgBEA6sBAwDoKgAAAACWAAgAqwEEAAAAAQAJBwAAAgAdBQAAAQCeAAAAAQCeAAkABAUBABEABAUGABkABAUKACkABAUQADEABAUQADkABAUQAEEABAUQAEkABAUQAFEABAUQAFkABAUQAGEABAUVAGkABAUQAHEABAUQAIkAewUtABkBYwAzABkBeQMzAPEAwwU5ACEBYwA/AAwA9gRMABQA8wZbACkBBAVgAEEByABoAFEBhgVxAGEB9gR8AJkA8waBAGkBfgCFAHkBQAGLAKEAUQaRAJEBkgaXAJEBugWdAJEBkgaiAJkAFAepAKkAkAEGAPEAiQatAJkBYwCzABQAFAepAKEBKgG7AJEBkga/AKkBKQfFAAwABAUGAIkABAUGALEBBAUQALkBBAX1ALkBvwb8ALEA9gQBAbkA8wYGAcEBeQMMAXkABgMRAZEBXgcVAckBDwMbAdkBLwapAMkAJAYlAeEBeQMrAekB5AIRAZEBdgAyAfEBBAUQAPEBUAc4AfkBDgERAZEBxwQRAQwAugU9AQwAYwBDAdEA6AY4AdkABAUQANkAZgZJAdkA7gKpANkAfASpANkARgSpAAECBgMRAZEBkgZOAZEBkgZUAQkCNgFaAZEBkgZfAbkAFAepABECBAUQAPkABAUGAPkAbwB+AQEBZwCEARkC9gR8AAkBGwERAREBeQMMAS4ACwCxAS4AEwC6AS4AGwDZAS4AIwDiAS4AKwD4AS4AMwD4AS4AOwD4AS4AQwDiAS4ASwD+AS4AUwD4AS4AWwD4AS4AYwAWAi4AawBAAhoAywBnAUYAVQAEgAAAAQAAAAAAAAAAAAAAAACVBQAAAgAAAAAAAAAAAAAAigE/AAAAAAACAAAAAAAAAAAAAACKATMAAAAAAAIAAAAAAAAAAAAAAJMB1gYAAAAAAgAAAAAAAAAAAAAAigGCAwAAAAACAAAAAAAAAAAAAACTATsGAAAAAAAAAExpc3RgMQBDb252ZXJ0RGF0YVRhYmxlVG9IdG1sMgA8TW9kdWxlPgBTeXN0ZW0uSU8AU3lzdGVtLkRhdGEAbXNjb3JsaWIAU3lzdGVtLkNvbGxlY3Rpb25zLkdlbmVyaWMAQWRkAE5ld0d1aWQAQXBwZW5kAFJlcGxhY2UAZ2V0X0lkZW50aXR5UmVmZXJlbmNlAERhdGFUYWJsZQB0YXJnZXRUYWJsZQBJRGlzcG9zYWJsZQBSdW50aW1lVHlwZUhhbmRsZQBHZXRUeXBlRnJvbUhhbmRsZQBGaWxlAENvbnNvbGUAQXV0aG9yaXphdGlvblJ1bGUARmlsZVN5c3RlbUFjY2Vzc1J1bGUAZ2V0X0Z1bGxOYW1lAGdldF9Db2x1bW5OYW1lAEdldEhvc3ROYW1lAFdyaXRlTGluZQBnZXRfQWNjZXNzQ29udHJvbFR5cGUAQ2FwdHVyZQBJbnRlcm5hbERhdGFDb2xsZWN0aW9uQmFzZQBSZWFkT25seUNvbGxlY3Rpb25CYXNlAERpc3Bvc2UAR3VpZEF0dHJpYnV0ZQBEZWJ1Z2dhYmxlQXR0cmlidXRlAENvbVZpc2libGVBdHRyaWJ1dGUAQXNzZW1ibHlUaXRsZUF0dHJpYnV0ZQBBc3NlbWJseVRyYWRlbWFya0F0dHJpYnV0ZQBBc3NlbWJseUZpbGVWZXJzaW9uQXR0cmlidXRlAEFzc2VtYmx5Q29uZmlndXJhdGlvbkF0dHJpYnV0ZQBBc3NlbWJseURlc2NyaXB0aW9uQXR0cmlidXRlAENvbXBpbGF0aW9uUmVsYXhhdGlvbnNBdHRyaWJ1dGUAQXNzZW1ibHlQcm9kdWN0QXR0cmlidXRlAEFzc2VtYmx5Q29weXJpZ2h0QXR0cmlidXRlAEFzc2VtYmx5Q29tcGFueUF0dHJpYnV0ZQBSdW50aW1lQ29tcGF0aWJpbGl0eUF0dHJpYnV0ZQBnZXRfVmFsdWUAZ2V0X0NhblBhdXNlQW5kQ29udGludWUAVG9TdHJpbmcATWF0Y2gAU3lzdGVtLlNlY3VyaXR5LlByaW5jaXBhbABHZXQtU2VydmljZVBlcm1zLmRsbABDb252ZXJ0RGF0YVRhYmxlVG9IdG1sAFN5c3RlbS5TZWN1cml0eS5BY2Nlc3NDb250cm9sAGdldF9JdGVtAFN5c3RlbQBCb29sZWFuAERhdGFDb2x1bW4AU3lzdGVtLlJlZmxlY3Rpb24ARGF0YVRhYmxlQ29sbGVjdGlvbgBBdXRob3JpemF0aW9uUnVsZUNvbGxlY3Rpb24ARGF0YUNvbHVtbkNvbGxlY3Rpb24AR3JvdXBDb2xsZWN0aW9uAE1hbmFnZW1lbnRPYmplY3RDb2xsZWN0aW9uAERhdGFSb3dDb2xsZWN0aW9uAEFyZ3VtZW50TnVsbEV4Y2VwdGlvbgBnZXRfQ2FuU2h1dGRvd24ARmlsZUluZm8ARmlsZVN5c3RlbUluZm8ARGlyZWN0b3J5SW5mbwBnZXRfQ2FuU3RvcABHcm91cABTdHJpbmdCdWlsZGVyAE1hbmFnZW1lbnRPYmplY3RTZWFyY2hlcgBTZXJ2aWNlQ29udHJvbGxlcgBUb0xvd2VyAElFbnVtZXJhdG9yAE1hbmFnZW1lbnRPYmplY3RFbnVtZXJhdG9yAEdldEVudW1lcmF0b3IALmN0b3IAU3lzdGVtLkRpYWdub3N0aWNzAGRzAFN5c3RlbS5SdW50aW1lLkludGVyb3BTZXJ2aWNlcwBTeXN0ZW0uUnVudGltZS5Db21waWxlclNlcnZpY2VzAGR1bXBzZXJ2aWNlcwBEZWJ1Z2dpbmdNb2RlcwBnZXRfVGFibGVzAEdldEFjY2Vzc1J1bGVzAEdldC1TZXJ2aWNlUGVybXMAZHVtcGZvbGRlcnBlcm1zAERucwBDb250YWlucwBnZXRfQ29sdW1ucwBTeXN0ZW0uVGV4dC5SZWd1bGFyRXhwcmVzc2lvbnMAQWNjZXNzQ29udHJvbFNlY3Rpb25zAFN5c3RlbS5Db2xsZWN0aW9ucwBSZWdleE9wdGlvbnMAZ2V0X0dyb3VwcwBnZXRfU3VjY2VzcwBTeXN0ZW0uU2VydmljZVByb2Nlc3MAZ2V0X0ZpbGVTeXN0ZW1SaWdodHMAZ2V0X1N0YXR1cwBTZXJ2aWNlQ29udHJvbGxlclN0YXR1cwBnZXRfUm93cwBDb25jYXQATWFuYWdlbWVudEJhc2VPYmplY3QATWFuYWdlbWVudE9iamVjdABHZXQAU3lzdGVtLk5ldABEYXRhU2V0AFN5c3RlbS5NYW5hZ2VtZW50AGdldF9QYXJlbnQAZ2V0X0N1cnJlbnQATlRBY2NvdW50AGZvbGRlcmxpc3QATW92ZU5leHQAU3lzdGVtLlRleHQAV3JpdGVBbGxUZXh0AERhdGFSb3cAUmVnZXgAT2JqZWN0UXVlcnkAZ2V0X0RpcmVjdG9yeQBvcF9FcXVhbGl0eQBGaWxlU2VjdXJpdHkAQ29tbW9uT2JqZWN0U2VjdXJpdHkAAA9mAG8AbABkAGUAcgBzAAANRgBvAGwAZABlAHIAABdQAGUAcgBtAGkAcwBzAGkAbwBuAHMAAAEAAyAAAAtVAHMAZQByAHMAAA1NAG8AZABpAGYAeQAAOzwAYgA+ADwAZABpAHYAIABzAHQAeQBsAGUAPQAiAGMAbwBsAG8AcgA6AHIAZQBkADsAIgA+ACoAKgAAFTwALwBkAGkAdgA+ADwALwBiAD4AABdGAHUAbABsAEMAbwBuAHQAcgBvAGwAABFFAHYAZQByAHkAbwBuAGUAAAsgADwAYgByAD4AABFzAGUAcgB2AGkAYwBlAHMAACdDADoAXABUAGUAbQBwAFwAUgBlAHAAbwByAHQALgBoAHQAbQBsAAAZUwBlAHIAdgBpAGMAZQAgAE4AYQBtAGUAABFVAG4AcQB1AG8AdABlAGQAABNJAG0AYQBnAGUAUABhAHQAaAAAJ1MAZQByAHYAaQBjAGUAIABJAG4AZgBvAHIAbQBhAHQAaQBvAG4AADdTAEUATABFAEMAVAAgACoAIABGAFIATwBNACAAVwBpAG4AMwAyAF8AUwBlAHIAdgBpAGMAZQAAEVAAYQB0AGgATgBhAG0AZQAAFV4AKAAuACsAPwApAC4AZQB4AGUAAAkuAGUAeABlAAADIgAAFVUAbgBxAHUAbwB0AGUAZAAqACoAAAtGAGEAbABzAGUAACFQAGEAdABoACAAbgBvAHQAIABmAG8AdQBuAGQAOgAgAAADCgAAKV4AKAAuACoAWwBcAFwAXAAvAF0AKQBbAF4AXABcAFwALwBdACoAJAAACU4AYQBtAGUAADE8AGIAcgA+AEMAYQBuAFAAYQB1AHMAZQBBAG4AZABDAG8AbgB0AGkAbgB1AGUAOgAAGzwAYgByAD4AQwBhAG4AUwB0AGEAcgB0ADoAACE8AGIAcgA+AEMAYQBuAFMAaAB1AHQAZABvAHcAbgA6AAALRQByAHIAbwByAAAXRABpAHMAcABsAGEAeQBOAGEAbQBlAAAFIAAoAAADKQAAF3QAYQByAGcAZQB0AFQAYQBiAGwAZQAADTwAaAB0AG0AbAA+AAANPABoAGUAYQBkAD4AAA88AHQAaQB0AGwAZQA+AAALUABhAGcAZQAtAAERPAAvAHQAaQB0AGwAZQA+AAAPPAAvAGgAZQBhAGQAPgAADTwAYgBvAGQAeQA+AACAoTwAaAAxAD4AUwBlAHIAdgBpAGMAZQAgAFAAZQByAG0AaQBzAHMAaQBvAG4AcwAgAC0AIABTAGUAYQByAGMAaAAgAGYAbwByACAAKgAqACAAdABvACAAZgBpAG4AZAAgAGEAbgB5ACAAdgB1AGwAbgBlAHIAYQBiAGkAbABpAHQAaQBlAHMALgAuAC4ALgAuAC4ALgAuADwALwBoADEAPgABaTwAdABhAGIAbABlACAAYgBvAHIAZABlAHIAPQAnADEAcAB4ACcAIABjAGUAbABsAHAAYQBkAGQAaQBuAGcAPQAnADUAJwAgAGMAZQBsAGwAcwBwAGEAYwBpAG4AZwA9ACcAMAAnACAAAWdzAHQAeQBsAGUAPQAnAGIAbwByAGQAZQByADoAIABzAG8AbABpAGQAIAAxAHAAeAAgAEIAbABhAGMAawA7ACAAZgBvAG4AdAAtAHMAaQB6AGUAOgAgAHMAbQBhAGwAbAA7ACcAPgABPTwAdAByACAAYQBsAGkAZwBuAD0AJwBsAGUAZgB0ACcAIAB2AGEAbABpAGcAbgA9ACcAdABvAHAAJwA+AAE9PAB0AGQAIABhAGwAaQBnAG4APQAnAGwAZQBmAHQAJwAgAHYAYQBsAGkAZwBuAD0AJwB0AG8AcAAnAD4AAQs8AC8AdABkAD4AAAs8AC8AdAByAD4AABE8AC8AdABhAGIAbABlAD4AAA88AC8AYgBvAGQAeQA+AAAPPAAvAGgAdABtAGwAPgAARnXLdY74PECStksJ3C7HngAEIAEBCAMgAAEFIAEBEREEIAEBDgQgAQECEgcJDg4ODhURSQEODhJNElESVQUgABKAjQUgARJ5DgUgABKAkQYgARKAhQ4FFRJBAQ4IIAAVEUkBEwAFFRFJAQ4EIAATAAcgAgEOEYCZCAABEoChEYClCiADEoCtAgISgKEEIAASTQMgABwFIAASgLkFIAARgMEFIAARgMUFAAEOHRwEIAECDgYAAw4ODg4DIAACBSAAEoDNByABEoCJHRwDAAAOBQACDg4OBQACAQ4OKQcXFRJBAQ4SRRJdEmEODg4SZQ4ODhJlEmkOEm0STRJRElUCAgIRcRJ1BiABARKA2QQgABJZBCAAEl0FIAASgOEEIAEcDgMgAA4FAAICDg4JAAMSZQ4OEYDpBSAAEoDxBiABEoDtCAUgAg4ODgQgABJpBSABAhMABSABARMABCAAEXEFAAEOHQ4FAAIOHBwEAAEBDgcABA4ODg4OFgcIEn0RgIESTRKAhRJVEoCJEk0SgIUFIAESfQ4FAAARgIEIt3pcVhk04IkIsD9ffxHVCjoKAAIBFRJBAQ4SRQMAAAEFAAEOEnkIAQAIAAAAAAAeAQABAFQCFldyYXBOb25FeGNlcHRpb25UaHJvd3MBCAEAAgAAAAAAFQEAEEdldC1TZXJ2aWNlUGVybXMAAAUBAAAAABcBABJDb3B5cmlnaHQgwqkgIDIwMTgAACkBACRjMWIzZmFlMi1kNzQ1LTRjYTUtYWFjMi0xZWQxY2Y4NGM2YzEAAAwBAAcxLjAuMC4wAAAAAAAAAAAArjuoWgAAAAACAAAAHAEAAFRCAABUJAAAUlNEU5EOpjLkSMFIsiMKpDnWaawBAAAAQzpcVXNlcnNcYWRtaW5cc291cmNlXHJlcG9zXEdldC1TZXJ2aWNlUGVybXNcR2V0LVNlcnZpY2VQZXJtc1xvYmpcUmVsZWFzZVxHZXQtU2VydmljZVBlcm1zLnBkYgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACYQwAAAAAAAAAAAACyQwAAACAAAAAAAAAAAAAAAAAAAAAAAAAAAAAApEMAAAAAAAAAAAAAAABfQ29yRGxsTWFpbgBtc2NvcmVlLmRsbAAAAAAA/yUAIAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEAEAAAABgAAIAAAAAAAAAAAAAAAAAAAAEAAQAAADAAAIAAAAAAAAAAAAAAAAAAAAEAAAAAAEgAAABYYAAAXAMAAAAAAAAAAAAAXAM0AAAAVgBTAF8AVgBFAFIAUwBJAE8ATgBfAEkATgBGAE8AAAAAAL0E7/4AAAEAAAABAAAAAAAAAAEAAAAAAD8AAAAAAAAABAAAAAIAAAAAAAAAAAAAAAAAAABEAAAAAQBWAGEAcgBGAGkAbABlAEkAbgBmAG8AAAAAACQABAAAAFQAcgBhAG4AcwBsAGEAdABpAG8AbgAAAAAAAACwBLwCAAABAFMAdAByAGkAbgBnAEYAaQBsAGUASQBuAGYAbwAAAJgCAAABADAAMAAwADAAMAA0AGIAMAAAABoAAQABAEMAbwBtAG0AZQBuAHQAcwAAAAAAAAAiAAEAAQBDAG8AbQBwAGEAbgB5AE4AYQBtAGUAAAAAAAAAAABKABEAAQBGAGkAbABlAEQAZQBzAGMAcgBpAHAAdABpAG8AbgAAAAAARwBlAHQALQBTAGUAcgB2AGkAYwBlAFAAZQByAG0AcwAAAAAAMAAIAAEARgBpAGwAZQBWAGUAcgBzAGkAbwBuAAAAAAAxAC4AMAAuADAALgAwAAAASgAVAAEASQBuAHQAZQByAG4AYQBsAE4AYQBtAGUAAABHAGUAdAAtAFMAZQByAHYAaQBjAGUAUABlAHIAbQBzAC4AZABsAGwAAAAAAEgAEgABAEwAZQBnAGEAbABDAG8AcAB5AHIAaQBnAGgAdAAAAEMAbwBwAHkAcgBpAGcAaAB0ACAAqQAgACAAMgAwADEAOAAAACoAAQABAEwAZQBnAGEAbABUAHIAYQBkAGUAbQBhAHIAawBzAAAAAAAAAAAAUgAVAAEATwByAGkAZwBpAG4AYQBsAEYAaQBsAGUAbgBhAG0AZQAAAEcAZQB0AC0AUwBlAHIAdgBpAGMAZQBQAGUAcgBtAHMALgBkAGwAbAAAAAAAQgARAAEAUAByAG8AZAB1AGMAdABOAGEAbQBlAAAAAABHAGUAdAAtAFMAZQByAHYAaQBjAGUAUABlAHIAbQBzAAAAAAA0AAgAAQBQAHIAbwBkAHUAYwB0AFYAZQByAHMAaQBvAG4AAAAxAC4AMAAuADAALgAwAAAAOAAIAAEAQQBzAHMAZQBtAGIAbAB5ACAAVgBlAHIAcwBpAG8AbgAAADEALgAwAC4AMAAuADAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEAAAAwAAADEMwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=" $dllbytes = [System.Convert]::FromBase64String($i) $assembly = [System.Reflection.Assembly]::Load($dllbytes) } [ServicePerms]::dumpservices() $computer = $env:COMPUTERNAME $complete = "[+] Writing output to C:\Temp\Report.html" echo "[+] Completed Service Permissions Review" echo "$complete" }
combined_dataset/train/non-malicious/sample_53_86.ps1
sample_53_86.ps1
# # Module manifest for module 'OCI.PSModules.Dataflow' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Dataflow.dll' # Version number of this module. ModuleVersion = '85.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '60441277-1663-4d77-af11-39ab99c7ac41' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Dataflow Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dataflow.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIDataflowApplication', 'Get-OCIDataflowApplicationsList', 'Get-OCIDataflowPool', 'Get-OCIDataflowPoolsList', 'Get-OCIDataflowPrivateEndpoint', 'Get-OCIDataflowPrivateEndpointsList', 'Get-OCIDataflowRun', 'Get-OCIDataflowRunLog', 'Get-OCIDataflowRunLogsList', 'Get-OCIDataflowRunsList', 'Get-OCIDataflowSqlEndpoint', 'Get-OCIDataflowSqlEndpointsList', 'Get-OCIDataflowStatement', 'Get-OCIDataflowStatementsList', 'Get-OCIDataflowWorkRequest', 'Get-OCIDataflowWorkRequestErrorsList', 'Get-OCIDataflowWorkRequestLogsList', 'Get-OCIDataflowWorkRequestsList', 'Move-OCIDataflowApplicationCompartment', 'Move-OCIDataflowPoolCompartment', 'Move-OCIDataflowPrivateEndpointCompartment', 'Move-OCIDataflowRunCompartment', 'Move-OCIDataflowSqlEndpointCompartment', 'New-OCIDataflowApplication', 'New-OCIDataflowPool', 'New-OCIDataflowPrivateEndpoint', 'New-OCIDataflowRun', 'New-OCIDataflowSqlEndpoint', 'New-OCIDataflowStatement', 'Remove-OCIDataflowApplication', 'Remove-OCIDataflowPool', 'Remove-OCIDataflowPrivateEndpoint', 'Remove-OCIDataflowRun', 'Remove-OCIDataflowSqlEndpoint', 'Remove-OCIDataflowStatement', 'Start-OCIDataflowPool', 'Stop-OCIDataflowPool', 'Update-OCIDataflowApplication', 'Update-OCIDataflowPool', 'Update-OCIDataflowPrivateEndpoint', 'Update-OCIDataflowRun', 'Update-OCIDataflowSqlEndpoint' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dataflow' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_37_61.ps1
sample_37_61.ps1
E接続を確立できませんでした: キャッシュされた資格情報の有効期限が切れているか、パスワードが更新されました。資格情報を再入力してください。3PowerBI 環境の検出を試みている間に、URL '%{strURL/}' への接続に失敗しました。.応答形式が正しくないため、PowerBI バックエンド エンドポイントの検索が失敗しました。CertGetNameStringW を呼び出せませんでした。証明書チェーンを検証できませんでした。*拇印 '%{strThumbprint/}' の証明書の発行者は信頼されていません。cこのサーバー インスタンスは、Schannel 証明書 (ServerSchannelTokenSignerCert) を設定せずに開始されました。実行時に証明書を設定することは許可されていません。^このサーバー インスタンスは、Schannel 証明書 (ServerSchannelTokenSignerCert) を設定して開始されました。これをクリアすることは許可されていません。&サーバーの Schannel 証明書を変更できるのはサーバー管理者のみです。5DISCOVER_POWERBI_SECURITY は、Power BI サービスでのみサポートされます。6DISCOVER_MODEL_SECURITY をサポートしているのは内部 Power BI 接続だけです。=データセットをクエリするための十分なアクセス許可がありません。詳細については、データセットの所有者にお問い合わせください。á従来のワークスペースに接続されているか、ワークスペースの管理者ではないため、EffectiveUserName プロパティを使用することができません。ワークスペースの既存の管理者に問い合わせて、必要なアクセス許可の付与を依頼するか、自分がワークスペースの管理者であるワークスペースにデータセットを移動を依頼します。詳細については、「https://go.microsoft.com/fwlink/?linkid=2171972」 を参照してください。Jユーザー '%{euii_strUser/}' には、データベース '%{strDatabase/}' をエクスポートするアクセス許可がありません。
combined_dataset/train/non-malicious/Get-InstalledSoftware.ps.ps1
Get-InstalledSoftware.ps.ps1
##############################################################################\n##\n## Get-InstalledSoftware\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nLists installed software on the current computer.\n\n.EXAMPLE\n\nGet-InstalledSoftware *Frame* | Select DisplayName\n\nDisplayName\n-----------\nMicrosoft .NET Framework 3.5 SP1\nMicrosoft .NET Framework 3.5 SP1\nHotfix for Microsoft .NET Framework 3.5 SP1 (KB953595)\nHotfix for Microsoft .NET Framework 3.5 SP1 (KB958484)\nUpdate for Microsoft .NET Framework 3.5 SP1 (KB963707)\n\n#>\n\nparam(\n ## The name of the software to search for\n $DisplayName = "*"\n)\n\nSet-StrictMode -Off\n\n## Get all the listed software in the Uninstall key\n$keys =\n Get-ChildItem HKLM:\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\n\n## Get all of the properties from those items\n$items = $keys | Foreach-Object { Get-ItemProperty $_.PsPath }\n\n## For each of those items, display the DisplayName and Publisher\nforeach($item in $items)\n{\n if(($item.DisplayName) -and ($item.DisplayName -like $displayName))\n {\n $item\n }\n}
combined_dataset/train/non-malicious/Run-Defrag.ps1
Run-Defrag.ps1
# Run-Defrag # Defragments the targeted hard drives. # # Args: # $server: A target Server 2003 or 2008 system # $drive: An optional drive letter. If this is blank then all # drives are defragmented # $force: If this switch is set then a defrag will be forced # even if the drive is low on space # # Returns: # The result description for each drive. function Run-Defrag { param([string]$server, [string]$drive, [switch]$force) [string]$query = 'Select * from Win32_Volume where DriveType = 3' if ($drive) { $query += " And DriveLetter LIKE '$drive%'" } $volumes = Get-WmiObject -Query $query -ComputerName $server foreach ($volume in $volumes) { Write-Host "Defragmenting $($volume.DriveLetter)..." -noNewLine $result = $volume.Defrag($force) switch ($result) { 0 {'Success'} 1 {'Access Denied'} 2 {'Not Supported'} 3 {'Volume Dirty Bit Set'} 4 {'Not Enough Free Space'} 5 {'Corrupt MFT Detected'} 6 {'Call Cancelled'} 7 {'Cancellation Request Requested Too Late'} 8 {'Defrag In Progress'} 9 {'Defrag Engine Unavailable'} 10 {'Defrag Engine Error'} 11 {'Unknown Error'} } } }
combined_dataset/train/non-malicious/sample_26_19.ps1
sample_26_19.ps1
# # Module manifest for module 'OCI.PSModules.Audit' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Audit.dll' # Version number of this module. ModuleVersion = '80.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '159ba3cf-8d7b-460e-bb56-36417d6f4316' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Audit Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Audit.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIAuditConfiguration', 'Get-OCIAuditEventsList', 'Update-OCIAuditConfiguration' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Audit' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/2342.ps1
2342.ps1
[CmdletBinding(DefaultParameterSetName = 'None')] [OutputType()] param ( [Parameter(ParameterSetName = 'DomainController')] [ValidateNotNullOrEmpty()] [string[]]$DomainController, [Parameter()] [ValidateNotNullOrEmpty()] [ValidateSet('DnsForwarders', 'DnsDelegation', 'DnsDynamicUpdate', 'DnsRecordRegistration', 'DnsResolveExtName', 'DnsAll')] [string[]]$DnsTest, [Parameter()] [ValidateNotNullOrEmpty()] [string]$DnsInternetName, [Parameter(ParameterSetName = 'DomainWide')] [ValidateNotNullOrEmpty()] [string]$DomainName = (Get-ADDomain).DNSRoot, [Parameter()] [ValidateNotNullOrEmpty()] [ValidateScript({ Test-Path -Path $_ -PathType Leaf })] [string]$DcDiagFilePath = 'C:\Windows\System32\dcdiag.exe' ) process { try { $TestRegex = '(PASS|WARN|FAIL|n/a)|(PASS|WARN|FAIL|n/a)|(PASS|WARN|FAIL|n/a)|(PASS|WARN|FAIL|n/a)|(PASS|WARN|FAIL|n/a)|(PASS|WARN|FAIL|n/a)' $AllTestsPassedRegex = 'passed test DNS' if ($PSCmdlet.ParameterSetName -eq 'DomainController') { $ServerTestResults = & $DcDiagFilePath /s:$Dc /test:DNS } else { $ServerTestResults = & $DcDiagFilePath /a /test:DNS } if (-not $ServerTestResults) { throw 'Could not parse results' } Write-Verbose -Message 'Finished dcdiag.exe execution. Parsing result...' $ServerResults = [regex]::Matches($ServerTestResults, $TestRegex).Value $TestResults = @{ 'Authentication' = '' 'Basic' = '' 'Forwarders' = '' 'Delegations' = '' 'DynamicUpdates' = '' 'RecordRegistrations' = '' } if ($ServerResults -and ($ServerResults.Count -ne 7)) { Write-Verbose -Message "Successfully parsed dcdiag.exe summary results with $($ServerResults -join ',')" $SummaryResults += [pscustomobject]@{ 'DomainController' = $Dc; 'Test' = 'Authentication'; 'Result' = $ServerResults[0] } $SummaryResults += [pscustomobject]@{ 'DomainController' = $Dc; 'Test' = 'Basic'; 'Result' = $ServerResults[1] } $SummaryResults += [pscustomobject]@{ 'DomainController' = $Dc; 'Test' = 'Forwarders'; 'Result' = $ServerResults[2] } $SummaryResults += [pscustomobject]@{ 'DomainController' = $Dc; 'Test' = 'Delegations'; 'Result' = $ServerResults[3] } $SummaryResults += [pscustomobject]@{ 'DomainController' = $Dc; 'Test' = 'DynamicUpdates'; 'Result' = $ServerResults[4] } $SummaryResults += [pscustomobject]@{ 'DomainController' = $Dc; 'Test' = 'RecordRegistrations'; 'Result' = $ServerResults[5] } } elseif (-not $ServerResults) { $ServerResults = [regex]::Matches($ServerTestResults, $AllTestsPassedRegex).Value if (!$ServerResults) { throw "Could not determine test results for DC '$Dc'" } else { $SummaryResults += [pscustomobject]@{ 'DomainController' = $Dc; 'Test' = 'Authentication'; 'Result' = 'PASS' } $SummaryResults += [pscustomobject]@{ 'DomainController' = $Dc; 'Test' = 'Basic'; 'Result' = 'PASS' } $SummaryResults += [pscustomobject]@{ 'DomainController' = $Dc; 'Test' = 'Forwarders'; 'Result' = 'PASS' } $SummaryResults += [pscustomobject]@{ 'DomainController' = $Dc; 'Test' = 'Delegations'; 'Result' = 'PASS' } $SummaryResults += [pscustomobject]@{ 'DomainController' = $Dc; 'Test' = 'DynamicUpdates'; 'Result' = 'PASS' } $SummaryResults += [pscustomobject]@{ 'DomainController' = $Dc; 'Test' = 'RecordRegistrations'; 'Result' = 'PASS' } } } $SummaryResults = $SummaryResults | group test, result -NoElement $Output.'Authentication' = "{0} / {1} / {2}" -f ($SummaryResults | where { $_.Name -eq 'Authentication, PASS' }).Count, ($SummaryResults | where { $_.Name -eq 'Authentication, WARN' }).Count, ($SummaryResults | where { $_.Name -eq 'Authentication, FAIL' }).Count $Output.'Basic' = "{0} / {1} / {2}" -f ($SummaryResults | where { $_.Name -eq 'Basic, PASS' }).Count, ($SummaryResults | where { $_.Name -eq 'Basic, WARN' }).Count, ($SummaryResults | where { $_.Name -eq 'Basic, FAIL' }).Count $Output.'Forwarders' = "{0} / {1} / {2}" -f ($SummaryResults | where { $_.Name -eq 'Forwarders, PASS' }).Count, ($SummaryResults | where { $_.Name -eq 'Forwarders, WARN' }).Count, ($SummaryResults | where { $_.Name -eq 'Forwarders, FAIL' }).Count $Output.'Delegations' = "{0} / {1} / {2}" -f ($SummaryResults | where { $_.Name -eq 'Delegations, PASS' }).Count, ($SummaryResults | where { $_.Name -eq 'Delegations, WARN' }).Count, ($SummaryResults | where { $_.Name -eq 'Delegations, FAIL' }).Count $Output.'Dynamic Updates' = "{0} / {1} / {2}" -f ($SummaryResults | where { $_.Name -eq 'DynamicUpdates, PASS' }).Count, ($SummaryResults | where { $_.Name -eq 'DynamicUpdates, WARN' }).Count, ($SummaryResults | where { $_.Name -eq 'DynamicUpdates, FAIL' }).Count $Output.'Record Registrations' = "{0} / {1} / {2}" -f ($SummaryResults | where { $_.Name -eq 'RecordRegistrations, PASS' }).Count, ($SummaryResults | where { $_.Name -eq 'RecordRegistrations, WARN' }).Count, ($SummaryResults | where { $_.Name -eq 'RecordRegistrations, FAIL' }).Count [pscustomobject]$Output } catch { Write-Error $_.Exception.Message } }
combined_dataset/train/non-malicious/sample_60_30.ps1
sample_60_30.ps1
# # Module manifest for module 'OCI.PSModules.Resourcescheduler' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Resourcescheduler.dll' # Version number of this module. ModuleVersion = '86.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '410b94b1-9573-414c-8179-e65332969614' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Resourcescheduler Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Resourcescheduler.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Enable-OCIResourceschedulerSchedule', 'Get-OCIResourceschedulerResourceTypesList', 'Get-OCIResourceschedulerSchedule', 'Get-OCIResourceschedulerSchedulesList', 'Get-OCIResourceschedulerWorkRequest', 'Get-OCIResourceschedulerWorkRequestErrorsList', 'Get-OCIResourceschedulerWorkRequestLogsList', 'Get-OCIResourceschedulerWorkRequestsList', 'Invoke-OCIResourceschedulerDeactivateSchedule', 'New-OCIResourceschedulerSchedule', 'Remove-OCIResourceschedulerSchedule', 'Stop-OCIResourceschedulerWorkRequest', 'Update-OCIResourceschedulerSchedule' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Resourcescheduler' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/New-ElevatedTask.ps1
New-ElevatedTask.ps1
#requires -version 2.0 #################################################################################################### ## Version History ## 2.0 - First version with shortcut support ## - Still weak on documentation of the arguments, sorry ... ## 2.5 - Improved defaults and documentation (run with -?) ## 2.6 - CTP 3 version, with AutoHelp and CmdletBinding function New-ElevatedTask { <# .SYNOPSIS Creates a new "On Demand Only" scheduled task to run an "Elevated" application, and a shortcut to launch it. .DESCRIPTION New-ElevatedTask creates a scheduled task on Vista or Windows7 which runs "On Demand" with full priviledges (Elevated) and then creates a shortcut to launch it on demand. It works by exploiting the import from XML feature of schtasks.exe /Create /XML ... and the ability to run tasks on demand via schtasks.exe /run /tn ... You may specify the shortcut path as a folder path (which must exist), with a name for the new file (ending in .lnk), or you may specify one of the "SpecialFolder" names like "QuickLaunch" or "CommonDesktop" followed by the name. The shortcut feature depends on the New-Shortcut function (a separate script). NOTE: You MUST run this in an elevated PowerShell instance. .Example New-ElevatedTask C:\\Windows\\Notepad.exe Will create a task to run notepad elevated, and creates a shortcut to run it the current folder, named "Notepad.lnk" .Example New-ElevatedTask C:\\Windows\\Notepad.exe -Shortcut QuickLaunch\\Editor.lnk -FriendlyName "Run Notepad" -TaskName "Elevated Text Editor" Will create a task to run notepad elevated, and names it "Elevated Text Editor". Also creates a shortcut on the QuickLaunch bar with the name "Run Notepad.lnk" and the tooltip "Elevated Text Editor" .NOTE Must be run from an elevated PowerShell instance Some features depend on New-Shortcut (which is also available on the repository: http://PoshCode.org/search/New-Shortcut) #> [CmdletBinding()] param( $TargetPath = "" , $Arguments = "" , $WorkingDirectory = $(Split-Path -parent (Resolve-Path $TargetPath)) , $FriendlyName = $(Split-Path $TargetPath -leaf) , $TaskName = $( "Elevated $friendlyName" ) , $IconLocation = $null , $ShortcutPath = $null , $Hotkey = $Null , $UserName = $null , $password = $null , [System.Management.Automation.PSCredential] $credential = $null ) $SchTasks = Join-Path ([Environment]::GetFolderPath("System")) "schtasks.exe" if(-not (Test-Path $SchTasks) ) { $SchTasks = Read-Host "You need to set the correct location for the SchTasks.exe application on your system" } if($args -contains "-?" -or $TargetPath.Trim(" ").Length -eq 0 -or (-not (Test-Path $TargetPath) )) { if( -not($args -contains "-?")) { Write-Error "TargetPath must be an existing file for the scheduled task to point at!" } Write-Host $UseMessage return } $xml = @" <?xml version="1.0" encoding="UTF-16"?> <Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"> <RegistrationInfo> <Author>{4}</Author> <Description>Run {0} "As Administrator"</Description> </RegistrationInfo> <Triggers /> <Principals> <Principal id="Author"> <UserId>{4}</UserId> <LogonType>{5}</LogonType> <RunLevel>HighestAvailable</RunLevel> </Principal> </Principals> <Settings> <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy> <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries> <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries> <AllowHardTerminate>true</AllowHardTerminate> <StartWhenAvailable>false</StartWhenAvailable> <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable> <AllowStartOnDemand>true</AllowStartOnDemand> <Enabled>true</Enabled> <Hidden>false</Hidden> <RunOnlyIfIdle>false</RunOnlyIfIdle> <DisallowStartOnRemoteAppSession>false</DisallowStartOnRemoteAppSession> <UseUnifiedSchedulingEngine>false</UseUnifiedSchedulingEngine> <WakeToRun>false</WakeToRun> <ExecutionTimeLimit>P3D</ExecutionTimeLimit> <Priority>7</Priority> </Settings> <Actions Context="Author"> <Exec> <Command>{1}</Command> <Arguments>{2}</Arguments> <WorkingDirectory>{3}</WorkingDirectory> </Exec> </Actions> </Task> "@ $xFile = [IO.Path]::GetTempFileName() # if they specify a user name, assume they want to do password authentication if($UserName -ne $null -and $password -ne $null) { $xml -f $friendlyName, $TargetPath, $arguments, $WorkingDirectory, $UserName, "Password" | set-content $xFile &$SchTasks /Create /XML $xFile /TN $taskname /RU $UserName /RP $password # if they didn't include a password, prompt them for one ... } elseif($UserName -ne $null -and $password -eq $null) { $xml -f $friendlyName, $TargetPath, $arguments, $WorkingDirectory, $UserName, "Password" | set-content $xFile &$SchTasks /Create /XML $xFile /TN $taskname /RU $UserName /RP # if they supplied credentials instead, use that } elseif($credential -ne $null) { $xml -f $friendlyName, $TargetPath, $arguments, $WorkingDirectory, $($Credential.UserName), "Password" | set-content $xFile &$SchTasks /Create /XML $xFile /TN $taskname /RU $credential.UserName /RP $($Credential.GetNetworkCredential().Password) } else { # if they suppplied neither user nor credentials, lets assume they want the "current" user $UserName = ([Security.Principal.WindowsIdentity]::GetCurrent().Name) # if they passed a password, use that if($password -ne $null) { $xml -f $friendlyName, $TargetPath, $arguments, $WorkingDirectory, $UserName, "Password" | set-content $xFile &$SchTasks /Create /XML $xFile /TN $taskname /RU $UserName /RP $password # otherwise, there are no special credentials needed, "Interactive" means only "this" user can run it. } else { $xml -f $friendlyName, $TargetPath, $arguments, $WorkingDirectory, $UserName, "InteractiveToken" | set-content $xFile &$SchTasks /Create /XML $xFile /TN $taskname } } if($IconLocation -eq $null -or $IconLocation.Length -eq 0) { $IconLocation = $TargetPath } if(([IO.FileInfo]$ShortcutPath).Extension.Length -eq 0 ) { $ShortcutPath = "$ShortcutPath\\$FriendlyName.lnk" $Description = $TaskName } else { $Description = $FriendlyName } ## New-ShortCut $TargetPath $LinkPath $Arguments $WorkingDirectory $WindowStyle $IconLocation $Hotkey $Description if(Get-Command New-Shortcut -ErrorAction SilentlyContinue) { New-Shortcut -Target $SchTasks -LinkPath $ShortcutPath -Arg "/Run /TN `"$TaskName`"" -WorkingDirectory $WorkingDirectory -Window "Minimized" -Icon $IconLocation -Hotkey $Hotkey -Description $Description } }
combined_dataset/train/non-malicious/2936.ps1
2936.ps1
