full_path
stringlengths
31
232
filename
stringlengths
4
167
content
stringlengths
0
48.3M
combined_dataset/train/non-malicious/Invoke-WMSettingsChange.ps1
Invoke-WMSettingsChange.ps1
#requires -version 2 if (-not ("win32.nativemethods" -as [type])) { # import sendmessagetimeout from win32 add-type -Namespace Win32 -Name NativeMethods -MemberDefinition @" [DllImport("user32.dll", SetLastError = true, CharSet = CharSet.Auto)] public static extern IntPtr SendMessageTimeout( IntPtr hWnd, uint Msg, UIntPtr wParam, string lParam, uint fuFlags, uint uTimeout, out UIntPtr lpdwResult); "@ } $HWND_BROADCAST = [intptr]0xffff; $WM_SETTINGCHANGE = 0x1a; $result = [uintptr]::zero # notify all windows of environment block change [win32.nativemethods]::SendMessageTimeout($HWND_BROADCAST, $WM_SETTINGCHANGE, [uintptr]::Zero, "Environment", 2, 5000, [ref]$result);
combined_dataset/train/non-malicious/sample_58_56.ps1
sample_58_56.ps1
# # Module manifest for module 'OCI.PSModules.Events' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Events.dll' # Version number of this module. ModuleVersion = '83.3.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '5e1c10f7-8832-4248-b692-89297c84ea32' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Events Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.3.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Events.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIEventsRule', 'Get-OCIEventsRulesList', 'Move-OCIEventsRuleCompartment', 'New-OCIEventsRule', 'Remove-OCIEventsRule', 'Update-OCIEventsRule' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Events' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_5_30.ps1
sample_5_30.ps1
ConvertFrom-StringData @' id_depdisabled4gbcheck=Checking if DEP settings id_depdisabled4gbcheckdesc=Checking if Data Execution Protection is enabled '@ # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBPt2tqwj8R5RHA # +kfEO86aPreLmADwX9N3mP0wJHGrS6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMDtuILWQgqxF+jZF6t6XOme # fXjtPgZNqCmMeN/LXW1qMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEALYlIFrLeYBGs5LILWJ4YDSuLN1mfl6mPycZRpiqD5beKc+rk0+541mbE # CHvQNIgRVOonrjncVImjwlOQxb/ZGe0D8PUJ14vvlSl3D+RYz6ykTOUzh1Adso8R # 8EaGJusHdwxaB/DNEt1Zib9G9IzFzTpZzFfARaWY6avnzvUZ2rnUtPVPAnPon9/M # 0XRi9cU0eX0DvG+e3HJeBqMCgr6ubyybSpNYXMyTxKmKFs0ba2GY5zSukSNRD0xq # Iu8Ek4DhewzZfQaDoqqFdt0/bvc+rig5cY1C/UfryCFt8C7kzRTbs/5TLrFriASD # 0NQ/Tp1Kt0D8J/srVok8MzYu8rjPAaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAQ2r8ck8e01sgWz47mhtDDJfFrnjf64Xve1xO4PZg0UQIGZxp+Oc3P # GBMyMDI0MTAyODExNDA0Mi43NDZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAfGzRfUn6MAW1gABAAAB8TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NTVaFw0yNTAzMDUxODQ1NTVaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCxulCZttIf8X97rW9/J+Q4Vg9PiugB1ya1/DRxxLW2 # hwy4QgtU3j5fV75ZKa6XTTQhW5ClkGl6gp1nd5VBsx4Jb+oU4PsMA2foe8gP9bQN # PVxIHMJu6TYcrrn39Hddet2xkdqUhzzySXaPFqFMk2VifEfj+HR6JheNs2LLzm8F # DJm+pBddPDLag/R+APIWHyftq9itwM0WP5Z0dfQyI4WlVeUS+votsPbWm+RKsH4F # QNhzb0t/D4iutcfCK3/LK+xLmS6dmAh7AMKuEUl8i2kdWBDRcc+JWa21SCefx5SP # hJEFgYhdGPAop3G1l8T33cqrbLtcFJqww4TQiYiCkdysCcnIF0ZqSNAHcfI9SAv3 # gfkyxqQNJJ3sTsg5GPRF95mqgbfQbkFnU17iYbRIPJqwgSLhyB833ZDgmzxbKmJm # dDabbzS0yGhngHa6+gwVaOUqcHf9w6kwxMo+OqG3QZIcwd5wHECs5rAJZ6PIyFM7 # Ad2hRUFHRTi353I7V4xEgYGuZb6qFx6Pf44i7AjXbptUolDcVzYEdgLQSWiuFajS # 6Xg3k7Cy8TiM5HPUK9LZInloTxuULSxJmJ7nTjUjOj5xwRmC7x2S/mxql8nvHSCN # 1OED2/wECOot6MEe9bL3nzoKwO8TNlEStq5scd25GA0gMQO+qNXV/xTDOBTJ8zBc # GQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLy2xe59sCE0SjycqE5Erb4YrS1gMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDhSEjSBFSCbJyl3U/QmFMW2eLPBknnlsfI # D/7gTMvANEnhq08I9HHbbqiwqDEHSvARvKtL7j0znICYBbMrVSmvgDxU8jAGqMyi # LoM80788So3+T6IZV//UZRJqBl4oM3bCIQgFGo0VTeQ6RzYL+t1zCUXmmpPmM4xc # ScVFATXj5Tx7By4ShWUC7Vhm7picDiU5igGjuivRhxPvbpflbh/bsiE5tx5cuOJE # JSG+uWcqByR7TC4cGvuavHSjk1iRXT/QjaOEeJoOnfesbOdvJrJdbm+leYLRI67N # 3cd8B/suU21tRdgwOnTk2hOuZKs/kLwaX6NsAbUy9pKsDmTyoWnGmyTWBPiTb2rp # 5ogo8Y8hMU1YQs7rHR5hqilEq88jF+9H8Kccb/1ismJTGnBnRMv68Ud2l5LFhOZ4 # nRtl4lHri+N1L8EBg7aE8EvPe8Ca9gz8sh2F4COTYd1PHce1ugLvvWW1+aOSpd8N # nwEid4zgD79ZQxisJqyO4lMWMzAgEeFhUm40FshtzXudAsX5LoCil4rLbHfwYtGO # pw9DVX3jXAV90tG9iRbcqjtt3vhW9T+L3fAZlMeraWfh7eUmPltMU8lEQOMelo/1 # ehkIGO7YZOHxUqeKpmF9QaW8LXTT090AHZ4k6g+tdpZFfCMotyG+E4XqN6ZWtKEB # QiE3xL27BDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQD7 # n7Bk4gsM2tbU/i+M3BtRnLj096CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smZujAiGA8yMDI0MTAyODA1MDM1 # NFoYDzIwMjQxMDI5MDUwMzU0WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyZm6 # AgEAMAcCAQACAgaxMAcCAQACAhPGMAoCBQDqyus6AgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAA0BaKsAtdDQTH1mQ1AYUo/KxlS4RtFuuuP4gPyvI62JGK76 # KDo1S6HM+ctaAw8utdUJxDxdBIT7YVtf3EsB6ahF9dyVII0TJFjSP8cCJOTC5jRG # lCifOuJzCDhxwQQAhSXeWAkO4VhE7gDZPP8iKAQ1S6eXo0xnFmuVzKYGWRGUrO7H # xP5nS8g4cZRiZaQEiMHRdB8GJDJLV2TUfd6Hut03mT2z+RLogrNkAFxK/6rNsuyX # u+FFy81XbveHgyGjD6chYE3AuUByswKrW/SRVmzMrGVD/QhwaIDDpkpr3XNM9N/L # MrmVoP4y9JQ4hhbVj5wZ6XL5rCe5OY1v86QJAdwxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfGzRfUn6MAW1gABAAAB8TAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCB0hwT72nHvT23l2DMWC72gFTGoCiRLaGfIHx/gAO3J2TCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINV3/T5hS7ijwao466RosB7wwEib # t0a1P5EqIwEj9hF4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHxs0X1J+jAFtYAAQAAAfEwIgQg8PuciiVYQ85s2ehb7/+SpISkahbp # SB/VJgG8R7IGdAkwDQYJKoZIhvcNAQELBQAEggIArAGrAWWGhs5/JmaXXYPusuzc # iZidb6Pm7ER7zbSm0Y5NQsarPogffUkxQu83cidB+W3YDQsWgozaAe3jcQ6fjR0w # B8+LE5Cm1b4G5QhI3TV+2O304cpIaEtzIeKPrEqYP0j3bhd68y5+NY2KCYOAZDRB # cnWteh6XYWRbvQ0l/4XC0OVFUWM9VhcBuEkiuBGI2xcgyu0/1DTIpxpez6NYOlAy # m0W6Fpi+CdfAcLDg0w74bfC83jYD8rHYw1q/p4LEmAcy0ggOG3WxL9+W7TwQsbLO # vQsDFn4rb05OqcHSzAgDmcz05gFckk0GBZ+dD1B01KOXU2DAxdu/Im2z22XDNcOJ # GSFelG1fN8u1ZaHKVYUqh9i5sLjeJup6D4H7SLSkGC9r1gO67CDGlC3lCtjrN/kK # SIFOkVbwRWschd+d6Bca1sBliz315YKmajmDvxdQ+VQQSJxOnHlWPWzkR/+w7F7r # lPgyb2ZZCDHyFqqmnnvFkCKS9YXDtny17ix6eJu3CmY9sqVAWr0ukjTqJyc1hJzE # FTC7HVBoZ6mVdO4fW81wM5Bb+7LwcgmnSGrVPA+hwGi3ey+FRJzORPxTvMNZWvTa # lTMfjjgEfpqkJKVGG4wBFFIO6izxRfh+KmJyvXVECe27STbbRhfkpKMkb3UT2pAJ # NtwaaLxiw/4CjST4BC4= # SIG # End signature block
combined_dataset/train/non-malicious/sample_50_54.ps1
sample_50_54.ps1
function getWorldMatrix(element) { return element.getTrait("WorldTransform").value; } var isOrtho = false; function getCameraElement() { var camera = document.elements.findElementByTypeId("Microsoft.VisualStudio.3D.PerspectiveCamera"); if (camera == null) { isOrtho = true; camera = document.elements.findElementByTypeId("Microsoft.VisualStudio.3D.OrthographicCamera"); } return camera; } var cameraElement = getCameraElement(); var camWorldMatrix = getWorldMatrix(cameraElement); if (isOrtho) { var coord = document.getCoordinateSystemMatrix(); var relPos = math.getForwardVector(coord); relPos = math.transformNormal(camWorldMatrix, relPos); document.frameSelection(relPos[0], relPos[1], relPos[2], true); } else { var camPos = math.getTranslation(camWorldMatrix); document.frameSelection(camPos[0], camPos[1], camPos[2], false); } // SIG // Begin signature block // SIG // MIInzAYJKoZIhvcNAQcCoIInvTCCJ7kCAQExDzANBglg // SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor // SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC // SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg // SIG // tY1kP1jJfBkVCE+UU5duMnBiCJ7NzUGb40V66W1V3Kyg // SIG // gg2FMIIGAzCCA+ugAwIBAgITMwAAA64tNVHIU49VHQAA // SIG // AAADrjANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT // SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDg1OVoX // SIG // DTI0MTExNDE5MDg1OVowdDELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA // SIG // 9CD8pjY3wxCoPmMhOkow7ycCltfqYnqk4wGNApzh2dTY // SIG // +YqxozWTzJUOB38VxsgFQmXBFhOMdrGYGpvO9kdbNPkw // SIG // HpTrW6hZqFuLLiRwGKEx4ZM5zVSqbHJuX2fPfUJ0Xmb+ // SIG // VrVsGw/BwBV2zz0rVtiSgqj3GeeGOsG7llfWyrSjyJqm // SIG // 5DHE3o04BAI/NuhkHOv04euiqJGvHFCL8+fXvyD9OAxq // SIG // 4fcJKtoyBb0PBA3oMNQeCsiUyLO+voZqVTOUsAWY0bN5 // SIG // YjkK4nq5DVaNdVrrowd5AX9gmz6D/TJTssns6pDCG00Y // SIG // +Dh3ipWpnVmkhYcByyUSEKX3PLC8DkiAQQIDAQABo4IB // SIG // gjCCAX4wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB // SIG // BQUHAwMwHQYDVR0OBBYEFIcf73Spl4cHOFoll27H9COd // SIG // 4fE/MFQGA1UdEQRNMEukSTBHMS0wKwYDVQQLEyRNaWNy // SIG // b3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx // SIG // FjAUBgNVBAUTDTIzMDAxMis1MDE4MzYwHwYDVR0jBBgw // SIG // FoAUSG5k5VAF04KqFzc3IrVtqMp1ApUwVAYDVR0fBE0w // SIG // SzBJoEegRYZDaHR0cDovL3d3dy5taWNyb3NvZnQuY29t // SIG // L3BraW9wcy9jcmwvTWljQ29kU2lnUENBMjAxMV8yMDEx // SIG // LTA3LTA4LmNybDBhBggrBgEFBQcBAQRVMFMwUQYIKwYB // SIG // BQUHMAKGRWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w // SIG // a2lvcHMvY2VydHMvTWljQ29kU2lnUENBMjAxMV8yMDEx // SIG // LTA3LTA4LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3 // SIG // DQEBCwUAA4ICAQBqyWA1Eu7PKNMjaaxl0V7gJ0XBysUo // SIG // xZluMHJXFE2LEGZIZ2zMLYVjOnAGG/4dluRjSrZZo/8v // SIG // wk4Xt8v6NBB9ofo8H1P/XidHytWTv9lg9MYu++6lPmu5 // SIG // fCozD3cI2NLZPW2BBhGX2D0R8tQBj0FbmZRuIucpiQ7D // SIG // K3CHKlfKcc7MP8pPzuMv55Tox8+KFQD1NG6+bfbYA/BN // SIG // PBkg4tyOh+exbaHfcNuodDJUIjq9dF6oa+Yjy0u0pUMI // SIG // /B1t+8m6rJo0KSoZlrpesYl0jRhpt+hmqx8uENXoGJcY // SIG // ZVJ5N2Skq90LViKNRhi9N4U+e8c4y9uXyomUF/6viCPJ // SIG // 7huTNEJo75ehIJba+IWd3txUEc0R3y6DT6txC6cW1nR/ // SIG // LTbo9I/8fQq538G5IvJ+e5iSiOSVVkVk0i5m03Awy5E2 // SIG // ZSS4PVdQSCcFxmN4tpEfYuR7AAy/GJVtIDFlUpSgdXok // SIG // pSui5hYtK1R9enXXvo+U/xGkLRc+qp4De3dZbzu7pOq7 // SIG // V/jCyhuCw0bEIAU4urCGIip7TI6GBRzD7yPzjFIqeZY7 // SIG // S4rVW5BRn2oEqpm8Su6yTIQvMIk8x2pwYNUa2339Z4gW // SIG // 5xW21eFA5mLpo7NRSKRQms5OgAA18aCgqOU7Ds0h6q/Y // SIG // B4BmEAtoTMl/TBiyKaMGAlEcdy+5FIhmzojMGjCCB3ow // SIG // ggVioAMCAQICCmEOkNIAAAAAAAMwDQYJKoZIhvcNAQEL // SIG // BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo // SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK // SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT // SIG // KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhv // SIG // cml0eSAyMDExMB4XDTExMDcwODIwNTkwOVoXDTI2MDcw // SIG // ODIxMDkwOVowfjELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYG // SIG // A1UEAxMfTWljcm9zb2Z0IENvZGUgU2lnbmluZyBQQ0Eg // SIG // MjAxMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC // SIG // ggIBAKvw+nIQHC6t2G6qghBNNLrytlghn0IbKmvpWlCq // SIG // uAY4GgRJun/DDB7dN2vGEtgL8DjCmQawyDnVARQxQtOJ // SIG // DXlkh36UYCRsr55JnOloXtLfm1OyCizDr9mpK656Ca/X // SIG // llnKYBoF6WZ26DJSJhIv56sIUM+zRLdd2MQuA3WraPPL // SIG // bfM6XKEW9Ea64DhkrG5kNXimoGMPLdNAk/jj3gcN1Vx5 // SIG // pUkp5w2+oBN3vpQ97/vjK1oQH01WKKJ6cuASOrdJXtjt // SIG // 7UORg9l7snuGG9k+sYxd6IlPhBryoS9Z5JA7La4zWMW3 // SIG // Pv4y07MDPbGyr5I4ftKdgCz1TlaRITUlwzluZH9TupwP // SIG // rRkjhMv0ugOGjfdf8NBSv4yUh7zAIXQlXxgotswnKDgl // SIG // mDlKNs98sZKuHCOnqWbsYR9q4ShJnV+I4iVd0yFLPlLE // SIG // tVc/JAPw0XpbL9Uj43BdD1FGd7P4AOG8rAKCX9vAFbO9 // SIG // G9RVS+c5oQ/pI0m8GLhEfEXkwcNyeuBy5yTfv0aZxe/C // SIG // HFfbg43sTUkwp6uO3+xbn6/83bBm4sGXgXvt1u1L50kp // SIG // pxMopqd9Z4DmimJ4X7IvhNdXnFy/dygo8e1twyiPLI9A // SIG // N0/B4YVEicQJTMXUpUMvdJX3bvh4IFgsE11glZo+TzOE // SIG // 2rCIF96eTvSWsLxGoGyY0uDWiIwLAgMBAAGjggHtMIIB // SIG // 6TAQBgkrBgEEAYI3FQEEAwIBADAdBgNVHQ4EFgQUSG5k // SIG // 5VAF04KqFzc3IrVtqMp1ApUwGQYJKwYBBAGCNxQCBAwe // SIG // CgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB // SIG // /wQFMAMBAf8wHwYDVR0jBBgwFoAUci06AjGQQ7kUBU7h // SIG // 6qfHMdEjiTQwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDov // SIG // L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj // SIG // dHMvTWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNy // SIG // bDBeBggrBgEFBQcBAQRSMFAwTgYIKwYBBQUHMAKGQmh0 // SIG // dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMv // SIG // TWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNydDCB // SIG // nwYDVR0gBIGXMIGUMIGRBgkrBgEEAYI3LgMwgYMwPwYI // SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv // SIG // bS9wa2lvcHMvZG9jcy9wcmltYXJ5Y3BzLmh0bTBABggr // SIG // BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBwAG8AbABp // SIG // AGMAeQBfAHMAdABhAHQAZQBtAGUAbgB0AC4gHTANBgkq // SIG // hkiG9w0BAQsFAAOCAgEAZ/KGpZjgVHkaLtPYdGcimwuW // SIG // EeFjkplCln3SeQyQwWVfLiw++MNy0W2D/r4/6ArKO79H // SIG // qaPzadtjvyI1pZddZYSQfYtGUFXYDJJ80hpLHPM8QotS // SIG // 0LD9a+M+By4pm+Y9G6XUtR13lDni6WTJRD14eiPzE32m // SIG // kHSDjfTLJgJGKsKKELukqQUMm+1o+mgulaAqPyprWElj // SIG // HwlpblqYluSD9MCP80Yr3vw70L01724lruWvJ+3Q3fMO // SIG // r5kol5hNDj0L8giJ1h/DMhji8MUtzluetEk5CsYKwsat // SIG // ruWy2dsViFFFWDgycScaf7H0J/jeLDogaZiyWYlobm+n // SIG // t3TDQAUGpgEqKD6CPxNNZgvAs0314Y9/HG8VfUWnduVA // SIG // KmWjw11SYobDHWM2l4bf2vP48hahmifhzaWX0O5dY0Hj // SIG // Wwechz4GdwbRBrF1HxS+YWG18NzGGwS+30HHDiju3mUv // SIG // 7Jf2oVyW2ADWoUa9WfOXpQlLSBCZgB/QACnFsZulP0V3 // SIG // HjXG0qKin3p6IvpIlR+r+0cjgPWe+L9rt0uX4ut1eBrs // SIG // 6jeZeRhL/9azI2h15q/6/IvrC4DqaTuv/DDtBEyO3991 // SIG // bWORPdGdVk5Pv4BXIqF4ETIheu9BCrE/+6jMpF3BoYib // SIG // V3FWTkhFwELJm3ZbCoBIa/15n8G9bW1qyVJzEw16UM0x // SIG // ghmfMIIZmwIBATCBlTB+MQswCQYDVQQGEwJVUzETMBEG // SIG // A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u // SIG // ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5n // SIG // IFBDQSAyMDExAhMzAAADri01UchTj1UdAAAAAAOuMA0G // SIG // CWCGSAFlAwQCAQUAoIGuMBkGCSqGSIb3DQEJAzEMBgor // SIG // BgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEE // SIG // AYI3AgEVMC8GCSqGSIb3DQEJBDEiBCDo8+YsFQgG+h1s // SIG // 5KLMCG3WaOzzNKEz/nCy7VFsqL1NiTBCBgorBgEEAYI3 // SIG // AgEMMTQwMqAUgBIATQBpAGMAcgBvAHMAbwBmAHShGoAY // SIG // aHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3 // SIG // DQEBAQUABIIBAJBuVqzvn5YmyQ+TjSIozkNL5tGY1mDo // SIG // BMokTozqUMrquAyWZC2FrVdvYVyR5B/bgUGN66XVOr+i // SIG // 9+dGHpA0JqGZEECHht84OixOadUqUGzHA2SVzGx4EAxZ // SIG // CcO/nBAYR+drVsMiR+XAHJ+SKAZllzYzxwxdjjK3Azv4 // SIG // XS5rOGHYwxr4QBuo6tRxhsDlSv81RpTTGA4sM3CJenXm // SIG // cLi/+JsZ+M/L7RygaUCjpKLjGRrlT9s08L7T/dRweK+q // SIG // FTesgu/j307ZPkoNNY2cViNmhsBWeUbHztx6lwbQEVl9 // SIG // wKmOWzbSBq7DpdIuKxnnp9xAHZg/S2+RLQNkWLYRFp5l // SIG // 7FShghcpMIIXJQYKKwYBBAGCNwMDATGCFxUwghcRBgkq // SIG // hkiG9w0BBwKgghcCMIIW/gIBAzEPMA0GCWCGSAFlAwQC // SIG // AQUAMIIBWQYLKoZIhvcNAQkQAQSgggFIBIIBRDCCAUAC // SIG // AQEGCisGAQQBhFkKAwEwMTANBglghkgBZQMEAgEFAAQg // SIG // e7XMSiwfGZ3XnojGzaEzPUPRYi0pV4kW47OknUVsGhgC // SIG // BmXWB8d+SBgTMjAyNDAzMDEwMDM1MzMuMTIzWjAEgAIB // SIG // 9KCB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsG // SIG // A1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9u // SIG // cyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVT // SIG // TjoxNzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9z // SIG // b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEXgwggcnMIIF // SIG // D6ADAgECAhMzAAAB4NT8HxMVH35dAAEAAAHgMA0GCSqG // SIG // SIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI // SIG // EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w // SIG // HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAk // SIG // BgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy // SIG // MDEwMB4XDTIzMTAxMjE5MDcxOVoXDTI1MDExMDE5MDcx // SIG // OVowgdIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo // SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK // SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT // SIG // JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGlt // SIG // aXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046MTc5 // SIG // RS00QkIwLTgyNDYxJTAjBgNVBAMTHE1pY3Jvc29mdCBU // SIG // aW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB // SIG // AQUAA4ICDwAwggIKAoICAQCsh5zzocW70QE5xo2/+n7g // SIG // YYd2S86LQMQIHS2mf85ERVHXkis8jbd7aqKzCuxg73F3 // SIG // SrPqiDFG73p5R/sOd7LD2uq2D++tGbhawAa37Hq39JBW // SIG // sjV1c8E+42qyThI5xTAafsovrsENk5ybsXM3HhuRQx6y // SIG // COrBehfO/ZT+snWNAQWZGfbd/Xv7LzUYngOYFJ7/2HDP // SIG // 2yDGP0GJnfRdAfnmxWIvjx+AJF2oTZBYCvOTiGkawxr4 // SIG // Z8Tmv+cxi+zooou/iff0B5HSRpX50X20N0FzP+f7pgTi // SIG // huCaBWNZ4meUVR+T09Prgo8HKoU2571LXyvjfsgdm/ax // SIG // Gb6dk7+GcGMxHfQPVbGDLmYgkm2hTJO+y8FW5JaZ8OGh // SIG // 1iVyZBGJib8UW3E4RPBUMjqFZErinOTlmdvljP4+dKG5 // SIG // QNLQlOdwGrr1DmUaEAYfPZxyvpuaTlyl3WDCfnHri2Bf // SIG // Iecv3Fy0DDpqiyc+ZezC6hsFNMx1fjBDvC9RaNsxBEOI // SIG // i+AV/GJJyl6JxxkGnEgmi2aLdpMiVUbBUsZ9D5T7x1ad // SIG // GHbAjM3XosPYwGeyvbNVsbGRhAayv6G4qV+rsYxKclAP // SIG // Zm1T5Y5W90eDFiNBNsSPzTOheAHPAnmsd2Fi0/mlgmXq // SIG // oiDC8cslmYPotSmPGRMzHjUyghCOcBdcMaq+k9fzEKPv // SIG // LQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFHBeFz9unVfv // SIG // ErrKANV10Nkw0pnSMB8GA1UdIwQYMBaAFJ+nFV0AXmJd // SIG // g/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0 // SIG // dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3Js // SIG // L01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAy // SIG // MDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYB // SIG // BQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w // SIG // a2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFt // SIG // cCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQC // SIG // MAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0P // SIG // AQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDAE84O // SIG // kfwNJXTuzKhsQ9VSY4uclQNYR29B3NGI7b+1pMUPIsH3 // SIG // 5bpV+VLOuLQ9/tzU9SZKYVs2gFn9sCnQMN+UcbUBtYjj // SIG // dxxGdF9t53XuCoP1n28eaxB5GfW8yp0f9jeQNevsP9aW // SIG // 8Cc3X0XJyU93C8msK/5GIzFnetzj9Bpau9LmuFlBPz6O // SIG // aVO60EW1hKEKM2NuIQKjnMLkXJugm9CQXkzgnkQZ7RCo // SIG // IynqeKUWkLe2/b7rE/e1niXH2laLJpj7bGbGsIJ6SI2w // SIG // WuebR37pNLw5GbWyF41OJq+XZ7PXZ2pwXQUtj2Nzd4SH // SIG // wjxDrM6rsBy5H5BWf/W8cPP3kSZXbaLpB6NemnxPwKj/ // SIG // 7JphiYeWUdKZoFukHF/uta3YuZAyU8whWqDMmM1EtEhG // SIG // 8qw2f6dijrigGDZ4JY4jpZZXLdLiVc9moH3Mxo47Cotg // SIG // EtVml7zoYGTZhsONkhQdampaGvCmrsfUNhxyxPIHnv+a // SIG // 4Dp8fc0m31VHOyHETaHauke7/kc/j+lyrToMgqlv/q4T // SIG // 5qf5+xatgRk0ZHMv/4Zkt9qeqsoJa9iuDqCQyV8RbOpc // SIG // HPA/OqpVHho1MqO4VcuVb8gPstJhpxALgPObbDnFD5c8 // SIG // FhebL/geX89+Tlt1+EqZOUojbpZyxUTzOVwrEh6r3Gwv // SIG // Ed6sI9sNXrz4WcQ7jTCCB3EwggVZoAMCAQICEzMAAAAV // SIG // xedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgx // SIG // CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u // SIG // MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy // SIG // b3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jv // SIG // c29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy // SIG // MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy // SIG // NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp // SIG // bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT // SIG // FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd // SIG // TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIi // SIG // MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM // SIG // 57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/ // SIG // bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1 // SIG // jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhx // SIG // XFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41 // SIG // JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP // SIG // 1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3j // SIG // tIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF // SIG // 50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg // SIG // 3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F // SIG // 37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 // SIG // lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM // SIG // jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLX // SIG // pyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJ // SIG // YfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzF // SIG // ER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+e // SIG // FnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYB // SIG // BAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS // SIG // /mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0A // SIG // XmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYB // SIG // BAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93 // SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBv // SIG // c2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZ // SIG // BgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8E // SIG // BAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAW // SIG // gBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN // SIG // MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v // SIG // cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx // SIG // MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsG // SIG // AQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20v // SIG // cGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIz // SIG // LmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4Swf // SIG // ZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518Jx // SIG // Nj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6 // SIG // th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9I // SIG // dQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq // SIG // 95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBew // SIG // VIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7 // SIG // bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa // SIG // 2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzH // SIG // VG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZ // SIG // c9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakUR // SIG // R6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs // SIG // QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi // SIG // excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+AN // SIG // uOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/ // SIG // OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQd // SIG // VTNYs6FwZvKhggLUMIICPQIBATCCAQChgdikgdUwgdIx // SIG // CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u // SIG // MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy // SIG // b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv // SIG // c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEm // SIG // MCQGA1UECxMdVGhhbGVzIFRTUyBFU046MTc5RS00QkIw // SIG // LTgyNDYxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0 // SIG // YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAG3z0dXw // SIG // V+h8WH8j8fM2MyVOXyEMoIGDMIGApH4wfDELMAkGA1UE // SIG // BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV // SIG // BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD // SIG // b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp // SIG // bWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEFBQAC // SIG // BQDpimfaMCIYDzIwMjQwMjI5MTAxODAyWhgPMjAyNDAz // SIG // MDExMDE4MDJaMHQwOgYKKwYBBAGEWQoEATEsMCowCgIF // SIG // AOmKZ9oCAQAwBwIBAAICBJwwBwIBAAICE5gwCgIFAOmL // SIG // uVoCAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGE // SIG // WQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkq // SIG // hkiG9w0BAQUFAAOBgQCQgHSenTut32jSbiod8OYyqtGB // SIG // vblK13L5DlhDrb0ptT15CBiGjBZ6Bpl63CNC4rYNxg8T // SIG // AKRcHuA8bJeKiBdOQ/SpHhiH/z4eV0jwEtmcCERbYXLR // SIG // H5Yy6wAzazLYyLyYjJcoMfPE5RyevXFFPUTt3aLoe0hR // SIG // 9EZKd+jkOPnIoDGCBA0wggQJAgEBMIGTMHwxCzAJBgNV // SIG // BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYD // SIG // VQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg // SIG // Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBU // SIG // aW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8HxMVH35d // SIG // AAEAAAHgMA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG // SIG // 9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkE // SIG // MSIEIHH8VRSq3pvoEjeFx4wltYrR65+lLFRq/c5+MTbc // SIG // F464MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQg // SIG // 4+5Sv/I55W04z73O+wwgkm+E2QKWPZyZucIbCv9pCsEw // SIG // gZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK // SIG // V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG // SIG // A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD // SIG // VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx // SIG // MAITMwAAAeDU/B8TFR9+XQABAAAB4DAiBCClp02fd7pE // SIG // XGfszJszVjngjfErxxZnRP3oLvYqmVXMejANBgkqhkiG // SIG // 9w0BAQsFAASCAgBgL066BRcTiL5IkWzpcd9xRYwbr8Bw // SIG // JVPjh/+9gm+HAJS4zSFWETCb5GC8Aj9bHWlqJfCb/t/a // SIG // 9UP9ceCr2QQ2Y4jVBdnOG6mcl5QX5SLPgMJFijxcLupE // SIG // Vldu37fRIFEUfKn77THqFK/1UCsbkGSY3tJ9suD/qx+t // SIG // CKRdweF9XPn5SIVGUiZeHyqMtC2iKIFJ/BBg2y1cGwNV // SIG // LGLUTL++ahPV6NSxZ72C0Uh/2bWu6yWeMklvtoYXVm28 // SIG // vbxYyatbJMtLGFAsSNYgo3PctGODm02P7AzVjUqAVAS3 // SIG // kuOUY5bsK6JdhAG/uFcxyghGaBKvOXgDw2G08EbKxGBi // SIG // HXQXoe1Z8zujmTdEqD8ze6m8rZxCqy8BVj/a0rrPKbia // SIG // MIis0gvRfvL4fFTkj402xQpiaJcUmbj7ITabOscTDM1X // SIG // Qgr51aU4AxxxE4GrZcyJ0aD1hFNJ6iEHuXL/+1XTBmKd // SIG // p2GVg/VhQMlU0BZWhRm3E9V2UF0C9ctT2jP+dN/uDKge // SIG // w+7nya9LRCEl6+DMQSKcep+9GVYe8Vycdj4Qjfg6pPO1 // SIG // zZGIsSQ+Sl5mtELSIgOITjT1+W/eJOaauNLw/hPGHr7+ // SIG // Nfn3MpS6VWpwqwI4s+WniurgRS37aabmj/8N97COO0Bp // SIG // +v+lM2NIGXUkv/bdRoXNr+F2QpC8YZQ/fKY2rQ== // SIG // End signature block
combined_dataset/train/non-malicious/sample_17_52.ps1
sample_17_52.ps1
# # Module manifest for module 'OCI.PSModules.Rover' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Rover.dll' # Version number of this module. ModuleVersion = '80.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '6b3a22b9-6905-4ece-936d-982335059f13' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Rover Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Rover.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIRoverCluster', 'Get-OCIRoverClusterCertificate', 'Get-OCIRoverClusterRoverBundleRequestsList', 'Get-OCIRoverClustersList', 'Get-OCIRoverEntitlement', 'Get-OCIRoverEntitlementsList', 'Get-OCIRoverNode', 'Get-OCIRoverNodeCertificate', 'Get-OCIRoverNodeEncryptionKey', 'Get-OCIRoverNodeGetRpt', 'Get-OCIRoverNodeRoverBundleRequestsList', 'Get-OCIRoverNodesList', 'Get-OCIRoverShapesList', 'Get-OCIRoverWorkRequest', 'Get-OCIRoverWorkRequestErrorsList', 'Get-OCIRoverWorkRequestLogsList', 'Get-OCIRoverWorkRequestsList', 'Invoke-OCIRoverRequestAdditionalNodes', 'Invoke-OCIRoverRequestBundleRoverCluster', 'Invoke-OCIRoverRequestBundleRoverNode', 'Invoke-OCIRoverRetrieveAvailableBundleVersionsRoverCluster', 'Invoke-OCIRoverRetrieveAvailableBundleVersionsRoverNode', 'Invoke-OCIRoverRetrieveBundleStatusRoverCluster', 'Invoke-OCIRoverRetrieveBundleStatusRoverNode', 'Invoke-OCIRoverRoverNodeActionRetrieveCaBundle', 'Invoke-OCIRoverRoverNodeActionSetKey', 'Invoke-OCIRoverRoverNodeGenerateCertificate', 'Invoke-OCIRoverRoverNodeRenewCertificate', 'Invoke-OCIRoverRoverNodeReplaceCertificateAuthority', 'Invoke-OCIRoverRoverNodeRetrieveLeafCertificate', 'Move-OCIRoverClusterCompartment', 'Move-OCIRoverEntitlementCompartment', 'Move-OCIRoverNodeCompartment', 'New-OCIRoverCluster', 'New-OCIRoverEntitlement', 'New-OCIRoverNode', 'Remove-OCIRoverCluster', 'Remove-OCIRoverEntitlement', 'Remove-OCIRoverNode', 'Stop-OCIRoverWorkRequest', 'Update-OCIRoverCluster', 'Update-OCIRoverEntitlement', 'Update-OCIRoverNode' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Rover' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_29_63.ps1
sample_29_63.ps1
# Compiling Piglit $ProgressPreference = "SilentlyContinue" $MyPath = $MyInvocation.MyCommand.Path | Split-Path -Parent . "$MyPath\mesa_init_msvc.ps1" $source_dir = Join-Path -Path "$PWD" -ChildPath "src" $waffle_source = Join-Path -Path "$source_dir" -ChildPath "waffle" $waffle_install = Join-Path -Path "$PWD" -ChildPath "waffle" $piglit_source = Join-Path -Path "$PWD" -ChildPath "Piglit" Write-Host "Cloning Waffle at:" Get-Date New-Item -ItemType Directory -Path "$waffle_source" | Out-Null Push-Location -Path $waffle_source git init git remote add origin https://gitlab.freedesktop.org/mesa/waffle.git git fetch --depth 1 origin 950a1f35a718bc2a8e1dda75845e52651bb331a7 # of branch master if (!$?) { Write-Host "Failed to fetch Waffle repository" Pop-Location Exit 1 } git checkout FETCH_HEAD Pop-Location Write-Host "Compiling Waffle at:" Get-Date $waffle_build = Join-Path -Path "$source_dir" -ChildPath "waffle\build" New-Item -ItemType Directory -Path "$waffle_build" | Out-Null Push-Location -Path $waffle_build meson setup ` --buildtype=release ` --default-library=static ` --prefix="$waffle_install" && ` ninja -j32 install if (!$?) { Write-Host "Failed to compile or install Waffle" Pop-Location Exit 1 } Pop-Location Remove-Item -Recurse -Force -ErrorAction SilentlyContinue -Path "$waffle_build" | Out-Null Write-Host "Downloading glext.h at:" Get-Date New-Item -ItemType Directory -Path "$source_dir\glext\GL" | Out-Null Invoke-WebRequest -Uri 'https://github.com/KhronosGroup/OpenGL-Registry/raw/main/api/GL/glext.h' -OutFile "$source_dir\glext\GL\glext.h" | Out-Null Write-Host "Cloning Piglit at:" Get-Date New-Item -ItemType Directory -Path "$piglit_source" | Out-Null Push-Location -Path $piglit_source git init git remote add origin https://gitlab.freedesktop.org/mesa/piglit.git git fetch --depth 1 origin 814046fe6942eac660ee4a6cc5fcc54011a49945 # of branch main if (!$?) { Write-Host "Failed to fetch Piglit repository" Pop-Location Exit 1 } git checkout FETCH_HEAD Write-Host "Compiling Piglit at:" Get-Date cmake -S . -B . ` -GNinja ` -DCMAKE_BUILD_TYPE=Release ` -DPIGLIT_USE_WAFFLE=ON ` -DWaffle_INCLUDE_DIRS="$waffle_install\include\waffle-1" ` -DWaffle_LDFLAGS="$waffle_install\lib\libwaffle-1.a" ` -DGLEXT_INCLUDE_DIR="$source_dir\glext" && ` ninja -j32 if (!$?) { Write-Host "Failed to compile Piglit" Pop-Location Exit 1 } Pop-Location $depsInstallPath="C:\mesa-deps" $piglit_bin = "$piglit_source\bin" # Hard link Agility SDK into subfolder of piglit $agility_dest = New-Item -ItemType Directory -Path $piglit_bin -Name 'D3D12' New-Item -ItemType HardLink -path $agility_dest\D3D12Core.dll -Value $depsInstallPath\bin\D3D12\D3D12Core.dll New-Item -ItemType HardLink -path $agility_dest\d3d12SDKLayers.dll -Value $depsInstallPath\bin\D3D12\d3d12SDKLayers.dll # Hard link WARP next to piglit New-Item -ItemType HardLink -path $piglit_bin\d3d10warp.dll -Value $depsInstallPath\bin\d3d10warp.dll Remove-Item -Recurse -Force -ErrorAction SilentlyContinue -Path "$source_dir" | Out-Null Remove-Item -Recurse -Force -ErrorAction SilentlyContinue -Path "$waffle_install" | Out-Null # Cleanup piglit intermediate files Get-ChildItem -Force -ErrorAction SilentlyContinue -Recurse "$piglit_source" | Where-Object { if($_.FullName -match "CMake|.git|.lib"){ Remove-Item -Recurse -Force -ErrorAction SilentlyContinue -Path $_.FullName | Out-Null } } Write-Host "Compiling Piglit finished at:" Get-Date
combined_dataset/train/non-malicious/sample_17_10.ps1
sample_17_10.ps1
# # Module manifest for module 'OCI.PSModules.Dts' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Dts.dll' # Version number of this module. ModuleVersion = '80.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '08adf9d8-a13f-4a0f-896f-df35c155c839' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Dts Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dts.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'DisMount-OCIDtsDevicesFromTransferPackage', 'Get-OCIDtsApplianceExportJob', 'Get-OCIDtsApplianceExportJobsList', 'Get-OCIDtsShippingVendorsList', 'Get-OCIDtsTransferAppliance', 'Get-OCIDtsTransferApplianceCertificateAuthorityCertificate', 'Get-OCIDtsTransferApplianceEncryptionPassphrase', 'Get-OCIDtsTransferApplianceEntitlement', 'Get-OCIDtsTransferApplianceEntitlementList', 'Get-OCIDtsTransferAppliancesList', 'Get-OCIDtsTransferDevice', 'Get-OCIDtsTransferDevicesList', 'Get-OCIDtsTransferJob', 'Get-OCIDtsTransferJobsList', 'Get-OCIDtsTransferPackage', 'Get-OCIDtsTransferPackagesList', 'Mount-OCIDtsDevicesToTransferPackage', 'Move-OCIDtsApplianceExportJobCompartment', 'Move-OCIDtsTransferJobCompartment', 'New-OCIDtsApplianceExportJob', 'New-OCIDtsTransferAppliance', 'New-OCIDtsTransferApplianceAdminCredentials', 'New-OCIDtsTransferApplianceEntitlement', 'New-OCIDtsTransferDevice', 'New-OCIDtsTransferJob', 'New-OCIDtsTransferPackage', 'Remove-OCIDtsApplianceExportJob', 'Remove-OCIDtsTransferAppliance', 'Remove-OCIDtsTransferDevice', 'Remove-OCIDtsTransferJob', 'Remove-OCIDtsTransferPackage', 'Update-OCIDtsApplianceExportJob', 'Update-OCIDtsTransferAppliance', 'Update-OCIDtsTransferDevice', 'Update-OCIDtsTransferJob', 'Update-OCIDtsTransferPackage' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dts' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Get-Credential 2.1.ps1
Get-Credential 2.1.ps1
## Get-Credential ## An improvement over the default cmdlet which has no options ... ################################################################################################### ## History ## v 2.1 Fix the comment help and parameter names to agree with each other (whoops) ## v 2.0 Rewrite for v2 to replace the default Get-Credential ## v 1.2 Refactor ShellIds key out to a variable, and wrap lines a bit ## v 1.1 Add -Console switch and set registry values accordingly (ouch) ## v 1.0 Add Title, Message, Domain, and UserName options to the Get-Credential cmdlet ################################################################################################### function Get-Credential { ## .Synopsis ## Gets a credential object based on a user name and password. ## .Description ## The Get-Credential function creates a credential object for a specified username and password, with an optional domain. You can use the credential object in security operations. ## ## The function accepts more parameters to customize the security prompt than the default Get-Credential cmdlet (including forcing the call through the console if you're in the native PowerShell.exe CMD console), but otherwise functions identically. ## ## .Parameter UserName ## A default user name for the credential prompt, or a pre-existing credential (would skip all prompting) ## .Parameter Title ## Allows you to override the default window title of the credential dialog/prompt ## ## You should use this to allow users to differentiate one credential prompt from another. In particular, if you're prompting for, say, Twitter credentials, you should put "Twitter" in the title somewhere. If you're prompting for domain credentials. Being specific not only helps users differentiate and know what credentials to provide, but also allows tools like KeePass to automatically determine it. ## .Parameter Message ## Allows you to override the text displayed inside the credential dialog/prompt. ## ## You can use this for things like presenting an explanation of what you need the credentials for. ## .Parameter Domain ## Specifies the default domain to use if the user doesn't provide one (by default, this is null) ## .Parameter GenericCredentials ## The Get-Credential cmdlet forces you to always return DOMAIN credentials (so even if the user provides just a plain user name, it prepends "\\" to the user name). This switch allows you to override that behavior and allow generic credentials without any domain name or the leading "\\". ## .Parameter Inline ## Forces the credential prompt to occur inline in the console/host using Read-Host -AsSecureString (not implemented properly in PowerShell ISE) ## [CmdletBinding(DefaultParameterSetName="Better")] PARAM( [Parameter(Position=1,Mandatory=$false)] [Alias("Credential")] [PSObject]$UserName=$null, [Parameter(Position=2,Mandatory=$false)] [string]$Title=$null, [Parameter(Position=3,Mandatory=$false)] [string]$Message=$null, [Parameter(Position=4,Mandatory=$false)] [string]$Domain=$null, [Parameter(Mandatory=$false)] [switch]$GenericCredentials, [Parameter(Mandatory=$false)] [switch]$Inline ) PROCESS { if( $UserName -is [System.Management.Automation.PSCredential]) { return $UserName } elseif($UserName -ne $null) { $UserName = $UserName.ToString() } if($Inline) { if($Title) { Write-Host $Title } if($Message) { Write-Host $Message } if($Domain) { if($UserName -and $UserName -notmatch "[@\\\\]") { $UserName = "${Domain}\\${UserName}" } } if(!$UserName) { $UserName = Read-Host "User" if(($Domain -OR !$GenericCredentials) -and $UserName -notmatch "[@\\\\]") { $UserName = "${Domain}\\${UserName}" } } return New-Object System.Management.Automation.PSCredential $UserName,$(Read-Host "Password for user $UserName" -AsSecureString) } if($GenericCredentials) { $Credential = "Generic" } else { $Credential = "Domain" } ## Now call the Host.UI method ... if they don't have one, we'll die, yay. ## BugBug? PowerShell.exe disregards the last parameter $Host.UI.PromptForCredential($Title, $Message, $UserName, $Domain, $Credential,"Default") } }
combined_dataset/train/non-malicious/95.ps1
95.ps1
function Get-AuthToken { [cmdletbinding()] param ( [Parameter(Mandatory=$true)] $User ) $userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User $tenant = $userUpn.Host Write-Host "Checking for AzureAD module..." $AadModule = Get-Module -Name "AzureAD" -ListAvailable if ($AadModule -eq $null) { Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview" $AadModule = Get-Module -Name "AzureADPreview" -ListAvailable } if ($AadModule -eq $null) { write-host write-host "AzureAD Powershell module not installed..." -f Red write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow write-host "Script can't continue..." -f Red write-host exit } if($AadModule.count -gt 1){ $Latest_Version = ($AadModule | select version | Sort-Object)[-1] $aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version } if($AadModule.count -gt 1){ $aadModule = $AadModule | select -Unique } $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } else { $adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll" $adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll" } [System.Reflection.Assembly]::LoadFrom($adal) | Out-Null [System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null $clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547" $redirectUri = "urn:ietf:wg:oauth:2.0:oob" $resourceAppIdURI = "https://graph.microsoft.com" $authority = "https://login.microsoftonline.com/$Tenant" try { $authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority $platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto" $userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId") $authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result if($authResult.AccessToken){ $authHeader = @{ 'Content-Type'='application/json' 'Authorization'="Bearer " + $authResult.AccessToken 'ExpiresOn'=$authResult.ExpiresOn } return $authHeader } else { Write-Host Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red Write-Host break } } catch { write-host $_.Exception.Message -f Red write-host $_.Exception.ItemName -f Red write-host break } } Function Get-RBACRole(){ [cmdletbinding()] param ( $Name ) $graphApiVersion = "Beta" $Resource = "deviceManagement/roleDefinitions" try { if($Name){ $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'displayName').contains("$Name") -and $_.isBuiltInRoleDefinition -eq $false } } else { $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" (Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value } } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } Function Remove-RBACRole(){ [cmdletbinding()] param ( $roleDefinitionId ) $graphApiVersion = "Beta" $Resource = "deviceManagement/roleDefinitions/$roleDefinitionId" try { if($roleDefinitionId -eq "" -or $roleDefinitionId -eq $null){ Write-Host "roleDefinitionId hasn't been passed as a paramater to the function..." -ForegroundColor Red write-host "Please specify a valid roleDefinitionId..." -ForegroundColor Red break } else { $uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)" Invoke-RestMethod -Uri $uri -Headers $authToken -Method Delete } } catch { $ex = $_.Exception $errorResponse = $ex.Response.GetResponseStream() $reader = New-Object System.IO.StreamReader($errorResponse) $reader.BaseStream.Position = 0 $reader.DiscardBufferedData() $responseBody = $reader.ReadToEnd(); Write-Host "Response content:`n$responseBody" -f Red Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)" write-host break } } write-host if($global:authToken){ $DateTime = (Get-Date).ToUniversalTime() $TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes if($TokenExpires -le 0){ write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow write-host if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } } else { if($User -eq $null -or $User -eq ""){ $User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication" Write-Host } $global:authToken = Get-AuthToken -User $User } $RBAC_Role = Get-RBACRole -Name "Graph" if($RBAC_Role){ if(@($RBAC_Role).count -gt 1){ Write-Host "More than one RBAC Intune Role has been found, please specify a single Intune Role..." -ForegroundColor Red Write-Host } elseif(@($RBAC_Role).count -eq 1){ Write-Host "Removing RBAC Intune Role" $RBAC_Role.displayName -ForegroundColor Cyan Remove-RBACRole -roleDefinitionId $RBAC_Role.id } } else { Write-Host "RBAC Intune Role doesn't exist..." -ForegroundColor Yellow Write-Host }
combined_dataset/train/non-malicious/sample_17_55.ps1
sample_17_55.ps1
# # Module manifest for module 'OCI.PSModules.Osmanagementhub' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Osmanagementhub.dll' # Version number of this module. ModuleVersion = '73.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '114fe920-9645-46a9-9e65-26c95a3d3613' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Osmanagementhub Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Osmanagementhub.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Disable-OCIOsmanagementhubModuleStreamOnManagedInstance', 'Disable-OCIOsmanagementhubModuleStreamOnManagedInstanceGroup', 'DisMount-OCIOsmanagementhubManagedInstancesFromLifecycleStage', 'DisMount-OCIOsmanagementhubManagedInstancesFromManagedInstanceGroup', 'DisMount-OCIOsmanagementhubSoftwareSourcesFromManagedInstance', 'DisMount-OCIOsmanagementhubSoftwareSourcesFromManagedInstanceGroup', 'Enable-OCIOsmanagementhubModuleStreamOnManagedInstance', 'Enable-OCIOsmanagementhubModuleStreamOnManagedInstanceGroup', 'Get-OCIOsmanagementhubEntitlementsList', 'Get-OCIOsmanagementhubErrataList', 'Get-OCIOsmanagementhubErratum', 'Get-OCIOsmanagementhubLifecycleEnvironment', 'Get-OCIOsmanagementhubLifecycleEnvironmentsList', 'Get-OCIOsmanagementhubLifecycleStage', 'Get-OCIOsmanagementhubLifecycleStageInstalledPackagesList', 'Get-OCIOsmanagementhubLifecycleStagesList', 'Get-OCIOsmanagementhubManagedInstance', 'Get-OCIOsmanagementhubManagedInstanceAnalyticContent', 'Get-OCIOsmanagementhubManagedInstanceAvailablePackagesList', 'Get-OCIOsmanagementhubManagedInstanceAvailableSoftwareSourcesList', 'Get-OCIOsmanagementhubManagedInstanceContent', 'Get-OCIOsmanagementhubManagedInstanceErrataList', 'Get-OCIOsmanagementhubManagedInstanceGroup', 'Get-OCIOsmanagementhubManagedInstanceGroupAvailableModulesList', 'Get-OCIOsmanagementhubManagedInstanceGroupAvailablePackagesList', 'Get-OCIOsmanagementhubManagedInstanceGroupAvailableSoftwareSourcesList', 'Get-OCIOsmanagementhubManagedInstanceGroupInstalledPackagesList', 'Get-OCIOsmanagementhubManagedInstanceGroupModulesList', 'Get-OCIOsmanagementhubManagedInstanceGroupsList', 'Get-OCIOsmanagementhubManagedInstanceInstalledPackagesList', 'Get-OCIOsmanagementhubManagedInstanceModulesList', 'Get-OCIOsmanagementhubManagedInstancesList', 'Get-OCIOsmanagementhubManagedInstanceUpdatablePackagesList', 'Get-OCIOsmanagementhubManagementStation', 'Get-OCIOsmanagementhubManagementStationsList', 'Get-OCIOsmanagementhubMirrorsList', 'Get-OCIOsmanagementhubModuleStream', 'Get-OCIOsmanagementhubModuleStreamProfile', 'Get-OCIOsmanagementhubModuleStreamProfilesList', 'Get-OCIOsmanagementhubModuleStreamsList', 'Get-OCIOsmanagementhubPackageGroup', 'Get-OCIOsmanagementhubPackageGroupsList', 'Get-OCIOsmanagementhubProfile', 'Get-OCIOsmanagementhubProfilesList', 'Get-OCIOsmanagementhubScheduledJob', 'Get-OCIOsmanagementhubScheduledJobsList', 'Get-OCIOsmanagementhubSoftwarePackage', 'Get-OCIOsmanagementhubSoftwarePackagesList', 'Get-OCIOsmanagementhubSoftwareSource', 'Get-OCIOsmanagementhubSoftwareSourcesList', 'Get-OCIOsmanagementhubSoftwareSourceVendorsList', 'Get-OCIOsmanagementhubWorkRequest', 'Get-OCIOsmanagementhubWorkRequestErrorsList', 'Get-OCIOsmanagementhubWorkRequestLogsList', 'Get-OCIOsmanagementhubWorkRequestsList', 'Invoke-OCIOsmanagementhubInstallModuleStreamProfileOnManagedInstance', 'Invoke-OCIOsmanagementhubInstallModuleStreamProfileOnManagedInstanceGroup', 'Invoke-OCIOsmanagementhubInstallPackagesOnManagedInstance', 'Invoke-OCIOsmanagementhubInstallPackagesOnManagedInstanceGroup', 'Invoke-OCIOsmanagementhubManageModuleStreamsOnManagedInstance', 'Invoke-OCIOsmanagementhubManageModuleStreamsOnManagedInstanceGroup', 'Invoke-OCIOsmanagementhubPromoteSoftwareSourceToLifecycleStage', 'Invoke-OCIOsmanagementhubRefreshSoftwareOnManagedInstance', 'Invoke-OCIOsmanagementhubRunScheduledJobNow', 'Invoke-OCIOsmanagementhubSearchSoftwareSourceModules', 'Invoke-OCIOsmanagementhubSearchSoftwareSourceModuleStreams', 'Invoke-OCIOsmanagementhubSearchSoftwareSourcePackageGroups', 'Invoke-OCIOsmanagementhubSummarizeManagedInstanceAnalytics', 'Invoke-OCIOsmanagementhubSwitchModuleStreamOnManagedInstance', 'Invoke-OCIOsmanagementhubSynchronizeMirrors', 'Invoke-OCIOsmanagementhubSynchronizeSingleMirrors', 'Mount-OCIOsmanagementhubManagedInstancesToLifecycleStage', 'Mount-OCIOsmanagementhubManagedInstancesToManagedInstanceGroup', 'Mount-OCIOsmanagementhubSoftwareSourcesToManagedInstance', 'Mount-OCIOsmanagementhubSoftwareSourcesToManagedInstanceGroup', 'Move-OCIOsmanagementhubAvailabilityOfSoftwareSources', 'New-OCIOsmanagementhubEntitlement', 'New-OCIOsmanagementhubLifecycleEnvironment', 'New-OCIOsmanagementhubManagedInstanceGroup', 'New-OCIOsmanagementhubManagementStation', 'New-OCIOsmanagementhubProfile', 'New-OCIOsmanagementhubScheduledJob', 'New-OCIOsmanagementhubSoftwareSource', 'Remove-OCIOsmanagementhubLifecycleEnvironment', 'Remove-OCIOsmanagementhubManagedInstanceGroup', 'Remove-OCIOsmanagementhubManagementStation', 'Remove-OCIOsmanagementhubModuleStreamProfileFromManagedInstance', 'Remove-OCIOsmanagementhubModuleStreamProfileFromManagedInstanceGroup', 'Remove-OCIOsmanagementhubPackagesFromManagedInstance', 'Remove-OCIOsmanagementhubPackagesFromManagedInstanceGroup', 'Remove-OCIOsmanagementhubProfile', 'Remove-OCIOsmanagementhubScheduledJob', 'Remove-OCIOsmanagementhubSoftwareSource', 'Update-OCIOsmanagementhubAllPackagesOnManagedInstanceGroup', 'Update-OCIOsmanagementhubAllPackagesOnManagedInstancesInCompartment', 'Update-OCIOsmanagementhubLifecycleEnvironment', 'Update-OCIOsmanagementhubManagedInstance', 'Update-OCIOsmanagementhubManagedInstanceGroup', 'Update-OCIOsmanagementhubManagementStation', 'Update-OCIOsmanagementhubPackagesOnManagedInstance', 'Update-OCIOsmanagementhubProfile', 'Update-OCIOsmanagementhubScheduledJob', 'Update-OCIOsmanagementhubSoftwareSource' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Osmanagementhub' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Bulk Storage vMotion .ps1
Bulk Storage vMotion .ps1
#======================================================================== # Created on: 5/31/2012 4:31 PM # Created by: Clint Jones # Organization: Virtually Genius! # Filename: StorageVMotion-BulkVMs #======================================================================== #Import Plugins and Connect to vCenter Add-PSSnapin VMware.VimAutomation.Core $creds = Get-Credential $viserver = Read-Host "vCenter Server:" Connect-VIServer -Server $viserver -Credential $creds #Load information from the selected cluster $cluster = Read-Host "What cluster do you want to migrate:" $destdata1 = Read-Host "Destination datastore #1:" $destdata2 = Read-Host "Destination datastore #2:" $vms = Get-Cluster -Name $cluster | Get-VM #Stoage vMotion each VM in selected cluster in a staged fashion foreach($vm in $vms) { #Ensure that the storage is balanced as it was before the transfer $currentdata = Get-VM -Name $vm.Name | Get-Datastore $currentdata = $currentdata.Name if ($currentdata.EndsWith("a") -eq "True") {$destdata = $destdata1} else {$destdata = $destdata2} #Storage vMotion to the datastore of choice and wait to start next transfer $task = Get-VM -Name $vm.Name | Move-VM -Datastore (Get-Datastore -Name $destdata) Wait-Task -Task $task }