Task default -depends CheckGetPSakeScriptTasks function Assert-EqualArrays($a, $b, $message) { $differences = @(Compare-Object $a $b -SyncWindow 0) if ($differences.Length -gt 0) { $differences } Assert ($differences.Length -eq 0) "$message : $($differences.Length) differences found." } function Assert-TaskEqual($t1, $t2) { Assert ($t1.Name -eq $t2.Name) "Task names do not match: $($t1.Name) vs $($t2.Name)" Assert ($t1.Alias -eq $t2.Alias) "Task aliases do not match for task $($t1.Name): $($t1.Alias) vs $($t2.Alias)" Assert ($t1.Description -eq $t2.Description) "Task descriptions do not match for task $($t1.Name): $($t1.Description) vs $($t2.Description)" Assert-EqualArrays $t1.DependsOn $t2.DependsOn "Task dependencies do not match for task $($t1.Name)" } function HelloYou { Write-Host 'Hello you' } Task CheckGetPSakeScriptTasks { $tasks = Get-PSakeScriptTasks .\nested\docs.ps1 $tasks = $tasks | Sort-Object -Property Name Assert ($tasks.Length -eq 7) 'Unexpected number of tasks.' Assert-TaskEqual $tasks[0] ([pscustomobject]@{Name = 'Compile'; Alias = ''; Description = ''; DependsOn = @('CompileSolutionA','CompileSolutionB');}) Assert-TaskEqual $tasks[1] ([pscustomobject]@{Name = 'CompileSolutionA'; Alias = ''; Description = 'Compiles solution A'; DependsOn = @(); }) Assert-TaskEqual $tasks[2] ([pscustomobject]@{Name = 'CompileSolutionB'; Alias = ''; Description = ''; DependsOn = @(); }) Assert-TaskEqual $tasks[3] ([pscustomobject]@{Name = 'default'; Alias = ''; Description = ''; DependsOn = @('Compile','Test'); }) Assert-TaskEqual $tasks[4] ([pscustomobject]@{Name = 'IntegrationTests'; Alias = ''; Description = ''; DependsOn = @(); }) Assert-TaskEqual $tasks[5] ([pscustomobject]@{Name = 'Test'; Alias = ''; Description = ''; DependsOn = @('UnitTests','IntegrationTests'); }) Assert-TaskEqual $tasks[6] ([pscustomobject]@{Name = 'UnitTests'; Alias = 'ut'; Description = ''; DependsOn = @(); }) }
combined_dataset/train/non-malicious/467.ps1
467.ps1
Update-TypeData -TypeName "System.Collections.Concurrent.ConcurrentDictionary``2[[$([System.String].AssemblyQualifiedName)],[$([PSFramework.Configuration.Config].AssemblyQualifiedName)]]" -MemberType ScriptMethod -MemberName Remove -Value ([scriptblock]::Create(@' param ( $Item ) $dummyItem = $null $null = $this.TryRemove($Item, [ref] $dummyItem) '@)) -Force
combined_dataset/train/non-malicious/Find Local Group Members_9.ps1
Find Local Group Members_9.ps1
# Author: Hal Rottenberg # Purpose: Find matching members in a local group # Used tip from RichS here: http://powershellcommunity.org/Forums/tabid/54/view/topic/postid/1528/Default.aspx # Change these two to suit your needs $ChildGroups = "Domain Admins", "Group Two" $LocalGroup = "Administrators" $MemberNames = @() # uncomment this line to grab list of computers from a file # $Servers = Get-Content serverlist.txt $Servers = $env:computername # for testing on local computer foreach ( $Server in $Servers ) { $Group= [ADSI]"WinNT://$Server/$LocalGroup,group" $Members = @($Group.psbase.Invoke("Members")) $Members | ForEach-Object { $MemberNames += $_.GetType().InvokeMember("Name", 'GetProperty', $null, $_, $null) } $ChildGroups | ForEach-Object { $output = "" | Select-Object Server, Group, InLocalAdmin $output.Server = $Server $output.Group = $_ $output.InLocalAdmin = $MemberNames -contains $_ Write-Output $output } }
combined_dataset/train/non-malicious/sample_2_85.ps1
sample_2_85.ps1
# # Module manifest for module 'OCI.PSModules.Lockbox' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Lockbox.dll' # Version number of this module. ModuleVersion = '93.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '24788d7a-8305-474c-a1c0-add3a2ca16a0' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Lockbox Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '93.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Lockbox.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Export-OCILockboxAccessRequests', 'Get-OCILockbox', 'Get-OCILockboxAccessMaterials', 'Get-OCILockboxAccessRequest', 'Get-OCILockboxAccessRequestInternal', 'Get-OCILockboxAccessRequestsList', 'Get-OCILockboxApprovalTemplate', 'Get-OCILockboxApprovalTemplatesList', 'Get-OCILockboxesList', 'Get-OCILockboxWorkRequest', 'Get-OCILockboxWorkRequestErrorsList', 'Get-OCILockboxWorkRequestLogsList', 'Get-OCILockboxWorkRequestsList', 'Invoke-OCILockboxHandleAccessRequest', 'Move-OCILockboxApprovalTemplateCompartment', 'Move-OCILockboxCompartment', 'New-OCILockbox', 'New-OCILockboxAccessRequest', 'New-OCILockboxApprovalTemplate', 'Remove-OCILockbox', 'Remove-OCILockboxApprovalTemplate', 'Stop-OCILockboxWorkRequest', 'Update-OCILockbox', 'Update-OCILockboxApprovalTemplate' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Lockbox' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/2929.ps1
2929.ps1
Framework '4.5.1x86' task default -depends MsBuild task MsBuild { if ( $IsMacOS -OR $IsLinux ) {} else { $output = &msbuild /version /nologo 2>&1 Assert ($output -NotLike '12.0') '$output should contain 12.0' } }
combined_dataset/train/non-malicious/2785.ps1
2785.ps1
if (Get-Command logparser.exe) { $lpquery = @" SELECT COUNT(Entry) as ct, Entry FROM *DNSCache.csv GROUP BY Entry ORDER BY ct ASC "@ & logparser -stats:off -i:csv -dtlines:0 -rtp:-1 "$lpquery" } else { $ScriptName = [System.IO.Path]::GetFileName($MyInvocation.ScriptName) "${ScriptName} requires logparser.exe in the path." }
combined_dataset/train/non-malicious/3480.ps1
3480.ps1
function Create-ResourceGroupForTest ($location = 'westus') { $rgName = Get-ResourceGroupNameForTest $rg = New-AzResourceGroup -Name $rgName -Location $location -Force return $rg } function Remove-ResourceGroupForTest ($rg) { Remove-AzResourceGroup -Name $rg.ResourceGroupName -Force } function Create-VM( [string] $resourceGroupName, [string] $vmName, [string] $location) { $subnetName = $vmName + "subnet" $vnetName= $vmName + "vnet" $pipName = $vmName + "pip" $subnetConfig = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 192.168.1.0/24 $vnet = New-AzVirtualNetwork -ResourceGroupName $resourceGroupName -Location $location ` -Name $vnetName -AddressPrefix 192.168.0.0/16 -Subnet $subnetConfig $vnet = Get-AzVirtualNetwork -ResourceGroupName $resourceGroupName -Name $vnetName $pip = New-AzPublicIpAddress -ResourceGroupName $resourceGroupName -Location $location ` -AllocationMethod Static -IdleTimeoutInMinutes 4 -Name $pipName $pip = Get-AzPublicIpAddress -ResourceGroupName $resourceGroupName -Name $pipName $nsgRuleRDP = New-AzNetworkSecurityRuleConfig -Name 'RDPRule' -Protocol Tcp ` -Direction Inbound -Priority 1000 -SourceAddressPrefix * -SourcePortRange * ` -DestinationAddressPrefix * -DestinationPortRange 3389 -Access Allow $nsgRuleSQL = New-AzNetworkSecurityRuleConfig -Name 'MSSQLRule' -Protocol Tcp ` -Direction Inbound -Priority 1001 -SourceAddressPrefix * -SourcePortRange * ` -DestinationAddressPrefix * -DestinationPortRange 1433 -Access Allow $nsgName = $vmName + 'nsg' $nsg = New-AzNetworkSecurityGroup -ResourceGroupName $resourceGroupName ` -Location $location -Name $nsgName ` -SecurityRules $nsgRuleRDP,$nsgRuleSQL $nsg = Get-AzNetworkSecurityGroup -ResourceGroupName $resourceGroupName -Name $nsgName $interfaceName = $vmName + 'int' $subnetId = $vnet.Subnets[0].Id $interface = New-AzNetworkInterface -Name $interfaceName ` -ResourceGroupName $resourceGroupName -Location $location ` -SubnetId $subnetId -PublicIpAddressId $pip.Id ` -NetworkSecurityGroupId $nsg.Id $interface = Get-AzNetworkInterface -ResourceGroupName $resourceGroupName -Name $interfaceName $cred = Get-DefaultCredentialForTest $vmConfig = New-AzVMConfig -VMName $vmName -VMSize Standard_DS13_V2 | Set-AzVMOperatingSystem -Windows -ComputerName $vmName -Credential $cred -ProvisionVMAgent -EnableAutoUpdate | Set-AzVMSourceImage -PublisherName 'MicrosoftSQLServer' -Offer 'SQL2017-WS2016' -Skus 'Enterprise' -Version 'latest' | Add-AzVMNetworkInterface -Id $interface.Id return New-AzVM -ResourceGroupName $resourceGroupName -Location $location -VM $vmConfig } function Get-DefaultCredentialForTest() { $user = Get-DefaultUser $pswd = Get-DefaultPassword $securePswd = ConvertTo-SecureString -String $pswd -AsPlainText -Force return New-Object -TypeName System.Management.Automation.PSCredential -ArgumentList $user, $securePswd } function Get-LocationForTest() { $location = Get-Location -providerNamespace "Microsoft.SqlVirtualMachine" -resourceType "SqlVirtualMachines" -preferredLocation "East US" return $location } function Get-ResourceGroupNameForTest() { $nr = getAssetName "rg-" return $nr } function Get-SqlVirtualMachineGroupName() { $nr = getAssetName "psgr" return $nr } function Get-DefaultUser() { return 'myvmadmin' } function Get-DefaultSqlService() { return 'sqlservice' } function Get-DefaultPassword() { return getAssetName "Sql1@" } function Get-DomainForTest() { return 'Domain' } function Get-StorageaccountNameForTest() { $nr = getAssetName 'st' return $nr } function Validate-SqlVirtualMachine($sqlvm1, $sqlvm2) { $tmp = Assert-NotNull $sqlvm1 $tmp = Assert-NotNull $sqlvm2 $tmp = Assert-AreEqual $sqlvm1.ResourceId $sqlvm2.ResourceId $tmp = Assert-AreEqual $sqlvm1.Name $sqlvm2.Name $tmp = Assert-AreEqual $sqlvm1.ResourceGroupName $sqlvm2.ResourceGroupName $tmp = Assert-AreEqual $sqlvm1.SqlManagementType $sqlvm2.SqlManagementType $tmp = Assert-AreEqual $sqlvm1.LicenseType $sqlvm2.LicenseType $tmp = Assert-AreEqual $sqlvm1.Offer $sqlvm2.Offer $tmp = Assert-AreEqual $sqlvm1.Sku $sqlvm2.Sku } function Validate-SqlVirtualMachineGroup($group1, $group2) { $tmp = Assert-NotNull $group1 $tmp = Assert-NotNull $group2 $tmp = Assert-AreEqual $group1.ResourceId $group2.ResourceId $tmp = Assert-AreEqual $group1.Name $group2.Name $tmp = Assert-AreEqual $group1.ResourceGroupName $group2.ResourceGroupName $tmp = Assert-AreEqual $group1.Offer $group2.Offer $tmp = Assert-AreEqual $group1.Sku $group2.Sku } function Get-WsfcDomainProfileForTest( [string] $resourceGroupName, [string] $location, [string] $user, [string] $sqllogin, [string] $domainName, [string] $blobAccount, [string] $storageAccountKey ) { $props = @{ DomainFqdn = $domainName + '.com' ClusterOperatorAccount = $user + '@' + $domainName + '.com' ClusterBootstrapAccount = $user + '@' + $domainName + '.com' SqlServiceAccount = $sqllogin + '@' + $domainName + '.com' StorageAccountUrl = $blobAccount StorageAccountPrimaryKey = $storageAccountKey } return new-object Microsoft.Azure.Management.SqlVirtualMachine.Models.WsfcDomainProfile -Property $props } function Create-SqlVM ( [string] $resourceGroupName, [string] $vmName, [string] $location ) { $vm = Create-VM $resourceGroupName $vmName $location $sqlvm = New-AzSqlVM -ResourceGroupName $resourceGroupName -Name $vmName -LicenseType 'PAYG' -Sku 'Enterprise' -Location $location $sqlvm = Get-AzSqlVM -ResourceGroupName $resourceGroupName -Name $vmName return $sqlvm } function Create-SqlVMGroup( [string] $resourceGroupName, [string] $groupName, [string] $location ) { $storageAccountName = Get-StorageaccountNameForTest $storageAccount = New-AzStorageAccount -ResourceGroupName $resourceGroupName -Name $storageAccountName -Location $location -Type Standard_LRS -Kind StorageV2 $storageAccount = Get-AzStorageAccount -ResourceGroupName $resourceGroupName -Name $storageAccountName $tmp = Assert-NotNull $storageAccount $tmp = Assert-NotNull $storageAccount.PrimaryEndpoints $tmp = Assert-NotNull $storageAccount.PrimaryEndpoints.Blob $storageAccountKey = (Get-AzStorageAccountKey -ResourceGroupName $resourceGroupName -Name $storageAccountName).Value[0] $blobAccount = $storageAccount.PrimaryEndpoints.Blob $user = Get-DefaultUser $domain = Get-DomainForTest $sqllogin = Get-DefaultSqlService $profile = Get-WsfcDomainProfileForTest $resourceGroupName $location $user $sqllogin $domain $blobAccount $storageAccountKey $secureKey = ConvertTo-SecureString $profile.StorageAccountPrimaryKey -AsPlainText -Force $group = New-AzSqlVMGroup -ResourceGroupName $resourceGroupName -Name $groupName -Location $location -ClusterOperatorAccount $profile.ClusterOperatorAccount ` -ClusterBootstrapAccount $profile.ClusterBootstrapAccount ` -SqlServiceAccount $profile.SqlServiceAccount -StorageAccountUrl $profile.StorageAccountUrl ` -StorageAccountPrimaryKey $secureKey -DomainFqdn $profile.DomainFqdn ` -Offer 'SQL2017-WS2016' -Sku 'Enterprise' $group = Get-AzSqlVMGroup -ResourceGroupName $resourceGroupName -Name $groupName return $group }
combined_dataset/train/non-malicious/3006.ps1
3006.ps1
Set-StrictMode -Version Latest Describe 'Testing Gherkin Step' -Tag Gherkin { It 'Generates a function named "GherkinStep" with mandatory name and test parameters' { $command = &(Get-Module Pester) { Get-Command GherkinStep -Module Pester } $command | Should -Not -Be $null $parameter = $command.Parameters['Name'] $parameter | Should -Not -Be $null $parameter.ParameterType.Name | Should -Be 'String' $attribute = $parameter.Attributes | Where-Object { $_.TypeId -eq [System.Management.Automation.ParameterAttribute] } $isMandatory = $null -ne $attribute -and $attribute.Mandatory $isMandatory | Should -Be $true $parameter = $command.Parameters['Test'] $parameter | Should -Not -Be $null $parameter.ParameterType.Name | Should -Be 'ScriptBlock' $attribute = $parameter.Attributes | Where-Object { $_.TypeId -eq [System.Management.Automation.ParameterAttribute] } $isMandatory = $null -ne $attribute -and $attribute.Mandatory $isMandatory | Should -Be $true } It 'Generates aliases Given, When, Then, And, But for GherkinStep' { $command = &(Get-Module Pester) { Get-Alias -Definition GherkinStep | Select -Expand Name } $command | Should -Be "And", "But", "Given", "Then", "When" } It 'Populates the GherkinSteps module variable' { When "I Click" { } & ( Get-Module Pester ) { $GherkinSteps.Keys -eq "I Click" } | Should -Be "I Click" } }
combined_dataset/train/non-malicious/sample_27_16.ps1
sample_27_16.ps1
# ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Create a new graph query. .Description Create a new graph query. .Example PS C:\> {{ Add code here }} {{ Add output here }} .Example PS C:\> {{ Add code here }} {{ Add output here }} .Inputs Microsoft.Azure.PowerShell.Cmdlets.ResourceGraph.Models.Api20180901Preview.IGraphQueryResource .Inputs Microsoft.Azure.PowerShell.Cmdlets.ResourceGraph.Models.IResourceGraphIdentity .Outputs Microsoft.Azure.PowerShell.Cmdlets.ResourceGraph.Models.Api20180901Preview.IGraphQueryResource .Notes COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. INPUTOBJECT <IResourceGraphIdentity>: Identity Parameter [Id <String>]: Resource identity path [ResourceGroupName <String>]: The name of the resource group. [ResourceName <String>]: The name of the Graph Query resource. [SubscriptionId <String>]: The Azure subscription Id. PROPERTY <IGraphQueryResource>: Graph Query entity definition. Query <String>: KQL query that will be graph. [Location <String>]: The location of the resource [Tag <IResourceTags>]: Resource tags [(Any) <String>]: This indicates any property can be added to this object. [Description <String>]: The description of a graph query. .Link https://learn.microsoft.com/powershell/module/az.resourcegraph/new-azresourcegraphquery #> function New-AzResourceGraphQuery { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.ResourceGraph.Models.Api20180901Preview.IGraphQueryResource])] [CmdletBinding(DefaultParameterSetName='CreateExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter(ParameterSetName='CreateExpanded', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.ResourceGraph.Category('Path')] [System.String] # The name of the Graph Query resource. ${Name}, [Parameter(ParameterSetName='CreateExpanded', Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.ResourceGraph.Category('Path')] [System.String] # The name of the resource group. ${ResourceGroupName}, [Parameter(ParameterSetName='CreateExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.ResourceGraph.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.ResourceGraph.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] # The Azure subscription Id. ${SubscriptionId}, [Parameter(ParameterSetName='CreateExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.ResourceGraph.Category('Body')] [System.String] # The description of a graph query. ${Description}, [Parameter(ParameterSetName='CreateExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.ResourceGraph.Category('Body')] [System.String] # The location of the resource ${Location}, [Parameter(ParameterSetName='CreateExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.ResourceGraph.Category('Body')] [System.String] # KQL query that will be graph. ${Query}, [Parameter(ParameterSetName='CreateExpanded', HelpMessage="The content of the file will be passed to the query parameter.")] [Microsoft.Azure.PowerShell.Cmdlets.ResourceGraph.Category('Body')] [System.String] # KQL query that will be graph. ${File}, [Parameter(ParameterSetName='CreateExpanded')] [Microsoft.Azure.PowerShell.Cmdlets.ResourceGraph.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.ResourceGraph.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.ResourceGraph.Models.Api20180901Preview.IResourceTags]))] [System.Collections.Hashtable] # Resource tags ${Tag}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ResourceGraph.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ResourceGraph.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ResourceGraph.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.ResourceGraph.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ResourceGraph.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.ResourceGraph.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ResourceGraph.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ResourceGraph.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ResourceGraph.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { try { # Get content from file into the parameter query. if ($PSBoundParameters.ContainsKey('File')) { $PSBoundParameters['Query'] = Get-Content -Path $PSBoundParameters['File'] $null = $PSBoundParameters.Remove('File') } Az.ResourceGraph.private\New-AzResourceGraphQuery_CreateExpanded @PSBoundParameters } catch { throw } } } # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCr8y9qmUUaSVIH # s6vQV8i/uRhnpNg5zYrxv0oV1YOIDqCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAad # dOyJJlOyJDj7gk2mWbCMrK9aUp5vwqFJ/xCFSu3lMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAKu3rwOuZ7Ja8adX6AJKX3c3SVKmORU4DKwuB # mfWWHpSfmFOib7qpRdxugEsScKMKXK8p4QKCdfi/bus8vKZw5fCN0QjU9Ie+CARd # WnZDXT5coJiPOIemSg06wHNs1Nr16xrOqsSkpWqHxhHvJDuishhd8RXBSU7oJMjH # QBb/GKfyQZNKthKAhUAvCLX1bMsjN96eJK38bZvpwDoe+/E/TZzb8krTmf6SKpgU # cuL4gngJrQo8ryl6iTDg+ANH/zZklnkrVCVCXCrHLmgaQZMHOsGibaO6vmaEMCdK # 6ALzwKrpvwsDNli8pu5s+F8AX025k2XN5SPS0FRe70nAKv4Qw6GCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAXT7p3fL/66mlbPAl7MSuqjh9DolvlmxEb # vXVx1WGNPAIGZjOqm5njGBMyMDI0MDUxNjA2NDIxNC42NDFaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA # 8z20C6MAAQAAAeUwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjozQkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl7 # 4Drau2O6LLrJO3HyTvO9aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIY # SyJHjkMIUGmuh0rPV5/2+UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4 # dru2Gymmt1rrGcNe800CcD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/Pllq # cM/eWntkQMs0lK0zmCfH+Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgE # izY+vFmgx+zDuuU/GChDK7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1J # VqpP3dpKPAP/4udNqpR5HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/ # 8cZ11kco1JvUyOQ8x/JDkMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQu # QR7FV7eCqV/lfajoLpPNx/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQm # z2L96TdxnIO2OGmYxBAAZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CTocc # c/Up/jpFfQitLfjd71cS+cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zd # JzJnGskVJ5ozhji0YRscv1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQU3/+fh7tNczEifEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBADP6whOFjD1ad8GkEJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKG # gFBiWwI6XOgw82hdolDiMDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEup # gC48I+b+2x2VNgGJUsQIyPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EU # wFeO5+3oSX4JeCNZvgyUOzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQg # oYipbaTvv7xmixUJGTbixYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjD # YZyeHyAysMEALbIhdXgHEh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hu # dctnXCG55JuMw/wb7c71RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si3 # 6Tql84VfpYe9iHmy7PqqxqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5Sflu # uJ/MB61yRvT1mUx3lyppO22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTD # C+TdZQlj+VMgIm8ZeEIRNF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaY # FpxBZUE8mnLKuDlYobjrxh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjozQkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWD # d85EpM6RiwqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOnv800wIhgPMjAyNDA1MTYxMDUxNTdaGA8yMDI0MDUx # NzEwNTE1N1owdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6e/zTQIBADAHAgEAAgIG # 2zAHAgEAAgIUMDAKAgUA6fFEzQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # AE/ZvDwugy6NnYyIDV7uOSLWi/ufyQ+0+8oP/z2EFLWVt1PPV9ckDwOXfMyZUrme # W13sfHNC/IxUxFOo4o6fzlnV7jGD2rKF1A4HHzrz25qNAoYIhSmyXWxlEnQSsjaf # sbqZ4nebWLCpisf9XvpkFD9uxVS2ajQVLxRI4TtSt9PjMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAA # AeUwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQgcdOlC1G6RMhdhrBrPBZaESIpXnEHwFGChZn6RQ6b # cgYwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb # 8I/pAof01CwhbxUH9U697TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB5Y9qwPM9tAujAAEAAAHlMCIEIAbnS84eHhUBUYVK4RZHP3oa # XBAIVzGN5U0dVtVYzunVMA0GCSqGSIb3DQEBCwUABIICAEKSp3kO6A68eKwoPq3G # TVQyT3JvlB/DBYz3Uf+2EBYIhaffGVh1PBZlvCqBidvqm/uPdwos+9Jq9z0IfzRJ # UbvdS7V8JuUkJLkYbNKumpOEag895G5W2EgDDDRuaUuSKejVmCpn++Hj/MzZDLVS # hX0Gc+fpzNTtBYxfdk9BtkslOKfPa4g5YULLYotXmSIkdbOdm/n3O/QzfB6ri7X2 # 1t1SgKZW/L48rTWVAu5pG+thEd8nyQqSZ/39JDaF3eGscP7vuCbjvAu9Uyn0ulJ9 # bMmvl4TrGTc4BLUCy+T3cKi24C+r8ZeLUvMRTJX/8la3EFWPr1ExYu6fdUYoP905 # moWFJQImdTYjvzbJY0/Xj9I/lXRSteuMSA0LjN090Fqbs85xkG9rq+wXYFhcuZaU # hQajPgq83ZQnITS8mBMw+Ub2+eHo8qq0G931EBiW7i7e4IScPp3rZlo2yNkSwYLi # 7p+HEZwYo0mp+euITSD15k7B21b4eLiEyRx/jjnh6CXhFNeV84fcyU7wvQ0nOPLu # dWxH9Cln9l6RhaxUxxerzl5sTtcV3ZEzvPEwW66J4fPGgUfV7G/CzLZL5BR/AGrl # 6B1GovFnZ55bdSqv46S4Z2gP34zq1ChYJru7I5jqqNvBNZAxh7BCmBzfjSFid5qr # h1WhuMdA534Gln6NTGE9YnrU # SIG # End signature block
combined_dataset/train/non-malicious/sample_6_36.ps1
sample_6_36.ps1
[dynamic, provider("dcismprovider"), Association] class DCIM_SPHostedRBAPService : DCIM_SPHostedService { [ Description ("Dependent represents the object that is dependent on the Antecedent."), Override ("Dependent"), Required, Weak ] CIM_Service REF Dependent; [ Description ("Antecedent represents the independent object in this association."), Max (1), Min (1), Override ("Antecedent"), Required ] CIM_System REF Antecedent; }; /* SIG # Begin signature block */ /* MIItDQYJKoZIhvcNAQcCoIIs/jCCLPoCAQExDzANBglghkgBZQMEAgEFADB5Bgor */ /* BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG */ /* KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA8a6zSWgrhHUPK */ /* 1nVGUwUxl1VsZ3OBvIJFX3RgvDZi3aCCEmMwggXfMIIEx6ADAgECAhBOQOQ3VO3m */ /* jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE */ /* ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s */ /* ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv */ /* ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy */ /* dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx */ /* MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu */ /* MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp */ /* b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK */ /* AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq */ /* gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l */ /* OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr */ /* +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d */ /* vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 */ /* HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn */ /* DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig */ /* nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z */ /* HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK */ /* Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u */ /* DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC */ /* AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw */ /* FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG */ /* AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn */ /* MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp */ /* MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O */ /* BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp */ /* UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 */ /* BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ */ /* LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv */ /* 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF */ /* VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX */ /* bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG */ /* CDCCA/CgAwIBAgIQBu9mzEaGqLK0hNoZKy1rYTANBgkqhkiG9w0BAQ0FADBPMQsw */ /* CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 */ /* cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yNDA0MTkwOTE2MDlaFw0y */ /* NTA1MTIwOTE2MDhaMIGEMQswCQYDVQQGEwJVUzEOMAwGA1UECBMFVGV4YXMxEzAR */ /* BgNVBAcTClJvdW5kIFJvY2sxEjAQBgNVBAoTCURlbGwgSW5jLjEoMCYGA1UECxMf */ /* U2VydmVyIFN5c3RlbXMgTWdtdCBFbmdpbmVlcmluZzESMBAGA1UEAxMJRGVsbCBJ */ /* bmMuMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAvFatHoJS1lbvBD4U */ /* x/jt6hrhOHlGpntV/TPJbKwAdvG6SCT6MfdFasEGShyzypfx8adv3v+sFWo84yYB */ /* GqnqH/Kkj48BTKNREXjN3x/jLZrv+rVRQJYG79us7u3vQVSBX0ds0Jcd9f7u2REE */ /* aLBKrd7ZwxmsHoiAaqKYBm8nMo4kmH4xOw6cOXxUW6mkYxNQxn60nxV5A2ZJvUKn */ /* YvanuULo5jGrl+t2A5jInOLyxSmNU62DdLbyhtE3B6cEhe5yQ54hi7d6c5IM2fNH */ /* FNrQkRavAWUyAxPPBpTSsR0g/IkNymbNPCTjgvDQOIJBcMp0C+q158RIBiE+IMwq */ /* QGi7aUvUUhzTQG9NcSDQan3hMmYfevU3RLQMw4OcoGIT/jOSYmgtcLHiB6lnOG/h */ /* iJ8EsQgW1s2yJ7vG2Fo/IHvQjbfFxefO+gluw4UjcLZgIqACIlFNYGaq4rzKtTeF */ /* 1NNy6DjjbJV2nt/JlD68YlFg0pU9rGDKglZFWvfWiLId8IJnAgMBAAGjggEoMIIB */ /* JDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRFrXrMchlvXUnwqKV0rQOPRSgzqzAf */ /* BgNVHSMEGDAWgBTvn7p5sHPyJR54nANSnBtThN6N7TBnBggrBgEFBQcBAQRbMFkw */ /* IwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAC */ /* hiZodHRwOi8vYWlhLmVudHJ1c3QubmV0L292Y3MyLWNoYWluLnA3YzAxBgNVHR8E */ /* KjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L292Y3MyLmNybDAOBgNV */ /* HQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwEwYDVR0gBAwwCjAIBgZn */ /* gQwBBAEwDQYJKoZIhvcNAQENBQADggIBACoeAWs2aV9gf+TF4AGOKc454/E55mVR */ /* Yz42M1ksqASl2j+ulObFIWcuy/paLjWhMSulehEA8Zb+YQ89fR6Y0TgJ0Eh09aK5 */ /* +GARB7q/+a+gRIw7nfrwmjMkXAwL+9lmbc1X64fEUuKY2NVdksjKC7xRKNMb5i50 */ /* NQyVN9neCJKIVSQDiBMXGgtDkAqPe1sH7/NGGQZKCXhIg3f3caq7dr/mZoiVAIOB */ /* XtHr++65DqG61aWyZV5tCfzSvXFvLpL0dbu14gH6gEo5Zvlp226Vk+HKr/cQ2Ynj */ /* /xXw/5UWHvmKwDOAkA/ld64jA4m466aoP2tKse8z1kSa/zw1wRSp0bwPn23gj2IO */ /* NmEG9dM9Lv3c5FH+oBKNuqJ2Vj5viCHVZEcw40UDQqdfboVK+Y1XSkNfa1CUjzCu */ /* Q2J3XMrfVK9ZCecopoCAXzYem7e/G/Md3rTQky2PTf7Z1hgYlqxisPoGEV3nguIg */ /* ooMbBkHbl/4iWAB237woZFlX0imdO5se7el67/nx58CSLYjNmj82Y4cthnFOrwP4 */ /* mUW7zVXlq9sZP9fCcrdrNMUF4KYS2x7/IIgHURKvOTjyT6f+ZRedEfwOlM1D12/l */ /* eL1OX+dPZq5BGGHal3r1xbLdLxHUlMg+IJJk0wmMwmSF3kzbqbMUTaM1FX9x0+E8 */ /* 4YVlsJB1ttLHMIIGcDCCBFigAwIBAgIQce9VdK81VMNaLGn2b0trzTANBgkqhkiG */ /* 9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFC */ /* MEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9u */ /* IEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjA0NVoXDTQwMTIyOTIzNTkw */ /* MFowTzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNV */ /* BAMTH0VudHJ1c3QgQ29kZSBTaWduaW5nIENBIC0gT1ZDUzIwggIiMA0GCSqGSIb3 */ /* DQEBAQUAA4ICDwAwggIKAoICAQCemXYXGp5WFwhjLJNNg2GEMzQCttlioN7CDrkg */ /* TMhXnQ/dVFsNDNYB3S9I4ZEJ4dvIFQSCtnvw2NYwOxlxcPuoppf2KV2kDKn0Uz5X */ /* 2wxObvx2218k6apfQ+OT5w7PyiW8xEwwC1oP5gb05W4MmWZYT4NhwnN8XCJvAUXF */ /* D/dAT2RL0BcKqQ4eAi+hj0zyZ1DbPuSfwk8/dOsxpNCU0Jm8MJIJasskzaLYdlLQ */ /* TnWYT2Ra0l6D9FjAXWp1xNg/ZDqLFA3YduHquWvnEXBJEThjE27xxvq9EEU1B+Z2 */ /* FdB1FqrCQ1f+q/5jc0YioLjz5MdwRgn5qTdBmrNLbB9wcqMH9jWSdBFkbvkC1cCS */ /* lfGXWX4N7qIl8nFVuJuNv83urt37DOeuMk5QjaHf0XO/wc5/ddqrv9CtgjjF54jt */ /* om06hhG317DhqIs7DEEXml/kW5jInQCf93PSw+mfBYd5IYPWC+3RzAif4PHFyVi6 */ /* U1/Uh7GLWajSXs1p0D76xDkJr7S17ec8+iKH1nP5F5Vqwxz1VXhf1PoLwFs/jHgV */ /* DlpMOm7lJpjQJ8wg38CGO3qNZUZ+2WFeqfSuPtT8r0XHOrOFBEqLyAlds3sCKFnj */ /* hn2AolhAZmLgOFWDq58pQSa6u+nYZPi2uyhzzRVK155z42ZMsVGdgSOLyIZ3srYs */ /* NyJwIQIDAQABo4IBLDCCASgwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU */ /* 75+6ebBz8iUeeJwDUpwbU4Teje0wHwYDVR0jBBgwFoAUgrrWPZfOn89x6JI3r/2z */ /* tWk1V88wMwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5l */ /* bnRydXN0Lm5ldDAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3Qu */ /* bmV0L2NzYnIxLmNybDAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUH */ /* AwMwRQYDVR0gBD4wPDAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cu */ /* ZW50cnVzdC5uZXQvcnBhMAgGBmeBDAEEATANBgkqhkiG9w0BAQ0FAAOCAgEAXvOG */ /* mTXBee7wEK/XkkPShdBb4Jig4HFRyRTLUJpgDrAEJkmxz+m6mwih2kNd1G8jorn4 */ /* QMdH/k0BC0iQP8jcarQ+UzUovkBKR4VqHndAzIB/YbQ8T3mo5qOmoH5EhnG/EhuV */ /* gXL3DaXQ3mefxqK48Wr5/P50ZsZk5nk9agNhTksfzCBiywIY7GPtfnE/lroLXmgi */ /* Z+wfwNIFFmaxsqTq/MWVo40SpfWN7xsgzZn35zLzWXEf3ZTmeeVSIxBWKvxZOL+/ */ /* eSWSasf9q2d3cbEEfTWtFME+qPwjF1YIGHzXeiJrkWrMNUVtTzudQ50FuJ3z/DQh */ /* XAQYMlc4NMHKgyNGpogjIcZ+FICrse+7C6wJP+5TkTGz4lREqrV9MDwsI5zoP6NY */ /* 6kAIF6MgX3rADNuq/wMWAw10ZCKalF4wNXYT9dPh4+AHytnqRYhGnFTVEOLzMglA */ /* tudcFzL+zK/rbc9gPHXz7lxgQFUbtVmvciNoTZx0BAwQya9QW6cNZg+W5ZqV4CCi */ /* GtCw7jhJnipnnpGWbJjbxBBtYHwebkjntn6vMwcSce+9lTu+qYPUQn23pzTXX4aR */ /* ta9WWNpVfRe927zNZEEVjTFRBk+0LrKLPZzzTeNYA1TMrIj4UjxOS0YJJRn/Feen */ /* mEYufbrq4+N8//m5GZW+drkNebICURpKyJ+IwkMxghoAMIIZ/AIBATBjME8xCzAJ */ /* BgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQDEx9FbnRy */ /* dXN0IENvZGUgU2lnbmluZyBDQSAtIE9WQ1MyAhAG72bMRoaosrSE2hkrLWthMA0G */ /* CWCGSAFlAwQCAQUAoIGsMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG */ /* AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCBME6UPWVBw */ /* oJUEmw23dPEFfjfyn0uvIOEMTC+9aDDtxTBABgorBgEEAYI3AgEMMTIwMKAWgBQA */ /* RABlAGwAbAAsACAASQBuAGMALqEWgBRodHRwOi8vd3d3LmRlbGwuY29tIDANBgkq */ /* hkiG9w0BAQEFAASCAYAm0eGmXg5o9Thb0YzOiu/Ef6gGVgo+043/Y3b7TfScRsyO */ /* N2eCjyvCtak0ZyGFFhHYUmUaXmsnBYTI2OuR1Sc3Dey7jAQgBVt8CKpXhUUumT1C */ /* 2EcabtdId+k+ZQjaZ9RtYoU9U3mHlSazzuO+kMXmwhPrenikoVQe3bLjTrXi4WNz */ /* szqBfY1Yoem5n7xq805SlRkXYl29dhTMvwWGDkLoG5Eidnc/5h4igiv/cdzMCkBr */ /* TTrB/bAgsTkPqEjz2fEHDHSdbJj8uakxDeUyyGFLn8MYU2GSY5d/8/gQBT4ZXowN */ /* MW3L4eYo9M5NFM9vV+z89JdrYfAPKcdPj7hCM8kKw/tZTElgapH6KIwE6sbo+OB3 */ /* H9GjnbFXDpIFyLre8V5pRunp0HfRmsH+KBT0zHZWEA4q5G3QPZWiOQdQPP7Qbo5c */ /* 2Uu72zOk2cL2ppxxgnUnyJYmggIi+iZGtpaO1+sjMcMDPd+AKxiNTFt3XbQ97LwY */ /* JKEZNhlYdG9zYLVYL5+hghc/MIIXOwYKKwYBBAGCNwMDATGCFyswghcnBgkqhkiG */ /* 9w0BBwKgghcYMIIXFAIBAzEPMA0GCWCGSAFlAwQCAQUAMHcGCyqGSIb3DQEJEAEE */ /* oGgEZjBkAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQguK1M0VL0FfMh */ /* QFHuFRZ4+V8b+5XlNxKLoa0F9sybqbQCEGJh2HohB9HHLfIWIkCeHjwYDzIwMjQw */ /* OTIwMDcwMTM3WqCCEwkwggbCMIIEqqADAgECAhAFRK/zlJ0IOaa/2z9f5WEWMA0G */ /* CSqGSIb3DQEBCwUAMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg */ /* SW5jLjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1 */ /* NiBUaW1lU3RhbXBpbmcgQ0EwHhcNMjMwNzE0MDAwMDAwWhcNMzQxMDEzMjM1OTU5 */ /* WjBIMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xIDAeBgNV */ /* BAMTF0RpZ2lDZXJ0IFRpbWVzdGFtcCAyMDIzMIICIjANBgkqhkiG9w0BAQEFAAOC */ /* Ag8AMIICCgKCAgEAo1NFhx2DjlusPlSzI+DPn9fl0uddoQ4J3C9Io5d6OyqcZ9xi */ /* FVjBqZMRp82qsmrdECmKHmJjadNYnDVxvzqX65RQjxwg6seaOy+WZuNp52n+W8PW */ /* KyAcwZeUtKVQgfLPywemMGjKg0La/H8JJJSkghraarrYO8pd3hkYhftF6g1hbJ3+ */ /* cV7EBpo88MUueQ8bZlLjyNY+X9pD04T10Mf2SC1eRXWWdf7dEKEbg8G45lKVtUfX */ /* eCk5a+B4WZfjRCtK1ZXO7wgX6oJkTf8j48qG7rSkIWRw69XloNpjsy7pBe6q9iT1 */ /* HbybHLK3X9/w7nZ9MZllR1WdSiQvrCuXvp/k/XtzPjLuUjT71Lvr1KAsNJvj3m5k */ /* GQc3AZEPHLVRzapMZoOIaGK7vEEbeBlt5NkP4FhB+9ixLOFRr7StFQYU6mIIE9Np */ /* HnxkTZ0P387RXoyqq1AVybPKvNfEO2hEo6U7Qv1zfe7dCv95NBB+plwKWEwAPoVp */ /* dceDZNZ1zY8SdlalJPrXxGshuugfNJgvOuprAbD3+yqG7HtSOKmYCaFxsmxxrz64 */ /* b5bV4RAT/mFHCoz+8LbH1cfebCTwv0KCyqBxPZySkwS0aXAnDU+3tTbRyV8IpHCj */ /* 7ArxES5k4MsiK8rxKBMhSVF+BmbTO77665E42FEHypS34lCh8zrTioPLQHsCAwEA */ /* AaOCAYswggGHMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB */ /* /wQMMAoGCCsGAQUFBwMIMCAGA1UdIAQZMBcwCAYGZ4EMAQQCMAsGCWCGSAGG/WwH */ /* ATAfBgNVHSMEGDAWgBS6FtltTYUvcyl2mi91jGogj57IbzAdBgNVHQ4EFgQUpbbv */ /* E+fvzdBkodVWqWUxo97V40kwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDovL2NybDMu */ /* ZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRpbWVT */ /* dGFtcGluZ0NBLmNybDCBkAYIKwYBBQUHAQEEgYMwgYAwJAYIKwYBBQUHMAGGGGh0 */ /* dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBYBggrBgEFBQcwAoZMaHR0cDovL2NhY2Vy */ /* dHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRp */ /* bWVTdGFtcGluZ0NBLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAgRrW3qCptZgXvHCN */ /* T4o8aJzYJf/LLOTN6l0ikuyMIgKpuM+AqNnn48XtJoKKcS8Y3U623mzX4WCcK+3t */ /* PUiOuGu6fF29wmE3aEl3o+uQqhLXJ4Xzjh6S2sJAOJ9dyKAuJXglnSoFeoQpmLZX */ /* eY/bJlYrsPOnvTcM2Jh2T1a5UsK2nTipgedtQVyMadG5K8TGe8+c+njikxp2oml1 */ /* 01DkRBK+IA2eqUTQ+OVJdwhaIcW0z5iVGlS6ubzBaRm6zxbygzc0brBBJt3eWpdP */ /* M43UjXd9dUWhpVgmagNF3tlQtVCMr1a9TMXhRsUo063nQwBw3syYnhmJA+rUkTfv */ /* TVLzyWAhxFZH7doRS4wyw4jmWOK22z75X7BC1o/jF5HRqsBV44a/rCcsQdCaM0qo */ /* NtS5cpZ+l3k4SF/Kwtw9Mt911jZnWon49qfH5U81PAC9vpwqbHkB3NpE5jreODsH */ /* XjlY9HxzMVWggBHLFAx+rrz+pOt5Zapo1iLKO+uagjVXKBbLafIymrLS2Dq4sUaG */ /* a7oX/cR3bBVsrquvczroSUa31X/MtjjA2Owc9bahuEMs305MfR5ocMB3CtQC4Fxg */ /* uyj/OOVSWtasFyIjTvTs0xf7UGv/B3cfcZdEQcm4RtNsMnxYL2dHZeUbc7aZ+Wss */ /* BkbvQR7w8F/g29mtkIBEr4AQQYowggauMIIElqADAgECAhAHNje3JFR82Ees/Shm */ /* Kl5bMA0GCSqGSIb3DQEBCwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdp */ /* Q2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERp */ /* Z2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMjAzMjMwMDAwMDBaFw0zNzAzMjIy */ /* MzU5NTlaMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7 */ /* MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1l */ /* U3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDGhjUG */ /* SbPBPXJJUVXHJQPE8pE3qZdRodbSg9GeTKJtoLDMg/la9hGhRBVCX6SI82j6ffOc */ /* iQt/nR+eDzMfUBMLJnOWbfhXqAJ9/UO0hNoR8XOxs+4rgISKIhjf69o9xBd/qxkr */ /* PkLcZ47qUT3w1lbU5ygt69OxtXXnHwZljZQp09nsad/ZkIdGAHvbREGJ3HxqV3rw */ /* N3mfXazL6IRktFLydkf3YYMZ3V+0VAshaG43IbtArF+y3kp9zvU5EmfvDqVjbOSm */ /* xR3NNg1c1eYbqMFkdECnwHLFuk4fsbVYTXn+149zk6wsOeKlSNbwsDETqVcplicu */ /* 9Yemj052FVUmcJgmf6AaRyBD40NjgHt1biclkJg6OBGz9vae5jtb7IHeIhTZgirH */ /* kr+g3uM+onP65x9abJTyUpURK1h0QCirc0PO30qhHGs4xSnzyqqWc0Jon7ZGs506 */ /* o9UD4L/wojzKQtwYSH8UNM/STKvvmz3+DrhkKvp1KCRB7UK/BZxmSVJQ9FHzNklN */ /* iyDSLFc1eSuo80VgvCONWPfcYd6T/jnA+bIwpUzX6ZhKWD7TA4j+s4/TXkt2ElGT */ /* yYwMO1uKIqjBJgj5FBASA31fI7tk42PgpuE+9sJ0sj8eCXbsq11GdeJgo1gJASgA */ /* DoRU7s7pXcheMBK9Rp6103a50g5rmQzSM7TNsQIDAQABo4IBXTCCAVkwEgYDVR0T */ /* AQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxqII+eyG8wHwYD */ /* VR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMG */ /* A1UdJQQMMAoGCCsGAQUFBwMIMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYY */ /* aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2Fj */ /* ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNV */ /* HR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRU */ /* cnVzdGVkUm9vdEc0LmNybDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s */ /* BwEwDQYJKoZIhvcNAQELBQADggIBAH1ZjsCTtm+YqUQiAX5m1tghQuGwGC4QTRPP */ /* MFPOvxj7x1Bd4ksp+3CKDaopafxpwc8dB+k+YMjYC+VcW9dth/qEICU0MWfNthKW */ /* b8RQTGIdDAiCqBa9qVbPFXONASIlzpVpP0d3+3J0FNf/q0+KLHqrhc1DX+1gtqpP */ /* kWaeLJ7giqzl/Yy8ZCaHbJK9nXzQcAp876i8dU+6WvepELJd6f8oVInw1YpxdmXa */ /* zPByoyP6wCeCRK6ZJxurJB4mwbfeKuv2nrF5mYGjVoarCkXJ38SNoOeY+/umnXKv */ /* xMfBwWpx2cYTgAnEtp/Nh4cku0+jSbl3ZpHxcpzpSwJSpzd+k1OsOx0ISQ+UzTl6 */ /* 3f8lY5knLD0/a6fxZsNBzU+2QJshIUDQtxMkzdwdeDrknq3lNHGS1yZr5Dhzq6YB */ /* T70/O3itTK37xJV77QpfMzmHQXh6OOmc4d0j/R0o08f56PGYX/sr2H7yRp11LB4n */ /* LCbbbxV7HhmLNriT1ObyF5lZynDwN7+YAN8gFk8n+2BnFqFmut1VwDophrCYoCvt */ /* lUG3OtUVmDG0YgkPCr2B2RP+v6TR81fZvAT6gt4y3wSJ8ADNXcL50CN/AAvkdgIm */ /* 2fBldkKmKYcJRyvmfxqkhQ/8mJb2VVQrH4D6wPIOK+XW+6kvRBVK5xMOHds3OBqh */ /* K/bt1nz8MIIFjTCCBHWgAwIBAgIQDpsYjvnQLefv21DiCEAYWjANBgkqhkiG9w0B */ /* AQwFADBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYD */ /* VQQLExB3d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVk */ /* IElEIFJvb3QgQ0EwHhcNMjIwODAxMDAwMDAwWhcNMzExMTA5MjM1OTU5WjBiMQsw */ /* CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu */ /* ZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQw */ /* ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz */ /* 7MKnJS7JIT3yithZwuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS */ /* 5F/WBTxSD1Ifxp4VpX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7 */ /* bXHiLQwb7iDVySAdYyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfI */ /* SKhmV1efVFiODCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jH */ /* trHEtWoYOAMQjdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14 */ /* Ztk6MUSaM0C/CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2 */ /* h4mXaXpI8OCiEhtmmnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt */ /* 6zPZxd9LBADMfRyVw4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPR */ /* iQfhvbfmQ6QYuKZ3AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ER */ /* ElvlEFDrMcXKchYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4K */ /* Jpn15GkvmB0t9dmpsh3lGwIDAQABo4IBOjCCATYwDwYDVR0TAQH/BAUwAwEB/zAd */ /* BgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wHwYDVR0jBBgwFoAUReuir/SS */ /* y4IxLVGLp6chnfNtyA8wDgYDVR0PAQH/BAQDAgGGMHkGCCsGAQUFBwEBBG0wazAk */ /* BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsGAQUFBzAC */ /* hjdodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURS */ /* b290Q0EuY3J0MEUGA1UdHwQ+MDwwOqA4oDaGNGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0 */ /* LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcmwwEQYDVR0gBAowCDAGBgRV */ /* HSAAMA0GCSqGSIb3DQEBDAUAA4IBAQBwoL9DXFXnOF+go3QbPbYW1/e/Vwe9mqyh */ /* hyzshV6pGrsi+IcaaVQi7aSId229GhT0E0p6Ly23OO/0/4C5+KH38nLeJLxSA8hO */ /* 0Cre+i1Wz/n096wwepqLsl7Uz9FDRJtDIeuWcqFItJnLnU+nBgMTdydE1Od/6Fmo */ /* 8L8vC6bp8jQ87PcDx4eo0kxAGTVGamlUsLihVo7spNU96LHc/RzY9HdaXFSMb++h */ /* UD38dglohJ9vytsgjTVgHAIDyyCwrFigDkBjxZgiwbJZ9VVrzyerbHbObyMt9H5x */ /* aiNrIv8SuFQtJ37YOtnwtoeW/VvRXKwYw02fc7cBqZ9Xql4o4rmUMYIDdjCCA3IC */ /* AQEwdzBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5 */ /* BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0 */ /* YW1waW5nIENBAhAFRK/zlJ0IOaa/2z9f5WEWMA0GCWCGSAFlAwQCAQUAoIHRMBoG */ /* CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG9w0BCQUxDxcNMjQwOTIw */ /* MDcwMTM3WjArBgsqhkiG9w0BCRACDDEcMBowGDAWBBRm8CsywsLJD4JdzqqKycZP */ /* GZzPQDAvBgkqhkiG9w0BCQQxIgQgi2q/ifVOg3Fv0H6iibUp3UjUdO7F7Sml2yrV */ /* LeQlh68wNwYLKoZIhvcNAQkQAi8xKDAmMCQwIgQg0vbkbe10IszR1EBXaEE2b4KK */ /* 2lWarjMWr00amtQMeCgwDQYJKoZIhvcNAQEBBQAEggIALRNwZgTEuZuPqZOki8k+ */ /* ZctCiMuJ/6gOJacJwkW+6pIKhm3V2/Sn0gSMcUdVrH4ij9bjaF0LAECmQ0OwAkFh */ /* 140ty3vF72RXatxfAVVnsxWgTfgHc+EAOGOeivbcbtV916TvNh84sGT4dt6jYDcL */ /* tPIjoxaUDYZPzrZn9zDS6pFQV1pU8LjLVAtbZQsZyFD+01wnTp2T6gwFBqnY83FC */ /* R9DWhbuN81UYEGGZlpz53Cfsq5D6ef6RbmIORum4iDcDdreMlRCnJsJrnetO+5Tv */ /* KiByIhxt4drV2cCZuGO/Y3732tyeOiDoa3GcX7o+9dWmCf0cNijW1EvKwHQDc7Jz */ /* lkHetUah98vURNUUlIaZEU53J1k90/niIkeyBMaV2hSAJR8Y9/BA7lwB9ScW3XDb */ /* AGjW66+hQhL3rXMsDuMzTSDppCXF1j5QLAIyh55N1wDXoAEDStO7ECoN7baF0cT6 */ /* Vi0O3mBDndmkRq7cPYhPgXvJTPGtQkZbmSJQRKNolKudbTG6/f0Reu321yZDv/yJ */ /* Uj4i2DDIzuzImDEgFhFzzC/Z37dyhIW31WtwQH8eHuQ/J38atYYi61GK2u6OgDxU */ /* +OAdJPcx8Lhseb0LBQrX01DTijLTAGmlvggZHXrx5blqlHH1GeikeNWZQjepo+A7 */ /* 5qrZhnUB5v76WBsIVZu/c70= */ /* SIG # End signature block */
combined_dataset/train/non-malicious/sample_21_52.ps1
sample_21_52.ps1
ConvertFrom-StringData @' id_activity_utils=Initializing Diagnostics id_utils_init=Gathering environment details and detecting roles... '@ # SIG # Begin signature block # MIIoQgYJKoZIhvcNAQcCoIIoMzCCKC8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB88zJ0DcJ1wYcr # 45eamjbC2+kyRds4VSRzVJgBJXOgpaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiIwghoeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFADMtIkhjIjv9pQOAcO5uf6 # 8twmUwISkOengKch+cQZMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAbWDYl+3xbc7KrOzyiXMXx6+TEv4ZUKw4eo1QYDfql+C0+Mo8VrcX0O9q # AxQWFoFW5JS7/rF39jV1ZCDI8xbG7KUneXdL14MbwjUvFfusJHX5jck9bP9TVomF # hoVCIqQyC89SQh0tCbovXI+K1sUB6I6CFhP/cPLlG3syqq7tY058wWehUzgJrx5w # r1/DQ4J7b6Pl1PntmfmbdEw0jRMYGRJ0JxzfXX7twX0wnedArQGCfePIvtlDLkTf # 4jkppS6In9LQAkXJRV9LozhfyDl+TA7YQybgMClEsOSHUkf8NzO2/xpp/s17Tnlj # +3nw+mGEcCRZ/5XU5sqVyejFs4UhLqGCF6wwgheoBgorBgEEAYI3AwMBMYIXmDCC # F5QGCSqGSIb3DQEHAqCCF4UwgheBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBfFpCY17FeD7fdo0OStyp06fJLNHnHXOp+6PswiB9TmQIGZutwxmX3 # GBIyMDI0MTAyODExNDA0My41MVowBIACAfSggdmkgdYwgdMxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs # YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNO # OjU1MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIR+zCCBygwggUQoAMCAQICEzMAAAIB0UVZmBDMQk8AAQAAAgEwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjQw # NzI1MTgzMTIyWhcNMjUxMDIyMTgzMTIyWjCB0zELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046NTUxQS0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC1at/4fMO7uyTnTLlgeF4I # gkbS7FFIUVwc16T5N31mbImPbQQSNpTwkMm7mlZzik8CwEjfw0QAnVv4oGeVK2pT # y69cXiqcRKEN2Lyc+xllCxNkMpYCBQzaJlM6JYi5lwWzlkLz/4aWtUszmHVj2d8y # HkHgOdRA5cyt6YBP0yS9SGDe5piCaouWZjI4OZtriVdkG7XThIsAWxc5+X9MuGlO # hPjrLuUj2xsj26rf8B6uHdo+LaSce8QRrOKVd6ihc0sLB274izqjyRAui5SfcrBR # CbRvtpS2y/Vf86A+aw4mLrI3cthbIchK+s24isniJg2Ad0EG6ZBgrwuNmZBpMoVp # zGGZcnSraDNoh/EXbIjAz5X2xCqQeSD9D6JIM2kyvqav87CSc4QiMjSDpkw7KaK+ # kKHMM2g/P2GQreBUdkpbs1Xz5QFc3gbRoFfr18pRvEEEvKTZwL4+E6hSOSXpQLz9 # zSG6qPnFfyb5hUiTzV7u3oj5X8TjJdF55mCvQWFio2m9OMZxo7ZauQ/leaxhLsi8 # w8h/gMLIglRlqqgExOgAkkcZF74M+oIeDpuYY+b3sys5a/Xr8KjpL1xAORen28xJ # JFBZfLgq0mFl+a4PPa+vWPDg16LHC4gMbDWa1X9N1Ij6+ksl9SIuX9v3D+0kH3YE # AtBPx7Vgfw2mF06jXELCRwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLByr1uWoug8 # +JWvKb2YWYVZvLJSMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA6NADLPRxXO1MU # apdfkktHEUr87+gx7nm4OoQLxV3WBtwzbwoFQ+C9Qg9eb+90M3YhUGRYebAKngAh # zLh1m2S5SZ3R+e7ppP0y+jWd2wunZglwygUsS3dO2uIto76Lgau/RlQu1ZdQ8Bb8 # yflJyOCfTFl24Y8EP9ezcnv6B6337xm8GKmyD83umiKZg5WwfEtx6btXld0w2zK1 # Ob+4KiaEz/CBHkqUNhNU0BcHFxIox4lqIPdXX4eE2RWWIyXlU4/6fDnFYXnm72Hp # 4XYbt4E+pP6pIVD6tAJB0is3TIbVA308muiC4r4UlAl1DN18PdFZWxyIHKBthpmV # PVwYkjUjJDvgNDRQF1Ol94azKsRD08jxDKpUupvarsu0joMkw2mFi76Ov//SymvV # RW/IM+25GdsZBE2LUI7AlyP05iaWQWAo14J9sNPtTe4Q69aiZ6RfrRj+bm61FxQ9 # V4A92GQH4PENp6/cnXLAM13K73XWcBU+BGTIqAwrdRIsbfsR2Vq0OTwXK4KvHi2I # fKoc7fATrE/DfZDx7++a5A+gFm5fepR6gUizJkR6cerZJwy6eFypbfZJRUCLmhnh # ned/t0CA1q7bU0Q/CBb7bCSs2oODsenzIfKg4puAQG7pERBu9J9nkqHg9X5LaDF/ # a6roahgOeWoAE4xjDPfT0hKLRs8yHzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNWMIICPgIBATCCAQGhgdmkgdYwgdMxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs # YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNO # OjU1MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDX7bpxH/IfXTQOI0UZaG4C/atgGqCBgzCB # gKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUA # AgUA6slXITAiGA8yMDI0MTAyODAwMTk0NVoYDzIwMjQxMDI5MDAxOTQ1WjB0MDoG # CisGAQQBhFkKBAExLDAqMAoCBQDqyVchAgEAMAcCAQACAgGzMAcCAQACAhNKMAoC # BQDqyqihAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA # AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAAEw32hax2nMZHO2 # JjngyaoZZRXK5eZrFsMDrPyITyhulG/6XJ0EcMTMX5vON209JdZQAfT8UxFGFfS1 # 4t0IghpyxJr/ZsfvQJs53Na/pD7yZgPfgx6zgf8x+gIr41xRTawM+Y3guo7/Z7KH # SQozcPN8m4iJ2bpy8PZgDr0JKHzki6gHAgkPfMcHWBrCDM3aE8J5J1fNdmgx68k3 # ff8xKxTeCONmTREZzheiXa3McwPf8aQl1FNbsrk4/jq9f1B8nNt8aILjIYA+1shj # 3z7SbmwpPEZgen2fE7IwBr5oZQfkyoCBeQFgaVbzq5Zh1CX9y+Jxl2OAxFg1SSUU # //N/GmkxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MAITMwAAAgHRRVmYEMxCTwABAAACATANBglghkgBZQMEAgEFAKCCAUowGgYJKoZI # hvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCUy4hj9I4NdDlN # MMjzQUYell6H2EHg+P7w7EcFpiPfLDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQw # gb0EIFhrsjpMlBFybHQdpJNZl0mCjB2uX35muvSkh2oe1zgjMIGYMIGApH4wfDEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWlj # cm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAIB0UVZmBDMQk8AAQAAAgEw # IgQgoxwG6VbZMqhcF+hoEa7RLbDrkYrJXpik5EufvF8fKhowDQYJKoZIhvcNAQEL # BQAEggIAfoY2ZAanSM4bOz1XggB/Q4XrSXKjKGd/6iqe/+8KoN28VO9UhCc0t36x # FNAjviYKN+f0gm8Q1LYU6a6WDDRxZHSX/X06ekFyICSFc18rzeUmcIYJ16KPCzKn # EMinvOedlStGeZlU26EhQ5N4KUj0il8rgEOLjzBUOB8jPNEhs7qvWLniHA6UZCcH # WHNYQ3du2gnIPn1CrAGlVDNf68SSC6zDbKADGTeJFSc0juvbbbjoo2OKIrSYx529 # 0W5WM+y+lyRYWVC6/erUYZVKiRRgEKsCtgwHKK9bGUJqFMO6MWRSv/c/bFZjMsSx # x5ifWQERcSmDtSurHhFwnzgaRShoClRs3VPvU1zlsDxS1Tbt4FO4oP8c2t6rtlGF # MT2Qep687sIMY9NYD029s6ahIZ7EzCuGIuUjBPG1DGQ0TEZmqabj0ubTJtTZv+rI # 46uez93p1KfbIa58vgIh0V/yfv3Hp9kTUbK/3eez6mTqVK0l8TKncjCrX/y3V1XA # feZDLDrMgpVycmBK0VyC9xLBVrsCy7zj1/GcVdH9L7pIqvc8t0TmNTsZaAUk6Bko # zjlLmMfMM+3ceEug/JZwfxZrCjV3OFP2Yp/QITedaTfkHLe6qOPMo9Uy4msZNOW3 # pADKr1xVtPqYxLsV5Gl53i3j2LO1+f1fecmGii+Otm3wO8cSbdo= # SIG # End signature block
combined_dataset/train/non-malicious/3540.ps1
3540.ps1
function Test-AzureSqlGetContainers { $vault = Get-AzRecoveryServicesVault -ResourceGroupName "sqlpaasrg" -Name "sqlpaasrn"; $containers = Get-AzRecoveryServicesBackupContainer ` -VaultId $vault.ID ` -ContainerType "AzureSQL" ` -BackupManagementType "AzureSQL"; Assert-AreEqual $containers[0].Name "Sql;sqlpaasrg;sqlpaasserver"; $namedContainer = Get-AzRecoveryServicesBackupContainer ` -VaultId $vault.ID ` -ContainerType "AzureSQL" ` -BackupManagementType "AzureSQL" ` -Name "Sql;sqlpaasrg;sqlpaasserver"; Assert-AreEqual $namedContainer.Name "Sql;sqlpaasrg;sqlpaasserver"; } function Test-AzureSqlUnregisterContainer { $vault = Get-AzRecoveryServicesVault -ResourceGroupName "sqlpaasrg" -Name "sqlpaasrn"; $container = Get-AzRecoveryServicesBackupContainer ` -VaultId $vault.ID ` -ContainerType "AzureSQL" ` -BackupManagementType "AzureSQL" ` -Name "Sql;sqlpaasrg;sqlpaasserver"; Assert-AreEqual $container.Name "Sql;sqlpaasrg;sqlpaasserver"; Unregister-AzRecoveryServicesBackupContainer -VaultId $vault.ID -Container $container; $container = Get-AzRecoveryServicesBackupContainer ` -VaultId $vault.ID ` -ContainerType "AzureSQL" ` -BackupManagementType "AzureSQL" ` -Name "Sql;sqlpaasrg;sqlpaasserver"; Assert-Null $container; }
combined_dataset/train/non-malicious/sample_40_1.ps1
sample_40_1.ps1
# # Module manifest for module 'OCI.PSModules.Waf' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Waf.dll' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'e0acce48-3280-4a26-9a26-931bf7028140' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Waf Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Waf.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIWafNetworkAddressList', 'Get-OCIWafNetworkAddressListsList', 'Get-OCIWafProtectionCapabilitiesList', 'Get-OCIWafProtectionCapabilityGroupTagsList', 'Get-OCIWafWebAppFirewall', 'Get-OCIWafWebAppFirewallPoliciesList', 'Get-OCIWafWebAppFirewallPolicy', 'Get-OCIWafWebAppFirewallsList', 'Get-OCIWafWorkRequest', 'Get-OCIWafWorkRequestErrorsList', 'Get-OCIWafWorkRequestLogsList', 'Get-OCIWafWorkRequestsList', 'Move-OCIWafNetworkAddressListCompartment', 'Move-OCIWafWebAppFirewallCompartment', 'Move-OCIWafWebAppFirewallPolicyCompartment', 'New-OCIWafNetworkAddressList', 'New-OCIWafWebAppFirewall', 'New-OCIWafWebAppFirewallPolicy', 'Remove-OCIWafNetworkAddressList', 'Remove-OCIWafWebAppFirewall', 'Remove-OCIWafWebAppFirewallPolicy', 'Update-OCIWafNetworkAddressList', 'Update-OCIWafWebAppFirewall', 'Update-OCIWafWebAppFirewallPolicy' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Waf' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_64_46.ps1
sample_64_46.ps1
# ------------------------------------------------------------ # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License (MIT). See License.txt in the repo root for license information. # ------------------------------------------------------------ ## ## TODO: Refactor the certificate generation and installation in smaller ## functions and move them (including enums) to ClusterSetupUtilities.psm1 module. ## param ( [Parameter(Mandatory=$True, ParameterSetName = "Install")] [switch] $Install, [Parameter(Mandatory=$True, ParameterSetName = "Clean")] [switch] $Clean, [Parameter(Mandatory=$False)] [string] $CertSubjectName = "CN=ServiceFabricDevClusterCert" ) function Cleanup-Cert([string] $CertSubjectName) { Write-Host "Cleaning existing certificates..." $cerLocations = @("cert:\LocalMachine\My", "cert:\LocalMachine\root", "cert:\LocalMachine\CA", "cert:\CurrentUser\My") foreach($cerLoc in $cerLocations) { Get-ChildItem -Path $cerLoc | ? { $_.Subject -like "*$CertSubjectName*" } | Remove-Item } Write-Host "Certificates removed." } $warningMessage = @" This will install certificate with '$CertSubjectName' in following stores: # LocalMachine\My # LocalMachine\root & # CurrentUser\My The CleanCluster.ps1 will clean these certificates or you can clean them up using script 'CertSetup.ps1 -Clean -CertSubjectName $CertSubjectName'. "@ $X509KeyUsageFlags = @{ DIGITAL_SIGNATURE = 0x80 KEY_ENCIPHERMENT = 0x20 DATA_ENCIPHERMENT = 0x10 } $X509KeySpec = @{ NONE = 0 KEYEXCHANGE = 1 SIGNATURE = 2 } $X509PrivateKeyExportFlags = @{ EXPORT_NONE = 0 EXPORT_FLAG = 0x1 PLAINTEXT_EXPORT_FLAG = 0x2 ARCHIVING_FLAG = 0x4 PLAINTEXT_ARCHIVING_FLAG = 0x8 } $X509CertificateEnrollmentContext = @{ USER = 0x1 MACHINE = 0x2 ADMINISTRATOR_FORCE_MACHINE = 0x3 } $EncodingType = @{ STRING_BASE64HEADER = 0 STRING_BASE64 = 0x1 STRING_BINARY = 0x2 STRING_BASE64REQUESTHEADER = 0x3 STRING_HEX = 0x4 STRING_HEXASCII = 0x5 STRING_BASE64_ANY = 0x6 STRING_ANY = 0x7 STRING_HEX_ANY = 0x8 STRING_BASE64X509CRLHEADER = 0x9 STRING_HEXADDR = 0xa STRING_HEXASCIIADDR = 0xb STRING_HEXRAW = 0xc STRING_NOCRLF = 0x40000000 STRING_NOCR = 0x80000000 } $InstallResponseRestrictionFlags = @{ ALLOW_NONE = 0x00000000 ALLOW_NO_OUTSTANDING_REQUEST = 0x00000001 ALLOW_UNTRUSTED_CERTIFICATE = 0x00000002 ALLOW_UNTRUSTED_ROOT = 0x00000004 } if($Install) { #cleanup previous installs of the certificate Cleanup-Cert -CertSubjectName $CertSubjectName Write-Host "Installing new certificates..." Write-Warning $warningMessage $identity = [Security.Principal.WindowsIdentity]::GetCurrent() $name = new-object -com "X509Enrollment.CX500DistinguishedName" $name.Encode($CertSubjectName, 0x00100000) $key = new-object -com "X509Enrollment.CX509PrivateKey.1" $key.ProviderName = "Microsoft RSA SChannel Cryptographic Provider" $key.ExportPolicy = $X509PrivateKeyExportFlags.PLAINTEXT_EXPORT_FLAG $key.KeySpec = $X509KeySpec.KEYEXCHANGE $key.Length = 1024 $sd = "D:PAI(A;;0xd01f01ff;;;SY)(A;;0xd01f01ff;;;BA)(A;;0xd01f01ff;;;NS)(A;;0xd01f01ff;;;" + $identity.User.Value + ")" $key.SecurityDescriptor = $sd $key.MachineContext = $TRUE $key.Create() #set server auth keyspec $serverauthoid = new-object -com "X509Enrollment.CObjectId.1" $serverauthoid.InitializeFromValue("1.3.6.1.5.5.7.3.1") $ekuoids = new-object -com "X509Enrollment.CObjectIds.1" $ekuoids.add($serverauthoid) $clientauthoid = new-object -com "X509Enrollment.CObjectId.1" $clientauthoid.InitializeFromValue("1.3.6.1.5.5.7.3.2") $ekuoids.add($clientauthoid) $ekuext = new-object -com "X509Enrollment.CX509ExtensionEnhancedKeyUsage.1" $ekuext.InitializeEncode($ekuoids) $keyUsageExt = New-Object -ComObject X509Enrollment.CX509ExtensionKeyUsage $keyUsageExt.InitializeEncode($X509KeyUsageFlags.KEY_ENCIPHERMENT -bor $X509KeyUsageFlags.DIGITAL_SIGNATURE) $certTemplateName = "" $cert = new-object -com "X509Enrollment.CX509CertificateRequestCertificate.1" $cert.InitializeFromPrivateKey($X509CertificateEnrollmentContext.MACHINE, $key, $certTemplateName) $cert.Subject = $name $cert.Issuer = $cert.Subject $notbefore = get-date $ts = new-timespan -Days 2 $cert.NotBefore = $notbefore.Subtract($ts) $cert.NotAfter = $cert.NotBefore.AddYears(1) $cert.X509Extensions.Add($ekuext) $cert.X509Extensions.Add($keyUsageExt) $cert.Encode() #install certificate in LocalMachine My store $enrollment = new-object -com "X509Enrollment.CX509Enrollment.1" $enrollment.InitializeFromRequest($cert) $certdata = $enrollment.CreateRequest($EncodingType.STRING_BASE64HEADER) $password = "" $enrollment.InstallResponse($InstallResponseRestrictionFlags.ALLOW_UNTRUSTED_CERTIFICATE, $certdata, $EncodingType.STRING_BASE64HEADER, $password) if (!$?) { Write-Warning "Failed to create certificates required for cluster" return } $srcStoreScope = "LocalMachine" $srcStoreName = "My" $srcStore = New-Object System.Security.Cryptography.X509Certificates.X509Store $srcStoreName, $srcStoreScope $srcStore.Open([System.Security.Cryptography.X509Certificates.OpenFlags]::ReadOnly) $cert = $srcStore.certificates -match "$CertSubjectName" $dstStoreScope = "LocalMachine" $dstStoreName = "root" #copy cert to root store so chain build succeeds $dstStore = New-Object System.Security.Cryptography.X509Certificates.X509Store $dstStoreName, $dstStoreScope $dstStore.Open([System.Security.Cryptography.X509Certificates.OpenFlags]::ReadWrite) foreach($c in $cert) { $dstStore.Add($c) } $dstStore.Close() $dstStoreScope = "CurrentUser" $dstStoreName = "My" $dstStore = New-Object System.Security.Cryptography.X509Certificates.X509Store $dstStoreName, $dstStoreScope $dstStore.Open([System.Security.Cryptography.X509Certificates.OpenFlags]::ReadWrite) foreach($c in $cert) { $dstStore.Add($c) } $srcStore.Close() $dstStore.Close() } if($Clean) { Cleanup-Cert -CertSubjectName $CertSubjectName } # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAGpzFgtkUmO6NZ # gQoc/sFlY42MkN6RwnHH2QV8eo6TbqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFcvRHa4XgIJOKkSAuecsn67 # tMg/3wHCAyBogGj5bNKiMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAM/9afC1Gzys9IpEmfdC2nzw4kSKdh7Fv5qN2MFtvKRbs8fkjaZlzwyLa # Qm1/VwfYxTzGcXfcT7jz8/AH26w6plm6K08JxZsEnOBb5kcx+GSrub3WZ7//Kl21 # tFHir35eoTBW7yuG8oNXubebYV0ZpnCkD2A4K4c/EBjKU1mKOWTw8AxvDRHoRm6I # CX4L7jQ3tLPj+jnChxfEg/AtMCDGH8RrkQfsxt2+QFhkKfEMYtTcwyKcekPYCL6u # wFX33+VZI3ggzDXMMeKGkY42utZ6/lrmi3cferHMKRkQrPXXY61qsCTnj5ioYSub # t0wP6fx/RbB+s8mbmUesLyCnjBvn8KGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDjpAv7c9zQ/zpxbPKnotQMf4kFlQWZEpVvzbCa+h/oLQIGZpfbmYNo # GBMyMDI0MDcyNzE4MjQ0Ni4zMzlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC # RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5 # ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi # AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm # JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz # X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE # nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP # MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61 # ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG # MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw # S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+ # mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw # WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3 # uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s # Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU # JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc # ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0 # CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN # jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1 # Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG # eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp # sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4 # vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW # w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8 # FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE # MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOpPh8YwIhgPMjAyNDA3MjcyMjUwNDZaGA8yMDI0MDcyODIyNTA0NlowdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6k+HxgIBADAKAgEAAgIBzAIB/zAHAgEAAgIRtzAK # AgUA6lDZRgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBACtNE0+LSh7uOIXc # Gt7R1WUjaDZ6F19cqqectIbEOkW2LEGwKMcVuCRcqT0RaZcQUJJTXmdvipUd76P8 # a/bTaiq9SZGJ8Z8mdKEkZpZWBgQDA50fIdwetpaEBQzHR9hffyvu7MpYWRZuWEHE # wUBcTABGqT7aUhSFc7C19nTeLzoZMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgoJVVX6lRHS1E4FqshBA3oxJ9HxD3srxtdooz1iAGW2owgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLyl # xIINNzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 3MHgjMJfWF6OAAEAAAHcMCIEIG5DYRFdihvuEUxON6I4h3F7dh956zgCWLEw9k20 # F6meMA0GCSqGSIb3DQEBCwUABIICAErKYoZRCE3ctD/StJ2vA7DOzfgwQuiZ1s1Q # xsDXVAD271+eWKK6jRT5oSYqij6RhOqUcLhhi6PPKuA/HqT9vP42zsewbM8vIwQ0 # /bn9lmIrgvFR/zu9O4IUsWtr5H0iU+2LDl/6JEv6uABarxOnI65gZ4uJhTcnDAcQ # uPvwXo9JO3g8zni2CXAjzrua2JRFOdi5CD1ZiYJhLVd0lLhTIN781cU2m/sY2agb # VCYF3Z4GlOFiTvoD+6GASO83js04sffmrdGomZISB+PsbWa+IHU2yLD/UapmzkXU # zFXNTwCMuLtyuf8HUYRxTHlY9zWHg79yXEb/X4FFtYSpcYPnzbP96WtXPfrMokRJ # BAIxH4oWfjnia5KKtJYlEJmmYCfog7QsV5cVac4kicF3c405D8Ca3mcLT/AgO4HA # a/dkFFfy1M7R3+vGgB7MyUlN/9TZZsYOLycMobU7a/D2J+5vq0gb+l9xcR0KSmVW # b8vIlbtJq5A8glUFYE3e5FMi3fyqNb9lr3OKjHRvYv9NGs5ze3NXUlp+FX5ZPvtF # RGmTNo6c8EQMelnkc2yCoVIRTS83qev3QrgmeliIgAXbhk3sxsLBX/CnMfhPseLW # rEPO4muG5dWUW8wY99Wl4EBGWXs+onJeX4X/kvkaGvTZ/3rh9jtzVcyoa0EN+Uhh # BTPerTZN # SIG # End signature block
combined_dataset/train/non-malicious/sample_42_18.ps1