combined_dataset/train/non-malicious/1089.ps1
1089.ps1
Import-Module -Name (Join-Path -Path $PSScriptRoot -ChildPath 'CarbonDscTest' -Resolve) -Force $credential = New-Credential -User 'CarbonDscTestUser' -Password ([Guid]::NewGuid().ToString()) $tempDir = $null $servicePath = $null $serviceName = 'CarbonDscTestService' Install-CUser -Credential $credential Start-CarbonDscTestFixture 'Service' function Init { Uninstall-CService -Name $serviceName $Global:Error.Clear() Copy-Item -Path (Join-Path -Path $PSScriptRoot -ChildPath 'Service\NoOpService.exe') -Destination $TestDrive.FullName $script:servicePath = Join-Path -Path $TestDrive.FullName -ChildPath 'NoOpService.exe' } Describe 'Carbon_Service.when getting resource' { Init It 'should get existing services' { Get-Service | Where-Object { (Get-Service -Name $_.Name -ErrorAction Ignore) -and (@('lltdsvc','lltdio') -notcontains $_.Name) } | Where-Object { (-Not [string]::IsNullOrWhitespace($_.Name)) } | ForEach-Object { Write-Verbose -Message ($_.Name) -Verbose $resource = Get-TargetResource -Name $_.Name $Global:Error.Count | Should Be 0 $resource | Should Not BeNullOrEmpty $resource.Name | Should Be $_.Name $path,$argumentList = [Carbon.Shell.Command]::Split($_.Path) $resource.Path | Should Be $path $resource.ArgumentList | Should Be $argumentList $resource.StartupType | Should Be $_.StartMode $resource.Delayed | Should Be $_.DelayedAutoStart $resource.OnFirstFailure | Should Be $_.FirstFailure $resource.OnSecondFailure | Should Be $_.SecondFailure $resource.OnThirdFailure | Should Be $_.ThirdFailure $resource.ResetFailureCount | Should Be $_.ResetPeriod $resource.RestartDelay | Should Be $_.RestartDelay $resource.RebootDelay | Should Be $_.RebootDelay $resource.Command | Should Be $_.FailureProgram $resource.RunCommandDelay | Should Be $_.RunCommandDelay $resource.DisplayName | Should Be $_.DisplayName $resource.Description | Should Be $_.Description ($resource.Dependency -join ',') | Should Be (($_.ServicesDependedOn | Select-Object -ExpandProperty 'Name') -join ',') if( $_.UserName -and (Test-Identity -Name $_.UserName) ) { $resource.UserName | Should Be (Resolve-IdentityName -Name $_.UserName) } else { $resource.UserName | Should Be $_.UserName } $resource.Credential | Should BeNullOrEmpty Assert-DscResourcePresent $resource } } } Describe 'Carbon_Service' { BeforeEach { Init } It 'should get non existent service' { $name = [Guid]::NewGuid().ToString() $resource = Get-TargetResource -Name $name $Global:Error.Count | Should Be 0 $resource | Should Not BeNullOrEmpty $resource.Name | Should Be $name $resource.Path | Should BeNullOrEmpty $resource.StartupType | Should BeNullOrEmpty $resource.Delayed | Should BeNullOrEmpty $resource.OnFirstFailure | Should BeNullOrEmpty $resource.OnSecondFailure | Should BeNullOrEmpty $resource.OnThirdFailure | Should BeNullOrEmpty $resource.ResetFailureCount | Should BeNullOrEmpty $resource.RestartDelay | Should BeNullOrEmpty $resource.RebootDelay | Should BeNullOrEmpty $resource.Dependency | Should BeNullOrEmpty $resource.Command | Should BeNullOrEmpty $resource.RunCommandDelay | Should BeNullOrEmpty $resource.DisplayName | Should BeNullOrEmpty $resource.Description | Should BeNullOrEmpty $resource.UserName | Should BeNullOrEmpty $resource.Credential | Should BeNullOrEmpty $resource.ArgumentList | Should Be $null Assert-DscResourceAbsent $resource } It 'should install service' { Set-TargetResource -Path $servicePath -Name $serviceName -Ensure Present $Global:Error.Count | Should Be 0 $resource = Get-TargetResource -Name $serviceName $resource | Should Not BeNullOrEmpty $resource.Name | Should Be $serviceName $resource.Path | Should Be $servicePath $resource.StartupType | Should Be 'Automatic' $resource.Delayed | Should Be $false $resource.OnFirstFailure | Should Be 'TakeNoAction' $resource.OnSecondFailure | Should Be 'TakeNoAction' $resource.OnThirdFailure | Should Be 'TakeNoAction' $resource.ResetFailureCount | Should Be 0 $resource.RestartDelay | Should Be 0 $resource.RebootDelay | Should Be 0 $resource.Dependency | Should BeNullOrEmpty $resource.Command | Should BeNullOrEmpty $resource.RunCommandDelay | Should Be 0 $resource.UserName | Should Be 'NT AUTHORITY\NETWORK SERVICE' $resource.Credential | Should BeNullOrEmpty $resource.DisplayName | Should Be $serviceName $resource.Description | Should BeNullOrEmpty $resource.ArgumentList | Should Be $null Assert-DscResourcePresent $resource } It 'should install service with all options' { Set-TargetResource -Path $servicePath ` -Name $serviceName ` -Ensure Present ` -StartupType Manual ` -OnFirstFailure RunCommand ` -OnSecondFailure Restart ` -OnThirdFailure Reboot ` -ResetFailureCount (60*60*24*2) ` -RestartDelay (1000*60*5) ` -RebootDelay (1000*60*10) ` -Command 'fubar.exe' ` -RunCommandDelay (60*1000) ` -Dependency 'W3SVC' ` -DisplayName 'Display Name' ` -Description 'Description description description' ` -Credential $credential $Global:Error.Count | Should Be 0 $resource = Get-TargetResource -Name $serviceName $resource | Should Not BeNullOrEmpty $resource.Name | Should Be $serviceName $resource.Path | Should Be $servicePath $resource.StartupType | Should Be 'Manual' $resource.Delayed | Should Be $false $resource.OnFirstFailure | Should Be 'RunCommand' $resource.OnSecondFailure | Should Be 'Restart' $resource.OnThirdFailure | Should Be 'Reboot' $resource.ResetFailureCount | Should Be (60*60*24*2) $resource.RestartDelay | Should Be (1000*60*5) $resource.RebootDelay | Should Be (1000*60*10) $resource.Dependency | Should Be 'W3SVC' $resource.Command | Should Be 'fubar.exe' $resource.RunCommandDelay | Should Be (60*1000) $resource.DisplayName | Should Be 'Display Name' $resource.Description | Should Be 'Description description description' $resource.UserName | Should Be (Resolve-Identity -Name $credential.UserName).FullName $resource.Credential | Should BeNullOrEmpty $resource.ArgumentList | Should Be $null Assert-DscResourcePresent $resource } It 'should install service as automatic delayed' { Set-TargetResource -Path $servicePath -Name $serviceName -StartupType Automatic -Delayed -Ensure Present $Global:Error.Count | Should Be 0 $resource = Get-TargetResource -Name $serviceName $resource | Should Not BeNullOrEmpty $resource.Name | Should Be $serviceName $resource.Path | Should Be $servicePath $resource.StartupType | Should Be 'Automatic' $resource.Delayed | Should Be $true $resource.OnFirstFailure | Should Be 'TakeNoAction' $resource.OnSecondFailure | Should Be 'TakeNoAction' $resource.OnThirdFailure | Should Be 'TakeNoAction' $resource.ResetFailureCount | Should Be 0 $resource.RestartDelay | Should Be 0 $resource.RebootDelay | Should Be 0 $resource.Dependency | Should BeNullOrEmpty $resource.Command | Should BeNullOrEmpty $resource.RunCommandDelay | Should Be 0 $resource.UserName | Should Be 'NT AUTHORITY\NETWORK SERVICE' $resource.Credential | Should BeNullOrEmpty $resource.DisplayName | Should Be $serviceName $resource.Description | Should BeNullOrEmpty $resource.ArgumentList | Should Be $null Assert-DscResourcePresent $resource } It 'should install service with argumentlist' { Set-TargetResource -Path $servicePath -Name $serviceName -StartupType Automatic -Delayed -Ensure Present -ArgumentList @('arg1', 'arg2') $Global:Error.Count | Should Be 0 $resource = Get-TargetResource -Name $serviceName -ArgumentList @('arg1', 'arg2') $resource | Should Not BeNullOrEmpty $resource.Name | Should Be $serviceName $resource.Path | Should Be $servicePath $resource.StartupType | Should Be 'Automatic' $resource.Delayed | Should Be $true $resource.OnFirstFailure | Should Be 'TakeNoAction' $resource.OnSecondFailure | Should Be 'TakeNoAction' $resource.OnThirdFailure | Should Be 'TakeNoAction' $resource.ResetFailureCount | Should Be 0 $resource.RestartDelay | Should Be 0 $resource.RebootDelay | Should Be 0 $resource.Dependency | Should BeNullOrEmpty $resource.Command | Should BeNullOrEmpty $resource.RunCommandDelay | Should Be 0 $resource.UserName | Should Be 'NT AUTHORITY\NETWORK SERVICE' $resource.Credential | Should BeNullOrEmpty $resource.DisplayName | Should Be $serviceName $resource.Description | Should BeNullOrEmpty $resource.ArgumentList | Should Be @('arg1', 'arg2') Assert-DscResourcePresent $resource } It 'should uninstall service' { Set-TargetResource -Name $serviceName -Path $servicePath -Ensure Present $Global:Error.Count | Should Be 0 Assert-DscResourcePresent (Get-TargetResource -Name $serviceName) Set-TargetResource -Name $serviceName -Path $servicePath -Ensure Absent $Global:Error.Count | Should Be 0 Assert-DscResourceAbsent (Get-TargetResource -Name $serviceName) } It 'should require path when installing service' { Set-TargetResource -Name $serviceName -Ensure Present -ErrorAction SilentlyContinue $Global:Error.Count | Should BeGreaterThan 0 $Global:Error[0] | Should Match 'Path\b.*\bmandatory' Assert-DscResourceAbsent (Get-TargetResource -Name $serviceName) } It 'should test existing services' { Get-Service | ForEach-Object { (Test-TargetResource -Name $_.Name -Ensure Present) | Should Be $true (Test-TargetResource -Name $_.Name -Ensure Absent) | Should Be $false } } It 'should test missing services' { (Test-TargetResource -Name $serviceName -Ensure Absent) | Should Be $true (Test-TargetResource -Name $serviceName -Ensure Present) | Should Be $false } It 'should test on credentials' { Set-TargetResource -Name $serviceName -Path $servicePath -Credential $credential -Ensure Present (Test-TargetResource -Name $serviceName -Path $servicePath -Credential $credential -Ensure Present) | Should Be $true } It 'should not allow both username and credentials' { Set-TargetResource -Name $serviceName -Path $servicePath -Credential $credential -username LocalService -Ensure Present -ErrorAction SilentlyContinue $Global:Error.Count | Should BeGreaterThan 0 (Test-Service -Name $serviceName) | Should Be $false } It 'should test on properties' { Set-TargetResource -Name $serviceName -Path $servicePath -Command 'fubar.exe' -Description 'Fubar' -Ensure Present $testParams = @{ Name = $serviceName; } (Test-TargetResource @testParams -Path $servicePath -Ensure Present) | Should Be $true (Test-TargetResource @testParams -Path 'C:\fubar.exe' -Ensure Present) | Should Be $false (Test-TargetResource @testParams -StartupType Automatic -Ensure Present) | Should Be $true (Test-TargetResource @testParams -StartupType Manual -Ensure Present) | Should Be $false (Test-TargetResource @testParams -Delayed -Ensure Present) | Should Be $false (Test-TargetResource @testParams -Delayed:$false -Ensure Present) | Should Be $true (Test-TargetResource @testParams -OnFirstFailure TakeNoAction -Ensure Present) | Should Be $true (Test-TargetResource @testParams -OnFirstFailure Restart -Ensure Present) | Should Be $false (Test-TargetResource @testParams -OnSecondFailure TakeNoAction -Ensure Present) | Should Be $true (Test-TargetResource @testParams -OnSecondFailure Restart -Ensure Present) | Should Be $false (Test-TargetResource @testParams -OnThirdFailure TakeNoAction -Ensure Present) | Should Be $true (Test-TargetResource @testParams -OnThirdFailure Restart -Ensure Present) | Should Be $false (Test-TargetResource @testParams -ResetFailureCount 0 -Ensure Present) | Should Be $true (Test-TargetResource @testParams -ResetFailureCount 50 -Ensure Present) | Should Be $false (Test-TargetResource @testParams -RestartDelay 0 -Ensure Present) | Should Be $true (Test-TargetResource @testParams -RestartDelay 50 -Ensure Present) | Should Be $false (Test-TargetResource @testParams -RebootDelay 0 -Ensure Present) | Should Be $true (Test-TargetResource @testParams -RebootDelay 50 -Ensure Present) | Should Be $false (Test-TargetResource @testParams -Dependency @() -Ensure Present) | Should Be $true (Test-TargetResource @testParams -Dependency @( 'W3SVC' ) -Ensure Present) | Should Be $false (Test-TargetResource @testParams -Command 'fubar.exe' -Ensure Present) | Should Be $true (Test-TargetResource @testParams -Command 'fubar2.exe' -Ensure Present) | Should Be $false (Test-TargetResource @testParams -RunCommandDelay 0 -Ensure Present) | Should Be $true (Test-TargetResource @testParams -RunCommandDelay 1000 -Ensure Present) | Should Be $false (Test-TargetResource @testParams -UserName 'NetworkService' -Ensure Present) | Should Be $true (Test-TargetResource @testParams -Credential $credential -Ensure Present) | Should Be $false (Test-TargetResource @testParams -Description 'Fubar' -Ensure Present) | Should Be $true (Test-TargetResource @testParams -Description 'Description' -Ensure Present) | Should Be $false (Test-TargetResource @testParams -DisplayName $serviceName -Ensure Present) | Should Be $true (Test-TargetResource @testParams -DisplayName 'fubar' -Ensure Present) | Should Be $false } configuration DscConfiguration { param( $Ensure ) Set-StrictMode -Off Import-DscResource -Name '*' -Module 'Carbon' node 'localhost' { Carbon_Service set { Name = $serviceName; Path = $servicePath; Ensure = $Ensure; } } } It 'should run through dsc' { & DscConfiguration -Ensure 'Present' -OutputPath $CarbonDscOutputRoot Start-DscConfiguration -Wait -ComputerName 'localhost' -Path $CarbonDscOutputRoot -Force $Global:Error.Count | Should Be 0 (Test-TargetResource -Name $serviceName -Ensure 'Present') | Should Be $true (Test-TargetResource -Name $serviceName -Ensure 'Absent') | Should Be $false & DscConfiguration -Ensure 'Absent' -OutputPath $CarbonDscOutputRoot Start-DscConfiguration -Wait -ComputerName 'localhost' -Path $CarbonDscOutputRoot -Force $Global:Error.Count | Should Be 0 (Test-TargetResource -Name $serviceName -Ensure 'Present') | Should Be $false (Test-TargetResource -Name $serviceName -Ensure 'Absent') | Should Be $true $result = Get-DscConfiguration $Global:Error.Count | Should Be 0 $result | Should BeOfType ([Microsoft.Management.Infrastructure.CimInstance]) $result.PsTypeNames | Where-Object { $_ -like '*Carbon_Service' } | Should Not BeNullOrEmpty } } Uninstall-CService -Name $serviceName Stop-CarbonDscTestFixture
combined_dataset/train/non-malicious/sample_18_94.ps1
sample_18_94.ps1
# Localized 06/28/2023 08:04 AM (GMT) 303:7.0.30723 terminalservices_model.psd1 # # Only add new (name,value) pairs to the end of this table # Do not remove, insert or re-arrange entries # ConvertFrom-StringData @' ###PSLOC start localizing # # ActivationStatusCheck # ActivationStatusCheck_Title=RDS CAL をライセンス サーバーにインストールする前にライセンス サーバーをアクティブ化する必要がある ActivationStatusCheck_Problem_UnRegistered=リモート デスクトップ ライセンス サーバーがアクティブ化されていないため、リモート デスクトップ サービス クライアント アクセス ライセンス (RDS CAL) をこのライセンス サーバーにインストールできません。 ActivationStatusCheck_Problem_StatusUnknown=リモート デスクトップ ライセンス サーバーのアクティブ化状態を特定できませんでした。 ActivationStatusCheck_Impact=リモート デスクトップ サーバーに接続するすべてのユーザーまたはコンピューティング デバイスには、ライセンス サーバーによって発行された有効な RDS CAL が必要です。RDS CAL がインストールされたアクティブ化済みのライセンス サーバーを利用できない場合は、リモート デスクトップ サーバーが接続の受け入れを中止する可能性があります。 ActivationStatusCheck_Resolution_UnRegistered=RD ライセンス マネージャー ツールを使用して、ライセンス サーバーをアクティブ化してから、そのライセンス サーバーに RDS CAL をインストールしてください。 ActivationStatusCheck_Resolution_StatusUnknown=リモート デスクトップ ライセンス サーバーが実行中かどうかを確認してください。 ActivationStatusCheck_Compliant=リモート デスクトップ サービス ベスト プラクティス アナライザーでスキャンを実行した結果、このベスト プラクティスに準拠していることが確認されました。 # # NumberCAPPoliciesCheck - Rule 3 # NumberCAPPoliciesCheck_Title=RD ゲートウェイ サーバーには有効な RD CAP が少なくとも 1 つ必要である NumberCAPPoliciesCheck_Problem=リモート デスクトップ ゲートウェイ (RD ゲートウェイ) サーバーに、有効なリモート デスクトップ接続承認ポリシー (RD CAP) がありません。 NumberCAPPoliciesCheck_Impact=RD ゲートウェイ サーバーに有効な RD CAP がない場合、ユーザーが RD ゲートウェイ サーバー経由で内部ネットワーク リソース (コンピューター) に接続できません。 NumberCAPPoliciesCheck_Resolution=RD ゲートウェイ マネージャー ツールを使用して、RD ゲートウェイ サーバー経由で内部ネットワーク リソース (コンピューター) に接続できるユーザーを指定する RD CAP を有効にしてください。 NumberCAPPoliciesCheck_Compliant=リモート デスクトップ サービス ベスト プラクティス アナライザーでスキャンを実行した結果、このベスト プラクティスに準拠していることが確認されました。 # # NumberRAPPoliciesCheck - Rule 4 # NumberRAPPoliciesCheck_Title=RD ゲートウェイ サーバーには有効な RD RAP が少なくとも 1 つ必要である NumberRAPPoliciesCheck_Problem=リモート デスクトップ ゲートウェイ (RD ゲートウェイ) サーバーに、有効なリモート デスクトップ リソース承認ポリシー (RD RAP) がありません。 NumberRAPPoliciesCheck_Impact=RD ゲートウェイ サーバーに有効な RD RAP がない場合、ユーザーが RD ゲートウェイ サーバー経由で内部ネットワーク リソース (コンピューター) に接続できません。 NumberRAPPoliciesCheck_Resolution=RD ゲートウェイ マネージャー ツールを使用して、ユーザーが RD ゲートウェイ サーバー経由で接続できる内部ネットワーク リソース (コンピューター) を指定する RD RAP を有効にしてください。 NumberRAPPoliciesCheck_Compliant=リモート デスクトップ サービス ベスト プラクティス アナライザーでスキャンを実行した結果、このベスト プラクティスに準拠していることが確認されました。 # # SSLCertConfiguredCheck - Rule 5 # SSLCertConfiguredCheck_Title=RD ゲートウェイ サーバーを有効な SSL 証明書を使用するように構成する必要がある SSLCertConfiguredCheck_Problem=リモート デスクトップ ゲートウェイ (RD ゲートウェイ) サーバーに有効な Secure Sockets Layer (SSL) 証明書がありません。 SSLCertConfiguredCheck_Impact=有効ではない SSL 証明書を使用するように RD ゲートウェイ サーバーが構成されている場合、ユーザーがその RD ゲートウェイ サーバー経由で内部ネットワーク リソース (コンピューター) に接続できません。 SSLCertConfiguredCheck_Resolution=RD ゲートウェイ マネージャー ツールを使用して、RD ゲートウェイ サーバーで使用する有効な SSL 証明書を選択してください。 SSLCertConfiguredCheck_Compliant=リモート デスクトップ サービス ベスト プラクティス アナライザーでスキャンを実行した結果、このベスト プラクティスに準拠していることが確認されました。 # # SSLCertIsSelfSignedCheck- Rule 6 # SSLCertIsSelfSignedCheck_Title=信頼された証明機関によって署名された SSL 証明書を使用するように RD ゲートウェイを構成する必要がある SSLCertIsSelfSignedCheck_Problem=リモート デスクトップ ゲートウェイ (RD ゲートウェイ) サーバーが、自己署名証明書を使用する構成になっています。既定では、自己署名証明書はクライアント コンピューターによって信頼されません。 SSLCertIsSelfSignedCheck_Impact=信頼された証明機関によって署名されていない Secure Sockets Layer (SSL) 証明書を使用するように RD ゲートウェイ サーバーが構成されている場合、ユーザーがその RD ゲートウェイ サーバー経由で内部ネットワーク リソース (コンピューター) に接続できない可能性があります。 SSLCertIsSelfSignedCheck_Resolution=RD ゲートウェイ マネージャー ツールを使用して、信頼された証明機関によって署名された SSL 証明書を使用するように RD ゲートウェイ サーバーを構成してください。自己署名証明書の使用は推奨されません。 SSLCertIsSelfSignedCheck_Compliant=リモート デスクトップ サービス ベスト プラクティス アナライザーでスキャンを実行した結果、このベスト プラクティスに準拠していることが確認されました。 # # NPSServerReachableCheck - Rule 7 # NPSServerReachableCheck_Title=NPS を実行するサーバーに RD ゲートウェイ サーバーから接続できる必要がある NPSServerReachableCheck_Problem=ネットワーク ポリシー サーバー (NPS) を実行し、リモート デスクトップ接続承認ポリシー (RD CAP) のセントラル ストアが配置されているサーバーにリモート デスクトップ ゲートウェイ (RD ゲートウェイ) サーバーから接続できません。 NPSServerReachableCheck_Impact=NPS を実行し、RD CAP のセントラル ストアが配置されているサーバーに RD ゲートウェイ サーバーが接続できない場合、ユーザーがその RD ゲートウェイ サーバー経由で内部ネットワーク リソース (コンピューター) に接続できません。 NPSServerReachableCheck_Resolution=NPS を実行するサーバーが起動していること、NPS を実行するサーバーと RD ゲートウェイ サーバーの間にネットワーク接続が確立されていることを確認してください。 NPSServerReachableCheck_Compliant=リモート デスクトップ サービス ベスト プラクティス アナライザーでスキャンを実行した結果、このベスト プラクティスに準拠していることが確認されました。 # # LoadBalancedServerErrorneousCheck - Rule 8 # LoadBalancedServerErrorneousCheck_Title=RD ゲートウェイ サーバー ファームの全メンバーが構成が同じで、同じネットワークに接続されている必要がある LoadBalancedServerErrorneousCheck_Problem=RD ゲートウェイ サーバー ファーム内の少なくとも 1 つのリモート デスクトップ ゲートウェイ (RD ゲートウェイ) サーバーが、ネットワークに接続されていないか、または RD ゲートウェイ サーバー ファームの他のメンバーと同じバージョンのオペレーティング システムを実行していません。 LoadBalancedServerErrorneousCheck_Impact=RD ゲートウェイ サーバー ファームの一部のメンバーがネットワークに接続されていないか、同じバージョンのオペレーティング システムを実行していない場合は、接続時に経由する RD ゲートウェイ サーバーに応じて、ユーザーが使用できる機能が異なる可能性があります。 LoadBalancedServerErrorneousCheck_Resolution=RD ゲートウェイ サーバー ファーム内のすべての RD ゲートウェイ サーバーについて、ネットワークに接続されていること、同じバージョンのオペレーティング システムを実行していること、構成が同一であることを確認してください。 LoadBalancedServerErrorneousCheck_Compliant=リモート デスクトップ サービス ベスト プラクティス アナライザーでスキャンを実行した結果、このベスト プラクティスに準拠していることが確認されました。 # # ConnectionsExhaustedCheck - Rule 9 # ConnectionsExhaustedCheck_Title=必要数の同時接続を許可するように RD ゲートウェイ サーバーを構成する必要がある ConnectionsExhaustedCheck_Problem=リモート デスクトップ ゲートウェイ (RD ゲートウェイ) サーバーで、同時接続の許容数の上限に達しました。 ConnectionsExhaustedCheck_Impact=同時接続の許容数を制限するように RD ゲートウェイ サーバーが構成されている場合、接続数が上限を上回っていると、新しい接続を確立しようとしたユーザーが、その RD ゲートウェイ サーバー経由で内部ネットワーク リソース (コンピューター) に接続できなくなります。 ConnectionsExhaustedCheck_Resolution=RD ゲートウェイ サーバーのパフォーマンスを監視し、その RD ゲートウェイ サーバーでサポート可能な接続の最大数を判定してください。必要に応じて、RD ゲートウェイ マネージャー ツールを使用して、同時接続の最大許容数の構成を変更してください。 ConnectionsExhaustedCheck_Compliant=リモート デスクトップ サービス ベスト プラクティス アナライザーでスキャンを実行した結果、このベスト プラクティスに準拠していることが確認されました。 # # ActiveDirectoryServerRechableCheck - Rule 10 # ActiveDirectoryServerRechableCheck_Title=RD ゲートウェイ サーバーから Active Directory ドメイン サービスに接続できる必要がある ActiveDirectoryServerRechableCheck_Problem=リモート デスクトップ ゲートウェイ (RD ゲートウェイ) サーバーの承認ポリシーは Active Directory セキュリティ グループを使用するように構成されていますが、RD ゲートウェイ サーバーが Active Directory ドメイン サービス (AD DS) に接続できません。 ActiveDirectoryServerRechableCheck_Impact=RD ゲートウェイ サーバーが AD DS に接続できない場合、ユーザーを認証できないため、ユーザーがその RD ゲートウェイ サーバー経由で内部ネットワーク リソース (コンピューター) に接続できません。 ActiveDirectoryServerRechableCheck_Resolution=RD ゲートウェイ サーバーが Active Directory ドメインのメンバーであること、RD ゲートウェイ サーバーと AD DS の間にネットワーク接続が確立されていることを確認してください。 ActiveDirectoryServerReachableCheckWarning_Title=リモート デスクトップ サービスが Active Directory に接続できません。 ActiveDirectoryServerReachableCheckWarning_Problem=リモート デスクトップ ゲートウェイ (RD ゲートウェイ) サーバーの承認ポリシーが Active Directory セキュリティ グループを使用するように設定されていますが、リモート デスクトップ サービス ベスト プラクティス アナライザーが現在のドメインのドメイン コントローラーの一覧を取得できません。 ActiveDirectoryServerReachableCheckWarning_Impact=リモート デスクトップ サービス ベスト プラクティス アナライザーがドメイン コントローラーの一覧を取得できないと、Active Directory への接続を確認できません。 ActiveDirectoryServerReachableCheckWarning_Resolution=ドメイン ユーザー アカウントでログオンしてからベスト プラクティス アナライザーを実行して、ドメイン コントローラーの一覧を取得して Active Directory への接続を確認してください。 ActiveDirectoryServerRechableCheck_Compliant=リモート デスクトップ サービス ベスト プラクティス アナライザーでスキャンを実行した結果、このベスト プラクティスに準拠していることが確認されました。 # # WebSiteRunningCheck - Rule 11 # WebSiteRunningCheck_Title=RD ゲートウェイ サーバーで使用するように構成された Web サイトが Web (IIS) サーバー上で開始している必要がある WebSiteRunningCheck_Problem=リモート デスクトップ ゲートウェイ (RD ゲートウェイ) サーバーで使用するように構成された Web サイトが Web (IIS) サーバー上で開始していません。 WebSiteRunningCheck_Impact=RD ゲートウェイ サーバーで使用するように構成された Web サイトが Web (IIS) サーバー上で開始していない場合、ユーザーがその RD ゲートウェイ サーバー経由で内部ネットワーク リソースに接続できません。 WebSiteRunningCheck_Resolution=インターネット インフォメーション サービス (IIS) マネージャー ツールを使用して、RD ゲートウェイ サーバで使用するように構成された Web サイトが開始していることを確認してください。 WebSiteRunningCheck_Compliant=リモート デスクトップ サービス ベスト プラクティス アナライザーでスキャンを実行した結果、このベスト プラクティスに準拠していることが確認されました。 # # CAPPolicyIsNonCompliantCheck - Rule 12 # CAPPolicyIsNonCompliantCheck_Title=NPS を実行するサーバー上に保存されている RD CAP が、RD ゲートウェイをサポートするように正しく構成されている必要がある CAPPolicyIsNonCompliantCheck_Problem=ネットワーク ポリシー サーバー (NPS) を実行するサーバー上に保存されているリモート デスクトップ接続承認ポリシー (名前 {0}) が、リモート デスクトップ ゲートウェイ (RD ゲートウェイ) サーバー経由の接続をサポートするように正しく構成されていません。 CAPPolicyIsNonCompliantCheck_Impact=NPS を実行するサーバー上に保存されている RD CAP が正しく構成されていない場合、ユーザーが RD ゲートウェイ サーバー経由で内部ネットワーク リソース (コンピューター) に接続できません。 CAPPolicyIsNonCompliantCheck_Resolution=ネットワーク ポリシー サーバー ツールを使用して、NPS を実行するサーバーに保存されている RD CAP を RD ゲートウェイ サーバー経由の接続をサポートするように正しく構成してください。 CAPPolicyIsNonCompliantCheck_Compliant=リモート デスクトップ サービス ベスト プラクティス アナライザーでスキャンを実行した結果、このベスト プラクティスに準拠していることが確認されました。 # # NONewConnectinsAllowedCheck - Rule 13 # NONewConnectinsAllowedCheck_Title=新しい接続を許可するように RD ゲートウェイ サーバーを構成する必要がある NONewConnectinsAllowedCheck_Problem=リモート デスクトップ ゲートウェイ (RD ゲートウェイ) サーバーが、新しい接続を無効にするように構成されています。 NONewConnectinsAllowedCheck_Impact=RD ゲートウェイ サーバーが新しい接続を無効にするように構成されている場合、その RD ゲートウェイ サーバーを経由する新しいユーザー接続は一切許可されません。 NONewConnectinsAllowedCheck_Resolution=RD ゲートウェイ マネージャー ツールを使用して、新しい接続を受け入れるように RD ゲートウェイ サーバーを構成してください。 NONewConnectinsAllowedCheck_Compliant=リモート デスクトップ サービス ベスト プラクティス アナライザーでスキャンを実行した結果、このベスト プラクティスに準拠していることが確認されました。 # # ConenctOnlytoWin7ClientCheck - Rule 14 # ConenctOnlytoWin7ClientCheck_Title=サポートされるすべてのクライアントからの接続を許可するように RD ゲートウェイ サーバーを構成する必要がある ConenctOnlytoWin7ClientCheck_Problem=リモート デスクトップ ゲートウェイ (RD ゲートウェイ) サーバーは、最新バージョンのリモート デスクトップ接続 (RDC) ソフトウェアを使用するクライアントからの接続のみを受け入れるように構成されています。 ConenctOnlytoWin7ClientCheck_Impact=クライアント コンピューターが最新バージョンの RDC を実行していない場合、そのコンピューターのユーザーはこの RD ゲートウェイ サーバー経由で内部ネットワーク リソース (コンピューター) に接続できません。 ConenctOnlytoWin7ClientCheck_Resolution=RD ゲートウェイ マネージャー ツールを使用して、サポートされるすべてのバージョンの RDC からの接続を受け入れるように RD ゲートウェイ サーバーを構成してください。 ConenctOnlytoWin7ClientCheck_Compliant=リモート デスクトップ サービス ベスト プラクティス アナライザーでスキャンを実行した結果、このベスト プラクティスに準拠していることが確認されました。 # # RDGatewaySvcStartedCheck - Rule 15 # RDGatewaySvcStartedCheck_Title=リモート デスクトップ ゲートウェイ サービスを RD ゲートウェイ サーバー上で実行する必要がある RDGatewaySvcStartedCheck_Problem=リモート デスクトップ ゲートウェイ サービスがリモート デスクトップ ゲートウェイ (RD ゲートウェイ) サーバー上で実行されていません。 RDGatewaySvcStartedCheck_Impact=リモート デスクトップ ゲートウェイ サービスが RD ゲートウェイ サーバー上で実行されていない場合、ユーザーがその RD ゲートウェイ サーバー経由で内部ネットワーク リソース (コンピューター) に接続できません。 RDGatewaySvcStartedCheck_Resolution=サービス ツールを使用して、RD ゲートウェイ サーバー上でリモート デスクトップ ゲートウェイ サービスを開始してください。 RDGatewaySvcStartedCheck_Compliant=リモート デスクトップ サービス ベスト プラクティス アナライザーでスキャンを実行した結果、このベスト プラクティスに準拠していることが確認されました。 # # RDPGrpMemberCountCheck # RDPGrpMemberCountCheck_Title=RD セッション ホスト サーバー上の Remote Desktop Users グループにドメインのユーザーまたはグループが追加されている必要がある RDPGrpMemberCountCheck_Problem=リモート デスクトップ セッション ホスト サーバー上の Remote Desktop Users グループに、ドメインのユーザーまたはグループが 1 つも追加されていません。 RDPGrpMemberCountCheck_Impact=RD セッション ホスト サーバー上の Remote Desktop Users グループにドメインのユーザーまたはグループが追加されていない場合、ユーザーは RD セッション ホスト サーバーに接続できません。 RDPGrpMemberCountCheck_Resolution=RD セッション ホスト サーバーで、[システムのプロパティ] ダイアログ ボックスの [リモート] タブを使用して、Remote Desktop Users グループにドメインのユーザーまたはグループを追加してください。 RDPGrpMemberCountCheck_Compliant=リモート デスクトップ サービス ベスト プラクティス アナライザーでスキャンを実行した結果、このベスト プラクティスに準拠していることが確認されました。 # # RemoteDesktopDisabledCheck # RemoteDesktopDisabledCheck_Title=RD セッション ホスト サーバーをリモート デスクトップ接続を許可するように構成する必要がある RemoteDesktopDisabledCheck_Problem=リモート デスクトップ セッション ホスト サーバーに対するリモート デスクトップ接続が無効になっています。 RemoteDesktopDisabledCheck_Impact=リモート デスクトップ接続が無効になっている場合、ユーザーは RD セッション ホスト サーバーに接続できません。 RemoteDesktopDisabledCheck_Resolution=RD セッション ホスト サーバーで、[システムのプロパティ] ダイアログ ボックスの [リモート] タブを使用して、リモート デスクトップ接続を有効にしてください。 RemoteDesktopDisabledCheck_Compliant=リモート デスクトップ サービス ベスト プラクティス アナライザーでスキャンを実行した結果、このベスト プラクティスに準拠していることが確認されました。 # # MaxInstanceCountCheck # MaxInstanceCountCheck_Title=RD セッション ホスト サーバーを、適切な同時接続数を許可するように構成する必要がある MaxInstanceCountCheck_Problem=同時接続の最大数が 5 ユーザー未満に構成されています。 MaxInstanceCountCheck_Impact=同時接続の最大数が必要なユーザー数よりも小さい場合、リモート デスクトップ セッション ホスト サーバーにログオンできないユーザーが発生する可能性があります。 MaxInstanceCountCheck_Resolution="接続数を制限する" グループ ポリシー設定を構成して、同時接続の最大数を大きくしてください。 MaxInstanceCountCheck_Compliant=リモート デスクトップ サービス ベスト プラクティス アナライザーでスキャンを実行した結果、このベスト プラクティスに準拠していることが確認されました。 # # AlternateSrvSpecifiedCheck # AlternateSrvSpecifiedCheck_Title=リモート デスクトップ接続 6.1 およびそれより前のバージョンでは、代替サーバー名を指定する必要がある AlternateSrvSpecifiedCheck_Problem=代替サーバー名が指定されていません。 AlternateSrvSpecifiedCheck_Impact=リモート デスクトップ接続 6.1 またはそれより前のバージョンを使用している場合は、代替サーバー名を指定する必要があります。指定しなかった場合、RDC 6.1 またはそれより前のバージョンを使用しているクライアントは接続できません。 AlternateSrvSpecifiedCheck_Resolution=リモート デスクトップ接続ブローカー サーバー上でリモート デスクトップ接続マネージャーを使用して、代替サーバー名を指定してください。 AlternateSrvSpecifiedCheck_Compliant=リモート デスクトップ サービス ベスト プラクティス アナライザーでスキャンを実行した結果、このベスト プラクティスに準拠していることが確認されました。 # # RedirectorAltServerHaveSameIPCheck # RedirectorAltServerHaveSameIPCheck_Title=代替サーバー名がリダイレクト サーバーの IP アドレスに解決される必要がある RedirectorAltServerHaveSameIPCheck_Problem=代替サーバー名に有効な DNS エントリが含まれていないか、またはリダイレクト モードで実行しているリモート デスクトップ セッション ホスト サーバーと同じ IP アドレスに DNS エントリが解決されません。 RedirectorAltServerHaveSameIPCheck_Impact=リダイレクト モードで実行しているリモート デスクトップ セッション ホスト サーバーの IP アドレスに代替サーバー名が解決される必要があります。解決されない場合は、RDC 6.1 またはそれより前のバージョンを使用しているクライアントは接続できません。 RedirectorAltServerHaveSameIPCheck_Resolution=リモート デスクトップ接続ブローカー サーバー上でリモート デスクトップ接続マネージャーを使用して、代替サーバー名を指定してください。 RedirectorAltServerHaveSameIPCheck_Compliant=リモート デスクトップ サービス ベスト プラクティス アナライザーでスキャンを実行した結果、このベスト プラクティスに準拠していることが確認されました。 # # FireWallExceptionEnabledCheck # FireWallExceptionEnabledCheck_Title=現在の Windows ファイアウォール プロファイルをリモート デスクトップ接続を許可するように構成する必要がある FireWallExceptionEnabledCheck_Problem=現在の Windows ファイアウォール プロファイルがリモート デスクトップ接続を許可するように構成されていません。 FireWallExceptionEnabledCheck_Impact=ユーザーがリモート デスクトップ接続を使用してサーバーに接続できません。 FireWallExceptionEnabledCheck_Resolution=Windows ファイアウォール コンソールを使用して、リモート デスクトップ接続を有効にしてください。 FireWallExceptionEnabledCheck_Compliant=リモート デスクトップ サービス ベスト プラクティス アナライザーでスキャンを実行した結果、このベスト プラクティスに準拠していることが確認されました。 # # CALAvailableCheck # CALAvailableCheck_Title=リモート デスクトップ ライセンス サーバーに、ユーザーおよびデバイスが接続するための十分な数の RDS CAL がインストールされている必要がある CALAvailableCheck_Problem=ユーザーおよびデバイスがリモート デスクトップ セッション ホスト サーバーに接続するための十分な数のリモート デスクトップ サービス クライアント アクセス ライセンス (RDS CAL) がインストールされていません。 CALAvailableCheck_Impact=一部のユーザーとデバイスが、リモート デスクトップ セッション ホスト サーバーに接続できない可能性があります。 CALAvailableCheck_Resolution=リモート デスクトップ ライセンス マネージャーを使用して、リモート デスクトップ サービス クライアント アクセス ライセンスを追加インストールしてください。 CALAvailableCheck_Compliant=リモート デスクトップ サービス ベスト プラクティス アナライザーでスキャンを実行した結果、このベスト プラクティスに準拠していることが確認されました。 # # SSLCertNameIsFQDNCheck # SSLCertNameIsFQDNCheck_Title=RD ゲートウェイ サーバーの SSL 証明書は、有効な証明書のサブジェクト名を使用して構成されている必要があります SSLCertNameIsFQDNCheck_Problem=リモート デスクトップ ゲートウェイ (RD ゲートウェイ) サーバーの Secure Sockets Layer (SSL) 証明書に、無効な証明書のサブジェクト名が含まれている可能性があります。 SSLCertNameIsFQDNCheck_Impact=無効な証明書のサブジェクト名を含む SSL 証明書を使用するように RD ゲートウェイ サーバーが構成されている場合、ユーザーがその RD ゲートウェイ サーバー経由で内部ネットワーク リソース (コンピューター) に接続できません。 SSLCertNameIsFQDNCheck_Resolution=RD ゲートウェイ マネージャー ツールを使用して、RD ゲートウェイ サーバーで使用する有効な SSL 証明書を選択してください。 SSLCertNameIsFQDNCheck_Compliant=リモート デスクトップ サービス ベスト プラクティス アナライザーでスキャンを実行した結果、このベスト プラクティスに準拠していることが確認されました。 # # RDSHCollectionCheck # RDSHCollectionCheck_Title=コレクション内の RDSH サーバーは、すべて同種である必要があります RDSHCollectionCheck_Problem=コレクション内の一部の RDSH サーバーが同種ではない可能性があります。以下のレポートを確認してください。{0} RDSHCollectionCheck_Impact=コレクション内の RDSH サーバーが同種ではない場合、予期しない副作用が生じる可能性があります RDSHCollectionCheck_Resolution=RDSH コンソールを使用して、コレクションの RDSH サーバーですべての設定が同種になるようにしてください。 RDSHCollectionCheck_Compliant=リモート デスクトップ サービス ベスト プラクティス アナライザーでスキャンを実行した結果、このベスト プラクティスに準拠していることが確認されました。 RDSHCollectionCheck_Collection=コレクション: RDSHCollectionCheck_HeterogeneousServers=同種でないサーバー: RDSHCollectionCheck_MoreInformation=詳細については、以下を参照してください: RDSHCollectionCheck_ExpectedPropertyValues=コレクションには次のプロパティ値が必要でした: RDSHCollectionCheck_Server=サーバー: # # RDSH Collection Properties # RDSHCollectionCheck_PropertyUserGroup=プロパティ: ユーザー グループ: RDSHCollectionCheck_PropertyConnections_DisconnectedSessionLimit=プロパティ: 接続: 切断セッションの制限: RDSHCollectionCheck_PropertyConnections_ActiveSessionLimit=プロパティ: 接続: アクティブ セッションの制限: RDSHCollectionCheck_PropertyConnections_IdleSessionLimit=プロパティ: 接続: アイドル セッションの制限: RDSHCollectionCheck_PropertyConnections_BrokenConnectionAction=プロパティ: 接続: 失敗した接続アクション: RDSHCollectionCheck_PropertyConnections_EnableAutomaticReconnection=プロパティ: 接続: 自動再接続の有効化: RDSHCollectionCheck_PropertyConnections_DeleteTempFoldersOnExit=プロパティ: 接続: 終了時の一時フォルダーの削除: RDSHCollectionCheck_PropertyConnections_UseTempFoldersPerSession=プロパティ: 接続: セッションごとの一時フォルダーの使用: RDSHCollectionCheck_PropertySecurity_SecurityLayer=プロパティ: セキュリティ: セキュリティ層: RDSHCollectionCheck_PropertySecurity_EncryptionLevel=プロパティ: セキュリティ: 暗号化レベル: RDSHCollectionCheck_PropertySecurity_AuthenticateUsingNLA=プロパティ: セキュリティ: NLA を使用した認証: RDSHCollectionCheck_PropertyClientSettings_DeviceRedirectionOptions=プロパティ: クライアント設定: デバイス リダイレクト オプション: RDSHCollectionCheck_PropertyClientSettings_RedirectClientPrinter=プロパティ: クライアント設定: クライアント プリンターのリダイレクト: RDSHCollectionCheck_PropertyClientSettings_SetClientPrinterAsDefault=プロパティ: クライアント設定: クライアント プリンターを既定のプリンターとして設定: RDSHCollectionCheck_PropertyClientSettings_UserRDEasyPrintDriver=プロパティ: クライアント設定: RD Easy Print ドライバーの使用: RDSHCollectionCheck_PropertyClientSettings_MaxMonitors=プロパティ: クライアント設定: モニターの最大数: RDSHCollectionCheck_PropertyUVHDSettings_IsUserVHDEnabled=プロパティ: UVHD 設定: ユーザー VHD が有効かどうか: RDSHCollectionCheck_PropertyUVHDSettings_UserVHDShare=プロパティ: UVHD 設定: ユーザー VHD 共有: RDSHCollectionCheck_PropertyUVHDSettings_UserPolicyXML=プロパティ: UVHD 設定: ユーザー ポリシー XML: RDSHCollectionCheck_PropertyUVHDSettings_DiskSizeInMB=プロパティ: UVHD 設定: MB 単位のディスク サイズ: RDSHCollectionCheck_PropertyUVHDSettings_DiskType=プロパティ: UVHD 設定: ディスクの種類: RDSHSvcStartedCheck_Title=リモート デスクトップ セッション ホスト サービスを RD セッション ホスト サーバー上で実行している必要があります。 RDSHSvcStartedCheck_Problem=リモート デスクトップ セッション ホスト サービスはリモート デスクトップ セッション ホスト (RD セッション ホスト) サーバー上で実行されていません。 RDSHSvcStartedCheck_Impact=リモート デスクトップ セッション ホスト サービスが RD セッション ホスト上で実行されていない場合、ユーザーは RD セッション ホスト サーバーにリモートで接続することはできません。 RDSHSvcStartedCheck_Resolution=サービス ツールを使用して、RD セッション ホスト サーバー上でリモート デスクトップ セッション ホスト サービスを開始してください。 RDSHSvcStartedCheck_Compliant=リモート デスクトップ サービス ベスト プラクティス アナライザーでスキャンを実行した結果、このベスト プラクティスに準拠していることが確認されました。 RDVHSvcStartedCheck_Title=リモート デスクトップ仮想化ホスト サービスを RD 仮想化ホスト サーバー上で実行している必要があります。 RDVHSvcStartedCheck_Problem=リモート デスクトップ仮想化ホスト サービスがリモート デスクトップ仮想化ホスト (RD 仮想化ホスト) サーバー上で実行されていません。 RDVHSvcStartedCheck_Impact=リモート デスクトップ仮想化ホスト サービスが RD 仮想化ホスト サーバー上で実行されていない場合、ユーザーは仮想デスクトップに接続できません。 RDVHSvcStartedCheck_Resolution=サービス ツールを使用して、RD 仮想化ホスト サーバー上でリモート デスクトップ仮想化ホスト サービスを開始してください。 RDVHSvcStartedCheck_Compliant=リモート デスクトップ サービス ベスト プラクティス アナライザーでスキャンを実行した結果、このベスト プラクティスに準拠していることが確認されました。 RDCBSvcStartedCheck_Title=リモート デスクトップ接続ブローカー サービスを RD 接続ブローカー サーバー上で実行している必要があります。 RDCBSvcStartedCheck_Problem=リモート デスクトップ接続ブローカー サービスがリモート デスクトップ接続ブローカー (RD 接続ブローカー) サーバー上で実行されていません。 RDCBSvcStartedCheck_Impact=リモート デスクトップ接続ブローカー サービスが RD 接続ブローカー サーバー上で実行されていない場合、ユーザーはセッションまたは仮想デスクトップに接続できません。 RDCBSvcStartedCheck_Resolution=サービス ツールを使用して、RD 接続ブローカー サーバー上でリモート デスクトップ接続ブローカー サービスを開始してください。 RDCBSvcStartedCheck_Compliant=リモート デスクトップ サービス ベスト プラクティス アナライザーでスキャンを実行した結果、このベスト プラクティスに準拠していることが確認されました。 RDWASvcStartedCheck_Title=IIS サービスを RD Web アクセス サーバー上で実行している必要があります。 RDWASvcStartedCheck_Problem=インターネット インフォメーション サービス (IIS) がリモート デスクトップ Web アクセス (RD Web アクセス) サーバー上で実行されていません。 RDWASvcStartedCheck_Impact=IIS サービスが RD Web アクセス サーバー上で実行されていない場合、ユーザーは公開されているアプリケーションを確認することができません。 RDWASvcStartedCheck_Resolution=サービス ツールを使用して、RD Web アクセス サーバー上で IIS サービスを開始してください。 RDWASvcStartedCheck_Compliant=リモート デスクトップ サービス ベスト プラクティス アナライザーでスキャンを実行した結果、このベスト プラクティスに準拠していることが確認されました。 '@
combined_dataset/train/non-malicious/e7cd2cb0-d32a-4631-a081-302f0685887c.ps1
e7cd2cb0-d32a-4631-a081-302f0685887c.ps1
$Mailboxes = Get-CASMailbox -Filter {HasActivesyncDevicePartnership -eq $true} $EASMailboxes = $Mailboxes | Select-Object PrimarySmtpAddress,@{N='DeviceID';E={Get-ActiveSyncDeviceStatistics -Mailbox $_.Identity | Select-Object –ExpandProperty DeviceID}} $EASMailboxes | foreach {Set-CASMailbox $_.PrimarySmtpAddress -ActiveSyncAllowedDeviceIDs $_.DeviceID}
combined_dataset/train/non-malicious/ConvertFrom-Hashtable 2.ps1
ConvertFrom-Hashtable 2.ps1
#function ConvertFrom-Hashtable { [CmdletBinding()] PARAM( [Parameter(ValueFromPipeline=$true, Mandatory=$true)] [HashTable]$hashtable , [switch]$Combine , [switch]$Recurse ) BEGIN { $output = @() } PROCESS { if($recurse) { $keys = $hashtable.Keys | ForEach-Object { $_ } Write-Verbose "Recursing $($Keys.Count) keys" foreach($key in $keys) { if($hashtable.$key -is [HashTable]) { $hashtable.$key = ConvertFrom-Hashtable $hashtable.$key -Recurse # -Combine:$combine } } } if($combine) { $output += @(New-Object PSObject -Property $hashtable) Write-Verbose "Combining Output = $($Output.Count) so far" } else { New-Object PSObject -Property $hashtable } } END { if($combine -and $output.Count -gt 1) { Write-Verbose "Combining $($Output.Count) cached outputs" $output | Join-Object } else { $output } } #}
combined_dataset/train/non-malicious/sample_63_75.ps1
sample_63_75.ps1
Import-LocalizedData -BindingVariable lanTxt -FileName AzStackHci.AddNode.Strings.psd1 function Test-ADCredential { [CmdletBinding()] param ( [pscredential] $ActiveDirectoryCredential ) try { $severity = 'CRITICAL' $adModuleExists = [bool](Get-Module ActiveDirectory -ListAvailable -ErrorAction SilentlyContinue) if ($adModuleExists) { [bool]$adTest = QueryAD -ActiveDirectoryCredential $ActiveDirectoryCredential $detail = $lanTxt.TestAD -f $AdTest, $true if ($adTest) { $status = 'SUCCESS' Log-Info $detail } else { $status = 'FAILURE' Log-Info $detail -Type $severity } } else { $status = 'FAILURE' $detail = $lanTxt.NoADModule Log-info $detail -Type $severity } $params = @{ Name = 'AzStackHci_AddNode_AD_Credential_Check' Title = 'Test AD Credential' DisplayName = 'Test AD Credential' Severity = $severity Description = 'Checking AD Credential is valid' Tags = @{} Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/manage/add-server' TargetResourceID = 'AD Credential' TargetResourceName = 'AD Credential' TargetResourceType = 'Credential' Timestamp = [datetime]::UtcNow Status = $Status AdditionalData = @{ Source = $ENV:COMPUTERNAME Resource = 'AD Credential' Detail = $detail Status = $status TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } New-AzStackHciResultObject @params } catch { throw ("Error testing AD credential: {0}" -f $_.Exception) } } function QueryAD { [CmdletBinding()] param ( [pscredential] $ActiveDirectoryCredential ) try { $domain = $ActiveDirectoryCredential.GetNetworkCredential().domain if ([string]::IsNullOrEmpty($domain)) { if (($ActiveDirectoryCredential.UserName -split '@').count -le 1) { throw "Credential should contain domain" } else { $domain = ($ActiveDirectoryCredential.UserName -split '@')[1] } } return [bool](Get-ADDomain -Credential $ActiveDirectoryCredential -Server $domain -ErrorAction SilentlyContinue) } catch { throw ("Error retrieving AD Object: {0}" -f $_.Exception) } } function Test-LocalCredential { [CmdletBinding()] param ( [pscredential] $LocalCredential, [string] $Ipv4OrHostName ) try { $severity = 'CRITICAL' $PsSession = Microsoft.PowerShell.Core\New-PsSession -ComputerName $Ipv4OrHostName -Credential $LocalCredential Install-UtilityModule -PsSession $PsSession -CmdletName Test-Elevation $IsAdmin = { Import-Module -Name AzStackHci.EnvironmentChecker -Force -ErrorAction SilentlyContinue -Scope Local if (Get-Command -Name Test-Elevation -ErrorAction SilentlyContinue) { Test-Elevation } else { throw "Cannot find Test-Elevation function" } } $result = [bool](Microsoft.PowerShell.Core\Invoke-Command -Session $PsSession -ScriptBlock $IsAdmin -ErrorAction SilentlyContinue) $detail = $lanTxt.TestLocalCredential -f $LocalCredential.UserName, $Ipv4OrHostName, $result, $true if ($result) { $status = 'SUCCESS' Log-Info $detail } else { $status = 'FAILURE' Log-Info $detail -Type $severity } $params = @{ Name = 'AzStackHci_AddNode_Local_Credential_Check' Title = 'Test Local Credential' DisplayName = 'Test Local Credential' Severity = $severity Description = 'Checking Local Credential is valid' Tags = @{} Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/manage/add-server' TargetResourceID = 'Local Credential' TargetResourceName = 'Local Credential' TargetResourceType = 'Credential' Timestamp = [datetime]::UtcNow Status = $Status AdditionalData = @{ Source = $ENV:COMPUTERNAME Resource = 'Local Credential' Detail = $detail Status = $status TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } New-AzStackHciResultObject @params } catch { throw ("Error testing local credential {0} on {1}. Error: {2}" -f $LocalCredential.UserName, $ComputerName, $_.Exception) } finally { Remove-UtilityModule -PsSession $PsSession $PsSession | Remove-PSSession -ErrorAction SilentlyContinue } } function Test-ClusterNodeName { [CmdletBinding()] param ( [string] $ComputerName ) try { $severity = 'CRITICAL' $clusterNodes = Get-ClusterNode | Select-Object -ExpandProperty Name $result = $ComputerName -in $clusterNodes $detail = $lanTxt.TestClusterNodeName -f $computerName, $result, $false if (-not $result) { $status = 'SUCCESS' Log-Info $detail } else { $status = 'FAILURE' Log-Info $detail -Type $severity } $params = @{ Name = 'AzStackHci_AddNode_ComputerName_Check' Title = 'Test ComputerName' DisplayName = 'Test ComputerName' Severity = $severity Description = 'Checking ComputerName is not in use' Tags = @{} Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/manage/add-server' TargetResourceID = $ComputerName TargetResourceName = $ComputerName TargetResourceType = 'Computer Name' Timestamp = [datetime]::UtcNow Status = $Status AdditionalData = @{ Source = $ENV:COMPUTERNAME Resource = $ComputerName Detail = $detail Status = $status TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } New-AzStackHciResultObject @params } catch { throw ($lanTxt.NodeNameCheckError -f $ComputerName, $_.Exception) } } function Test-ComputerName { [CmdletBinding()] param ( [string] $ComputerName, [pscredential] $LocalCredential, [string] $Ipv4OrHostName ) try { # if no IP is provided, we assume this is repair and return $severity = 'CRITICAL' if (-not $Ipv4OrHostName) { return } $sb = { $args[0] -eq (Get-WmiObject -ClassName Win32_OperatingSystem | Select-Object -expand CSName) } $result = [bool](Microsoft.PowerShell.Core\Invoke-Command -ComputerName $Ipv4OrHostName -Credential $LocalCredential -ScriptBlock $sb -ArgumentList $ComputerName -ErrorAction SilentlyContinue) $detail = $lanTxt.TestComputerName -f $computerName, $Ipv4OrHostName, $result, $true if ($result) { $status = 'SUCCESS' Log-Info $detail } else { $status = 'FAILURE' Log-Info $detail -Type $severity } $params = @{ Name = 'AzStackHci_AddNode_ComputerIp_Check' Title = 'Test Computer IP' DisplayName = 'Test Computer IP' Severity = $severity Description = 'Checking Computer has IP configured' Tags = @{} Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/manage/add-server' TargetResourceID = "$ComputerName/$Ipv4OrHostName" TargetResourceName = $Ipv4OrHostName TargetResourceType = 'Ip Configuration' Timestamp = [datetime]::UtcNow Status = $Status AdditionalData = @{ Source = $ComputerName Resource = $Ipv4OrHostName Detail = $detail Status = $status TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } New-AzStackHciResultObject @params } catch { throw ("Error testing IP {0} is set locally on {1}. Error: {2}" -f $Ipv4OrHostName, $ComputerName, $_.Exception) } } function Test-Quorum { <# .SYNOPSIS Check if single node cluster has correct quorum configuration #> [CmdletBinding()] param() try { # Get the current number of nodes in the cluster $severity = 'CRITICAL' $CurrentNumberOfNodes = (Get-ClusterNode).Count # if the cluster has only one node, check if the quorum is set to NodeandFileShareMajority or CloudWitness if ($CurrentNumberOfNodes -eq 1) { $Quorum = Get-ClusterQuorum $detail = $lanTxt.QuorumCheck -f $Quorum.Cluster.Name, $CurrentNumberOfNodes, $Quorum.QuorumResource.ResourceType.Name,'File Share Witness or Cloud Witness' if ($Quorum.QuorumResource.ResourceType.Name -eq 'File Share Witness' -or $Quorum.QuorumResource.ResourceType.Name -eq 'Cloud Witness') { Log-Info $detail $Status = 'SUCCESS' } else { Log-Info $detail -Type $severity $Status = 'FAILURE' } $params = @{ Name = 'AzStackHci_AddNode_Quorum_Resource_Check' Title = 'Test Quorum Resource' DisplayName = 'Test Quorum Resource' Severity = $severity Description = 'Checking Quorum Resource is set to File Share Witness or CloudWitness' Tags = @{} Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/manage/add-server' TargetResourceID = "$($Quorum.Cluster.Name)/$($Quorum.QuorumResource.Name)" TargetResourceName = $Quorum.QuorumResource.Name TargetResourceType = 'Quorum Resource' Timestamp = [datetime]::UtcNow Status = $Status AdditionalData = @{ Source = $Quorum.Cluster.Name Resource = $Quorum.QuorumResource.Name Detail = $detail Status = $status TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } New-AzStackHciResultObject @params } } catch { throw ("Error cluster quorum on {0}. Error: {1}" -f (Get-Cluster).Name, $_.Exception) } } Export-ModuleMember -Function Test-* # SIG # Begin signature block # MIInvgYJKoZIhvcNAQcCoIInrzCCJ6sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAUE/Mb2OHFqPl7 # pXyNoPdGKPCp3JXNcpsTkF45IxMFnqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHKe4ysZFQbDFkcLOQgc4WEd # JWTSfKUjXSKlcPEre4fBMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAZfYh1z2RDbtjf6zg84UfhNB2YcQlri8julGx4ITq6/FrBA0QKmIHhxDC # xtPUgdWCn4KB9fuC4eHgtJ2s90yrfyKowabqoz99wxp+psIreD/ZynI/AT5UYgX4 # SMnQczZo6g30SINTShdrvHoc5UhjD0lc3V/7i3yAtBbFznM3vhnMZyBpqcOMnjGy # JdcZXarJo/2EuGYtKhUSdR+nivTFaHBVj2DSK5DzUcYYqqLsb5VTJ3lzt2p1Ihj+ # wwqHrCzBDsYdKC+fRysaxjhDY3naLR2/zsVYpAUebiVxGPAfR67MbK9OP9oxA6Qw # pLPKJX/3hGFq8zF40VBlPJUksLRG3qGCFygwghckBgorBgEEAYI3AwMBMYIXFDCC # FxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFYBgsq # hkiG9w0BCRABBKCCAUcEggFDMIIBPwIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCA2VPl3AANeq1fU3gLyvlsEXuAbqmnEmttog0AguS4ktgIGZjOtQ3OG # GBIyMDI0MDUxNjE4NDUzMC4xMVowBIACAfSggdikgdUwgdIxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs # YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046 # RDA4Mi00QkZELUVFQkExJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNl # cnZpY2WgghF4MIIHJzCCBQ+gAwIBAgITMwAAAdzB4IzCX1hejgABAAAB3DANBgkq # hkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEw # MTIxOTA3MDZaFw0yNTAxMTAxOTA3MDZaMIHSMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVy # YXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOkQwODItNEJG # RC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIIC # IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAi8izIDWyOD2RIonN6WtRYXlK # GphYvzdqafdITknIhU9QLsXqpNwumGEdn2J1/bV/RFoatTwQfJ0Xw3E8xHYpU2IC # 0IY8lryRXUIa+fdt4YHabaW2aolqcbvWYDLCuQoBNieLAos9AsnTQSRfDlNLB+Yl # dt2BAsWUfJ8DkqD6lSwlfOq6aQi8SvQNc++m0AaqR0UsrCjgFOUSCe/N5N9e6TNf # y9C1MAt9Um5NSBFTvOg/9EVa3dZqBqFnpSWgjQULxeUFANUNfkl4wSzHuOAkN0Sc # rjhjyAe4RZEOr5Ib1ejQYg6OK5NYPm6/e+USYgDJH/utIW9wufACox2pzL+KpA8y # UM5x3QBueI/yJrUFARSd9lPdTHIr2ssH9JGIo/IcOWDyhbBfKK/f5sYHp2Z0zrW6 # vqdS18N/nWU9wqErhWjzek4TX+eJaVWcQdBX00nn8NtRKpbZGpNRrY7Yq6+zJEYw # SCMYkDXb9KqtGqW8TZ+I3lmZlW2pI9ZohqzHtrQYH591PD6B5GfoyjZLr79tkTBL # /QgnmBwoaKc1t/JDXGu9Zc+1fMo5+OSHvmJG5ei6sZU9GqSbPlRjP5HnJswlaP6Z # 9warPaFdXyJmcJkMGuudmK+cSsIyHkWV+Dzj3qlPSmGNRMfYYKEci8ThINKTaHBY # /+4cH2ASzyn/097+a30CAwEAAaOCAUkwggFFMB0GA1UdDgQWBBToc9IF3Q58Rfe4 # 1ax2RKtpQZ7d2zAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNV # HR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2Ny # bC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYI # KwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAy # MDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMI # MA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA2etvwTCvx5f8fWwq # 3eufBMPHgCqAduQw1Cj6RQbAIg1dLfLUZRx2qwr9HWDpN/u03HWrQ2kqTUlO6lQl # 8d0TEq2S6EcD7zaVPvIhKn9jvh2onTdEJPhD7yihBdMzPGJ7B8StUu3xZ595udxJ # PSLrKkq/zukJiTEzbhtupsz9X4zlUGmkJSztH5wROLP/MQDUBtkv++Je0eavIDQI # Z34+31z5p2xh+bup7lQydLR/9gmYQQyQSoZcLPIsr52H5SwWLR3iWR1wT5mrkk2M # gd6xfXDO0ZUC29fQNgNl03ZZnWST6E4xuVRX8vyfVhbOE//ldCdiXTcB9cSuf7UR # q3KWJ/N3cKEnXG4YbvphtaCJFecO8KLAOq9Ql69VFjWrLjLi+VUppKG1t1+A/IZ5 # 4n9hxIE405zQM1NZuMxsvnSp4gQLSUdKkvatFg1W7eGwfMbyfm7kJBqM/DH0/Omx # kh4VM0fJUXqS6MjhWj0287/MXw63jggyPgztRf1lrhDAZ/kHvXHns6NpfneDFPi/ # Oge8QFcX2oKYdGBcEttGiYl8OfrRqXO/t2kJVAi5DTrafIhkqexfHO4oVvRONdbD # o4WkbVuyNek6jkMweTKyuJvEeivhjPl1mNXIcA3IqjRtKsCVV6KFxobkXvhJlPwW # 3IcBboiAtznD/cP5HWhsOEpnbVYwggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZ # AAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0 # ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVa # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEF # AAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1 # V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9 # alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmv # Haus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928 # jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3t # pK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEe # HT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26o # ElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4C # vEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ug # poMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXps # xREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0C # AwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYE # FCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtT # NRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNo # dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5o # dG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBD # AEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZW # y4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5t # aWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAt # MDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0y # My5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pc # FLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpT # Td2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0j # VOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3 # +SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmR # sqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSw # ethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5b # RAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmx # aQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsX # HRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0 # W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0 # HVUzWLOhcGbyoYIC1DCCAj0CAQEwggEAoYHYpIHVMIHSMQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFu # ZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOkQw # ODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2 # aWNloiMKAQEwBwYFKw4DAhoDFQAcOf9zP7fJGQhQIl9Jsvd2OdASpqCBgzCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA # 6fCfaDAiGA8yMDI0MDUxNjIzMDYxNloYDzIwMjQwNTE3MjMwNjE2WjB0MDoGCisG # AQQBhFkKBAExLDAqMAoCBQDp8J9oAgEAMAcCAQACAgSDMAcCAQACAhNHMAoCBQDp # 8fDoAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMH # oSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAi+oV3iEORX0MdeDCjVJp # //Ulx3KD/fdP1uUvJY4VkYwuO3enaTBrZ7JC+UxM/VxCZbNTtDFvzKv8OI9xt9eH # UypRA4Fz+GkUcZItdLoKE8FzqeM/vdjDfG3uI/0xjW8t+BdWgvfRlyNHWDa7YyDm # Hi82PotOOazYdy/nTXIBKc0xggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T # dGFtcCBQQ0EgMjAxMAITMwAAAdzB4IzCX1hejgABAAAB3DANBglghkgBZQMEAgEF # AKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEi # BCB+gcyg3SAdHucLV4VPaoYQ2XfdqQ/UsayhFAVKW9X2NzCB+gYLKoZIhvcNAQkQ # Ai8xgeowgecwgeQwgb0EIFOnF4pq2UQ/jLypnOO5YvQ67QirEQsOFfZMvKXEgg03 # MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO # BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm # MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHcweCM # wl9YXo4AAQAAAdwwIgQgfrX6WimEqh4rGEQcGcm2ntD7wKzGL2+l2pjj2jQq/M8w # DQYJKoZIhvcNAQELBQAEggIAeN1NrK3ITwvqiug3JMwnS1EZ90SQmdYKYU+TS1pZ # 4RIbeDPGVdImKUI/gHDxyP0ZqM0NBqixXcSbTLDNpE9nZMKuy8Oj08tFM0biIHX1 # jGKJD7wDzW2do5BjVv1wOsJBNM36olKQU3ri7eWdB0uO9nTgA3TV6fB20/N0BbAG # jisbbDzGPYlGB7QFnoCTDu3Z0yG5yu+/U2VIyW4gUQCsMB9laCfHcMX1CXhOvX0R # MI/pjgzM5WO5Y4GjpdkfjgDwdc7wOlHfhJ2wvld6LPy5Erko5t4nQNxlq2NRhlKj # fingMDkmwt/t+K4jmfBQmnhiXnf5DniyoK2yuHf7nWqPplF3zUzasIoXq1daCyn+ # 5ycylrBn3Wy5nu99tCr9rp/RIk1QnoY7mvmleGmRaRg8+mhXG9tiEanSMYYT7PBB # AxaUlO6X92G0JBB1Go+jxSb1CwMAMMCQweW5A27Wqjp5VbJWYpDb+C2NrhVqIlT3 # a70WiFWY+3FeH9R/GXgdc7PurMmXfDtiQ2yU3dPEbuZGbWAFzIx4LiyEqy2hmYJc # V6TAwyC7BVetc4zhfBPBIJfkZ992QctI8s6vEzg6mkEkZaAL5G3wkMcReGyquMxS # E9TsgY+S24ql5xyQWVgZZbJVVVwvJRq56vh1rUp/3eihqNhwUi4lHSkjtBm1Mfdq # Fc4= # SIG # End signature block