sample_42_18.ps1
@{ GUID="56D66100-99A0-4FFC-A12D-EEE9A6718AEF" Author="PowerShell" CompanyName="Microsoft Corporation" Copyright="Copyright (c) Microsoft Corporation." ModuleVersion="7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion="3.0" FunctionsToExport = @() CmdletsToExport="Start-Transcript", "Stop-Transcript" AliasesToExport = @() NestedModules="Microsoft.PowerShell.ConsoleHost.dll" HelpInfoURI = 'https://aka.ms/powershell73-help' } # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAafI9Gy/Jba/h5 # P4E+2b0zPlBjhQyHNjAYnPqkeCyjq6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILL0LNcTOl5fB4j3BOCsjqQo # x/Jicg70oB7mLdT2Lf6QMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAbnRzo0A3sSZ/GIP3Z3xJ5C+BLn5jLp0jAWV4PuiDE+yc2EbDZNJQIT9z # EvKZ458xy/tbRaZDNuBIKENgYHct+9dPb4z99rCBy0dhjtByBqc8FzGDtl20K7D+ # Gmol5XbgD8vAgRlZCbnwCOBHnyNaXhISQgdCz81gQ2re2NZr67SY5J7PsJ0u6/FT # rbpnT9jGDmpUAtS1mGexnlXYX2D1TWDz+54LJruwqET291w6DaxAgXzS1MP6lD9i # vA5+FvdPm9KVJj9QVGI3YP2hWG7w+0mbup5UQFkTct1q2H+VwMtoDrGy2oog8I0n # lgp75aG3HDnyYNE5Vcuu1S1Uos4P9aGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDaE5ukTalehAPfxlyt9eVrZ4EspeNPqtP/yMw8/qNbOQIGZYMzcQ9P # GBMyMDI0MDExMTA0MTkxOC41MDNaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC # RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis # DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI # ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z # ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR # IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE # lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s # /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4 # aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB # fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT # me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy # qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui # hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds # lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf # sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t # Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU # +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7 # qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6 # Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+ # x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4 # 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5 # ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV # PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4 # y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk # 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG # QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOlJYA0wIhgPMjAyNDAxMTEwMjI3MjVaGA8yMDI0MDExMjAyMjcyNVowdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6UlgDQIBADAKAgEAAgIbIQIB/zAHAgEAAgISuDAK # AgUA6UqxjQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAFkFEliZXMyT+yX5 # rvA21SFg+y9Ujd+D6ydr3euZ86pmIpuHE9VLYFWURbr2o8/gp2tog15VATitC2FV # NzIVleDF8frsHdhnW4UoO86rPmx5TBxIZt/UkYUn5VsI2wMkNNRMBw3WpsgmKFrE # uwvY9rTRcRmMy9cqYB5i09uzr6ODMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQg+wInHEtnMSV+oTpSL65e5tvKjbRfVME7Zgpw2Dp/+MowgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJ # CI9//zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 4pmZlfHc4yDrAAEAAAHiMCIEIPBrc4TxOks9oaZ4EPUAG2fZqlTGot2+EgTfKsqe # zOdlMA0GCSqGSIb3DQEBCwUABIICAJBED+BaAYQNnWJ0421LxzvsoZTF4/nhiYxL # VQz5/Ogk09l0LWbPKiBN1IN/z6wjVxXhMEUDQGI2zdX4UGMOnAhvlt6VrEXQeNHL # 0pCm7jmyntIWqMMSyK0CIIg/s28Tg/qR78nxiLazZY38qdrKd2lZpf4sGK/RafFc # oTcjRRdmFAAZiSbmXCVKMHQMFbsUSkn+cLA/k3U1EEXQ7b+4aeMHN/jOksggG+2H # mwhVLyEnyXJCweaVcR9tLjgjbqoQwkHMH1QyVObTGx0Jh+9KFZaPeMBuWmIFE1P9 # I13qaAe2d8cEGrmsZg8slv6lYMGztYKl50Ck1G3nbF/fqzcoSiE3d+qK1i0yyC6H # jimW3i8W2olO7qAq8r05ob5sKvSRtk6LwDm0ANz0XEbl3v5yS2u7BKLEfC9YhyCd # AS3Bc0LmCMd9PsTVgodQG4ViHFcCyHVfr3MPVCCTiygm457dpR13AcGvkLYEllQn # YJ8++eG8gBYHccBlpg0YIjGmXS69QkX/trojjlZjZB3sAiqF8ZP3cn9Ulty19qoq # z20XszPO4UzruyaWuTTopNj0BsWNKE1ouzMDbhMLv9Ed67RXs/+tyla/sJWPtnZ0 # +dEIXKUbbyvoDsNTSlVMI0QK8a+CJRlRbFRCLkx9vWFo+4oh+xHo6OhraEFeSfd/ # 4TBm4PUk # SIG # End signature block
combined_dataset/train/non-malicious/sample_31_19.ps1
sample_31_19.ps1
# ENV # WARNING: these need to be setup by your launch script or CI/CD $env:TEST_DEVICE_HOSTNAME = "verdin-imx8mp-14773124" $env:TEST_DEVICE_LOGIN = "torizon" $env:TEST_DEVICE_PASSWORD = "123" $env:TEST_DEVICE_ARCH = "arm64" $env:TEST_DEVICE_IP = "192.168.31.242" # If "true" local debug is performed, if false remote debug on the configured device is performed $env:TEST_LOCAL_DEBUG = "false" $env:TEST_DOCKERHUB_LOGIN = "dockerhub_user" $env:TEST_DOCKERHUB_PASSWORD = "dockerhub_password" $env:HOST_PASSWORD = "host_password" # Where the logs and projects created of the tests will be saved $env:TEST_DIRECTORY_FOLDER = "$(Get-Location)/IDE2autoTests" $env:TEST_TEMPLATES_GIT_REPO = "https://github.com/toradex/vscode-torizon-templates.git" $env:TEST_TEMPLATES_GIT_REPO_BRANCH = "dev" $env:TEST_TEMPLATES_GIT_TAG = "dev" # Partner and community templates $env:TEST_NON_TORADEX_TEMPLATES = "true" $env:TEST_SINGLE_CONTAINER_PROJECTS = "true" $env:TEST_MULTI_CONTAINER_PROJECTS = "false" # Valid for TEST_SINGLE_(TORADEX|COMMUNITY|PARTNER)_TEMPLATES # How to use it -> by including the ones to be tested like # "python3Console, cppQML" # Or by excluding the ones not to be tested like (the format is important) # "all except: python3Console, cppQML" $env:TEST_SINGLE_TORADEX_TEMPLATES = "all except: aspnetBlazor" # A whitespace is needed when the variable is empty to have it added to the env variables $env:TEST_SINGLE_PARTNER_TEMPLATES = " " $env:TEST_SINGLE_COMMUNITY_TEMPLATES = "rustConsole" # " " # How to use it -> by including the ones to be tested like # "[dotnetUno, cppConsole],[dotnetConsole, cppConsole]" # Or by excluding the ones not to be tested like (the format is important) # Here "all" means all that are included on the single templates test # "all except: [dotnetUno, cppConsole],[dotnetConsole, cppConsole]" # all except: [dotnetUno, cppConsole] means it will exclude any multi container project that # includes both dotnetUno and cppConsole, like [dotnetUno, cppConsole, cppQML] for example # So using all except: [cppQML] for example will not include cppQML in any multi container project $env:TEST_MULTI_TEMPLATES = "all except: [dotnetUno, cppConsole],[dotnetConsole, cppConsole]" # " " # Setup vscode, chromedriver and pack and install the torizon extension pwsh -nop -File ./prepareTests.ps1 try { Write-Host -ForegroundColor Black ` -BackgroundColor Green ` "STARTING VS CODE" # all set, run tests in a job, save the logs also ia a file # Pass the argument for a more detailed log, if necessary -> --log_level Debug npx extest run-tests ` "out/tests/*.test.js" ` -e "dotvscode/extensions" ` -s "dotvscode" ` --mocha_config "src/tests/.mocharc-debug.js" ` -o "settings.json" *>&1 ` | Tee-Object -FilePath "dotvscode/currentTestTerminalOutput.log" } catch { Write-Error $_ }finally { Write-Host -ForegroundColor Green "DONE" }
combined_dataset/train/non-malicious/Test-UserCredential_1.ps1
Test-UserCredential_1.ps1
function Test-UserCredential { [CmdletBinding()] [OutputType([System.Boolean])] param( [Parameter(Mandatory=$true, ParameterSetName="string", position=0)] [ValidateNotNullOrEmpty()] [String] $Username, [Parameter(Mandatory=$true, ParameterSetName="string", position=1)] [ValidateNotNullOrEmpty()] [String] $Password, [Parameter(Mandatory=$true, ParameterSetName="PSCredential", ValueFromPipeline=$true, position=0)] [ValidateNotNullOrEmpty()] [Management.Automation.PSCredential] $Credential, [Parameter(position=2)] [Switch] $Domain ) Begin { try { $assem = [system.reflection.assembly]::LoadWithPartialName('System.DirectoryServices.AccountManagement') } catch { throw 'Failed to load assembly "System.DirectoryServices.AccountManagement". The error was: "{0}".' -f $_ } } Process { try { $system = Get-WmiObject -Class Win32_ComputerSystem if ($PSCmdlet.ParameterSetName -eq 'PSCredential') { $Username = $Credential.GetNetworkCredential().UserName $Password = $Credential.GetNetworkCredential().Password } if ($Domain) { if (0, 2 -contains $system.DomainRole) { throw 'This computer is not a member of a domain.' } else { $principalContext = New-Object -TypeName System.DirectoryServices.AccountManagement.PrincipalContext 'Domain', $system.Domain } } else { $principalContext = New-Object -TypeName System.DirectoryServices.AccountManagement.PrincipalContext 'Machine', $env:COMPUTERNAME } return $principalContext.ValidateCredentials($Username, $Password) } catch { throw 'Failed to test user credentials. The error was: "{0}".' -f $_ } finally { Remove-Variable -Name Username -ErrorAction SilentlyContinue Remove-Variable -Name Password -ErrorAction SilentlyContinue } } <# .SYNOPSIS Validates credentials for local or domain user. .PARAMETER Username The user's username. .PARAMETER Password The user's password. .EXAMPLE PS C:\\> Test-UserCredential -Username andy -password secret .EXAMPLE PS C:\\> Test-UserCredential -Username 'mydomain\\andy' -password secret -domain .EXAMPLE PS C:\\> Test-UserCredential -Username 'andy' -password secret -domain .EXAMPLE PS C:\\> Get-Credential | Test-UserCredential .INPUTS None. .OUTPUTS System.Boolean. .NOTES Revision History 2011-08-21: Andy Arismendi - Created. 2011-08-22: Andy Arismendi - Add pipelining support for Get-Credential. #> }
combined_dataset/train/non-malicious/sample_52_39.ps1
sample_52_39.ps1
# a simple PowerShell script to update icons in the resources/icons directory # the original icons are loaded from https://github.com/microsoft/fabric-samples/blob/main/docs-samples/Icons.zip $rootPathMono = Get-Item -Path "./resources/icons/mono" $monoIcons = $rootPathMono | Get-ChildItem -Recurse -Include *.svg $icon = $monoIcons[0] foreach($icon in $monoIcons) { $newPath = Join-Path $icon.DirectoryName (($icon.BaseName -replace "[\s-]", "").toLower().TrimEnd("s") + $icon.Extension) if($newPath -ceq $icon.FullName) { #continue } $content = $icon | Get-Content -Raw $content = $content -replace 'fill="black"', 'fill="lightgray"' Remove-Item -Path $icon.FullName Set-Content -Path $newPath -Value $content } Move-Item "$($rootPathMono.FullName)/model.svg" "$($rootPathMono.FullName)/semanticmodel.svg" Move-Item "$($rootPathMono.FullName)/pipeline.svg" "$($rootPathMono.FullName)/datapipeline.svg" Move-Item "$($rootPathMono.FullName)/sparkjob.svg" "$($rootPathMono.FullName)/sparkjobdefinition.svg" Move-Item "$($rootPathMono.FullName)/datawarehouse.svg" "$($rootPathMono.FullName)/warehouse.svg" $rootPathColor = Get-Item -Path "./resources/icons/color" $colorIcons = $rootPathColor | Get-ChildItem -Recurse -Include *.svg $icon = $colorIcons[0] foreach($icon in $colorIcons) { if(!$icon.BaseName.EndsWith("_64")) { $icon | Remove-Item continue } $newPath = Join-Path $icon.DirectoryName (($icon.BaseName -replace "[\s-_64]", "").toLower().TrimEnd("s") + $icon.Extension) if($newPath -ceq $icon.FullName) { continue } $content = $icon | Get-Content -Raw $content = $content -replace 'fill="black"', 'fill="lightgray"' Remove-Item -Path $icon.FullName Set-Content -Path $newPath -Value $content } Move-Item "$($rootPathColor.FullName)/model.svg" "$($rootPath.FullName)/semanticmodel.svg" Move-Item "$($rootPathColor.FullName)/pipeline.svg" "$($rootPath.FullName)/datapipeline.svg"
combined_dataset/train/non-malicious/Start-BootsTimer_3.ps1
Start-BootsTimer_3.ps1
Add-BootsFunction -Type "System.Windows.Threading.DispatcherTimer" function Start-BootsTimer { #.Syntax # Creates a stay-on-top countdown timer #.Description # A WPF borderless count-down timer, with audio/voice alarms and visual countdown + colored progress indication #.Parameter EndMessage # The message to be spoken by a voice when the time is up... #.Parameter StartMessage # A message to be spoken at start up (just to let you know, audibly, what's up). #.Parameter Minutes # Some minutes to add to the timer #.Parameter Seconds # Some seconds to add to the timer #.Parameter Hours # Some hours to add to the timer #.Parameter SoundFile # A .wav file to play as the alarm #.Parameter FontSize # The size of the timer text #.Parameter SingleAlarm # Only sound the alarm once #.Example # Start-BootsTimer 180 "The three minute egg is ready!" # # Starts a three minute timer with the specified voice alert at the end # #.Example # Start-BootsTimer -End "The three minute egg is ready!" -Minute 3 # # Starts a three minute timer with the specified voice alert at the end # #.Example # Start-BootsTimer "Your turn is over!" -Minutes 10 -Single -FontSize 18 # # Starts a 10 minute timer that only plays the alert once at the end, and has a small font, which would fit over the task bar or a window title bar... [CmdletBinding(DefaultParameterSetName="Times")] PARAM( [Parameter(Position=2,ParameterSetName="Times",Mandatory=$false)] [Parameter(Position=1,ParameterSetName="Reasons", Mandatory=$true)] [string]$EndMessage , [Parameter(Position=2,ParameterSetName="Reasons", Mandatory=$false)] [string]$StartMessage , [Parameter(Position=3,ParameterSetName="Reasons", Mandatory=$false)] [int]$minutes = 0 , [Parameter(Position=4,ParameterSetName="Reasons", Mandatory=$false)] [Parameter(Position=1,ParameterSetName="Times", Mandatory=$true)] [int]$seconds = 0 , [Parameter()] [int]$hours = 0 , [Parameter()] $SoundFile = "$env:SystemRoot\\Media\\notify.wav" , [Parameter()] $FontSize = 125 , [Parameter()] [Switch]$SingleAlarm ) # Default to 10 seconds ... without adding 5 seconds when people specify minutes if(($seconds + $Minutes + $hours) -eq 0) { $seconds = 10 } $start = [DateTime]::Now ## We have to store all this stuff, because the powerboots window lasts longer than the script $TimerStuff = @{} $TimerStuff["seconds"] = [Math]::Abs($seconds) + [Math]::Abs([int]($minutes*60)) + [Math]::Abs([int]($hours*60*60)) $TimerStuff["TimerEnd"] = $start.AddSeconds( $TimerStuff["seconds"] ) $TimerStuff["SingleAlarm"] = $SingleAlarm ## Take care of as much overhead as we can before we need it... if(Test-Path $soundFile) { $TimerStuff["Sound"] = new-Object System.Media.SoundPlayer $TimerStuff["Sound"].SoundLocation=$SoundFile } if($EndMessage -or $StartMessage) { $TimerStuff["Voice"] = new-object -com SAPI.SpVoice } ## Store the "EndMessage" message if($EndMessage) { $TimerStuff["EndMessage"] = $EndMessage } ## If they provided a second status message, read it out loud if($StartMessage) { $null = $TimerStuff["Voice"].Speak( $StartMessage, 1 ) } $TimerStuff["FontSize"] = $FontSize ## Make the window ... PowerBoots\\New-BootsWindow -WindowStyle None -AllowsTransparency -Tag $TimerStuff { Param($window) TextBlock "00:00:00" -FontSize $window.Tag.FontSize -FontFamily Impact -margin 20 ` -BitmapEffect $(OuterGlowBitmapEffect -GlowColor White -GlowSize 15) ` -Foreground $(LinearGradientBrush -Start "1,1" -End "0,1" { GradientStop -Color Black -Offset 0.0 GradientStop -Color Black -Offset 0.95 GradientStop -Color Red -Offset 1.0 GradientStop -Color Red -Offset 1.0 }) # -TextDecorations ([System.Windows.TextDecorations]::Underline) ## We'll create a timer $window.Tag["Timer"] = DispatcherTimer -Tag $window -Interval "0:0:0.05" -On_Tick { trap { write-host "Error: $_" -fore Red write-host $($_.InvocationInfo.PositionMessage) -fore Red write-host $($_.Exception.StackTrace | Out-String) -fore Red } $remain = 100 if($this.Tag.Tag.TimerEnd -and $this.Tag.Content.Foreground.GradientStops.Count -ge 3) { Write-Verbose $($this.Tag.Tag|Out-String) #-fore magenta $diff = $this.Tag.Tag.TimerEnd - [DateTime]::Now; if($diff.Ticks -ge 0) { $this.Tag.Content.Text = ([DateTime]$diff.Ticks).ToString(" HH:mm.ss") } else { $this.Tag.Content.Text = ([DateTime][Math]::Abs($diff.Ticks)).ToString("-HH:mm.ss") } #Write-Host "Remain: $remain or $($diff.TotalSeconds) of $($this.tag.tag.seconds)" $remain = $diff.TotalSeconds / $this.tag.tag.seconds Write-Verbose "Remain: $remain or $($diff.TotalSeconds) of $($this.tag.tag.seconds)" ## Move the gradient a little bit each time. $this.tag.Content.Foreground.GradientStops[2].Offset = 0.0 # [Math]::Max(0.0, $remain) $this.tag.Content.Foreground.GradientStops[1].Offset = 0.0 # [Math]::Max(0.0, $remain - 0.05) #Write-Host "Gradient: $($this.tag.Content.Foreground.GradientStops[2].Offset) of $($this.tag.Content.Foreground.GradientStops[1].Offset)" } else { Write-Host "Wahat!" } ## When we get to the end ... make a few changes if($remain -le 0) { ## The first time we hit the end, we want to add a mouse click handler... if($this.Interval.Seconds -eq 0) { ## Which will now only fire every few seconds ## So it's easier to close the window ;) $this.Interval = [TimeSpan]"0:0:2" ## If you click on the finished window, it just goes away $this.tag.Add_MouseDown( { $this.tag.Close() } ) ## But if they chose -SingleAlarm, they don't neeto bother if($this.tag.tag["SingleAlarm"]) { $this.tag.Close() } } & { if($this.tag.Tag["Sound"]) { $this.tag.Tag["Sound"].Play() } else { [System.Media.SystemSounds]::Exclamation.Play() } if($this.tag.Tag["EndMessage"]) { $null = $this.tag.Tag["Voice"].Speak( $this.tag.Tag["EndMessage"], 1 ) } } } } ## Now handle starting and stopping the timer # $window.Add_SourceInitialized( { $window.Tag.Timer.Start() } ) $window.Add_Closed( { Write-Host "Shutting Down $this"; $this.Tag.Timer.Stop() } ) } -On_MouseDown { if($_.ChangedButton -eq "Left") { $this.DragMove() } } -Async -Topmost -Background Transparent -ShowInTaskbar:$False -Passthru | ## In lieu of the SourceInitialized event which fires BEFORE we can hook it: ForEach { Invoke-BootsWindow $_ { $BootsWindow.Tag.Timer.Start() } } }
combined_dataset/train/non-malicious/chkhash_14.ps1
chkhash_14.ps1
# calculate SHA512 of file. function Get-SHA512([System.IO.FileInfo] $file = $(throw 'Usage: Get-MD5 [System.IO.FileInfo]')) { $stream = $null; $cryptoServiceProvider = [System.Security.Cryptography.SHA512CryptoServiceProvider]; $hashAlgorithm = new-object $cryptoServiceProvider $stream = $file.OpenRead(); $hashByteArray = $hashAlgorithm.ComputeHash($stream); $stream.Close(); ## We have to be sure that we close the file stream if any exceptions are thrown. trap { if ($stream -ne $null) { $stream.Close(); } break; } foreach ($byte in $hashByteArray) { if ($byte -lt 16) {$result += “0{0:X}” -f $byte } else { $result += “{0:X}” -f $byte }} return [string]$result; } function noequal ( $first, $second) { if (!($second) -or $second -eq "") {return $true} $first=join-path $first "\\" foreach($s in $second) { if ($first.tolower().startswith($s.tolower())) {return $false} } return $true } # chkhash.ps1 [file(s)/dir #1] [file(s)/dir #2] ... [file(s)/dir #3] [-u] [-h [path of .xml database]] # -u updates the XML file database and exits # otherwise, all files are checked against the XML file database. # -h specifies location of xml hash database $hashespath=".\\hashes.xml" del variable:\\args3 -ea 0 del variable:\\args2 -ea 0 del variable:\\xfiles -ea 0 del variable:\\files -ea 0 del variable:\\exclude -ea 0 $args3=@() $args2=@($args) $nu = 0 $errs = 0 $fc = 0 $fm = 0 $upd = $false $create = $false for($i=0;$i -lt $args2.count; $i++) { if ($args2[$i] -like "-h*") # -help specified? { "Usage: .\\chkhash.ps1 [-h] [-u] [-c] [-x <file path of hashes .xml database>] [file(s)/dir #1] [file(s)/dir #2] ... [file(s)/dir #n] [-e <Dirs>]" "Options: -h - Help display." " -c - Create hash database. If .xml hash database does not exist, -c will be assumed." " -u - Update changed files and add new files to existing database." " -x - specifies .xml database file path to use. Default is .\\hashes.xml" " -e - exclude dirs. Put this after the files/dirs you want to check with SHA512 and needs to be fullpath (e.g. c:\\users\\bob not ..\\bob)." "" "Examples: PS>.\\chkhash.ps1 c:\\ d:\\ -c -x c:\\users\\bob\\hashes\\hashes.xml" " PS>.\\chkhash.ps1 c:\\users\\alice\\pictures\\sunset.jpg -u -x c:\\users\\alice\\hashes\\pictureshashes.xml" " PS>.\\chkhash.ps1 c:\\users\\eve\\documents d:\\media\\movies -x c:\\users\\eve\\hashes\\private.xml" " PS>.\\chkhash.ps1 c:\\users\\eve -x c:\\users\\eve\\hashes\\private.xml -e c:\\users\\eve\\hashes" "" "Note: files in subdirectories of any specified directory are automatically processed." " if you specify only an -x option, or no option and .\\hash.xml exists, only files in the database will be checked." exit } if ($args2[$i] -like "-u*") {$upd=$true;continue} # Update and Add new files to database? if ($args2[$i] -like "-c*") {$create=$true;continue} # Create database specified? if ($args2[$i] -like "-x*") { $i++ # Get hashes xml database path if ($i -ge $args2.count) { write-host "-X specified but no file path of .xml database specified. Exiting." exit } $hashespath=$args2[$i] continue } if ($args2[$i] -like "-e*") # Exclude files, dirs { while (($i+1) -lt $args2.count) { $i++ if ($args2[$i] -like "-*") {break} $exclude+=@(join-path $args2[$i] "\\") # collect array of excluded directories. } continue } $args3+=@($args2[$i]) # Add files/dirs } "ChkHash.ps1 - .\\chkhash.ps1 -h for usage." "" if ($args3.count -ne 0) { # Get list of files and SHA512 hash them. "Enumerating files from specified locations..." $files=@(dir $args3 -recurse -ea 0 | ?{$_.mode -notmatch "d"} | ?{noequal $_.directoryname $exclude}) # Get list of files if ($files.count -eq 0) {"No files found. Exiting."; exit} if ($create -eq $true -or !(test-path $hashespath)) # Create database? { # Create SHA512 hashes of files and write to new database $files = $files | %{write-host "SHA-512 Hashing `"$($_.fullname)`" ...";add-member -inputobject $_ -name SHA512 -membertype noteproperty -value $(get-SHA512 $_.fullname) -passthru} $files |export-clixml $hashespath "Created $hashespath" "$($files.count) file hash(es) saved. Exiting." exit } $xfiles=@(import-clixml $hashespath|?{noequal $_.directoryname $exclude}) # Load database } else { if (!(test-path $hashespath)) {"No database found or specified, exiting."; exit} $xfiles=@(import-clixml $hashespath|?{noequal $_.directoryname $exclude}) # Load database and check it if ($xfiles.count -eq 0) {"No files specified and no files in Database. Exiting.";Exit} $files=$xfiles } "Loaded $($xfiles.count) file hash(es) from $hashespath" $hash=@{} for($x=0;$x -lt $xfiles.count; $x++) # Build dictionary (hash) of filenames and indexes into file array { if ($hash.contains($xfiles[$x].fullname)) {continue} $hash.Add($xfiles[$x].fullname,$x) } foreach($f in $files) { if ((get-item -ea 0 $f.fullname) -eq $null) {continue} # skip if file no longer exists. $n=($hash.($f.fullname)) if ($n -eq $null) { $nu++ # increment needs/needed updating count if ($upd -eq $false) {"Needs to be added: `"$($f.fullname)`"";continue} # if not updating, then continue "SHA-512 Hashing `"$($f.fullname)`" ..." # Create SHA512 hash of file $f=$f |%{add-member -inputobject $_ -name SHA512 -membertype noteproperty -value $(get-SHA512 $_.fullname) -passthru -force} $xfiles+=@($f) # then add file + hash to list continue } $f=$f |%{add-member -inputobject $_ -name SHA512 -membertype noteproperty -value $(get-SHA512 $_.fullname) -passthru -force} $fc++ # File checked increment. if ($xfiles[$n].SHA512 -eq $f.SHA512) # Check SHA512 for mixmatch. {$fm++;continue} # if matched, increment file matches and continue loop $errs++ # increment mixmatches if ($upd -eq $true) { $xfiles[$n]=$f; "Updated `"$($f.fullname)`"";continue} "Bad SHA-512 found: `"$($f.fullname)`"" } if ($upd -eq $true) # if database updated { $xfiles|export-clixml $hashespath # write xml database "Updated $hashespath" "$nu file hash(es) added to database." "$errs file hash(es) updated in database." exit } "$errs SHA-512 mixmatch(es) found." "$fm file(s) SHA512 matched." "$fc file(s) checked total." if ($nu -ne 0) {"$nu file(s) need to be added [run with -u option to Add file hashes to database]."}
combined_dataset/train/non-malicious/1005.ps1
1005.ps1
$myTopic = "<your-custom-topic-name>" $myResourceGroup = "<resource-group-name>" New-AzResourceGroup -Name $myResourceGroup -Location westus2 New-AzEventGridTopic -ResourceGroupName $myResourceGroup -Name $myTopic -Location westus2 $endpoint = (Get-AzEventGridTopic -ResourceGroupName $myResourceGroup -Name $myTopic).Endpoint $key = (Get-AzEventGridTopicKey -ResourceGroupName $myResourceGroup -Name $myTopic).Key1 $endpoint $key
combined_dataset/train/non-malicious/1549.ps1
1549.ps1
function Test-Port{ [cmdletbinding( DefaultParameterSetName = '', ConfirmImpact = 'low' )] Param( [Parameter( Mandatory = $True, Position = 0, ParameterSetName = '', ValueFromPipeline = $True)] [array]$computer, [Parameter( Position = 1, Mandatory = $True, ParameterSetName = '')] [array]$port, [Parameter( Mandatory = $False, ParameterSetName = '')] [int]$TCPtimeout=1000, [Parameter( Mandatory = $False, ParameterSetName = '')] [int]$UDPtimeout=1000, [Parameter( Mandatory = $False, ParameterSetName = '')] [switch]$TCP, [Parameter( Mandatory = $False, ParameterSetName = '')] [switch]$UDP ) Begin { If (!$tcp -AND !$udp) {$tcp = $True} $ErrorActionPreference = "SilentlyContinue" $report = @() } Process { ForEach ($c in $computer) { ForEach ($p in $port) { If ($tcp) { $temp = "" | Select Server, Port, TypePort, Open, Notes $tcpobject = new-Object system.Net.Sockets.TcpClient $connect = $tcpobject.BeginConnect($c,$p,$null,$null) $wait = $connect.AsyncWaitHandle.WaitOne($TCPtimeout,$false) If(!$wait) { $tcpobject.Close() Write-Verbose "Connection Timeout" $temp.Server = $c $temp.Port = $p $temp.TypePort = "TCP" $temp.Open = $False $temp.Notes = "Connection to Port Timed Out" } Else { $error.Clear() $tcpobject.EndConnect($connect) | out-Null If($error[0]){ [string]$string = ($error[0].exception).message $message = (($string.split(":")[1]).replace('"',"")).TrimStart() $failed = $true } $tcpobject.Close() If($failed){ $temp.Server = $c $temp.Port = $p $temp.TypePort = "TCP" $temp.Open = $False $temp.Notes = "$message" } Else{ $temp.Server = $c $temp.Port = $p $temp.TypePort = "TCP" $temp.Open = $True $temp.Notes = "" } } $failed = $Null $report += $temp } If ($udp) { $temp = "" | Select Server, Port, TypePort, Open, Notes $udpobject = new-Object system.Net.Sockets.Udpclient $udpobject.client.ReceiveTimeout = $UDPTimeout Write-Verbose "Making UDP connection to remote server" $udpobject.Connect("$c",$p) Write-Verbose "Sending message to remote host" $a = new-object system.text.asciiencoding $byte = $a.GetBytes("$(Get-Date)") [void]$udpobject.Send($byte,$byte.length) Write-Verbose "Creating remote endpoint" $remoteendpoint = New-Object system.net.ipendpoint([system.net.ipaddress]::Any,0) Try { Write-Verbose "Waiting for message return" $receivebytes = $udpobject.Receive([ref]$remoteendpoint) [string]$returndata = $a.GetString($receivebytes) If ($returndata) { Write-Verbose "Connection Successful" $temp.Server = $c $temp.Port = $p $temp.TypePort = "UDP" $temp.Open = $True $temp.Notes = $returndata $udpobject.close() } } Catch { If ($Error[0].ToString() -match "\bRespond after a period of time\b") { $udpobject.Close() If (Test-Connection -comp $c -count 1 -quiet) { Write-Verbose "Connection Open" $temp.Server = $c $temp.Port = $p $temp.TypePort = "UDP" $temp.Open = $True $temp.Notes = "" } Else { Write-Verbose "Host maybe unavailable" $temp.Server = $c $temp.Port = $p $temp.TypePort = "UDP" $temp.Open = $False $temp.Notes = "Unable to verify if port is open or if host is unavailable." } } ElseIf ($Error[0].ToString() -match "forcibly closed by the remote host" ) { $udpobject.Close() Write-Verbose "Connection Timeout" $temp.Server = $c $temp.Port = $p $temp.TypePort = "UDP" $temp.Open = $False $temp.Notes = "Connection to Port Timed Out" } Else { $udpobject.close() } } $report += $temp } } } } End { $report } }
combined_dataset/train/non-malicious/sample_32_83.ps1
sample_32_83.ps1
# Get the version of the Torizon IDE Extension from package.json $env:TEST_EXTENSION_VERSION = ((Get-Content "package.json" -Raw) | ConvertFrom-Json).version $env:TEST_VSCODE_CLEANUP = $true # Start the tests from a clean environment, unless explictly setting to false # the env variable if ($env:TEST_VSCODE_CLEANUP -Eq $true) { # cleanup Write-Output "Clearing dotvscode and ~/.apollox" # remove dotvscode if (Test-Path "dotvscode") { Remove-Item -Recurse -Force "dotvscode" } # remove .apollox if (Test-Path -Path "$env:HOME/.apollox") { Remove-Item -Recurse -Force "$env:HOME/.apollox" } } if (!(Test-Path "dotvscode")) { # get test-resources # If vscode-extension-tester hasn't been released for the latest VSCode: # https://github.com/redhat-developer/vscode-extension-tester # use the -c <vscode version> parameter, ex: npx extest get-vscode -c 1.86.2 # When bumping vscode-extension-tester also bump this version here to the latest supported npx extest get-vscode -s "dotvscode" -c 1.87.2 npx extest get-chromedriver -s "dotvscode" -c 1.87.2 } # clean file stream Write-Host "" > "dotvscode/currentTestTerminalOutput.log" # remove out and recompiled it, this is useful for local tests if (Test-Path .\out) { Remove-Item -Recurse -Force .\out } # compile and pack # apollox npm --prefix ../apollox run pack $APOLLOX_FILE = ((Get-Content "package.json" -Raw) | ConvertFrom-Json).dependencies.apollox $APOLLOX_FILE = $APOLLOX_FILE.replace('file:','') Copy-Item $APOLLOX_FILE . # apollox-vscode npm run pack # install npx extest install-vsix -e "dotvscode/extensions" -f ./apollox-vscode-linux-x64-$env:TEST_EXTENSION_VERSION.vsix -s "dotvscode"
combined_dataset/train/non-malicious/sample_44_44.ps1
sample_44_44.ps1
# # Module manifest for module 'Microsoft.SME.StorageReplica' # @{ # Script module or binary module file associated with this manifest. RootModule = 'Microsoft.SME.StorageReplica.psm1' # Version number of this module. ModuleVersion = '4.3.0' # Supported PSEditions # CompatiblePSEditions = @() # ID used to uniquely identify this module GUID = 'e2d3225b-c963-4fdc-adb4-07e18708f9c3' # Author of this module Author = 'SME' # Company or vendor of this module CompanyName = 'Microsoft' # Copyright statement for this module Copyright = '(c) 2018 Microsoft. All rights reserved.' # Description of the functionality provided by this module # Description = '' # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '5.0' # Name of the Windows PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the Windows PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # CLRVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @() # Assemblies that must be loaded prior to importing this module # RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = @( 'Add-WACSRVolumes', 'Dismount-WACSRSRDestination', 'Edit-WACSRSRParnership', 'Get-WACSRCounterData', 'Get-WACSRDisk', 'Get-WACSRFileSystemRoot', 'Get-WACSRNodeClusteredState', 'Get-WACSRNodeFqdnsAndState', 'Get-WACSROSBuild', 'Get-WACSRPartitionInfo', 'Get-WACSRSRGroup', 'Get-WACSRSRPartnership', 'Get-WACSRSRServerFeature', 'Install-WACSRSRFeature', 'Mount-WACSRSRDestination', 'New-WACSRSrPartnership', 'Remove-WACSRSRGroup', 'Remove-WACSRSRPartnership', 'Remove-WACSRVolumes', 'Set-WACSRSRPartnershipRoles', 'Suspend-WACSRSRGroup', 'Sync-WACSRSRGroup', 'Test-WACSRConnection', 'Clear-WACSREventLogChannel', 'Clear-WACSREventLogChannelAfterExport', 'Export-WACSREventLogChannel', 'Get-WACSRCimEventLogRecords', 'Get-WACSRCimWin32LogicalDisk', 'Get-WACSRCimWin32NetworkAdapter', 'Get-WACSRCimWin32PhysicalMemory', 'Get-WACSRCimWin32Processor', 'Get-WACSRClusterEvents', 'Get-WACSRClusterInventory', 'Get-WACSRClusterNodes', 'Get-WACSRDecryptedDataFromNode', 'Get-WACSREncryptionJWKOnNode', 'Get-WACSREventLogDisplayName', 'Get-WACSREventLogFilteredCount', 'Get-WACSREventLogRecords', 'Get-WACSREventLogSummary', 'Get-WACSRServerInventory', 'Set-WACSREventLogChannelStatus' ) # Function attributes: {"localScripts":["Add-WACSRVolumes","Dismount-WACSRSRDestination","Edit-WACSRSRParnership","Get-WACSRCounterData","Get-WACSRDisk","Get-WACSRFileSystemRoot","Get-WACSRNodeClusteredState","Get-WACSRNodeFqdnsAndState","Get-WACSROSBuild","Get-WACSRPartitionInfo","Get-WACSRSRGroup","Get-WACSRSRPartnership","Get-WACSRSRServerFeature","Install-WACSRSRFeature","Mount-WACSRSRDestination","New-WACSRSrPartnership","Remove-WACSRSRGroup","Remove-WACSRSRPartnership","Remove-WACSRVolumes","Set-WACSRSRPartnershipRoles","Suspend-WACSRSRGroup","Sync-WACSRSRGroup","Test-WACSRConnection"],"externalScripts":["Clear-WACSREventLogChannel","Clear-WACSREventLogChannelAfterExport","Export-WACSREventLogChannel","Get-WACSRCimEventLogRecords","Get-WACSRCimWin32LogicalDisk","Get-WACSRCimWin32NetworkAdapter","Get-WACSRCimWin32PhysicalMemory","Get-WACSRCimWin32Processor","Get-WACSRClusterEvents","Get-WACSRClusterInventory","Get-WACSRClusterNodes","Get-WACSRDecryptedDataFromNode","Get-WACSREncryptionJWKOnNode","Get-WACSREventLogDisplayName","Get-WACSREventLogFilteredCount","Get-WACSREventLogRecords","Get-WACSREventLogSummary","Get-WACSRServerInventory","Set-WACSREventLogChannelStatus"]} # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = @() # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. # Tags = @() # A URL to the license for this module. # LicenseUri = '' # A URL to the main website for this project. # ProjectUri = '' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module # ReleaseNotes = '' } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCANkXL2QhJ8DPmB # Ty1kAwdFzEhYSWkYD6UXaiq/YVPaf6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIC2L/uBImvRzNfS/ssoXcQGK # DLtCy1Rn9PaP3v4MspxRMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAthOVO+Dm106TvXJEduGmJCk65lPk5+kygSLWAGKIifm17Tq+HQyw7yVX # RS8HNA/ZvVHQv03guPiQKv+TJm0sycFdt/V+cIdtRsiypx+H7tN8+vnlsBEBaa7W # A4DAXz84h/8319PYdJNfQDzoqPrBlo/nqY/St1xjLxMd8lffqJStiOR4bmhjcyV/ # 3meNFrS9KPwkcbwP/0nI2OoPjOfHcHwYHMacCfAxc3iso1Y1Gn5iUl5YozYtKtlI # g7kzhGkXzrrp1iwK9dzgo3VHg5n3C2boihseoW/y4yk2UOnlenWZpX2JHgJf8Kgu # gjcnz6TVng3lBkeo3pWgCGitYRvpz6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDT21rsVbSv14LJtCLBzPqx67ZE46MaUF9Yl+eD7YZ4xwIGZc4VAtI3 # GBMyMDI0MDIyMDIzMzgwOC44NjVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfGzRfUn6MAW1gABAAAB8TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NTVaFw0yNTAzMDUxODQ1NTVaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCxulCZttIf8X97rW9/J+Q4Vg9PiugB1ya1/DRxxLW2 # hwy4QgtU3j5fV75ZKa6XTTQhW5ClkGl6gp1nd5VBsx4Jb+oU4PsMA2foe8gP9bQN # PVxIHMJu6TYcrrn39Hddet2xkdqUhzzySXaPFqFMk2VifEfj+HR6JheNs2LLzm8F # DJm+pBddPDLag/R+APIWHyftq9itwM0WP5Z0dfQyI4WlVeUS+votsPbWm+RKsH4F # QNhzb0t/D4iutcfCK3/LK+xLmS6dmAh7AMKuEUl8i2kdWBDRcc+JWa21SCefx5SP # hJEFgYhdGPAop3G1l8T33cqrbLtcFJqww4TQiYiCkdysCcnIF0ZqSNAHcfI9SAv3 # gfkyxqQNJJ3sTsg5GPRF95mqgbfQbkFnU17iYbRIPJqwgSLhyB833ZDgmzxbKmJm # dDabbzS0yGhngHa6+gwVaOUqcHf9w6kwxMo+OqG3QZIcwd5wHECs5rAJZ6PIyFM7 # Ad2hRUFHRTi353I7V4xEgYGuZb6qFx6Pf44i7AjXbptUolDcVzYEdgLQSWiuFajS # 6Xg3k7Cy8TiM5HPUK9LZInloTxuULSxJmJ7nTjUjOj5xwRmC7x2S/mxql8nvHSCN # 1OED2/wECOot6MEe9bL3nzoKwO8TNlEStq5scd25GA0gMQO+qNXV/xTDOBTJ8zBc # GQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLy2xe59sCE0SjycqE5Erb4YrS1gMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDhSEjSBFSCbJyl3U/QmFMW2eLPBknnlsfI # D/7gTMvANEnhq08I9HHbbqiwqDEHSvARvKtL7j0znICYBbMrVSmvgDxU8jAGqMyi # LoM80788So3+T6IZV//UZRJqBl4oM3bCIQgFGo0VTeQ6RzYL+t1zCUXmmpPmM4xc # ScVFATXj5Tx7By4ShWUC7Vhm7picDiU5igGjuivRhxPvbpflbh/bsiE5tx5cuOJE # JSG+uWcqByR7TC4cGvuavHSjk1iRXT/QjaOEeJoOnfesbOdvJrJdbm+leYLRI67N # 3cd8B/suU21tRdgwOnTk2hOuZKs/kLwaX6NsAbUy9pKsDmTyoWnGmyTWBPiTb2rp # 5ogo8Y8hMU1YQs7rHR5hqilEq88jF+9H8Kccb/1ismJTGnBnRMv68Ud2l5LFhOZ4 # nRtl4lHri+N1L8EBg7aE8EvPe8Ca9gz8sh2F4COTYd1PHce1ugLvvWW1+aOSpd8N # nwEid4zgD79ZQxisJqyO4lMWMzAgEeFhUm40FshtzXudAsX5LoCil4rLbHfwYtGO # pw9DVX3jXAV90tG9iRbcqjtt3vhW9T+L3fAZlMeraWfh7eUmPltMU8lEQOMelo/1 # ehkIGO7YZOHxUqeKpmF9QaW8LXTT090AHZ4k6g+tdpZFfCMotyG+E4XqN6ZWtKEB # QiE3xL27BDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQD7 # n7Bk4gsM2tbU/i+M3BtRnLj096CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6X8qmTAiGA8yMDI0MDIyMDEzNDE0 # NVoYDzIwMjQwMjIxMTM0MTQ1WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpfyqZ # AgEAMAoCAQACAgRzAgH/MAcCAQACAhPKMAoCBQDpgHwZAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAAqzE9GhxF9thMAZTuxei76IypHUwiuIX8lXvri38kpd # h+d6SKq1ySHAOgjwGIcyk3X+hn3/8ZHL2sRSLpgprqKnsgin4mbFr9RVdvdc0YzS # q4qORfhVo2QNSadFDz2LHxIm65Z+KTprDyuBTDDdAfSXyp8yF2YDm/MzbSzDeZu5 # g02+Pn3iiIgasuyABb1hOCe3BXJokb7snxQn3MUSRy8IMIQH3Ywhl/yrpWgIDrQS # ++5hCs6vBlEq7TPaW0YnhHsW2qxlVHSGqwcODhLStGHqFoFzMtvzUZWm25+8TjZj # DJEL92QTbMak4LadJlj9bkpY7AAWJcKJT+e077I1LX8xggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfGzRfUn6MAW1gABAAAB # 8TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCAQ7TF79YemKacHIvVHcIfzZOBfamN/DQEb/nGrES0v # 9jCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINV3/T5hS7ijwao466RosB7w # wEibt0a1P5EqIwEj9hF4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHxs0X1J+jAFtYAAQAAAfEwIgQgwozVJFTC8RURiqw1MNcmGZAH # DEjJwdrMZq20FiZuYDQwDQYJKoZIhvcNAQELBQAEggIAUrm5Oe8qTmqXmhXtLi9s # n0Bn0rqWbWV4IqSwqahsggp11yZbZ1kd3X/h13h8ZPbSwcIJGrKf+e1cHbh0MMFT # Ewvq7EcFXQ1XEs4a0Rd9fq168FheanBFdIgoNeFuJ/3Hi3Hl3VAi8XBA2ANbkJrG # L45188zzTMQxagToauTsyLWCf+f9fGQFcnb7G2N/uNaMNpyNqefs7Y3Pty78xu78 # dEIYJdLDSkAqLfsxAavAMpZAn4Y0+WMUs8M9ZAlZRl6j8rMHsiTYjPjQwUSP94P/ # Z7twgHaAjEsQuN9kHYurFK/YjQK7Xlz84qsT3XXbQ2BlJSGQBJXQbWdbghdAQDRy # Jp9Wdnv/FakPuhZDjzpQ13QzIOiI76l91rrXzHjJv60wt8RTPPWT1IonixyKi4nd # jOT3J0X1HNPwgTtuGN0p6o7A/B9MEkfW72marYEzbHU/6aG0TicymDiCuvctXriZ # 1JLuO9affdwNGBR04O4fwTpoJomnLpzJFXuzTuiIYG6gAdsWwJwMM8bqP/hDu1/f # 5YJiBbAgCcooUXgdy24ssCNBw3udkIY4qL6FuF6RhvA3GhWSXpUxDwFG50eOORo6 # yX/0Ih4vYsZQkfjYR6TdaUYeH41TpyZb9uxUND/ss7ve1Sa4AJKAEEiMH3hIRjiD # dGt9yEcmEQlJKP8yEn4rOig= # SIG # End signature block
combined_dataset/train/non-malicious/1110.ps1
1110.ps1
$siteName = 'CarbonSetIisHttpHeader' $sitePort = 47938 function Start-TestFixture { & (Join-Path -Path $PSScriptRoot '..\Initialize-CarbonTest.ps1' -Resolve) } function Start-Test { Install-IisWebsite -Name $siteName -Path $TestDir -Binding ('http/*:{0}:*' -f $sitePort) } function Stop-Test { Remove-IisWebsite -Name $siteName } function Test-ShouldCreateNewHeader() { $name = 'X-Carbon-SetIisHttpHeader' $value = 'Brownies' $header = Get-IisHttpHeader -SiteName $siteName -Name $name Assert-Null $header $result = Set-IisHttpHeader -SiteName $siteName -Name $name -Value $value Assert-Null $result 'something returned from Set-IisHttpHeader' $header = Get-IisHttpHeader -SiteName $siteName -Name $name Assert-NotNull $header 'header not created' Assert-Equal $name $header.Name Assert-Equal $value $header.Value } function Test-ShouldSetExistingHeader() { $name = 'X-Carbon-SetIisHttpHeader' $value = 'Brownies' Set-IisHttpHeader -SiteName $siteName -Name $name -Value $value $newValue = 'Blondies' $result = Set-IisHttpHeader -SiteName $siteName -Name $name -Value $newValue Assert-Null $result 'something returned from Set-IisHttpHeader' $header = Get-IisHttpHeader -SiteName $siteName -Name $name Assert-NotNull $header 'header not created' Assert-Equal $name $header.Name Assert-Equal $newValue $header.Value } function Test-ShouldSetHeaderOnPath { $name = 'X-Carbon-SetIisHttpHeader' $value = 'Parent' Set-IisHttpHeader -SiteName $siteName -Name $name -Value $value $subValue = 'Child' Set-IisHttpHeader -SiteName $siteName -Path SubFolder -Name $name -Value $subValue $header = Get-IisHttpHeader -SiteName $siteName -Name $name Assert-NotNull $header 'header not created' Assert-Equal $name $header.Name Assert-Equal $value $header.Value $header = Get-IisHttpHeader -SiteName $siteName -Path SubFolder -Name $name Assert-NotNull $header 'header not created' Assert-Equal $name $header.Name Assert-Equal $subValue $header.Value } function Test-ShouldSupportWhatIf() { $name = 'X-Carbon-SetIisHttpHeader' $value = 'Brownies' $header = Get-IisHttpHeader -SiteName $siteName -Name $name Assert-Null $header Set-IisHttpHeader -SiteName $siteName -Name $name -Value $value -WhatIf $header = Get-IisHttpHeader -SiteName $siteName -Name $name Assert-Null $header 'HTTP header created' }
combined_dataset/train/non-malicious/sample_22_0.ps1
sample_22_0.ps1
# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. <# .Synopsis Group Policy tools use administrative template files (.admx, .adml) to populate policy settings in the user interface. This allows administrators to manage registry-based policy settings. This script installes PowerShell Core Administrative Templates for Windows. .Notes The PowerShellCoreExecutionPolicy.admx and PowerShellCoreExecutionPolicy.adml files are expected to be at the location specified by the Path parameter with default value of the location of this script. #> [CmdletBinding()] param ( [ValidateNotNullOrEmpty()] [string] $Path = $PSScriptRoot ) Set-StrictMode -Version 3.0 $ErrorActionPreference = 'Stop' function Test-Elevated { [CmdletBinding()] [OutputType([bool])] Param() # if the current Powershell session was called with administrator privileges, # the Administrator Group's well-known SID will show up in the Groups for the current identity. # Note that the SID won't show up unless the process is elevated. return (([Security.Principal.WindowsIdentity]::GetCurrent()).Groups -contains "S-1-5-32-544") } $IsWindowsOs = $PSHOME.EndsWith('\WindowsPowerShell\v1.0', [System.StringComparison]::OrdinalIgnoreCase) -or $IsWindows if (-not $IsWindowsOs) { throw 'This script must be run on Windows.' } if (-not (Test-Elevated)) { throw 'This script must be run from an elevated process.' } if ([System.Management.Automation.Platform]::IsNanoServer) { throw 'Group policy definitions are not supported on Nano Server.' } $admxName = 'PowerShellCoreExecutionPolicy.admx' $admlName = 'PowerShellCoreExecutionPolicy.adml' $admx = Get-Item -Path (Join-Path -Path $Path -ChildPath $admxName) $adml = Get-Item -Path (Join-Path -Path $Path -ChildPath $admlName) $admxTargetPath = Join-Path -Path $env:WINDIR -ChildPath "PolicyDefinitions" $admlTargetPath = Join-Path -Path $admxTargetPath -ChildPath "en-US" $files = @($admx, $adml) foreach ($file in $files) { if (-not (Test-Path -Path $file)) { throw "Could not find $($file.Name) at $Path" } } Write-Verbose "Copying $admx to $admxTargetPath" Copy-Item -Path $admx -Destination $admxTargetPath -Force $admxTargetFullPath = Join-Path -Path $admxTargetPath -ChildPath $admxName if (Test-Path -Path $admxTargetFullPath) { Write-Verbose "$admxName was installed successfully" } else { Write-Error "Could not install $admxName" } Write-Verbose "Copying $adml to $admlTargetPath" Copy-Item -Path $adml -Destination $admlTargetPath -Force $admlTargetFullPath = Join-Path -Path $admlTargetPath -ChildPath $admlName if (Test-Path -Path $admlTargetFullPath) { Write-Verbose "$admlName was installed successfully" } else { Write-Error "Could not install $admlName" } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCJ90/Icr8AC0PX # PztF6dyoFT+ucLEEg+WYsxQzIJpS/KCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIARprUuNhtpil9vE/G9ZX3FL # F/w3czFFxBwWmQqTagvjMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAqmBhcmDuGJjuL1NtfY47zpCkGhWFbyknF+y+FIjPDFKGwdffA2+Ue7uv # chaPUHp+SwVmUOJBXGjJR9blIoTx8JdjLwF+u4V3snQlr3DoIMl9i73mleKpwGg8 # SPlfvGBxjCv2qdFMU1Ix4Atr27WXzMKN/KBdoJFq2LcswioJnFCi12GiyMbtvV1w # dodMWrgxpFanaiaaUpwluQXyaKRr9Eqr9UfSYykmAsTtBMGifKTgmumqWFkuUatV # bAcwiwZdWoUppIpioeIHYMuQlwJLhQtSTjVIrZRCQ66wvQQnh0BbthmRmfhbNf7o # FJJ0WEC/yfpvuiBvD+beNPc3h+Nw0qGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAykD0cpGFjc3yDW7BVHbkBAyILybcaZfHpIYfJKBxH8wIGZc4FwbJ1 # GBMyMDI0MDIyMDE4MTgzNi4wMTNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAevgGGy1tu847QABAAAB6zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MzRaFw0yNTAzMDUxODQ1MzRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDBFWgh2lbgV3eJp01oqiaFBuYbNc7hSKmktvJ15NrB # /DBboUow8WPOTPxbn7gcmIOGmwJkd+TyFx7KOnzrxnoB3huvv91fZuUugIsKTnAv # g2BU/nfN7Zzn9Kk1mpuJ27S6xUDH4odFiX51ICcKl6EG4cxKgcDAinihT8xroJWV # ATL7p8bbfnwsc1pihZmcvIuYGnb1TY9tnpdChWr9EARuCo3TiRGjM2Lp4piT2lD5 # hnd3VaGTepNqyakpkCGV0+cK8Vu/HkIZdvy+z5EL3ojTdFLL5vJ9IAogWf3XAu3d # 7SpFaaoeix0e1q55AD94ZwDP+izqLadsBR3tzjq2RfrCNL+Tmi/jalRto/J6bh4f # PhHETnDC78T1yfXUQdGtmJ/utI/ANxi7HV8gAPzid9TYjMPbYqG8y5xz+gI/SFyj # +aKtHHWmKzEXPttXzAcexJ1EH7wbuiVk3sErPK9MLg1Xb6hM5HIWA0jEAZhKEyd5 # hH2XMibzakbp2s2EJQWasQc4DMaF1EsQ1CzgClDYIYG6rUhudfI7k8L9KKCEufRb # K5ldRYNAqddr/ySJfuZv3PS3+vtD6X6q1H4UOmjDKdjoW3qs7JRMZmH9fkFkMzb6 # YSzr6eX1LoYm3PrO1Jea43SYzlB3Tz84OvuVSV7NcidVtNqiZeWWpVjfavR+Jj/J # OQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFHSeBazWVcxu4qT9O5jT2B+qAerhMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCDdN8voPd8C+VWZP3+W87c/QbdbWK0sOt9 # Z4kEOWng7Kmh+WD2LnPJTJKIEaxniOct9wMgJ8yQywR8WHgDOvbwqdqsLUaM4Nre # rtI6FI9rhjheaKxNNnBZzHZLDwlkL9vCEDe9Rc0dGSVd5Bg3CWknV3uvVau14F55 # ESTWIBNaQS9Cpo2Opz3cRgAYVfaLFGbArNcRvSWvSUbeI2IDqRxC4xBbRiNQ+1qH # XDCPn0hGsXfL+ynDZncCfszNrlgZT24XghvTzYMHcXioLVYo/2Hkyow6dI7uULJb # KxLX8wHhsiwriXIDCnjLVsG0E5bR82QgcseEhxbU2d1RVHcQtkUE7W9zxZqZ6/jP # maojZgXQO33XjxOHYYVa/BXcIuu8SMzPjjAAbujwTawpazLBv997LRB0ZObNckJY # yQQpETSflN36jW+z7R/nGyJqRZ3HtZ1lXW1f6zECAeP+9dy6nmcCrVcOqbQHX7Zr # 8WPcghHJAADlm5ExPh5xi1tNRk+i6F2a9SpTeQnZXP50w+JoTxISQq7vBij2nitA # sSLaVeMqoPi+NXlTUNZ2NdtbFr6Iir9ZK9ufaz3FxfvDZo365vLOozmQOe/Z+pu4 # vY5zPmtNiVIcQnFy7JZOiZVDI5bIdwQRai2quHKJ6ltUdsi3HjNnieuE72fT4eWh # xtmnN5HYCDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCA # Bol1u1wwwYgUtUowMnqYvbul3qCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6X8bZjAiGA8yMDI0MDIyMDEyMzY1 # NFoYDzIwMjQwMjIxMTIzNjU0WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpfxtm # AgEAMAoCAQACAhMAAgH/MAcCAQACAhOuMAoCBQDpgGzmAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBABw72WBlIIfdfPitXIcxN79LJ56Xg99cSVpjhklVV+Ys # eVWLfQZTsQp/dQONQxcJyDIVatdZd95N+F34V2I6G8+of7FhnsFJNOqwnBVDkado # 9+qWVxN7gyiOVHZ6azwUz1e0Cw1rPiVgS6HK2uzUFp/2eQiMWwuoa7SENG5hITaY # EBiwbcPVg0gyKD28SitkFRNcuHBlwMwBnGLg8NEeqkb7rIG3uNYzP5++ZJRZfZvc # dOnIPpxeFL3vgmwTXxb5TnYtWMdDdAh55Ef6QQEV1W9EOuRerYvEyxQySiI7Xn5n # Sfwbt5ZzhxYORrzNC6VCCLROCJNfiirgg7r6AsVnJYMxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAevgGGy1tu847QABAAAB # 6zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCDR6HLc+3ZrJpqcbWg9CQYHUD4FmSyxnlwpWNVWxYZA # kzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM63a75faQPhf8SBDTtk2DSU # gIbdizXsz76h1JdhLCz4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHr4BhstbbvOO0AAQAAAeswIgQggKkxwqtR8jBF+mZZSe8oRTL6 # Kg41uCboKT1n1Bm9DnQwDQYJKoZIhvcNAQELBQAEggIAo6r+7SdmKskclECmawxt # bFsboQIGJ/gupQ4zW7mqYo6Pduoa6VzD49amDaZSuAD5sH2SLLQaI6L2Dkvi3QyJ # H1ggAAK+oDPoi+DhDPGR5YnuRfAaJb6g6QDjB9XW7k7a5+wMrlhlabtlOMyvFY9k # 7Sb7G6PlYQh3MPq0cvfEemSg9+5D/hdTdFkCk0F2mHPkrRq3ttoML7lqlpLsUReT # FeOM/Jls2l3MToAOxswxLXy9XDS/idEFMHb6vxQ+dLZ1hy0Ydjo78n6rKDA80lFe # ASgQoIFryDpvR+NVElnQK9fjd8iACoaauJCjjL1/Khi1jXvkMwuIgl72Dq/BXUny # IV9h88kzILJC15qZ7mTBFWQPMZLzPulyxMNDt5lx3StbOj4aPjmbfk+grYhZDJn6 # LPoRFqzj+ICLtjAIyLnOZtjuEa8j75dwzW5ZBPWwPntAsZyd5BPuYlL+xSPLWSQg # 1i6eQb7lbvLuPJvCkDOz/ABeu4QGqNcvjTn3y305kFGO9PpzFma0+9xl3Zjl0fzQ # kQryT4oW42F8z81uQVznjw6BLa15mYVwuTv/tt1xEQenva6HQuaOq00AqmGyp1HB # 7nMFWbqDHAD6c0zzSe0iz8J6aWgCF/XxPC50cdsvLAadksl/EfGjGANVTURp8gKq # HoKs/LhIaT2yrUAJgibZukE= # SIG # End signature block
combined_dataset/train/non-malicious/Snapshot VM in a folder.ps1
Snapshot VM in a folder.ps1
#Revision 1 #7-29-2008 #author Jon Owings #contact - jowings at securas dot com # #Create a snapshot of all the vm's in a folder, #be sure to change to match your enviroment. use at your own risk, snapshots have been known to #cause certain configurations to lock (freeze) so test in a dev enviroment first. # $vCenter = VirtualCenterServer $vFolder = VirtualCenterFolder $sName = SnapshotName Get-vc -server $vCenter #remove old snapshots with the same name Get-Folder $vFolder | get-vm | Get-Snapshot -Name $sName | Remove-Snapshot -Confirm:$false #create a snapshot of each vm in that folder Get-Folder $vFolder | get-vm | new-snapshot -Name $sName | ConvertTo-Html | Out-File create.htm $smtpclient = New-Object System.Net.Mail.SmtpClient $smtpclient.host = "mailserver.foo.bar" $msg = New-Object system.Net.Mail.MailMessage $att = New-Object System.Net.Mail.Attachment("create.htm") $msg.Attachments.add($att) $msg.From = "your@email.com" $msg.to.add("your@email.com") $msg.Subject = "Snapshot Backups" $msg.Body = "This is the result of the snapshot scripts." $smtpclient.send($msg) Echo Done
combined_dataset/train/non-malicious/Set-LocalPassword.ps1
Set-LocalPassword.ps1
# Sets local account passwords on one or more computers # usage [computerName1,computerName2,... | ] ./Set-LocalPassword.ps1 [-user] <userName> [-password] <password> [[-computers] computerName1,computerName2,...] param( [string] $User , [string] $Password , [string[]] $ComputerNames = @() ) $ComputerNames += @($input) if (! $ComputerNames) { $ComputerNames = $env:computername } function ChangePassword ([string] $ChangeComputer, [string] $ChangeUser, [string] $ChangePassword) { "*** Setting password for $ChangeComputer/$ChangeUser" & { $ErrorActionPreference="silentlycontinue" ([ADSI] "WinNT://$computer/$user").SetPassword($password) if ($?) { " Success" } else { " Failed: $($error[0])" } } } function ShowUsage { @' usage [computerName1,computerName2,... | ] ./Set-LocalPassword.ps1 [-user] <userName> [-password] <password> [[-computers] computerName1,computerName2,...] '@ } if ($user -match '^$|-\\?|/\\?|-help' -or ! $password) { ShowUsage; break; } ForEach ($computer in $ComputerNames) { ChangePassword $computer $user $password }
combined_dataset/train/non-malicious/4246.ps1
4246.ps1