combined_dataset/train/non-malicious/3438.ps1
3438.ps1
. "$PSScriptRoot\TestExplorer.ps1" function Create-HelperModule( [string] $moduleDir, [string] $moduleName, [string] $archiveDir) { if(-not (Test-Path $archiveDir)) { $null = New-Item -ItemType directory -Path $archiveDir -ErrorAction Stop } $archivePath = Join-Path $archiveDir "$moduleName.zip" if (Test-Path $archivePath) { $null = Remove-Item $archivePath -ErrorAction Stop } $moduleFilePath = Join-Path $moduleDir "$moduleName.psm1" Write-Verbose "Creating $archivePath..." $null = Compress-Archive -LiteralPath $moduleFilePath -DestinationPath $archivePath -ErrorAction Stop Write-Verbose "$archivePath created." } function Create-SmokeTestModule( [string] $srcPath, [string] $archiveDir, [string] $moduleName, [string[]] $projectList) { if (-not (Test-Path $archiveDir)) { $null = New-Item -ItemType directory -Path $archiveDir -ErrorAction Stop } $files = New-Object System.Collections.ArrayList Write-Verbose "Adding .ps1 common test files from /tools/ScenarioTest.ResourceManager..." $rmCommonFileNames = 'Common.ps1', 'Assert.ps1' 'Common.ps1', 'Assert.ps1' | ForEach-Object { $rmFilename = $_ $rmCommonFilePath = Join-Path $srcPath ".." "tools" "ScenarioTest.ResourceManager" $rmFilename if(Test-Path $rmCommonFilePath){ $null = $files.Add((Copy-Item $rmCommonFilePath (Join-Path $archiveDir $rmFilename) -PassThru -ErrorAction Stop)) } else { Write-Warning "!!! Common resource management file not found: $rmCommonFilePath" } } Write-Verbose "Gathering .ps1 test file list from $srcPath..." $commonFileName = 'Common.ps1' foreach($folder in Get-TestFolders $srcPath $projectList) { $null = $files.AddRange(@(Filter-TestFiles $folder.Path)) $commonFilePath = Join-Path $folder.Path $commonFileName if(Test-Path $commonFilePath){ $null = $files.Add((Copy-Item $commonFilePath "$archiveDir\$($folder.Name)$commonFileName" -PassThru -ErrorAction Stop)) } $null = $files.AddRange(@(Get-ChildItem -Path $folder.Path -Filter "*$commonFileName" -ErrorAction Stop | Where-Object { $_.Name -ine $commonFileName })) if($folder.Name -eq 'Resources') { $null = $files.AddRange(@(Get-ChildItem "$($folder.Path)\..\" -Filter "*.json" -ErrorAction Stop)) } } $moduleFile = New-Item "$archiveDir\$moduleName.psm1" -type file $files | Where-Object { $_.Name -like '*.ps1' } ` | ForEach-Object {'. "$PSScriptRoot\' + $_.Name + '"'} ` | Add-Content $moduleFile.FullName -ErrorAction Stop $null = $files.Add($moduleFile) $zipPath = "$archiveDir\$moduleName.zip" if(Test-Path $zipPath) { Remove-Item $zipPath -Force -ErrorAction Stop } Write-Verbose "Creating $zipPath..." $files | Compress-Archive -CompressionLevel Fastest -DestinationPath $zipPath -ErrorAction Stop Write-Verbose "$zipPath created." Get-ChildItem -Path $archiveDir -Filter "*.ps*" | Remove-Item -Force -ErrorAction Stop } function Convert-NupkgToZip ( [string] $path, [string[]] $moduleList, [string] $outputPath) { if (-not (Test-Path $outputPath)) { $null = New-Item -ItemType directory -Path $outputPath -ErrorAction Stop } $modulePathFilters = $moduleList | ForEach-Object { $nupkgPath = Join-Path $path "${_}.[0-9]*.nupkg" @{Name = $_; Path = $nupkgPath; Exists = Test-Path $nupkgPath} } $notFound = ($modulePathFilters | ForEach-Object { $_.Exists }) -contains $false if ($notFound) { $missingModules = $modulePathFilters | Where-Object { -not $_.Exists } | ForEach-Object { $_.Name } throw "Cannot find modules ($missingModules) in the directory '$path'" } $packages = $modulePathFilters | ForEach-Object { @{Name = $_.Name; File = (Get-ChildItem $_.Path | Select-Object -Last 1)} } foreach ($package in $packages) { $zipPath = Join-Path $outputPath "$($package.Name).zip" if(Test-Path $zipPath) { Remove-Item $zipPath -Force -ErrorAction Stop } Copy-Item $package.File.FullName $zipPath } } function Get-LatestBuildPath([string] $searchPath) { $folderSuffix = '_PowerShell' Get-ChildItem $searchPath -Directory -Filter "*$folderSuffix" ` | ForEach-Object -Begin { $date = [DateTime]::MinValue.ToString('yyyy_MM_dd') $path = $null } -Process { $folderDateText = $_.Name -ireplace "$folderSuffix`$", '' if($folderDateText -gt $date) { $date = $folderDateText $path = $_ } } -End { $path } } function Create-SignedModules([hashtable] $signedModules, [string] $modulesDir, [string] $archiveDir) { if([string]::IsNullOrEmpty($modulesDir)) { $latestBuildPath = Get-LatestBuildPath -searchPath '\\aaptfile01\ADXSDK\PowerShell' Write-Verbose "Latest drop path found: $($latestBuildPath.FullName)" $modulesDir = Join-Path $latestBuildPath.FullName 'pkgs' } Convert-NupkgToZip ` -path $modulesDir ` -moduleList ($signedModules.Accounts + $signedModules.Other) ` -outputPath $archiveDir Write-Verbose "Signed module zips created in '$archiveDir'." }
combined_dataset/train/non-malicious/CommandTranscript_1.ps1
CommandTranscript_1.ps1
if(!$global:CommandTranscriptPrompt) { ## Record the original prompt so we can put it back if they change their minds... $global:CommandTranscriptPrompt = ${Function:Prompt} } function Test-CommandTranscript { #.Synopsis # Tests whether or not a current command transcript is in place. return $global:CommandTranscriptPrompt -ne ${Function:Prompt} } function Get-CommandTranscript { #.Synopsis # Returns the current (or most recent) transcript log #.Example # notepad $(Get-CommandTranscript) [CmdletBinding()] param() end { if(!(Test-CommandTranscript)) { Write-Warning "Not currently logging transcript. Output is last transcript if any." } if($global:CommandTranscriptPath -and (Test-Path $global:CommandTranscriptPath)) { Get-Item -LiteralPath $global:CommandTranscriptPath } } } function Start-CommandTranscript { #.Synopsis # Start a transcript recording the commands you enter, and optionally, the success and duration of them #.Description # Each time your prompt is displayed, the previous command is logged to the transcript. # If you specify plain (or ps1) output, the result is basically a PowerShell script containing the commands you enter. # If you specify Full (or csv) output, the result is a csv file with start and end times, success, etc. # If you specify Annotated (the default) the duration and success of the command are appended as a comment #.Parameter Output # What output format you prefer # # If you specify plain (or ps1) output, the result is basically a PowerShell script containing the commands you enter. # If you specify Full (or csv) output, the result is a csv file with start and end times, success, etc. # If you specify Annotated (the default) the duration and success of the command are appended as a comment #.Parameter Append # Whether to overwrite the file or append to it. #.Parameter Path # The path to the file to log to #.Example # Start-CommandTranscript "$(Split-Path $Profile)\\Session-$(Get-Date -f 'yyyy-mm-dd').ps1" -Output Plain # # Description # ----------- # Logs commands as a script to the profile directory with and output file something like: Session-2010-07-04.ps1 #.Example # Start-CommandTranscript "~\\Documents\\Logs\\Session $(Get-Date -f 'yyyy-mm-dd').csv" -Output Full # # Description # ----------- # Logs commands in CSV format to the specified file. Note that you must have a Documents\\Logs folder in your $home directory. [CmdletBinding()] param( [Parameter(Position=0, Mandatory=$false, ValueFromPipelineByPropertyName=$true)] [Alias("PSPath","Name")] [string]$Path = "CommandTranscript" , [Parameter(Position=1,Mandatory=$false)] [ValidateSet("Annotated","Plain","Ps1","Csv","Full")] [string]$Output = "Annotated" , [switch]$Append ) begin { if(Test-CommandTranscript) { Write-Warning "Already writing a command transcript to $global:CommandTranscriptPath" return } } end { switch -regex ($Output) { "Csv|Full" { $extension = $Output = "csv" } "Plain|Ps1" { $extension = $Output = "ps1" } "Annotated" { $extension = "ps1" } } $global:CommandTranscriptOutput = $Output if( test-path $path -PathType Container ) { $path = Join-Path $path "CommandTranscript.$extension" } # else ## You can uncomment this block to FORCE the csv/ps1 extension. # { # $path = [System.Io.Path]::ChangeExtension($path,$extension) # } $global:CommandTranscriptPath = $path $Start = "# Command Transcript Started $(Get-Date)" if(!$Append) { switch($CommandTranscriptOutput) { "Csv" { $Type, $Header, $Value = Get-History -count 1 | Add-Member -MemberType NoteProperty -Name Success -Value $? -Passthru | ConvertTo-CSV Set-Content -LiteralPath $global:CommandTranscriptPath -Value $Type, $Start, $Header } default { Set-Content -LiteralPath $global:CommandTranscriptPath -Value "$Start`n`n" } } } else { Add-Content -LiteralPath $global:CommandTranscriptPath -Value "`n`n$Start`n`n" } $global:CommandTranscriptPath = Resolve-Path $global:CommandTranscriptPath ## Insert our transcript prompt Function Global:Prompt { $last = Get-History -count 1 | Add-Member -MemberType NoteProperty -Name Success -Value $? -Passthru switch($CommandTranscriptOutput) { "ps1" { $Value = $last.CommandLine.Trim() } "csv" { $null, $Value = ConvertTo-CSV -Input $last -NoTypeInformation } "annotated" { $Value = "{0,-75} ## Success: {1}, Execution Time: {2} " -f $last.CommandLine.Trim(), $last.Success, ($last.EndExecutionTime - $last.StartExecutionTime) } } Add-Content -LiteralPath $global:CommandTranscriptPath -Value $Value return &$global:CommandTranscriptPrompt @args } Write-Host $Start -Foreground Yellow -Background Black Write-Verbose "Logging commands to $global:CommandTranscriptPath" -Foreground Yellow -Background Black } } function Stop-CommandTranscript { #.Synopsis # End a transcript session #.Description # Terminates transcription and writes out the file item where logging occurred. [CmdletBinding()] param() end { $End = "# Command Transcript Ended $(Get-Date)" Add-Content -LiteralPath $global:CommandTranscriptPath -Value "`n`n$End" ${Function:Prompt} = $Global:CommandTranscriptPrompt Write-Host $End -Foreground Yellow -Background Black Write-Verbose "Transcript is at $global:CommandTranscriptPath" -Foreground Yellow -Background Black Get-Item $global:CommandTranscriptPath } } # SIG # Begin signature block # MIIIDQYJKoZIhvcNAQcCoIIH/jCCB/oCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB # gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR # AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQU28988stUHQ9qmYVmls26N6Tp # IJ6gggUrMIIFJzCCBA+gAwIBAgIQKQm90jYWUDdv7EgFkuELajANBgkqhkiG9w0B # AQUFADCBlTELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAlVUMRcwFQYDVQQHEw5TYWx0 # IExha2UgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJUUlVTVCBOZXR3b3JrMSEwHwYD # VQQLExhodHRwOi8vd3d3LnVzZXJ0cnVzdC5jb20xHTAbBgNVBAMTFFVUTi1VU0VS # Rmlyc3QtT2JqZWN0MB4XDTEwMDUxNDAwMDAwMFoXDTExMDUxNDIzNTk1OVowgZUx # CzAJBgNVBAYTAlVTMQ4wDAYDVQQRDAUwNjg1MDEUMBIGA1UECAwLQ29ubmVjdGlj # dXQxEDAOBgNVBAcMB05vcndhbGsxFjAUBgNVBAkMDTQ1IEdsb3ZlciBBdmUxGjAY # BgNVBAoMEVhlcm94IENvcnBvcmF0aW9uMRowGAYDVQQDDBFYZXJveCBDb3Jwb3Jh # dGlvbjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMfUdxwiuWDb8zId # KuMg/jw0HndEcIsP5Mebw56t3+Rb5g4QGMBoa8a/N8EKbj3BnBQDJiY5Z2DGjf1P # n27g2shrDaNT1MygjYfLDntYzNKMJk4EjbBOlR5QBXPM0ODJDROg53yHcvVaXSMl # 498SBhXVSzPmgprBJ8FDL00o1IIAAhYUN3vNCKPBXsPETsKtnezfzBg7lOjzmljC # mEOoBGT1g2NrYTq3XqNo8UbbDR8KYq5G101Vl0jZEnLGdQFyh8EWpeEeksv7V+YD # /i/iXMSG8HiHY7vl+x8mtBCf0MYxd8u1IWif0kGgkaJeTCVwh1isMrjiUnpWX2NX # +3PeTmsCAwEAAaOCAW8wggFrMB8GA1UdIwQYMBaAFNrtZHQUnBQ8q92Zqb1bKE2L # PMnYMB0GA1UdDgQWBBTK0OAaUIi5wvnE8JonXlTXKWENvTAOBgNVHQ8BAf8EBAMC # B4AwDAYDVR0TAQH/BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhC # AQEEBAMCBBAwRgYDVR0gBD8wPTA7BgwrBgEEAbIxAQIBAwIwKzApBggrBgEFBQcC # ARYdaHR0cHM6Ly9zZWN1cmUuY29tb2RvLm5ldC9DUFMwQgYDVR0fBDswOTA3oDWg # M4YxaHR0cDovL2NybC51c2VydHJ1c3QuY29tL1VUTi1VU0VSRmlyc3QtT2JqZWN0 # LmNybDA0BggrBgEFBQcBAQQoMCYwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmNv # bW9kb2NhLmNvbTAhBgNVHREEGjAYgRZKb2VsLkJlbm5ldHRAWGVyb3guY29tMA0G # CSqGSIb3DQEBBQUAA4IBAQAEss8yuj+rZvx2UFAgkz/DueB8gwqUTzFbw2prxqee # zdCEbnrsGQMNdPMJ6v9g36MRdvAOXqAYnf1RdjNp5L4NlUvEZkcvQUTF90Gh7OA4 # rC4+BjH8BA++qTfg8fgNx0T+MnQuWrMcoLR5ttJaWOGpcppcptdWwMNJ0X6R2WY7 # bBPwa/CdV0CIGRRjtASbGQEadlWoc1wOfR+d3rENDg5FPTAIdeRVIeA6a1ZYDCYb # 32UxoNGArb70TCpV/mTWeJhZmrPFoJvT+Lx8ttp1bH2/nq6BDAIvu0VGgKGxN4bA # T3WE6MuMS2fTc1F8PCGO3DAeA9Onks3Ufuy16RhHqeNcMYICTDCCAkgCAQEwgaow # gZUxCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJVVDEXMBUGA1UEBxMOU2FsdCBMYWtl # IENpdHkxHjAcBgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0d29yazEhMB8GA1UECxMY # aHR0cDovL3d3dy51c2VydHJ1c3QuY29tMR0wGwYDVQQDExRVVE4tVVNFUkZpcnN0 # LU9iamVjdAIQKQm90jYWUDdv7EgFkuELajAJBgUrDgMCGgUAoHgwGAYKKwYBBAGC # NwIBDDEKMAigAoAAoQKAADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor # BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAjBgkqhkiG9w0BCQQxFgQU7R1RKYL8 # G6ZOoMc+zfYPeTZ7oUwwDQYJKoZIhvcNAQEBBQAEggEAUYpkSwGPW04zwgWbohTE # UPntUJ3r3Ydmzwdy+yIMheMJyXMG6OO/exDUYURQIWH28prHrwxuxG8c/7zrP1po # +CaMZbScHjWc8Tw18Auk1YB5ctkjuFyXv5K6Klk2PYsXdoMuXxpIcO1+G33tZC9g # mlK67aBfSQlljBHTbjntV/cG+G0Tv8qJg5/SBmXK7Gk0GGlf4nAD/IpnPzWG5wME # tjjTRu2BGCXL1TRsOdR/VhMIwzy021jDMnXhweeuB5PyXPkBeXx2w/3B9s+a5iTz # jj1L8PDXkT0OYVv9lYLIVI4JVzb18Id6RnTNLYAxWzO+KmiarFaSemhaAs7ZiU3r # Gw== # SIG # End signature block
combined_dataset/train/non-malicious/2993.ps1
2993.ps1
Set-StrictMode -Version Latest function FunctionUnderTest { [CmdletBinding()] param ( [Parameter(Mandatory = $false)] [string] $param1 ) return "I am a real world test" } function FunctionUnderTestWithoutParams([string]$param1) { return "I am a real world test with no params" } filter FilterUnderTest { $_ } function CommonParamFunction ( [string] ${Uncommon}, [switch] ${Verbose}, [switch] ${Debug}, [System.Management.Automation.ActionPreference] ${ErrorAction}, [System.Management.Automation.ActionPreference] ${WarningAction}, [System.String] ${ErrorVariable}, [System.String] ${WarningVariable}, [System.String] ${OutVariable}, [System.Int32] ${OutBuffer} ) { return "Please strip me of my common parameters. They are far too common." } function PipelineInputFunction { param( [Parameter(ValueFromPipeline = $True)] [int]$PipeInt1, [Parameter(ValueFromPipeline = $True)] [int[]]$PipeInt2, [Parameter(ValueFromPipeline = $True)] [string]$PipeStr, [Parameter(ValueFromPipelineByPropertyName = $True)] [int]$PipeIntProp, [Parameter(ValueFromPipelineByPropertyName = $True)] [int[]]$PipeArrayProp, [Parameter(ValueFromPipelineByPropertyName = $True)] [string]$PipeStringProp ) begin { $p = 0 } process { foreach ($i in $input) { $p += 1 write-output @{ index = $p; val = $i; PipeInt1 = $PipeInt1; PipeInt2 = $PipeInt2; PipeStr = $PipeStr; PipeIntProp = $PipeIntProp; PipeArrayProp = $PipeArrayProp; PipeStringProp = $PipeStringProp; } } } } Describe "When the caller mocks a command Pester uses internally" { Mock Write-Host { } Context "Context run when Write-Host is mocked" { It "does not make extra calls to the mocked command" { Write-Host 'Some String' Assert-MockCalled 'Write-Host' -Exactly 1 } It "retains the correct mock count after the first test completes" { Assert-MockCalled 'Write-Host' -Exactly 1 } } } Describe "When calling Mock on existing cmdlet" { Mock Get-Process {return "I am not Get-Process"} $result = Get-Process It "Should Invoke the mocked script" { $result | Should -Be "I am not Get-Process" } It 'Should not resolve $args to the parent scope' { { $args = 'From', 'Parent', 'Scope'; Get-Process SomeName } | Should -Not -Throw } } Describe 'When calling Mock on an alias' { (Get-Item Env:PATH).Value $originalPath = $env:path try { $dirExe = Get-Command dir -CommandType Application -ErrorAction SilentlyContinue if ($null -ne $dirExe) { foreach ($app in $dirExe) { $parent = (Split-Path $app.Path -Parent).TrimEnd('\') $pattern = "^$([regex]::Escape($parent))\\?" $env:path = $env:path -split ';' -notmatch $pattern -join ';' } } Mock dir {return 'I am not dir'} $result = dir It 'Should Invoke the mocked script' { $result | Should -Be 'I am not dir' } } finally { $env:path = $originalPath } } Describe 'When calling Mock on an alias that refers to a function Pester can''t see' { It 'Mocks the aliased command successfully' { function orig { 'orig' } New-Alias 'ali' orig ali | Should -Be 'orig' { mock ali {'mck'} } | Should -Not -Throw ali | Should -Be 'mck' } } Describe 'When calling Mock on a filter' { Mock FilterUnderTest {return 'I am not FilterUnderTest'} $result = 'Yes I am' | FilterUnderTest It 'Should Invoke the mocked script' { $result | Should -Be 'I am not FilterUnderTest' } } Describe 'When calling Mock on an external script' { $ps1File = New-Item 'TestDrive:\tempExternalScript.ps1' -ItemType File -Force $ps1File | Set-Content -Value "'I am tempExternalScript.ps1'" Mock 'TestDrive:\tempExternalScript.ps1' {return 'I am not tempExternalScript.ps1'} Push-Location TestDrive:\ try { $result = tempExternalScript.ps1 It 'Should Invoke the mocked script using just the script name' { $result | Should -Be 'I am not tempExternalScript.ps1' } $result = & tempExternalScript.ps1 It 'Should Invoke the mocked script using the command-invocation operator' { $result | Should -Be 'I am not tempExternalScript.ps1' } $result = . tempExternalScript.ps1 It 'Should Invoke the mocked script using dot source notation' { $result | Should -Be 'I am not tempExternalScript.ps1' } } finally { Pop-Location } Remove-Item $ps1File -Force -ErrorAction SilentlyContinue } InModuleScope -ModuleName Pester { Describe 'When calling Mock on an application command' { if ((GetPesterOs) -ne 'Windows') { Mock id {return "I am not 'id'"} $result = id It 'Should Invoke the mocked script' { $result | Should -Be "I am not 'id'" } } else { Mock schtasks.exe {return 'I am not schtasks.exe'} $result = schtasks.exe It 'Should Invoke the mocked script' { $result | Should -Be 'I am not schtasks.exe' } } } } Describe "When calling Mock in the Describe block" { Mock Out-File {return "I am not Out-File"} It "Should mock Out-File successfully" { $outfile = "test" | Out-File "TestDrive:\testfile.txt" $outfile | Should -Be "I am not Out-File" } } Describe "When calling Mock on existing cmdlet to handle pipelined input" { Mock Get-ChildItem { if ($_ -eq 'a') { return "AA" } if ($_ -eq 'b') { return "BB" } } $result = '' "a", "b" | Get-ChildItem | ForEach { $result += $_ } It "Should process the pipeline in the mocked script" { $result | Should -Be "AABB" } } Describe "When calling Mock on existing cmdlet with Common params" { Mock CommonParamFunction $result = [string](Get-Alias CommonParamFunction).ResolvedCommand.ScriptBlock It "Should strip verbose" { $result.contains("`${Verbose}") | Should -Be $false } It "Should strip Debug" { $result.contains("`${Debug}") | Should -Be $false } It "Should strip ErrorAction" { $result.contains("`${ErrorAction}") | Should -Be $false } It "Should strip WarningAction" { $result.contains("`${WarningAction}") | Should -Be $false } It "Should strip ErrorVariable" { $result.contains("`${ErrorVariable}") | Should -Be $false } It "Should strip WarningVariable" { $result.contains("`${WarningVariable}") | Should -Be $false } It "Should strip OutVariable" { $result.contains("`${OutVariable}") | Should -Be $false } It "Should strip OutBuffer" { $result.contains("`${OutBuffer}") | Should -Be $false } It "Should not strip an Uncommon param" { $result.contains("`${Uncommon}") | Should -Be $true } } Describe "When calling Mock on non-existing function" { try { Mock NotFunctionUnderTest {return} } Catch { $result = $_ } It "Should throw correct error" { $result.Exception.Message | Should -Be "Could not find command NotFunctionUnderTest" } } Describe "When calling Mock on non existent module" { It "Should throw correct error" { $params = @{ CommandName = 'Invoke-MyMethod' ModuleName = 'MyNonExistentModule' } { Mock @params -MockWith { write-host "my mock called!" } } | Should -Throw "No module named 'MyNonExistentModule' is currently loaded." } } Describe 'When calling Mock, StrictMode is enabled, and variables are used in the ParameterFilter' { Set-StrictMode -Version Latest $result = $null $testValue = 'test' try { Mock FunctionUnderTest { 'I am the mock' } -ParameterFilter { $param1 -eq $testValue } } catch { $result = $_ } It 'Does not throw an error when testing the parameter filter' { $result | Should -Be $null } It 'Calls the mock properly' { FunctionUnderTest $testValue | Should -Be 'I am the mock' } It 'Properly asserts the mock was called when there is a variable in the parameter filter' { Assert-MockCalled FunctionUnderTest -Exactly 1 -ParameterFilter { $param1 -eq $testValue } } } Describe "When calling Mock on existing function without matching bound params" { Mock FunctionUnderTest {return "fake results"} -parameterFilter {$param1 -eq "test"} $result = FunctionUnderTest "badTest" It "Should redirect to real function" { $result | Should -Be "I am a real world test" } } Describe "When calling Mock on existing function with matching bound params" { Mock FunctionUnderTest {return "fake results"} -parameterFilter {$param1 -eq "badTest"} $result = FunctionUnderTest "badTest" It "Should return mocked result" { $result | Should -Be "fake results" } } Describe "When calling Mock on existing function without matching unbound arguments" { Mock FunctionUnderTestWithoutParams {return "fake results"} -parameterFilter {$param1 -eq "test" -and $args[0] -eq 'notArg0'} $result = FunctionUnderTestWithoutParams -param1 "test" "arg0" It "Should redirect to real function" { $result | Should -Be "I am a real world test with no params" } } Describe "When calling Mock on existing function with matching unbound arguments" { Mock FunctionUnderTestWithoutParams {return "fake results"} -parameterFilter {$param1 -eq "badTest" -and $args[0] -eq 'arg0'} $result = FunctionUnderTestWithoutParams "badTest" "arg0" It "Should return mocked result" { $result | Should -Be "fake results" } } Describe 'When calling Mock on a function that has no parameters' { function Test-Function { } Mock Test-Function { return $args.Count } It 'Sends the $args variable properly with 2+ elements' { Test-Function 1 2 3 4 5 | Should -Be 5 } It 'Sends the $args variable properly with 1 element' { Test-Function 1 | Should -Be 1 } It 'Sends the $args variable properly with 0 elements' { Test-Function | Should -Be 0 } } Describe "When calling Mock on cmdlet Used by Mock" { Mock Set-Item {return "I am not Set-Item"} Mock Set-Item {return "I am not Set-Item"} $result = Set-Item "mypath" -value "value" It "Should Invoke the mocked script" { $result | Should -Be "I am not Set-Item" } } Describe "When calling Mock on More than one command" { Mock Invoke-Command {return "I am not Invoke-Command"} Mock FunctionUnderTest {return "I am the mock test"} $result = Invoke-Command {return "yes I am"} $result2 = FunctionUnderTest It "Should Invoke the mocked script for the first Mock" { $result | Should -Be "I am not Invoke-Command" } It "Should Invoke the mocked script for the second Mock" { $result2 | Should -Be "I am the mock test" } } Describe 'When calling Mock on a module-internal function.' { New-Module -Name TestModule { function InternalFunction { 'I am the internal function' } function PublicFunction { InternalFunction } function PublicFunctionThatCallsExternalCommand { Start-Sleep 0 } function FuncThatOverwritesExecutionContext { param ($ExecutionContext) InternalFunction } Export-ModuleMember -Function PublicFunction, PublicFunctionThatCallsExternalCommand, FuncThatOverwritesExecutionContext } | Import-Module -Force New-Module -Name TestModule2 { function InternalFunction { 'I am the second module internal function' } function InternalFunction2 { 'I am the second module, second function' } function PublicFunction { InternalFunction } function PublicFunction2 { InternalFunction2 } function FuncThatOverwritesExecutionContext { param ($ExecutionContext) InternalFunction } function ScopeTest { return Get-CallerModuleName } function Get-CallerModuleName { [CmdletBinding()] param ( ) return $PSCmdlet.SessionState.Module.Name } Export-ModuleMember -Function PublicFunction, PublicFunction2, FuncThatOverwritesExecutionContext, ScopeTest } | Import-Module -Force It 'Should fail to call the internal module function' { { TestModule\InternalFunction } | Should -Throw } It 'Should call the actual internal module function from the public function' { TestModule\PublicFunction | Should -Be 'I am the internal function' } Context 'Using Mock -ModuleName "ModuleName" "CommandName" syntax' { Mock -ModuleName TestModule InternalFunction { 'I am the mock test' } It 'Should call the mocked function' { TestModule\PublicFunction | Should -Be 'I am the mock test' } Mock -ModuleName TestModule Start-Sleep { } It 'Should mock calls to external functions from inside the module' { PublicFunctionThatCallsExternalCommand Assert-MockCalled -ModuleName TestModule Start-Sleep -Exactly 1 } Mock -ModuleName TestModule2 InternalFunction -ParameterFilter { $args[0] -eq 'Test' } { "I'm the mock who's been passed parameter Test" } It 'Should only call mocks within the same module' { TestModule2\PublicFunction | Should -Be 'I am the second module internal function' } Mock -ModuleName TestModule2 InternalFunction2 { InternalFunction 'Test' } It 'Should call mocks from inside another mock' { TestModule2\PublicFunction2 | Should -Be "I'm the mock who's been passed parameter Test" } It 'Should work even if the function is weird and steps on the automatic $ExecutionContext variable.' { TestModule2\FuncThatOverwritesExecutionContext | Should -Be 'I am the second module internal function' TestModule\FuncThatOverwritesExecutionContext | Should -Be 'I am the mock test' } Mock -ModuleName TestModule2 Get-CallerModuleName -ParameterFilter { $false } It 'Should call the original command from the proper scope if no parameter filters match' { TestModule2\ScopeTest | Should -Be 'TestModule2' } Mock -ModuleName TestModule2 Get-Content { } It 'Does not trigger the mocked Get-Content from Pester internals' { Mock -ModuleName TestModule2 Get-CallerModuleName -ParameterFilter { $false } Assert-MockCalled -ModuleName TestModule2 Get-Content -Times 0 -Scope It } } AfterAll { Remove-Module TestModule -Force Remove-Module TestModule2 -Force } } Describe "When Applying multiple Mocks on a single command" { Mock FunctionUnderTest {return "I am the first mock test"} -parameterFilter {$param1 -eq "one"} Mock FunctionUnderTest {return "I am the Second mock test"} -parameterFilter {$param1 -eq "two"} $result = FunctionUnderTest "one" $result2 = FunctionUnderTest "two" It "Should Invoke the mocked script for the first Mock" { $result | Should -Be "I am the first mock test" } It "Should Invoke the mocked script for the second Mock" { $result2 | Should -Be "I am the Second mock test" } } Describe "When Applying multiple Mocks with filters on a single command where both qualify" { Mock FunctionUnderTest {return "I am the first mock test"} -parameterFilter {$param1.Length -gt 0 } Mock FunctionUnderTest {return "I am the Second mock test"} -parameterFilter {$param1 -gt 1 } $result = FunctionUnderTest "one" It "The last Mock should win" { $result | Should -Be "I am the Second mock test" } } Describe "When Applying multiple Mocks on a single command where one has no filter" { Mock FunctionUnderTest {return "I am the first mock test"} -parameterFilter {$param1 -eq "one"} Mock FunctionUnderTest {return "I am the paramless mock test"} Mock FunctionUnderTest {return "I am the Second mock test"} -parameterFilter {$param1 -eq "two"} $result = FunctionUnderTest "one" $result2 = FunctionUnderTest "three" It "The parameterless mock is evaluated last" { $result | Should -Be "I am the first mock test" } It "The parameterless mock will be applied if no other wins" { $result2 | Should -Be "I am the paramless mock test" } } Describe "When Creating a Verifiable Mock that is not called" { Context "In the test script's scope" { Mock FunctionUnderTest {return "I am a verifiable test"} -Verifiable -parameterFilter {$param1 -eq "one"} FunctionUnderTest "three" | Out-Null try { Assert-VerifiableMock } Catch { $result = $_ } It "Should throw" { $result.Exception.Message | Should -Be "$([System.Environment]::NewLine) Expected FunctionUnderTest to be called with `$param1 -eq `"one`"" } } Context "In a module's scope" { New-Module -Name TestModule -ScriptBlock { function ModuleFunctionUnderTest { return 'I am the function under test in a module' } } | Import-Module -Force Mock -ModuleName TestModule ModuleFunctionUnderTest {return "I am a verifiable test"} -Verifiable -parameterFilter {$param1 -eq "one"} TestModule\ModuleFunctionUnderTest "three" | Out-Null try { Assert-VerifiableMock } Catch { $result = $_ } It "Should throw" { $result.Exception.Message | Should -Be "$([System.Environment]::NewLine) Expected ModuleFunctionUnderTest in module TestModule to be called with `$param1 -eq `"one`"" } AfterAll { Remove-Module TestModule -Force } } } Describe "When Creating a Verifiable Mock that is called" { Mock FunctionUnderTest -Verifiable -parameterFilter {$param1 -eq "one"} FunctionUnderTest "one" It "Assert-VerifiableMock Should not throw" { { Assert-VerifiableMock } | Should -Not -Throw } } Describe "When Calling Assert-MockCalled 0 without exactly" { Mock FunctionUnderTest {} FunctionUnderTest "one" try { Assert-MockCalled FunctionUnderTest 0 } Catch { $result = $_ } It "Should throw if mock was called" { $result.Exception.Message | Should -Be "Expected FunctionUnderTest to be called 0 times exactly but was called 1 times" } It "Should not throw if mock was not called" { Assert-MockCalled FunctionUnderTest 0 { $param1 -eq "stupid" } } } Describe "When Calling Assert-MockCalled with exactly" { Mock FunctionUnderTest {} FunctionUnderTest "one" FunctionUnderTest "one" try { Assert-MockCalled FunctionUnderTest -exactly 3 } Catch { $result = $_ } It "Should throw if mock was not called the number of times specified" { $result.Exception.Message | Should -Be "Expected FunctionUnderTest to be called 3 times exactly but was called 2 times" } It "Should not throw if mock was called the number of times specified" { Assert-MockCalled FunctionUnderTest -exactly 2 { $param1 -eq "one" } } } Describe "When Calling Assert-MockCalled without exactly" { Mock FunctionUnderTest {} FunctionUnderTest "one" FunctionUnderTest "one" FunctionUnderTest "two" It "Should throw if mock was not called at least the number of times specified" { $scriptBlock = { Assert-MockCalled FunctionUnderTest 4 } $scriptBlock | Should -Throw "Expected FunctionUnderTest to be called at least 4 times but was called 3 times" } It "Should not throw if mock was called at least the number of times specified" { Assert-MockCalled FunctionUnderTest } It "Should not throw if mock was called at exactly the number of times specified" { Assert-MockCalled FunctionUnderTest 2 { $param1 -eq "one" } } It "Should throw an error if any non-matching calls to the mock are made, and the -ExclusiveFilter parameter is used" { $scriptBlock = { Assert-MockCalled FunctionUnderTest -ExclusiveFilter { $param1 -eq 'one' } } $scriptBlock | Should -Throw '1 non-matching calls were made' } } Describe "Using Pester Scopes (Describe,Context,It)" { Mock FunctionUnderTest {return "I am the first mock test"} -parameterFilter {$param1 -eq "one"} Mock FunctionUnderTest {return "I am the paramless mock test"} Context "When in the first context" { It "should mock Describe scoped paramless mock" { FunctionUnderTest | should -be "I am the paramless mock test" } It "should mock Describe scoped single param mock" { FunctionUnderTest "one" | should -be "I am the first mock test" } } Context "When in the second context" { It "should mock Describe scoped paramless mock again" { FunctionUnderTest | should -be "I am the paramless mock test" } It "should mock Describe scoped single param mock again" { FunctionUnderTest "one" | should -be "I am the first mock test" } } Context "When using mocks in both scopes" { Mock FunctionUnderTestWithoutParams {return "I am the other function"} It "should mock Describe scoped mock." { FunctionUnderTest | should -be "I am the paramless mock test" } It "should mock Context scoped mock." { FunctionUnderTestWithoutParams | should -be "I am the other function" } } Context "When context hides a describe mock" { Mock FunctionUnderTest {return "I am the context mock"} Mock FunctionUnderTest {return "I am the parameterized context mock"} -parameterFilter {$param1 -eq "one"} It "should use the context paramless mock" { FunctionUnderTest | should -be "I am the context mock" } It "should use the context parameterized mock" { FunctionUnderTest "one" | should -be "I am the parameterized context mock" } } Context "When context no longer hides a describe mock" { It "should use the describe mock" { FunctionUnderTest | should -be "I am the paramless mock test" } It "should use the describe parameterized mock" { FunctionUnderTest "one" | should -be "I am the first mock test" } } Context 'When someone calls Mock from inside an It block' { Mock FunctionUnderTest { return 'I am the context mock' } It 'Sets the mock' { Mock FunctionUnderTest { return 'I am the It mock' } } It 'Leaves the mock active in the parent scope' { FunctionUnderTest | Should -Be 'I am the It mock' } } } Describe 'Testing mock history behavior from each scope' { function MockHistoryChecker { } Mock MockHistoryChecker { 'I am the describe mock.' } Context 'Without overriding the mock in lower scopes' { It "Reports that zero calls have been made to in the describe scope" { Assert-MockCalled MockHistoryChecker -Exactly 0 -Scope Describe } It 'Calls the describe mock' { MockHistoryChecker | Should -Be 'I am the describe mock.' } It "Reports that zero calls have been made in an It block, after a context-scoped call" { Assert-MockCalled MockHistoryChecker -Exactly 0 -Scope It } It "Reports one Context-scoped call" { Assert-MockCalled MockHistoryChecker -Exactly 1 } It "Reports one Describe-scoped call" { Assert-MockCalled MockHistoryChecker -Exactly 1 -Scope Describe } } Context 'After exiting the previous context' { It 'Reports zero context-scoped calls in the new context.' { Assert-MockCalled MockHistoryChecker -Exactly 0 } It 'Reports one describe-scoped call from the previous context' { Assert-MockCalled MockHistoryChecker -Exactly 1 -Scope Describe } } Context 'While overriding mocks in lower scopes' { Mock MockHistoryChecker { 'I am the context mock.' } It 'Calls the context mock' { MockHistoryChecker | Should -Be 'I am the context mock.' } It 'Reports one context-scoped call' { Assert-MockCalled MockHistoryChecker -Exactly 1 } It 'Reports two describe-scoped calls, even when one is an override mock in a lower scope' { Assert-MockCalled MockHistoryChecker -Exactly 2 -Scope Describe } It 'Calls an It-scoped mock' { Mock MockHistoryChecker { 'I am the It mock.' } MockHistoryChecker | Should -Be 'I am the It mock.' } It 'Reports 2 context-scoped calls' { Assert-MockCalled MockHistoryChecker -Exactly 2 } It 'Reports 3 describe-scoped calls' { Assert-MockCalled MockHistoryChecker -Exactly 3 -Scope Describe } } It 'Reports 3 describe-scoped calls using the default scope in a Describe block' { Assert-MockCalled MockHistoryChecker -Exactly 3 } } Describe "Using a single no param Describe" { Mock FunctionUnderTest {return "I am the describe mock test"} Context "With a context mocking the same function with no params" { Mock FunctionUnderTest {return "I am the context mock test"} It "Should use the context mock" { FunctionUnderTest | should -be "I am the context mock test" } } } Describe 'Dot Source Test' { function TestFunction { Test-Path -Path 'Test' } Mock Test-Path { } $null = TestFunction It "Calls the mock with parameter 'Test'" { Assert-MockCalled Test-Path -Exactly 1 -ParameterFilter { $Path -eq 'Test' } } It "Doesn't call the mock with any other parameters" { InModuleScope Pester { $global:calls = $mockTable['||Test-Path'].CallHistory } Assert-MockCalled Test-Path -Exactly 0 -ParameterFilter { $Path -ne 'Test' } } } InModuleScope -ModuleName Pester { Describe 'Mocking Cmdlets with dynamic parameters' { if ((GetPesterOs) -ne 'Windows') { $mockWith = { if (-not $Hidden) { throw 'Hidden variable not found, or set to false!' } } Mock Get-ChildItem -MockWith $mockWith -ParameterFilter { [bool]$Hidden } It 'Allows calls to be made with dynamic parameters (including parameter filters)' { { Get-ChildItem -Path / -Hidden } | Should -Not -Throw Assert-MockCalled Get-ChildItem } } else { $mockWith = { if (-not $CodeSigningCert) { throw 'CodeSigningCert variable not found, or set to false!' } } Mock Get-ChildItem -MockWith $mockWith -ParameterFilter { [bool]$CodeSigningCert } It 'Allows calls to be made with dynamic parameters (including parameter filters)' { { Get-ChildItem -Path Cert:\ -CodeSigningCert } | Should -Not -Throw Assert-MockCalled Get-ChildItem } } } } Describe 'Mocking functions with dynamic parameters' { Context 'Dynamicparam block that uses the variables of static parameters in its logic' { function Get-Greeting { [CmdletBinding()] param ( [string] $Name ) DynamicParam { if ($Name -cmatch '\b[a-z]') { $Attributes = New-Object Management.Automation.ParameterAttribute $Attributes.ParameterSetName = "__AllParameterSets" $Attributes.Mandatory = $false $AttributeCollection = New-Object Collections.ObjectModel.Collection[Attribute] $AttributeCollection.Add($Attributes) $Dynamic = New-Object System.Management.Automation.RuntimeDefinedParameter('Capitalize', [switch], $AttributeCollection) $ParamDictionary = New-Object System.Management.Automation.RuntimeDefinedParameterDictionary $ParamDictionary.Add("Capitalize", $Dynamic) $ParamDictionary } } end { if ($PSBoundParameters.Capitalize) { $Name = [regex]::Replace( $Name, '\b\w', { $args[0].Value.ToUpper() } ) } "Welcome $Name!" } } $mockWith = { if (-not $Capitalize) { throw 'Capitalize variable not found, or set to false!' } } Mock Get-Greeting -MockWith $mockWith -ParameterFilter { [bool]$Capitalize } It 'Allows calls to be made with dynamic parameters (including parameter filters)' { { Get-Greeting -Name lowercase -Capitalize } | Should -Not -Throw Assert-MockCalled Get-Greeting } $Capitalize = $false It 'Sets the dynamic parameter variable properly' { { Get-Greeting -Name lowercase -Capitalize } | Should -Not -Throw Assert-MockCalled Get-Greeting -Scope It } } Context 'When the mocked command is in a module' { New-Module -Name TestModule { function PublicFunction { Get-Greeting -Name lowercase -Capitalize } $script:DoDynamicParam = $true function script:Get-Greeting { [CmdletBinding()] param ( [string] $Name ) DynamicParam { if (-not $script:DoDynamicParam) { return } if ($Name -cmatch '\b[a-z]') { $Attributes = New-Object Management.Automation.ParameterAttribute $Attributes.ParameterSetName = "__AllParameterSets" $Attributes.Mandatory = $false $AttributeCollection = New-Object Collections.ObjectModel.Collection[Attribute] $AttributeCollection.Add($Attributes) $Dynamic = New-Object System.Management.Automation.RuntimeDefinedParameter('Capitalize', [switch], $AttributeCollection) $ParamDictionary = New-Object System.Management.Automation.RuntimeDefinedParameterDictionary $ParamDictionary.Add("Capitalize", $Dynamic) $ParamDictionary } } end { if ($PSBoundParameters.Capitalize) { $Name = [regex]::Replace( $Name, '\b\w', { $args[0].Value.ToUpper() } ) } "Welcome $Name!" } } } | Import-Module -Force $mockWith = { if (-not $Capitalize) { throw 'Capitalize variable not found, or set to false!' } } Mock Get-Greeting -MockWith $mockWith -ModuleName TestModule -ParameterFilter { [bool]$Capitalize } It 'Allows calls to be made with dynamic parameters (including parameter filters)' { { TestModule\PublicFunction } | Should -Not -Throw Assert-MockCalled Get-Greeting -ModuleName TestModule } AfterAll { Remove-Module TestModule -Force } } Context 'When the mocked command has mandatory parameters that are passed in via the pipeline' { function Get-Greeting2 { [CmdletBinding()] param ( [Parameter(Mandatory = $true, ValueFromPipeline = $true)] [string] $MandatoryParam, [string] $Name ) DynamicParam { if ($Name -cmatch '\b[a-z]') { $Attributes = New-Object Management.Automation.ParameterAttribute $Attributes.ParameterSetName = "__AllParameterSets" $Attributes.Mandatory = $false $AttributeCollection = New-Object Collections.ObjectModel.Collection[Attribute] $AttributeCollection.Add($Attributes) $Dynamic = New-Object System.Management.Automation.RuntimeDefinedParameter('Capitalize', [switch], $AttributeCollection) $ParamDictionary = New-Object System.Management.Automation.RuntimeDefinedParameterDictionary $ParamDictionary.Add("Capitalize", $Dynamic) $ParamDictionary } } end { if ($PSBoundParameters.Capitalize) { $Name = [regex]::Replace( $Name, '\b\w', { $args[0].Value.ToUpper() } ) } "Welcome $Name!" } } Mock Get-Greeting2 { 'Mocked' } -ParameterFilter { [bool]$Capitalize } $hash = @{ Result = $null } $scriptBlock = { $hash.Result = 'Mandatory' | Get-Greeting2 -Name test -Capitalize } It 'Should successfully call the mock and generate the dynamic parameters' { $scriptBlock | Should -Not -Throw $hash.Result | Should -Be 'Mocked' } } Context 'When the mocked command has parameter sets that are ambiguous at the time the dynamic param block is executed' { function Get-Greeting3 { [CmdletBinding()] param ( [Parameter(Mandatory = $true, ValueFromPipelineByPropertyName = $true, ParameterSetName = 'One')] [string] $One, [Parameter(Mandatory = $true, ValueFromPipelineByPropertyName = $true, ParameterSetName = 'Two')] [string] $Two, [string] $Name ) DynamicParam { if ($Name -cmatch '\b[a-z]') { $Attributes = New-Object Management.Automation.ParameterAttribute $Attributes.ParameterSetName = "__AllParameterSets" $Attributes.Mandatory = $false $AttributeCollection = New-Object Collections.ObjectModel.Collection[Attribute] $AttributeCollection.Add($Attributes) $Dynamic = New-Object System.Management.Automation.RuntimeDefinedParameter('Capitalize', [switch], $AttributeCollection) $ParamDictionary = New-Object System.Management.Automation.RuntimeDefinedParameterDictionary $ParamDictionary.Add("Capitalize", $Dynamic) $ParamDictionary } } end { if ($PSBoundParameters.Capitalize) { $Name = [regex]::Replace( $Name, '\b\w', { $args[0].Value.ToUpper() } ) } "Welcome $Name!" } } Mock Get-Greeting3 { 'Mocked' } -ParameterFilter { [bool]$Capitalize } $hash = @{ Result = $null } $scriptBlock = { $hash.Result = New-Object psobject -Property @{ One = 'One' } | Get-Greeting3 -Name test -Capitalize } It 'Should successfully call the mock and generate the dynamic parameters' { $scriptBlock | Should -Not -Throw $hash.Result | Should -Be 'Mocked' } } Context 'When the mocked command''s dynamicparam block depends on the contents of $PSBoundParameters' { function Get-Greeting4 { [CmdletBinding()] param ( [string] $Name ) DynamicParam { if ($PSBoundParameters['Name'] -cmatch '\b[a-z]') { $Attributes = New-Object Management.Automation.ParameterAttribute $Attributes.ParameterSetName = "__AllParameterSets" $Attributes.Mandatory = $false $AttributeCollection = New-Object Collections.ObjectModel.Collection[Attribute] $AttributeCollection.Add($Attributes) $Dynamic = New-Object System.Management.Automation.RuntimeDefinedParameter('Capitalize', [switch], $AttributeCollection) $ParamDictionary = New-Object System.Management.Automation.RuntimeDefinedParameterDictionary $ParamDictionary.Add("Capitalize", $Dynamic) $ParamDictionary } } end { if ($PSBoundParameters.Capitalize) { $Name = [regex]::Replace( $Name, '\b\w', { $args[0].Value.ToUpper() } ) } "Welcome $Name!" } } Mock Get-Greeting4 { 'Mocked' } -ParameterFilter { [bool]$Capitalize } $hash = @{ Result = $null } $scriptBlock = { $hash.Result = Get-Greeting4 -Name test -Capitalize } It 'Should successfully call the mock and generate the dynamic parameters' { $scriptBlock | Should -Not -Throw $hash.Result | Should -Be 'Mocked' } } Context 'When the mocked command''s dynamicparam block depends on the contents of $PSCmdlet.ParameterSetName' { function Get-Greeting5 { [CmdletBinding(DefaultParameterSetName = 'One')] param ( [string] $Name, [Parameter(ParameterSetName = 'Two')] [string] $Two ) DynamicParam { if ($PSCmdlet.ParameterSetName -eq 'Two' -and $Name -cmatch '\b[a-z]') { $Attributes = New-Object Management.Automation.ParameterAttribute $Attributes.ParameterSetName = "__AllParameterSets" $Attributes.Mandatory = $false $AttributeCollection = New-Object Collections.ObjectModel.Collection[Attribute] $AttributeCollection.Add($Attributes) $Dynamic = New-Object System.Management.Automation.RuntimeDefinedParameter('Capitalize', [switch], $AttributeCollection) $ParamDictionary = New-Object System.Management.Automation.RuntimeDefinedParameterDictionary $ParamDictionary.Add("Capitalize", $Dynamic) $ParamDictionary } } end { if ($PSBoundParameters.Capitalize) { $Name = [regex]::Replace( $Name, '\b\w', { $args[0].Value.ToUpper() } ) } "Welcome $Name!" } } Mock Get-Greeting5 { 'Mocked' } -ParameterFilter { [bool]$Capitalize } $hash = @{ Result = $null } $scriptBlock = { $hash.Result = Get-Greeting5 -Two 'Two' -Name test -Capitalize } It 'Should successfully call the mock and generate the dynamic parameters' { $scriptBlock | Should -Not -Throw $hash.Result | Should -Be 'Mocked' } } } InModuleScope -ModuleName Pester { Describe 'Mocking Cmdlets with dynamic parameters in a module' { if ((GetPesterOs) -ne 'Windows') { New-Module -Name TestModule { function PublicFunction { Get-ChildItem -Path \ -Hidden } } | Import-Module -Force $mockWith = { if (-not $Hidden) { throw 'Hidden variable not found, or set to false!' } } Mock Get-ChildItem -MockWith $mockWith -ModuleName TestModule -ParameterFilter { [bool]$Hidden } } else { New-Module -Name TestModule { function PublicFunction { Get-ChildItem -Path Cert:\ -CodeSigningCert } } | Import-Module -Force $mockWith = { if (-not $CodeSigningCert) { throw 'CodeSigningCert variable not found, or set to false!' } } Mock Get-ChildItem -MockWith $mockWith -ModuleName TestModule -ParameterFilter { [bool]$CodeSigningCert } } It 'Allows calls to be made with dynamic parameters (including parameter filters)' { { TestModule\PublicFunction } | Should -Not -Throw Assert-MockCalled Get-ChildItem -ModuleName TestModule } AfterAll { Remove-Module TestModule -Force } } Describe 'DynamicParam blocks in other scopes' { If ((GetPesterOs) -ne 'Windows') { New-Module -Name TestModule1 { $script:DoDynamicParam = $true function DynamicParamFunction { [CmdletBinding()] param ( ) DynamicParam { if ($script:DoDynamicParam) { $flags = [System.Reflection.BindingFlags]'Instance,NonPublic' $params = $PSBoundParameters.GetType().GetConstructor($flags, $null, @(), $null).Invoke(@()) $params['Path'] = [string[]]'/' Get-MockDynamicParameter -CmdletName Get-ChildItem -Parameters $params } } end { 'I am the original function' } } } | Import-Module -Force New-Module -Name TestModule2 { function CallingFunction { DynamicParamFunction -Hidden } function CallingFunction2 { [CmdletBinding()] param ( [ValidateScript( { [bool](DynamicParamFunction -Hidden) })] [string] $Whatever ) } } | Import-Module -Force Mock DynamicParamFunction { if ($Hidden) { 'I am the mocked function' } } -ModuleName TestModule2 } Else { New-Module -Name TestModule1 { $script:DoDynamicParam = $true function DynamicParamFunction { [CmdletBinding()] param ( ) DynamicParam { if ($script:DoDynamicParam) { if ($PSVersionTable.PSVersion.Major -ge 3) { $flags = [System.Reflection.BindingFlags]'Instance,NonPublic' $params = $PSBoundParameters.GetType().GetConstructor($flags, $null, @(), $null).Invoke(@()) } else { $params = @{} } $params['Path'] = [string[]]'Cert:\' Get-MockDynamicParameter -CmdletName Get-ChildItem -Parameters $params } } end { 'I am the original function' } } } | Import-Module -Force New-Module -Name TestModule2 { function CallingFunction { DynamicParamFunction -CodeSigningCert } function CallingFunction2 { [CmdletBinding()] param ( [ValidateScript( { [bool](DynamicParamFunction -CodeSigningCert) })] [string] $Whatever ) } } | Import-Module -Force Mock DynamicParamFunction { if ($CodeSigningCert) { 'I am the mocked function' } } -ModuleName TestModule2 } It 'Properly evaluates dynamic parameters when called from another scope' { CallingFunction | Should -Be 'I am the mocked function' } It 'Properly evaluates dynamic parameters when called from another scope when the call is from a ValidateScript block' { CallingFunction2 -Whatever 'Whatever' } AfterAll { Remove-Module TestModule1 -Force Remove-Module TestModule2 -Force } } } Describe 'Parameter Filters and Common Parameters' { function Test-Function { [CmdletBinding()] param ( ) } Mock Test-Function { } -ParameterFilter { $VerbosePreference -eq 'Continue' } It 'Applies common parameters correctly when testing the parameter filter' { { Test-Function -Verbose } | Should -Not -Throw Assert-MockCalled Test-Function Assert-MockCalled Test-Function -ParameterFilter { $VerbosePreference -eq 'Continue' } } } Describe "Mocking Get-ItemProperty" { Mock Get-ItemProperty { New-Object -typename psobject -property @{ Name = "fakeName" } } It "Does not fail with NotImplementedException" { Get-ItemProperty -Path "HKLM:\Software\Key\" -Name "Property" | Select-Object -ExpandProperty Name | Should -Be fakeName } } Describe 'When mocking a command with parameters that match internal variable names' { function Test-Function { [CmdletBinding()] param ( [string] $ArgumentList, [int] $FunctionName, [double] $ModuleName ) } Mock Test-Function { return 'Mocked!' } It 'Should execute the mocked command successfully' { { Test-Function } | Should -Not -Throw Test-Function | Should -Be 'Mocked!' } } Describe 'Mocking commands with potentially ambiguous parameter sets' { function SomeFunction { [CmdletBinding()] param ( [parameter(ParameterSetName = 'ps1', ValueFromPipelineByPropertyName = $true)] [string] $p1, [parameter(ParameterSetName = 'ps2', ValueFromPipelineByPropertyName = $true)] [string] $p2 ) process { return $true } } Mock SomeFunction { } It 'Should call the function successfully, even with delayed parameter binding' { $object = New-Object psobject -Property @{ p1 = 'Whatever' } { $object | SomeFunction } | Should -Not -Throw Assert-MockCalled SomeFunction -ParameterFilter { $p1 -eq 'Whatever' } } } Describe 'When mocking a command that has an ArgumentList parameter with validation' { Mock Start-Process { return 'mocked' } It 'Calls the mock properly' { $hash = @{ Result = $null } $scriptBlock = { $hash.Result = Start-Process -FilePath cmd.exe -ArgumentList '/c dir c:\' } $scriptBlock | Should -Not -Throw $hash.Result | Should -Be 'mocked' } } Describe 'Mocking New-Object' { It 'Works properly' { Mock New-Object $result = New-Object -TypeName Object $result | Should -Be $null Assert-MockCalled New-Object } } Describe 'Mocking a function taking input from pipeline' { $psobj = New-Object -TypeName psobject -Property @{'PipeIntProp' = '1'; 'PipeArrayProp' = 1; 'PipeStringProp' = 1} $psArrayobj = New-Object -TypeName psobject -Property @{'PipeArrayProp' = @(1)} $noMockArrayResult = @(1, 2) | PipelineInputFunction $noMockIntResult = 1 | PipelineInputFunction $noMockStringResult = '1' | PipelineInputFunction $noMockResultByProperty = $psobj | PipelineInputFunction -PipeStr 'val' $noMockArrayResultByProperty = $psArrayobj | PipelineInputFunction -PipeStr 'val' Mock PipelineInputFunction { write-output 'mocked' } -ParameterFilter { $PipeStr -eq 'blah' } context 'when calling original function with an array' { $result = @(1, 2) | PipelineInputFunction it 'Returns actual implementation' { $result[0].keys | ForEach { $result[0][$_] | Should -Be $noMockArrayResult[0][$_] $result[1][$_] | Should -Be $noMockArrayResult[1][$_] } } } context 'when calling original function with an int' { $result = 1 | PipelineInputFunction it 'Returns actual implementation' { $result.keys | ForEach { $result[$_] | Should -Be $noMockIntResult[$_] } } } context 'when calling original function with a string' { $result = '1' | PipelineInputFunction it 'Returns actual implementation' { $result.keys | ForEach { $result[$_] | Should -Be $noMockStringResult[$_] } } } context 'when calling original function and pipeline is bound by property name' { $result = $psobj | PipelineInputFunction -PipeStr 'val' it 'Returns actual implementation' { $result.keys | ForEach { $result[$_] | Should -Be $noMockResultByProperty[$_] } } } context 'when calling original function and forcing a parameter binding exception' { Mock PipelineInputFunction { if ($MyInvocation.ExpectingInput) { throw New-Object -TypeName System.Management.Automation.ParameterBindingException } write-output $MyInvocation.ExpectingInput } $result = $psobj | PipelineInputFunction it 'falls back to no pipeline input' { $result | Should -Be $false } } context 'when calling original function and pipeline is bound by property name with array values' { $result = $psArrayobj | PipelineInputFunction -PipeStr 'val' it 'Returns actual implementation' { $result.keys | ForEach { $result[$_] | Should -Be $noMockArrayResultByProperty[$_] } } } context 'when calling the mocked function' { $result = 'blah' | PipelineInputFunction it 'Returns mocked implementation' { $result | Should -Be 'mocked' } } } Describe 'Mocking module-qualified calls' { It 'Mock alias should not exist before the mock is defined' { $alias = Get-Alias -Name 'Microsoft.PowerShell.Management\Get-Content' -ErrorAction SilentlyContinue $alias | Should -Be $null } $mockFile = 'TestDrive:\TestFile' $mockResult = 'Mocked' Mock Get-Content { return $mockResult } -ParameterFilter { $Path -eq $mockFile } Setup -File TestFile -Content 'The actual file' It 'Creates the alias while the mock is in effect' { $alias = Get-Alias -Name 'Microsoft.PowerShell.Management\Get-Content' -ErrorAction SilentlyContinue $alias | Should -Not -Be $null } It 'Calls the mock properly even if the call is module-qualified' { $result = Microsoft.PowerShell.Management\Get-Content -Path $mockFile $result | Should -Be $mockResult } } Describe 'After a mock goes out of scope' { It 'Removes the alias after the mock goes out of scope' { $alias = Get-Alias -Name 'Microsoft.PowerShell.Management\Get-Content' -ErrorAction SilentlyContinue $alias | Should -Be $null } } Describe 'Assert-MockCalled with Aliases' { AfterEach { if (Test-Path alias:PesterTF) { Remove-Item Alias:PesterTF } } It 'Allows calls to Assert-MockCalled to use both aliases and the original command name' { function TestFunction { } Set-Alias -Name PesterTF -Value TestFunction Mock PesterTF $null = PesterTF { Assert-MockCalled PesterTF } | Should -Not -Throw { Assert-MockCalled TestFunction } | Should -Not -Throw } } Describe 'Mocking Get-Command' { It 'Does not break when Get-Command is mocked' { { Mock Get-Command } | Should -Not -Throw } } Describe 'Mocks with closures' { $closureVariable = 'from closure' $scriptBlock = { "Variable resolved $closureVariable" } $closure = $scriptBlock.GetNewClosure() $closureVariable = 'from script' function TestClosure([switch] $Closure) { 'Not mocked' } Mock TestClosure $closure -ParameterFilter { $Closure } Mock TestClosure $scriptBlock It 'Resolves variables in the closure rather than Pester''s current scope' { TestClosure | Should -Be 'Variable resolved from script' TestClosure -Closure | Should -Be 'Variable resolved from closure' } } Describe '$args handling' { function AdvancedFunction { [CmdletBinding()] param() 'orig' } function SimpleFunction { . AdvancedFunction } function AdvancedFunctionWithArgs { [CmdletBinding()] param($Args) 'orig' } Add-Type -TypeDefinition ' using System.Management.Automation; [Cmdlet(VerbsLifecycle.Invoke, "CmdletWithArgs")] public class InvokeCmdletWithArgs : Cmdlet { public InvokeCmdletWithArgs() { } [Parameter] public object Args { set { } } protected override void EndProcessing() { WriteObject("orig"); } } ' -PassThru | Select-Object -ExpandProperty Assembly | Import-Module Mock AdvancedFunction { 'mock' } Mock AdvancedFunctionWithArgs { 'mock' } Mock Invoke-CmdletWithArgs { 'mock' } It 'Advanced function mock should be callable with dot operator' { SimpleFunction garbage | Should -Be mock } It 'Advanced function with Args parameter should be mockable' { AdvancedFunctionWithArgs -Args garbage | Should -Be mock } It 'Cmdlet with Args parameter should be mockable' { Invoke-CmdletWithArgs -Args garbage | Should -Be mock } AfterAll { Get-Command Invoke-CmdletWithArgs -CommandType Cmdlet | Select-Object -ExpandProperty Module | Remove-Module } } Describe 'Single quote in command/module name' { BeforeAll { $module = New-Module "Module '‘’‚‛" { Function NormalCommandName { 'orig' } New-Item "Function::Command '‘’‚‛" -Value { 'orig' } } | Import-Module -PassThru } AfterAll { if ($module) { Remove-Module $module; $module = $null } } It 'Command with single quote in module name should be mockable' { Mock NormalCommandName { 'mock' } NormalCommandName | Should -Be mock } It 'Command with single quote in name should be mockable' { Mock "Command '‘’‚‛" { 'mock' } & "Command '‘’‚‛" | Should -Be mock } } if ($global:PSVersionTable.PSVersion.Major -ge 3) { Describe 'Mocking cmdlet without positional parameters' { Add-Type -TypeDefinition ' using System.Management.Automation; [Cmdlet(VerbsLifecycle.Invoke, "CmdletWithoutPositionalParameters")] public class InvokeCmdletWithoutPositionalParameters : Cmdlet { public InvokeCmdletWithoutPositionalParameters() { } [Parameter] public object Parameter { set { } } } [Cmdlet(VerbsLifecycle.Invoke, "CmdletWithValueFromRemainingArguments")] public class InvokeCmdletWithValueFromRemainingArguments : Cmdlet { private string parameter; private string[] remainings; public InvokeCmdletWithValueFromRemainingArguments() { } [Parameter] public string Parameter { set { parameter=value; } } [Parameter(ValueFromRemainingArguments=true)] public string[] Remainings { set { remainings=value; } } protected override void EndProcessing() { WriteObject(string.Concat(parameter, "; ", string.Join(", ", remainings))); } } ' -PassThru | Select-Object -First 1 -ExpandProperty Assembly | Import-Module It 'Original cmdlet does not have positional parameters' { { Invoke-CmdletWithoutPositionalParameters garbage } | Should -Throw } Mock Invoke-CmdletWithoutPositionalParameters It 'Mock of cmdlet should not make parameters to be positional' { { Invoke-CmdletWithoutPositionalParameters garbage } | Should -Throw } It 'Original cmdlet bind all to Remainings' { Invoke-CmdletWithValueFromRemainingArguments asd fgh jkl | Should -Be '; asd, fgh, jkl' } Mock Invoke-CmdletWithValueFromRemainingArguments { -join ($Parameter, '; ', ($Remainings -join ', ')) } It 'Mock of cmdlet should bind all to Remainings' { Invoke-CmdletWithValueFromRemainingArguments asd fgh jkl | Should -Be '; asd, fgh, jkl' } } } Describe 'Nested Mock calls' { $testDate = New-Object DateTime(2012, 6, 13) Mock Get-Date -ParameterFilter { $null -eq $Date } { Get-Date -Date $testDate -Format o } It 'Properly handles nested mocks' { $result = @(Get-Date) $result.Count | Should -Be 1 $result[0] | Should -Be '2012-06-13T00:00:00.0000000' } } Describe 'Globbing characters in command name' { function f[f]f { 'orig1' } function f?f { 'orig2' } function f*f { 'orig3' } function fff { 'orig4' } It 'Command with globbing characters in name should be mockable' { Mock f[f]f { 'mock1' } Mock f?f { 'mock2' } Mock f*f { 'mock3' } f[f]f | Should -Be mock1 f?f | Should -Be mock2 f*f | Should -Be mock3 fff | Should -Be orig4 } } Describe 'Naming conflicts in mocked functions' { Context 'parameter named Metadata' { function Sample { param( [string] ${Metadata} ) } function Wrapper { Sample -Metadata 'test' } Mock Sample { 'mocked' } It 'Works with commands with parameter named Metadata' { Wrapper | Should -Be 'mocked' } } Context 'parameter named Keys' { function g { [CmdletBinding()] param($Keys, $H) } function Wrapper { g -Keys 'value' } Mock g { $Keys } It 'Works with command with parameter named Keys' { $r = Wrapper $r | Should -be 'value' } } } Describe 'Passing unbound script blocks as mocks' { It 'Does not produce an error' { function TestMe { 'Original' } $scriptBlock = [scriptblock]::Create('"Mocked"') { Mock TestMe $scriptBlock } | Should -Not -Throw TestMe | Should -Be Mocked } } Describe 'Assert-MockCalled when mock called outside of It block' { function TestMe { 'Original ' } mock TestMe { 'Mocked' } $null = TestMe Context 'Context' { $null = TestMe It 'Should log the correct number of calls' { TestMe | Should -Be Mocked Assert-MockCalled TestMe -Scope It -Exactly -Times 1 Assert-MockCalled TestMe -Scope Context -Exactly -Times 2 Assert-MockCalled TestMe -Scope Describe -Exactly -Times 3 } It 'Should log the correct number of calls (second test)' { TestMe | Should -Be Mocked Assert-MockCalled TestMe -Scope It -Exactly -Times 1 Assert-MockCalled TestMe -Scope Context -Exactly -Times 3 Assert-MockCalled TestMe -Scope Describe -Exactly -Times 4 } } } Describe "Restoring original commands when mock scopes exit" { function a () { } Context "first context" { Mock a { "mock" } It "original function exists" { $function:a | Should -Not -Be $null } It "passes in first context" { a | Should -Be "mock" } } Context "second context" { Mock a { "mock" } It "original function exists" { $function:a | Should -Not -Be $null } It "passes in second context" { a | Should -Be "mock" } } } Describe "Mocking Set-Variable" { It "sets variable correctly when mocking Set-Variable without -Scope parameter" { Set-Variable -Name v1 -Value 1 $v1 | Should -Be 1 -Because "we defined it without mocking Set-Variable" Mock Set-Variable -ParameterFilter { $false } Set-Variable -Name v2 -Value 10 $v2 | Should -Be 10 } It "sets variable correctly when mocking Set-Variable without -Scope 0 parameter" { Set-Variable -Name v1 -Value 1 $v1 | Should -Be 1 -Because "we defined it without mocking Set-Variable" Mock Set-Variable -ParameterFilter { $false } Set-Variable -Name v2 -Value 11 -Scope 0 $v2 | Should -Be 11 } It "sets variable correctly when mocking Set-Variable without -Scope Local parameter" { Set-Variable -Name v1 -Value 1 $v1 | Should -Be 1 -Because "we defined it without mocking Set-Variable" Mock Set-Variable -ParameterFilter { $false } Set-Variable -Name v2 -Value 12 -Scope Local $v2 | Should -Be 12 } It "sets variable correctly when mocking Set-Variable with -Scope 3 parameter" { & { & { & { & { Set-Variable -Name v1 -Value 2 -Scope 3 } } } $v1 | Should -Be 2 -Because "we defined it without mocking Set-Variable" } & { & { & { & { Mock Set-Variable -ParameterFilter { $false } Set-Variable -Name v2 -Value 11 -Scope 3 } } } $v2 | Should -Be 11 } } } Describe "Mocking functions with conflicting parameters" { InModuleScope Pester { Context "Faked conflicting parameter" { BeforeAll { Mock Get-ConflictingParameterNames { @("ParamToAvoid") } function Get-ExampleTest { param( [Parameter(Mandatory = $true)] [string] $ParamToAvoid ) $ParamToAvoid } Mock Get-ExampleTest { "World" } -ParameterFilter { $_ParamToAvoid -eq "Hello" } } It 'executes the mock' { Get-ExampleTest -ParamToAvoid "Hello" | Should -Be "World" } It 'defaults to the original function' { Get-ExampleTest -ParamToAvoid "Bye" | Should -Be "Bye" } Context "Assert-MockCalled" { It 'simple Assert-Mockcalled' { Get-ExampleTest -ParamToAvoid "Hello" Assert-MockCalled Get-ExampleTest -Exactly 1 -Scope It } It 'with parameterfilter' { Get-ExampleTest -ParamToAvoid "Another" Get-ExampleTest -ParamToAvoid "Hello" Assert-MockCalled Get-ExampleTest -ParameterFilter { $_ParamToAvoid -eq "Hello" } -Exactly 1 -Scope It } } } } Context "Get-Module" { function f { Get-Module foo } It 'mocks Get-Module properly' { Mock Get-Module -Verifiable { 'mocked' } f Assert-MockCalled Get-Module } } } if ($PSVersionTable.PSVersion.Major -ge 3) { Describe "Usage of Alias in Parameter Filters" { Context 'Mock definition' { Context 'Get-Content' { BeforeAll { Mock Get-Content { "default-get-content" } Mock Get-Content -ParameterFilter {$Tail -eq 100} -MockWith { "aliased-parameter-name" } } It "returns mock that matches parameter filter block" { Get-Content -Path "c:\temp.txt" -Last 100 | Should -Be "aliased-parameter-name" } It 'returns default mock' { Get-Content -Path "c:\temp.txt" | Should -Be "default-get-content" } } Context "Alias rewriting works when alias and parameter name differ in length" { Mock New-Item { return "nic" } -ParameterFilter { $Type -ne $null -and $Type.StartsWith("nic") } It 'calls the mock' { New-Item -Path 'Hello' -Type "nic" | Should -Be "nic" } } if ($PSVersionTable.PSVersion -ge 5.1) { Context 'Get-Module' { It 'works with read-only/constant automatic variables' { function f { Get-Module foo -ListAvailable -PSEdition 'Desktop' } Mock Get-Module -Verifiable { 'mocked' } -ParameterFilter {$PSEdition -eq 'Desktop' } f Assert-MockCalled Get-Module } } } } Context 'Assert-MockCalled' { It "Uses parameter aliases in ParameterFilter" { function f { Get-Content -Path 'temp.txt' -Tail 10 } Mock Get-Content { } f Assert-MockCalled Get-Content -ParameterFilter { $Last -eq 10 } -Exactly 1 -Scope It } } } } InModuleScope Pester { Describe 'Alias for external commands' { Context 'Without extensions' { $case = @( @{Command = 'notepad'} ) if ((GetPesterOs) -ne 'Windows') { $case = @( @{Command = 'ls'} ) } It 'mocks <Command> command' -TestCases $case { param($Command) Mock $Command { 'I am being mocked' } & $Command | Should -Be 'I am being mocked' Assert-MockCalled $Command -Scope It -Exactly 1 } } if ((GetPesterOs) -eq 'Windows') { Context 'With extensions' { It 'mocks notepad command with extension' { Mock notepad.exe { 'I am being mocked' } notepad.exe | Should -Be 'I am being mocked' Assert-MockCalled notepad.exe -Scope It -Exactly 1 } } Context 'Mixed usage' { It 'mocks with extension and calls it without ext' { Mock notepad.exe { 'I am being mocked' } notepad | Should -Be 'I am being mocked' Assert-MockCalled notepad.exe -Scope It -Exactly 1 } It 'mocks without extension and calls with extension' { Mock notepad { 'I am being mocked' } notepad.exe | Should -Be 'I am being mocked' } It 'assert that alias to mock works' { Set-Alias note notepad Mock notepad.exe { 'I am being mocked' } notepad | Should -Be 'I am being mocked' Assert-MockCalled note -Scope It -Exactly 1 } } } } } Describe "Mock definition output" { It "Outputs nothing" { function a () {} $output = Mock a { } $output | Should -Be $null } } Describe 'Mocking using ParameterFilter' { Context 'Scriptblock [Scriptblock]::Create() passed to ParameterFilter as var' { BeforeAll{ $filter = [scriptblock]::Create( ('$Path -eq ''C:\Windows''') ) Mock Test-Path { $True } Mock Test-Path -ParameterFilter $filter -MockWith { $False } } It "Returns default mock" { Test-Path -Path C:\AwesomePath | Should -Be $True } It "returns mock that matches parameter filter block" { Test-Path -Path C:\Windows | Should -Be $false } } Context 'Scriptblock expression $( [Scriptblock]::Create() ) passed to ParameterFilter' { BeforeAll{ $filter = [scriptblock]::Create( ('$Path -eq ''C:\Windows''') ) Mock Test-Path { $True } Mock Test-Path -ParameterFilter $( [scriptblock]::Create(('$Path -eq ''C:\Windows''')) ) -MockWith { $False } } It "Returns default mock" { Test-Path -Path C:\AwesomePath | Should -Be $True } It "returns mock that matches parameter filter block" { Test-Path -Path C:\Windows | Should -Be $false } } Context 'Scriptblock {} passed to ParameterFilter' { BeforeAll{ Mock Test-Path { $True } Mock Test-Path -ParameterFilter { $Path -eq "C:\Windows" } -MockWith { $False } } It "Returns default mock" { Test-Path -Path C:\AwesomePath | Should -Be $True } It "returns mock that matches parameter filter block" { Test-Path -Path C:\Windows | Should -Be $false } } Context 'Scriptblock {} passed to ParameterFilter as var' { BeforeAll{ $filter = { $Path -eq "C:\Windows" } Mock Test-Path { $True } Mock Test-Path -ParameterFilter $filter -MockWith { $False } } It "Returns default mock" { Test-Path -Path C:\AwesomePath | Should -Be $True } It "returns mock that matches parameter filter block" { Test-Path -Path C:\Windows | Should -Be $false } } Context 'Function Definition ${} passed to ParameterFilter' { BeforeAll { Function ParamFilter { $Path -eq "C:\Windows" } Mock Test-Path { $True } Mock Test-Path -ParameterFilter ${function:ParamFilter} -MockWith { $False } } It "Returns default mock" { Test-Path -Path C:\AwesomePath | Should -Be $True } It "returns mock that matches parameter filter block" { Test-Path -Path C:\Windows | Should -Be $false } } } if ($PSVersionTable.PSVersion.Major -ge 3) { Describe "-RemoveParameterType" { BeforeAll { } It 'removes parameter type for simple function' { function f ([int]$Count, [string]$Name) { $Count + 1 } Mock f { "result" } -RemoveParameterType 'Count' [Diagnostics.Process] $currentProcess = Get-Process -id $pid $currentProcess -as [int] -eq $null | Should -BeTrue -Because "Process is not convertible to int" f -Name 'Hello' -Count $currentProcess | Should -Be "result" -Because "we successfuly provided a process to parameter defined as int" } if ($PSVersionTable.PSVersion.Major -eq 5) { Context 'NetAdapter example' { It 'passes pscustomobject to a parameter defined as CimSession[]' { Mock Get-NetAdapter { [pscustomobject]@{ Name = 'Mocked' } } Mock Set-NetAdapter -RemoveParameterType 'InputObject' $adapter = Get-NetAdapter $adapter | Set-NetAdapter Assert-MockCalled Set-NetAdapter -ParameterFilter { $InputObject.Name -eq 'Mocked' } } } Context "Get-PhysicalDisk example" { Mock Get-PhysicalDisk -RemoveParameterType Usage, HealthStatus { return "hello" } It "should return 'hello'" { Get-PhysicalDisk | Should Be "hello" } } } } } Describe 'RemoveParameterValidation' { BeforeAll { function Test-Validation { param( [Parameter()] [ValidateRange(1, 10)] [int] $Count ) $Count } } It 'throws when number is not in the valid range' { { Test-Validation -Count -1 } | Should -Throw -ErrorId 'ParameterArgumentValidationError' } It 'passes when mock removes the validation' { Mock Test-Validation -RemoveParameterValidation Count { "mock" } Test-Validation -Count -1 | Should -Be "mock" } }
combined_dataset/train/non-malicious/sample_57_78.ps1
sample_57_78.ps1
@{ GUID = "1DA87E53-152B-403E-98DC-74D7B4D63D59" Author = "PowerShell" CompanyName = "Microsoft Corporation" Copyright = "Copyright (c) Microsoft Corporation." ModuleVersion = "7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion = "3.0" CmdletsToExport = @( 'Export-Alias', 'Get-Alias', 'Import-Alias', 'New-Alias', 'Remove-Alias', 'Set-Alias', 'Export-Clixml', 'Import-Clixml', 'Measure-Command', 'Trace-Command', 'ConvertFrom-Csv', 'ConvertTo-Csv', 'Export-Csv', 'Import-Csv', 'Get-Culture', 'Format-Custom', 'Get-Date', 'Set-Date', 'Write-Debug', 'Wait-Debugger', 'Register-EngineEvent', 'Write-Error', 'Get-Event', 'New-Event', 'Remove-Event', 'Unregister-Event', 'Wait-Event', 'Get-EventSubscriber', 'Invoke-Expression', 'Out-File', 'Unblock-File', 'Get-FileHash', 'Export-FormatData', 'Get-FormatData', 'Update-FormatData', 'New-Guid', 'Format-Hex', 'Get-Host', 'Read-Host', 'Write-Host', 'ConvertTo-Html', 'Write-Information', 'ConvertFrom-Json', 'ConvertTo-Json', 'Test-Json', 'Format-List', 'Import-LocalizedData', 'Send-MailMessage', 'ConvertFrom-Markdown', 'Show-Markdown', 'Get-MarkdownOption', 'Set-MarkdownOption', 'Add-Member', 'Get-Member', 'Compare-Object', 'Group-Object', 'Measure-Object', 'New-Object', 'Select-Object', 'Sort-Object', 'Tee-Object', 'Register-ObjectEvent', 'Write-Output', 'Import-PowerShellDataFile', 'Write-Progress', 'Disable-PSBreakpoint', 'Enable-PSBreakpoint', 'Get-PSBreakpoint', 'Remove-PSBreakpoint', 'Set-PSBreakpoint', 'Get-PSCallStack', 'Export-PSSession', 'Import-PSSession', 'Get-Random', 'Invoke-RestMethod', 'Debug-Runspace', 'Get-Runspace', 'Disable-RunspaceDebug', 'Enable-RunspaceDebug', 'Get-RunspaceDebug', 'ConvertFrom-SddlString', 'Start-Sleep', 'Join-String', 'Out-String', 'Select-String', 'ConvertFrom-StringData', 'Format-Table', 'New-TemporaryFile', 'New-TimeSpan', 'Get-TraceSource', 'Set-TraceSource', 'Add-Type', 'Get-TypeData', 'Remove-TypeData', 'Update-TypeData', 'Get-UICulture', 'Get-Unique', 'Get-Uptime', 'Clear-Variable', 'Get-Variable', 'New-Variable', 'Remove-Variable', 'Set-Variable', 'Get-Verb', 'Write-Verbose', 'Write-Warning', 'Invoke-WebRequest', 'Format-Wide', 'ConvertTo-Xml', 'Select-Xml', 'Get-Error', 'Update-List', 'Out-GridView', 'Show-Command', 'Out-Printer' ) FunctionsToExport = @() AliasesToExport = @('fhx') NestedModules = @("Microsoft.PowerShell.Commands.Utility.dll") HelpInfoURI = 'https://aka.ms/powershell72-help' } # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBA95ukw/cTrslZ # 8GEROXuMEYH1RJd2ZOe5U1EPFSWVsaCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKqB # L7IqVHRF5Ct95L2Usj/QsdyETnVqdZ3YqhjUtu4RMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAeoADnGTOCN3aYamAePSadVXnTdyPTZhkgd/Z # ZBpLqdNKLQaLfBwTXcEorLX9cJ5ZcrG2zDwun9o7d8/eBlkwCODXJyn0SKMzg9pr # 5M6hqcURNaAd6h0Ce04VgeJoyum/RR7ufKhHDetV6hC9bj48R2PrqKefPmSrVJUN # 7b8ocI0/7TUwth5dRODhW0jMgJItcmSvB7EfdL5sUb++6UaG336WNdVXavtOAi/M # S7GlFUBRdjSziaD4o6uXNk/CW54g92t3pWaFYED47m4ULi8ViPIm8hQYGwNva7hN # hXHZFmMXYTJJ5Km9fpIHkYd5qycVaewHwxCuMQr1cWfPOoeV7aGCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCB8CF8dAn2TNjuFVQIYnS06wi+ygcLfFV5F # RCgrJWhlIAIGZk3U4UbbGBMyMDI0MDUyMzE2NDM0NC4yMjZaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHenkie # lp8oRD0AAQAAAd4wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjoyQUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB # 9ByF9UIDhA6xFrOniw/xsDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SU # IBkVQS0Ml6kR+TagkUPbaEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWo # KySY8/ROIKdpphgI7OJb4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3yn # vwrS8/bcorANO6DjuysyS9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2 # RC4odQcEPnY12jypYPnS6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9 # OmGo0S94Bxg3N/3aE6fUbnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdS # qf85FklCXIIkg4sm7nM9TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1 # G7nUD1pteuXvQp8fE1KpTjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++ # 5Hyg/L68pe+DrZoZPXJaGU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhy # k/EebwuXVJY+rTyfbRfuh9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlK # IX5d3aQLo9fDda1ZTOw+XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUazAmbxseaapgdxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBAOKUwHsXDacGOvUIgs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSu # y+GsxiVHzkhMW+FqK8gruLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1X # EUsXYOSJUPitY7E8bbldmmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDi # D28gAVGrPA3NykiSChvdqS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+S # QmI9VIayYsIGRjvelmNa0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMY # huWfWRSHZCKyIANA0aJL4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx7 # 8GqBKfylp25aOWJ/qPhC+DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41Fjg # Bg4m3OTFDGot5DSuVkQgjku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6r # rZM/PCwRG6girYmnTRLLsicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg # 82/FMqCk9wK3LvyLAyDHN+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqH # doNwQYROVm+ZX10RX3n6bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjoyQUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy # 22CJZExE2vOggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOn5pL4wIhgPMjAyNDA1MjMxOTE5MjZaGA8yMDI0MDUy # NDE5MTkyNlowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6fmkvgIBADAHAgEAAgIF # oDAHAgEAAgIRWzAKAgUA6fr2PgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # AHAHOnFkAOIhZG98e5ulTnYMj006y8ddnDfW+fxkC14Sa+fCfTbL1RK6WwLMN/ip # Rc49JVDIeM+FWw7+T+uJCQr/Dgl1eeYCJ/XR6QXkaomMFwlVbn7c03vhMD8xpAKj # 7KVGOEkJRooQQNHTA9FuZ0pIVmx47Yqg7t8iS03jAc/NMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0AAQAA # Ad4wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQgw61qWjOiMPrub7AqbZiLlJiVlPXwkZUySqSDUeHJ # BRswgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCOPiOfDcFeEBBJAn/mC3Mg # rT5w/U2z81LYD44Hc34dezCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB3p5InpafKEQ9AAEAAAHeMCIEIJOrmzej/kgpdUIWtxN84/vV # 9/w3N0VowYvY46GfvX0iMA0GCSqGSIb3DQEBCwUABIICAIofv22PE5EMaF2waP/2 # 9Vvv9pP5R2Z6sp4ZAqO9EmZ3zWgpQVPbKc4nJcd8KkUsN4waiuPrAHizirBQ0Wk5 # JBVhbiDbjt7VnF0MC6CmdjIrLjuttEbYzwGDpxKUKONp/+rU6LUC43U56xo4Xo++ # RVcnoQa5mp11nKPKIJK4dIyA/oMNlQq3OLawL++auNnYVH3w68J7M3pG3n0hzBAJ # zwTAx0VwGv5O7jvdqAwjd9wq5Ntl6iQAcpERNjUNqUVk/tRQgjTc8Bpc22CoHqfV # 7SPUak7Jww+HLnZSTFvbnoApEuYCLuX37k/4IPoWAUyf3cnpvKOx9LD1hjvEqh7x # /siReEYdVmFGNNzP2dRmgIk2U4NCF031tcardn2ziD0NiaPB8hgPRGLCZVF12WO4 # 5NEGT3xyp53DO4d1rkSJNQAzkLFy97QJQBgTB4vdmN2UTYczt95mXMfsIFLW1+vF # 2MntzoZN1PlLtOk6Z1rdDsqk8vHhlZfWRX5q1HOaK8xm1ZHTAx2FLv4blNC7lxpi # 7zxe1IFfvCNOccgg3PMg7D1DIppT/0eRtwinb05cdPTEGZGaJTX/ecoidseX2aDm # lBbEnID3JuwywOgBsgTmJ9DQfRtwnaeixBxkmfCIVMtU5N1uGMyAlm4174KEcoZB # qeSw00oFELef2nM0CMaW5Z4a # SIG # End signature block
combined_dataset/train/non-malicious/Test-Transcribing_1.ps1
Test-Transcribing_1.ps1
#requires -version 2.0 function Test-Transcribing { $externalHost = $host.gettype().getproperty("ExternalHost", [reflection.bindingflags]"NonPublic,Instance").getvalue($host, @()) try { $externalHost.gettype().getproperty("IsTranscribing", [reflection.bindingflags]"NonPublic,Instance").getvalue($externalHost, @()) } catch { write-warning "This host does not support transcription." } }
combined_dataset/train/non-malicious/3475.ps1
3475.ps1
function SkipTopTests { $location = Get-Location $resourceGroupName = getAssetName "RSG" $namespaceName = getAssetName "Namespace-" $eventHubName = getAssetName "EventHub-" $consumerGroupName = getAssetName "ConsumerGroup-" Write-Debug " Create resource group" Write-Debug " Resource Group Name : $resourceGroupName" $Result11 = New-AzResourceGroup -Name $resourceGroupName -Location $location -Force Write-Debug " Create new Evnethub namespace" Write-Debug " Namespace name : $namespaceName" $result = New-AzEventHubNamespace -ResourceGroup $resourceGroupName -Name $namespaceName -Location $location Write-Debug " Get the created namespace within the resource group" $createdNamespace = Get-AzEventHubNamespace -ResourceGroup $resourceGroupName -Name $namespaceName Assert-AreEqual $createdNamespace.Name $namespaceName "New Namespace: Namespace created earlier is not found." $count = 0 while($count -lt 10) { Write-Debug "Create new eventHub " $msgRetentionInDays = 3 $partionCount = 2 $eventHubName_new = $eventHubName +"_" + $count $result = New-AzEventHub -ResourceGroup $resourceGroupName -Namespace $namespaceName -Name $eventHubName_new -MessageRetentionInDays $msgRetentionInDays -PartitionCount $partionCount $count = $count + 1 } Write-Debug " Get the created eventHub " $listEventHub = Get-AzEventHub -ResourceGroup $resourceGroupName -Namespace $namespaceName Assert-True { $listEventHub.Count -eq 10 } "List EventHub: EventHub created earlier is not found." Write-Debug " Get created 5 eventHub " $listEventHub = Get-AzEventHub -ResourceGroup $resourceGroupName -Namespace $namespaceName -MaxCount 5 Assert-True { $listEventHub.Count -eq 5 } "List EventHub: EventHub created earlier is not found." $eventHubName_consumer = $eventHubName+"_0" $count = 0 while($count -lt 10 ) { Write-Debug " Create a new ConsumerGroup " $consumerGroupName_new = $consumerGroupName + "_" + $count $result_ConsumerGroup = New-AzEventHubConsumerGroup -ResourceGroup $resourceGroupName -Namespace $namespaceName -EventHub $eventHubName_consumer -Name $consumerGroupName_new Assert-AreEqual $result_ConsumerGroup.Name $consumerGroupName_new "New ConsumerGroup: ConsumerGroup created earlier is not found." $count = $count + 1 } Write-Debug " Get all created ConsumerGroup " $ListConsumerGroups = Get-AzEventHubConsumerGroup -ResourceGroup $resourceGroupName -Namespace $namespaceName -EventHub $eventHubName_consumer -MaxCount 5 Assert-True { $ListConsumerGroups.Count -eq 5} "List ConsumerGroup: ConsumerGroup created earlier is not found." Write-Debug " Delete namespaces" Remove-AzEventHubNamespace -ResourceGroup $resourceGroupName -Name $namespaceName Write-Debug " Delete resourcegroup" Remove-AzResourceGroup -Name $resourceGroupName -Force }
combined_dataset/train/non-malicious/1588.ps1
1588.ps1
function PRobocopy { param ( [string]$Source = $PWD, [string]$Destination = 'NULL', [string[]]$Include, [long]$Retries = 1000000, [long]$WaitTime = 30, [string]$ExcludeAttributes, [switch]$ExcludeChanged, [switch]$ExcludeNewer, [switch]$ExcludeOlder, [switch]$ListOnly, [switch]$Recurse, [switch]$NoJobHeader, [switch]$Bytes, [switch]$FullPathname, [switch]$NoClass, [switch]$NoDirectoryList, [switch]$TimeStamps, [switch]$ExcludeJunctions, [switch]$Mirror, [switch]$FATFileTimes, [switch]$Restartable ) if ($Source, $Destination, $Include, $ExcludeAttributes, $args -match '\?') { cmd /c Robocopy.exe /? return } if (!$Source) { Throw 'No source directory provided' } $params = @() if ($Destination.ToUpper() -eq 'NULL') {$params += '/L'} if ($Retries -ne 1000000) {$params += "/R:$Retries"} if ($WaitTime -ne 30) {$params += "/W:$WaitTime"} if ($ExcludeAttributes) {$params += "/XA:$ExcludeAttributes"} if ($ExcludeChanged) {$params += '/XC'} if ($ExcludeNewer) {$params += '/XN'} if ($ExcludeOlder) {$params += '/XO'} if ($ListOnly) {$params += '/L'} if ($Recurse) {$params += '/S'} if ($NoJobHeader) {$params += '/NJH'} if ($Bytes) {$params += '/BYTES'} if ($FullPathname) {$params += '/FP'} if ($NoClass) {$params += '/NC'} if ($NoDirectoryList) {$params += '/NDL'} if ($TimeStamps) {$params += '/TL'} if ($ExcludeJunctions) {$params += '/XJ'} if ($Mirror) {$params += '/MIR'} if ($FATFileTimes) {$params += '/FFT'} if ($Restartable) {$params += '/Z'} if ($Include) {$params += $Include} robocopy $Source $Destination $params }
combined_dataset/train/non-malicious/sample_11_88.ps1
sample_11_88.ps1
@{ GUID = 'C46BE3DC-30A9-452F-A5FD-4BF9CA87A854' Author="Microsoft Corporation" CompanyName="Microsoft Corporation" Copyright="Copyright (C) Microsoft Corporation. All rights reserved." ModuleVersion = '1.0' NestedModules = @( 'MSFT_MpComputerStatus.cdxml', 'MSFT_MpPreference.cdxml', 'MSFT_MpThreat.cdxml', 'MSFT_MpThreatCatalog.cdxml', 'MSFT_MpThreatDetection.cdxml', 'MSFT_MpScan.cdxml', 'MSFT_MpSignature.cdxml', 'MSFT_MpWDOScan.cdxml', 'MSFT_MpRollback.cdxml' ) FunctionsToExport = @( 'Get-MpPreference', 'Set-MpPreference', 'Add-MpPreference', 'Remove-MpPreference', 'Get-MpComputerStatus', 'Get-MpThreat', 'Get-MpThreatCatalog', 'Get-MpThreatDetection', 'Start-MpScan', 'Update-MpSignature', 'Remove-MpThreat', 'Start-MpWDOScan', 'Start-MpRollback' ) HelpInfoUri="http://go.microsoft.com/fwlink/?linkid=390762" PowerShellVersion = '3.0' } # SIG # Begin signature block # MIImEAYJKoZIhvcNAQcCoIImATCCJf0CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAKi/54AHWcDKN7 # MMgzW+Je4GnjudtlwpnXzX+Iejz1QKCCC2IwggTvMIID16ADAgECAhMzAAAK69Nl # RIMWPjjtAAAAAArrMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD # QSAyMDEwMB4XDTIzMTAxOTE5MTgwMloXDTI0MTAxNjE5MTgwMlowcDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0 # IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCfg+TEc3bT # Vvq+rfw2TA/Aluhr9MvjyW4v2sVY1+wdq98kJogwk5wRwMEPNKacaRJn02l8VCT5 # eblNMpXt3iD7AcYN+cSnvC4rBDCNKAJAf1ND9AYU9kpP3eKKrxjkbNq5I5uxrIRW # AP2K3gqGsN8peSb+7/BCINSMrmJ7Tx46PXz8asIJY3TEmq4x13zC5uXtIIb1s/d1 # PWrE9KDPyz16VZQx+ZlNEnFVXH6Cg2gw7AJMQLUHJgeLfLcBilLd/P+2j04e7dgD # s6fc0Wrw+Bz5EA/kV77PxHLEt7apceKqp5+dNMo1unzlZuMIh5+A6HA7aXbdF9KX # ujJ6b2MlurVnAgMBAAGjggF3MIIBczAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr # BgEFBQcDAzAdBgNVHQ4EFgQUU6kklw2HQNa4/ec1p2tW744uJekwVAYDVR0RBE0w # S6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGlt # aXRlZDEWMBQGA1UEBRMNMjMwMDI4KzUwMTcwNTAfBgNVHSMEGDAWgBTRT6mKBwjO # 9CQYmOUA//PWeR03vDBTBgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5j # cmwwVwYIKwYBBQUHAQEESzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpL2NlcnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNV # HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IBAQBks51pE8oGEEiS12JhhlAAD/Hf # E6sdGt6b37sp62b9mymV/X3pl4YjPxzeckToiB4SBLLCuG6PCFWBWvKF3QZV7p4L # fClCVjXz5SRXHzgZlXnEReG7r4GMXZ9i06zcSWcy/rFEINTZtPCwLYMNTEIpcW+t # ojVpI6X4FRV5YjfFirE4qmmLYyTQioPYJO5/n2/Xz/BcNj2GFvGycjAtuITmvlPH # g/ZTaTas8PD5loz8YKngKl/DvfTWEHDyYAdmNZcNRP2BuKf3kksHN20z6Lf/JCK1 # et2f5zMarFELgr12wrdI/8z4+hleNPf9cqU36jrEFauG+XaucS5UlnGp043TMIIG # azCCBFOgAwIBAgIKYQxqGQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIz # WhcNMjUwNzA2MjA1MDIzWjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSMwIQYDVQQDExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIw # DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+ # DZ0U5LGfwciUsDh8H9AzVfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdS # cFosHZSrGb+vlX2vZqFvm2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/ # OEbmisdzaXZVaZZM5NjwNOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMU # pUwIoIPXIx/zX99vLM/aFtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jA # vguTHijgc23SVOkoTL9rXZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEA # AaOCAeMwggHfMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQY # mOUA//PWeR03vDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0g # BIGVMIGSMIGPBgkrBgEEAYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cu # bWljcm9zb2Z0LmNvbS9QS0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUH # AgIwNB4yIB0ATABlAGcAYQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBl # AG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnC # lHDDZJTD2FamkI7+5Jr0bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz # /Q2QJCTj+dyWyvy4rL/0wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0b # jPMAYkG6SHSHgv1QyfSHKcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9 # TUj3bkFHUhy7G8JXOqiZVpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b # 3CLVFCNqQX/QQqbb7yV7BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9 # pE/oGw5rduS4j7DC6v119yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6Mj # ugagwI7RiE+TIPJwX9hrcqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpol # Vf1Ayq1kEOgx+RJUeRryDtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ # 239Q+J9iguymghZ8ZrzsmbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcN # Gw186/RayZXPhxIKXezFApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w # 3gI/h+5WoezrtUyFMYIaBDCCGgACAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENB # IDIwMTACEzMAAArr02VEgxY+OO0AAAAACuswDQYJYIZIAWUDBAIBBQCgga4wGQYJ # KoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQB # gjcCARUwLwYJKoZIhvcNAQkEMSIEIH+B0mIqwWEvK0ZcXcRP2c0+FeqAy4XsWQiq # aVqK3TgLMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEa # gBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAU4Gy # QUJHYgLeYLhFgcizDqLgy875NA7NM8TgKTEN3EqUP0Oaig3VgB7rehVU6phrTxKs # 9n7m7/kaqXrou5NVW2G+THlhEWu0UaaSlojLzmxhMIakZHOHLyTn6bz0S0o4yMZ6 # 8QqQqWTU7MiNkIfyGq9IcvnoeZyjBREloQ4veCCvIr2CnRENe3cDVV7/gSu1vXLf # L5AsCTp7aA+lg5rKF2Kjr+wvZ5YxnXqkLjVYYmX9dNTqKVQp2xnLtbiFUVDfe+c4 # XmVEU4dPtLcZdoO6m3vUZ2bCSjnV7XeqJLeOVYKAgdlpVX5rl2pL7Azs7pB2QZ0V # pyexP/sw9u51ejlEtaGCF5MwghePBgorBgEEAYI3AwMBMYIXfzCCF3sGCSqGSIb3 # DQEHAqCCF2wwghdoAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsqhkiG9w0BCRAB # BKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCC8 # TMz+fOAm0rvaefncWG5A7JgSm3cFrFVon8BJgRDJdwIGZaAOIFu+GBIyMDI0MDEx # MjAwNTExNy45NlowBIACAfSggdGkgc4wgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJh # dGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo4OTAwLTA1RTAtRDk0NzEl # MCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEeowggcgMIIF # CKADAgECAhMzAAAB0x0ymhc7QDBzAAEAAAHTMA0GCSqGSIb3DQEBCwUAMHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMDUyNTE5MTIyNFoXDTI0MDIw # MTE5MTIyNFowgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo4OTAwLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCC # AgoCggIBALSOq5M3iDXFuFcJzwxX5067xSpzcpttpa2Lm92wBYzUPh9VKL7g1aAa # 0/8FVFitWPahWeczLR5rOJ1A4ni5SxwExs8dozFo2mBtEb0URBEWdwBSm1acj5U+ # Xnc8Pow8vTLPxwcLZkPfB4XjD64wMAacvfoGSbSys41e+cz142+cbl2OikSqIeh1 # ZJq5HJ7i5+0FHaxPAYdWbEq7QZLh87zs2BsnhUbMgJHJlfD35G+9cwb+OEzXUfwB # YrMqmfSgwabUxIx428tRZvfUdJl6TH80ES1e+Z2jvk5XTfQ0eAheKHFgR5KBQjF9 # sjk6aAyr9UMJCnav9/L/k1VrcqMJCg2qaYQzqisAnZcqNiEQnOinidYJwn3vRTqt # ekE8rhcY0oEWGEtrvhMz/KxMUisRc4kbV9S5d9x1ZvQTHQUB5NOvqCaYKqt4k16M # 0d98b9UR4Xss29Sq5gVGd2IJSGDLrbitbqm1ydBOJF8TRAv+AsXjWQDa9kxjNxzX # oSJhdBAFoXdcC0x26HV2lepM89AQ7cyzn/kH8q2OFKykxw9S9G9vfkhY36r4v7MT # CKmGacIYVO7I4ypzlATSu4Y3czHRW/rH+Fw6ZpfGsdAak0ojk+fv1iTz0ByWpTaZ # cfPVkdan4oFzcPpU/svfYmXDGEnHdqxrTznG/Rc8PnwxFbVZoa9pAgMBAAGjggFJ # MIIBRTAdBgNVHQ4EFgQU0scghrgUAPj3jPfmG/MKabTjXmIwHwYDVR0jBBgwFoAU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFt # cCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcw # AoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3Nv # ZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIw # ADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZI # hvcNAQELBQADggIBAEBiWFihRD7hppDngwU18ToTLy/ita/4u0NFKMwzZf2Di5qc # D1xTtWK12kg9X/MTq/gASF79WeDZQBHmqPZJXezP58Oo3pUtZRmwpHRBHYlhcqcU # 9FWPXp7NnI/vN3kfwiy+xwRyid5f5pEcXTEYYzi0MutLzi+PpGbRuChYtdacxNnm # Q/ijCcaabQuyYie67QYqsNmeR5NWZ+TyBNPLx3XLc/YhhzZQjiIlhcK5JooK4V47 # TCrKxym+EZBKejVcAUrehrJu4PWZKhDFP2rvv4sAYZBuJKgaWBONBBrJixBo9wbV # DhA3A40aqQBIJlNvMmWeaQeCRaUpItO6U5qKVYhjiFLURn7D6xfQEn0twzXjaHnU # 6Vcsyg8unMcBvrHbaKloAnkp/e7IVo4pbDiGe7TNaz48o93X3ad14raiBZ9oV1+c # S+RYMMfZ2gv5kDlAF3xeeCz+Z3cGueWXYGRn+CJkT98rKiWuJHdpMBYLEUJcoiX8 # KW7ZtueP2p9VgukBVARw9oJ9MB/s5kGVeaW4RO+rVj9I2HELownVAsKeRdIj/+Jd # imZEpPvzdApGCaj/jO2Pe4v1nvFtsbEhKD4/QdNFfXnLhNF4Fs7ZEU3IKPzyA45G # T6zBPWRopdR8YHjOODle6XFJvLe4s3FB5sTpMTdwArT5+djlSkdoR2XDh7uKMIIH # cTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCB # iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMp # TWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEw # OTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ # Q0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIh # C3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNx # WuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFc # UTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAc # nVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUo # veO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyzi # YrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9 # fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdH # GO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7X # KHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiE # R9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/ # eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3 # FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAd # BgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEE # AYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMI # MBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMB # Af8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1Ud # HwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3By # b2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQRO # MEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2Vy # dHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4IC # AQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pk # bHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gng # ugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3 # lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHC # gRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6 # MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEU # BHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvsh # VGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+ # fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrp # NPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHI # qzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCA00wggI1AgEBMIH5 # oYHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G # A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUw # IwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5u # U2hpZWxkIFRTUyBFU046ODkwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29m # dCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAFLHbdwxw0HUhDCz # 8tiRFdrsjkmwoIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw # DQYJKoZIhvcNAQELBQACBQDpSoybMCIYDzIwMjQwMTExMTU0OTQ3WhgPMjAyNDAx # MTIxNTQ5NDdaMHQwOgYKKwYBBAGEWQoEATEsMCowCgIFAOlKjJsCAQAwBwIBAAIC # AIUwBwIBAAICEl8wCgIFAOlL3hsCAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYB # BAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQsFAAOC # AQEAbuJmGu2P3xHqeEQd0swTko6Mv2swla6UFaDfrWAkn9e79TkAvcDEATqrfP+6 # cBfgVxlmKknMVca/19TSItuXuo35B70m6U5vQLEMlJeVR/TSPynFemDr2Iq5ta1Q # MsR30qC4c6mPPo+D7WMl3wcuo+LYKdtINSFgZqqS3mNsPvmE303/zmNPjE4yycsp # tQULe3BSBIzMuQg3camcRnBphg/7asrBCFwlQ66R6CSoasA1AbWwjyxakooUHaaK # bD+V5CwrMCOYrJNs7JybvTCNFe82TohiPqWYKKzrWQ8BocR8YeKPqT0eaLnbzynB # nIpOtjrXwO7X3KZtpaRL/jWaXTGCBA0wggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1l # LVN0YW1wIFBDQSAyMDEwAhMzAAAB0x0ymhc7QDBzAAEAAAHTMA0GCWCGSAFlAwQC # AQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkE # MSIEILFjwUOKif6c6jmYY4YlC01/IpohXNPPZN14aGZh07FMMIH6BgsqhkiG9w0B # CRACLzGB6jCB5zCB5DCBvQQgkmb06sTg7k9YDUpoVrO2v24/3qtCASf62Aa1jfE6 # qvUwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdMd # MpoXO0AwcwABAAAB0zAiBCD45hC9oMq/OKNvh4oa9zNox/uW3im8pXOuliLl/SMg # TzANBgkqhkiG9w0BAQsFAASCAgCS7DCn9ZBzi9yF3F3OOWcyNiEea/whW/woVTa2 # HvCPmX6A51f6aZMoInvmgGG3mmUhFzIco7Egu6BDHgZ2WYO7vcg+AID/FRO7OU1A # 2XllIwtptaRQyaVWVHAj2FhsLdrCSZbrkR3I87xB2eWs7esZHgAFiWIoNdIClBJJ # UuUqnPFyOv0xlWM+47e7CvOf1C4xvJcYkfE9643uw+unOHgrdKOWIchi4zAwp7Xe # +LlIGIE+QQ+GVvfmuRs5Vh1AcElhPfsOX7ISSUpJnrXxyV6r25gsiU/vvxJslfFC # Kc26pGCLDnKoB7qdawyg2VKLU+tU74qDh0OahLNl8mGg96w4H9h1NGQFl+qbOuhx # Dcon6PC/DiJlInlTxXNQpQT8PtAchvqYqn908z4MVdnYD5RFMr4TFswlH70GQ4du # ZAYti2AvdCRfu8DkkQPN98paiTNKn0nKvqHD6h1Ru8zojLINT3DUi89vo6l48piY # SfLiyooN8eNw3xRhT+bFczb3zfsoaxXwa3j3h7kO9ZmVwRkUL1Y96SSj/WQn8P8V # few902Y8igWDrQNuJCzIbomUkIGZfv3Dhr3TZWmZfqi7ElBo3qVeDDuAdxI1bxjl # bFim+5uITQk5Dn9iTRQYplWPd9bjWAfM0KukN1/hNhuzCCjS36Biurcbi97DBQz9 # ehOXyQ== # SIG # End signature block