function Invoke-Portscan { [CmdletBinding()]Param ( [Parameter(ParameterSetName="cmdHosts", ValueFromPipeline=$True, Mandatory = $True)] [String[]] $Hosts, [Parameter(ParameterSetName="fHosts", Mandatory = $True)] [Alias("iL")] [String] $HostFile, [Parameter(Mandatory = $False)] [Alias("exclude")] [String] $ExcludeHosts, [Parameter(Mandatory = $False)] [Alias("p")] [String] $Ports, [Parameter(Mandatory = $False)] [Alias("iP")] [String] $PortFile, [Parameter(Mandatory = $False)] [String] $TopPorts, [Parameter(Mandatory = $False)] [Alias("xPorts")] [String] $ExcludedPorts, [Parameter(Mandatory = $False)] [Alias("Pn")] [Switch] $SkipDiscovery, [Parameter(Mandatory = $False)] [Alias("sn")] [Switch] $PingOnly, [Parameter(Mandatory = $False)] [Alias("PS")] [string] $DiscoveryPorts = "-1,445,80,443", [Parameter(Mandatory = $False)] [int] $Threads = 100, [Parameter(Mandatory = $False)] [int] $nHosts = 25, [Parameter(Mandatory = $False)] [int] $Timeout = 2000, [Parameter(Mandatory = $False)] [int] $SleepTimer = 500, [Parameter(Mandatory = $False)] [int] $SyncFreq = 1024, [Parameter(Mandatory = $False)] [int] $T, [Parameter(Mandatory = $False)] [Alias("oG")] [String] $GrepOut, [Parameter(Mandatory = $False)] [Alias("oX")] [String] $XmlOut, [Parameter(Mandatory = $False)] [Alias("oN")] [String] $ReadableOut, [Parameter(Mandatory = $False)] [Alias("oA")] [String] $AllformatsOut, [Parameter(Mandatory = $False)] [Switch] $noProgressMeter, [Parameter(Mandatory = $False)] [Alias("q")] [Switch] $quiet, [Parameter(Mandatory = $False)] [Alias("F")] [Switch] $ForceOverwrite ) PROCESS { Set-StrictMode -Version 2.0 $version = .13 $hostList = New-Object System.Collections.ArrayList $portList = New-Object System.Collections.ArrayList $hostPortList = New-Object System.Collections.ArrayList $scannedHostList = @() function Parse-Hosts { Param ( [Parameter(Mandatory = $True)] [String] $Hosts ) [String[]] $iHosts = $Hosts.Split(",") foreach($iHost in $iHosts) { $iHost = $iHost.Replace(" ", "") if(!$iHost) { continue } if($iHost.contains("/")) { $netPart = $iHost.split("/")[0] [uint32]$maskPart = $iHost.split("/")[1] $address = [System.Net.IPAddress]::Parse($netPart) if ($maskPart -ge $address.GetAddressBytes().Length * 8) { throw "Bad host mask" } $numhosts = [System.math]::Pow(2,(($address.GetAddressBytes().Length *8) - $maskPart)) $startaddress = $address.GetAddressBytes() [array]::Reverse($startaddress) $startaddress = [System.BitConverter]::ToUInt32($startaddress, 0) [uint32]$startMask = ([System.math]::Pow(2, $maskPart)-1) * ([System.Math]::Pow(2,(32 - $maskPart))) $startAddress = $startAddress -band $startMask $startAddress = [System.BitConverter]::GetBytes($startaddress)[0..3] [array]::Reverse($startaddress) $address = [System.Net.IPAddress] [byte[]] $startAddress $hostList.Add($address.IPAddressToString) for ($i=0; $i -lt $numhosts-1; $i++) { $nextAddress = $address.GetAddressBytes() [array]::Reverse($nextAddress) $nextAddress = [System.BitConverter]::ToUInt32($nextAddress, 0) $nextAddress ++ $nextAddress = [System.BitConverter]::GetBytes($nextAddress)[0..3] [array]::Reverse($nextAddress) $address = [System.Net.IPAddress] [byte[]] $nextAddress $hostList.Add($address.IPAddressToString) } } else { $hostList.Add($iHost) } } } function Parse-ILHosts { Param ( [Parameter(Mandatory = $True)] [String] $HostFile ) Get-Content $HostFile | ForEach-Object { Parse-Hosts $_ } } function Exclude-Hosts { Param ( [Parameter(Mandatory = $True)] [String] $excludeHosts ) [String[]] $iHosts = $excludeHosts.Split(",") foreach($iHost in $iHosts) { $iHost = $iHost.Replace(" ", "") $hostList.Remove($iHost) } } function Get-TopPort { Param ( [Parameter(Mandatory = $True)] [ValidateRange(1,1000)] [int] $numPorts ) [int[]] $topPortList = @(80,23,443,21,3389,110,445,139,143,53,135,3306,8080,22 1723,111,995,993,5900,1025,1720,548,113,81,6001,179,1026,2000,8443, 8000,32768,554,26,1433,49152,2001,515,8008,49154,1027,5666,646,5000, 5631,631,49153,8081,2049,88,79,5800,106,2121,1110,49155,6000,513, 990,5357,49156,543,544,5101,144,7,389,8009,9999,5009,7070,5190,3000, 5432,1900,3986,13,1029,9,5051,6646,49157,1028,873,1755,2717,4899,9100, 119,37,1000,3001,5001,82,10010,1030,9090,2107,1024,2103,6004,1801, 5050,19,8031,1041,255,1048,1049,1053,1054,1056,1064,3703,17,808,3689, 1031,1044,1071,5901,100,9102,2869,4001,5120,8010,9000,2105,636,1038, 2601,1,7000,1066,1069,625,311,280,254,4000,1761,5003,2002,1998,2005, 1032,1050,6112,1521,2161,6002,2401,902,4045,787,7937,1058,2383,1033, 1040,1059,50000,5555,1494,3,593,2301,3268,7938,1022,1234,1035,1036,1037, 1074,8002,9001,464,497,1935,2003,6666,6543,24,1352,3269,1111,407,500, 20,2006,1034,1218,3260,15000,4444,264,33,2004,1042,42510,999,3052,1023, 222,1068,888,7100,1717,992,2008,7001,2007,8082,512,1043,2009,5801,1700, 7019,50001,4662,2065,42,2602,3333,9535,5100,2604,4002,5002,1047,1051,1052, 1055,1060,1062,1311,3283,4443,5225,5226,6059,6789,8089,8651,8652,8701,9415, 9593,9594,9595,16992,16993,20828,23502,32769,33354,35500,52869,55555,55600, 64623,64680,65000,65389,1067,13782,366,5902,9050,85,1002,5500,1863,1864, 5431,8085,10243,45100,49999,51103,49,90,6667,1503,6881,27000,340,1500,8021, 2222,5566,8088,8899,9071,5102,6005,9101,163,5679,146,648,1666,83,3476,5004, 5214,8001,8083,8084,9207,14238,30,912,12345,2030,2605,6,541,4,1248,3005,8007, 306,880,2500,1086,1088,2525,4242,8291,9009,52822,900,6101,2809,7200,211,800, 987,1083,12000,705,711,20005,6969,13783,1045,1046,1061,1063,1070,1072,1073, 1075,1077,1078,1079,1081,1082,1085,1093,1094,1096,1098,1099,1100,1104,1106, 1107,1108,1148,1169,1272,1310,1687,1718,1783,1840,2100,2119,2135,2144,2160, 2190,2260,2381,2399,2492,2607,2718,2811,2875,3017,3031,3071,3211,3300,3301, 3323,3325,3351,3404,3551,3580,3659,3766,3784,3801,3827,3998,4003,4126,4129, 4449,5222,5269,5633,5718,5810,5825,5877,5910,5911,5925,5959,5960,5961,5962, 5987,5988,5989,6123,6129,6156,6389,6580,6901,7106,7625,7777,7778,7911,8086, 8181,8222,8333,8400,8402,8600,8649,8873,8994,9002,9011,9080,9220,9290,9485, 9500,9502,9503,9618,9900,9968,10002,10012,10024,10025,10566,10616,10617,10621, 10626,10628,10629,11110,13456,14442,15002,15003,15660,16001,16016,16018,17988, 19101,19801,19842,20000,20031,20221,20222,21571,22939,24800,25734,27715,28201, 30000,30718,31038,32781,32782,33899,34571,34572,34573,40193,48080,49158,49159, 49160,50003,50006,50800,57294,58080,60020,63331,65129,691,212,1001,1999,2020, 2998,6003,7002,50002,32,2033,3372,99,425,749,5903,43,458,5405,6106,6502,7007, 13722,1087,1089,1124,1152,1183,1186,1247,1296,1334,1580,1782,2126,2179,2191,2251, 2522,3011,3030,3077,3261,3493,3546,3737,3828,3871,3880,3918,3995,4006,4111,4446, 5054,5200,5280,5298,5822,5859,5904,5915,5922,5963,7103,7402,7435,7443,7512,8011, 8090,8100,8180,8254,8500,8654,9091,9110,9666,9877,9943,9944,9998,10004,10778,15742, 16012,18988,19283,19315,19780,24444,27352,27353,27355,32784,49163,49165,49175, 50389,50636,51493,55055,56738,61532,61900,62078,1021,9040,666,700,84,545,1112, 1524,2040,4321,5802,38292,49400,1084,1600,2048,2111,3006,6547,6699,9111,16080, 555,667,720,801,1443,1533,2106,5560,6007,1090,1091,1114,1117,1119,1122,1131,1138, 1151,1175,1199,1201,1271,1862,2323,2393,2394,2608,2725,2909,3003,3168,3221,3322, 3324,3390,3517,3527,3800,3809,3814,3826,3869,3878,3889,3905,3914,3920,3945,3971, 4004,4005,4279,4445,4550,4567,4848,4900,5033,5080,5087,5221,5440,5544,5678,5730, 5811,5815,5850,5862,5906,5907,5950,5952,6025,6510,6565,6567,6689,6692,6779,6792, 6839,7025,7496,7676,7800,7920,7921,7999,8022,8042,8045,8093,8099,8200,8290,8292, 8300,8383,9003,9081,9099,9200,9418,9575,9878,9898,9917,10003,10180,10215,11111, 12174,12265,14441,15004,16000,16113,17877,18040,18101,19350,25735,26214,27356, 30951,32783,32785,40911,41511,44176,44501,49161,49167,49176,50300,50500,52673, 52848,54045,54328,55056,56737,57797,60443,70,417,714,722,777,981,1009,2022,4224, 4998,6346,301,524,668,765,2041,5999,10082,259,1007,1417,1434,1984,2038,2068,4343, 6009,7004,44443,109,687,726,911,1461,2035,4125,6006,7201,9103,125,481,683,903, 1011,1455,2013,2043,2047,6668,6669,256,406,843,2042,2045,5998,9929,31337,44442, 1092,1095,1102,1105,1113,1121,1123,1126,1130,1132,1137,1141,1145,1147,1149,1154, 1164,1165,1166,1174,1185,1187,1192,1198,1213,1216,1217,1233,1236,1244,1259,1277, 1287,1300,1301,1309,1322,1328,1556,1641,1688,1719,1721,1805,1812,1839,1875,1914, 1971,1972,1974,2099,2170,2196,2200,2288,2366,2382,2557,2800,2910,2920,2968,3007, 3013,3050,3119,3304,3307,3376,3400,3410,3514,3684,3697,3700,3824,3846,3848,3859, 3863,3870,3872,3888,3907,3916,3931,3941,3957,3963,3968,3969,3972,3990,3993,3994, 4009,4040,4080,4096,4143,4147,4200,4252,4430,4555,4600,4658,4875,4949,5040,5063, 5074,5151,5212,5223,5242,5279,5339,5353,5501,5807,5812,5818,5823,5868,5869,5899, 5905,5909,5914,5918,5938,5940,5968,5981,6051,6060,6068,6203,6247,6500,6504,6520, 6550,6600) $numPorts-- $portList.AddRange($topPortList[0..$numPorts]) } function Parse-Ports { Param ( [Parameter(Mandatory = $True)] [String] $Ports, [Parameter(Mandatory = $True)] $pList ) foreach ($pRange in $Ports.Split(",")) { if ($pRange -eq "-1") { $pList.Add([int]$pRange) } elseif ($pRange.Contains("-")) { [int[]] $range = $pRange.Split("-") if ($range.Count -ne 2 -or $pRange.Split("-")[0] -eq "" -or $pRange.split("-")[1] -eq "") { throw "Invalid port range" } $pList.AddRange($range[0]..$range[1]) } else { $pList.Add([int]$pRange) } } foreach ($p in $pList) { if ($p -lt -1 -or $p -gt 65535) { throw "Port $p out of range" } } } function Parse-IpPorts { Param ( [Parameter(Mandatory = $True)] [String] $PortFile ) Get-Content $PortFile | ForEach-Object { Parse-Ports -Ports $_ -pList $portList } } function Remove-Ports { Param ( [Parameter(Mandatory = $True)] [string] $ExcludedPorts ) [int[]] $ExcludedPorts = $ExcludedPorts.Split(",") foreach ($x in $ExcludedPorts) { $portList.Remove($x) } } function Write-PortscanOut { Param ( [Parameter(Mandatory = $True, ParameterSetName="Comment")] [string] $comment, [Parameter(Mandatory = $True, ParameterSetName="HostOut")] [string] $outhost, [Parameter(Mandatory = $True, ParameterSetName="HostOut")] [bool] $isUp, [Parameter(Mandatory = $True, ParameterSetName="HostOut")] $openPorts, [Parameter(Mandatory = $True, ParameterSetName="HostOut")] $closedPorts, [Parameter(Mandatory = $True, ParameterSetName="HostOut")] $filteredPorts, [Parameter()] [bool] $SkipDiscovery, [Parameter()] [System.IO.StreamWriter] $grepStream, [Parameter()] [System.Xml.XmlWriter] $xmlStream, [Parameter()] [System.IO.StreamWriter] $readableStream ) switch ($PSCmdlet.ParameterSetName) { "Comment" { Write-Verbose $comment if ($grepStream) { $grepStream.WriteLine(" } if ($xmlStream) { $xmlStream.WriteComment($comment) } if ($readableStream) { $readableStream.WriteLine($comment) } } "HostOut" { $oPort = [string]::join(",", $openPorts.ToArray()) $cPort = [string]::join(",", $closedPorts.ToArray()) $fPort = [string]::join(",", $filteredPorts.ToArray()) if ($grepStream) { if ($isUp -and !$SkipDiscovery) { $grepStream.writeline("Host: $outhost`tStatus: Up") } if ($isUp -or $SkipDiscovery) { if ($oPort -ne "") { $grepStream.writeline("Host: $outhost`tOpen Ports: $oPort") } if ($cPort -ne "") { $grepStream.writeline("Host: $outhost`tClosed Ports: $cPort") } if ($fPort -ne "") { $grepStream.writeline("Host: $outhost`tFiltered Ports: $fPort") } } elseif (!$SkipDiscovery) { $grepStream.writeline("Host: $outhost`tStatus: Down") } } if ($xmlStream) { $xmlStream.WriteStartElement("Host") $xmlStream.WriteAttributeString("id", $outhost) if (!$SkipDiscovery) { if ($isUp) { $xmlStream.WriteAttributeString("Status", "Up") } else { $xmlStream.WriteAttributeString("Status", "Downs") } } $xmlStream.WriteStartElement("Ports") foreach($p in $openPorts) { $xmlStream.writestartElement("Port") $xmlStream.WriteAttributeString("id", [string]$p) $xmlStream.WriteAttributeString("state", "open") $xmlStream.WriteEndElement() } foreach ($p in $closedPorts) { $xmlStream.writestartElement("Port") $xmlStream.WriteAttributeString("id", [string]$p) $xmlStream.WriteAttributeString("state", "closed") $xmlStream.WriteEndElement() } foreach ($p in $filteredPorts) { $xmlStream.writestartElement("Port") $xmlStream.WriteAttributeString("id", [string]$p) $xmlStream.WriteAttributeString("state", "filtered") $xmlStream.WriteEndElement() } $xmlStream.WriteEndElement() $xmlStream.WriteEndElement() } if ($readableStream) { $readableStream.writeline("Porscan.ps1 scan report for $outhost") if ($isUp) { $readableStream.writeline("Host is up") } if ($isUp -or $SkipDiscovery) { $readableStream.writeline(("{0,-10}{1,0}" -f "PORT", "STATE")) [int[]]$allports = $openPorts + $closedPorts + $filteredPorts foreach($p in ($allports| Sort-Object)) { if ($openPorts.Contains($p)) { $readableStream.writeline(("{0,-10}{1,0}" -f $p, "open")) } elseif ($closedPorts.Contains($p)) { $readableStream.writeline(("{0,-10}{1,0}" -f $p, "closed")) } elseif ($filteredPorts.Contains($p)) { $readableStream.writeline(("{0,-10}{1,0}" -f $p, "filtered")) } } } elseif(!$SkipDiscovery) { $readableStream.writeline("Host is Down") } $readableStream.writeline("") } } } } function Convert-SwitchtoBool { Param ( [Parameter(Mandatory = $True)] $switchValue ) If ($switchValue) { return $True } return $False } try { [bool] $SkipDiscovery = Convert-SwitchtoBool ($SkipDiscovery) [bool] $PingOnly = Convert-SwitchtoBool ($PingOnly) [bool] $quiet = Convert-SwitchtoBool ($quiet) [bool] $ForceOverwrite = Convert-SwitchtoBool ($ForceOverwrite) [Environment]::CurrentDirectory=(Get-Location -PSProvider FileSystem).ProviderPath if ($PsCmdlet.ParameterSetName -eq "cmdHosts") { foreach($h in $Hosts) { Parse-Hosts($h) | Out-Null } } else { Parse-ILHosts($HostFile) | Out-Null } if($ExcludeHosts) { Exclude-Hosts($ExcludeHosts) } if (($TopPorts -and $Ports) -or ($TopPorts -and $PortFile)) { throw "Cannot set topPorts with other specific ports" } if($Ports) { Parse-Ports -Ports $Ports -pList $portList | Out-Null } if($PortFile) { Parse-IpPorts($PortFile) | Out-Null } if($portList.Count -eq 0) { if ($TopPorts) { Get-TopPort($TopPorts) | Out-Null } else { Get-TopPort(50) | Out-Null } } if ($ExcludedPorts) { Remove-Ports -ExcludedPorts $ExcludedPorts | Out-Null } if($T) { switch ($T) { 5 {$nHosts=30; $Threads = 1000; $Timeout = 750 } 4 {$nHosts=25; $Threads = 1000; $Timeout = 1200 } 3 {$nHosts=20; $Threads = 100; $Timeout = 2500 } 2 {$nHosts=15; $Threads = 32; $Timeout = 3000 } 1 {$nHosts=10; $Threads = 32; $Timeout = 5000 } default { throw "Invalid T parameter" } } } $grepStream = $null $xmlStream = $null $readableStream = $null if($AllformatsOut) { if ($GrepOut -or $XmlOut -or $ReadableOut) { Write-Warning "Both -oA specified with other output... going to ignore -oG/-oN/-oX" } $GrepOut = $AllformatsOut + ".gnmap" $XmlOut = $AllformatsOut + ".xml" $ReadableOut = $AllformatsOut + ".nmap" } if ($GrepOut) { if (!$ForceOverwrite -and (Test-Path $GrepOut)) { throw "Error: $AllformatsOut already exists. Either delete the file or specify the -f flag" } $grepStream = [System.IO.StreamWriter] $GrepOut } if ($ReadableOut) { if (!$ForceOverwrite -and (Test-Path $ReadableOut)) { throw "Error: $ReadableOut already exists. Either delete the file or specify the -f flag" } $readableStream = [System.IO.StreamWriter] $ReadableOut } if ($XmlOut) { if (!$ForceOverwrite -and (Test-Path $XmlOut)) { throw "Error: $XmlOut already exists. Either delete the file or specify the -f flag" } $xmlStream = [System.xml.xmlwriter]::Create([string]$XmlOut) $xmlStream.WriteStartDocument() $xmlStream.WriteStartElement("Portscanrun") $xmlStream.WriteAttributeString("version", $version) } Parse-Ports -Ports $DiscoveryPorts -pList $hostPortList | Out-Null $startdate = Get-Date $myInvocationLine = $PSCmdlet.MyInvocation.Line $startMsg = "Invoke-Portscan.ps1 v$version scan initiated $startdate as: $myInvocationLine" Write-PortscanOut -comment $startMsg -grepStream $grepStream -xmlStream $xmlStream -readableStream $readableStream $sPortList = [string]::join(",", $portList) $sHostPortList = [string]::join(",", $hostPortList) $portScanCode = { param ( [Parameter( Mandatory = $True)] [string] $thost, [Parameter( Mandatory = $True)][bool] $SkipDiscovery, [Parameter( Mandatory = $True)][bool] $PingOnly, [Parameter( Mandatory = $True)][int] $Timeout, [Parameter( Mandatory = $True)] $PortList, [Parameter( Mandatory = $True)] $hostPortList, [Parameter( Mandatory = $True)][int] $maxthreads) Process { $openPorts = New-Object System.Collections.ArrayList $closedPorts = New-Object System.Collections.ArrayList $filteredPorts = New-Object System.Collections.ArrayList $sockets = @{} $timeouts = New-Object Hashtable $fThreads = New-Object int $aThreads = New-Object int [System.Threading.ThreadPool]::GetMaxThreads([ref]$fThreads, [ref]$aThreads) | Out-Null [System.Threading.ThreadPool]::SetMaxThreads($fthreads,$maxthreads) | Out-Null function New-ScriptBlockCallback { param( [parameter(Mandatory=$true)] [ValidateNotNullOrEmpty()] [scriptblock]$Callback ) if (-not ("CallbackEventBridge" -as [type])) { Add-Type @" using System; public sealed class CallbackEventBridge { public event AsyncCallback CallbackComplete = delegate { }; private CallbackEventBridge() {} private void CallbackInternal(IAsyncResult result) { CallbackComplete(result); } public AsyncCallback Callback { get { return new AsyncCallback(CallbackInternal); } } public static CallbackEventBridge Create() { return new CallbackEventBridge(); } } "@ } $bridge = [CallbackEventBridge]::Create() Register-ObjectEvent -InputObject $bridge -EventName CallbackComplete -Action $Callback | Out-Null $bridge.Callback } function Test-Port { Param ( [Parameter(Mandatory = $True)] [String] $h, [Parameter(Mandatory = $True)] [int] $p, [Parameter(Mandatory = $True)] [int] $timeout ) try { $pAddress = [System.Net.IPAddress]::Parse($h) $sockets[$p] = new-object System.Net.Sockets.TcpClient $pAddress.AddressFamily } catch { $sockets[$p] = new-object System.Net.Sockets.TcpClient } $scriptBlockAsString = @" if ( `$sockets[$p] -ne `$NULL) { if (!`$timeouts[$p].Disposed) { `$timeouts[$p].Dispose() } `$status = `$sockets[$p].Connected; if (`$status -eq `$True) { `$openPorts.Add($p) } else { `$closedPorts.Add($p) } `$sockets[$p].Close(); `$sockets.Remove($p) } "@ $timeoutCallback = @" `$sockets[$p].Close() if (!`$timeouts[$p].Disposed) { `$timeouts[$p].Dispose() `$filteredPorts.Add($p) } `$sockets.Remove($p) "@ $timeoutCallback = [scriptblock]::Create($timeoutCallback) $timeouts[$p] = New-Object System.Timers.Timer Register-ObjectEvent -InputObject $timeouts[$p] -EventName Elapsed -Action $timeoutCallback | Out-Null $timeouts[$p].Interval = $timeout $timeouts[$p].Enabled = $true $myscriptblock = [scriptblock]::Create($scriptBlockAsString) $x = $sockets[$p].beginConnect($h, $p,(New-ScriptBlockCallback($myscriptblock)) , $null) } function PortScan-Alive { Param ( [Parameter(Mandatory = $True)] [String] $h ) Try { if ($hostPortList.Contains(-1)) { $ping = new-object System.Net.NetworkInformation.Ping $pResult = $ping.send($h) if ($pResult.Status -eq "Success") { return $True } } foreach($Port in $hostPortList) { if ($Port -ne -1) { Test-Port -h $h -p $Port -timeout $Timeout } } do { Start-Sleep -Milli 100 if (($openPorts.Count -gt 0) -or ($closedPorts.Count -gt 0)) { return $True } } While ($sockets.Count -gt 0) } Catch { Write-Error "Exception trying to host scan $h" Write-Error $_.Exception.Message; } return $False } function Portscan-Port { Param ( [Parameter(Mandatory = $True)] [String] $h ) [string[]]$Ports = @() foreach($Port in $Portlist) { Try { Test-Port -h $h -p $Port -timeout $Timeout } Catch { Write-Error "Exception trying to scan $h port $Port" Write-Error $_.Exception.Message; } } } [bool] $hostResult = $False if(!$SkipDiscovery) { [bool] $hostResult = PortScan-Alive $thost $openPorts.clear() $closedPorts.clear() $filteredPorts.Clear() } if((!$PingOnly) -and ($hostResult -or $SkipDiscovery)) { Portscan-Port $thost } while ($sockets.Count -gt 0) { Start-Sleep -Milli 500 } return @($hostResult, $openPorts, $closedPorts, $filteredPorts) } } [int]$saveIteration = 0 [int]$computersDone=0 [int]$upHosts=0 while (($saveIteration * $SyncFreq) -lt $hostList.Count) { Get-Job | Remove-Job -Force $sIndex = ($saveIteration*$SyncFreq) $eIndex = (($saveIteration+1)*$SyncFreq)-1 foreach ($iHost in $hostList[$sIndex..$eIndex]) { $ctr = @(Get-Job -state Running) while ($ctr.Count -ge $nHosts) { Start-Sleep -Milliseconds $SleepTimer $ctr = @(Get-Job -state Running) } $computersDone++ if(!$noProgressMeter) { Write-Progress -status "Port Scanning" -Activity $startMsg -CurrentOperation "starting computer $computersDone" -PercentComplete ($computersDone / $hostList.Count * 100) } Start-Job -ScriptBlock $portScanCode -Name $iHost -ArgumentList @($iHost, $SkipDiscovery, $PingOnly, $Timeout, $portList, $hostPortList, $Threads) | Out-Null } Get-Job | Wait-Job | Out-Null foreach ($job in Get-Job) { $jobOut = @(Receive-Job $job) [bool]$hostUp = $jobOut[0] $jobName = $job.Name $openPorts = $jobOut[1] $closedPorts = $jobOut[2] $filteredPorts = $jobOut[3] if($hostUp) { $upHosts ++ } if (!$quiet) { $hostDate = Get-Date $hostObj = New-Object System.Object $hostObj | Add-Member -MemberType Noteproperty -Name Hostname -Value $jobName $hostObj | Add-Member -MemberType Noteproperty -Name alive -Value $hostUp $hostObj | Add-Member -MemberType Noteproperty -Name openPorts -Value $openPorts $hostObj | Add-Member -MemberType Noteproperty -Name closedPorts -Value $closedPorts $hostObj | Add-Member -MemberType Noteproperty -Name filteredPorts -Value $filteredPorts $hostObj | Add-Member -MemberType NoteProperty -Name finishTime -Value $hostDate $scannedHostList += $hostobj } Write-PortscanOut -outhost $jobName -isUp $hostUp -openPorts $openPorts -closedPorts $closedPorts -filteredPorts $filteredPorts -grepStream $grepStream -xmlStream $xmlStream -readableStream $readableStream -SkipDiscovery $SkipDiscovery } if ($grepStream) { $grepStream.flush() } if ($xmlStream) { $xmlStream.flush() } if($readableStream) { $readableStream.flush() } $saveIteration ++ } $enddate = Get-Date $totaltime = ($enddate - $startdate).TotalSeconds $endMsg = "Port scan complete at $enddate ($totaltime seconds)" if (!$SkipDiscovery) { $endMsg += ", $upHosts hosts are up" } Write-PortscanOut -comment $endMsg -grepStream $grepStream -xmlStream $xmlStream -readableStream $readableStream if($grepStream) { $grepStream.Close() } if ($xmlStream) { $xmlStream.Close() } if($readableStream) { $readableStream.Close() } return $scannedHostList } Catch { Write-Error $_.Exception.Message; } } }
combined_dataset/train/non-malicious/sample_51_33.ps1
sample_51_33.ps1
# # Module manifest for module 'Microsoft.SME.FileExplorer' # @{ # Script module or binary module file associated with this manifest. RootModule = 'Microsoft.SME.FileExplorer.psm1' # Version number of this module. ModuleVersion = '4.14.0' # Supported PSEditions # CompatiblePSEditions = @() # ID used to uniquely identify this module GUID = '5d7219a0-26a2-4a82-a273-d6f47227454b' # Author of this module Author = 'SME' # Company or vendor of this module CompanyName = 'Microsoft' # Copyright statement for this module Copyright = '(c) 2018 Microsoft. All rights reserved.' # Description of the functionality provided by this module # Description = '' # Minimum version of the Windows PowerShell engine required by this module PowerShellVersion = '5.0' # Name of the Windows PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the Windows PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # CLRVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @() # Assemblies that must be loaded prior to importing this module # RequiredAssemblies = @() # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = @( 'Add-WACFEFolderShare', 'Add-WACFEFolderShareNameUser', 'Add-WACFEFolderShareUser', 'Compress-WACFEArchiveFileSystemEntity', 'Disable-WACFEKdcProxy', 'Disable-WACFESmbOverQuic', 'Edit-WACFEFolderShareInheritanceFlag', 'Edit-WACFEFolderShareUser', 'Edit-WACFESmbFileShare', 'Edit-WACFESmbServerCertificateMapping', 'Enable-WACFESmbOverQuic', 'Expand-WACFEArchiveFileSystemEntity', 'Get-WACFEBestHostNode', 'Get-WACFECertificates', 'Get-WACFEComputerName', 'Get-WACFEFileNamesInPath', 'Get-WACFEFileSystemEntities', 'Get-WACFEFileSystemRoot', 'Get-WACFEFolderItemCount', 'Get-WACFEFolderOwner', 'Get-WACFEFolderShareNames', 'Get-WACFEFolderSharePath', 'Get-WACFEFolderShareStatus', 'Get-WACFEFolderShareUsers', 'Get-WACFEIsAzureTurbineServer', 'Get-WACFEItemProperties', 'Get-WACFEItemType', 'Get-WACFELocalGroups', 'Get-WACFELocalUsers', 'Get-WACFEOSDetails', 'Get-WACFEShareEntities', 'Get-WACFESmb1InstallationStatus', 'Get-WACFESmbFileShareDetails', 'Get-WACFESmbOverQuicSettings', 'Get-WACFESmbServerCertificateHealth', 'Get-WACFESmbServerCertificateMapping', 'Get-WACFESmbServerCertificateValues', 'Get-WACFESmbServerSettings', 'Get-WACFESmbShareAccess', 'Get-WACFEStorageFileShare', 'Get-WACFETempFolderPath', 'Move-WACFEFile', 'New-WACFEFile', 'New-WACFEFolder', 'New-WACFESmbFileShare', 'Remove-WACFEAllShareNames', 'Remove-WACFEFileSystemEntity', 'Remove-WACFEFolderShareUser', 'Remove-WACFESmbServerCertificateMapping', 'Remove-WACFESmbShare', 'Rename-WACFEFileSystemEntity', 'Restore-WACFEConfigureSmbServerCertificateMapping', 'Set-WACFESmbOverQuicServerSettings', 'Set-WACFESmbServerCertificateMapping', 'Set-WACFESmbServerSettings', 'Test-WACFEFileSystemEntity', 'Uninstall-WACFESmb1', 'Get-WACFECimWin32LogicalDisk', 'Get-WACFECimWin32NetworkAdapter', 'Get-WACFECimWin32PhysicalMemory', 'Get-WACFECimWin32Processor', 'Get-WACFEClusterInventory', 'Get-WACFEClusterNodes', 'Get-WACFEDecryptedDataFromNode', 'Get-WACFEEncryptionJWKOnNode', 'Get-WACFEServerInventory' ) # Function attributes: {"localScripts":["Add-WACFEFolderShare","Add-WACFEFolderShareNameUser","Add-WACFEFolderShareUser","Compress-WACFEArchiveFileSystemEntity","Disable-WACFEKdcProxy","Disable-WACFESmbOverQuic","Edit-WACFEFolderShareInheritanceFlag","Edit-WACFEFolderShareUser","Edit-WACFESmbFileShare","Edit-WACFESmbServerCertificateMapping","Enable-WACFESmbOverQuic","Expand-WACFEArchiveFileSystemEntity","Get-WACFEBestHostNode","Get-WACFECertificates","Get-WACFEComputerName","Get-WACFEFileNamesInPath","Get-WACFEFileSystemEntities","Get-WACFEFileSystemRoot","Get-WACFEFolderItemCount","Get-WACFEFolderOwner","Get-WACFEFolderShareNames","Get-WACFEFolderSharePath","Get-WACFEFolderShareStatus","Get-WACFEFolderShareUsers","Get-WACFEIsAzureTurbineServer","Get-WACFEItemProperties","Get-WACFEItemType","Get-WACFELocalGroups","Get-WACFELocalUsers","Get-WACFEOSDetails","Get-WACFEShareEntities","Get-WACFESmb1InstallationStatus","Get-WACFESmbFileShareDetails","Get-WACFESmbOverQuicSettings","Get-WACFESmbServerCertificateHealth","Get-WACFESmbServerCertificateMapping","Get-WACFESmbServerCertificateValues","Get-WACFESmbServerSettings","Get-WACFESmbShareAccess","Get-WACFEStorageFileShare","Get-WACFETempFolderPath","Move-WACFEFile","New-WACFEFile","New-WACFEFolder","New-WACFESmbFileShare","Remove-WACFEAllShareNames","Remove-WACFEFileSystemEntity","Remove-WACFEFolderShareUser","Remove-WACFESmbServerCertificateMapping","Remove-WACFESmbShare","Rename-WACFEFileSystemEntity","Restore-WACFEConfigureSmbServerCertificateMapping","Set-WACFESmbOverQuicServerSettings","Set-WACFESmbServerCertificateMapping","Set-WACFESmbServerSettings","Test-WACFEFileSystemEntity","Uninstall-WACFESmb1"],"externalScripts":["Get-WACFECimWin32LogicalDisk","Get-WACFECimWin32NetworkAdapter","Get-WACFECimWin32PhysicalMemory","Get-WACFECimWin32Processor","Get-WACFEClusterInventory","Get-WACFEClusterNodes","Get-WACFEDecryptedDataFromNode","Get-WACFEEncryptionJWKOnNode","Get-WACFEServerInventory"]} # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = @() # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. # Tags = @() # A URL to the license for this module. # LicenseUri = '' # A URL to the main website for this project. # ProjectUri = '' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module # ReleaseNotes = '' } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBEmxc9NKbruYXE # wwrJofMbG/K5rjwETsUSqzWQR4vZM6CCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJnN # pKWDYFCk8WzaN2Ox3zyrhBvfW1lEOUoftmWyVOSHMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAbU59RJsIuSQJb8XXW4sZEGLzgXVVoFOKvL7g # bHMgcKVxvpZSxzzz90DcrQ4DlVvfZjXmxMwQ0fZn1KWi1e5InoOeRznMPhbveXTg # VuelrZjwz0gylPni7ah8C6mXpJ/juYDStmKRv169Bquub9nORDkeoLqt5Lc7QXIT # FXff7M5ATVt2mAZfc38aHmG0al62ebkQx36W83Uv2Cs7JCELHtVzSQocIHILg1gR # ISMfzdVo/UgoNEQrlWEDsWAGu4TvrA6Vu2ORmyv5PUwXpvrlC6Is7BAonFicYv88 # 2bu+8Bv6IIvAgp0vP4/2rIYz6nH3mXSP3c+2/jplyvBShvrtYqGCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBEN0M+lwuLXG02zMAF5EzgNX/fyMxgT9+p # IzB1uWKlUQIGZdXkwAZvGBMyMDI0MDIyNzE4MzA1OC42ODRaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJ # WgDREbEAAQAAAdowDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjowODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQ # Bgh2tVFR1j8jQA4NDf8bcVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnC # lF2cruXFp/l7PpMQg25E7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf # 7OidXpgsW1y8p6Vs7sD2aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3D # M2K59wHy9xrtsYK+X9erbDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4k # UQxVhqV1dc/DF6UBeuzfukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXl # PczvGd0iqr7lACwfVGog5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA # 6RxvMcb//ulNjIuGceyykMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagY # mrGk1hBykXilo9YB8Qyy5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZ # BO2dhzX3yAMipCGm6SmvmvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT24 # 93gFV/9JLGg5YJJCJXI+yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREl # oR2dI6GwaaxIyDySHYOtvIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUoXyNyVE9ZhOVizEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBALmDVdTtuI0jAEt41O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1ca # HVh2vyuQ24nz3TdOBv7rcs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaW # ZgScY8GKL7yGjyWrh78WJUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50 # WExbBSSH7rfabHendpeqbTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q # /WK/rF/ChovkhJMDvlqtETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C # /2dOfDaz1RmeOb27Kbegha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ # 8CfIOPftwt3xTX2RhMZJCVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wj # MXHf0AWlSjqRkzvSnRKzFsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix # 5+7KL8ArHfBY9UFLz4snboJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM6 # 9ff4Eeh2Kh9NsKiiph589Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5P # P37700vm/Y+PIhmp2fTvuS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjowODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/ # wjhXRn/sSA2ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOmIS08wIhgPMjAyNDAyMjcxOTUxNDNaGA8yMDI0MDIy # ODE5NTE0M1owdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6YhLTwIBADAHAgEAAgIF # SDAHAgEAAgIT3TAKAgUA6YmczwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # AKAH8KzCYtO0VXV2OIbOIEoE8HaomPpGNGwE6npvjw+Vl6EuHmzQFnMTsu/xSTQo # OBWhYdftb0Grm9pzyZdhi8EZzuWWrc3hirxGeu5z5qhI3rcg1EF9y7qYz7DygXas # Ju/zy/rYWOdn3muT44BZe0qgd8jUlsBQz7kLyd0aQ1P3MYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAA # AdowDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQg08L1x6JRyi4mmfPdMo0RTZfg+u9Lls0ASjYL2O5T # yG4wgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09 # 020I5ljibrW/ndICOxg9xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB2o7VyVoA0RGxAAEAAAHaMCIEIIgw2eAm4DnAMIgko4ZfaxK6 # ThblKcp8cJ9qySvCsWwCMA0GCSqGSIb3DQEBCwUABIICAEWVYFyaSWm05S8iaAMU # Y9WKXHwT9VTFLDV7JyqdvuIXIh2YaHgLQZLTWycg047H0jlxybEAKSR916xKWG5E # OinCLUV0RIo06QLhGoQxKIVv66tEWFS8aKBy2ajCdUQ6fAvXGiNr9lubtRANufUD # uSeXkzFg431iYcTCjlQwlz3rkjozSOw10VHdGAe9w/483m7KPK8Su/buYt0LBuJe # oSNLu6FlBeYgk0yLW8cIrmDuMR6EGc8gn8rsDvqVAqxmLzan1tWE8kJ7yp0XOXgo # MWsEzIOiP3cHJUcuzAZugRESE/z4AD6Pn5ja3dN3jI9SGbA+TNNVWQ+W0ghCYF0B # 0ifzSBt7MpExnRuVUqNmI2vSxm6PRfcXVdkShs1JHFHBa4zSSjVEZhivAi8lR1oP # dd1OsQ9qTkYBEiilsr2Ls+gFYPdkeuwfRqyk2p+0AShtysdGzPZSADFH+sdgzk+P # ew6Zx/1MDZQ2PUtcsN3O7y8v3XNUe3Q8XbG4hJlw21tCfqY1JnTTRQZvv5WuGEmV # CZANOTP5A9vVuK17Ox1V/O3DbfBRt9PHQ88ObEr6ABCbLl0p0PxHL5Twpx9F3bZo # zQ3WWxP4tfXzfHiIH3jvH4IYguY5FEM5y4CBbs3Z0rWmhLCNoE+P/kppV+VTPdEV # CvShs2w+rp4oALNFbiVmfmtC # SIG # End signature block
combined_dataset/train/non-malicious/4049.ps1
4049.ps1
@{ ShowModuleLoadDetails = $false CD_GetChildItem = $false CD_EchoNewLocation = $false TextEditor = 'Notepad.exe' PromptTheme = 'Modern' PageHelpUsingLess = $true SmtpFrom = $null SmtpHost = $null SmtpPort = $null FileSizeInUnits = $false ModulesToImport = @{ CD = $true DirectoryServices = $false FileSystem = $false GetHelp = $false Net = $false Prompt = $false TranscribeSession = $false Utility = $true Vhd = $false Wmi = $false } }
combined_dataset/train/non-malicious/sample_39_93.ps1
sample_39_93.ps1
<############################################################# # # # Copyright (C) Microsoft Corporation. All rights reserved. # # # #############################################################> Import-Module $PSScriptRoot\AzStackHci.AddNode.Helpers.psm1 -Force -DisableNameChecking -Global Import-Module $PSScriptRoot\..\AzStackHci.EnvironmentChecker.Utilities.psm1 -Force -DisableNameChecking -Global Import-Module $PSScriptRoot\..\AzStackHci.EnvironmentChecker.Reporting.psm1 -Force -DisableNameChecking -Global Import-LocalizedData -BindingVariable lanTxt -FileName AzStackHci.AddNode.Strings.psd1 function Invoke-AzStackHciAddNodeValidation { <# .SYNOPSIS Perform AzStackHci AddNode Validation .DESCRIPTION Perform AzStackHci AddNode Validation .EXAMPLE PS C:\> $AdCredential = Get-Credential -Message "Credential for Active Directory" PS C:\> $LocalCredential = Get-Credential -Message "Credential for new node" PS C:\> Invoke-AzStackHciAddNodeValidation -ComputerName Node05 -ActiveDirectoryCredential $AdCredential -LocalCredential $LocalCredential -Ip 192.168.1.5 Perform all AddNode validations. .PARAMETER ComputerName ComputerName for new node .PARAMETER ActiveDirectoryCredential Credential for Active Directory .PARAMETER LocalCredential Local credential for new node .PARAMETER Ip IP Address for new node. String because it could be host name .PARAMETER PassThru Return PSObject result. .PARAMETER OutputPath Directory path for log and report output. .PARAMETER CleanReport Remove all previous progress and create a clean report. .INPUTS Inputs (if any) .OUTPUTS Output (if any) #> [CmdletBinding()] param ( [Parameter(Mandatory = $true, HelpMessage = "ComputerName for new node")] [string] $ComputerName, [Parameter(Mandatory = $true, HelpMessage = "Credential for Active Directory")] [pscredential] $ActiveDirectoryCredential, [Parameter(Mandatory = $true, HelpMessage = "Local credential for new node")] [pscredential] $LocalCredential, [Parameter(Mandatory = $false, HelpMessage = "IP Address for new node")] [string] $Ipv4OrHostName, [Parameter(Mandatory = $false, HelpMessage = "Tests to include.")] [ArgumentCompleter({ Get-TestListByFunction -ModuleName AzStackHci.AddNode.Helpers })] [ValidateScript({ $_ -in (Get-TestListByFunction -ModuleName AzStackHci.AddNode.Helpers) })] [string[]] $Include, [Parameter(Mandatory = $false, HelpMessage = "Tests to exclude.")] [ArgumentCompleter({ Get-TestListByFunction -ModuleName AzStackHci.AddNode.Helpers })] [ValidateScript({ $_ -in (Get-TestListByFunction -ModuleName AzStackHci.AddNode.Helpers) })] [string[]] $Exclude, [Parameter(Mandatory = $false, HelpMessage = "Return PSObject result.")] [switch] $PassThru, [Parameter(Mandatory = $false, HelpMessage = "Directory path for log and report output")] [string]$OutputPath, [Parameter(Mandatory = $false, HelpMessage = "Remove all previous progress and create a clean report")] [switch]$CleanReport = $false ) try { $script:ErrorActionPreference = 'Stop' Set-AzStackHciOutputPath -Path $OutputPath Write-AzStackHciHeader -invocation $MyInvocation -params $PSBoundParameters -PassThru:$PassThru Test-ModuleUpdate -PassThru:$PassThru # Call/Initialise reporting $envcheckerReport = Get-AzStackHciEnvProgress -clean:$CleanReport $envcheckerReport = Add-AzStackHciEnvJob -report $envcheckerReport Write-Progress -Id 1 -Activity "Checking AzStackHci Dependancies" -Status "Environment Configuration" -PercentComplete 0 -ErrorAction SilentlyContinue $testList = Get-TestListByFunction -ModuleName AzStackHci.AddNode.Helpers $script:envchktestList = Select-TestList -Exclude $Exclude -TestList $TestList $totalTestCount = ($script:envchktestList).Count # Run validation $i = 0 $Result = @() $ProgressActivity = "Checking AzStackHci AddNode Compatibility" $i = 0 $ProgressStatus = "Testing $ENV:ComputerName" $progressParams = @{ Id = 1 Activity = $ProgressActivity Status = $ProgressStatus ErrorAction = 'SilentlyContinue' } Write-Progress @progressParams # Makes sure IP is in trusted hosts Set-TrustedHosts -Nodes $Ipv4OrHostName,$ComputerName :noTestsBreak foreach ($test in $script:envchktestList) { $OpMsg = "Checking {0} on {1}" -f $test, $ENV:ComputerName Log-Info -Message $OpMsg Write-Progress @progressParams -CurrentOperation $OpMsg -PercentComplete (($i++ / $TotalTestCount) * 100) $invokeParameters = @{} Get-Command $test | Select-Object -ExpandProperty Parameters | Select-Object -ExpandProperty Keys | ForEach-Object { if ($PSBoundParameters[$PSITEM]) { $invokeParameters += @{ $PSITEM = $PSBoundParameters[$PSITEM] } } } $Result += Invoke-Expression "$test @invokeParameters" } # Feedback results - user scenario if (-not $PassThru) { Write-Host 'AddNode Results' Write-AzStackHciResult -Title 'AddNode' -Result $Result Write-Summary -Result $Result -Property1 Detail } else { return $Result } } catch { Log-Info -Message "" -ConsoleOut Log-Info -Message "$($_.Exception.Message)" -ConsoleOut -Type Error Log-Info -Message "$($_.ScriptStackTrace)" -ConsoleOut -Type Error $cmdletFailed = $true throw $_ } finally { $Script:ErrorActionPreference = 'SilentlyContinue' # Write result to telemetry channel foreach ($result in $Result) { Write-ETWResult -Result $result } # Write validation result to report object and close out report $envcheckerReport | Add-Member -MemberType NoteProperty -Name 'AddNode' -Value $Result -Force $envcheckerReport = Close-AzStackHciEnvJob -report $envcheckerReport Write-AzStackHciEnvReport -report $envcheckerReport Write-AzStackHciFooter -invocation $MyInvocation -Failed:$cmdletFailed -PassThru:$PassThru } } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC7GNwdetm6/jVe # iPdp4Jlh6bggboC4VjocFIpcfHgiGaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBZ4v4G/jPjQKqeWB5Sxpyll # vwaBDu/mlosCM7+CGsK5MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAawEjyhbXI4/1PG93/Na0wcDBtDROhcmJY6RVoPv64DL3IxouZ1JHNtQH # ZxShta4ZqsxZklMNTN5kLjjTri1qn8wV1w8GV6x/yNuUzyGA1t0lgfXCoMPlkQPY # kcHTiLAdx0h2pJLkUN3+p/Q5mtl23/uHY9ndS+2g6T+dVWq6I2thTugtnwOBgyZe # 6JaLI8Gk7mQXWWzx84n3+BuUknU7BmiuKgQf0oUBz98bhVYfIWg4wW7ii+3GQ0q3 # NYKAXGE7dP/+rvCYGSB9Pcs1u+Yzahx45FVxHJOxXHJda9Plam4/qYnhYjBwjC4k # 4+lB8XCxuq+fRmYXtprKhrXCegwPJaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCD1uzc82hXfS0WQArapOTdXkaVgD6lIGE1jBZ8cI9rWswIGZbwTIW5a # GBMyMDI0MDIxMjE0MDkyNS45OTRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAABAAAB8jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYvQBtnYJTtKKj2FKxzHx0f # gV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29edzGdlWbCj1Qyx5HUHNY8y # u9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv29h1ttNWsSc/KPOeuhzS # AXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRYcINfXDhURvUfD70jioE9 # 2rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycTEOBdGVmf1HCD7WOaz5EE # cQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZUzN+BzcLj96ixC7wJGQM # BixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7b8M7vvwhEL0xCOvb7WFM # sstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHDoYhgj9uqPLP7vnoXf7j6 # +LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoeh/r3fShL6CHgPoTB7oYU # /d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69mL8BRtSZ6dG/GFEVE+fV # mgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2t5DAoDkuKCbC+3VdPmlY # VQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAxBM5cH8Bg0+Y64oZ5MB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00XpOgPabcN3QZeyipgilcQ # SDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/taPnobF+8CkAdkcLQhLdk # Shfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5tuvirFaUWzUWVDFOpo/O5 # zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRMiJMzxpUlvdfWGUtCvnW3 # eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmwpsCtUh7tR6whCrVYkb6F # udBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xLzk0bNxsAj0uhd6QdWr6T # T39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpURJ6YiDKQd5YVgxsuZCWv4 # Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB8iQ5W8ZLM5PwT8vtsKEB # wHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cXWOMJUJzyEH4WSKZHOx53 # qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gVPplqNPDIvQ8DkZ3lvbQs # Yqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspEK8hllq3IYcyX0v897+X9 # YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBr # i943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XRomjAiGA8yMDI0MDIxMjA5NTEy # MloYDzIwMjQwMjEzMDk1MTIyWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpdGia # AgEAMAcCAQACAhIoMAcCAQACAhRTMAoCBQDpdboaAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBABW+tYgbAPR+oZCQHOd+wSgK8zCkDMJdxQjRkijYy18aYkva # C9bgueZug2D3MkqyuStHRfU/gl1yxM5Siw8Civeo8cvRd0+QBWaOwJEhVoQRWSl/ # HAhpPqkB6t2GdrnOGnQfBbGaee1JvvZ/2qpMd3iaaOt6Ccw2n+3K6G39dt/d4EPI # U4y4mjzRD59H47Stg/8g8oxN0MuNMsIqpG8raHlbZ6slT6S+2rufioM1eBAgKb/P # piIYBzlqckFhaUQ1SbnS2+plre/hnmG9Eg3Wf6YevhqnC1JxFfhX+s3QeI2NlwFd # uU8u+kirxzndHmgWnBszIN/ERMnYMyveR9RU1S8xggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+MtdkrHCRlAABAAAB8jAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCCfDNzxH7ZVT6FHW+0W3SiPHqTygMkD7dHo29tyyzkX5TCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPjaPh0uMVJc04+Y4Ru5BUUbHE4s # uZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQg+AA24QkUUyOE+ron3tucOKViVGjQ # FIfFQSs5Iud3JxIwDQYJKoZIhvcNAQELBQAEggIAO8hLB0+F86kABSyPrm8PB5nt # QcJ3grBW3N9qwOkF/u5iNXTnTqg3D/bx4lvpuphRKPOI2o5f7vSUydO5iPxhxcxS # oh+UeXdHlK0vaWA2rPqKHfZixw93mNe2o3vqfYQvtAA4nHTbTc4uKRDll9pjvFWf # v7072SBBdDN0LHO9BZCQyC7dcHJNJE9NRJMpJku75OzgG+HQogszK9B5QAxIUTa4 # 3r9ZeWO6rvLoC3B7i8nCxuVkXxkcbqmY5JFcwt2m0f6mvZLz61bUNSqZyMJTviyW # uxDjradHUgJnsInP1kwLr1R4V10tNefz9qFVuYGOaJ9IyigNNSwFwgU5Qk5kt/Wi # Dh3cC9kn9kq+hwHbJNgjLyeWYE33QS9SxLxfvTk9t5WpXgELKUDSvju8+QtlFD9X # vkBmKFwcnIx/FqmLYQpdCdYbbPx2gvHMUC9QXXUBAYoH0J3BKiTTcNYB9Iwz5X/+ # higXijZMMH1XSYF8JRrn0pWd0k7g0D/cqCyfUMjrK9VtvDZFM1Z/yTL8y5UtEucd # 1eduxBJiecMakkrARYe8HivFSmgLUekLD9cbVlfLKKzaTTB0EL+O8JGDcfR+BzVa # w7Q9tgiUAX9Lmdm0kzQKa1+mfi6dPdYkVM6xv7A0Jbqj6pOZSqp8RvDvDMupN4rd # CsN40EIph0ovKZeHJ6I= # SIG # End signature block
combined_dataset/train/non-malicious/sample_49_67.ps1
sample_49_67.ps1
# # Module manifest for module 'OCI.PSModules.Waas' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Waas.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'e0ab649a-b33b-4925-a05c-7520554bdad9' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Waas Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Waas.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIWaasAccessRulesList', 'Get-OCIWaasAddressList', 'Get-OCIWaasAddressListsList', 'Get-OCIWaasCachingRulesList', 'Get-OCIWaasCaptchasList', 'Get-OCIWaasCertificate', 'Get-OCIWaasCertificatesList', 'Get-OCIWaasCustomProtectionRule', 'Get-OCIWaasCustomProtectionRulesList', 'Get-OCIWaasDeviceFingerprintChallenge', 'Get-OCIWaasEdgeSubnetsList', 'Get-OCIWaasGoodBotsList', 'Get-OCIWaasHttpRedirect', 'Get-OCIWaasHttpRedirectsList', 'Get-OCIWaasHumanInteractionChallenge', 'Get-OCIWaasJsChallenge', 'Get-OCIWaasPoliciesList', 'Get-OCIWaasPolicy', 'Get-OCIWaasPolicyConfig', 'Get-OCIWaasPolicyCustomProtectionRulesList', 'Get-OCIWaasProtectionRule', 'Get-OCIWaasProtectionRulesList', 'Get-OCIWaasProtectionSettings', 'Get-OCIWaasRecommendationsList', 'Get-OCIWaasThreatFeedsList', 'Get-OCIWaasWafAddressRateLimiting', 'Get-OCIWaasWafBlockedRequestsList', 'Get-OCIWaasWafConfig', 'Get-OCIWaasWafLogsList', 'Get-OCIWaasWafRequestsList', 'Get-OCIWaasWafTrafficList', 'Get-OCIWaasWhitelistsList', 'Get-OCIWaasWorkRequest', 'Get-OCIWaasWorkRequestsList', 'Invoke-OCIWaasPurgeCache', 'Move-OCIWaasAddressListCompartment', 'Move-OCIWaasCertificateCompartment', 'Move-OCIWaasCustomProtectionRuleCompartment', 'Move-OCIWaasHttpRedirectCompartment', 'Move-OCIWaasPolicyCompartment', 'New-OCIWaasAddressList', 'New-OCIWaasCertificate', 'New-OCIWaasCustomProtectionRule', 'New-OCIWaasHttpRedirect', 'New-OCIWaasPolicy', 'Receive-OCIWaasRecommendations', 'Remove-OCIWaasAddressList', 'Remove-OCIWaasCertificate', 'Remove-OCIWaasCustomProtectionRule', 'Remove-OCIWaasHttpRedirect', 'Remove-OCIWaasPolicy', 'Stop-OCIWaasWorkRequest', 'Update-OCIWaasAccessRules', 'Update-OCIWaasAddressList', 'Update-OCIWaasCachingRules', 'Update-OCIWaasCaptchas', 'Update-OCIWaasCertificate', 'Update-OCIWaasCustomProtectionRule', 'Update-OCIWaasDeviceFingerprintChallenge', 'Update-OCIWaasGoodBots', 'Update-OCIWaasHttpRedirect', 'Update-OCIWaasHumanInteractionChallenge', 'Update-OCIWaasJsChallenge', 'Update-OCIWaasPolicy', 'Update-OCIWaasPolicyConfig', 'Update-OCIWaasPolicyCustomProtectionRules', 'Update-OCIWaasProtectionRules', 'Update-OCIWaasProtectionSettings', 'Update-OCIWaasThreatFeeds', 'Update-OCIWaasWafAddressRateLimiting', 'Update-OCIWaasWafConfig', 'Update-OCIWaasWhitelists' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Waas' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/3125.ps1
3125.ps1
function Clear-ARPCache { [CmdletBinding()] param( ) Begin{ if(-not([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole]"Administrator")) { Write-Warning -Message "Administrator rights are required to clear the ARP cache! Attempts to start the process with elevated privileges..." } } Process{ try{ Start-Process -FilePath "$env:SystemRoot\System32\netsh.exe" -ArgumentList "interface ip delete arpcache" -Verb "RunAs" -WindowStyle Hidden -Wait } catch{ throw } } End{ } }
combined_dataset/train/non-malicious/sample_57_71.ps1
sample_57_71.ps1
# # Module manifest for module 'OCI.PSModules.Oda' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Oda.dll' # Version number of this module. ModuleVersion = '86.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '040ef05d-6373-43bf-a0a9-67444099f906' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Oda Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '86.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Oda.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Export-OCIOdaDigitalAssistant', 'Export-OCIOdaSkill', 'Get-OCIOdaAuthenticationProvider', 'Get-OCIOdaAuthenticationProvidersList', 'Get-OCIOdaChannel', 'Get-OCIOdaChannelsList', 'Get-OCIOdaDigitalAssistant', 'Get-OCIOdaDigitalAssistantParameter', 'Get-OCIOdaDigitalAssistantParametersList', 'Get-OCIOdaDigitalAssistantsList', 'Get-OCIOdaImportedPackage', 'Get-OCIOdaImportedPackagesList', 'Get-OCIOdaInstance', 'Get-OCIOdaInstanceAttachment', 'Get-OCIOdaInstanceAttachmentsList', 'Get-OCIOdaInstancesList', 'Get-OCIOdaPackage', 'Get-OCIOdaPackagesList', 'Get-OCIOdaPrivateEndpoint', 'Get-OCIOdaPrivateEndpointAttachment', 'Get-OCIOdaPrivateEndpointAttachmentsList', 'Get-OCIOdaPrivateEndpointScanProxiesList', 'Get-OCIOdaPrivateEndpointScanProxy', 'Get-OCIOdaPrivateEndpointsList', 'Get-OCIOdaSkill', 'Get-OCIOdaSkillParameter', 'Get-OCIOdaSkillParametersList', 'Get-OCIOdaSkillsList', 'Get-OCIOdaTranslator', 'Get-OCIOdaTranslatorsList', 'Get-OCIOdaWorkRequest', 'Get-OCIOdaWorkRequestErrorsList', 'Get-OCIOdaWorkRequestLogsList', 'Get-OCIOdaWorkRequestsList', 'Import-OCIOdaBot', 'Invoke-OCIOdaBulkCreateSkillEntities', 'Invoke-OCIOdaCascadingDeleteSkillCustomEntities', 'Invoke-OCIOdaConfigureDigitalAssistantParameters', 'Invoke-OCIOdaPublishDigitalAssistant', 'Invoke-OCIOdaPublishSkill', 'Invoke-OCIOdaRotateChannelKeys', 'Invoke-OCIOdaTrainSkill', 'Move-OCIOdaInstanceCompartment', 'Move-OCIOdaPrivateEndpointCompartment', 'New-OCIOdaAuthenticationProvider', 'New-OCIOdaChannel', 'New-OCIOdaDigitalAssistant', 'New-OCIOdaImportedPackage', 'New-OCIOdaInstance', 'New-OCIOdaInstanceAttachment', 'New-OCIOdaPrivateEndpoint', 'New-OCIOdaPrivateEndpointAttachment', 'New-OCIOdaPrivateEndpointScanProxy', 'New-OCIOdaSkill', 'New-OCIOdaSkillParameter', 'New-OCIOdaTranslator', 'Remove-OCIOdaAuthenticationProvider', 'Remove-OCIOdaChannel', 'Remove-OCIOdaDigitalAssistant', 'Remove-OCIOdaImportedPackage', 'Remove-OCIOdaInstance', 'Remove-OCIOdaInstanceAttachment', 'Remove-OCIOdaPrivateEndpoint', 'Remove-OCIOdaPrivateEndpointAttachment', 'Remove-OCIOdaPrivateEndpointScanProxy', 'Remove-OCIOdaSkill', 'Remove-OCIOdaSkillParameter', 'Remove-OCIOdaTranslator', 'Start-OCIOdaChannel', 'Start-OCIOdaInstance', 'Stop-OCIOdaChannel', 'Stop-OCIOdaInstance', 'Update-OCIOdaAuthenticationProvider', 'Update-OCIOdaChannel', 'Update-OCIOdaDigitalAssistant', 'Update-OCIOdaDigitalAssistantParameter', 'Update-OCIOdaImportedPackage', 'Update-OCIOdaInstance', 'Update-OCIOdaInstanceAttachment', 'Update-OCIOdaPrivateEndpoint', 'Update-OCIOdaSkill', 'Update-OCIOdaSkillParameter', 'Update-OCIOdaTranslator' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Oda' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/2538.ps1
2538.ps1
param( $SQLServer = 'STGSQLDOC710', $ScriptDir = '\\xfs3\DataManagement\Footprints\31177', $Beta = 1, [String[]] $DatabaseList, $FilePrefix = 'Log', [switch]$Log ) $SQuery = "SELECT StageDB FROM ClientConnection WHERE Beta = " + $Beta $DQuery = "SELECT ReportDB FROM ClientConnection WHERE Beta = " + $Beta + " ORDER BY 1" $Query = $SQuery + " UNION " + $DQuery $Databases = Invoke-Sqlcmd -ServerInstance $SQLServer -Database PA_DMart -Query $Query $DataScripts = Get-ChildItem -Path $ScriptDir -Filter *Data*.sql | sort-object -desc $StageScripts = Get-ChildItem -Path $ScriptDir -Filter *Stage*.sql | sort-object -desc if ($Databases) { foreach ($i IN $Databases) { Write-Host "Begin" $i[0] if ($i[0].EndsWith("Stage")) { if ($StageScripts) { foreach ( $StageScript IN $StageScripts ) { Invoke-SQLCMD -ServerInstance $SQLServer -Database $i[0] -InputFile $StageScript.FullName Write-Host "`tApplied " $StageScript.fullname "to the" $i[0]"database"on" $SQLServer." } } } elseif ($i[0].EndsWith("Data")) { if ($DataScripts) { foreach ( $DataScript IN $DataScripts ) { Invoke-SQLCMD -ServerInstance $SQLServer -Database $i[0] -InputFile $DataScript.FullName Write-Host "`tApplied " $DataScript.FullName "to the" $i[0]"database"on" $SQLServer." } } } else { Write-Host "WTF " $i[0] " is not a Data or Stage database." } Write-Host "End" $i[0] } }
combined_dataset/train/non-malicious/1644.ps1
1644.ps1
function Get-ChromeExtension { param ( [string]$ComputerName = $env:COMPUTERNAME ) Get-ChildItem "\\$ComputerName\c$\users\*\appdata\local\Google\Chrome\User Data\Default\Extensions\*\*\manifest.json" -ErrorAction SilentlyContinue | % { $path = $_.FullName $_.FullName -match 'users\\(.*?)\\appdata' | Out-Null Get-Content $_.FullName -Raw | ConvertFrom-Json | select @{n='ComputerName';e={$ComputerName}}, @{n='User';e={$Matches[1]}}, Name, Version, @{n='Path';e={$path}} } }
combined_dataset/train/non-malicious/SVMotion-VM_2.ps1
SVMotion-VM_2.ps1
# author: Hal Rottenberg # Website/OpenID: http://halr9000.com # purpose: does "real" SVMotion of a VM # usage: get-vm | SVMotion-VM -destination (get-datastore foo) function SVMotion-VM { param( [VMware.VimAutomation.Client20.DatastoreImpl]$destination ) Begin { $datastoreView = Get-View -VIObject $destination $relocationSpec = New-Object VMware.Vim.VirtualMachineRelocateSpec $relocationSpec.Datastore = $datastoreView.MoRef } Process { if ( $_ -isnot [VMware.VimAutomation.Client20.VirtualMachineImpl] ) { Write-Warning "Expected virtual machine object on pipeline. skipping $_" continue } $vmView = Get-View -VIObject $_ $vmView.RelocateVM_Task($relocationSpec) } }
combined_dataset/train/non-malicious/3468.ps1
3468.ps1