combined_dataset/train/non-malicious/1887.ps1
1887.ps1
Import-Module HelpersCommon Describe "Export-Csv" -Tags "CI" { BeforeAll { $testObject = @("test","object","array") $testCsv = Join-Path -Path $TestDrive -ChildPath "output.csv" $newLine = [environment]::NewLine $P1 = [pscustomobject]@{"P1" = "first"} $P2 = [pscustomobject]@{"P2" = "second"} $P11 = [pscustomobject]@{"P1" = "eleventh"} } AfterEach { Remove-Item -Path $testCsv -Force -ErrorAction SilentlyContinue } It "Should be able to be called without error" { { $testObject | Export-Csv -Path $testCsv -ErrorAction Stop } | Should -Not -Throw } It "Should throw if an output file isn't specified" { { $testObject | Export-Csv -ErrorAction Stop } | Should -Throw -ErrorId "CannotSpecifyPathAndLiteralPath,Microsoft.PowerShell.Commands.ExportCsvCommand" } It "Should be a string when exporting via pipe" { $testObject | Export-Csv -Path $testCsv -IncludeTypeInformation $results = Get-Content -Path $testCsv $results[0] | Should -BeExactly " } It "Should be an object when exporting via the inputObject switch" { Export-Csv -InputObject $testObject -Path $testCsv -IncludeTypeInformation $results = Get-Content -Path $testCsv $results[0] | Should -BeExactly " } It "Should output a csv file containing a string of all the lengths of each element when piped input is used" { $testObject | Export-Csv -Path $testCsv -IncludeTypeInformation $first = "`"" + $testObject[0].Length.ToString() + "`"" $second = "`"" + $testObject[1].Length.ToString() + "`"" $third = "`"" + $testObject[2].Length.ToString() + "`"" $expected = @(" for ($i = 0; $i -lt $expected.Count; $i++) { $(Get-Content -Path $testCsv)[$i] | Should -Be $expected[$i] } } It "Does not include type information by default" { $testObject | Export-Csv -Path $testCsv $results = Get-Content -Path $testCsv $results[0] | Should -Not -Match ([regex]::Escape("System.String")) $results[0] | Should -Not -Match ([regex]::Escape(" } It "Does not include type information with -NoTypeInformation" { $testObject | Export-Csv -Path $testCsv -NoTypeInformation $results = Get-Content -Path $testCsv $results[0] | Should -Not -Match ([regex]::Escape("System.String")) $results[0] | Should -Not -Match ([regex]::Escape(" } It "Includes type information when -IncludeTypeInformation is supplied" { $testObject | Export-Csv -Path $testCsv -IncludeTypeInformation $results = Get-Content -Path $testCsv $results[0] | Should -BeExactly " } It "Does not support -IncludeTypeInformation and -NoTypeInformation at the same time" { { $testObject | Export-Csv -Path $testCsv -IncludeTypeInformation -NoTypeInformation } | Should -Throw -ErrorId "CannotSpecifyIncludeTypeInformationAndNoTypeInformation,Microsoft.PowerShell.Commands.ExportCsvCommand" } It "Should support -LiteralPath parameter" { $testObject | Export-Csv -LiteralPath $testCsv $results = Import-Csv -Path $testCsv $results | Should -HaveCount 3 } It "Should overwrite file without -NoClobber parameter" { $P1 | Export-Csv -Path $testCsv $P2 | Export-Csv -Path $testCsv $results = Import-Csv -Path $testCsv $results.P2 | Should -BeExactly "second" } It "Should not overwrite file with -NoClobber parameter" { $P1 | Export-Csv -Path $testCsv { $P2 | Export-Csv -Path $testCsv -NoClobber} | Should -Throw -ErrorId "NoClobber,Microsoft.PowerShell.Commands.ExportCsvCommand" $results = Import-Csv -Path $testCsv $results.P1 | Should -BeExactly "first" } It "Should not overwrite read-only file without -Force parameter" -Skip:(Test-IsRoot) { $P1 | Export-Csv -Path $testCsv Set-ItemProperty -Path $testCsv -Name IsReadOnly -Value $true { $P2 | Export-Csv -Path $testCsv } | Should -Throw -ErrorId "FileOpenFailure,Microsoft.PowerShell.Commands.ExportCsvCommand" $results = Import-Csv -Path $testCsv $results.P1 | Should -BeExactly "first" } It "Should overwrite read-only file with -Force parameter" { $P1 | Export-Csv -Path $testCsv Set-ItemProperty -Path $testCsv -Name IsReadOnly -Value $true $P2 | Export-Csv -Path $testCsv -Force $results = Import-Csv -Path $testCsv $results.P2 | Should -BeExactly "second" } It "Should not export to file if -WhatIf parameter specified" { $P1 | Export-Csv -Path $testCsv -WhatIf $testCsv | Should -Not -Exist } It "Should append to file if -Append parameter specified" { $P1 | Export-Csv -Path $testCsv $P11 | Export-Csv -Path $testCsv -Append $results = Import-Csv -Path $testCsv $results[0].P1 | Should -BeExactly "first" $results[1].P1 | Should -BeExactly "eleventh" } It "Should append to empty file if -Append parameter specified" { New-Item -Path $testCsv -ItemType File | Out-Null $P11 | Export-Csv -Path $testCsv -Append $results = Import-Csv -Path $testCsv $results[0].P1 | Should -BeExactly "eleventh" } It "Should throw when appended property does not exist in existing .csv file" { $P1 | Export-Csv -Path $testCsv { $P2 | Export-Csv -Path $testCsv -Append -ErrorAction Stop } | Should -Throw -ErrorId "CannotAppendCsvWithMismatchedPropertyNames,Microsoft.PowerShell.Commands.ExportCsvCommand" $results = Import-Csv -Path $testCsv $results[0].P1 | Should -BeExactly "first" } It "Should append existing properties, add missing properties with empty value, and skip extra properties" { $object1 = [PSCustomObject]@{first = 1; second = 2} $object2 = [PSCustomObject]@{first = 11; third = 13} $object1 | Export-Csv -Path $testCsv $object2 | Export-Csv -Path $testCsv -Append -Force $results = Import-Csv -Path $testCsv $results[0].first | Should -BeExactly "1" $results[0].second | Should -BeExactly "2" $results[1].first | Should -BeExactly "11" $results[1].second | Should -BeNullOrEmpty $results[1].PSObject.properties.Name | Should -Not -Contain 'third' } It "First line should be $object = [PSCustomObject]@{first = 1} $pstypenames = $object.pstypenames | ForEach-Object -Process {$_} $pstypenames | ForEach-Object -Process {$object.pstypenames.Remove($_)} $object | Export-Csv -Path $testCsv -IncludeTypeInformation $content = Get-Content -Path $testCsv $content[0] | Should -BeExactly ' } It "Should remove 'CSV:' from the type name" { $object = [PSCustomObject]@{first = 1} $object.pstypenames.Insert(0, "CSV:TheType") $object | Export-Csv -Path $testCsv -IncludeTypeInformation $result = Get-Content -Path $testCsv $result[0] | Should -BeExactly " } It "Should escape double quote with another double quote" { $object = [PSCustomObject]@{first = 'Double quote " in the middle.'} $object | Export-Csv -Path $testCsv $result = Get-Content -Path $testCsv $result[1] | Should -BeExactly '"Double quote "" in the middle."' } It "Test basic function works well" { $in = [pscustomobject]@{ "P1" = "V11"; "P2" = "V12"; "P3" = "V13" } $in | Export-Csv -Path $testCsv -NoTypeInformation $results = Import-Csv -Path $testCsv $results.P1 | Should -BeExactly "V11" $results.P2 | Should -BeExactly "V12" $results.P3 | Should -BeExactly "V13" } It "Test if it works with special character" { $v3 = "abc" + $newLine + "foo" $in = [pscustomobject]@{ "P1" = " "; "P2" = "abc,foo"; "P3" = $v3} $in | Export-Csv -Path $testCsv -NoTypeInformation $results = Import-Csv -Path $testCsv $results.P1 | Should -BeExactly " " $results.P2 | Should -BeExactly "abc,foo" $results.P3 | Should -BeExactly $v3 } It "Test export-csv with a useculture flag" { $outputFilesDir = Join-Path -Path $TestDrive -ChildPath "Monad" $fileToGenerate = Join-Path -Path $outputFilesDir -ChildPath "CSVTests.csv" $delimiter = (Get-Culture).TextInfo.ListSeparator New-Item -Path $outputFilesDir -ItemType Directory -Force Get-Item -Path $outputFilesDir | Export-Csv -Path $fileToGenerate -UseCulture -NoTypeInformation $contents = Get-Content -Path $fileToGenerate $contents.Count | Should -Be 2 $contents[0].Contains($delimiter) | Should -BeTrue $contents[1].Contains($delimiter) | Should -BeTrue } Context "UseQuotes parameter" { BeforeAll { $Name = "Hello"; $Data = "World"; $testOutputObject = [pscustomobject]@{ FirstColumn = $Name; SecondColumn = $Data } $testFile = Join-Path -Path $TestDrive -ChildPath "output.csv" $testFile2 = Join-Path -Path $TestDrive -ChildPath "output2.csv" } It "UseQuotes Always" { $testOutputObject | Export-Csv -Path $testFile -UseQuotes Always -Delimiter ',' $result = Get-Content -Path $testFile $result[0] | Should -BeExactly "`"FirstColumn`",`"SecondColumn`"" $result[1] | Should -BeExactly "`"Hello`",`"World`"" } It "UseQuotes Always is default" { $testOutputObject | Export-Csv -Path $testFile -UseQuotes Always -Delimiter ',' $result = Get-Content -Raw -Path $testFile $testOutputObject | Export-Csv -Path $testFile2 -Delimiter ',' $result2 = Get-Content -Raw -Path $testFile2 $result | Should -BeExactly $result2 } } }
combined_dataset/train/non-malicious/Async Sockets.ps1
Async Sockets.ps1
if (-not ("CallbackEventBridge" -as [type])) { Add-Type @" using System; public sealed class CallbackEventBridge { public event AsyncCallback CallbackComplete = delegate { }; private CallbackEventBridge() {} private void CallbackInternal(IAsyncResult result) { CallbackComplete(result); } public AsyncCallback Callback { get { return new AsyncCallback(CallbackInternal); } } public static CallbackEventBridge Create() { return new CallbackEventBridge(); } } "@ } function Open-Socket { #.Synopsis # Open an Internet Socket #.Parameter Server # The name of the server to connect to #.Parameter Port # The port to connect to on the remote server #.Parameter SocketType # The type of socket to open. # Valid values include Stream, Dgram, Raw, Seqpacket, etc. # # Default value Stream #.Parameter ProtocolType # The protocol to use over the socket. # Valid values include Tcp, Udp, Icmp, Ipx, etc. # # Default value Tcp #.Example # $socket = Open-Socket google.com 80 param( [Parameter(Mandatory=$true, Position=0)] [Alias("Host")] [string]$Server , [Parameter(Mandatory=$true, Position=1)] [int]$Port , [Parameter()] [System.Net.Sockets.SocketType]$SocketType = "Stream" , [Parameter()] [System.Net.Sockets.ProtocolType]$ProtocolType = "Tcp" ) end { $socket = new-object System.Net.Sockets.Socket "InterNetwork", $SocketType, $Protocol $socket.Connect($Server, $Port) Write-Output $socket } } function Expect-String { #.Synopsis # Read data from an open socket asynchronously (using BeginRead/EndRead). #.Description # Reads data from an open socket in an async manner, allowing the script to continue and even to cancel reading. # Provides an advanced system for reading up to an expected string with buffering and regex matching. #.Parameter Socket # The socket to read from #.Parameter Expect # One or more patterns to match on (regex syntax supported) # Note: a null value will match all remaining output from the socket #.Parameter SendFirst # Text to send through the socket before reading. For example, a telnet command or http GET request. #.Parameter BufferLength # The size buffer to use when reading from the socket # # Default value 100 #.Parameter OutputBuffer # A List[String] for the output. Defaults to an empty collection, but you can pass in an existing collection to append to. # This is primarily for use when piping the output of Expect-String back to Expect-String to build up multiple results. #.Parameter Wait # The number of seconds to wait for the socket reads to finish. #.Notes # Expect-String doesn't close the socket, in case you need to call Expect-String on it again #.Example # $socket = Open-Socket www.xerox.com 80 # C:\\PS>$State = Expect-String -Socket $socket -Send "GET / HTTP/1.1`r`nHost: www.xerox.com`r`n`r`n" -Wait 30 -Expect ".*(?=<)",".*(?=<body>)","</body>",$null # C:\\PS>$socket.Close() # C:\\PS>Write-Host "Headers:" $State.Output[0] # C:\\PS>Write-Host "Body:" $State.Output[2] # # Description # ----------- # This calls Expect-String with four expectations, which means there will be four items in $State.Output if they all match. The 3rd item (index 2) will show the entire body of the Xerox homepage. Notice that the first two are using regular expression positive lookaheads (the parenthesis and ?= enclosing some text) to match up to but not including the tags. The four expectations specified result in the http headers, the html up to (but not including) the body tag, the whole body, and anything else that comes after the body (</html>) being in Output, because putting $null as the last expectation copies all remaining data until the end of the stream. We then close the socket. # # NOTE: Using -Wait causes Expect-String not to return until either all expectations are met, we reach the end of the data, or we timeout. Otherwise, Expect-String returns immediately, but you have to manually check $State.Complete # #.Example # $State = Open-Socket localhost 80 | # Expect-String -Send "GET /xsm57/ui/home.aspx HTTP/1.1`r`nHost: localhost`r`n`r`n" # while(!$State.Complete) { write-host $State.Output.Length "characters so far." } # # Description # ----------- # Without the -Wait parameter, this will return instantly, but the data may not have started arriving yet. Note that on a fast server, once the data starts arriving, it arrives so fast that the Write-Host line may never write anything but zeros, and since we're not -Expecting anything, it should just return everything as a single string in $State.Output param( [Parameter(Mandatory=$true, Position=1, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [System.Net.Sockets.Socket]$Socket , [Parameter(Position=0,ValueFromPipelineByPropertyName=$true)] [String[]]$Expect = @() , [String]$SendFirst , [Parameter(ValueFromPipelineByPropertyName=$true)] [Int]$BufferLength = 100 , [Parameter(ValueFromPipelineByPropertyName=$true)] [Alias("Output")] [System.Collections.Generic.List[String]]$OutputBuffer = $(New-Object System.Collections.Generic.List[String]) , [double]$Wait ) begin { if($SendFirst) { $Socket.Send(([char[]]$SendFirst)) | Out-Null } $Expecting = $Expect -as [bool] New-Object PSObject @{ Bridge = [CallbackEventBridge]::create() Buffer = New-Object System.Byte[] $BufferLength BufferLength = $BufferLength Received = New-Object System.Text.StringBuilder Output = $OutputBuffer Socket = $Socket Complete = $false Expecting = $Expect } | Tee-Object -Variable State } process { Trap [System.ObjectDisposedException] { Write-Warning "The socket was forcibly closed" } Register-ObjectEvent -input $State.Bridge -EventName CallbackComplete -action { param($AsyncResult) Trap [System.ObjectDisposedException] { Write-Warning "The socket was forcibly closed" $as.Complete = "ERROR: The socket was forcibly closed" } $as = $AsyncResult.AsyncState $read = $as.Socket.EndReceive( $AsyncResult ) Write-Verbose "Reading $read" if($read -gt 0) { $as.Received.Append( ([System.Text.Encoding]::ASCII.GetString($as.Buffer, 0, $read)) ) | Out-Null } ## This is the "Expect" logic which aborts reading when we get what we wanted ... if(($as.Expecting.Count -gt $as.Output.Count) -and $as.Received.Length -gt $as.Expecting[$as.Output.Count].Length -and $as.Expecting[$as.Output.Count]) { $Expecting = $as.Expecting[$as.Output.Count] Write-Verbose "Expecting $Expecting" # Speeds up matching if the results are large $StartIndex = [Math]::Max(($as.Received.Length - [Math]::Max(($as.BufferLength * 2), $Expecting.Length)), 0) $Length = $as.Received.Length - $StartIndex $match = [regex]::Match( $as.Received.ToString( $StartIndex, $Length ), $Expecting ) if( $match.Success ) { $match | Out-String | Write-Verbose $matchEnd = $StartIndex + $match.Index + $match.Length $as.Output += $as.Received.ToString(0, $matchEnd) $as.Received = New-Object System.Text.StringBuilder $as.Received.ToString($matchEnd, $as.Received.Length - $matchEnd) ## If there's nothing left to expect, then ... don't if($as.Expecting.Count -eq $as.Output.Count) { $as.Complete = "Success: All matches found" $read = 0 # Finish reading for now ... } } } ## It is more correct to keep trying until we get 0 bytes, but some servers never respond when they have 0 to send. # if($read -gt 0) { if($read -eq $as.BufferLength) { # Keep reading ... $as.Socket.BeginReceive( $as.Buffer, 0, $as.BufferLength, "None", $as.Bridge.Callback, $as ) | Out-Null } else { # If we weren't "expecting" or if the last expectation is null (or empty) # put everything we've received into the output buffer if($as.Expecting.Count -eq 0 -or $as.Expecting[-1].Length -eq 0) { $as.Output += $as.Received.ToString() $as.Received = New-Object System.Text.StringBuilder } $as.Complete = $true } } | Out-Null Write-Verbose "Begin Receiving" $State.Socket.BeginReceive( $State.Buffer, 0, $State.BufferLength, "None", $State.Bridge.Callback, $State ) | Out-Null # | Select * -Expand AsyncState | Format-List | Out-String | Write-Verbose } end { if($Wait) { while($Wait -gt 0 -and !$State.Complete) { Sleep -milli 500 $Wait -= 0.5 Write-Progress "Waiting to Receive" "Still Expecting Output $Expect" -SecondsRemaining $Wait } } } }
combined_dataset/train/non-malicious/sample_13_86.ps1
sample_13_86.ps1
#=========================================================================== #DVInstaller.ps1 #---------------------------------------------------------------------------- #Copyright (C) 2021 Intel Corporation #SPDX-License-Identifier: MIT #--------------------------------------------------------------------------*/ #check if file present $global:maxcount = 30 function is_present($filepath) { $isavailable = Test-Path $filepath return $isavailable } #check if all the required binaries are present or not function check_executables() { if ((is_present("DVServer\dvserver.cat") -eq $true) -and (is_present("DVServer\DVServer.dll") -eq $true) -and (is_present("DVServer\DVServer.inf") -eq $true) -and (is_present("DVServer\dvserverkmd.cat") -eq $true) -and (is_present("DVServer\DVServerKMD.inf") -eq $true) -and (is_present("DVServer\DVServerKMD.sys") -eq $true) -and (is_present("DVEnabler.dll") -eq $true) -and (is_present("GraphicsDriver\Graphics\iigd_dch.inf") -eq $true)){ Write-Host "Setup files present" return "SUCCESS" } Write-Host "Setup files don't exist.. Exiting.." return "FAIL" } function start_dvenabler() { #before removing the existing dvserver.dll, check if the dll is running as service #if it is running, then kill the service and then remove the dll. $status = tasklist /m | findstr "DVEnabler.dll" if ($status) { Write-Host "Kill the process before replacing the DVEnabler.dll" taskkill /F /FI "MODULES eq DVEnabler.dll" /T } Remove-Item -path C:\Windows\System32\DVEnabler.dll -ErrorAction SilentlyContinue $count = 0 rundll32.exe DVEnabler.dll,dvenabler_init # Before Rebooting the system, we need to make sure that DVEnabler.dll has been kick started # So adding a loop with a counter of maxcount = 30, To check if DVEnabler has started # If DVEnabler doesnt get started before 30 iteration, we will exit the script. while($count -lt $maxcount){ $dve = tasklist /m | findstr "DVEnabler.dll" if ($dve) { Write-Host "DVEnabler started as service ." break } else { Write-Host "Starting DVEnabler... Please wait..." $count ++ continue } } if (!$dve) { Write-Host "unable to start DVEnabler... returning failure" return "FAIL" } #During system login, DVEnabler service will look for this DLL in system32 path, #This will load the previously saved display topology. #Copying DVEnabler.DLL to system32 is required as part of the installation cp DVEnabler.dll C:\Windows\System32 #regiter a task to start the dvenabler.dll as a service during every user logon unregister-scheduledtask -TaskName "DVEnabler" -confirm:$false -ErrorAction SilentlyContinue $ac = New-ScheduledTaskAction -Execute "rundll32.exe" -Argument "C:\Windows\System32\DVEnabler.dll,dvenabler_init" $tr = New-ScheduledTaskTrigger -AtLogOn $pr = New-ScheduledTaskPrincipal -Groupid "INTERACTIVE" Register-ScheduledTask -TaskName "DVEnabler" -Trigger $tr -TaskPath "\Microsoft\Windows\DVEnabler" -Action $ac -Principal $pr return "SUCCESS" } ##Main## $ret = check_executables if ($ret -eq "FAIL") { Exit } else { if ((is_present("DVServer.cer") -eq $true) -and (is_present("DVServerKMD.cer") -eq $true)){ Write-Host "Start DVServer Certificate installation..." certutil -addstore root DVServer.cer certutil -addstore root DVServerKMD.cer } Write-Host "Start Windows GFX Driver installation..." pnputil.exe /add-driver .\GraphicsDriver\Graphics\iigd_dch.inf /install Write-Host "Start Zerocopy Driver installation..." pnputil.exe /add-driver .\DVServer\DVServerKMD.inf /install $count = 0 # Before starting DVEnabler.dll we should make sure that DVServer UMD has started or not # So adding a loop with a counter of maxcount = 30, To check if DVServer UMD has started # if DVserver UMD doesnt get started before 30 iteration, we will exit the script while($count -lt $maxcount){ $dvs= tasklist /m | findstr "dvserver.dll" if ($dvs) { Write-Host "DVServer loaded successfully..." break } else { Write-Host "DVServer loading...Please wait..." $count ++ continue } } if (!$dvs) { Write-Host "Failed to load DVServer UMD... Exiting" Exit } #call start_dvnabler to run the dvenabler.sll as a service $dve = start_dvenabler if ($dve -eq "SUCCESS") { Write-Host "Dvnabler succusfully started...." Write-Host "Rebooting Windows VM..." Restart-Computer } else { Write-Host "Fail to start Dvnabler.... Exiting!" Exit } } # SIG # Begin signature block # MIIn+QYJKoZIhvcNAQcCoIIn6jCCJ+YCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBcw5ja1oafDbrf # 4uGHBvAPRGHpa2UrKwaees0lbF8ZE6CCEX0wggVvMIIEV6ADAgECAhBI/JO0YFWU # jTanyYqJ1pQWMA0GCSqGSIb3DQEBDAUAMHsxCzAJBgNVBAYTAkdCMRswGQYDVQQI # DBJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcMB1NhbGZvcmQxGjAYBgNVBAoM # EUNvbW9kbyBDQSBMaW1pdGVkMSEwHwYDVQQDDBhBQUEgQ2VydGlmaWNhdGUgU2Vy # dmljZXMwHhcNMjEwNTI1MDAwMDAwWhcNMjgxMjMxMjM1OTU5WjBWMQswCQYDVQQG # EwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMS0wKwYDVQQDEyRTZWN0aWdv # IFB1YmxpYyBDb2RlIFNpZ25pbmcgUm9vdCBSNDYwggIiMA0GCSqGSIb3DQEBAQUA # A4ICDwAwggIKAoICAQCN55QSIgQkdC7/FiMCkoq2rjaFrEfUI5ErPtx94jGgUW+s # hJHjUoq14pbe0IdjJImK/+8Skzt9u7aKvb0Ffyeba2XTpQxpsbxJOZrxbW6q5KCD # J9qaDStQ6Utbs7hkNqR+Sj2pcaths3OzPAsM79szV+W+NDfjlxtd/R8SPYIDdub7 # P2bSlDFp+m2zNKzBenjcklDyZMeqLQSrw2rq4C+np9xu1+j/2iGrQL+57g2extme # me/G3h+pDHazJyCh1rr9gOcB0u/rgimVcI3/uxXP/tEPNqIuTzKQdEZrRzUTdwUz # T2MuuC3hv2WnBGsY2HH6zAjybYmZELGt2z4s5KoYsMYHAXVn3m3pY2MeNn9pib6q # RT5uWl+PoVvLnTCGMOgDs0DGDQ84zWeoU4j6uDBl+m/H5x2xg3RpPqzEaDux5mcz # mrYI4IAFSEDu9oJkRqj1c7AGlfJsZZ+/VVscnFcax3hGfHCqlBuCF6yH6bbJDoEc # QNYWFyn8XJwYK+pF9e+91WdPKF4F7pBMeufG9ND8+s0+MkYTIDaKBOq3qgdGnA2T # OglmmVhcKaO5DKYwODzQRjY1fJy67sPV+Qp2+n4FG0DKkjXp1XrRtX8ArqmQqsV/ # AZwQsRb8zG4Y3G9i/qZQp7h7uJ0VP/4gDHXIIloTlRmQAOka1cKG8eOO7F/05QID # AQABo4IBEjCCAQ4wHwYDVR0jBBgwFoAUoBEKIz6W8Qfs4q8p74Klf9AwpLQwHQYD # VR0OBBYEFDLrkpr/NZZILyhAQnAgNpFcF4XmMA4GA1UdDwEB/wQEAwIBhjAPBgNV # HRMBAf8EBTADAQH/MBMGA1UdJQQMMAoGCCsGAQUFBwMDMBsGA1UdIAQUMBIwBgYE # VR0gADAIBgZngQwBBAEwQwYDVR0fBDwwOjA4oDagNIYyaHR0cDovL2NybC5jb21v # ZG9jYS5jb20vQUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwNAYIKwYBBQUHAQEE # KDAmMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20wDQYJKoZI # hvcNAQEMBQADggEBABK/oe+LdJqYRLhpRrWrJAoMpIpnuDqBv0WKfVIHqI0fTiGF # OaNrXi0ghr8QuK55O1PNtPvYRL4G2VxjZ9RAFodEhnIq1jIV9RKDwvnhXRFAZ/ZC # J3LFI+ICOBpMIOLbAffNRk8monxmwFE2tokCVMf8WPtsAO7+mKYulaEMUykfb9gZ # pk+e96wJ6l2CxouvgKe9gUhShDHaMuwV5KZMPWw5c9QLhTkg4IUaaOGnSDip0TYl # d8GNGRbFiExmfS9jzpjoad+sPKhdnckcW67Y8y90z7h+9teDnRGWYpquRRPaf9xH # +9/DUp/mBlXpnYzyOmJRvOwkDynUWICE5EV7WtgwggXoMIIEUKADAgECAhAdKag9 # tzXxH+28450UpdEHMA0GCSqGSIb3DQEBDAUAMFQxCzAJBgNVBAYTAkdCMRgwFgYD # VQQKEw9TZWN0aWdvIExpbWl0ZWQxKzApBgNVBAMTIlNlY3RpZ28gUHVibGljIENv # ZGUgU2lnbmluZyBDQSBSMzYwHhcNMjIxMDAzMDAwMDAwWhcNMjMxMDAzMjM1OTU5 # WjBaMQswCQYDVQQGEwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTEaMBgGA1UECgwR # SW50ZWwgQ29ycG9yYXRpb24xGjAYBgNVBAMMEUludGVsIENvcnBvcmF0aW9uMIIB # ojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAxqRHnVtXhFtxxcFfWrfMBC+Z # rxaZL5iIwf0WbjP5OvE6fyGC+qY//JQTEcdF8DDz3a+2uexsEuLJSruaF6Eklhi1 # 8xgz8QJ8syB5iV+DmfALmpLpfTX5G/V96x052vHh99MccHEKchJhu2fMFvFNgsaB # ZRN+nrDgEXBpUd/xmfNr7kg43PG/DzKnMnqH3lTu+NJXkpvotEmrO+AosbHxuO0T # BjhWoyuM3iQU8reIPWUFxHkbz7Tmg63wszQmJjRvO7XpudNrq8vML1thC0QVQ4Ch # ruRaaqq8Z1A+P1lnwM/RRUOgiGJ/+Q4IWBH0Z6+86Lw+fRGQOD3PCLij/p3s7qAh # DFJlX6ltcnP0O9f/Tmjfk8ECgjma5GuvFv3yKpCVGCoi274Xv0ybGH8LRKJ8Imn+ # P95BEej6vc+uQH6McrZhML9PVWwjtl7CKfki8c0ZskZcf5NGE0gbgnJw94UaTAft # T0YaSIoPMljUbmKxFrNYEMdjU3jtsNj/hK252HhtAgMBAAGjggGuMIIBqjAfBgNV # HSMEGDAWgBQPKssghyi47G9IritUpimqF6TNDDAdBgNVHQ4EFgQUXlw+QgoqqaIQ # 6xkOyyU9nKkhe/AwDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwEwYDVR0l # BAwwCgYIKwYBBQUHAwMwSgYDVR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggr # BgEFBQcCARYXaHR0cHM6Ly9zZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEkGA1Ud # HwRCMEAwPqA8oDqGOGh0dHA6Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1B1Ymxp # Y0NvZGVTaWduaW5nQ0FSMzYuY3JsMHkGCCsGAQUFBwEBBG0wazBEBggrBgEFBQcw # AoY4aHR0cDovL2NydC5zZWN0aWdvLmNvbS9TZWN0aWdvUHVibGljQ29kZVNpZ25p # bmdDQVIzNi5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLnNlY3RpZ28uY29t # MCMGA1UdEQQcMBqBGHBraWVuZ2luZWVyaW5nQGludGVsLmNvbTANBgkqhkiG9w0B # AQwFAAOCAYEAL6rY++l2DCxPibSRjbMB6jX99HqLjTDA8uKvp2FJm18a1DzV5EBG # 5iDd38tw7QLz2hd8RanKyl3zrx5+48r0ifKt5LXzGYnc7AvodGCNFb2/bxbCrEHI # pk0uDcFd+xkfiHyO054zoTeMyzIMPdYjzRtMM+lzj7fubc2IRZWAgexXLNYBX5ID # /RL8EsSb/2ayYNA7T7OXonc43JSznEz6H4s5EcBDZTE3uGYFTMWaq+Q75GD4LzVP # z7jvuVfRKd992hB2KJwfvnwLoVEYI+QXlO6FdO1FfywqnTgqA7AkdUH/kt06uuyK # qA537vcl68eUab/SGcx7dw+4HRvs0NT6M6FsoatFXrLfYatlKc/UGRPpJ75Y849r # dnw5tZ6+Ne3Uxrb3Bf38sx6bbszeWiycoo+qmQGeUXskSfoNd0xcoGbig1gbDPSv # qkxJIbU8oliJp6BFk5F6DD7+ED3bRpU+Oi7KwsedhZ4EVzeycSkJ/FX4+y0sZ+mk # YzAm2PvWgbyuMIIGGjCCBAKgAwIBAgIQYh1tDFIBnjuQeRUgiSEcCjANBgkqhkiG # 9w0BAQwFADBWMQswCQYDVQQGEwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVk # MS0wKwYDVQQDEyRTZWN0aWdvIFB1YmxpYyBDb2RlIFNpZ25pbmcgUm9vdCBSNDYw # HhcNMjEwMzIyMDAwMDAwWhcNMzYwMzIxMjM1OTU5WjBUMQswCQYDVQQGEwJHQjEY # MBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSswKQYDVQQDEyJTZWN0aWdvIFB1Ymxp # YyBDb2RlIFNpZ25pbmcgQ0EgUjM2MIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIB # igKCAYEAmyudU/o1P45gBkNqwM/1f/bIU1MYyM7TbH78WAeVF3llMwsRHgBGRmxD # eEDIArCS2VCoVk4Y/8j6stIkmYV5Gej4NgNjVQ4BYoDjGMwdjioXan1hlaGFt4Wk # 9vT0k2oWJMJjL9G//N523hAm4jF4UjrW2pvv9+hdPX8tbbAfI3v0VdJiJPFy/7Xw # iunD7mBxNtecM6ytIdUlh08T2z7mJEXZD9OWcJkZk5wDuf2q52PN43jc4T9OkoXZ # 0arWZVeffvMr/iiIROSCzKoDmWABDRzV/UiQ5vqsaeFaqQdzFf4ed8peNWh1OaZX # nYvZQgWx/SXiJDRSAolRzZEZquE6cbcH747FHncs/Kzcn0Ccv2jrOW+LPmnOyB+t # AfiWu01TPhCr9VrkxsHC5qFNxaThTG5j4/Kc+ODD2dX/fmBECELcvzUHf9shoFvr # n35XGf2RPaNTO2uSZ6n9otv7jElspkfK9qEATHZcodp+R4q2OIypxR//YEb3fkDn # 3UayWW9bAgMBAAGjggFkMIIBYDAfBgNVHSMEGDAWgBQy65Ka/zWWSC8oQEJwIDaR # XBeF5jAdBgNVHQ4EFgQUDyrLIIcouOxvSK4rVKYpqhekzQwwDgYDVR0PAQH/BAQD # AgGGMBIGA1UdEwEB/wQIMAYBAf8CAQAwEwYDVR0lBAwwCgYIKwYBBQUHAwMwGwYD # VR0gBBQwEjAGBgRVHSAAMAgGBmeBDAEEATBLBgNVHR8ERDBCMECgPqA8hjpodHRw # Oi8vY3JsLnNlY3RpZ28uY29tL1NlY3RpZ29QdWJsaWNDb2RlU2lnbmluZ1Jvb3RS # NDYuY3JsMHsGCCsGAQUFBwEBBG8wbTBGBggrBgEFBQcwAoY6aHR0cDovL2NydC5z # ZWN0aWdvLmNvbS9TZWN0aWdvUHVibGljQ29kZVNpZ25pbmdSb290UjQ2LnA3YzAj # BggrBgEFBQcwAYYXaHR0cDovL29jc3Auc2VjdGlnby5jb20wDQYJKoZIhvcNAQEM # BQADggIBAAb/guF3YzZue6EVIJsT/wT+mHVEYcNWlXHRkT+FoetAQLHI1uBy/YXK # ZDk8+Y1LoNqHrp22AKMGxQtgCivnDHFyAQ9GXTmlk7MjcgQbDCx6mn7yIawsppWk # vfPkKaAQsiqaT9DnMWBHVNIabGqgQSGTrQWo43MOfsPynhbz2Hyxf5XWKZpRvr3d # MapandPfYgoZ8iDL2OR3sYztgJrbG6VZ9DoTXFm1g0Rf97Aaen1l4c+w3DC+IkwF # kvjFV3jS49ZSc4lShKK6BrPTJYs4NG1DGzmpToTnwoqZ8fAmi2XlZnuchC4NPSZa # PATHvNIzt+z1PHo35D/f7j2pO1S8BCysQDHCbM5Mnomnq5aYcKCsdbh0czchOm8b # kinLrYrKpii+Tk7pwL7TjRKLXkomm5D1Umds++pip8wH2cQpf93at3VDcOK4N7Ew # oIJB0kak6pSzEu4I64U6gZs7tS/dGNSljf2OSSnRr7KWzq03zl8l75jy+hOds9TW # SenLbjBQUGR96cFr6lEUfAIEHVC1L68Y1GGxx4/eRI82ut83axHMViw1+sVpbPxg # 51Tbnio1lB93079WPFnYaOvfGAA0e0zcfF/M9gXr+korwQTh2Prqooq2bYNMvUoU # KD85gnJ+t0smrWrb8dee2CvYZXD5laGtaAxOfy/VKNmwuWuAh9kcMYIV0jCCFc4C # AQEwaDBUMQswCQYDVQQGEwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSsw # KQYDVQQDEyJTZWN0aWdvIFB1YmxpYyBDb2RlIFNpZ25pbmcgQ0EgUjM2AhAdKag9 # tzXxH+28450UpdEHMA0GCWCGSAFlAwQCAQUAoGowGQYJKoZIhvcNAQkDMQwGCisG # AQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARYwLwYJKoZIhvcN # AQkEMSIEICOScjgT4pReYZMKcfpaBYnTowjZebo9MvrPLlxouS6HMA0GCSqGSIb3 # DQEBAQUABIIBgL7E8IzSWi5kY5A20NytuRDWV+StIG7ec783PnSlDBw09FHjVmlU # PkYx6jgr2LFH6VRKLg+CradTX3oPYRIQZ9Wpz8lRX7oc2OlKbvMLxXcM800O1SLN # YNX5qo6ShtUxMhCmm5ysZtgmwqnX7dWO6m2QC91/T3o1PVbvhLd7BOIh0d4uslAh # /t0AP6O5wX0BdBe6hGBKv56fn5c+NFG5XCYAaphzVDP63iFFXO00aJF/N0kdv6Y2 # E4PrDr3exKLoLc9qp1Atvc4t1Yf/El194wC1z4fS5Au4phL12tOViR9bbfS+RrXh # uiQCrlo57+7xM1z9x824lDlCgWmHYEpqlaFqPz8cMkK5N9t40sOyu2EYD5zPd4Vh # e0yZJ31q43pbODCjiuyeu9ninCQRz6HrGLeJTp7AiUkk+LUk6Njo5nA5KTWDzKxr # jzVdjVbt3u3pDdR0wfrp31qHWZlAueHsrBSpMx6G58/PwAfV1qkAWf1HyqjUCpx0 # WfAadNBojM0BcaGCE08wghNLBgorBgEEAYI3AwMBMYITOzCCEzcGCSqGSIb3DQEH # AqCCEygwghMkAgEDMQ8wDQYJYIZIAWUDBAICBQAwgfAGCyqGSIb3DQEJEAEEoIHg # BIHdMIHaAgEBBgorBgEEAbIxAgEBMDEwDQYJYIZIAWUDBAIBBQAEIFosBvvsS9f2 # YfHOjk7JAFzqTGXz2q8fHBPQB7acZNb4AhUAjZLXqmbFGVZpCIjO2Attcp7bfzgY # DzIwMjMwNTI0MDM0NDM3WqBupGwwajELMAkGA1UEBhMCR0IxEzARBgNVBAgTCk1h # bmNoZXN0ZXIxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDEsMCoGA1UEAwwjU2Vj # dGlnbyBSU0EgVGltZSBTdGFtcGluZyBTaWduZXIgIzSggg3pMIIG9TCCBN2gAwIB # AgIQOUwl4XygbSeoZeI72R0i1DANBgkqhkiG9w0BAQwFADB9MQswCQYDVQQGEwJH # QjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3Jk # MRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMTHFNlY3RpZ28gUlNB # IFRpbWUgU3RhbXBpbmcgQ0EwHhcNMjMwNTAzMDAwMDAwWhcNMzQwODAyMjM1OTU5 # WjBqMQswCQYDVQQGEwJHQjETMBEGA1UECBMKTWFuY2hlc3RlcjEYMBYGA1UEChMP # U2VjdGlnbyBMaW1pdGVkMSwwKgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1w # aW5nIFNpZ25lciAjNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKST # KFJLzyeHdqQpHJk4wOcO1NEc7GjLAWTkis13sHFlgryf/Iu7u5WY+yURjlqICWYR # FFiyuiJb5vYy8V0twHqiDuDgVmTtoeWBIHIgZEFsx8MI+vN9Xe8hmsJ+1yzDuhGY # HvzTIAhCs1+/f4hYMqsws9iMepZKGRNcrPznq+kcFi6wsDiVSs+FUKtnAyWhuzjp # D2+pWpqRKBM1uR/zPeEkyGuxmegN77tN5T2MVAOR0Pwtz1UzOHoJHAfRIuBjhqe+ # /dKDcxIUm5pMCUa9NLzhS1B7cuBb/Rm7HzxqGXtuuy1EKr48TMysigSTxleGoHM2 # K4GX+hubfoiH2FJ5if5udzfXu1Cf+hglTxPyXnypsSBaKaujQod34PRMAkjdWKVT # pqOg7RmWZRUpxe0zMCXmloOBmvZgZpBYB4DNQnWs+7SR0MXdAUBqtqgQ7vaNeree # da/TpUsYoQyfV7BeJUeRdM11EtGcb+ReDZvsdSbu/tP1ki9ShejaRFEqoswAyodm # Q6MbAO+itZadYq0nC/IbSsnDlEI3iCCEqIeuw7ojcnv4VO/4ayewhfWnQ4XYKzl0 # 21p3AtGk+vXNnD3MH65R0Hts2B0tEUJTcXTC5TWqLVIS2SXP8NPQkUMS1zJ9mGzj # d0HI/x8kVO9urcY+VXvxXIc6ZPFgSwVP77kv7AkTAgMBAAGjggGCMIIBfjAfBgNV # HSMEGDAWgBQaofhhGSAPw0F3RSiO0TVfBhIEVTAdBgNVHQ4EFgQUAw8xyJEqk71j # 89FdTaQ0D9KVARgwDgYDVR0PAQH/BAQDAgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0l # AQH/BAwwCgYIKwYBBQUHAwgwSgYDVR0gBEMwQTA1BgwrBgEEAbIxAQIBAwgwJTAj # BggrBgEFBQcCARYXaHR0cHM6Ly9zZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQCMEQG # A1UdHwQ9MDswOaA3oDWGM2h0dHA6Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JT # QVRpbWVTdGFtcGluZ0NBLmNybDB0BggrBgEFBQcBAQRoMGYwPwYIKwYBBQUHMAKG # M2h0dHA6Ly9jcnQuc2VjdGlnby5jb20vU2VjdGlnb1JTQVRpbWVTdGFtcGluZ0NB # LmNydDAjBggrBgEFBQcwAYYXaHR0cDovL29jc3Auc2VjdGlnby5jb20wDQYJKoZI # hvcNAQEMBQADggIBAEybZVj64HnP7xXDMm3eM5Hrd1ji673LSjx13n6UbcMixwSV # 32VpYRMM9gye9YkgXsGHxwMkysel8Cbf+PgxZQ3g621RV6aMhFIIRhwqwt7y2opF # 87739i7Efu347Wi/elZI6WHlmjl3vL66kWSIdf9dhRY0J9Ipy//tLdr/vpMM7G2i # DczD8W69IZEaIwBSrZfUYngqhHmo1z2sIY9wwyR5OpfxDaOjW1PYqwC6WPs1gE9f # KHFsGV7Cg3KQruDG2PKZ++q0kmV8B3w1RB2tWBhrYvvebMQKqWzTIUZw3C+NdUwj # wkHQepY7w0vdzZImdHZcN6CaJJ5OX07Tjw/lE09ZRGVLQ2TPSPhnZ7lNv8wNsTow # 0KE9SK16ZeTs3+AB8LMqSjmswaT5qX010DJAoLEZKhghssh9BXEaSyc2quCYHIN1 # 58d+S4RDzUP7kJd2KhKsQMFwW5kKQPqAbZRhe8huuchnZyRcUI0BIN4H9wHU+C4R # zZ2D5fjKJRxEPSflsIZHKgsbhHZ9e2hPjbf3E7TtoC3ucw/ZELqdmSx813UfjxDE # lOZ+JOWVSoiMJ9aFZh35rmR2kehI/shVCu0pwx/eOKbAFPsyPfipg2I2yMO+AIcc # q/pKQhyJA9z1XHxw2V14Tu6fXiDmCWp8KwijSPUV/ARP380hHHrl9Y4a1LlAMIIG # 7DCCBNSgAwIBAgIQMA9vrN1mmHR8qUY2p3gtuTANBgkqhkiG9w0BAQwFADCBiDEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNl # eSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMT # JVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTkwNTAy # MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjB9MQswCQYDVQQGEwJHQjEbMBkGA1UECBMS # R3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9T # ZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMTHFNlY3RpZ28gUlNBIFRpbWUgU3RhbXBp # bmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDIGwGv2Sx+iJl9 # AZg/IJC9nIAhVJO5z6A+U++zWsB21hoEpc5Hg7XrxMxJNMvzRWW5+adkFiYJ+9Uy # UnkuyWPCE5u2hj8BBZJmbyGr1XEQeYf0RirNxFrJ29ddSU1yVg/cyeNTmDoqHvzO # WEnTv/M5u7mkI0Ks0BXDf56iXNc48RaycNOjxN+zxXKsLgp3/A2UUrf8H5VzJD0B # KLwPDU+zkQGObp0ndVXRFzs0IXuXAZSvf4DP0REKV4TJf1bgvUacgr6Unb+0ILBg # frhN9Q0/29DqhYyKVnHRLZRMyIw80xSinL0m/9NTIMdgaZtYClT0Bef9Maz5yIUX # x7gpGaQpL0bj3duRX58/Nj4OMGcrRrc1r5a+2kxgzKi7nw0U1BjEMJh0giHPYla1 # IXMSHv2qyghYh3ekFesZVf/QOVQtJu5FGjpvzdeE8NfwKMVPZIMC1Pvi3vG8Aij0 # bdonigbSlofe6GsO8Ft96XZpkyAcSpcsdxkrk5WYnJee647BeFbGRCXfBhKaBi2f # A179g6JTZ8qx+o2hZMmIklnLqEbAyfKm/31X2xJ2+opBJNQb/HKlFKLUrUMcpEmL # QTkUAx4p+hulIq6lw02C0I3aa7fb9xhAV3PwcaP7Sn1FNsH3jYL6uckNU4B9+rY5 # WDLvbxhQiddPnTO9GrWdod6VQXqngwIDAQABo4IBWjCCAVYwHwYDVR0jBBgwFoAU # U3m/WqorSs9UgOHYm8Cd8rIDZsswHQYDVR0OBBYEFBqh+GEZIA/DQXdFKI7RNV8G # EgRVMA4GA1UdDwEB/wQEAwIBhjASBgNVHRMBAf8ECDAGAQH/AgEAMBMGA1UdJQQM # MAoGCCsGAQUFBwMIMBEGA1UdIAQKMAgwBgYEVR0gADBQBgNVHR8ESTBHMEWgQ6BB # hj9odHRwOi8vY3JsLnVzZXJ0cnVzdC5jb20vVVNFUlRydXN0UlNBQ2VydGlmaWNh # dGlvbkF1dGhvcml0eS5jcmwwdgYIKwYBBQUHAQEEajBoMD8GCCsGAQUFBzAChjNo # dHRwOi8vY3J0LnVzZXJ0cnVzdC5jb20vVVNFUlRydXN0UlNBQWRkVHJ1c3RDQS5j # cnQwJQYIKwYBBQUHMAGGGWh0dHA6Ly9vY3NwLnVzZXJ0cnVzdC5jb20wDQYJKoZI # hvcNAQEMBQADggIBAG1UgaUzXRbhtVOBkXXfA3oyCy0lhBGysNsqfSoF9bw7J/Ra # oLlJWZApbGHLtVDb4n35nwDvQMOt0+LkVvlYQc/xQuUQff+wdB+PxlwJ+TNe6qAc # Jlhc87QRD9XVw+K81Vh4v0h24URnbY+wQxAPjeT5OGK/EwHFhaNMxcyyUzCVpNb0 # llYIuM1cfwGWvnJSajtCN3wWeDmTk5SbsdyybUFtZ83Jb5A9f0VywRsj1sJVhGbk # s8VmBvbz1kteraMrQoohkv6ob1olcGKBc2NeoLvY3NdK0z2vgwY4Eh0khy3k/ALW # PncEvAQ2ted3y5wujSMYuaPCRx3wXdahc1cFaJqnyTdlHb7qvNhCg0MFpYumCf/R # oZSmTqo9CfUFbLfSZFrYKiLCS53xOV5M3kg9mzSWmglfjv33sVKRzj+J9hyhtal1 # H3G/W0NdZT1QgW6r8NDT/LKzH7aZlib0PHmLXGTMze4nmuWgwAxyh8FuTVrTHurw # ROYybxzrF06Uw3hlIDsPQaof6aFBnf6xuKBlKjTg3qj5PObBMLvAoGMs/FwWAKjQ # xH/qEZ0eBsambTJdtDgJK0kHqv3sMNrxpy/Pt/360KOE2See+wFmd7lWEOEgbsau # sfm2usg1XTN2jvF8IAwqd661ogKGuinutFoAsYyr4/kKyVRd1LlqdJ69SK6YMYIE # LDCCBCgCAQEwgZEwfTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFu # Y2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1p # dGVkMSUwIwYDVQQDExxTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIENBAhA5TCXh # fKBtJ6hl4jvZHSLUMA0GCWCGSAFlAwQCAgUAoIIBazAaBgkqhkiG9w0BCQMxDQYL # KoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkFMQ8XDTIzMDUyNDAzNDQzN1owPwYJKoZI # hvcNAQkEMTIEMEoC6sL8on3jASCeMtbiYw4lUG3whgJh+49TdV5otT6Aq9IbIQOp # 0ycfBG7PPpbTCjCB7QYLKoZIhvcNAQkQAgwxgd0wgdowgdcwFgQUrmKvdQoMvUfW # Rh91aOK8jOfKT5QwgbwEFALWW5Xig3DBVwCV+oj5I92Tf62PMIGjMIGOpIGLMIGI # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKTmV3IEplcnNleTEUMBIGA1UEBxMLSmVy # c2V5IENpdHkxHjAcBgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0d29yazEuMCwGA1UE # AxMlVVNFUlRydXN0IFJTQSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eQIQMA9vrN1m # mHR8qUY2p3gtuTANBgkqhkiG9w0BAQEFAASCAgBuCgrbhCKJBRMXA+rIbwncz7Lw # TyhtqbPVaWtQRW6/OyaXrgUcYITBQGERDdFb7e9T1xcmNX8sZnRTOPO2X1QKVXQ9 # EO8gz8wfbGqTcbq0gp5GxxuZCWOSYBEgNLfEWuhD+N1BW9gVgaEdqv5XmmgGpoSu # UTK0IWhJNmxYwLLBeEuUuFlsGzkyh1fGvd9m+Qf0GtpgWG81nW1WNzFZNCmJOnPy # ejVdHrtn1uB4S9KLek2o6Blu8OhNzlZURPAtMfkisiPOZy8b8IQ4TG1WwuYdapFB # T806LzMpQPRJ9o+lgvvCP25YDFogNOM/9AULX6TSr+aDjFkUG+bg/Dv7x20oNKxM # RC6UOVbwgv22jn1O74bGmFvwFBCrfIANC7YSfI3P9H0Rlm1RPnyXBdYo6GYVJn6i # c7EcuLxBvRINmHWddMtpSNd1rpGhaV/3xr/55/6mYSqzt/qHQbTxxMDSlE3fR676 # R9Ge2hJDCf+h9EXIEViIFleIAUX/SFYTiR7s9GquYIey0YCT+47ACs6xkOQuoMZJ # APyEb99iKcipAxWffkw40OxJUs2IWwptWKTlwO7yTBlSa5fxEYpzbm4A3JzWTOOh # AHkJG/ikZ/ZGlkcIJ/9Ahm8HbpsTN1unrxCkWE9mSmqGdVZb+Gs/nEgNtUAAbCoY # YpXEzsHyPXfPCqUyxw== # SIG # End signature block
combined_dataset/train/non-malicious/504.ps1
504.ps1
function Disable-UserAccessControl{ [CmdletBinding()] param( ) Set-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" -Name "ConsentPromptBehaviorAdmin" -Value 00000000 if(Get-ItemProperty -Path "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system" -Name "EnableLUA" -ErrorAction SilentlyContinue){ Set-ItemProperty "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system" -Name "EnableLUA" -Value 00000000 } Write-Host "User Access Control (UAC) has been disabled. Reboot required." }
combined_dataset/train/non-malicious/sample_54_84.ps1
sample_54_84.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis The operation to create or update a virtual hard disk. Please note some properties can be set only during virtual hard disk creation. .Description The operation to create or update a virtual hard disk. Please note some properties can be set only during virtual hard disk creation. .Outputs Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Models.IVirtualHardDisks .Link https://learn.microsoft.com/powershell/module/az.stackhcivm/new-azstackhcivmvirtualharddisk #> function New-AzStackHCIVMVirtualHardDisk { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Models.IVirtualHardDisks])] [CmdletBinding(PositionalBinding=$false,SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter(Mandatory)] [Alias('VirtualHardDiskName')] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Path')] [System.String] # Name of the virtual hard disk. # Must contain all alphanumeric characters or ‘-’ or ‘_’. Max length is 80 characters, and min length is 1 character. ${Name}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] # The ID of the target subscription. ${SubscriptionId}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Body')] [System.String] # The geo-location where the resource lives ${Location}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Body')] [System.Int32] # The block size, in bytes, of the virtual hard disk. ${BlockSizeByte}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Body')] [System.String] # Storage ContainerID of the storage container to be used for VHD ${StoragePathId}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Body')] [System.String] # Storage Container Name to be used for the VHD ${StoragePathName}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Body')] [System.String] # Storage Container resource group. The resource group of the virtual hard disk will be used if this value is not provided. ${StoragePathResourceGroup}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Body')] [System.String] # The ARM Id of the extended location to create virtual hard disk resource in. ${CustomLocationId}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.PSArgumentCompleterAttribute("vhdx", "vhd")] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Body')] # The format of the actual VHD file [vhd, vhdx] ${DiskFileFormat}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Body')] [System.Int64] # Size of the disk in GB ${SizeGb}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Body')] [System.Management.Automation.SwitchParameter] # Boolean for enabling dynamic sizing on the virtual hard disk ${Dynamic}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.PSArgumentCompleterAttribute("V1", "V2")] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Body')] # The hypervisor generation of the Virtual Machine [V1, V2] ${HyperVGeneration}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Body')] [System.Int32] # Logical Sector Bytes of the Disk ${LogicalSectorByte}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Body')] [System.Int32] # Physical Sector Bytes of the Disk ${PhysicalSectorByte}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Models.ITrackedResourceTags]))] [System.Collections.Hashtable] # Resource tags. ${Tag}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command as a job ${AsJob}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command asynchronously ${NoWait}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.StackHCIVM.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) if (-Not ($Name -match $vhdNameRegex)){ Write-Error "Invalid Name: $Name. The name must contain all alphanumeric characters or '-' or '_'. The max length is 80 characters." -ErrorAction Stop } if ($CustomLocationId -notmatch $customLocationRegex){ Write-Error "Invalid CustomLocationId: $CustomLocationId" -ErrorAction Stop } if ($DiskFileFormat){ if ($DiskFileFormat.ToString().ToLower() -ne "vhd" -and $DiskFileFormat.ToString().ToLower() -ne "vhdx"){ Write-Error "Invalid disk file format provided. Allowed values are 'vhd' and 'vhdx'. " -ErrorAction Stop } } if ($LogicalSectorByte){ if ($LogicalSectorByte -ne 512 -and $LogicalSectorByte -ne 4096){ Write-Error "Invalid value for logical sector bytes provided. Allowed values are 512 and 4096. " -ErrorAction Stop } } if ($PhysicalSectorByte){ if ($PhysicalSectorByte -ne 512 -and $PhysicalSectorByte -ne 4096){ Write-Error "Invalid value for physical sector bytes provided. Allowed values are 512 and 4096'. " -ErrorAction Stop } } if ($SizeGb){ if ($SizeGb -gt 4095){ Write-Error "Maximum value for $SizeGb is 4095." -ErrorAction Stop } } if($StoragePathId){ if (-Not ($StoragePathId -match $storagePathRegex)){ Write-Error "Invalid resource ID provided for storage path $StoragePathId " -ErrorAction Stop } } elseif ($StoragePathName){ if ($StoragePathResourceGroup){ $StoragePathId = "/subscriptions/$SubscriptionId/resourceGroups/$StoragePathResourceGroup/providers/Microsoft.AzureStackHCI/storagecontainers/$StoragePathName" } else { $StoragePathId= "/subscriptions/$SubscriptionId/resourceGroups/$ResourceGroupName/providers/Microsoft.AzureStackHCI/storagecontainers/$StoragePathName" } $PSBoundParameters.Add('StoragePathId', $StoragePathId) $null = $PSBoundParameters.Remove("StoragePathName") $null = $PSBoundParameters.Remove("StoragePathResourceGroup") } try{ Az.StackHCIVM.internal\New-AzStackHCIVMVirtualHardDisk -ErrorAction Stop @PSBoundParameters } catch { $e = $_ if ($e.FullyQualifiedErrorId -match "MissingAzureKubernetesMapping" ){ Write-Error "An older version of the Arc VM cluster extension is installed on your cluster. Please downgrade the Az.StackHCIVm version to 1.0.1 to proceed." -ErrorAction Stop } else { Write-Error $e.Exception.Message -ErrorAction Stop } } } # SIG # Begin signature block # MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDreqHiNjCcEqIg # SyK6XixEXQDZ/r4+cUYG7fe/bMaHWaCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIaQ # CL0tGX3PDL7w+GjXFISL4e/m6E6Ye3oFq4ZNohmzMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAr04pCclGYhkcdP+L5kSEVkOrEPbwnY5zN4ez # hiH0vW2YG9V51qUCB1TWJ/7rxgZTHe837U4JSgKm1z10mxP4KaJY52evY1knxFTC # v74GemGLDnuxUrZmuzPUk28+/Gjwd/xxJd4ORcnAdcB64DJ/EN8QxtmfBt+ybxoK # 3UbRRPLVC99NG+QKj9+RTd6ycJmu7CxTfGnpElQhyVxapTmaRYUNx0SMTRHsRSdJ # lqq180nPiaCPciO+hlpE5CESDpbIm3Oe93V2TkIy9RBW4x3ZhDNE38j7+i6E/7Ja # dWVZLs79EK6E67tcM/Oms0UvaobFpV6Gp4IuP5lHX6zjKoXUUqGCF5cwgheTBgor # BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAC8pI+YeAot+K/LaCF1EbCvdx5hQS9UA26 # EQ0fH6xqxQIGZjK/xO9nGBMyMDI0MDUxNjA2NDIxMS44OThaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQAB # AAAB8zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ2MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngq # YAb+z3IfzNpZIWS/sgfXhlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz # 8zcn1aUD5D2r2PhzVKjHtivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVo # mOybQ7+2jc4afzj2XJQQSmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiI # YlGf+XV2u6oQHAkMG56xYPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxc # QGXjnAgeeVbbPbAoELhbw+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3x # uw3R7fJsqe7pqsnjwvniP7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE # 71EYrcSNrOGlTm5uqq+syO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxL # CSzqXOVOzdqA8O5Xa3E41j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJ # wBj2FQgTiVHacvMQDgSA7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wF # kBrf2Sjn+ieNq6Fx0tWj8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+ # cwdJ39REU43aWCwn0C+XxwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEM # jA3ApoUx9qDrDQokMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc # 3liO4c7nXM/UKFcAm5w61FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15 # j7q8e6elg8/cD3bv0sW4Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2s # gAUh7+OZnb9TwJE7pbEBPJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaA # GooT4A15/7oNj9zyzRABTUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0 # SZ8Zq65iK2hQ8IMAOVxewCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B # 7E2odVfs6H2EYCZxUS1rgReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQ # n5IzhfCkraT1KnZF8TI3ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9v # ErDVBDRMjGsE/HqqY7QTSTtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5 # aOa31FyCM17/pPTIKTRiKsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJ # IcqopVAwdbNdroZi2HN8nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc0 # 5DW8JNvZ328Jps3LJCALt0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQBu+gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e8JcjAi # GA8yMDI0MDUxNTEwMTQxMFoYDzIwMjQwNTE2MTAxNDEwWjB3MD0GCisGAQQBhFkK # BAExLzAtMAoCBQDp7wlyAgEAMAoCAQACAhwfAgH/MAcCAQACAhK7MAoCBQDp8Fry # AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh # CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAKr1B/rLMsdEgXnXDh5Ie+HB # Kw4SvHEicuCL/PcvkybJxi0a/BBFfOY2z6SPDMitqmzQ9fWRBbA1L/qMqS2/QCTy # C/SlgJr6jyPJqMdksnvmWbW4vBigqIZxb7a0zAcQiCWsQFH5wu30w7O6390PzNrO # EJ/xTdGO1e7ypgQA0f8/Zqp4AxkPMQ9PT+q3bQdyBJNNdBrUV39ysRxw6uYCm93Y # 1fK1F14UIOPsZ0G1o5AyrdgfJ6PsJEenttQ+yQF6t41fZYQRD9mj8WEij61kJ7Yi # UPO8RlNaTVvt8C86L3PtBJUen48Qz35tPpT4LO0lWPwdS+sqjv6Fi633rVOhbvsx # ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA # AfPFCkOuA8wdMQABAAAB8zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD # MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCAJCvcMQpCkZwnHzv/6NZuH # sFKEl2RbbH0mTUK+MjI2qTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi8 # 2TSLtuG4Vkp8wBmJk/T+RAh841sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQg2cCr # DQIdbsf0+tyBTTuQrs/4PYHMxi7QbHuul90FSlYwDQYJKoZIhvcNAQELBQAEggIA # Kl78r9x/wvfaZeGDZBN2J8/jjDtuWTlvXM6m510773Kpz9hPvQ0TvhNciPbKWVmv # zY67jG3FCkvMMsvmb/dkb/ABSh6tVZxb85nzIXugGH6zsggUAnV7ZvS58UE+wNs6 # kWuzkgj2aJj0aaB6z3Xcu1gqNI18zWRgLzACihC1A13qAxlQF4VVllg3dPVma9OI # fVJyADtAp3dODSItMjcOMUYB0Nu/HebojRLFRXkYwZtccVcxDwD+IEWdLWov4F7O # cTSjHxKTvcBCSqylLFBfebvabmIKdLzXLdVc3bv5cDcayocGSOwDVv/4PkZAQOG9 # 759UZtAaBE5q3m9K/FACoIBru0vHJ0BLWnoN+jAL+RWgq9Zy3cnL6oaX7K8TPYjF # PtSZx3Mgw2V5jJDbTcbYv4OiwEWqCJjIiZ+ikN7ysG94ORV7NTUzqoSG3qVl5C5w # a72n6CL1QJVD47YkohH4SKx8P0okAtC0tuQ1WKnd0gJkOhd2Js2jsFPNivwIIEz5 # 2gfdriGdyhQlNxTnPzHPMs2a4ut8syDJi6bqfvP+4JTNIogCiJFgewNbBDDrZLcj # UPqexta4Yuxs8isPngIBjR4DlqVmLrpQtOQ4aQtpbPdUtHZpX4bP3C+3igTJWvXt # RXdiV2n/ef5K0aizMy5vprssb8aRpYd5pYjmeGigZuw= # SIG # End signature block
combined_dataset/train/non-malicious/sample_15_27.ps1
sample_15_27.ps1
########################################################### # # 'ServiceHelper' module # ########################################################### $ErrorActionPreference = 'Stop' Set-StrictMode -Version Latest $global:GCServiceName = "GCService" $script:GCServiceBinaryName = "gc_service.exe" $script:GCServiceDisplayName = "Guest Configuration Service" $script:GCServiceDescription = "This service monitors desired state of the machine." $global:GCArcServiceName = "GCArcService" $script:GCArcServiceBinaryName = "gc_arc_service.exe" $script:GCArcServiceDisplayName = "Guest Configuration Arc Service" $script:GCArcServiceDescription = "This service monitors desired state of the machine." $global:ExtServiceName = "ExtensionService" $script:ExtServiceBinaryName = "gc_extension_service.exe" $script:ExtDisplayName = "Guest Configuration Extension service" $script:ExtDescription = "The service installs the requested extensions" $script:GCInstallPath = "$PSScriptRoot\..\..\.." $script:GCBinariesFolderName = "GC" $script:MigratedDataFolderName = "MigratedData" $script:GCBinariesPath = Join-Path $script:GCInstallPath $script:GCBinariesFolderName <# .SYNOPSIS Install GC Service. By default it calculates the GC Service Binary Path based on this GC Install Module location. .Example Install-ServiceInternal #> Function Install-ServiceInternal { [CmdletBinding()] Param( [Parameter()] [string] $ServiceType = "GC" ) Write-Verbose -Message "In Install-ServiceInternal" if ($ServiceType -eq "GC" -and (CheckServiceExists($global:GCServiceName))) { Write-Error "GC service already exists, can not install new service" } elseif ($ServiceType -eq "Extension" -and (CheckServiceExists($global:ExtServiceName))) { Write-Error "Extension service already exists, can not install new service" } elseif ($ServiceType -eq "GCArc" -and (CheckServiceExists($global:GCArcServiceName))) { Write-Error "GC Arc service already exists, can not install new service" } else { # Default values for GC Azure Service $serviceName = $global:GCServiceName $serviceBinaryName = $script:GCServiceBinaryName $displayName = $script:GCServiceDisplayName $description = $script:GCServiceDescription if ($ServiceType -eq "Extension") { $serviceName = $global:ExtServiceName $serviceBinaryName = $script:ExtServiceBinaryName $displayName = $script:ExtDisplayName $description = $script:ExtDescription } elseif ($ServiceType -eq "GCArc") { $serviceName = $global:GCArcServiceName $serviceBinaryName = $script:GCArcServiceBinaryName $displayName = $script:GCArcServiceDisplayName $description = $script:GCArcServiceDescription } $serviceBinaryPath = Join-Path $script:GCBinariesPath $serviceBinaryName $absolutePath = [System.IO.Path]::GetFullPath($serviceBinaryPath) Write-Verbose -Message "GC Service binary path : $absolutePath." $serviceApplication = Get-Command -Name $absolutePath -TotalCount 1 if ($serviceApplication.CommandType -ne "Application") { Write-Error "Service binary type is not as expected" } $servicePathWithQuotes = '"{0}"' -f $absolutePath $serviceBinaryPathCommand = $servicePathWithQuotes + " -k netsvcs" New-Service -Name $serviceName -BinaryPathName $serviceBinaryPathCommand -DisplayName $displayName -Description $description -StartupType Automatic $command = "sc.exe config $ServiceName start= delayed-auto" $Output = Invoke-Expression -Command $Command -ErrorAction Stop if ($LASTEXITCODE -ne 0) { Write-Warning "Failed to set $ServiceName to delayed start. More details: $Output" } else { Write-Verbose "Successfully changed $ServiceName service to delayed start" } # For windows 2008 R2 + sp1 start-process with -Wait parameter does not work. Hence sleep for 10 sec instead. $osVersion=[Environment]::OSVersion.Version if (($osVersion.Major -eq 6) -and ($osVersion.Minor -eq 1) -and ($osVersion.Build -le 7601)) { # configure recovery of the service during failure. $configureProcess = Start-Process sc.exe -ArgumentList "failure $serviceName reset= 30 actions= restart/10000/restart/20000/restart/30000" -PassThru Start-Sleep -Seconds 10 } else { # configure recovery of the service during failure. $configureProcess = Start-Process sc.exe -ArgumentList "failure $serviceName reset=30 actions=restart/10000/restart/20000/restart/30000" -PassThru -Wait } if ($null -eq $configureProcess) { Write-Error "Failed to start sc.exe process to configure $serviceName service." } # on 2008R2 ExitCode is not set. if (($configureProcess.ExitCode -ne 0) -and ($null -ne $configureProcess.ExitCode)) { Write-Warning "configuring service recovery options failed with exit-code:- $($configureProcess.ExitCode)" } Write-Verbose -Message "Successfully Installed new $serviceName." } Write-Verbose -Message "Validating $serviceName Properties." # Validate service Properties as returend by Get-Service. $serviceObject = Get-Service -Name $serviceName if ($serviceObject.Status -eq 'Stopped') { Write-Verbose -Message "$serviceName is in Stopped State." } else { Write-Error -Message "$serviceName is in unexpected state: $($serviceObject.Status)" } if ($serviceObject.CanPauseAndContinue -eq $false) { Write-Verbose -Message "$serviceName has correct CanPauseAndContinue State." } else { Write-Error -Message "$serviceName has unexpected CanPauseAndContinue: $($serviceObject.CanPauseAndContinue)" } if ($serviceObject.CanShutdown -eq $false) { Write-Verbose -Message "$serviceName has correct CanShutdown State." } else { Write-Error -Message "$serviceName has unexpected CanShutdown: $($serviceObject.CanShutdown)" } if ($serviceObject.CanStop -eq $false) { Write-Verbose -Message "$serviceName has correct CanStop State." } else { Write-Error -Message "$serviceName has unexpected CanStop: $($serviceObject.CanStop)" } if ($serviceObject.ServiceType -eq "Win32OwnProcess") { Write-Verbose -Message "$serviceName will run as Win32OwnProcess." } else { Write-Error -Message "$serviceName has unexpected ServiceType: $($serviceObject.ServiceType)" } # For windows 2008 R2 + sp1 Get-Service cmdlet does not populate StartType if ($serviceObject.PSObject.Properties['StartType']) { if ($serviceObject.StartType -eq "Automatic") { Write-Verbose -Message "$serviceName will be started Automatically." } else { Write-Warning -Message "$serviceName has unexpected StartType: $($serviceObject.StartType)" } } else { # Configure recovery of the service during failure. We need to look for the value of the start type because the type will be localized based on # the language of the machine. Since we're only looking for one startType: '(DELAYED)' we can just search for that and assume that if we can't # find it then it is configured incorrectly. $ServiceStartType = ([string](sc.exe qc $serviceName | Select-String '(DELAYED)')).Split(' ',[System.StringSplitOptions]::RemoveEmptyEntries)[-1] if ($ServiceStartType -imatch '(DELAYED)') { Write-Verbose -Message "$serviceName will be started Automatically." } else { Write-Warning -Message "$serviceName has unexpected StartType or the StartType cannot be found on the object. StartType: $ServiceStartType" } } # Also validate some service properties from the registry database of scm. $serviceRegistryData = Get-ItemProperty hklm:\SYSTEM\CurrentControlSet\Services\$serviceName if ($serviceRegistryData.ImagePath -eq $serviceBinaryPathCommand) { Write-Verbose -Message "$serviceName Binary is Installed Correctly." } else { Write-Error -Message "$serviceName binary is not Installed correctly: $($serviceRegistryData.ImagePath)" } if ($serviceRegistryData.ObjectName -eq "LocalSystem") { Write-Verbose -Message "$serviceName will run under LocalSystem Account." } else { Write-Error -Message "$serviceName has unexpected AccountType: $($serviceRegistryData.ObjectName)" } if ($ServiceType -eq "GC") { if ($serviceRegistryData.DisplayName -eq $script:GCServiceDisplayName) { Write-Verbose -Message "$serviceName has correct Display Name." } else { Write-Error -Message "$serviceName has unexpected DisplayName: $($serviceRegistryData.DisplayName)" } if ($serviceRegistryData.Description -eq $script:GCServiceDescription) { Write-Verbose -Message "$serviceName has correct Description Data." } else { Write-Error -Message "$serviceName has unexpected Description: $($serviceRegistryData.Description)" } } elseif ($ServiceType -eq "GCArc") { if ($serviceRegistryData.DisplayName -eq $script:GCArcServiceDisplayName) { Write-Verbose -Message "$serviceName has correct Display Name." } else { Write-Error -Message "$serviceName has unexpected DisplayName: $($serviceRegistryData.DisplayName)" } if ($serviceRegistryData.Description -eq $script:GCArcServiceDescription) { Write-Verbose -Message "$serviceName has correct Description Data." } else { Write-Error -Message "$serviceName has unexpected Description: $($serviceRegistryData.Description)" } } elseif ($ServiceType -eq "Extension") { if ($serviceRegistryData.DisplayName -eq $script:ExtDisplayName) { Write-Verbose -Message "$serviceName has correct Display Name." } else { Write-Error -Message "$serviceName has unexpected DisplayName: $($serviceRegistryData.DisplayName)" } if ($serviceRegistryData.Description -eq $script:ExtDescription) { Write-Verbose -Message "$serviceName has correct Description Data." } else { Write-Error -Message "$serviceName has unexpected Description: $($serviceRegistryData.Description)" } } } <# .Synopsis Get Guest Config data path. #> function Get-GuestConfigDataPath { [CmdletBinding()] param () return Join-Path $env:ProgramData 'GuestConfig' } <# .Synopsis Set Acl permissions on given path #> function Set-AclPermissions { [CmdletBinding()] Param ( [Parameter()] [string] $ServiceType, [Parameter()] [string] $Path ) try { Write-Verbose -Message "Attempting to set ACL permissions on the path '$Path' with PowerShell..." if ($ServiceType -eq 'GC') { Write-Verbose -Message "Using Get-Acl" $acl = Get-Acl $Path } else { # Ext deployment fails in azure with "[System.IO.DirectoryInfo] does not contain a method named 'GetAccessControl'" error # So we are calling this only for Hybrid scenarios. Write-Verbose -Message "Using Get-Item GetAccessControl" $acl = (Get-Item $Path).GetAccessControl('Access') } # Removing inherited access rules Write-Verbose -Message "Clearing existing ACL permissions" $acl.SetAccessRuleProtection($True, $False) # Adding new access rules for the target directory Write-Verbose -Message "Setting ACL permissions for the built-in Administrator" $BuiltinAdminSID = New-Object System.Security.Principal.SecurityIdentifier 'S-1-5-32-544' #Built-in Administrators SID $rule = New-Object System.Security.AccessControl.FileSystemAccessRule($BuiltinAdminSID, 'FullControl', 'ContainerInherit, ObjectInherit', 'None', 'Allow') $acl.AddAccessRule($rule) Set-Acl $Path $acl Write-Verbose -Message "Setting ACL permissions for the Local System" $BuiltinLocalSystemSID = New-Object System.Security.Principal.SecurityIdentifier 'S-1-5-18' #Local System SID $rule = New-Object System.Security.AccessControl.FileSystemAccessRule($BuiltinLocalSystemSID, 'FullControl', 'ContainerInherit, ObjectInherit', 'None', 'Allow') $acl.AddAccessRule($rule) Set-Acl $Path $acl Write-Verbose -Message "Suceeded setting ACL permissions with PowerShell" } catch { Write-Verbose -Message "Failed to set ACL permissions with PowerShell. Attempting with icacls..." # For windows 2008 R2 + sp1 start-process with -Wait parameter does not work. Hence sleep for 5 sec instead. $osVersion=[Environment]::OSVersion.Version if (($osVersion.Major -eq 6) -and ($osVersion.Minor -eq 1) -and ($osVersion.Build -le 7601)) { $processGrantAdminUserAccess = Start-Process icacls.exe -ArgumentList "$Path /grant *S-1-5-32-544:(OI)(CI)F" -PassThru $processGrantLocalSystemUserAccess = Start-Process icacls.exe -ArgumentList "$Path /grant *S-1-5-18:(OI)(CI)F" -PassThru Start-Sleep -Seconds 5 } else { $processGrantAdminUserAccess = Start-Process icacls.exe -ArgumentList "$Path /grant *S-1-5-32-544:(OI)(CI)F" -PassThru -Wait $processGrantLocalSystemUserAccess = Start-Process icacls.exe -ArgumentList "$Path /grant *S-1-5-18:(OI)(CI)F" -PassThru -Wait } if ($null -eq $processGrantAdminUserAccess) { Write-Error "Failed to start icacls.exe process to set Administrator user permission on $Path." } if ($null -eq $processGrantLocalSystemUserAccess) { Write-Error "Failed to start icacls.exe process to set LocalSystem user permission on $Path." } # on 2008R2 ExitCode is not set. if (($processGrantAdminUserAccess.ExitCode -ne 0) -and ($null -ne $processGrantAdminUserAccess.ExitCode)) { Write-Error "icacls.exe failed to set Administrator user permission on $Path. Exit code: $($processGrantAdminUserAccess.ExitCode)" } if (($processGrantLocalSystemUserAccess.ExitCode -ne 0) -and ($null -ne $processGrantLocalSystemUserAccess.ExitCode)) { Write-Error "icacls.exe failed to set LocalSystem user permission on $Path. Exit code: $($processGrantLocalSystemUserAccess.ExitCode)" } } } <# .SYNOPSIS Start the GC Service. Report Failure if service is not able to start. .Example Start-ServiceInternal #> Function Start-ServiceInternal { [CmdletBinding()] Param( [Parameter()] [string] $ServiceType = "GC" ) Write-Verbose -Message "In Start-ServiceInternal" if ($ServiceType -eq "GC") { $serviceName = $global:GCServiceName } elseif ($ServiceType -eq "GCArc") { $serviceName = $global:GCArcServiceName } elseif ($ServiceType -eq "Extension") { $serviceName = $global:ExtServiceName } # Start GC Timer Service, may be retry on failure. Start-Service $serviceName $serviceObject = Get-Service -Name $serviceName if ($serviceObject.Status -eq 'Running') { Write-Verbose -Message "$serviceName is running." } else { Write-Error "$serviceName can not be started." } } <# .SYNOPSIS Stop the GC service and then uninstall it. .Example Uninstall-ServiceInternal #> Function Uninstall-ServiceInternal { [CmdletBinding()] Param( [Parameter()] [string] $ServiceType = "GC" ) Write-Verbose -Message "In Uninstall-ServiceInternal" if ($ServiceType -eq "GC") { $serviceName = $global:GCServiceName } elseif ($ServiceType -eq "GCArc") { $serviceName = $global:GCArcServiceName } elseif ($ServiceType -eq "Extension") { $serviceName = $global:ExtServiceName } # Unregister GC Service $timeOut = [timespan]::FromMinutes(5) $stopRetry = [DateTime]::Now.Add($timeOut) $secondsBetweenRetry = 3 Stop-Service $serviceName -ErrorAction SilentlyContinue -ErrorVariable stopTimeError if (Get-Service $serviceName -ErrorAction SilentlyContinue) { if (Get-Service -Name $serviceName -ErrorAction SilentlyContinue) { while (((Get-Service -Name $serviceName).Status -ne 'Stopped') -and ([dateTime]::Now -le $stopRetry)) { Write-Verbose "Wait for service to stop" -Verbose Start-Sleep -Seconds $secondsBetweenRetry } } $serviceObject = Get-Service -Name $serviceName if ($serviceObject.Status -eq 'Stopped') { Write-Verbose -Message "$serviceName is stopped." sc.exe delete $serviceName } else { Write-Error "$serviceName can not be Uninstalled because we are not able to stop it." } } else { Write-Verbose "Service already stopped" -Verbose } # some basic validation to check service is Uninstalled. $serviceRegistryExists = Get-ItemProperty hklm:\SYSTEM\CurrentControlSet\Services\$serviceName -ErrorAction SilentlyContinue if ($serviceRegistryExists -ne $null) { # sometimes the registry clean up does not happen right away. Hence do retry for the check. while (($serviceRegistryExists -ne $null) -and ([dateTime]::Now -le $stopRetry)) { Start-Sleep -Seconds $secondsBetweenRetry $serviceRegistryExists = Get-ItemProperty hklm:\SYSTEM\CurrentControlSet\Services\$serviceName -ErrorAction SilentlyContinue } # if service registry entry still exist. if ($serviceRegistryExists -ne $null) { Write-Error "$serviceName is not Uninstalled correctly. Information is Present in Registry Database." } } $getService = Get-Service $serviceName -ErrorAction SilentlyContinue if ($getService -ne $null) { Write-Error "$serviceName is not Uninstalled correctly. Service is reporting status." } } Function CheckServiceExists { [CmdletBinding()] Param( [Parameter()] [string] $ServiceName = $global:GCServiceName ) if (Get-Service $serviceName -ErrorAction SilentlyContinue) { return $true } return $false } function Invoke-ScriptWithRetry { [CmdletBinding()] param( [Parameter(Mandatory = $true, Position = 0)] [ScriptBlock] $Script = {}, [Parameter()] [int] $RetryCount = 3 ) $results = $null $exceptionObject = $null $keepRetrying = $true Write-Verbose "Invoke-ScriptWithRetry:: Start time : $((Get-Date).ToString())" for($i = 0; (($i -lt $RetryCount) -and ($keepRetrying -eq $true)); $i++) { try { $exceptionObject = $null $results = Invoke-Command -ScriptBlock $Script $keepRetrying = $false } catch { Write-Verbose "Retry Count $i" Write-Warning "$_" $exceptionObject = $_ } try { # Processor utilization $processorObj = Get-WmiObject -Class win32_processor -ErrorAction SilentlyContinue if($processorObj -ne $null) { $cpuUsage = ($processorObj | Measure-Object -Property LoadPercentage -Average | Select-Object Average).Average Write-Verbose "CPU Usage : '$($cpuUsage)%'" } # Memory utilization $computerMemory = Get-WmiObject -Class win32_operatingsystem -ErrorAction SilentlyContinue if($computerMemory -ne $null) { $memory = ((($computerMemory.TotalVisibleMemorySize - $computerMemory.FreePhysicalMemory)*100)/ $computerMemory.TotalVisibleMemorySize) Write-Verbose "Memory Usage : '$($memory)%'" } } catch { Write-Warning "Failed to compute Memory/CPU usage. Error : $_" } } Write-Verbose "Invoke-ScriptWithRetry:: End time : $((Get-Date).ToString())" if($exceptionObject -ne $null) { throw $exceptionObject } return $results } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBI071bx7Qv02kc # Weh4vvZKzNcnYWFqPkN3/xZky5fV4aCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMssvOiwDaWmswar3r1SHuBO # B1NIyHWOe9fjKR9gTfsZMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAurqLR9T6TfXUUnbq0D8DlgzSkRKjA5KISDa2f0PwZG+KSm0utU/3cM0s # PZSIBF3ZaxG5wMQwXGiw+IDYGdcuUWpQuemVCZGkB9E6fkiVg1T58GuT2PASswuz # YQ/VDgV9MJdQ/m825LHBDPlFeQjM1vZfFOlphiyJljCFooSKFdhiqAm2VXGU/xDS # 7CSU7W9/BKJxw65rwTy6DKXnZWu4pv3nfjJhfmYspRiV9wwoOI5X4pZRGCEThHH1 # UmTMPx7N1mpCHY7RyZFnaKIFWER1PM41UiS5YvSwgzG1Axa67dvjw73TlR10T7AN # oxkK6BMxpzeFla9lKidN2Lnr22LGYqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDZ40uAzAE4DAso5cMHK4iVkMJ+i5WF6TROLzjWaY9kXAIGZh+2TAIE # GBMyMDI0MDQyMzAyMjQxMS41OTlaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHenkielp8oRD0AAQAAAd4wDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0LTRC # OTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB9ByF9UIDhA6xFrOniw/x # sDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SUIBkVQS0Ml6kR+TagkUPb # aEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWoKySY8/ROIKdpphgI7OJb # 4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3ynvwrS8/bcorANO6Djuysy # S9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2RC4odQcEPnY12jypYPnS # 6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9OmGo0S94Bxg3N/3aE6fU # bnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdSqf85FklCXIIkg4sm7nM9 # TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1G7nUD1pteuXvQp8fE1Kp # TjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++5Hyg/L68pe+DrZoZPXJa # GU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhyk/EebwuXVJY+rTyfbRfu # h9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlKIX5d3aQLo9fDda1ZTOw+ # XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUazAmbxseaapg # dxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAOKUwHsXDacGOvUI # gs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSuy+GsxiVHzkhMW+FqK8gr # uLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1XEUsXYOSJUPitY7E8bbld # mmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDiD28gAVGrPA3NykiSChvd # qS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+SQmI9VIayYsIGRjvelmNa # 0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMYhuWfWRSHZCKyIANA0aJL # 4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx78GqBKfylp25aOWJ/qPhC # +DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41FjgBg4m3OTFDGot5DSuVkQg # jku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6rrZM/PCwRG6girYmnTRLL # sicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg82/FMqCk9wK3LvyLAyDH # N+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqHdoNwQYROVm+ZX10RX3n6 # bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoy # QUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy22CJZExE2vOggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnRdFswIhgPMjAyNDA0MjMwNzQyMTlaGA8yMDI0MDQyNDA3NDIxOVowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6dF0WwIBADAHAgEAAgIP1DAHAgEAAgISDjAKAgUA # 6dLF2wIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAEJvaXp7B6ROIyclfeGn # 07zKDXR6j3SVyMoghjl4uaUoj81WJxX0deLVeJPyURtmjt81hVk2KWSjB0VOr021 # zUyWvsyxdVhVb7tPPKXiwtIRNqgzBqarwwym7mrG+PbmbV7A1+HUEMMjKI5J/owU # uFsNsJZTIa0ZOsOsKcJDwA+AMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0AAQAAAd4wDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgdfzur7AVtDTLBnrLM3o4Y0I4g1pq0E6S0VgkiPk3ISowgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCCOPiOfDcFeEBBJAn/mC3MgrT5w/U2z81LYD44Hc34d # ezCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3p5I # npafKEQ9AAEAAAHeMCIEIA5fJ/+nEdtN6jKLrCIbid59sN9SleZy9MT3WBZD8wBA # MA0GCSqGSIb3DQEBCwUABIICAENs2MCg8+cng7k/jp0ooitSOUsZrfVjM2pRjZRV # M+5fPpK6BBB583R1LR3jOqBy7u4CX7xwY5be7KwmPEMnapUOqFS//Rz0mK0n17oW # OavW1tEoVePTuehtCbeWgysfj3ymgdMoivrc2iRPkQ3GJ3Ml8zD9gj7Cn5QD5XEh # GUricSntojcXZEJrDqEOGI0sbbZ/78tRlkyxZleDGG5PquzGIbLB7Pc2bIYRL/kJ # 5kY5bcYkNNi8lH2D7m3w4mdjPReLVP5RgXzQwzZwW3FtnTZmqwioBexQb8AXva7N # ZIw8EtH40aRygBWLbPyJ13BGE/8UUEN/oGe4dbIqaYv6Y/mRvjWosn3XBUy2UmJh # KPSusjGllbdWs+pcVcOR7nrjrmFEP59nRjgYsmXAneTIGeLPzF0oV7zjbZIcg4wT # rBzvJuEu5crps83xuDmPQyCwS551ewc7o+hdLcTvjxLaF8w+XfhFTZYivp7Nlj1d # FCj9YZ4erEN3F37hT8EJSa/rTLPIqbD1Fzv3e9PIOrXJxI1ollaGUFipoQUr8PWE # OZIPLcBHlvX2M8yqQBApeGee1SYH3OFsxvPQSaCqePNN269sAcpcdaAOHMOC0LZu # kcH/UINYZPbtzP6fBhAN29Gk8/z/SpWZ4lomdUh+T9K7nifQQoRWzWdFUPDfT6mR # I/EN # SIG # End signature block
combined_dataset/train/non-malicious/4186.ps1
4186.ps1
Set-Variable -Name File -Scope Local -Force Function DeclareGlobalMemory { Set-Variable -Name Files -Scope Global -Force Set-Variable -Name RelativePath -Scope Global -Force } Function GlobalMemoryCleanup { Remove-Variable -Name Files -Scope Global -Force Remove-Variable -Name RelativePath -Scope Global -Force } Function RenameWindow ($Title) { Set-Variable -Name a -Scope Local -Force $a = (Get-Host).UI.RawUI $a.WindowTitle = $Title Remove-Variable -Name a -Scope Local -Force } Function GetRelativePath { $Global:RelativePath=(split-path $SCRIPT:MyInvocation.MyCommand.Path -parent)+"\" } Function GetFiles { $Global:Files = Get-ChildItem -Path $Global:RelativePath } Function CreateTempFolder ($FolderName) { $FolderName = "c:\temp\"+$FolderName New-Item -Path $FolderName -ItemType Directory -Force } Function RemoveTempFolder ($FolderName) { $FolderName = "c:\temp\"+$FolderName Remove-Item -Path $FolderName -Recurse -Force } Function ExtractCAB ($Name) { Set-Variable -Name arguments -Scope Local -Force Set-Variable -Name Dest -Scope Local -Force Set-Variable -Name Source -Scope Local -Force $Source = $Global:RelativePath+$Name $Dest = "c:\temp\"+$Name.Substring(0,$Name.Length-4) $arguments = "–F:*"+[char]32+$Source+[char]32+$Dest Start-Process -FilePath "expand.exe" -ArgumentList $arguments -Wait -PassThru Remove-Variable -Name arguments -Scope Local -Force Remove-Variable -Name Dest -Scope Local -Force Remove-Variable -Name Source -Scope Local -Force } Function ApplyWindowsUpdate ($Name) { Set-Variable -Name App -Scope Local -Force Set-Variable -Name arguments -Scope Local -Force Set-Variable -Name index -Scope Local -Force Set-Variable -Name Result -Scope Local -Force $App = $Name $index = $App.IndexOf("-KB")+1 $App = $App.Substring(0,$App.Length-4) $App = $App.Substring($index) Write-Host "Installing"$App"....." -NoNewline $arguments = $Global:RelativePath+$Name+[char]32+"/quiet /norestart" $Result = (Start-Process -FilePath "wusa.exe" -ArgumentList $arguments -Wait -PassThru).ExitCode If ($Result -eq "3010") { Write-Host "Succeeded" -ForegroundColor Yellow } else { Write-Host "Failed with error code"$Result -ForegroundColor Red } Remove-Variable -Name App -Scope Local -Force Remove-Variable -Name arguments -Scope Local -Force Remove-Variable -Name index -Scope Local -Force Remove-Variable -Name Result -Scope Local -Force } cls RenameWindow "Windows Updates" DeclareGlobalMemory GetRelativePath GetFiles foreach ($File in $Files) { if (($File.Attributes -ne "Directory") -and ($File.Name -like "*.msu")) { ApplyWindowsUpdate $File.Name } } GlobalMemoryCleanup Remove-Variable -Name File -Scope Local -Force
combined_dataset/train/non-malicious/1848.ps1
1848.ps1
$InternalGallery = "https://www.poshtestgallery.com/api/v2/" $InternalSource = 'OneGetTestSource' Describe "PackageManagement Acceptance Test" -Tags "Feature" { BeforeAll{ Register-PackageSource -Name Nugettest -provider NuGet -Location https://www.nuget.org/api/v2 -force Register-PackageSource -Name $InternalSource -Location $InternalGallery -ProviderName 'PowerShellGet' -Trusted -ErrorAction SilentlyContinue $SavedProgressPreference = $ProgressPreference $ProgressPreference = "SilentlyContinue" } AfterAll { $ProgressPreference = $SavedProgressPreference } It "get-packageprovider" { $gpp = Get-PackageProvider $gpp.Name | Should -Contain 'NuGet' $gpp.Name | Should -Contain 'PowerShellGet' } It "find-packageprovider PowerShellGet" { $fpp = (Find-PackageProvider -Name "PowerShellGet" -force).name $fpp | Should -Contain "PowerShellGet" } It "install-packageprovider, Expect succeed" { $ipp = (install-PackageProvider -name gistprovider -force -source $InternalSource -Scope CurrentUser).name $ipp | Should -Contain "gistprovider" } it "Find-package" { $f = Find-Package -ProviderName NuGet -Name jquery -source Nugettest $f.Name | Should -Contain "jquery" } it "Install-package" { $i = install-Package -ProviderName NuGet -Name jquery -force -source Nugettest -Scope CurrentUser $i.Name | Should -Contain "jquery" } it "Get-package" { $g = Get-Package -ProviderName NuGet -Name jquery $g.Name | Should -Contain "jquery" } it "save-package" { $s = save-Package -ProviderName NuGet -Name jquery -path $TestDrive -force -source Nugettest $s.Name | Should -Contain "jquery" } it "uninstall-package" { $u = uninstall-Package -ProviderName NuGet -Name jquery $u.Name | Should -Contain "jquery" } }
combined_dataset/train/non-malicious/sample_55_40.ps1
sample_55_40.ps1
#*************************************************** # modified version of tss_ChkSym.ps1 for usage in TSS # Version 1.0.1cmd.exe /c # Date: 7/15/2019 # Author: +waltere 2019.07.15, sabieler 2024.01.29 (TSS version) # Description: This file will use Checksym.exe to list all file versions on the local machine #*************************************************** PARAM($ChkSymRange="All", $ChkSymPrefix="_sym", $FolderName=$null, $FileMask=$null, $ChkSymSuffix=$null, $FileDescription = $null, $ChkSymOutFolder=$null, [switch] $Recursive, [switch] $SkipCheckSymExe) $ComputerName = $env:COMPUTERNAME $LogPrefix = "ChkSym" $ChkSymExe = $global:ChecksymExe $IsSkipChecksymExe = ($SkipCheckSymExe.IsPresent) if ($ChkSymOutFolder -and $ChkSymOutFolder[-1] -ne '\') { $ChkSymOutFolder += '\' } if (($Env:PROCESSOR_ARCHITECTURE -eq 'ARM') -and (-not($IsSkipChecksymExe))){ Logwarn 'Skipping running chksym executable since it is not supported in ' + $Env:PROCESSOR_ARCHITECTURE + ' architecture.' $IsSkipChecksymExe=$true } if($IsSkipChecksymExe){ Logwarn "External chksym executable not be used since $ChkSymExe does not exist" } $Error.Clear() | Out-Null # Import-LocalizedData -BindingVariable LocalsCheckSym -FileName DC_ChkSym # using psobject instead $LocalsCheckSym = New-Object PSObject Add-Member -InputObject $LocalsCheckSym -MemberType NoteProperty -Name 'ID_FileVersionInfo' -Value "File Version Information (ChkSym)" Trap [Exception] { $errorMessage = $_.Exception.Message $errorCode = $_.Exception.ErrorRecord.FullyQualifiedErrorId $line = $_.InvocationInfo.PositionMessage #"[DC_ChkSym] Error " + $errorCode + " on line " + $line + ": $errorMessage running dc_chksym.ps1" | WriteTo-StdOut -ShortFormat LogWarn "Error $errorCode on line $($line): $errorMessage running $global:ScriptsFolder\tss_ChkSym.ps1" $Error.Clear() | Out-Null } function GetExchangeInstallFolder{ If ((Test-Path "HKLM:SOFTWARE\Microsoft\ExchangeServer\v14") -eq $true){ [System.IO.Path]::GetDirectoryName((get-itemproperty HKLM:\SOFTWARE\Microsoft\ExchangeServer\v14\Setup).MsiInstallPath) } ElseIf ((Test-Path "HKLM:SOFTWARE\Microsoft\Exchange\v8.0") -eq $true) { [System.IO.Path]::GetDirectoryName((get-itemproperty HKLM:\SOFTWARE\Microsoft\Exchange\Setup).MsiInstallPath) } Else { $null } } function GetDPMInstallFolder{ if ((Test-Path "HKLM:SOFTWARE\Microsoft\Microsoft Data Protection Manager\Setup") -eq $true) { return [System.IO.Path]::GetDirectoryName((get-itemproperty HKLM:\SOFTWARE\Microsoft\Microsoft Data Protection Manager\Setup).InstallPath) } else { return $null } } Function FileExistOnFolder($PathToScan, $FileMask, [switch] $Recursive){ Trap [Exception] { $ErrorStd = "[FileExistOnFolder] The following error ocurred when checking if a file exists on a folder:`n" $errorMessage = $_.Exception.Message $errorCode = $_.Exception.ErrorRecord.FullyQualifiedErrorId $line = $_.InvocationInfo.PositionMessage # "$ErrorStd Error " + $errorCode + " on line " + $line + ": $errorMessage`n Path: $PathToScan`n FileMask: $FileMask" LogWarnFile "$ErrorStd Error $errorCode on line $($line): $errorMessage`n Path: $PathToScan`n FileMask: $FileMask" $error.Clear continue } $AFileExist = $false if (Test-Path $PathToScan) { foreach ($mask in $FileMask) { if ($AFileExist -eq $false) { if ([System.IO.Directory]::Exists($PathToScan)) { if ($Recursive.IsPresent) { $Files = [System.IO.Directory]::GetFiles($PathToScan, $mask,[System.IO.SearchOption]::AllDirectories) } else { $Files = [System.IO.Directory]::GetFiles($PathToScan, $mask,[System.IO.SearchOption]::TopDirectoryOnly) } $AFileExist = ($Files.Count -ne 0) } } } } return $AFileExist } Function GetAllRunningDriverFilePath([string] $DriverName){ $driversPath = "HKLM:System\currentcontrolset\services\"+$DriverName if(Test-Path $driversPath){ $ImagePath = (Get-ItemProperty ("HKLM:System\currentcontrolset\services\"+$DriverName)).ImagePath } if($null -eq $ImagePath){ $driversPath = "system32\drivers\"+$DriverName+".sys" $ImagePath = join-path $env:windir $driversPath if(-not(Test-Path $ImagePath)) { Loginfo "$($Driver.Name) not exist in the system32\drivers\" Red } } else{ if($ImagePath.StartsWith("\SystemRoot\")){ $ImagePath = $ImagePath.Remove(0,12) } elseif($ImagePath.StartsWith("\??\")){ $ImagePath = $ImagePath.Remove(0,14) } $ImagePath = join-path $env:windir $ImagePath } return $ImagePath } Function PrintTXTCheckSymInfo([PSObject]$OutPut, $StringBuilder, [switch]$S, [switch]$R){ if($null -ne $OutPut.Processes) { [void]$StringBuilder.Append("*******************************************************************************`r`n") [void]$StringBuilder.Append("[PROCESSES] - Printing Process Information for "+$OutPut.Processes.Count +" Processes.`r`n") [void]$StringBuilder.Append("[PROCESSES] - Context: System Process(es)`r`n") [void]$StringBuilder.Append("*******************************************************************************`r`n") Foreach($Process in $OutPut.Processes) { $Index = 1 [void]$StringBuilder.Append("-----------------------------------------------------------`r`n") [void]$StringBuilder.Append("Process Name ["+$Process.ProcessName.ToUpper()+".EXE] - PID="+$Process.Id +" - "+ $Process.Modules.Count +" modules recorded`r`n") [void]$StringBuilder.Append("-----------------------------------------------------------`r`n") foreach($mod in $Process.Modules) { if($null -ne $mod.FileName) { [void]$StringBuilder.Append("Module[ "+$Index+"] [" + $mod.FileName+"]`r`n") if($R.IsPresent) { $FileItem = Get-ItemProperty $mod.FileName [void]$StringBuilder.Append(" Company Name: " + $FileItem.VersionInfo.CompanyName +"`r`n") [void]$StringBuilder.Append(" File Description: " + $FileItem.VersionInfo.FileDescription +"`r`n") [void]$StringBuilder.Append(" Product Version: " + $FileItem.VersionInfo.ProductVersion+"`r`n") [void]$StringBuilder.Append(" File Version: " + $FileItem.VersionInfo.FileVersion+"`r`n") [void]$StringBuilder.Append(" File Size (bytes): " + $FileItem.Length+"`r`n") [void]$StringBuilder.Append(" File Date: " + $FileItem.LastWriteTime+"`r`n") } if($S.IsPresent) { } [void]$StringBuilder.Append("`r`n") $Index+=1 } } } } if($null -ne $OutPut.Drivers) { [void]$StringBuilder.Append("*******************************************************************************`r`n") [void]$StringBuilder.Append( "[KERNEL-MODE DRIVERS] - Printing Module Information for "+$OutPut.Drivers.Count +" Modules.`r`n") [void]$StringBuilder.Append( "[KERNEL-MODE DRIVERS] - Context: Kernel-Mode Driver(s)`r`n") [void]$StringBuilder.Append( "*******************************************************************************`r`n") $Index = 1 Foreach($Driver in $OutPut.Drivers) { $DriverFilePath = GetAllRunningDriverFilePath $Driver.Name [void]$StringBuilder.Append("Module[ "+$Index+"] [" + $DriverFilePath+"]`r`n") if($R.IsPresent) { $FileItem = Get-ItemProperty $DriverFilePath if(($null -ne $FileItem.VersionInfo.CompanyName) -and ($FileItem.VersionInfo.CompanyName -ne "")) { [void]$StringBuilder.Append(" Company Name: " + $FileItem.VersionInfo.CompanyName +"`r`n") } if(($null -ne $FileItem.VersionInfo.FileDescription) -and ($FileItem.VersionInfo.FileDescription.trim() -ne "")) { [void]$StringBuilder.Append(" File Description: " + $FileItem.VersionInfo.FileDescription +"`r`n") } if(($null -ne $FileItem.VersionInfo.ProductVersion) -and ($FileItem.VersionInfo.ProductVersion -ne "")) { [void]$StringBuilder.Append(" Product Version: " + $FileItem.VersionInfo.ProductVersion+"`r`n") } if(($null -ne $FileItem.VersionInfo.FileVersion) -and ($FileItem.VersionInfo.FileVersion -ne "")) { [void]$StringBuilder.Append(" File Version: " + $FileItem.VersionInfo.FileVersion+"`r`n" ) } [void]$StringBuilder.Append(" File Size (bytes): " + $FileItem.Length+"`r`n") [void]$StringBuilder.Append(" File Date: " + $FileItem.LastWriteTime+"`r`n") } if($S.IsPresent) { } [void]$StringBuilder.Append("`r`n") $Index+=1 } } if($null -ne $OutPut.Files) { [void]$StringBuilder.Append("*******************************************************************************`r`n") [void]$StringBuilder.Append("[FILESYSTEM MODULES] - Printing Module Information for "+$OutPut.Files.Count +" Modules.`r`n") [void]$StringBuilder.Append("[FILESYSTEM MODULES] - Context: Filesystem Modules`r`n") [void]$StringBuilder.Append("*******************************************************************************`r`n") $Index = 1 Foreach($File in $OutPut.Files) { [void]$StringBuilder.Append("Module[ "+$Index+"] [" + $File+"]`r`n") if($R.IsPresent) { $FileItem = Get-ItemProperty $File if(($null -ne $FileItem.VersionInfo.CompanyName) -and ($FileItem.VersionInfo.CompanyName -ne "")) { [void]$StringBuilder.Append(" Company Name: " + $FileItem.VersionInfo.CompanyName +"`r`n") } if(($null -ne $FileItem.VersionInfo.FileDescription) -and ($FileItem.VersionInfo.FileDescription.trim() -ne "")) { [void]$StringBuilder.Append(" File Description: " + $FileItem.VersionInfo.FileDescription +"`r`n") } if(($null -ne $FileItem.VersionInfo.ProductVersion) -and ($FileItem.VersionInfo.ProductVersion -ne "")) { [void]$StringBuilder.Append(" Product Version: " + $FileItem.VersionInfo.ProductVersion+"`r`n") } if(($null -ne $FileItem.VersionInfo.FileVersion) -and ($FileItem.VersionInfo.FileVersion -ne "")) { [void]$StringBuilder.Append(" File Version: " + $FileItem.VersionInfo.FileVersion+"`r`n" ) } [void]$StringBuilder.Append(" File Size (bytes): " + $FileItem.Length+"`r`n") [void]$StringBuilder.Append(" File Date: " + $FileItem.LastWriteTime+"`r`n") } if($S.IsPresent) { } [void]$StringBuilder.Append("`r`n") $Index+=1 } } } Function PrintCSVCheckSymInfo([PSObject]$OutPut, $StringBuilder, [switch]$S, [switch]$R){ [void]$StringBuilder.Append("Create:,"+[DateTime]::Now+"`r`n") [void]$StringBuilder.Append("Computer:,"+ $ComputerName+"`r`n`r`n") if($null -ne $OutPut.Processes) { [void]$StringBuilder.Append("[PROCESSES]`r`n") [void]$StringBuilder.Append(",Process Name,Process ID,Module Path,Symbol Status,Checksum,Time/Date Stamp,Time/Date String,Size Of Image,DBG Pointer,PDB Pointer,PDB Signature,PDB Age,Product Version,File Version,Company Name,File Description,File Size,File Time/Date Stamp (High),File Time/Date Stamp (Low),File Time/Date String,Local DBG Status,Local DBG,Local PDB Status,Local PDB`r`n") Foreach($Process in $OutPut.Processes) { if($null -ne $Process.Modules) { foreach($mod in $Process.Modules) { if($null -ne $mod.FileName) { [void]$StringBuilder.Append("," +$Process.Name+".EXE,"+$Process.Id+",") [void]$StringBuilder.Append( $mod.FileName+",") if($S.IsPresent) { [void]$StringBuilder.Append("SYMBOLS_PDB,,,,,,,,,") } else { [void]$StringBuilder.Append("SYMBOLS_No,,,,,,,,,") } if($R.IsPresent) { $FileItem = Get-ItemProperty $mod.FileName [void]$StringBuilder.Append( "("+$FileItem.VersionInfo.ProductVersion.Replace(",",".")+" ),("+$FileItem.VersionInfo.FileVersion.Replace(",",".")+" ),"+$FileItem.VersionInfo.CompanyName.Replace(",",".")+","+$FileItem.VersionInfo.FileDescription.Replace(",",".")+","+$FileItem.Length+",,,"+$FileItem.LastWriteTime+",,,,,`r`n") } else { [void]$StringBuilder.Append( ",,,,,,,,,,,,`r`n") } } } } } } if($null -ne $OutPut.Drivers) { [void]$StringBuilder.Append("[KERNEL-MODE DRIVERS]`r`n") [void]$StringBuilder.Append(",,,Module Path,Symbol Status,Checksum,Time/Date Stamp,Time/Date String,Size Of Image,DBG Pointer,PDB Pointer,PDB Signature,PDB Age,Product Version,File Version,Company Name,File Description,File Size,File Time/Date Stamp (High),File Time/Date Stamp (Low),File Time/Date String,Local DBG Status,Local DBG,Local PDB Status,Local PDB`r`n") Foreach($Driver in $OutPut.Drivers) { $DriverFilePath = GetAllRunningDriverFilePath $Driver.Name [void]$StringBuilder.Append(",,," +$DriverFilePath+",") if($S.IsPresent) { [void]$StringBuilder.Append("SYMBOLS_PDB,,,,,,,,,") } else { [void]$StringBuilder.Append("SYMBOLS_NO,,,,,,,,,") } if($R.IsPresent) { $DriverItem = Get-ItemProperty $DriverFilePath if($null -ne $DriverItem.VersionInfo.ProductVersion) { [void]$StringBuilder.Append("("+$DriverItem.VersionInfo.ProductVersion.Replace(",",".")+"),("+$DriverItem.VersionInfo.FileVersion.Replace(",",".")+"),"+$DriverItem.VersionInfo.CompanyName.Replace(",",".")+","+$DriverItem.VersionInfo.FileDescription.Replace(",",".")+","+$DriverItem.Length+",,,"+$DriverItem.LastWriteTime+",,,,,`r`n") } else { [void]$StringBuilder.Append(",,,,"+$DriverItem.Length+",,,"+$DriverItem.LastWriteTime+",,,,,`r`n") } } else { [void]$StringBuilder.Append(",,,,,,,,,,,,`r`n") } } } if($null -ne $OutPut.Files) { [void]$StringBuilder.Append("[FILESYSTEM MODULES]`r`n") [void]$StringBuilder.Append(",,,Module Path,Symbol Status,Checksum,Time/Date Stamp,Time/Date String,Size Of Image,DBG Pointer,PDB Pointer,PDB Signature,PDB Age,Product Version,File Version,Company Name,File Description,File Size,File Time/Date Stamp (High),File Time/Date Stamp (Low),File Time/Date String,Local DBG Status,Local DBG,Local PDB Status,Local PDB`r`n") Foreach($File in $OutPut.Files) { [void]$StringBuilder.Append(",,," +$File+",") if($S.IsPresent) { [void]$StringBuilder.Append("SYMBOLS_PDB,,,,,,,,,") } else { [void]$StringBuilder.Append("SYMBOLS_NO,,,,,,,,,") } if($R.IsPresent) { $FileItem = Get-ItemProperty $File if($null -ne $FileItem.VersionInfo.ProductVersion) { [void]$StringBuilder.Append("("+$FileItem.VersionInfo.ProductVersion.Replace(",",".")+" ),("+$FileItem.VersionInfo.FileVersion.Replace(",",".")+" ),"+$FileItem.VersionInfo.CompanyName.Replace(",",".")+","+$FileItem.VersionInfo.FileDescription.Replace(",",".")+","+$FileItem.Length+",,,"+$FileItem.LastWriteTime+",,,,,`r`n") } else { [void]$StringBuilder.Append(",,,,"+$FileItem.Length+",,,"+$FileItem.LastWriteTime+",,,,,`r`n") } } else { [void]$StringBuilder.Append(",,,,,,,,,,,,`r`n") } } } } Function PSChkSym ([string]$PathToScan="", [array]$FileMask = "*.*", [string]$O2="", [String]$P ="", [switch]$D, [switch]$F, [switch]$F2, [switch]$S, [switch]$R){ # Check the system information # P ----- get the process information, can give a * get all process info or give a process name get the specific process # D ----- get the all local running drivers infor # F ----- search the top level folder to get the files # F2 ---- search the all level from folder, Recursive # S ----- get Symbol Information # R ----- get the Version and File-System Information # O2 ---- Out the result to the file Trap [Exception] { $ErrorStd = "[PSChkSym] The following error ocurred when getting the file from a folder:`n" $errorMessage = $_.Exception.Message $errorCode = $_.Exception.ErrorRecord.FullyQualifiedErrorId $line = $_.InvocationInfo.PositionMessage #"$ErrorStd Error " + $errorCode + " on line " + $line + ": $errorMessage`n Path: $PathToScan`n FileMask: $FileMask" | WriteTo-StdOut -ShortFormat LogWarnFile "$ErrorStd Error $errorCode on line $($line): $errorMessage`n Path: $PathToScan`n FileMask: $FileMask" $error.Clear continue } $OutPutObject = New-Object PSObject $SbCSVFormat = New-Object -TypeName System.Text.StringBuilder $SbTXTFormat = New-Object -TypeName System.Text.StringBuilder [void]$SbTXTFormat.Append("***** COLLECTION OPTIONS *****`r`n") if($P -ne "") { [void]$SbTXTFormat.Append("Collect Information From Running Processes`r`n") if($P -eq "*") { [void]$SbTXTFormat.Append(" -P * (Query all local processes) `r`n") $Processes = [System.Diagnostics.Process]::GetProcesses() } else { [void]$SbTXTFormat.Append(" -P $P (Query for specific process by name) `r`n" ) $Processes = [System.Diagnostics.Process]::GetProcessesByName($P) } } if($D.IsPresent) { [void]$SbTXTFormat.Append(" -D (Query all local device drivers) `r`n") Add-Type -assemblyname System.ServiceProcess $DeviceDrivers = [System.ServiceProcess.ServiceController]::GetDevices() | where-object {$_.Status -eq "Running"} # $DeviceDrivers = GetAllRunningDriverFileName } if($F.IsPresent -or $F2.IsPresent) { [void]$SbTXTFormat.Append("Collect Information From File(s) Specified by the User`r`n") [void]$SbTXTFormat.Append(" -F $PathToScan\$FileMask`r`n") if($F.IsPresent) { Foreach($Mask in $FileMask) { $Files += [System.IO.Directory]::GetFiles($PathToScan, $Mask,[System.IO.SearchOption]::TopDirectoryOnly) } } else { Foreach($Mask in $FileMask) { $Files += [System.IO.Directory]::GetFiles($PathToScan, $Mask,[System.IO.SearchOption]::AllDirectories) } } } [void]$SbTXTFormat.Append("***** INFORMATION CHECKING OPTIONS *****`r`n") if($S.IsPresent -or $R.IsPresent) { if($S.IsPresent) { [void]$SbTXTFormat.Append("Output Symbol Information From Modules`r`n") [void]$SbTXTFormat.Append(" -S `r`n") } if($R.IsPresent) { [void]$SbTXTFormat.Append("Collect Version and File-System Information From Modules`r`n") [void]$SbTXTFormat.Append(" -R `r`n") } } else { [void]$SbTXTFormat.Append("Output Symbol Information From Modules`r`n") [void]$SbTXTFormat.Append(" -S `r`n") [void]$SbTXTFormat.Append("Collect Version and File-System Information From Modules`r`n") [void]$SbTXTFormat.Append(" -R `r`n") } [void]$SbTXTFormat.Append("***** OUTPUT OPTIONS *****`r`n") [void]$SbTXTFormat.Append("Output Results to STDOUT`r`n") [void]$SbTXTFormat.Append("Output Collected Module Information To a CSV File`r`n") if($O2 -ne "") { $OutFiles = $O2.Split('>') [void]$SbTXTFormat.Append(" -O "+$OutFiles[0]+" `r`n") } ## Add-Member -inputobject $OutPutObject -membertype noteproperty -name "Processes" -value $Processes ## Add-Member -inputobject $OutPutObject -membertype noteproperty -name "Drivers" -value $DeviceDrivers ## Add-Member -inputobject $OutPutObject -membertype noteproperty -name "Files" -value $Files if(($S.IsPresent -and $R.IsPresent) -or (-not$S.IsPresent -and -not$R.IsPresent)) { PrintTXTCheckSymInfo -OutPut $OutPutObject $SbTXTFormat -S -R PrintCSVCheckSymInfo -OutPut $OutPutObject $SbCSVFormat -S -R } elseif($S.IsPresent -and -not$R.IsPresent) { PrintTXTCheckSymInfo -OutPut $OutPutObject $SbTXTFormat -S PrintCSVCheckSymInfo -OutPut $OutPutObject $SbCSVFormat -S } else { PrintTXTCheckSymInfo -OutPut $OutPutObject $SbTXTFormat -R PrintCSVCheckSymInfo -OutPut $OutPutObject $SbCSVFormat -R } foreach($out in $OutFiles) { if($out.EndsWith("CSV",[StringComparison]::InvariantCultureIgnoreCase)) { $SbCSVFormat.ToString() | Out-File $out -Encoding "utf8" } else { if(Test-Path $out) { $SbTXTFormat.ToString() | Out-File $out -Encoding "UTF8" -Append } else { $SbTXTFormat.ToString() | Out-File $out -Encoding "UTF8" } } } } Function RunChkSym ([string]$PathToScan="", [array]$FileMask = "*.*", [string]$Output="", [boolean]$Recursive=$false, [string]$Arguments="", [string]$Description="", [boolean]$SkipChksymExe=$false){ if (($Arguments -ne "") -or (Test-Path ($PathToScan))) { if ($PathToScan -ne "") { $eOutput = $Output ForEach ($scFileMask in $FileMask){ # $eFileMask = ($scFileMask.replace("*.*","")).toupper() $eFileMask = ($eFileMask.replace("*.","")) $eFileMask = ($eFileMask.replace(".*","")) if (($eFileMask -ne "") -and (Test-Path ("$eOutput.*") )) {$eOutput += ("_" + $eFileMask)} $symScanPath += ((Join-Path -Path $PathToScan -ChildPath $scFileMask) + ";") } } if ($Description -ne "") { $FileDescription = $Description } else { $fdFileMask = [string]::join(";",$FileMask) if ($fdFileMask -contains ";") { $FileDescription = $PathToScan + " [" + $fdFileMask + "]" } else { $FileDescription = (Join-Path $PathToScan $fdFileMask) } } if ($Arguments -ne "") { $eOutput = $Output # Write-DiagProgress -Activity $LocalsCheckSym.ID_FileVersionInfo -Status $Description Loginfo "Activity: $($LocalsCheckSym.ID_FileVersionInfo), Status: $Description" White if(-not($SkipChksymExe)) { $CommandToExecute = "cmd.exe /c $ChkSymExe $Arguments" } else { # Calling the method to implement the functionalities $Arguments = $Arguments.Substring(0,$Arguments.IndexOf("-O2")+4) +"$Output.CSV>$Output.TXT" Invoke-Expression "PSChkSym $Arguments" } } else { # Write-DiagProgress -Activity $LocalsCheckSym.ID_FileVersionInfo -Status ($FileDescription)# + " Recursive: " + $Recursive) Loginfo "Activity: $($LocalsCheckSym.ID_FileVersionInfo), Status: $FileDescription" White if ($Recursive -eq $true) { $F = "-F2" $AFileExistOnFolder = (FileExistOnFolder -PathToScan $PathToScan -FileMask $scFileMask -Recursive) } else { $F = "-F" $AFileExistOnFolder = (FileExistOnFolder -PathToScan $PathToScan -FileMask $scFileMask) } if ($AFileExistOnFolder) { if(-not($SkipChksymExe)) { $CommandToExecute = "cmd.exe /c $ChkSymExe $F `"$symScanPath`" -R -S -O2 `"$eOutput.CSV`" > `"$eOutput.TXT`"" } else { # Calling the method to implement the functionalities if($F -eq "-F2") { PSChkSym -PathToScan $PathToScan -FileMask $FileMask -F2 -S -R -O2 "$eOutput.CSV>$eOutput.TXT" } else { PSChkSym -PathToScan $PathToScan -FileMask $FileMask -F -S -R -O2 "$eOutput.CSV>$eOutput.TXT" } } } else { Logwarn "Chksym did not run against path '$PathToScan' since there are no files with mask ($scFileMask) on system" $CommandToExecute = "" } } if ($CommandToExecute -ne "") { #RunCmD -commandToRun $CommandToExecute -sectionDescription "File Version Information (ChkSym)" -filesToCollect ("$eOutput.*") -fileDescription $FileDescription -BackgroundExecution $Commands = @( $CommandToExecute ) RunCommands "$LogPrefix" $Commands -ThrowException:$False -ShowMessage:$True } } else { LogWarn "Chksym did not run against path '$PathToScan', because path does not exist" } } ### Main ### # Check if using $FolderName or $ChkSymRangeString if (($null -ne $FolderName) -and ($null -ne $FileMask) -and ($null -ne $ChkSymSuffix)) { $OutputBase = $ChkSymOutFolder + $ComputerName + $ChkSymPrefix + $ChkSymSuffix $IsRecursive = ($Recursive.IsPresent) RunChkSym -PathToScan $FolderName -FileMask $FileMask -Output $OutputBase -Description $FileDescription -Recursive $IsRecursive -CallChksymExe $IsSkipChecksymExe } else { [array] $RunChkSym = $null Foreach ($ChkSymRangeString in $ChkSymRange) { if ($ChkSymRangeString -eq "All") { $RunChkSym += "ProgramFilesSys", "Drivers", "System32DLL", "System32Exe", "System32SYS", "Spool", "iSCSI", "Process", "RunningDrivers", "Cluster" } else { $RunChkSym += $ChkSymRangeString } } switch ($RunChkSym) { "ProgramFilesSys" { $OutputBase="$ChkSymOutFolder$ComputerName$ChkSymPrefix" + "_ProgramFiles_SYS" RunChkSym -PathToScan "$Env:ProgramFiles" -FileMask "*.sys" -Output $OutputBase -Recursive $true -SkipChksymExe $IsSkipChecksymExe if (($Env:PROCESSOR_ARCHITECTURE -eq "AMD64") -or $Env:PROCESSOR_ARCHITECTURE -eq "IA64") { $OutputBase="$ChkSymOutFolder$ComputerName$ChkSymPrefix" + "_ProgramFilesx86_SYS" RunChkSym -PathToScan (${Env:ProgramFiles(x86)}) -FileMask "*.sys" -Output $OutputBase -Recursive $true -SkipChksymExe $IsSkipChecksymExe } } "Drivers" { $OutputBase="$ChkSymOutFolder$ComputerName$ChkSymPrefix" + "_Drivers" RunChkSym -PathToScan "$Env:SystemRoot\System32\drivers" -FileMask "*.