function Test-RedisCache { $resourceGroupName = "PowerShellTest-1" $cacheName = "redisteam001" $location = "West US" New-AzResourceGroup -Name $resourceGroupName -Location $location $cacheCreated = New-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName -Location $location -Size P1 -Sku Premium Assert-AreEqual $cacheName $cacheCreated.Name Assert-AreEqual $location $cacheCreated.Location Assert-AreEqual "Microsoft.Cache/Redis" $cacheCreated.Type Assert-AreEqual $resourceGroupName $cacheCreated.ResourceGroupName Assert-AreEqual 6379 $cacheCreated.Port Assert-AreEqual 6380 $cacheCreated.SslPort Assert-AreEqual "creating" $cacheCreated.ProvisioningState Assert-AreEqual "6GB" $cacheCreated.Size Assert-AreEqual "Premium" $cacheCreated.Sku Assert-NotNull $cacheCreated.PrimaryKey "PrimaryKey do not exists" Assert-NotNull $cacheCreated.SecondaryKey "SecondaryKey do not exists" for ($i = 0; $i -le 60; $i++) { Start-TestSleep 30000 $cacheGet = Get-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName if ([string]::Compare("succeeded", $cacheGet[0].ProvisioningState, $True) -eq 0) { Assert-AreEqual $cacheName $cacheGet[0].Name Assert-AreEqual "succeeded" $cacheGet[0].ProvisioningState break } Assert-False {$i -eq 60} "Cache is not in succeeded state even after 30 min." } $cacheUpdated = Set-AzRedisCache -Name $cacheName -RedisConfiguration @{"maxmemory-policy" = "allkeys-lru"} -EnableNonSslPort $true Assert-AreEqual $cacheName $cacheUpdated.Name Assert-AreEqual 6379 $cacheUpdated.Port Assert-AreEqual 6380 $cacheUpdated.SslPort Assert-AreEqual "succeeded" $cacheUpdated.ProvisioningState Assert-AreEqual "allkeys-lru" $cacheUpdated.RedisConfiguration.Item("maxmemory-policy") Assert-True { $cacheUpdated.EnableNonSslPort } Assert-NotNull $cacheUpdated.PrimaryKey "PrimaryKey do not exists" Assert-NotNull $cacheUpdated.SecondaryKey "SecondaryKey do not exists" $cachesInResourceGroup = Get-AzRedisCache -ResourceGroupName $resourceGroupName Assert-True {$cachesInResourceGroup.Count -ge 1} $found = 0 for ($i = 0; $i -lt $cachesInResourceGroup.Count; $i++) { if ($cachesInResourceGroup[$i].Name -eq $cacheName) { $found = 1 Assert-AreEqual $location $cachesInResourceGroup[$i].Location Assert-AreEqual $resourceGroupName $cachesInResourceGroup[$i].ResourceGroupName break } } Assert-True {$found -eq 1} "Cache created earlier is not found." $cachesInSubscription = Get-AzRedisCache Assert-True {$cachesInSubscription.Count -ge 1} Assert-True {$cachesInSubscription.Count -ge $cachesInResourceGroup.Count} $found = 0 for ($i = 0; $i -lt $cachesInSubscription.Count; $i++) { if ($cachesInSubscription[$i].Name -eq $cacheName) { $found = 1 Assert-AreEqual $location $cachesInSubscription[$i].Location Assert-AreEqual $resourceGroupName $cachesInSubscription[$i].ResourceGroupName break } } Assert-True {$found -eq 1} "Cache created earlier is not found." $cacheKeysBeforeUpdate = Get-AzRedisCacheKey -ResourceGroupName $resourceGroupName -Name $cacheName Assert-NotNull $cacheKeysBeforeUpdate.PrimaryKey "PrimaryKey do not exists" Assert-NotNull $cacheKeysBeforeUpdate.SecondaryKey "SecondaryKey do not exists" $cacheKeysAfterUpdate = New-AzRedisCacheKey -ResourceGroupName $resourceGroupName -Name $cacheName -KeyType Primary -Force Assert-AreEqual $cacheKeysBeforeUpdate.SecondaryKey $cacheKeysAfterUpdate.SecondaryKey Assert-AreNotEqual $cacheKeysBeforeUpdate.PrimaryKey $cacheKeysAfterUpdate.PrimaryKey Assert-True {Remove-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName -Force -PassThru} "Remove cache failed." Remove-AzResourceGroup -Name $resourceGroupName -Force } function Test-SetNonExistingRedisCacheTest { $resourceGroupName = "PowerShellTestNonExisting" $cacheName = "nonexistingrediscache" $location = "West US" Assert-Throws {Set-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName -RedisConfiguration @{"maxmemory-policy" = "allkeys-random"} } } function Test-RedisCachePipeline { $resourceGroupName = "PowerShellTest-2" $cacheName = "redisteam002" $location = "West US" New-AzResourceGroup -Name $resourceGroupName -Location $location $cacheCreated = New-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName -Location $location -Size 1GB -Sku Standard -EnableNonSslPort $true Assert-AreEqual $cacheName $cacheCreated.Name Assert-AreEqual $location $cacheCreated.Location Assert-AreEqual "Microsoft.Cache/Redis" $cacheCreated.Type Assert-AreEqual $resourceGroupName $cacheCreated.ResourceGroupName Assert-AreEqual 6379 $cacheCreated.Port Assert-AreEqual 6380 $cacheCreated.SslPort Assert-AreEqual "creating" $cacheCreated.ProvisioningState Assert-AreEqual "1GB" $cacheCreated.Size Assert-AreEqual "Standard" $cacheCreated.Sku Assert-True { $cacheCreated.EnableNonSslPort } Assert-NotNull $cacheCreated.PrimaryKey "PrimaryKey do not exists" Assert-NotNull $cacheCreated.SecondaryKey "SecondaryKey do not exists" for ($i = 0; $i -le 60; $i++) { Start-TestSleep 30000 $cacheGet = Get-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName if ([string]::Compare("succeeded", $cacheGet[0].ProvisioningState, $True) -eq 0) { Assert-AreEqual $cacheName $cacheGet[0].Name break } Assert-False {$i -eq 60} "Cache is not in succeeded state even after 30 min." } Get-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName | Set-AzRedisCache -RedisConfiguration @{"maxmemory-policy" = "allkeys-random"} -EnableNonSslPort $false $cacheUpdatedPiped = Get-AzRedisCache -Name $cacheName Assert-AreEqual $cacheName $cacheUpdatedPiped.Name Assert-AreEqual $location $cacheUpdatedPiped.Location Assert-AreEqual $resourceGroupName $cacheUpdatedPiped.ResourceGroupName Assert-AreEqual 6379 $cacheUpdatedPiped.Port Assert-AreEqual 6380 $cacheUpdatedPiped.SslPort Assert-AreEqual "succeeded" $cacheUpdatedPiped.ProvisioningState Assert-AreEqual "1GB" $cacheUpdatedPiped.Size Assert-AreEqual "Standard" $cacheUpdatedPiped.Sku Assert-AreEqual "allkeys-random" $cacheUpdatedPiped.RedisConfiguration.Item("maxmemory-policy") Assert-False { $cacheUpdatedPiped.EnableNonSslPort } $cacheKeysBeforeUpdate = Get-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName | Get-AzRedisCacheKey Assert-NotNull $cacheKeysBeforeUpdate.PrimaryKey "PrimaryKey do not exists" Assert-NotNull $cacheKeysBeforeUpdate.SecondaryKey "SecondaryKey do not exists" $cacheKeysAfterUpdate = Get-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName | New-AzRedisCacheKey -KeyType Primary -Force Assert-AreEqual $cacheKeysBeforeUpdate.SecondaryKey $cacheKeysAfterUpdate.SecondaryKey Assert-AreNotEqual $cacheKeysBeforeUpdate.PrimaryKey $cacheKeysAfterUpdate.PrimaryKey Assert-True {Get-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName | Remove-AzRedisCache -Force -PassThru} "Remove cache failed." Remove-AzResourceGroup -Name $resourceGroupName -Force } function Test-RedisCacheClustering { $resourceGroupName = "PowerShellTest-3" $cacheName = "redisteam003" $location = "West US" New-AzResourceGroup -Name $resourceGroupName -Location $location $cacheCreated = New-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName -Location $location -Size 6GB -Sku Premium -ShardCount 3 Assert-AreEqual "Microsoft.Cache/Redis" $cacheCreated.Type Assert-AreEqual $resourceGroupName $cacheCreated.ResourceGroupName Assert-AreEqual 6379 $cacheCreated.Port Assert-AreEqual 6380 $cacheCreated.SslPort Assert-AreEqual "creating" $cacheCreated.ProvisioningState Assert-AreEqual "6GB" $cacheCreated.Size Assert-AreEqual "Premium" $cacheCreated.Sku Assert-AreEqual 3 $cacheCreated.ShardCount Assert-NotNull $cacheCreated.PrimaryKey "PrimaryKey do not exists" Assert-NotNull $cacheCreated.SecondaryKey "SecondaryKey do not exists" for ($i = 0; $i -le 60; $i++) { Start-TestSleep 30000 $cacheGet = Get-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName if ([string]::Compare("succeeded", $cacheGet[0].ProvisioningState, $True) -eq 0) { Assert-AreEqual $cacheName $cacheGet[0].Name break } Assert-False {$i -eq 60} "Cache is not in succeeded state even after 30 min." } $cacheUpdated = Set-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName -RedisConfiguration @{"maxmemory-policy" = "allkeys-lru"} -TenantSettings @{"some-key" = "some-value"} Assert-AreEqual $cacheName $cacheUpdated.Name Assert-AreEqual "succeeded" $cacheUpdated.ProvisioningState Assert-AreEqual "6GB" $cacheCreated.Size Assert-AreEqual "Premium" $cacheCreated.Sku Assert-AreEqual 3 $cacheCreated.ShardCount Assert-AreEqual "allkeys-lru" $cacheUpdated.RedisConfiguration.Item("maxmemory-policy") Assert-AreEqual "some-value" $cacheUpdated.TenantSettings.Item("some-key") Assert-NotNull $cacheUpdated.PrimaryKey "PrimaryKey do not exists" Assert-NotNull $cacheUpdated.SecondaryKey "SecondaryKey do not exists" $cachesInResourceGroup = Get-AzRedisCache -ResourceGroupName $resourceGroupName Assert-True {$cachesInResourceGroup.Count -ge 1} $found = 0 for ($i = 0; $i -lt $cachesInResourceGroup.Count; $i++) { if ($cachesInResourceGroup[$i].Name -eq $cacheName) { $found = 1 Assert-AreEqual $location $cachesInResourceGroup[$i].Location Assert-AreEqual $resourceGroupName $cachesInResourceGroup[$i].ResourceGroupName Assert-AreEqual "succeeded" $cachesInResourceGroup[$i].ProvisioningState Assert-AreEqual "6GB" $cacheCreated.Size Assert-AreEqual "Premium" $cacheCreated.Sku Assert-AreEqual 3 $cacheCreated.ShardCount break } } Assert-True {$found -eq 1} "Cache created earlier is not found." $cachesInSubscription = Get-AzRedisCache Assert-True {$cachesInSubscription.Count -ge 1} Assert-True {$cachesInSubscription.Count -ge $cachesInResourceGroup.Count} $found = 0 for ($i = 0; $i -lt $cachesInSubscription.Count; $i++) { if ($cachesInSubscription[$i].Name -eq $cacheName) { $found = 1 Assert-AreEqual $location $cachesInSubscription[$i].Location Assert-AreEqual $resourceGroupName $cachesInSubscription[$i].ResourceGroupName Assert-AreEqual "succeeded" $cachesInSubscription[$i].ProvisioningState Assert-AreEqual "6GB" $cacheCreated.Size Assert-AreEqual "Premium" $cacheCreated.Sku Assert-AreEqual 3 $cacheCreated.ShardCount break } } Assert-True {$found -eq 1} "Cache created earlier is not found." $cacheKeysBeforeUpdate = Get-AzRedisCacheKey -ResourceGroupName $resourceGroupName -Name $cacheName Assert-NotNull $cacheKeysBeforeUpdate.PrimaryKey "PrimaryKey do not exists" Assert-NotNull $cacheKeysBeforeUpdate.SecondaryKey "SecondaryKey do not exists" $cacheKeysAfterUpdate = New-AzRedisCacheKey -ResourceGroupName $resourceGroupName -Name $cacheName -KeyType Primary -Force Assert-AreEqual $cacheKeysBeforeUpdate.SecondaryKey $cacheKeysAfterUpdate.SecondaryKey Assert-AreNotEqual $cacheKeysBeforeUpdate.PrimaryKey $cacheKeysAfterUpdate.PrimaryKey Assert-True {Remove-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName -Force -PassThru} "Remove cache failed." Remove-AzResourceGroup -Name $resourceGroupName -Force } function Test-RedisCachePatchSchedules { $resourceGroupName = "PowerShellTest-4" $cacheName = "redisteam004" $location = "West US" New-AzResourceGroup -Name $resourceGroupName -Location $location $cacheCreated = New-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName -Location $location -Sku Premium -Size P1 Assert-AreEqual "creating" $cacheCreated.ProvisioningState for ($i = 0; $i -le 60; $i++) { Start-TestSleep 30000 $cacheGet = Get-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName if ([string]::Compare("succeeded", $cacheGet[0].ProvisioningState, $True) -eq 0) { Assert-AreEqual $cacheName $cacheGet[0].Name break } Assert-False {$i -eq 60} "Cache is not in succeeded state even after 30 min." } $weekend = New-AzRedisCacheScheduleEntry -DayOfWeek "Weekend" -StartHourUtc 2 -MaintenanceWindow "06:00:00" $thursday = New-AzRedisCacheScheduleEntry -DayOfWeek "Thursday" -StartHourUtc 10 -MaintenanceWindow "09:00:00" $createResult = New-AzRedisCachePatchSchedule -ResourceGroupName $resourceGroupName -Name $cacheName -Entries @($weekend, $thursday) Assert-True {$createResult.Count -eq 3} foreach ($scheduleEntry in $createResult) { if($scheduleEntry.DayOfWeek -eq "Thursday") { Assert-AreEqual 10 $scheduleEntry.StartHourUtc Assert-AreEqual "09:00:00" $scheduleEntry.MaintenanceWindow } elseif($scheduleEntry.DayOfWeek -eq "Saturday" -or $scheduleEntry.DayOfWeek -eq "Sunday") { Assert-AreEqual 2 $scheduleEntry.StartHourUtc Assert-AreEqual "06:00:00" $scheduleEntry.MaintenanceWindow } else { Assert-True $false "Unknown DayOfWeek." } } $getResult = Get-AzRedisCachePatchSchedule -ResourceGroupName $resourceGroupName -Name $cacheName Assert-True {$getResult.Count -eq 3} foreach ($scheduleEntry in $getResult) { if($scheduleEntry.DayOfWeek -eq "Thursday") { Assert-AreEqual 10 $scheduleEntry.StartHourUtc Assert-AreEqual "09:00:00" $scheduleEntry.MaintenanceWindow } elseif($scheduleEntry.DayOfWeek -eq "Saturday" -or $scheduleEntry.DayOfWeek -eq "Sunday") { Assert-AreEqual 2 $scheduleEntry.StartHourUtc Assert-AreEqual "06:00:00" $scheduleEntry.MaintenanceWindow } else { Assert-True $false "Unknown DayOfWeek." } } Remove-AzRedisCachePatchSchedule -ResourceGroupName $resourceGroupName -Name $cacheName Assert-ThrowsContains {Get-AzRedisCachePatchSchedule -ResourceGroupName $resourceGroupName -Name $cacheName} "There are no patch schedules found for redis cache" $cacheUpdated = Set-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName -EnableNonSslPort $true Assert-True { $cacheUpdated.EnableNonSslPort } $cacheUpdated2 = Set-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName -RedisConfiguration @{"maxmemory-policy" = "allkeys-lru"} Assert-AreEqual "allkeys-lru" $cacheUpdated2.RedisConfiguration.Item("maxmemory-policy") Assert-True { $cacheUpdated2.EnableNonSslPort } Assert-True {Remove-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName -Force -PassThru} "Remove cache failed." Remove-AzResourceGroup -Name $resourceGroupName -Force } function Create-StorageAccount($resourceGroupName,$storageName,$location) { if ([Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Mode -ne [Microsoft.Azure.Test.HttpRecorder.HttpRecorderMode]::Playback) { $storageAccount = New-AzStorageAccount -ResourceGroupName $resourceGroupName -Name $storageName -Location $location -Type "Standard_LRS" } } function Get-SasForContainer { param ( $resourceGroupName, $storageName, $storageContainerName, [ref] $sasKeyForContainer ) if ([Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Mode -ne [Microsoft.Azure.Test.HttpRecorder.HttpRecorderMode]::Playback) { $storageAccountContext = New-AzStorageContext -StorageAccountName $storageName -StorageAccountKey (Get-AzStorageAccountKey -ResourceGroupName $resourceGroupName -Name $storageName).Value[0] New-AzStorageContainer -Name $storageContainerName -Context $storageAccountContext $sasKeyForContainer.Value = New-AzStorageContainerSASToken -Name $storageContainerName -Permission "rwdl" -StartTime ([System.DateTime]::Now).AddMinutes(-20) -ExpiryTime ([System.DateTime]::Now).AddHours(2) -Context $storageAccountContext -FullUri } else { $sasKeyForContainer.Value = "dummysasforcontainer" } } function Get-SasForBlob { param ( $resourceGroupName, $storageName, $storageContainerName, $prefix, [ref] $sasKeyForBlob ) if ([Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Mode -ne [Microsoft.Azure.Test.HttpRecorder.HttpRecorderMode]::Playback) { $storageAccountContext = New-AzStorageContext -StorageAccountName $storageName -StorageAccountKey (Get-AzStorageAccountKey -ResourceGroupName $resourceGroupName -Name $storageName).Value[0] $sasKeyForBlob.Value = New-AzStorageBlobSASToken -Container $storageContainerName -Blob $prefix -Permission "rwdl" -StartTime ([System.DateTime]::Now).AddMinutes(-20) -ExpiryTime ([System.DateTime]::Now).AddHours(2) -Context $storageAccountContext -FullUri } else { $sasKeyForBlob.Value = "dummysasforblob" } } function Test-ImportExportReboot { $resourceGroupName = "PowerShellTest-5" $cacheName = "redisteam005" $location = "West US" $storageName = "redisteam005s" $storageContainerName = "exportimport" $prefix = "sunny" New-AzResourceGroup -Name $resourceGroupName -Location $location Create-StorageAccount $resourceGroupName $storageName $location $cacheCreated = New-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName -Location $location -Sku Premium -Size P1 Assert-AreEqual "creating" $cacheCreated.ProvisioningState for ($i = 0; $i -le 60; $i++) { Start-TestSleep 30000 $cacheGet = Get-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName if ([string]::Compare("succeeded", $cacheGet[0].ProvisioningState, $True) -eq 0) { Assert-AreEqual $cacheName $cacheGet[0].Name break } Assert-False {$i -eq 60} "Cache is not in succeeded state even after 30 min." } $sasKeyForContainer = "" Get-SasForContainer $resourceGroupName $storageName $storageContainerName ([ref]$sasKeyForContainer) Export-AzRedisCache -Name $cacheName -Prefix $prefix -Container $sasKeyForContainer $sasKeyForBlob = "" Get-SasForBlob $resourceGroupName $storageName $storageContainerName $prefix ([ref]$sasKeyForBlob) Import-AzRedisCache -Name $cacheName -Files @($sasKeyForBlob) -Force $rebootType = "PrimaryNode" Reset-AzRedisCache -Name $cacheName -RebootType $rebootType -Force Start-TestSleep 120000 Assert-True {Remove-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName -Force -PassThru} "Remove cache failed." Remove-AzResourceGroup -Name $resourceGroupName -Force } function Test-DiagnosticOperations { $resourceGroupName = "PowerShellTest-6" $cacheName = "redisteam006" $location = "West US" $storageName = "redisteam006s" New-AzResourceGroup -Name $resourceGroupName -Location $location New-AzStorageAccount -ResourceGroupName $resourceGroupName -Name $storageName -Location $location -Type "Standard_LRS" $storageAccount = Get-AzStorageAccount -ResourceGroupName $resourceGroupName -Name $storageName $cacheCreated = New-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName -Location $location -Sku Premium -Size P1 Assert-AreEqual "creating" $cacheCreated.ProvisioningState for ($i = 0; $i -le 60; $i++) { Start-TestSleep 30000 $cacheGet = Get-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName if ([string]::Compare("succeeded", $cacheGet[0].ProvisioningState, $True) -eq 0) { Assert-AreEqual $cacheName $cacheGet[0].Name break } Assert-False {$i -eq 60} "Cache is not in succeeded state even after 30 min." } Assert-NotNull $storageAccount.Id "Storage Id cannot be null" Set-AzRedisCacheDiagnostics -ResourceGroupName $resourceGroupName -Name $cacheName -StorageAccountId $storageAccount.Id Remove-AzRedisCacheDiagnostics -ResourceGroupName $resourceGroupName -Name $cacheName Assert-True {Remove-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName -Force -PassThru} "Remove cache failed." Remove-AzResourceGroup -Name $resourceGroupName -Force } function Test-GeoReplication { $resourceGroupName = "PowerShellTest-7" $cacheName1 = "redisteam0071" $cacheName2 = "redisteam0072" $location1 = "West US" $location2 = "East US" New-AzResourceGroup -Name $resourceGroupName -Location $location1 $cacheCreated1 = New-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName1 -Location $location1 -Sku Premium -Size P1 $cacheCreated2 = New-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName2 -Location $location2 -Sku Premium -Size P1 Assert-AreEqual "creating" $cacheCreated1.ProvisioningState Assert-AreEqual "creating" $cacheCreated2.ProvisioningState for ($i = 0; $i -le 60; $i++) { Start-TestSleep 30000 $cacheGet = Get-AzRedisCache -ResourceGroupName $resourceGroupName if (([string]::Compare("succeeded", $cacheGet[0].ProvisioningState, $True) -eq 0) -and ([string]::Compare("succeeded", $cacheGet[1].ProvisioningState, $True) -eq 0)) { break } Assert-False {$i -eq 60} "Caches are not in succeeded state even after 30 min." } $linkCreated = New-AzRedisCacheLink -PrimaryServerName $cacheName1 -SecondaryServerName $cacheName2 Assert-AreEqual "creating" $linkCreated.ProvisioningState Assert-AreEqual $cacheName1 $linkCreated.PrimaryServerName Assert-AreEqual $cacheName2 $linkCreated.SecondaryServerName for ($i = 0; $i -le 60; $i++) { Start-TestSleep 30000 $linkGet = Get-AzRedisCacheLink -PrimaryServerName $cacheName1 -SecondaryServerName $cacheName2 if ([string]::Compare("succeeded", $linkGet[0].ProvisioningState, $True) -eq 0) { Assert-AreEqual $cacheName1 $linkGet[0].PrimaryServerName Assert-AreEqual $cacheName2 $linkGet[0].SecondaryServerName break } Assert-False {$i -eq 60} "Geo replication link is not in succeeded state even after 30 min." } $linkGet = Get-AzRedisCacheLink -Name $cacheName1 Assert-AreEqual $cacheName1 $linkGet[0].PrimaryServerName Assert-AreEqual $cacheName2 $linkGet[0].SecondaryServerName $linkGet = Get-AzRedisCacheLink -Name $cacheName2 Assert-AreEqual $cacheName1 $linkGet[0].PrimaryServerName Assert-AreEqual $cacheName2 $linkGet[0].SecondaryServerName $linkGet = Get-AzRedisCacheLink -PrimaryServerName $cacheName1 Assert-AreEqual $cacheName1 $linkGet[0].PrimaryServerName Assert-AreEqual $cacheName2 $linkGet[0].SecondaryServerName $linkGet = Get-AzRedisCacheLink -PrimaryServerName $cacheName2 Assert-True {$linkGet.Count -eq 0} $linkGet = Get-AzRedisCacheLink -SecondaryServerName $cacheName2 Assert-AreEqual $cacheName1 $linkGet[0].PrimaryServerName Assert-AreEqual $cacheName2 $linkGet[0].SecondaryServerName $linkGet = Get-AzRedisCacheLink -SecondaryServerName $cacheName1 Assert-True {$linkGet.Count -eq 0} Assert-True {Remove-AzRedisCacheLink -PrimaryServerName $cacheName1 -SecondaryServerName $cacheName2 -PassThru} "Removing geo replication link failed." for ($i = 0; $i -le 10; $i++) { Start-TestSleep 30000 $linkGet1 = Get-AzRedisCacheLink -PrimaryServerName $cacheName1 $linkGet2 = Get-AzRedisCacheLink -SecondaryServerName $cacheName2 if (($linkGet1.Count -eq 0) -and ($linkGet2.Count -eq 0)) { break } Assert-False {$i -eq 10} "Geo replication link deletion is not in succeeded state even after 30 min." } Assert-True {Remove-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName1 -Force -PassThru} "Remove cache failed." Assert-True {Remove-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName2 -Force -PassThru} "Remove cache failed." Remove-AzResourceGroup -Name $resourceGroupName -Force } function Test-FirewallRule { $resourceGroupName = "PowerShellTest-8" $cacheName = "redisteam008" $location = "West US" $rule1 = "ruleone" $rule1StartIp = "10.0.0.0" $rule1EndIp = "10.0.0.32" $rule2 = "ruletwo" $rule2StartIp = "10.0.0.64" $rule2EndIp = "10.0.0.128" $rule3 = "rulethree" $rule3StartIp = "10.0.0.33" $rule3EndIp = "10.0.0.63" New-AzResourceGroup -Name $resourceGroupName -Location $location $cacheCreated = New-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName -Location $location -Sku Premium -Size P1 Assert-AreEqual "creating" $cacheCreated.ProvisioningState for ($i = 0; $i -le 60; $i++) { Start-TestSleep 30000 $cacheGet = Get-AzRedisCache -Name $cacheName if ([string]::Compare("succeeded", $cacheGet[0].ProvisioningState, $True) -eq 0) { break } Assert-False {$i -eq 60} "Cache is not in succeeded state even after 30 min." } $rule1Created = New-AzRedisCacheFirewallRule -Name $cacheName -RuleName $rule1 -StartIP $rule1StartIp -EndIP $rule1EndIp Assert-AreEqual $rule1StartIp $rule1Created.StartIP Assert-AreEqual $rule1EndIp $rule1Created.EndIP Assert-AreEqual $rule1 $rule1Created.RuleName $rule2Created = Get-AzRedisCache -Name $cacheName | New-AzRedisCacheFirewallRule -RuleName $rule2 -StartIP $rule2StartIp -EndIP $rule2EndIp Assert-AreEqual $rule2StartIp $rule2Created.StartIP Assert-AreEqual $rule2EndIp $rule2Created.EndIP Assert-AreEqual $rule2 $rule2Created.RuleName $rule3Created = New-AzRedisCacheFirewallRule -ResourceId $cacheCreated.Id -RuleName $rule3 -StartIP $rule3StartIp -EndIP $rule3EndIp Assert-AreEqual $rule3StartIp $rule3Created.StartIP Assert-AreEqual $rule3EndIp $rule3Created.EndIP Assert-AreEqual $rule3 $rule3Created.RuleName $rule1Get = Get-AzRedisCacheFirewallRule -Name $cacheName -RuleName $rule1 Assert-AreEqual $rule1StartIp $rule1Get.StartIP Assert-AreEqual $rule1EndIp $rule1Get.EndIP Assert-AreEqual $rule1 $rule1Get.RuleName $allRulesGet = Get-AzRedisCacheFirewallRule -Name $cacheName for ($i = 0; $i -le 2; $i++) { if($allRulesGet[$i].RuleName -eq $rule1) { Assert-AreEqual $rule1StartIp $allRulesGet[$i].StartIP Assert-AreEqual $rule1EndIp $allRulesGet[$i].EndIP } elseif($allRulesGet[$i].RuleName -eq $rule2) { Assert-AreEqual $rule2StartIp $allRulesGet[$i].StartIP Assert-AreEqual $rule2EndIp $allRulesGet[$i].EndIP } elseif($allRulesGet[$i].RuleName -eq $rule3) { Assert-AreEqual $rule3StartIp $allRulesGet[$i].StartIP Assert-AreEqual $rule3EndIp $allRulesGet[$i].EndIP } else { Assert-False $True "unknown firewall rule" } } Assert-True {Remove-AzRedisCacheFirewallRule -Name $cacheName -RuleName $rule1 -PassThru} "Removing firewall rule 'ruleone' failed." $allRulesGet = Get-AzRedisCacheFirewallRule -Name $cacheName Assert-AreEqual 2 $allRulesGet.Count Get-AzRedisCacheFirewallRule -Name $cacheName | Remove-AzRedisCacheFirewallRule -PassThru $allRulesGet = Get-AzRedisCacheFirewallRule -Name $cacheName Assert-AreEqual 0 $allRulesGet.Count Assert-True {Remove-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName -Force -PassThru} "Remove cache failed." Remove-AzResourceGroup -Name $resourceGroupName -Force } function Test-Zones { $resourceGroupName = "PowerShellTest-9" $cacheName = "redisteam009" $location = "East US 2" New-AzResourceGroup -Name $resourceGroupName -Location $location $cacheCreated = New-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName -Location $location -Size P1 -Sku Premium -Zone @("1") -Tag @{"example-key" = "example-value"} Assert-AreEqual $cacheName $cacheCreated.Name Assert-AreEqual $location $cacheCreated.Location Assert-AreEqual $resourceGroupName $cacheCreated.ResourceGroupName Assert-AreEqual "creating" $cacheCreated.ProvisioningState Assert-AreEqual "6GB" $cacheCreated.Size Assert-AreEqual "Premium" $cacheCreated.Sku Assert-AreEqual "1" $cacheCreated.Zone[0] Assert-AreEqual "example-value" $cacheCreated.Tag.Item("example-key") Assert-NotNull $cacheCreated.PrimaryKey "PrimaryKey do not exists" Assert-NotNull $cacheCreated.SecondaryKey "SecondaryKey do not exists" for ($i = 0; $i -le 60; $i++) { Start-TestSleep 30000 $cacheGet = Get-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName if ([string]::Compare("succeeded", $cacheGet[0].ProvisioningState, $True) -eq 0) { Assert-AreEqual $cacheName $cacheGet[0].Name Assert-AreEqual "1" $cacheGet[0].Zone[0] Assert-AreEqual "example-value" $cacheGet[0].Tag.Item("example-key") break } Assert-False {$i -eq 60} "Cache is not in succeeded state even after 30 min." } Assert-True {Remove-AzRedisCache -ResourceGroupName $resourceGroupName -Name $cacheName -Force -PassThru} "Remove cache failed." Remove-AzResourceGroup -Name $resourceGroupName -Force } function Start-TestSleep($milliseconds) { if ([Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Mode -ne [Microsoft.Azure.Test.HttpRecorder.HttpRecorderMode]::Playback) { Start-Sleep -Milliseconds $milliseconds } }
combined_dataset/train/non-malicious/Monitor-FileSize_1.ps1
Monitor-FileSize_1.ps1
function Monitor-FileSize { <# .Synopsis Checks the file size of a given file until it reaches the specified size .Description Checks the file size of a given file until it reaches the specified size. AT that point, it alerts the user as to what the original file-size-boundry was and what it currently is. The interval at which the script runs can be specified by the user. .Parameter FilePath Path of the file that will be monitored. If not pointed to a specific file, the script will montior all sub-directories as well. ie. if pointed to C:\\ drive, will monitor ALL files on C:\\ drive .Parameter Size File size is monitored against this value. When file size is equal or greater than this value, user alert is triggered. Enter size constraints as integer values (ex: -Size 100 NOT -Size 100kb) .Parameter Interval The wait interval between the executions of the function. The value of this parameter is in seconds and default value is 5 seconds .Example Monitor-FileSize -FilePath C:\\Test -Size 100 Returns a message to the user alerting them when at least 100kb worth of memory is stored in the selected location. .Example Monitor-FileSize -FilePath C:\\Test -Size 100 -Interval 20 Checking the size of the file and all sub-directories every 20 seconds .Notes This script cannot be run as a background job and so must have a separate PowerShell window on which it can be running. Author: Paul Kiri. #> param ( [Parameter(mandatory=$true,position=0)] [string[]]$FilePath , [Parameter(mandatory=$true,position=1)] [int]$Size , [Parameter(mandatory=$false)] [int]$Interval=5 ) if((Test-Path $FilePath)) { While($FS -le $Size) { Start-Sleep -Seconds $Interval $FileSize = get-childitem $FilePath -Recurse -Include *.* | foreach-object -Process { $_.length / 1024 } | Measure-Object -Sum | Select-Object -Property Sum $FS = $FileSize.Sum } } if Test-Path else{"File does not exist!"} Write-Output "The files at location, $FilePath , have exceeded $Size kb and are now $('{0:N4}' -f $FileSize.Sum) kb in size." }