*" -Output $OutputBase -Recursive $false -SkipChksymExe $IsSkipChecksymExe } "System32DLL" { $OutputBase="$ChkSymOutFolder$ComputerName$ChkSymPrefix" + "_System32_DLL" RunChkSym -PathToScan "$Env:SystemRoot\System32" -FileMask "*.DLL" -Output $OutputBase -Recursive $false -SkipChksymExe $IsSkipChecksymExe if (($Env:PROCESSOR_ARCHITECTURE -eq "AMD64") -or $Env:PROCESSOR_ARCHITECTURE -eq "IA64") { $OutputBase="$ChkSymOutFolder$ComputerName$ChkSymPrefix" + "_SysWOW64_DLL" RunChkSym -PathToScan "$Env:SystemRoot\SysWOW64" -FileMask "*.dll" -Output $OutputBase -Recursive $true -SkipChksymExe $IsSkipChecksymExe } } "System32Exe" { $OutputBase="$ChkSymOutFolder$ComputerName$ChkSymPrefix" + "_System32_EXE" RunChkSym -PathToScan "$Env:SystemRoot\System32" -FileMask "*.EXE" -Output $OutputBase -Recursive $false -SkipChksymExe $IsSkipChecksymExe if (($Env:PROCESSOR_ARCHITECTURE -eq "AMD64") -or $Env:PROCESSOR_ARCHITECTURE -eq "IA64") { $OutputBase="$ChkSymOutFolder$ComputerName$ChkSymPrefix" + "_SysWOW64_EXE" RunChkSym -PathToScan "$Env:SystemRoot\SysWOW64" -FileMask "*.exe" -Output $OutputBase -Recursive $true -SkipChksymExe $IsSkipChecksymExe } } "System32SYS" { $OutputBase="$ChkSymOutFolder$ComputerName$ChkSymPrefix" + "_System32_SYS" RunChkSym -PathToScan "$Env:SystemRoot\System32" -FileMask "*.SYS" -Output $OutputBase -Recursive $false -SkipChksymExe $IsSkipChecksymExe if (($Env:PROCESSOR_ARCHITECTURE -eq "AMD64") -or $Env:PROCESSOR_ARCHITECTURE -eq "IA64") { $OutputBase="$ChkSymOutFolder$ComputerName$ChkSymPrefix" + "_SysWOW64_SYS" RunChkSym -PathToScan "$Env:SystemRoot\SysWOW64" -FileMask "*.sys" -Output $OutputBase -Recursive $true -SkipChksymExe $IsSkipChecksymExe } } "Spool" { $OutputBase="$ChkSymOutFolder$ComputerName$ChkSymPrefix" + "_PrintSpool" RunChkSym -PathToScan "$Env:SystemRoot\System32\Spool" -FileMask "*.*" -Output $OutputBase -Recursive $true -SkipChksymExe $IsSkipChecksymExe } "Cluster" { $OutputBase="$ChkSymOutFolder$ComputerName$ChkSymPrefix" + "_Cluster" RunChkSym -PathToScan "$Env:SystemRoot\Cluster" -FileMask "*.*" -Output $OutputBase -Recursive $false -SkipChksymExe $IsSkipChecksymExe } "iSCSI" { if(Test-Path "$Env:ProgramFiles\Microsoft iSNS Server" ) { $OutputBase="$ChkSymOutFolder$ComputerName$ChkSymPrefix" + "_MS_iSNS" RunChkSym -PathToScan "$Env:ProgramFiles\Microsoft iSNS Server" -FileMask "*.*" -Output $OutputBase -Recursive $true -SkipChksymExe $IsSkipChecksymExe } $OutputBase="$ChkSymOutFolder$ComputerName$ChkSymPrefix" + "_MS_iSCSI" RunChkSym -PathToScan "$Env:SystemRoot\System32" -FileMask "iscsi*.*" -Output $OutputBase -Recursive $false -SkipChksymExe $IsSkipChecksymExe } "Process" { $OutputBase="$ChkSymOutFolder$ComputerName$ChkSymPrefix" + "_Process" #we# Get-Process | Format-Table -Property "Handles","NPM","PM","WS","VM","CPU","Id","ProcessName","StartTime",@{ Label = "Running Time";Expression={(GetAgeDescription -TimeSpan (new-TimeSpan $_.StartTime))}} -AutoSize | Out-File "$OutputBase.txt" -Encoding "UTF8" -Width 200 Get-Process | where-object {$_.ProcessName -ne "idle"} | Format-Table -Property "Handles","NPM","PM","WS","VM","CPU","Id","ProcessName","StartTime",@{ Label = "Running Time";Expression={(GetAgeDescription -TimeSpan (new-TimeSpan $($_).StartTime))}} -AutoSize | Out-File "$OutputBase.txt" -Encoding "UTF8" -Width 200 "--------------------------------" | Out-File "$OutputBase.txt" -Encoding "UTF8" -append tasklist -svc | Out-File "$OutputBase.txt" -Encoding "UTF8" -append -EA SilentlyContinue "--------------------------------" | Out-File "$OutputBase.txt" -Encoding "UTF8" -append RunChkSym -Output $OutputBase -Arguments "-P * -R -O2 `"$OutputBase.CSV`" >> `"$OutputBase.TXT`"" -Description "Running Processes" -SkipChksymExe $IsSkipChecksymExe } "RunningDrivers" { $OutputBase="$ChkSymOutFolder$ComputerName$ChkSymPrefix" + "_RunningDrivers" RunChkSym -Output $OutputBase -Arguments "-D -R -S -O2 `"$OutputBase.CSV`" > `"$OutputBase.TXT`"" -Description "Running Drivers" -SkipChksymExe $IsSkipChecksymExe } "InetSrv" { $inetSrvPath = (join-path $env:systemroot "system32\inetsrv") $OutputBase = "$ChkSymOutFolder$ComputerName$ChkSymPrefix" + "_InetSrv" RunChkSym -PathToScan $inetSrvPath -FileMask ("*.exe","*.dll") -Output $OutputBase -Recursive $true -SkipChksymExe $IsSkipChecksymExe } "Exchange" { $ExchangeFolder = GetExchangeInstallFolder if ($null -ne $ExchangeFolder){ $OutputBase = "$ChkSymOutFolder$ComputerName$ChkSymPrefix" + "_Exchange" RunChkSym -PathToScan $ExchangeFolder -FileMask ("*.exe","*.dll") -Output $OutputBase -Recursive $true -SkipChksymExe $IsSkipChecksymExe } else { "Chksym did not run against Exchange since it could not find Exchange server installation folder" | WriteTo-StdOut -ShortFormat } } "DPM" { $DPMFolder = GetDPMInstallFolder If ($null -ne $DPMFolder) { $DPMFolder = Join-Path $DPMFolder "bin" $OutputBase= "$ChkSymOutFolder$ComputerName$ChkSymPrefix" + "_DPM" RunChkSym -PathToScan $DPMFolder -FileMask("*.exe","*.dll") -Output $OutputBase -Recursive $true -SkipChksymExe $IsSkipChecksymExe } else { "Chksym did not run against DPM since it could not find the DPM installation folder" | WriteTo-StdOut -ShortFormat } } "WinSxsDLL" { $OutputBase="$ChkSymOutFolder$ComputerName$ChkSymPrefix" + "_WinSxS_DLL" RunChkSym -PathToScan "$Env:SystemRoot\WinSxS" -FileMask "*.DLL" -Output $OutputBase -Recursive $True -SkipChksymExe $IsSkipChecksymExe } "WinSxsEXE" { $OutputBase="$ChkSymOutFolder$ComputerName$ChkSymPrefix" + "_WinSxS_EXE" RunChkSym -PathToScan "$Env:SystemRoot\WinSxS" -FileMask "*.EXE" -Output $OutputBase -Recursive $true -SkipChksymExe $IsSkipChecksymExe } "WinSxsSYS" { $OutputBase="$ChkSymOutFolder$ComputerName$ChkSymPrefix" + "_WinSxS_SYS" RunChkSym -PathToScan "$Env:SystemRoot\WinSxS" -FileMask "*.SYS" -Output $OutputBase -Recursive $true -SkipChksymExe $IsSkipChecksymExe } "RefAssmDLL" { $OutputBase="$ChkSymOutFolder$ComputerName$ChkSymPrefix" + "_RefAssm_DLL" RunChkSym -PathToScan "$Env:programfiles\Reference Assemblies" -FileMask "*.DLL" -Output $OutputBase -Recursive $true -SkipChksymExe $IsSkipChecksymExe } "DotNETDLL" { $OutputBase="$ChkSymOutFolder$ComputerName$ChkSymPrefix" + "_DotNET_DLL" RunChkSym -PathToScan "$Env:SystemRoot\Microsoft.NET" -FileMask "*.DLL" -Output $OutputBase -Recursive $True -SkipChksymExe $IsSkipChecksymExe } } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAvR8CbVVsoXIhG # rqjW6/EjCnmJT9mzSuJyT0BvFI4pGKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIA3PPMtKuePL/WcJHUTtXiJp # euBq5Ou0VpHQvm3QXZWnMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAg21LSiKW168KBa0XFnPGqm2PuSs4WSaFCtmJrwtQSGe6x5hujXk4R1Lk # CINX59hv6Etq/gBMP+bftHX5NMhwiAMHRRO8nX2JBIkJI9J09rjW2btDj7+bgwAx # zh2T2kRpMxVrnVmOuTY2o51PRiRyU3Yr2pLlDFalLvvVvcDIoezDxjIeL/CZJJ39 # eJ7CaILRJG4j1L+cFjobg0klifSWv2tPv2ART+qOVK2sZ/rOnfiIXLBEijK3JwRe # ww8AbrhlCYT4bWhV+7vzN1Lrad4Nv8aU4LXYTPIEm4rogalAXQStJs5FL64OJNp0 # 8trIanKwDApKU+WyBATzSEhycSt9f6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCblLfI+AMH9jThiWP/EZbDJ0nPmt42FjOEbVERlJdxtwIGZlcW3VjP # GBMyMDI0MDYxMjE1MDAzOS44MTVaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHj372bmhxogyIAAQAAAeMwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI5WhcNMjUwMTEwMTkwNzI5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4RDQxLTRC # RjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL6kDWgeRp+fxSBUD6N/yuEJ # pXggzBeNG5KB8M9AbIWeEokJgOghlMg8JmqkNsB4Wl1NEXR7cL6vlPCsWGLMhyqm # scQu36/8h2bx6TU4M8dVZEd6V4U+l9gpte+VF91kOI35fOqJ6eQDMwSBQ5c9ElPF # UijTA7zV7Y5PRYrS4FL9p494TidCpBEH5N6AO5u8wNA/jKO94Zkfjgu7sLF8SUdr # c1GRNEk2F91L3pxR+32FsuQTZi8hqtrFpEORxbySgiQBP3cH7fPleN1NynhMRf6T # 7XC1L0PRyKy9MZ6TBWru2HeWivkxIue1nLQb/O/n0j2QVd42Zf0ArXB/Vq54gQ8J # IvUH0cbvyWM8PomhFi6q2F7he43jhrxyvn1Xi1pwHOVsbH26YxDKTWxl20hfQLdz # z4RVTo8cFRMdQCxlKkSnocPWqfV/4H5APSPXk0r8Cc/cMmva3g4EvupF4ErbSO0U # NnCRv7UDxlSGiwiGkmny53mqtAZ7NLePhFtwfxp6ATIojl8JXjr3+bnQWUCDCd5O # ap54fGeGYU8KxOohmz604BgT14e3sRWABpW+oXYSCyFQ3SZQ3/LNTVby9ENsuEh2 # UIQKWU7lv7chrBrHCDw0jM+WwOjYUS7YxMAhaSyOahpbudALvRUXpQhELFoO6tOx # /66hzqgjSTOEY3pu46BFAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUsa4NZr41Fbeh # Z8Y+ep2m2YiYqQMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALe+my6p1NPMEW1t # 70a8Y2hGxj6siDSulGAs4UxmkfzxMAic4j0+GTPbHxk193mQ0FRPa9dtbRbaezV0 # GLkEsUWTGF2tP6WsDdl5/lD4wUQ76ArFOencCpK5svE0sO0FyhrJHZxMLCOclvd6 # vAIPOkZAYihBH/RXcxzbiliOCr//3w7REnsLuOp/7vlXJAsGzmJesBP/0ERqxjKu # dPWuBGz/qdRlJtOl5nv9NZkyLig4D5hy9p2Ec1zaotiLiHnJ9mlsJEcUDhYj8PnY # nJjjsCxv+yJzao2aUHiIQzMbFq+M08c8uBEf+s37YbZQ7XAFxwe2EVJAUwpWjmtJ # 3b3zSWTMmFWunFr2aLk6vVeS0u1MyEfEv+0bDk+N3jmsCwbLkM9FaDi7q2HtUn3z # 6k7AnETc28dAvLf/ioqUrVYTwBrbRH4XVFEvaIQ+i7esDQicWW1dCDA/J3xOoCEC # V68611jriajfdVg8o0Wp+FCg5CAUtslgOFuiYULgcxnqzkmP2i58ZEa0rm4LZymH # BzsIMU0yMmuVmAkYxbdEDi5XqlZIupPpqmD6/fLjD4ub0SEEttOpg0np0ra/MNCf # v/tVhJtz5wgiEIKX+s4akawLfY+16xDB64Nm0HoGs/Gy823ulIm4GyrUcpNZxnXv # E6OZMjI/V1AgSAg8U/heMWuZTWVUMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4 # RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAPYiXu8ORQ4hvKcuE7GK0COgxWnqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOoUCBUwIhgPMjAyNDA2MTIxOTQyMTNaGA8yMDI0MDYxMzE5NDIxM1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6hQIFQIBADAHAgEAAgIMKjAHAgEAAgIR2jAKAgUA # 6hVZlQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAB2H26nt42o/vxK3P/MZ # kPl4scck4Vuby4sQf3ugEZiJdQ/U+VoU8CKkkYmk/mM5yVMD4hOlzpQqPVQHQFNz # YtAwacWJR5o9K1XGKU+rSoRKtrGTW8eOLxYEmaQOVZfJir3WiJk1yDYLVDS2Xkbt # MkcqVhAjyeGff5rNCAS1dyv6MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHj372bmhxogyIAAQAAAeMwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQg/FoMpNuztv6kbKkFmjxNYFng6n5Tqg2X7joyeX/xR58wgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAz1COr5bD+ZPdEgQjWvcIWuDJcQbdgq8Ndj0xyMuYm # KjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB49+9 # m5ocaIMiAAEAAAHjMCIEINsd2aW1Y7wtnrogb26/8zWtZkK5NN+chuZAiFvrXewx # MA0GCSqGSIb3DQEBCwUABIICALzvARVzivcqzLS0BWo4QQkqhnpeHAwUnps91uoP # edQ3RXbkjNDVzp6q1RVyxfAx7/ZF7wTOk6xqOBlGpmx4RIrg7qGL+tyT8xYtSDag # 6axKvY/rvYdX0x5nd8tFrOg3YEt2pJippx+UhguMqh0ywdzUQDVKTKv+pFha8cVs # WXZnLfsO+9u2DdthSsEhVrxmDf55dqZdHxNqWnzQ9ChjfqKHklz8uWIhGjKB6AZX # kuwGWKxcy+djqws1lxMLP1wb+lXdu7nJRGUs3f1vdD+hmAJe4xXoVmPgVhPQDO+1 # NAKjvdiEaCpBaqNgFwbKQtSPR1sZWwspYN+uAm9jjp5K7HMty1EQc6SsK0gucqdm # oq3p3C1OGcNw0iFqTGtBl6N9fvCGw/MCauQXzss6YS94IcYcl0ugefmOeEiUEi0i # mTeDIY5g+e5cVMgE2pEdBoAUB6PZ3eir1cwtk0OQkxIo0S9CBX2nswzK2nGL3Wsx # Mn/6+pRKx6w/jzAKk9PB9Fe4qBABeOHodoubDusel1jxGC1idXlsUMbOthOLE0zF # gvt1jzGG0VuVXGSqA4i/wIkbCucMTK5KqsFHG7c4nIkJXH72oMEeKRaiAhNb0d6U # e1mey6hkF5gV3UzaNRlchs3S10L6kkmcbQQGbgifgUJWB4/lq6N/1kskywBR+dBV # QtIR # SIG # End signature block
combined_dataset/train/non-malicious/sample_57_48.ps1
sample_57_48.ps1
# ------------------------------------------------------------ # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License (MIT). See License.txt in the repo root for license information. # ------------------------------------------------------------ [CmdletBinding(DefaultParametersetName="Unsecure")] param ( [Parameter(ParameterSetName="Unsecure", Mandatory=$true)] [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [string] $ExistingClientConnectionEndpoint, [Parameter(ParameterSetName="Unsecure", Mandatory=$false)] [Parameter(ParameterSetName="Certificate", Mandatory=$false)] [switch] $Force, [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [switch] $X509Credential, [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [string] $ServerCertThumbprint, [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [string] $StoreLocation, [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [string] $StoreName, [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [string] $FindValueThumbprint ) if(-not $Force) { $confirmation = Read-Host ("Do you want to remove the current node? [Y] Yes [N] No (default is 'N')") if($confirmation -ne 'Y') { Write-Host "The current node is not removed." -ForegroundColor Red exit 1 } } $Identity = [System.Security.Principal.WindowsIdentity]::GetCurrent() $Principal = New-Object System.Security.Principal.WindowsPrincipal($Identity) $IsAdmin = $Principal.IsInRole([System.Security.Principal.WindowsBuiltInRole]::Administrator) if(!$IsAdmin) { Write-host "Please run the script with administrative privileges." -ForegroundColor "Red" exit 1 } [System.Collections.ArrayList]$IpAddr = (Get-NetIPAddress | select-object IPAddress).IPAddress [void]$IpAddr.Add("localhost") [void]$IpAddr.Add([System.Net.Dns]::GetHostName()) $IsClientEndpointLocal = ($null -ne ($IpAddr | ? {$ExistingClientConnectionEndpoint -match $_})) if($IsClientEndpointLocal) { Write-host "Please provide a client connection endpoint for another node, not the node to be removed." -ForegroundColor "Red" exit 1 } $ThisScriptPath = $(Split-Path -parent $MyInvocation.MyCommand.Definition) $DeployerBinPath = Join-Path $ThisScriptPath -ChildPath "DeploymentComponents" if(!$(Test-Path $DeployerBinPath)) { $DCAutoExtractorPath = Join-Path $ThisScriptPath "DeploymentComponentsAutoextractor.exe" if(!$(Test-Path $DCAutoExtractorPath)) { Write-Host "Standalone package DeploymentComponents and DeploymentComponentsAutoextractor.exe are not present local to the script location." exit 1 } #Extract DeploymentComponents $DCAutoExtractorCommand = "`"$DCAutoExtractorPath`" /E /Y /L `"$ThisScriptPath`"" # special case for older powershell versions < 5 if ($PSVersionTable.PSVersion.Major -lt 5) { $DCAutoExtractorCommand = "`"`"$DCAutoExtractorPath`" /E /Y /L `"$ThisScriptPath`"`"" } Write-Host "running autoextractor command: $DCAutoExtractorCommand" $DCExtractOutput = cmd.exe /c "$DCAutoExtractorCommand && exit 0 || exit 1" if($LASTEXITCODE -eq 1) { Write-Host "Extracting DeploymentComponents Cab ran into an issue." Write-Host $DCExtractOutput exit 1 } else { Write-Host "DeploymentComponents extracted." } } $SystemFabricModulePath = Join-Path $DeployerBinPath -ChildPath "System.Fabric.dll" if(!$(Test-Path $SystemFabricModulePath)) { Write-Host "Run the script local to the Standalone package directory." exit 1 } $ServiceFabricPowershellModulePath = Join-Path $DeployerBinPath -ChildPath "ServiceFabric.psd1" # Invoke in separate AppDomain if($X509Credential.IsPresent) { $argList = @($DeployerBinPath, $ServiceFabricPowershellModulePath, $ExistingClientConnectionEndpoint, $true, $ServerCertThumbprint, $StoreLocation, $StoreName, $FindValueThumbprint) } else { $argList = @($DeployerBinPath, $ServiceFabricPowershellModulePath, $ExistingClientConnectionEndpoint) } Powershell -Command { param ( [Parameter(Mandatory=$true)] [string] $DeployerBinPath, [Parameter(Mandatory=$true)] [string] $ServiceFabricPowershellModulePath, [Parameter(Mandatory=$true)] [string] $ExistingClientConnectionEndpoint, [Parameter(Mandatory=$false)] [bool] $X509Credential, [Parameter(Mandatory=$false)] [string] $ServerCertThumbprint, [Parameter(Mandatory=$false)] [string] $StoreLocation, [Parameter(Mandatory=$false)] [string] $StoreName, [Parameter(Mandatory=$false)] [string] $FindValueThumbprint ) #Add FabricCodePath Environment Path $env:path = "$($DeployerBinPath);" + $env:path #Import Service Fabric Powershell Module Import-Module $ServiceFabricPowershellModulePath #Remove Node Try { # Connect to the existing cluster if($X509Credential) { Connect-ServiceFabricCluster $ExistingClientConnectionEndpoint -X509Credential -ServerCertThumbprint $ServerCertThumbprint -StoreLocation $StoreLocation -StoreName $StoreName -FindValue $FindValueThumbprint -FindType FindByThumbprint } else { Connect-ServiceFabricCluster $ExistingClientConnectionEndpoint } Get-ServiceFabricNode | ft Remove-ServiceFabricNode -Force -Verbose } Catch { Write-Host "Remove node to existing cluster failed with exception: $($_.Exception.ToString())" -ForegroundColor Red exit 1 } } -args $argList -OutputFormat Text $env:Path = [System.Environment]::GetEnvironmentVariable("path","Machine") # SIG # Begin signature block # MIInlgYJKoZIhvcNAQcCoIInhzCCJ4MCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCm3I9tJF9v/Xen # UzJQkmoTYvfssXLWLhgV6P7w8tSgRaCCDXYwggX0MIID3KADAgECAhMzAAACURR2 # zMWFg24LAAAAAAJRMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjEwOTAyMTgzMjU5WhcNMjIwOTAxMTgzMjU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDBIpXR3b1IYAMunV9ZYBVYsaA7S64mqacKy/OJUf0Lr/LW/tWlJDzJH9nFAhs0 # zzSdQQcLhShOSTUxtlwZD9dnfIcx4pZgu0VHkqQw2dVc8Ob21GBo5sVrXgEAQxZo # rlEuAl20KpSIFLUBwoZFGFSQNSMcqPudXOw+Mhvn6rXYv/pjXIjgBntn6p1f+0+C # 2NXuFrIwjJIJd0erGefwMg//VqUTcRaj6SiCXSY6kjO1J9P8oaRQBHIOFEfLlXQ3 # a1ATlM7evCUvg3iBprpL+j1JMAUVv+87NRApprPyV75U/FKLlO2ioDbb69e3S725 # XQLW+/nJM4ihVQ0BHadh74/lAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUMLgM7NX5EnpPfK5uU6FPvn2g/Ekw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzQ2NzU5NjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIVJlff+Fp0ylEJhmvap # NVv1bYLSWf58OqRRIDnXbHQ+FobsOwL83/ncPC3xl8ySR5uK/af4ZDy7DcDw0yEd # mKbRLzHIfcztZVSrlsg0GKwZuaB2MEI1VizNCoZlN+HlFZa4DNm3J0LhTWrZjVR0 # M6V57cFW0GsV4NlqmtelT9JFEae7PomwgAV9xOScz8HzvbZeERcoSRp9eRsQwOw7 # 8XeCLeglqjUnz9gFM7RliCYP58Fgphtkht9LNEcErLOVW17m6/Dj75zg/IS+//6G # FEK2oXnw5EIIWZraFHqSaee+NMgOw/R6bwB8qLv5ClOJEpGKA3XPJvS9YgOpF920 # Vu4Afqa5Rv5UJKrsxA7HOiuH4TwpkP3XQ801YLMp4LavXnvqNkX5lhFcITvb01GQ # lcC5h+XfCv0L4hUum/QrFLavQXJ/vtirCnte5Bediqmjx3lswaTRbr/j+KX833A1 # l9NIJmdGFcVLXp1en3IWG/fjLIuP7BqPPaN7A1tzhWxL+xx9yw5vQiT1Yn14YGmw # OzBYYLX0H9dKRLWMxMXGvo0PWEuXzYyrdDQExPf66Fq/EiRpZv2EYl2gbl9fxc3s # qoIkyNlL1BCrvmzunkwt4cwvqWremUtqTJ2B53MbBHlf4RfvKz9NVuh5KHdr82AS # MMjU4C8KNTqzgisqQdCy8unTMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGXYwghlyAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAJRFHbMxYWDbgsAAAAAAlEwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILhfTuMOzA6U2oyOU8WXNlcj # GEknV5aCSqOOoBkdg0lBMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAMfRnlemb7rdcPrID3RV3jFVn4JSk9VM+UWCusnTtcYfrpaTEX903OEai # tPpMVC+XD5oiQwob/dTFKzQmYsQo4iF1xZgSZtfB6bY4NMMXXD9s5HTMnbaVbfH9 # giRCeLl60SZL3lz5DqkSmSFI0tlAsRvdXkpXyAL+2WeXWePVqeimGN48f1sQBDtz # x3ETxvKb4rbmLGoE8jRlBuigCvGLrHh4O+gdIWbAYwWAY5xL1SJadr0TWlI97ggs # BWcbUd8L83PZrUxuvHIPBISydx9IGjxIC8Ps2u7oxEaiAvuuQDqK9gV/XJohlPyq # t0bab6Krf9WN1LuEG16w9lWlJF4m86GCFwAwghb8BgorBgEEAYI3AwMBMYIW7DCC # FugGCSqGSIb3DQEHAqCCFtkwghbVAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq # hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCOYfr3nBMoXAlbIJu2YSBPT6GdPu7wls8H4ndiDMnDVQIGYrTViyb8 # GBMyMDIyMDYyNjIxMTAxMC4wNzRaMASAAgH0oIHQpIHNMIHKMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4QTgyLUUz # NEYtOUREQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC # EVcwggcMMIIE9KADAgECAhMzAAABmciPr622fb6LAAEAAAGZMA0GCSqGSIb3DQEB # CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIxMTIwMjE5MDUx # NloXDTIzMDIyODE5MDUxNlowgcoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx # JjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjhBODItRTM0Ri05RERBMSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEF # AAOCAg8AMIICCgKCAgEAuBP5V1yjLMva1WtmvG0W9AK/z4+PmyogIDICmsrwjBZ9 # 3XRqH/HlhYCVqeSXSo1o655lta/bR6XD9pBaY16dlHa4+eY7eTWItTBEXKCKPhNv # V7gsBQDCX7Rnb7Fnmvzk0DyBbGRFqhLXl3UZ3MlcHLecRcwSAtSVgnZn3O0efUTC # Mr4FoyM/N+epsHqMJDrLTdX3udyiCfH5a2CCyEFrDUTDk985wBsCG/ZMi+eAuo2Y # xcTkrrBmJlUPhq/6mUBC8NYqcfbOYzT9S0qTqX0xARbvsvSizQZjAQEZEj6UxZBh # MhksBhoEnTougVOhTyvurq2fN9I60XpiuCZCCfbUIZRnCIQI4XKmUrZ/t/JUY1b6 # 32wSORKSNjcJVSCtomxlu7FnkwM/8jTzSElG0IRgCbHvzoBo/9as/x2vZqn2GfAR # 3ITcZ9PJ1pKsq46yonEMsbg/JgmrU61UmziWH0MmXR0fWuL4MhnmRFwWEDQJSLgd # +0AjgILP1Xg1PDOHXPyJa08gtLldUkuBpPM1fuV+XkbvlzkTfBVqsyOpP/cunFsD # ljCumlDdV6i3Ghf7Jva1/OHiltpYQ3Nwt9Vi46fFDnzh2Xz7ssueMX4pZ4YQj8uE # CifY4IKKqnnhIQhH4A2I8vjwclf3uRwwdsR3bZS/d8JbQJCN2gsaPOJFTwQmtDsC # AwEAAaOCATYwggEyMB0GA1UdDgQWBBSNula4Ppxlr67yIdHUDxKJxDUdEDAfBgNV # HSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5o # dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBU # aW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwG # CCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRz # L01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNV # HRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMIMA0GCSqGSIb3DQEBCwUAA4IC # AQBxs1odvYmwTa6N57PBNxDhxrCwdRs5PdEhWFCgYpSLuIw20e6m71zXfJ55f8+Q # /SyoMN0/NY6subTIlqfqeI2AQZNz0cdckqi1H4ReWTFqJUc1vnEGRl1d/IkpnQFB # tAqUecdazHTyK03M1VBbDmBqppKFEP3UYlS+IgFySwjU4+Md2MCEHAj7dIoyVYpz # yDAGMwPH/fQW3orJMiNARxgHdJBlF9iNv6bmJ5ckvLaAZwDY4dtcYLxLmmdnb0ar # 1pP4tVyJTuu2rv1wnjE714TziFJqvNFN9k4n8N0kogSk8oq+5qFh9Yux9quUAJ6w # cbssv/2bA3wEQ1fwLZo+Y6+gE30Rw3VGp0KXqAUvospTVOkQEbvIPkzArv2Z3WZq # 7PcPvIGpVCBoPhppTZNO31yefDnPqhaoDQLDZDIvnUsypFhgOP5JSRZ9F4nIVy/P # reyjmslyhs0I2ugnbQo4rJ8kvIW7+DyoWnjLX+vMCViijrNLbdgCX2Aub0mx/XJP # ARo9nv8kFxGRLvPC+f3xyuV1JPyCl8d82i5MV00meNxGv1il1QczGrB2dz5p8tJq # BHpAF8dVISzTWL+Fbpt91Yq8Ugeq/xikMRUh7u8hX61kKWMsgx9dfU5oQHnUvE9V # Wm6nbTuWT9hNeEyvNlcsct8RD3pTqOHUSJYZu12OpPQevDCCB3EwggVZoAMCAQIC # EzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT # AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD # VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBS # b290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoX # DTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 # b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIi # MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC # 0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VG # Iwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP # 2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/P # XfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361 # VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwB # Sru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9 # X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269e # wvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDw # wvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr # 9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+e # FnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAj # BgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+n # FV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEw # PwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9j # cy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3 # FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAf # BgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBH # hkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUF # BzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0Nl # ckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4Swf # ZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTC # j/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu # 2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/ # GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3D # YXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbO # xnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqO # Cb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I # 6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0 # zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaM # mdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNT # TY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggLOMIICNwIBATCB+KGB0KSBzTCByjEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWlj # cm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEmMCQGA1UECxMdVGhhbGVzIFRTUyBF # U046OEE4Mi1FMzRGLTlEREExJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1w # IFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAJLv82Lo56mqTegSfTCeY7YA65TroIGD # MIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV # BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG # A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEF # BQACBQDmY0h+MCIYDzIwMjIwNjI3MDUwNTAyWhgPMjAyMjA2MjgwNTA1MDJaMHcw # PQYKKwYBBAGEWQoEATEvMC0wCgIFAOZjSH4CAQAwCgIBAAICCNcCAf8wBwIBAAIC # EbwwCgIFAOZkmf4CAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAK # MAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQANXHAo4wYk # Cfs/IBVWYQaQRdq7wWgCTD78TkQhcXZ08QGXIlspN1274pF0OU4MQclE9/vt3g4U # VNQGn2UU1aaZ4vLOrlz+RO2JkGLmQbZjkn72/Qhxh97XYxmQjkxoZAuGIAg0d5uD # EjE6G7zhT9PEaOohoIcLTXeFfZHrFkIzfTGCBA0wggQJAgEBMIGTMHwxCzAJBgNV # BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w # HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29m # dCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAABmciPr622fb6LAAEAAAGZMA0GCWCG # SAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZI # hvcNAQkEMSIEIBaYcpITXC3BeN11nEakyPDHqKjYwYjrjoLCpHbHwrIlMIH6Bgsq # hkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgZn1p+fKije1lqQU2Dq1DtQUgkpyjywvx # u8AjiHNibH4wgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAIT # MwAAAZnIj6+ttn2+iwABAAABmTAiBCCa3/h7MtW2r3Hz9IEc+Ak9tYmA02uhOyVS # Zqb1LwG6fjANBgkqhkiG9w0BAQsFAASCAgCE/93zrsoQkC8zAuBCYQP+nq7WjzdY # yzd6Joi7OaqfiUwAMhsx5bPEq+QAtGiXyU4W+vjUiUTtB9Lov/FRBxQP7QzJ2IM5 # sQ6UXy3ASTuSRByZru+DfcGTso78aZCmdbshKsGaL96LphB097hLY/gVzipCK0pV # rrAT6s5O3Tndg9Mzt/X+aaSsg+D9dp6CtA78I8+uIAjHLz5KbDG+2Mn4czPKt+j8 # k3u2IIVNpQHz8bfmjAEsbIBYLg5Fl+yyHMGf7L1huT9nQ8wTRn8EPdrBrrT+KkTA # EwI80PAMOA+NJh0fJQ2c0lj14vcQH40oNJ1N5+ErfFVvoAiQC05dtD76z2V6CA+k # cUAc2ALs81aZuH6n23OXjEC+7YHI//80gqWSK75SYioLMFz2eo/OwUJi4/8uSOS0 # lKTipQKGq9Qpk/qhJ99DH4uPIEELLVmrc2XsVkdZ1+EZ7ffOVn9Q9FbrZGf5xpGk # Y9E6BbctZGdRiOkqdUJ8eirW72g9Uu7JTxOz8zT7wx7JiscVJzkpeYTTI4ktErqz # mYvztgVXrZehtX2v2OtgAJbcGYayqcOr5iulvY3lsMP9sAdbrCQyKFQLbxVO71mH # VKKQJLP9wTAOHrHqywGmGTotXH+rgA3abqYRDQRmLFqsQirYL0N7ElYTf+ouNpEu # SwgeEUiT4PigvA== # SIG # End signature block
combined_dataset/train/non-malicious/216.ps1
216.ps1
function Expand-ScriptAlias { [CmdletBinding(SupportsShouldProcess, ConfirmImpact = 'Low')] PARAM ( [Parameter(ValueFromPipeline, ValueFromPipelineByPropertyName)] [ValidateScript({ Test-Path -Path $_ })] [Alias('FullName')] [System.String]$Path ) PROCESS { FOREACH ($File in $Path) { Write-Verbose -Message '[PROCESS] $File' TRY { $ScriptContent = (Get-Content $File -Delimiter $([char]0)) $AbstractSyntaxTree = [System.Management.Automation.Language.Parser]:: ParseInput($ScriptContent, [ref]$null, [ref]$null) $Aliases = $AbstractSyntaxTree.FindAll({ $args[0] -is [System.Management.Automation.Language.CommandAst] }, $true) | ForEach-Object -Process { $Command = $_.CommandElements[0] if ($Alias = Get-Alias | Where-Object { $_.Name -eq $Command }) { [PSCustomObject]@{ File = $File Alias = $Alias.Name Definition = $Alias.Definition StartLineNumber = $Command.Extent.StartLineNumber EndLineNumber = $Command.Extent.EndLineNumber StartColumnNumber = $Command.Extent.StartColumnNumber EndColumnNumber = $Command.Extent.EndColumnNumber StartOffset = $Command.Extent.StartOffset EndOffset = $Command.Extent.EndOffset } } } | Sort-Object -Property EndOffset -Descending Foreach ($Alias in $Aliases) { if ($psCmdlet.ShouldProcess($file, "Expand Alias: $($Alias.alias) to $($Alias.definition) (startoffset: $($alias.StartOffset))")) { $ScriptContent = $ScriptContent.Remove($Alias.StartOffset, ($Alias.EndOffset - $Alias.StartOffset)).Insert($Alias.StartOffset, $Alias.Definition) Set-Content -Path $File -Value $ScriptContent -Confirm:$false } } } CATCH { Write-Error -Message $($Error[0].Exception.Message) } } } }
combined_dataset/train/non-malicious/sample_27_19.ps1
sample_27_19.ps1
# Import the cluster setup utility module $sdkInstallPath = (Get-ItemProperty 'HKLM:\Software\Microsoft\Service Fabric SDK').FabricSDKScriptsPath $modulePath = Join-Path -Path $sdkInstallPath -ChildPath "ClusterSetupUtilities.psm1" Import-Module $modulePath function Set-LocalClusterReady([bool]$createOneNodeCluster = $False, [bool]$createMeshCluster = $False, [bool]$isSecure = $False) { <# .SYNOPSIS Sets up a default non-secure local dev cluster if there is no existing local cluster on the machine. If there exists a local cluster on the machine but it not running, it will start the local cluster. Returns boolean value indicating if explicit args need to be provided to connect to local cluster after the function successfully returns. #> Get-Module -ListAvailable -Refresh --quiet *>$null if($createMeshCluster -eq $True -and !(IsMeshSDKInstalled)) { Write-Error "Mesh SDK is not installed" exit } if(!(IsLocalClusterSetup)) { Write-Host "--------------------------------------------" Write-Host "Local Service Fabric Cluster is not setup..." Write-Host "Please wait while we setup the Local Service Fabric Cluster. This may take few minutes..." EnsureAdminPrivileges "Not running as administrator. You need to run Visual Studio with administrator privileges to setup the local cluster." ## Clean existing cluster just in case to ensure we have ## a clean state on machine before setting up new cluster try { CleanExistingClusterShallow } catch [System.Exception] { Write-Warning "CleanExistingClusterShallow throws exceptions" Write-Warning $_.Exception.ToString() } $jsonFileTemplate = SelectJsonFileTemplate -isSecure $isSecure -createOneNodeCluster $CreateOneNodeCluster -createMeshCluster $createMeshCluster $clusterRoots = SetupDataAndLogRoot -jsonFileTemplate $jsonFileTemplate -isAuto $True if ($isSecure -eq $true -or $createMeshCluster -eq $true) { InstallCertificates } DeployNodeConfiguration -clusterDataRoot $clusterRoots[0] -clusterLogRoot $clusterRoots[1] -isSecure $isSecure -createOneNodeCluster $createOneNodeCluster -createMeshCluster $createMeshCluster StartLocalCluster $connParams = GetConnectionParameters -isSecure $isSecure TryConnectToCluster -connParams $connParams -waitTime 240 CheckNamingServiceReady -connParams $connParams -waitTime 120 if($createMeshCluster -eq $true) { DeployAddonServices -connParams $connParams -waitTime 120 -oneNodeCluster $createOneNodeCluster } Write-Host "Local Service Fabric Cluster created successfully." Write-Host "--------------------------------------------------" } elseif(!(IsLocalClusterRunning)) { Write-Host "--------------------------------------------" Write-Host "Local Service Fabric Cluster is not running..." Write-Host "Please wait while we start the Local Service Fabric Cluster. This may take few minutes..." EnsureAdminPrivileges "Not running as administrator. You need to run Visual Studio with administrator privileges to start the local cluster." CleanTicketFiles StartLocalCluster $connParams = GetConnectionParameters -isSecure $isSecure TryConnectToCluster -connParams $connParams -waitTime 240 CheckNamingServiceReady -connParams $connParams -waitTime 120 DeployAddonServices -connParams $connParams -waitTime 120 -oneNodeCluster $createOneNodeCluster Write-Host "Local Service Fabric Cluster is running now." Write-Host "----------------------------------------" } LaunchLocalClusterManager } Export-ModuleMember -Function Set-LocalClusterReady # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCiiuvngNkMxqXE # ArCQ43e6pG9i9AK9H5fkmM6kMG+eFaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIItCZ29cGhFKpJVEzxeESoU2 # GzLsliG4d/0vRI+vhN66MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAsHNerb8bm+SxZR1rJi/UmhbTRH9Uq6e8We64JZYyuwM4aty3rAm1yeGo # 3bp8fMYTsG4q3JQ3YAjiySLoWMXGhBHOYDY9a035B8ShNynUbIBIhcdB6/BtU8Sf # +3jlgJO6fJUXXq3dgJ1EsRINKr63Oe6Y3LjDTSJjNGjnCUQnocpBvlU5UgCX5NYZ # YbjJcE9c6lcoecJuyfjrTcvP/88XJwtpZ+5mNuRQT1i9KXObUuZqjaTo1eCTbNHZ # wtLrbA/V2L0ToQmqUpBnSZLXeWN5m0FQgkVNUmL7A21DOvBBA9uoWNLJsWI1ihms # xeFSYqH/qD5CDNRwDQpUNoc8Kt5rBKGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDR1G/eVZsnp5EMIdNX+Imdzwh56C3HQCPTrwi7ZDpH4wIGZbqftX5f # GBMyMDI0MDIxNTIxNTAyNC4zMTdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOl4OVUwIhgPMjAyNDAyMTUxNTE4NDVaGA8yMDI0MDIxNjE1MTg0NVowdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6Xg5VQIBADAKAgEAAgIBcwIB/zAHAgEAAgIR0DAK # AgUA6XmK1QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKCvblXsjSLTfd3P # 2QAQZYrNwkQ+oIyY49nPcXdtze0vTtWfJp93KvNmW7EacU5+5PJvRdZwUMOgaWcg # EEzMxyxYm8/DmXBrrpJhnYLohJO7QNl5GLxhMXF+RS/JBObcDi9W3g5gSeo8C+3x # c2BhlJiOuQ3e9kXbp7yyoJsu+4rvMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgmxcF6peiuwfBKOjCSDOdZMWjLYIOnXQuCc0yv6KJxsYwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndIC # Oxg9xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 2o7VyVoA0RGxAAEAAAHaMCIEIB7rxM/LsedRyf1X20Ifl3wW+XS9YShocIhKX9T9 # BZOBMA0GCSqGSIb3DQEBCwUABIICAEc6Ks2z8SwyXTQbEwGh2hhEVY4VGMeeWydn # 4FVpdaNZdL+s8gY2flKrwBo1nxM33MWD3ewwipFDeCdPvJlz2dMmVWO4h9r1enZ7 # CgoveBmIympREEFPn+0ENo4O7Kd2HaqoeUNagOw7GwWpZ2l8NilrWyyC3barjLn2 # DEOeRw8/Z4h+y09niCYHu082hUvFX0lRFl8s4KQNfSy0uf8JQydGIFZy5IcAZ7Fo # q6oWaKosz2gYo3vEhMYNaIq/w53LPtsucvObgNb5oYe+Xawr444eU9HUw2JKDd03 # xbnh5bRCJPkOLTynAFN5u7mqKYCiWbBYUJ2Mz21s6+/3l/cmLJeQdlEPvvpcHHKz # YwKfywX/XXRV48hm/m4e9Ima541E8Ab/L43nfWYGr585gaAjaNCLdYlpEWRcy4LZ # EayXFYCXmLfN8n8UnvDB6PxTXEIbvix2XOWhmvJQI2zvo+JW52u5KhQRjVOd8fNf # sHrTEZxp+uTKV38Tce4u6cXN9TGZOHd/dqRNx104cgBm4wAghT+VXpG3tCgOsFbH # W6cnOXHxGt/LZLXZ8+DEmA5/wm3ycj7fCphZ9ViditMGRvsSCyxDcGntbVjoYLRV # V8u+gkKWN3VeNnnyBGK87As93JDZN6Mgbw2rgi9V0LqWxYWVBmM803jLjVoX+hul # gxRk+ymx # SIG # End signature block
combined_dataset/train/non-malicious/sample_64_53.ps1
sample_64_53.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Create an in-memory object for LicenseDetails. .Description Create an in-memory object for LicenseDetails. .Outputs Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Models.LicenseDetails .Link https://learn.microsoft.com/powershell/module/Az.ConnectedMachine/new-azconnectedlicensedetail #> function New-AzConnectedLicenseDetail { [OutputType('Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Models.LicenseDetails')] [CmdletBinding(PositionalBinding=$false)] Param( [Parameter(HelpMessage="Describes the edition of the license. The values are either Standard or Datacenter.")] [Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.PSArgumentCompleterAttribute("Standard", "Datacenter")] [string] $Edition, [Parameter(HelpMessage="Describes the number of processors.")] [int] $Processor, [Parameter(HelpMessage="Describes the state of the license.")] [Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.PSArgumentCompleterAttribute("Activated", "Deactivated")] [string] $State, [Parameter(HelpMessage="Describes the license target server.")] [Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.PSArgumentCompleterAttribute("Windows Server 2012", "Windows Server 2012 R2")] [string] $Target, [Parameter(HelpMessage="Describes the license core type (pCore or vCore).")] [Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.PSArgumentCompleterAttribute("pCore", "vCore")] [string] $Type, [Parameter(HelpMessage="A list of volume license details.")] [Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Models.IVolumeLicenseDetails[]] $VolumeLicenseDetail ) process { $Object = [Microsoft.Azure.PowerShell.Cmdlets.ConnectedMachine.Models.LicenseDetails]::New() if ($PSBoundParameters.ContainsKey('Edition')) { $Object.Edition = $Edition } if ($PSBoundParameters.ContainsKey('Processor')) { $Object.Processor = $Processor } if ($PSBoundParameters.ContainsKey('State')) { $Object.State = $State } if ($PSBoundParameters.ContainsKey('Target')) { $Object.Target = $Target } if ($PSBoundParameters.ContainsKey('Type')) { $Object.Type = $Type } if ($PSBoundParameters.ContainsKey('VolumeLicenseDetail')) { $Object.VolumeLicenseDetail = $VolumeLicenseDetail } return $Object } } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBYlX7jei0xt+1j # 5vaTn2t3W1CH1wSOqTEgoxjjont3raCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEkrhthqyCQGiSH5Xj8kUbPc # gdHios3a4veMthWo5mI1MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAK8THSNGlSVQT2oqvD0iKydbLqlh58G6mf/9lMAJB+AJySrheGswVaRE+ # Kt1KYNiBRcdcr52VNJyWOjaJHZyYxl7r+ZNmurF+Ufx06hxfpQt9FZX82erU6eVn # kcytpu1LMm77bTSpJmKn3e2EIn9FV3vlxkHRbOBTtEISkSh87MsQYvxHb9hn6Ed6 # euk9Jsm3NH4xCybfBOS9OQeWsN1ZrDiS+QpUDmKfqqWxMFlnFQufvIcTzEdKsgyA # imZa1CfZdXjaqp3kDq2u9aFoxvb33EVVtKlxN8eLlt2zLXq3xvgxt9Z3gzDK/BAL # N1lPTFha3oLkjMIvK523qCYYGta8yKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCC8jRj5fCIICX6Kl1t8Vz0y6C5MwoIfMUdPSoK5vsw4BwIGZlUlM9Pg # GBMyMDI0MDUyOTA1NDExOS4wMTZaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOoA9RswIhgPMjAyNDA1MjkwODI4MTFaGA8yMDI0MDUzMDA4MjgxMVowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6gD1GwIBADAHAgEAAgIL8zAHAgEAAgITKDAKAgUA # 6gJGmwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBACgTFQcirJd8H2M2yfYR # /WOUJBXLkTL1fMCMsvrGi8Chg77kluxLid+BBvYqp62nXOtCNrBRPWbKI8LnXmGO # Di7nrdKVBvPW/0WfKR8v82942i919mUwgUwn/zgk6a0Gpq1yPLlUfBPEoAUQfq0c # 3a4bzkxxP7Rvx8BCFMR4ArE3MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgPq4o2jNeTbBu5Uu8tpE+CRDpBKXWnp9onvnsrEVY9yswgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9 # xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V # yVoA0RGxAAEAAAHaMCIEILygyZb0U1v02NiLayQjRLDTfxrONmL+JT5QHWd+s/cP # MA0GCSqGSIb3DQEBCwUABIICAAZ51otzA63YhlJ6rLslkEH6CA26DHA4sESaJ61Y # h0WTtVcirnYh7MKbnBh5cA2fpMQQE7te1FBs4dUKMNcWSCFYIhoRlJwK5YB/vd2v # 0Sp0zPSbdMXof3xzLNER7UiS7s7BT2M2vveP7F9y/SgDQuJVUHJvJ2IVH+mSHU1v # fbo2oN2FEWTJcs/4kwJ3Pod8M4srqYhHTDFt6+5BXosw+FZYQTK1eRaoG7LXu/o5 # LG0yYpUE0TjvAprpk7xqBZqQS3riKIG8RWKfhlIomHf6Eu5kGX2IJKOO9cZv436H # i4SqmvkGxiVSQF2/rialAPlPf7X9Eo+bFDQOW4uMPXZYg7+yTAKjIPAu8Ku0r72a # TGAqKHVfj7HHZWefYAQhFxKvQqpTvHAB0bH0udvijThFQ+IIPfRqNeJzUAgD+b6S # +eqmV22WQf9Xw+iea1W8K/iBEmdo0yfxpV+rxWxrnmSb3XrmapIjDqM2KzWLLBUm # uf14SXRNeoQHYrXUSGqcoO/Gc/0XF7blQhzrB4NssWz/v3MrF8kRUQixVVHrEhY4 # 6MWq6lu7FapnecmrBK5u/cunzH6gP7tD/zPCGP/cnCjxiK2Ge1G8RDKyvz2UB65V # lLUjrhFk74bIVyTUMcBsYZeZVsRk2uAYez8WbPATeM/NyE8VhDSEQPyv94m9eTbp # VbEC # SIG # End signature block
combined_dataset/train/non-malicious/846.ps1
846.ps1
$resourceGroupName = "<azure resource group name>" $dataFactoryName = "<data factory name>" $dataFactoryRegion = "East US" $storageAccountName = "<Az.Storage account name>" $storageAccountKey = "<Az.Storage account key>" $azureSqlServer = "<azure sql server name>" $azureSqlDatabase = "<azure sql database name>" $azureSqlUser = "<azure sql server - user name>" $azureSqlPassword = "<azure sql server - user password>" $outputBlobFolderPath = "<azure blob container>/<folder>" $azureStorageLinkedServiceName = "AzureStorageLinkedService" $azureSqlDatabaseLinkedServiceName = "AzureSQLDatabaseLinkedService" $sourceDatasetName = "SourceDataset" $sinkDatasetName = "SinkDataset" $sourceSqlTableName = "datasource" $watermarkDatasetName = "WatermarkDataset" $pipelineName = "IncrementalCopyPipeline" New-AzResourceGroup -Name $resourceGroupName -Location $dataFactoryRegion $df = Set-AzDataFactory -ResourceGroupName $resourceGroupName -Location $dataFactoryRegion -Name $dataFactoryName $storageLinkedServiceDefinition = @" { "name": "$azureStorageLinkedServiceName", "properties": { "type": "AzureStorage", "typeProperties": { "connectionString": { "value": "DefaultEndpointsProtocol=https;AccountName=$storageAccountName;AccountKey=$storageAccountKey", "type": "SecureString" } } } } "@ $storageLinkedServiceDefinition | Out-File c:\$azureStorageLinkedServiceName.json Set-AzDataFactoryLinkedService -DataFactoryName $dataFactoryName -ResourceGroupName $resourceGroupName -Name "$azureStorageLinkedServiceName" -File c:\$azureStorageLinkedServiceName.json $azureSQLDatabaseLinkedServiceDefinition = @" { "name": "$azureSqlDatabaseLinkedService", "properties": { "type": "AzureSqlDatabase", "typeProperties": { "connectionString": { "value": "Server = tcp:$azureSqlServer.database.windows.net,1433;Initial Catalog=$azureSqlDatabase; Persist Security Info=False; User ID=$azureSqlUser; Password=$azureSqlPassword; MultipleActiveResultSets = False; Encrypt = True; TrustServerCertificate = False; Connection Timeout = 30;", "type": "SecureString" } } } } "@ $azureSQLDatabaseLinkedServiceDefinition | Out-File c:\$azureSqlDatabaseLinkedServiceName.json Set-AzDataFactoryLinkedService -DataFactoryName $dataFactoryName -ResourceGroupName $resourceGroupName -Name "$azureSqlDatabaseLinkedServiceName" -File c:\$azureSqlDatabaseLinkedServiceName.json $sourceDataset = @" { "name": "$sourceDatasetName", "properties": { "type": "AzureSqlTable", "typeProperties": { "tableName": "$sourceSqlTableName" }, "linkedServiceName": { "referenceName": "$azureSqlDatabaseLinkedServiceName", "type": "LinkedServiceReference" } } } "@ $sourceDataset | Out-File c:\$sourceDatasetName.json Set-AzDataFactoryDataset -DataFactoryName $dataFactoryName -ResourceGroupName $resourceGroupName -Name "$sourceDatasetName" -File "c:\$sourceDatasetName.json" $sinkDataset = @" { "name": "$sinkDatasetName", "properties": { "type": "AzureBlob", "typeProperties": { "folderPath": "$outputBlobFolderPath", "format": { "type": "TextFormat" } }, "linkedServiceName": { "referenceName": "$azureStorageLinkedServiceName", "type": "LinkedServiceReference" } } } "@ $sinkDataset | Out-File c:\$sinkDatasetName.json Set-AzDataFactoryDataset -DataFactoryName $dataFactoryName -ResourceGroupName $resourceGroupName -Name "$sinkDatasetName" -File "c:\$sinkDatasetName.json" $watermarkDataset = @" { "name": "$watermarkDatasetName", "properties": { "type": "AzureSqlTable", "typeProperties": { "tableName": "watermarktable" }, "linkedServiceName": { "referenceName": "$azureSqlDatabaseLinkedServiceName", "type": "LinkedServiceReference" } } } "@ $watermarkDataset | Out-File c:\$watermarkDatasetName.json Set-AzDataFactoryDataset -DataFactoryName $dataFactoryName -ResourceGroupName $resourceGroupName -Name "$watermarkDatasetName" -File "c:\$watermarkDatasetName.json" $pipelineDefinition = @" { "name": "$pipelineName", "properties": { "activities": [ { "name": "LookupWaterMarkActivity", "type": "Lookup", "typeProperties": { "source": { "type": "SqlSource", "sqlReaderQuery": "select * from watermarktable" }, "dataset": { "referenceName": "$watermarkDatasetName", "type": "DatasetReference" } } }, { "name": "LookupMaxValuefromSourceActivity", "type": "Lookup", "typeProperties": { "source": { "type": "SqlSource", "sqlReaderQuery": "SELECT MAX(LastModifytime) as NewWatermarkvalue FROM dbo.datasource" }, "dataset": { "referenceName": "$sourceDatasetName", "type": "DatasetReference" } } }, { "name": "IncrementalCopyActivity", "type": "Copy", "typeProperties": { "source": { "type": "SqlSource", "sqlReaderQuery": "select * from dbo.datasource where LastModifytime > '@{activity('LookupWaterMarkActivity').output.WatermarkValue}' and LastModifytime <= '@{activity('LookupMaxValuefromSourceActivity').output.NewWatermarkvalue}'" }, "sink": { "type": "BlobSink" } }, "dependsOn": [ { "activity": "LookupMaxValuefromSourceActivity", "dependencyConditions": [ "Succeeded" ] }, { "activity": "LookupWaterMarkActivity", "dependencyConditions": [ "Succeeded" ] } ], "inputs": [ { "referenceName": "$sourceDatasetName", "type": "DatasetReference" } ], "outputs": [ { "referenceName": "$sinkDatasetName", "type": "DatasetReference" } ] }, { "name": "StoredProceduretoWriteWatermarkActivity", "type": "SqlServerStoredProcedure", "typeProperties": { "storedProcedureName": "sp_write_watermark", "storedProcedureParameters": { "LastModifiedtime": {"value": "@{activity('LookupMaxValuefromSourceActivity').output.NewWatermarkvalue}", "type": "datetime" }, "TableName": { "value":"@{activity('LookupWaterMarkActivity').output.TableName}", "type":"String"} } }, "linkedServiceName": { "referenceName": "$azureSqlDatabaseLinkedServiceName", "type": "LinkedServiceReference" }, "dependsOn": [ { "activity": "IncrementalCopyActivity", "dependencyConditions": [ "Succeeded" ] } ] } ], } } "@ $pipelineDefinition | Out-File c:\$pipelineName.json Set-AzDataFactoryPipeline -DataFactoryName $dataFactoryName -ResourceGroupName $resourceGroupName -Name "$pipelineName" -File "c:\$pipelineName.json" $RunId = Invoke-AzDataFactoryPipeline -PipelineName "$pipelineName" -ResourceGroup $resourceGroupName -dataFactoryName $dataFactoryName Start-Sleep -Seconds 30 while ($True) { $result = Get-AzDataFactoryActivityRun -DataFactoryName $dataFactoryName -ResourceGroupName $resourceGroupName -PipelineRunId $runId -RunStartedAfter (Get-Date).AddMinutes(-30) -RunStartedBefore (Get-Date).AddMinutes(30) if (($result | Where-Object { $_.Status -eq "InProgress" } | Measure-Object).count -ne 0) { Write-Host "Pipeline run status: In Progress" -foregroundcolor "Yellow" Start-Sleep -Seconds 30 } else { Write-Host "Pipeline '"$pipelineName"' run finished. Result:" -foregroundcolor "Yellow" $result break } } $result = Get-AzDataFactoryActivityRun -DataFactoryName $dataFactoryName -ResourceGroupName $resourceGroupName ` -PipelineRunId $runId ` -RunStartedAfter (Get-Date).AddMinutes(-10) ` -RunStartedBefore (Get-Date).AddMinutes(10) ` -ErrorAction Stop $result if ($result.Status -eq "Succeeded") {` $result.Output -join "`r`n"` }` else {` $result.Error -join "`r`n"` }
combined_dataset/train/non-malicious/sample_35_32.ps1
sample_35_32.ps1
# # Add-AppxDevPackage.ps1 is a PowerShell script designed to install app # packages created by Visual Studio for developers. To run this script from # Explorer, right-click on its icon and choose "Run with PowerShell". # # Visual Studio supplies this script in the folder generated with its # "Prepare Package" command. The same folder will also contain the app # package (a .appx file), the signing certificate (a .cer file), and a # "Dependencies" subfolder containing all the framework packages used by the # app. # # This script simplifies installing these packages by automating the # following functions: # 1. Find the app package and signing certificate in the script directory # 2. Prompt the user to acquire a developer license and to install the # certificate if necessary # 3. Find dependency packages that are applicable to the operating system's # CPU architecture # 4. Install the package along with all applicable dependencies # # All command line parameters are reserved for use internally by the script. # Users should launch this script from Explorer. # # .Link # http://go.microsoft.com/fwlink/?LinkId=243053 param( [switch]$Force = $false, [switch]$GetDeveloperLicense = $false, [switch]$SkipLoggingTelemetry = $false, [string]$CertificatePath = $null ) $ErrorActionPreference = "Stop" # The language resources for this script are placed in the # "Add-AppDevPackage.resources" subfolder alongside the script. Since the # current working directory might not be the directory that contains the # script, we need to create the full path of the resources directory to # pass into Import-LocalizedData $ScriptPath = $null try { $ScriptPath = (Get-Variable MyInvocation).Value.MyCommand.Path $ScriptDir = Split-Path -Parent $ScriptPath } catch {} if (!$ScriptPath) { PrintMessageAndExit $UiStrings.ErrorNoScriptPath $ErrorCodes.NoScriptPath } $LocalizedResourcePath = Join-Path $ScriptDir "Add-AppDevPackage.resources" Import-LocalizedData -BindingVariable UiStrings -BaseDirectory $LocalizedResourcePath $ErrorCodes = Data { ConvertFrom-StringData @' Success = 0 NoScriptPath = 1 NoPackageFound = 2 ManyPackagesFound = 3 NoCertificateFound = 4 ManyCertificatesFound = 5 BadCertificate = 6 PackageUnsigned = 7 CertificateMismatch = 8 ForceElevate = 9 LaunchAdminFailed = 10 GetDeveloperLicenseFailed = 11 InstallCertificateFailed = 12 AddPackageFailed = 13 ForceDeveloperLicense = 14 CertUtilInstallFailed = 17 CertIsCA = 18 BannedEKU = 19 NoBasicConstraints = 20 NoCodeSigningEku = 21 InstallCertificateCancelled = 22 BannedKeyUsage = 23 ExpiredCertificate = 24 '@ } $IMAGE_FILE_MACHINE_i386 = 0x014c $IMAGE_FILE_MACHINE_AMD64 = 0x8664 $IMAGE_FILE_MACHINE_ARM64 = 0xAA64 $IMAGE_FILE_MACHINE_ARM = 0x01c0 $IMAGE_FILE_MACHINE_THUMB = 0x01c2 $IMAGE_FILE_MACHINE_ARMNT = 0x01c4 $MACHINE_ATTRIBUTES_UserEnabled = 0x01 $MACHINE_ATTRIBUTES_KernelEnabled = 0x02 $MACHINE_ATTRIBUTES_Wow64Container = 0x04 # First try to use IsWow64Process2 to determine the OS architecture try { $IsWow64Process2_MethodDefinition = @" [DllImport("kernel32.dll", SetLastError = true)] public static extern bool IsWow64Process2(IntPtr process, out ushort processMachine, out ushort nativeMachine); "@ $Kernel32 = Add-Type -MemberDefinition $IsWow64Process2_MethodDefinition -Name "Kernel32" -Namespace "Win32" -PassThru $Proc = Get-Process -id $pid $processMachine = New-Object uint16 $nativeMachine = New-Object uint16 $Res = $Kernel32::IsWow64Process2($Proc.Handle, [ref] $processMachine, [ref] $nativeMachine) if ($Res -eq $True) { switch ($nativeMachine) { $IMAGE_FILE_MACHINE_i386 { $ProcessorArchitecture = "x86" } $IMAGE_FILE_MACHINE_AMD64 { $ProcessorArchitecture = "amd64" } $IMAGE_FILE_MACHINE_ARM64 { $ProcessorArchitecture = "arm64" } $IMAGE_FILE_MACHINE_ARM { $ProcessorArchitecture = "arm" } $IMAGE_FILE_MACHINE_THUMB { $ProcessorArchitecture = "arm" } $IMAGE_FILE_MACHINE_ARMNT { $ProcessorArchitecture = "arm" } } } } catch { # Ignore exception and fall back to using environment variables to determine the OS architecture } $Amd64AppsSupportedOnArm64 = $False if ($null -eq $ProcessorArchitecture) { $ProcessorArchitecture = $Env:Processor_Architecture # Getting $Env:Processor_Architecture on arm64 machines will return x86. So check if the environment # variable "ProgramFiles(Arm)" is also set, if it is we know the actual processor architecture is arm64. # The value will also be x86 on amd64 machines when running the x86 version of PowerShell. if ($ProcessorArchitecture -eq "x86") { if ($null -ne ${Env:ProgramFiles(Arm)}) { $ProcessorArchitecture = "arm64" } elseif ($null -ne ${Env:ProgramFiles(x86)}) { $ProcessorArchitecture = "amd64" } } } elseif ("arm64" -eq $ProcessorArchitecture) { # If we successfully determined the OS to be arm64 with the above call to IsWow64Process2 and we're on Win11+ # we need to check for a special case where amd64 apps are supported as well. if ([Environment]::OSVersion.Version -ge (new-object 'Version' 10,0,22000)) { try { $GetMachineTypeAttributes_MethodDefinition = @" [DllImport("api-ms-win-core-processthreads-l1-1-7.dll", EntryPoint = "GetMachineTypeAttributes", ExactSpelling = true, PreserveSig = false)] public static extern void GetMachineTypeAttributes(ushort Machine, out ushort machineTypeAttributes); "@ $ProcessThreads = Add-Type -MemberDefinition $GetMachineTypeAttributes_MethodDefinition -Name "processthreads_l1_1_7" -Namespace "Win32" -PassThru $machineTypeAttributes = New-Object uint16 $ProcessThreads::GetMachineTypeAttributes($IMAGE_FILE_MACHINE_AMD64, [ref] $machineTypeAttributes) # We're looking for the case where the UserEnabled flag is set if (($machineTypeAttributes -band $MACHINE_ATTRIBUTES_UserEnabled) -ne 0) { $Amd64AppsSupportedOnArm64 = $True } } catch { # Ignore exceptions and maintain assumption that amd64 apps aren't supported on this machine } } } function PrintMessageAndExit($ErrorMessage, $ReturnCode) { Write-Host $ErrorMessage try { # Log telemetry data regarding the use of the script if possible. # There are three ways that this can be disabled: # 1. If the "TelemetryDependencies" folder isn't present. This can be excluded at build time by setting the MSBuild property AppxLogTelemetryFromSideloadingScript to false # 2. If the SkipLoggingTelemetry switch is passed to this script. # 3. If Visual Studio telemetry is disabled via the registry. $TelemetryAssembliesFolder = (Join-Path $PSScriptRoot "TelemetryDependencies") if (!$SkipLoggingTelemetry -And (Test-Path $TelemetryAssembliesFolder)) { $job = Start-Job -FilePath (Join-Path $TelemetryAssembliesFolder "LogSideloadingTelemetry.ps1") -ArgumentList $TelemetryAssembliesFolder, "VS/DesignTools/SideLoadingScript/AddAppDevPackage", $ReturnCode, $ProcessorArchitecture Wait-Job -Job $job -Timeout 60 | Out-Null } } catch { # Ignore telemetry errors } if (!$Force) { Pause } exit $ReturnCode } # # Warns the user about installing certificates, and presents a Yes/No prompt # to confirm the action. The default is set to No. # function ConfirmCertificateInstall { $Answer = $host.UI.PromptForChoice( "", $UiStrings.WarningInstallCert, [System.Management.Automation.Host.ChoiceDescription[]]@($UiStrings.PromptYesString, $UiStrings.PromptNoString), 1) return $Answer -eq 0 } # # Validates whether a file is a valid certificate using CertUtil. # This needs to be done before calling Get-PfxCertificate on the file, otherwise # the user will get a cryptic "Password: " prompt for invalid certs. # function ValidateCertificateFormat($FilePath) { # certutil -verify prints a lot of text that we don't need, so it's redirected to $null here certutil.exe -verify $FilePath > $null if ($LastExitCode -lt 0) { PrintMessageAndExit ($UiStrings.ErrorBadCertificate -f $FilePath, $LastExitCode) $ErrorCodes.BadCertificate } # Check if certificate is expired $cert = Get-PfxCertificate $FilePath if (($cert.NotBefore -gt (Get-Date)) -or ($cert.NotAfter -lt (Get-Date))) { PrintMessageAndExit ($UiStrings.ErrorExpiredCertificate -f $FilePath) $ErrorCodes.ExpiredCertificate } } # # Verify that the developer certificate meets the following restrictions: # - The certificate must contain a Basic Constraints extension, and its # Certificate Authority (CA) property must be false. # - The certificate's Key Usage extension must be either absent, or set to # only DigitalSignature. # - The certificate must contain an Extended Key Usage (EKU) extension with # Code Signing usage. # - The certificate must NOT contain any other EKU except Code Signing and # Lifetime Signing. # # These restrictions are enforced to decrease security risks that arise from # trusting digital certificates. # function CheckCertificateRestrictions { Set-Variable -Name BasicConstraintsExtensionOid -Value "2.5.29.19" -Option Constant Set-Variable -Name KeyUsageExtensionOid -Value "2.5.29.15" -Option Constant Set-Variable -Name EkuExtensionOid -Value "2.5.29.37" -Option Constant Set-Variable -Name CodeSigningEkuOid -Value "1.3.6.1.5.5.7.3.3" -Option Constant Set-Variable -Name LifetimeSigningEkuOid -Value "1.3.6.1.4.1.311.10.3.13" -Option Constant Set-Variable -Name UwpSigningEkuOid -Value "1.3.6.1.4.1.311.84.3.1" -Option Constant Set-Variable -Name DisposableSigningEkuOid -Value "1.3.6.1.4.1.311.84.3.2" -Option Constant $CertificateExtensions = (Get-PfxCertificate $CertificatePath).Extensions $HasBasicConstraints = $false $HasCodeSigningEku = $false foreach ($Extension in $CertificateExtensions) { # Certificate must contain the Basic Constraints extension if ($Extension.oid.value -eq $BasicConstraintsExtensionOid) { # CA property must be false if ($Extension.CertificateAuthority) { PrintMessageAndExit $UiStrings.ErrorCertIsCA $ErrorCodes.CertIsCA } $HasBasicConstraints = $true } # If key usage is present, it must be set to digital signature elseif ($Extension.oid.value -eq $KeyUsageExtensionOid) { if ($Extension.KeyUsages -ne "DigitalSignature") { PrintMessageAndExit ($UiStrings.ErrorBannedKeyUsage -f $Extension.KeyUsages) $ErrorCodes.BannedKeyUsage } } elseif ($Extension.oid.value -eq $EkuExtensionOid) { # Certificate must contain the Code Signing EKU $EKUs = $Extension.EnhancedKeyUsages.Value if ($EKUs -contains $CodeSigningEkuOid) { $HasCodeSigningEKU = $True } # EKUs other than code signing and lifetime signing are not allowed foreach ($EKU in $EKUs) { if ($EKU -ne $CodeSigningEkuOid -and $EKU -ne $LifetimeSigningEkuOid -and $EKU -ne $UwpSigningEkuOid -and $EKU -ne $DisposableSigningEkuOid) { PrintMessageAndExit ($UiStrings.ErrorBannedEKU -f $EKU) $ErrorCodes.BannedEKU } } } } if (!$HasBasicConstraints) { PrintMessageAndExit $UiStrings.ErrorNoBasicConstraints $ErrorCodes.NoBasicConstraints } if (!$HasCodeSigningEKU) { PrintMessageAndExit $UiStrings.ErrorNoCodeSigningEku $ErrorCodes.NoCodeSigningEku } } # # Performs operations that require administrative privileges: # - Prompt the user to obtain a developer license # - Install the developer certificate (if -Force is not specified, also prompts the user to confirm) # function DoElevatedOperations { if ($GetDeveloperLicense) { Write-Host $UiStrings.GettingDeveloperLicense if ($Force) { PrintMessageAndExit $UiStrings.ErrorForceDeveloperLicense $ErrorCodes.ForceDeveloperLicense } try { Show-WindowsDeveloperLicenseRegistration } catch { $Error[0] # Dump details about the last error PrintMessageAndExit $UiStrings.ErrorGetDeveloperLicenseFailed $ErrorCodes.GetDeveloperLicenseFailed } } if ($CertificatePath) { Write-Host $UiStrings.InstallingCertificate # Make sure certificate format is valid and usage constraints are followed ValidateCertificateFormat $CertificatePath CheckCertificateRestrictions # If -Force is not specified, warn the user and get consent if ($Force -or (ConfirmCertificateInstall)) { # Add cert to store certutil.exe -addstore TrustedPeople $CertificatePath if ($LastExitCode -lt 0) { PrintMessageAndExit ($UiStrings.ErrorCertUtilInstallFailed -f $LastExitCode) $ErrorCodes.CertUtilInstallFailed } } else { PrintMessageAndExit $UiStrings.ErrorInstallCertificateCancelled $ErrorCodes.InstallCertificateCancelled } } } # # Checks whether the machine is missing a valid developer license. # function CheckIfNeedDeveloperLicense { $Result = $true try { $Result = (Get-WindowsDeveloperLicense | Where-Object { $_.IsValid } | Measure-Object).Count -eq 0 } catch {} return $Result } # # Launches an elevated process running the current script to perform tasks # that require administrative privileges. This function waits until the # elevated process terminates, and checks whether those tasks were successful. # function LaunchElevated { # Set up command line arguments to the elevated process $RelaunchArgs = '-ExecutionPolicy Unrestricted -file "' + $ScriptPath + '"' if ($Force) { $RelaunchArgs += ' -Force' } if ($NeedDeveloperLicense) { $RelaunchArgs += ' -GetDeveloperLicense' } if ($SkipLoggingTelemetry) { $RelaunchArgs += ' -SkipLoggingTelemetry' } if ($NeedInstallCertificate) { $RelaunchArgs += ' -CertificatePath "' + $DeveloperCertificatePath.FullName + '"' } # Launch the process and wait for it to finish try { $PowerShellExePath = (Get-Process -Id $PID).Path $AdminProcess = Start-Process $PowerShellExePath -Verb RunAs -ArgumentList $RelaunchArgs -PassThru } catch { $Error[0] # Dump details about the last error PrintMessageAndExit $UiStrings.ErrorLaunchAdminFailed $ErrorCodes.LaunchAdminFailed } while (!($AdminProcess.HasExited)) { Start-Sleep -Seconds 2 } # Check if all elevated operations were successful if ($NeedDeveloperLicense) { if (CheckIfNeedDeveloperLicense) { PrintMessageAndExit $UiStrings.ErrorGetDeveloperLicenseFailed $ErrorCodes.GetDeveloperLicenseFailed } else { Write-Host $UiStrings.AcquireLicenseSuccessful } } if ($NeedInstallCertificate) { $Signature = Get-AuthenticodeSignature $DeveloperPackagePath -Verbose if ($Signature.Status -ne "Valid") { PrintMessageAndExit ($UiStrings.ErrorInstallCertificateFailed -f $Signature.Status) $ErrorCodes.InstallCertificateFailed } else { Write-Host $UiStrings.InstallCertificateSuccessful } } } # # Finds all applicable dependency packages according to OS architecture, and # installs the developer package with its dependencies. The expected layout # of dependencies is: # # <current dir> # \Dependencies # <Architecture neutral dependencies>.appx\.msix # \x86 # <x86 dependencies>.appx\.msix # \x64 # <x64 dependencies>.appx\.msix # \arm # <arm dependencies>.appx\.msix # \arm64 # <arm64 dependencies>.appx\.msix # function InstallPackageWithDependencies { $DependencyPackagesDir = (Join-Path $ScriptDir "Dependencies") $DependencyPackages = @() if (Test-Path $DependencyPackagesDir) { # Get architecture-neutral dependencies $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "*.appx") | Where-Object { $_.Mode -NotMatch "d" } $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "*.msix") | Where-Object { $_.Mode -NotMatch "d" } # Get architecture-specific dependencies if (($ProcessorArchitecture -eq "x86" -or $ProcessorArchitecture -eq "amd64" -or $ProcessorArchitecture -eq "arm64") -and (Test-Path (Join-Path $DependencyPackagesDir "x86"))) { $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "x86\*.appx") | Where-Object { $_.Mode -NotMatch "d" } $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "x86\*.msix") | Where-Object { $_.Mode -NotMatch "d" } } if ((($ProcessorArchitecture -eq "amd64") -or ($ProcessorArchitecture -eq "arm64" -and $Amd64AppsSupportedOnArm64)) -and (Test-Path (Join-Path $DependencyPackagesDir "x64"))) { $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "x64\*.appx") | Where-Object { $_.Mode -NotMatch "d" } $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "x64\*.msix") | Where-Object { $_.Mode -NotMatch "d" } } if (($ProcessorArchitecture -eq "arm" -or $ProcessorArchitecture -eq "arm64") -and (Test-Path (Join-Path $DependencyPackagesDir "arm"))) { $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "arm\*.appx") | Where-Object { $_.Mode -NotMatch "d" } $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "arm\*.msix") | Where-Object { $_.Mode -NotMatch "d" } } if (($ProcessorArchitecture -eq "arm64") -and (Test-Path (Join-Path $DependencyPackagesDir "arm64"))) { $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "arm64\*.appx") | Where-Object { $_.Mode -NotMatch "d" } $DependencyPackages += Get-ChildItem (Join-Path $DependencyPackagesDir "arm64\*.msix") | Where-Object { $_.Mode -NotMatch "d" } } } Write-Host $UiStrings.InstallingPackage $AddPackageSucceeded = $False try { if ($DependencyPackages.FullName.Count -gt 0) { Write-Host $UiStrings.DependenciesFound $DependencyPackages.FullName Add-AppxPackage -Path $DeveloperPackagePath.FullName -DependencyPath $DependencyPackages.FullName -ForceApplicationShutdown } else { Add-AppxPackage -Path $DeveloperPackagePath.FullName -ForceApplicationShutdown } $AddPackageSucceeded = $? } catch { $Error[0] # Dump details about the last error } if (!$AddPackageSucceeded) { if ($NeedInstallCertificate) { PrintMessageAndExit $UiStrings.ErrorAddPackageFailedWithCert $ErrorCodes.AddPackageFailed } else { PrintMessageAndExit $UiStrings.ErrorAddPackageFailed $ErrorCodes.AddPackageFailed } } } # # Main script logic when the user launches the script without parameters. # function DoStandardOperations { # Check for an .appx or .msix file in the script directory $PackagePath = Get-ChildItem (Join-Path $ScriptDir "*.appx") | Where-Object { $_.Mode -NotMatch "d" } if ($PackagePath -eq $null) { $PackagePath = Get-ChildItem (Join-Path $ScriptDir "*.msix") | Where-Object { $_.Mode -NotMatch "d" } } $PackageCount = ($PackagePath | Measure-Object).Count # Check for an .appxbundle or .msixbundle file in the script directory $BundlePath = Get-ChildItem (Join-Path $ScriptDir "*.appxbundle") | Where-Object { $_.Mode -NotMatch "d" } if ($BundlePath -eq $null) { $BundlePath = Get-ChildItem (Join-Path $ScriptDir "*.msixbundle") | Where-Object { $_.Mode -NotMatch "d" } } $BundleCount = ($BundlePath | Measure-Object).Count # Check for an .eappx or .emsix file in the script directory $EncryptedPackagePath = Get-ChildItem (Join-Path $ScriptDir "*.eappx") | Where-Object { $_.Mode -NotMatch "d" } if ($EncryptedPackagePath -eq $null) { $EncryptedPackagePath = Get-ChildItem (Join-Path $ScriptDir "*.emsix") | Where-Object { $_.Mode -NotMatch "d" } } $EncryptedPackageCount = ($EncryptedPackagePath | Measure-Object).Count # Check for an .eappxbundle or .emsixbundle file in the script directory $EncryptedBundlePath = Get-ChildItem (Join-Path $ScriptDir "*.eappxbundle") | Where-Object { $_.Mode -NotMatch "d" } if ($EncryptedBundlePath -eq $null) { $EncryptedBundlePath = Get-ChildItem (Join-Path $ScriptDir "*.emsixbundle") | Where-Object { $_.Mode -NotMatch "d" } } $EncryptedBundleCount = ($EncryptedBundlePath | Measure-Object).Count $NumberOfPackages = $PackageCount + $EncryptedPackageCount $NumberOfBundles = $BundleCount + $EncryptedBundleCount # There must be at least one package or bundle if ($NumberOfPackages + $NumberOfBundles -lt 1) { PrintMessageAndExit $UiStrings.ErrorNoPackageFound $ErrorCodes.NoPackageFound } # We must have exactly one bundle OR no bundle and exactly one package elseif ($NumberOfBundles -gt 1 -or ($NumberOfBundles -eq 0 -and $NumberOfpackages -gt 1)) { PrintMessageAndExit $UiStrings.ErrorManyPackagesFound $ErrorCodes.ManyPackagesFound } # First attempt to install a bundle or encrypted bundle. If neither exists, fall back to packages and then encrypted packages if ($BundleCount -eq 1) { $DeveloperPackagePath = $BundlePath Write-Host ($UiStrings.BundleFound -f $DeveloperPackagePath.FullName) } elseif ($EncryptedBundleCount -eq 1) { $DeveloperPackagePath = $EncryptedBundlePath Write-Host ($UiStrings.EncryptedBundleFound -f $DeveloperPackagePath.FullName) } elseif ($PackageCount -eq 1) { $DeveloperPackagePath = $PackagePath Write-Host ($UiStrings.PackageFound -f $DeveloperPackagePath.FullName) } elseif ($EncryptedPackageCount -eq 1) { $DeveloperPackagePath = $EncryptedPackagePath Write-Host ($UiStrings.EncryptedPackageFound -f $DeveloperPackagePath.FullName) } # The package must be signed $PackageSignature = Get-AuthenticodeSignature $DeveloperPackagePath $PackageCertificate = $PackageSignature.SignerCertificate if (!$PackageCertificate) { PrintMessageAndExit $UiStrings.ErrorPackageUnsigned $ErrorCodes.PackageUnsigned } # Test if the package signature is trusted. If not, the corresponding certificate # needs to be present in the current directory and needs to be installed. $NeedInstallCertificate = ($PackageSignature.Status -ne "Valid") if ($NeedInstallCertificate) { # List all .cer files in the script directory $DeveloperCertificatePath = Get-ChildItem (Join-Path $ScriptDir "*.cer") | Where-Object { $_.Mode -NotMatch "d" } $DeveloperCertificateCount = ($DeveloperCertificatePath | Measure-Object).Count # There must be exactly 1 certificate if ($DeveloperCertificateCount -lt 1) { PrintMessageAndExit $UiStrings.ErrorNoCertificateFound $ErrorCodes.NoCertificateFound } elseif ($DeveloperCertificateCount -gt 1) { PrintMessageAndExit $UiStrings.ErrorManyCertificatesFound $ErrorCodes.ManyCertificatesFound } Write-Host ($UiStrings.CertificateFound -f $DeveloperCertificatePath.FullName) # The .cer file must have the format of a valid certificate ValidateCertificateFormat $DeveloperCertificatePath # The package signature must match the certificate file if ($PackageCertificate -ne (Get-PfxCertificate $DeveloperCertificatePath)) { PrintMessageAndExit $UiStrings.ErrorCertificateMismatch $ErrorCodes.CertificateMismatch } } $NeedDeveloperLicense = CheckIfNeedDeveloperLicense # Relaunch the script elevated with the necessary parameters if needed if ($NeedDeveloperLicense -or $NeedInstallCertificate) { Write-Host $UiStrings.ElevateActions if ($NeedDeveloperLicense) { Write-Host $UiStrings.ElevateActionDevLicense } if ($NeedInstallCertificate) { Write-Host $UiStrings.ElevateActionCertificate } $IsAlreadyElevated = ([Security.Principal.WindowsIdentity]::GetCurrent().Groups.Value -contains "S-1-5-32-544") if ($IsAlreadyElevated) { if ($Force -and $NeedDeveloperLicense) { PrintMessageAndExit $UiStrings.ErrorForceDeveloperLicense $ErrorCodes.ForceDeveloperLicense } if ($Force -and $NeedInstallCertificate) { Write-Warning $UiStrings.WarningInstallCert } } else { if ($Force) { PrintMessageAndExit $UiStrings.ErrorForceElevate $ErrorCodes.ForceElevate } else { Write-Host $UiStrings.ElevateActionsContinue Pause } } LaunchElevated } InstallPackageWithDependencies } # # Main script entry point # if ($GetDeveloperLicense -or $CertificatePath) { DoElevatedOperations } else { DoStandardOperations PrintMessageAndExit $UiStrings.Success $ErrorCodes.Success } # SIG # Begin signature block # MIIlsAYJKoZIhvcNAQcCoIIloTCCJZ0CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAYh/586NhEPWiO # +3D6/pj3+lXDRXkK9+wCdlGR7safL6CCC2cwggTvMIID16ADAgECAhMzAAAFV8+Q # 3cfRwIiMAAAAAAVXMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTAwHhcNMjMxMDE5MTk1MTEyWhcNMjQxMDE2MTk1MTEyWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCs0/kFGrFBPJjNzuVjixsArYe7PjsMayjyn3AS8PHH7QmCeCIh2iH6OGSizwdy # /HSU5bfZcxZn25YEyff6mBQplp064tc7cue5Win7lqQKjCq5eExLe7M9Ms42HJ48 # 2nviJZvVK1qNDe4Y7H58TDTSatOk0agN5GP9xQc6opv9NPHZMK3vPfbKP85w2nmm # T7wDkaDVLoMxmEmNnf2zYtUauyrx+zzLVE/dkFvaKuwxqYg5QVJNqvxqx7FoCCg1 # q5WdAyp4B0S01JxTFPqb9w185mOsIi0dk7uJ6JoOT2WOsJL1BUuV2MgmFp1Z2OIB # rwkdeB55wG8mF7az1dWGjk5NAgMBAAGjggFuMIIBajAfBgNVHSUEGDAWBgorBgEE # AYI3PQYBBggrBgEFBQcDAzAdBgNVHQ4EFgQUZUiwqCE+1UNl9kCzINVmNMKtebcw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwODY1KzUwMTU5NzAfBgNVHSMEGDAWgBTm/F97uyIAWORyTrX0 # IXQjMubvrDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5j # b20vcGtpL2NybC9wcm9kdWN0cy9NaWNDb2RTaWdQQ0FfMjAxMC0wNy0wNi5jcmww # WgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpL2NlcnRzL01pY0NvZFNpZ1BDQV8yMDEwLTA3LTA2LmNydDAMBgNV # HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4IBAQDKLsNC5lAhZ0LL2vbh5pbhYDM1 # htEg3+di/58fDvtTcT+oLwq+eRPuIleUaK37eaEeynCJA7WvdJK9FjvZBC4Fbkqh # Lu6lSqplUUeJzxn620qcful+phcUszQYDyAsh4fjdTzJtx2jGeiJcD193yIoIzjN # rllXCtGVMSjryy2jiU4pczp1WOjWrCL9fz0ZvR811YZAnhyP6zu1V8pdYqeA668h # KvdfZzVp60F8ZkqnucOpa1WKiQEYEwkG5vOQdxoOxZWc+MJ6cmcNgA+7SfJbb0XX # +hsKIzK7Tb/E9dELF88573stY+AuuApvZLAsG76aU/jvqlyreUWX5M3uW2ShMIIG # cDCCBFigAwIBAgIKYQxSTAAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDE3 # WhcNMjUwNzA2MjA1MDE3WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDEw # MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6Q5kUHlntcTj/QkATJ6U # rPdWaOpE2M/FWE+ppXZ8bUW60zmStKQe+fllguQX0o/9RJwI6GWTzixVhL99COMu # K6hBKxi3oktuSUxrFQfe0dLCiR5xlM21f0u0rwjYzIjWaxeUOpPOJj/s5v40mFfV # HV1J9rIqLtWFu1k/+JC0K4N0yiuzO0bj8EZJwRdmVMkcvR3EVWJXcvhnuSUgNN5d # pqWVXqsogM3Vsp7lA7Vj07IUyMHIiiYKWX8H7P8O7YASNUwSpr5SW/Wm2uCLC0h3 # 1oVH1RC5xuiq7otqLQVcYMa0KlucIxxfReMaFB5vN8sZM4BqiU2jamZjeJPVMM+V # HwIDAQABo4IB4zCCAd8wEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFOb8X3u7 # IgBY5HJOtfQhdCMy5u+sMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud # DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjR # PZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0 # LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNy # bDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9z # b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MIGd # BgNVHSAEgZUwgZIwgY8GCSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9kZWZhdWx0Lmh0bTBABggr # BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQA # ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAGnTvV08pe8QWhXi4UNMi # /AmdrIKX+DT/KiyXlRLl5L/Pv5PI4zSp24G43B4AvtI1b6/lf3mVd+UC1PHr2M1O # HhthosJaIxrwjKhiUUVnCOM/PB6T+DCFF8g5QKbXDrMhKeWloWmMIpPMdJjnoUdD # 8lOswA8waX/+0iUgbW9h098H1dlyACxphnY9UdumOUjJN2FtB91TGcun1mHCv+KD # qw/ga5uV1n0oUbCJSlGkmmzItx9KGg5pqdfcwX7RSXCqtq27ckdjF/qm1qKmhuyo # EESbY7ayaYkGx0aGehg/6MUdIdV7+QIjLcVBy78dTMgW77Gcf/wiS0mKbhXjpn92 # W9FTeZGFndXS2z1zNfM8rlSyUkdqwKoTldKOEdqZZ14yjPs3hdHcdYWch8ZaV4XC # v90Nj4ybLeu07s8n07VeafqkFgQBpyRnc89NT7beBVaXevfpUk30dwVPhcbYC/GO # 7UIJ0Q124yNWeCImNr7KsYxuqh3khdpHM2KPpMmRM19xHkCvmGXJIuhCISWKHC1g # 2TeJQYkqFg/XYTyUaGBS79ZHmaCAQO4VgXc+nOBTGBpQHTiVmx5mMxMnORd4hzbO # TsNfsvU9R1O24OXbC2E9KteSLM43Wj5AQjGkHxAIwlacvyRdUQKdannSF9PawZSO # B3slcUSrBmrm1MbfI5qWdcUxghmfMIIZmwIBATCBlTB+MQswCQYDVQQGEwJVUzET # MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV # TWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT # aWduaW5nIFBDQSAyMDEwAhMzAAAFV8+Q3cfRwIiMAAAAAAVXMA0GCWCGSAFlAwQC # AQUAoIGuMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsx # DjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCA/8sllbhmdgHazXDKfJje5 # ZPISyNOJfdmSfAvZZC8tJDBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBpAGMAcgBv # AHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3DQEB # AQUABIIBABoeIsmpFKWj+/DHcj7a/ppHvpeKsn0Jb20gbWcbk1BJD4HdDsWMZdZv # JyJjJ4swk9l5qsqRgt+WFtqYMoNul3XnXo2zHpSsAeypDGTTtnvrsTtqR5YXRhfB # ZpESj2UIlW9ESxRpmJscJpEwTymVPf81VR+gXiFTCZ1cLuX6YU6A8RFJTS4YifFL # K+4ENafhVH8Rv1ImQIZt817ttK6lMJHA8TvXKHleAt/jfkrUuLZCIt7a8LRRG14h # urv+OD4yRSNTCFBDBEXni7sqBH7vIrfoVoXs1hbLXcV5JYO2CK3yHBDAZNE2163e # IcwCDObIHWcPa2p9u4USrZuCvPH6InehghcpMIIXJQYKKwYBBAGCNwMDATGCFxUw # ghcRBgkqhkiG9w0BBwKgghcCMIIW/gIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBWQYL # KoZIhvcNAQkQAQSgggFIBIIBRDCCAUACAQEGCisGAQQBhFkKAwEwMTANBglghkgB # ZQMEAgEFAAQgf6H5HE1KKmmasEjpJd+4pr328u4rgtlnMDMQIe/XhvACBmX8gwTS # NBgTMjAyNDA0MTQyMTA5MTMuNDkyWjAEgAIB9KCB2KSB1TCB0jELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IEly # ZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVT # Tjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEXgwggcnMIIFD6ADAgECAhMzAAAB3V1XHZXUraobAAEAAAHdMA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIz # MTAxMjE5MDcwOVoXDTI1MDExMDE5MDcwOVowgdIxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046ODZERi00 # QkJDLTkzMzUxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCoTgOUROoud5x1ER+JZ3yi # 6fvSb4qbk7XLWoqwsTFEqz0suQlitg7a4kD/k+dh12zdoOwJLUNaUGW0wxhcyund # N72GDawj7iSvj0bD9hT1Q4wV8uZqy0RcyBxy2ogGqGxObxSbqMWdGVnSjArPGnI4 # R1Jn2mPu/fwke7jfgePsYyasL3aVP5qdJgKt3mq8h/gCpr+pZK0DfM4K3GwoB8LK # r76k+pRBamKYu7ip+zAGG0ni3tKTHWrVeRFujVZ1zGDk0Srhj38nwSnUobmpS6PP # JBu6mtpmwOZe+/l9OiQHrDJKMmK+P/QoAxYx1KXB0jg7o5RQSjItevM0XS3q3aVt # GwV/RA7sdswTDGhCvDcsWsAhLgKu/vu5LRQG5d4VCrbs2AtRVGblJdgaulNe0uAi # rKkd4rS0/ajXG9qQCeI6yA3ZZeU4KKnn+YKb/mHLwTPN+G1xTcMrXd7oww9uD/Q3 # fMX1Sb7po7AUEJCuU/6stx60CfLndZx0r7RVYuUmv7mxrmBKUvIBehg1jefym73h # ZHbKE1SD6PKZFoYz7NEO5wOfrgcUAeM5YxIys+VluwQOMKZhZtuH4QZkY1eDW6fp # +/HIAI7w0n05QOg2AXL9pMdSR9nSIWkZ0njl3j0+oTBdCJeffCzLtK8N+VYlFnAE # JFDVE8UZ6hhcc+cPmbrDAwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFG6i9baMj1Ha # Rcsh0gylo9COJcPxMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAuVNmyDS4FyB1m # zHKlbn/Y5FE/yvM8iwb7uYfCa6mEds/3mjtsqNTqHPUocr8W3vRmQ7u5JFM8Usid # SGZLGWcOhQ6usmTU9zxIwBJ0RKUQS/Evpm14PjuFS0tC0pm/FyGYi7GqmdHwxHL9 # x3gPv8v6ipwkFpF4IaWhDMBjEM0ZIRsHBnV69cxqUOx08b37ue8RcWV9TJCp1hRD # Serq3fuLXlIF49J4CDsf/5d1zCtx7fE9vs7xiTQBfuf+agZO569O/cyAmxV78bYn # TTeXqF3VvvawCJEvlBg9fQGXQa7benWfjnQKrgYg5GEOZFX1DCkt9ch0DhoJhcbg # js06Vh2pa6qXSJZbMvCjbI+VPbDjYlgHfTzZchBx20GQ5ovfwTZTmMk7dGHoS2w6 # L5mVDWs5O/TnfwPde5qgnU6qxMcARlD2zD/v73WFKmibKbqQZ1LYzn/++gwIVcvH # v3us0ffD5KZZpYjtm6y90N6w+vmQlXaxjPUZuoVAwQZL2IfmI5hnXEORwelk/UXn # PPqgx5m4S4V+GXWmq3efzl3i24Mdn+y+EEEI9yoKo6gzliJ1YTRNYGLU1ix3uPPN # nf5Oy7otCtYPBGayg+5mjq7CSyjypXoHHifRQqmNbA1ClIUWtBB1FvmZCi5aISq0 # uxcI3ayDVpDwYG0M5wo3RNpuO0I02zCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggLUMIICPQIBATCCAQChgdikgdUwgdIxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs # YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046 # ODZERi00QkJDLTkzMzUxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNl # cnZpY2WiIwoBATAHBgUrDgMCGgMVADYjRxll2zWgz8Z8og2xDnIkoxYQoIGDMIGA # pH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEFBQAC # BQDpxqLbMCIYDzIwMjQwNDE1MDI0NTQ3WhgPMjAyNDA0MTYwMjQ1NDdaMHQwOgYK # KwYBBAGEWQoEATEsMCowCgIFAOnGotsCAQAwBwIBAAICE70wBwIBAAICEWwwCgIF # AOnH9FsCAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQAC # AwehIKEKMAgCAQACAwGGoDANBgkqhkiG9w0BAQUFAAOBgQAXn/57Q8uS0Y145cFg # 6qUh9kXLp8hRUeGzB4RRVAU75ZrTU3mwNU7RiZl2ojUQGZueyidtTMQOitcog6wF # oChqfoZkuNwVwZvx0xD/JLWl+PrWMFf6QRMUfh9KL4Ymomn+qUvuBUC4oM6K7HYH # CMN5vjto5Inw23jFjVY0sTJkWzGCBA0wggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1l # LVN0YW1wIFBDQSAyMDEwAhMzAAAB3V1XHZXUraobAAEAAAHdMA0GCWCGSAFlAwQC # AQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkE # MSIEIGUh0aiYQyWsNBZa37NcpoROgwB6HjtJDe7vjF9oEffWMIH6BgsqhkiG9w0B # CRACLzGB6jCB5zCB5DCBvQQgYf8OLZplrE94mZx7R9FZN+1AjdNpUcWPkYjjesAx # Y2YwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAd1d # Vx2V1K2qGwABAAAB3TAiBCBHkFG7qdVgGocq6SvFOhLWGkfpUxXq5KzOZ509EmWZ # EDANBgkqhkiG9w0BAQsFAASCAgAAreaX+0cSWw1i0dGuy0VNlWyfOLOBlFga7jqH # JjaRYRnFElcz64CmUmL14M7Fujptdp8tFETwGp6ifSWMq5sABVWPQCijp8opC58U # Pt+npNoHKtllkhh6VNZNSzkkgPT1SBwTaBFddur0lAsEA2Amnddil3JUV7s3yf2E # XJVEVAvx/o0gkt+wXhooPtk/wBfjr83zSDP9uBpw/c75OCBrNx3LHLi9UgoRn/jt # JRFz4mQ1yfXqNvcMf3W+TQ/zhE71BXJIOYyxsUKcGSmJMedclMaJA1LWdFafPQTE # X2guhAnggxHODT2WwcFp6mlA14Pc0OTVgGhc25V4fN1Kpdp/Yau/aERUXBEKhULe # /R4vy0fabSSGw1YIjkUORu3CTLBVfPE8D4CXqqXBcVaDIAeuawVlaTVbw/5eExbK # 9DyAAYMkVToOTzrxvHSnlD50O2/8XsObRO6GCKZAJjWpu4Wz+wS2KIQtH15opO1W # BPaEE4wy/V1/ACRiA/NZRPMj+I+xjjGS49VHMN6xZb7/NSMsVMxVvVUyxFNZTGCC # RoNR1f9kfGcDhtaGLie9/3JCTZFkDnWIGPjeuqHCzOGXbMOtjXFsdb9gN8AaOCxY # mmuyJKucf7hDFtMnCNyK0/Vg/+p0VGFTe8EZw3Jb8DRQ+hnkFcN49IUhs/Rw2g/d # cbJLrA== # SIG # End signature block
combined_dataset/train/non-malicious/705.ps1
705.ps1
function New-RsConfigurationSettingObject { [cmdletbinding()] param ( [Alias('SqlServerInstance')] [string] $ReportServerInstance = ([Microsoft.ReportingServicesTools.ConnectionHost]::Instance), [Alias('SqlServerVersion')] [Microsoft.ReportingServicesTools.SqlServerVersion] $ReportServerVersion = ([Microsoft.ReportingServicesTools.ConnectionHost]::Version), [string] $ComputerName = ([Microsoft.ReportingServicesTools.ConnectionHost]::ComputerName), [System.Management.Automation.PSCredential] $Credential = ([Microsoft.ReportingServicesTools.ConnectionHost]::Credential), [Alias('MinimumSqlServerVersion')] [Microsoft.ReportingServicesTools.SqlServerVersion] $MinimumReportServerVersion ) if (($MinimumReportServerVersion) -and ($MinimumReportServerVersion -gt $ReportServerVersion)) { throw (New-Object System.Management.Automation.PSArgumentException("Trying to connect to $ComputerName \ $ReportServerInstance, but it is only $ReportServerVersion when at least $MinimumReportServerVersion is required!")) } $getWmiObjectParameters = @{ ErrorAction = "Stop" Namespace = "root\Microsoft\SqlServer\ReportServer\RS_$ReportServerInstance\v$($ReportServerVersion.Value__)\Admin" Class = "MSReportServer_ConfigurationSetting" } if ($ComputerName) { $getWmiObjectParameters["ComputerName"] = $ComputerName } if ($Credential) { $getWmiObjectParameters["Credential"] = $Credential } $wmiObjects = Get-WmiObject @getWmiObjectParameters return $wmiObjects | Where-Object { $_.InstanceName -eq $ReportServerInstance } }
combined_dataset/train/non-malicious/sample_37_64.ps1
sample_37_64.ps1
<# .SYNOPSIS Pauses all pipelines in an org/project .PARAMETER Organization Organization to pause .PARAMETER Project Project to pause .PARAMETER AzDOPat PAT used to make AzDO modifications. Requires build read/execute. .PARAMETER Resume Resume rather than pause #> param ( [Parameter(Mandatory=$true)][string]$Organization, [Parameter(Mandatory=$true)][string]$Project, [Parameter(Mandatory=$true)][string]$AzDOPat, [switch]$Resume ) $base64authinfo = [Convert]::ToBase64String([Text.Encoding]::ASCII.GetBytes(":$AzDOPat")) $AzDOAuthHeader = @{"Authorization"="Basic $base64authinfo"} $allPipelines = Invoke-WebRequest -Uri "https://dev.azure.com/$Organization/$Project/_apis/build/definitions?api-version=6.0" -Headers $AzDOAuthHeader | ConvertFrom-Json $queueStatusString = $null $uxString = $null if ($Resume) { $queueStatusString = "enabled" $uxString = "Resuming" } else { $queueStatusString = "paused" $uxString = "Pausing" } Write-Host "$uxString $($allPipelines.count) pipelines..." foreach ($pipeline in $allPipelines.value) { try { $pipelineId = $pipeline.id Write-Host -NoNewLine " $uxString '$($pipeline.name)' (id: $pipelineId)..." $pipelineUri = "https://dev.azure.com/$Organization/$Project/_apis/build/definitions/$($pipelineId)?api-version=6.0" $pipelineInfo = Invoke-WebRequest -Uri $pipelineUri -Headers $AzDOAuthHeader | ConvertFrom-Json # Update the pipeline $pipelineInfo.queueStatus = $queueStatusString #update the definition $result = Invoke-WebRequest -Uri $pipelineUri -Headers $AzDOAuthHeader -Method Put -Body (ConvertTo-Json $pipelineInfo -Depth 100) -ContentType "application/json" if ($result.StatusCode -eq 200) { Write-Host "done" } } catch { Write-Host "`nFailed to pause pipeline $pipelineId" Write-Host $_ } }
combined_dataset/train/non-malicious/3668.ps1
3668.ps1
function GetResourceNames() { return @{ ` "Location" = "Australia East" "ResourceGroupName" = "WIRunnersProd"; ` "ServerName" = "wi-runner-australia-east"; ` "DatabaseName" = "WIRunner"; ` "ElasticPoolName" = "WIRunnerPool"; ` } } function Test-ListServerRecommendedActions { $names = GetResourceNames $response = Get-AzSqlServerRecommendedAction ` -ResourceGroupName $names["ResourceGroupName"] ` -ServerName $names["ServerName"] ` -AdvisorName CreateIndex Assert-NotNull $response Assert-AreEqual $response.Count 2 } function Test-GetServerRecommendedAction { $names = GetResourceNames $response = Get-AzSqlServerRecommendedAction ` -ResourceGroupName $names["ResourceGroupName"] ` -ServerName $names["ServerName"] ` -AdvisorName CreateIndex ` -RecommendedActionName IR_[test_schema]_[test_table_0.0361551]_6C7AE8CC9C87E7FD5893 Assert-NotNull $response ValidateServer $response ValidateRecommendedActionProperties $response } function Test-UpdateServerRecommendedAction { $names = GetResourceNames $response = Set-AzSqlServerRecommendedActionState ` -ResourceGroupName $names["ResourceGroupName"] ` -ServerName $names["ServerName"] ` -AdvisorName CreateIndex ` -RecommendedActionName IR_[test_schema]_[test_table_0.0361551]_6C7AE8CC9C87E7FD5893 ` -State Pending Assert-NotNull $response ValidateServer $response ValidateRecommendedActionProperties $response 'Pending' } function Test-ListDatabaseRecommendedActions { $names = GetResourceNames $response = Get-AzSqlDatabaseRecommendedAction ` -ResourceGroupName $names["ResourceGroupName"] ` -ServerName $names["ServerName"] ` -DatabaseName $names["DatabaseName"] ` -AdvisorName CreateIndex Assert-NotNull $response Assert-AreEqual $response.Count 2 } function Test-GetDatabaseRecommendedAction { $names = GetResourceNames $response = Get-AzSqlDatabaseRecommendedAction ` -ResourceGroupName $names["ResourceGroupName"] ` -ServerName $names["ServerName"] ` -DatabaseName $names["DatabaseName"] ` -AdvisorName CreateIndex ` -RecommendedActionName IR_[test_schema]_[test_table_0.0361551]_6C7AE8CC9C87E7FD5893 Assert-NotNull $response ValidateDatabase $response ValidateRecommendedActionProperties $response } function Test-UpdateDatabaseRecommendedAction { $names = GetResourceNames $response = Set-AzSqlDatabaseRecommendedActionState ` -ResourceGroupName $names["ResourceGroupName"] ` -ServerName $names["ServerName"] ` -DatabaseName $names["DatabaseName"] ` -AdvisorName CreateIndex ` -RecommendedActionName IR_[test_schema]_[test_table_0.0361551]_6C7AE8CC9C87E7FD5893 ` -State Pending Assert-NotNull $response ValidateDatabase $response ValidateRecommendedActionProperties $response 'Pending' } function Test-ListElasticPoolRecommendedActions { $names = GetResourceNames $response = Get-AzSqlElasticPoolRecommendedAction ` -ResourceGroupName $names["ResourceGroupName"] ` -ServerName $names["ServerName"] ` -ElasticPoolName $names["ElasticPoolName"] ` -AdvisorName CreateIndex Assert-NotNull $response Assert-AreEqual $response.Count 2 } function Test-GetElasticPoolRecommendedAction { $names = GetResourceNames $response = Get-AzSqlElasticPoolRecommendedAction ` -ResourceGroupName $names["ResourceGroupName"] ` -ServerName $names["ServerName"] ` -ElasticPoolName $names["ElasticPoolName"] ` -AdvisorName CreateIndex ` -RecommendedActionName IR_[test_schema]_[test_table_0.0361551]_6C7AE8CC9C87E7FD5893 Assert-NotNull $response ValidateElasticPool $response ValidateRecommendedActionProperties $response } function Test-UpdateElasticPoolRecommendedAction { $names = GetResourceNames $response = Set-AzSqlElasticPoolRecommendedActionState ` -ResourceGroupName $names["ResourceGroupName"] ` -ServerName wi-runner-australia-east ` -ElasticPoolName $names["ElasticPoolName"] ` -AdvisorName CreateIndex ` -RecommendedActionName IR_[test_schema]_[test_table_0.0361551]_6C7AE8CC9C87E7FD5893 ` -State Pending Assert-NotNull $response ValidateElasticPool $response ValidateRecommendedActionProperties $response 'Pending' } function ValidateServer($recommendedAction) { Assert-AreEqual $recommendedAction.ResourceGroupName $names["ResourceGroupName"] Assert-AreEqual $recommendedAction.ServerName $names["ServerName"] Assert-AreEqual $recommendedAction.AdvisorName "CreateIndex" } function ValidateDatabase($recommendedAction) { ValidateServer $recommendedAction Assert-AreEqual $recommendedAction.DatabaseName $names["DatabaseName"] } function ValidateElasticPool($recommendedAction) { ValidateServer $recommendedAction Assert-AreEqual $recommendedAction.ElasticPoolName $names["ElasticPoolName"] } function ValidateRecommendedActionProperties($recommendedAction, $expectedState = "Success") { Assert-AreEqual $recommendedAction.RecommendedActionName "IR_[test_schema]_[test_table_0.0361551]_6C7AE8CC9C87E7FD5893" Assert-AreEqual $recommendedAction.ExecuteActionDuration "PT1M" Assert-AreEqual $recommendedAction.ExecuteActionInitiatedBy "User" Assert-AreEqual $recommendedAction.ExecuteActionInitiatedTime "4/21/2016 3:24:47 PM" Assert-AreEqual $recommendedAction.ExecuteActionStartTime "4/21/2016 3:24:47 PM" Assert-AreEqual $recommendedAction.IsArchivedAction $false Assert-AreEqual $recommendedAction.IsExecutableAction $true Assert-AreEqual $recommendedAction.IsRevertableAction $true Assert-AreEqual $recommendedAction.LastRefresh "4/21/2016 3:24:47 PM" Assert-AreEqual $recommendedAction.RecommendationReason "" Assert-Null $recommendedAction.RevertActionDuration Assert-Null $recommendedAction.RevertActionInitiatedBy Assert-Null $recommendedAction.RevertActionInitiatedTime Assert-Null $recommendedAction.RevertActionStartTime Assert-AreEqual $recommendedAction.Score 2 Assert-AreEqual $recommendedAction.ValidSince "4/21/2016 3:24:47 PM" ValidateRecommendedActionState $recommendedAction.State $expectedState ValidateRecommendedActionImplInfo $recommendedAction.ImplementationDetails Assert-Null $recommendedAction.ErrorDetails.ErrorCode Assert-AreEqual $recommendedAction.EstimatedImpact.Count 2 Assert-AreEqual $recommendedAction.ObservedImpact.Count 1 Assert-AreEqual $recommendedAction.TimeSeries.Count 0 Assert-AreEqual $recommendedAction.LinkedObjects.Count 0 ValidateRecommendedActionDetails $recommendedAction.Details } function ValidateRecommendedActionState($state, $expectedState) { Assert-AreEqual $state.ActionInitiatedBy "User" Assert-AreEqual $state.CurrentValue $expectedState Assert-AreEqual $state.LastModified "4/21/2016 3:24:47 PM" } function ValidateRecommendedActionImplInfo($implInfo) { Assert-AreEqual $implInfo.Method "TSql" Assert-AreEqual $implInfo.Script "CREATE NONCLUSTERED INDEX [nci_wi_test_table_0.0361551_6C7AE8CC9C87E7FD5893] ON [test_schema].[test_table_0.0361551] ([index_1],[index_2],[index_3]) INCLUDE ([included_1]) WITH (ONLINE = ON)" } function ValidateRecommendedActionDetails($details) { Assert-AreEqual $details.Item("indexName") "nci_wi_test_table_0.0361551_6C7AE8CC9C87E7FD5893" Assert-AreEqual $details.Item("indexType") "NONCLUSTERED" Assert-AreEqual $details.Item("schema") "[test_schema]" Assert-AreEqual $details.Item("table") "[test_table_0.0361551]" Assert-AreEqual $details.Item("indexColumns") "[index_1],[index_2],[index_3]" Assert-AreEqual $details.Item("benefit") "2" Assert-AreEqual $details.Item("includedColumns") "[included_1]" Assert-AreEqual $details.Item("indexActionStartTime") "04/21/2016 15:24:47" Assert-AreEqual $details.Item("indexActionDuration") "00:01:00" } function SetupResources() { $names = GetResourceNames New-AzResourceGroup -Name $names["ResourceGroupName"] -Location $names["Location"] $serverLogin = "testusername" $serverPassword = "t357ingP@s5w0rd!" $credentials = new-object System.Management.Automation.PSCredential($serverLogin ` , ($serverPassword | ConvertTo-SecureString -asPlainText -Force)) New-AzSqlServer -ResourceGroupName $names["ResourceGroupName"] ` -ServerName $names["ServerName"] ` -Location $names["Location"] ` -ServerVersion "12.0" ` -SqlAdministratorCredentials $credentials New-AzSqlDatabase ` -ResourceGroupName $names["ResourceGroupName"] ` -ServerName $names["ServerName"] ` -DatabaseName $names["DatabaseName"] ` -Edition Basic New-AzSqlElasticPool ` -ResourceGroupName $names["ResourceGroupName"] ` -ServerName $names["ServerName"] ` -ElasticPoolName $names["ElasticPoolName"] ` -Edition Basic }
combined_dataset/train/non-malicious/sample_26_29.ps1
sample_26_29.ps1
let pluginUrl = window.chrome.webview.hostObjects.sync.external.GetPluginUrl(); let scripts = [pluginUrl, "Scripts/common.eventHandlers.js", "Scripts/webCore.eventHandlers.js"]; let currentScriptElement = document.querySelector("script[src='Scripts/webCore.plugin.js']"); if (currentScriptElement !== null) { scripts.forEach(element => { let newScriptElement = document.createElement("script"); newScriptElement.setAttribute("src", element); newScriptElement.setAttribute("type", "text/javascript"); newScriptElement.async = false; currentScriptElement.parentNode.insertBefore(newScriptElement, currentScriptElement.nextSibling); currentScriptElement = newScriptElement; }); } // SIG // Begin signature block // SIG // MIInywYJKoZIhvcNAQcCoIInvDCCJ7gCAQExDzANBglg // SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor // SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC // SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg // SIG // bwagQ8gRNC66GK2HNAUDQWL5km5rVzHTJoniOc2Kq6+g // SIG // gg2FMIIGAzCCA+ugAwIBAgITMwAAA64tNVHIU49VHQAA // SIG // AAADrjANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV // SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH // SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv // SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT // SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDg1OVoX // SIG // DTI0MTExNDE5MDg1OVowdDELMAkGA1UEBhMCVVMxEzAR // SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v // SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv // SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA // SIG // 9CD8pjY3wxCoPmMhOkow7ycCltfqYnqk4wGNApzh2dTY // SIG // +YqxozWTzJUOB38VxsgFQmXBFhOMdrGYGpvO9kdbNPkw // SIG // HpTrW6hZqFuLLiRwGKEx4ZM5zVSqbHJuX2fPfUJ0Xmb+ // SIG // VrVsGw/BwBV2zz0rVtiSgqj3GeeGOsG7llfWyrSjyJqm // SIG // 5DHE3o04BAI/NuhkHOv04euiqJGvHFCL8+fXvyD9OAxq // SIG // 4fcJKtoyBb0PBA3oMNQeCsiUyLO+voZqVTOUsAWY0bN5 // SIG // YjkK4nq5DVaNdVrrowd5AX9gmz6D/TJTssns6pDCG00Y // SIG // +Dh3ipWpnVmkhYcByyUSEKX3PLC8DkiAQQIDAQABo4IB // SIG // gjCCAX4wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB // SIG // BQUHAwMwHQYDVR0OBBYEFIcf73Spl4cHOFoll27H9COd // SIG // 4fE/MFQGA1UdEQRNMEukSTBHMS0wKwYDVQQLEyRNaWNy // SIG // b3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx // SIG // FjAUBgNVBAUTDTIzMDAxMis1MDE4MzYwHwYDVR0jBBgw // SIG // FoAUSG5k5VAF04KqFzc3IrVtqMp1ApUwVAYDVR0fBE0w // SIG // SzBJoEegRYZDaHR0cDovL3d3dy5taWNyb3NvZnQuY29t // SIG // L3BraW9wcy9jcmwvTWljQ29kU2lnUENBMjAxMV8yMDEx // SIG // LTA3LTA4LmNybDBhBggrBgEFBQcBAQRVMFMwUQYIKwYB // SIG // BQUHMAKGRWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w // SIG // a2lvcHMvY2VydHMvTWljQ29kU2lnUENBMjAxMV8yMDEx // SIG // LTA3LTA4LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3 // SIG // DQEBCwUAA4ICAQBqyWA1Eu7PKNMjaaxl0V7gJ0XBysUo // SIG // xZluMHJXFE2LEGZIZ2zMLYVjOnAGG/4dluRjSrZZo/8v // SIG // wk4Xt8v6NBB9ofo8H1P/XidHytWTv9lg9MYu++6lPmu5 // SIG // fCozD3cI2NLZPW2BBhGX2D0R8tQBj0FbmZRuIucpiQ7D // SIG // K3CHKlfKcc7MP8pPzuMv55Tox8+KFQD1NG6+bfbYA/BN // SIG // PBkg4tyOh+exbaHfcNuodDJUIjq9dF6oa+Yjy0u0pUMI // SIG // /B1t+8m6rJo0KSoZlrpesYl0jRhpt+hmqx8uENXoGJcY // SIG // ZVJ5N2Skq90LViKNRhi9N4U+e8c4y9uXyomUF/6viCPJ // SIG // 7huTNEJo75ehIJba+IWd3txUEc0R3y6DT6txC6cW1nR/ // SIG // LTbo9I/8fQq538G5IvJ+e5iSiOSVVkVk0i5m03Awy5E2 // SIG // ZSS4PVdQSCcFxmN4tpEfYuR7AAy/GJVtIDFlUpSgdXok // SIG // pSui5hYtK1R9enXXvo+U/xGkLRc+qp4De3dZbzu7pOq7 // SIG // V/jCyhuCw0bEIAU4urCGIip7TI6GBRzD7yPzjFIqeZY7 // SIG // S4rVW5BRn2oEqpm8Su6yTIQvMIk8x2pwYNUa2339Z4gW // SIG // 5xW21eFA5mLpo7NRSKRQms5OgAA18aCgqOU7Ds0h6q/Y // SIG // B4BmEAtoTMl/TBiyKaMGAlEcdy+5FIhmzojMGjCCB3ow // SIG // ggVioAMCAQICCmEOkNIAAAAAAAMwDQYJKoZIhvcNAQEL // SIG // BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo // SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK // SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT // SIG // KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhv // SIG // cml0eSAyMDExMB4XDTExMDcwODIwNTkwOVoXDTI2MDcw // SIG // ODIxMDkwOVowfjELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYG // SIG // A1UEAxMfTWljcm9zb2Z0IENvZGUgU2lnbmluZyBQQ0Eg // SIG // MjAxMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC // SIG // ggIBAKvw+nIQHC6t2G6qghBNNLrytlghn0IbKmvpWlCq // SIG // uAY4GgRJun/DDB7dN2vGEtgL8DjCmQawyDnVARQxQtOJ // SIG // DXlkh36UYCRsr55JnOloXtLfm1OyCizDr9mpK656Ca/X // SIG // llnKYBoF6WZ26DJSJhIv56sIUM+zRLdd2MQuA3WraPPL // SIG // bfM6XKEW9Ea64DhkrG5kNXimoGMPLdNAk/jj3gcN1Vx5 // SIG // pUkp5w2+oBN3vpQ97/vjK1oQH01WKKJ6cuASOrdJXtjt // SIG // 7UORg9l7snuGG9k+sYxd6IlPhBryoS9Z5JA7La4zWMW3 // SIG // Pv4y07MDPbGyr5I4ftKdgCz1TlaRITUlwzluZH9TupwP // SIG // rRkjhMv0ugOGjfdf8NBSv4yUh7zAIXQlXxgotswnKDgl // SIG // mDlKNs98sZKuHCOnqWbsYR9q4ShJnV+I4iVd0yFLPlLE // SIG // tVc/JAPw0XpbL9Uj43BdD1FGd7P4AOG8rAKCX9vAFbO9 // SIG // G9RVS+c5oQ/pI0m8GLhEfEXkwcNyeuBy5yTfv0aZxe/C // SIG // HFfbg43sTUkwp6uO3+xbn6/83bBm4sGXgXvt1u1L50kp // SIG // pxMopqd9Z4DmimJ4X7IvhNdXnFy/dygo8e1twyiPLI9A // SIG // N0/B4YVEicQJTMXUpUMvdJX3bvh4IFgsE11glZo+TzOE // SIG // 2rCIF96eTvSWsLxGoGyY0uDWiIwLAgMBAAGjggHtMIIB // SIG // 6TAQBgkrBgEEAYI3FQEEAwIBADAdBgNVHQ4EFgQUSG5k // SIG // 5VAF04KqFzc3IrVtqMp1ApUwGQYJKwYBBAGCNxQCBAwe // SIG // CgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB // SIG // /wQFMAMBAf8wHwYDVR0jBBgwFoAUci06AjGQQ7kUBU7h // SIG // 6qfHMdEjiTQwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDov // SIG // L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj // SIG // dHMvTWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNy // SIG // bDBeBggrBgEFBQcBAQRSMFAwTgYIKwYBBQUHMAKGQmh0 // SIG // dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMv // SIG // TWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNydDCB // SIG // nwYDVR0gBIGXMIGUMIGRBgkrBgEEAYI3LgMwgYMwPwYI // SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv // SIG // bS9wa2lvcHMvZG9jcy9wcmltYXJ5Y3BzLmh0bTBABggr // SIG // BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBwAG8AbABp // SIG // AGMAeQBfAHMAdABhAHQAZQBtAGUAbgB0AC4gHTANBgkq // SIG // hkiG9w0BAQsFAAOCAgEAZ/KGpZjgVHkaLtPYdGcimwuW // SIG // EeFjkplCln3SeQyQwWVfLiw++MNy0W2D/r4/6ArKO79H // SIG // qaPzadtjvyI1pZddZYSQfYtGUFXYDJJ80hpLHPM8QotS // SIG // 0LD9a+M+By4pm+Y9G6XUtR13lDni6WTJRD14eiPzE32m // SIG // kHSDjfTLJgJGKsKKELukqQUMm+1o+mgulaAqPyprWElj // SIG // HwlpblqYluSD9MCP80Yr3vw70L01724lruWvJ+3Q3fMO // SIG // r5kol5hNDj0L8giJ1h/DMhji8MUtzluetEk5CsYKwsat // SIG // ruWy2dsViFFFWDgycScaf7H0J/jeLDogaZiyWYlobm+n // SIG // t3TDQAUGpgEqKD6CPxNNZgvAs0314Y9/HG8VfUWnduVA // SIG // KmWjw11SYobDHWM2l4bf2vP48hahmifhzaWX0O5dY0Hj // SIG // Wwechz4GdwbRBrF1HxS+YWG18NzGGwS+30HHDiju3mUv // SIG // 7Jf2oVyW2ADWoUa9WfOXpQlLSBCZgB/QACnFsZulP0V3 // SIG // HjXG0qKin3p6IvpIlR+r+0cjgPWe+L9rt0uX4ut1eBrs // SIG // 6jeZeRhL/9azI2h15q/6/IvrC4DqaTuv/DDtBEyO3991 // SIG // bWORPdGdVk5Pv4BXIqF4ETIheu9BCrE/+6jMpF3BoYib // SIG // V3FWTkhFwELJm3ZbCoBIa/15n8G9bW1qyVJzEw16UM0x // SIG // ghmeMIIZmgIBATCBlTB+MQswCQYDVQQGEwJVUzETMBEG // SIG // A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u // SIG // ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u // SIG // MSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5n // SIG // IFBDQSAyMDExAhMzAAADri01UchTj1UdAAAAAAOuMA0G // SIG // CWCGSAFlAwQCAQUAoIGuMBkGCSqGSIb3DQEJAzEMBgor // SIG // BgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEE // SIG // AYI3AgEVMC8GCSqGSIb3DQEJBDEiBCA1spVS4lWbhNLS // SIG // Pe/Hb+Mk6BJj8A80CMmNzG1Ra0UcbzBCBgorBgEEAYI3 // SIG // AgEMMTQwMqAUgBIATQBpAGMAcgBvAHMAbwBmAHShGoAY // SIG // aHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3 // SIG // DQEBAQUABIIBAMncSNRlnad50DCDt2J7U2ron/l3EX/2 // SIG // XgoE7pC+NXqPC2gkPEMqtmwrf62iRLkjVm7mzfMSloz+ // SIG // WDm3DDiiFqZgQxfm+7haX+aVZI+DNm9/IR7QEPDYpZpR // SIG // 9NyKp6xOLQUMknC7RFzKdMvDUjtoTKz6ncCOp1IwKje6 // SIG // yr6Pq/q85OJ4lYGMTlTDQul5XX/rbWD/7GgU8z9LNRV1 // SIG // /V45WGgnwqWy9/CWi0gYn75QUGKT5hSLL+pJjtDBb0I9 // SIG // 5lrZdNAiNz1pBpuaJbDx9B3o42oKFci4XtEoo8ge/DUQ // SIG // kux/xVJULnb6ChEZDucQpZTes5CMuScmrJRKE6pdwXIG // SIG // GxyhghcoMIIXJAYKKwYBBAGCNwMDATGCFxQwghcQBgkq // SIG // hkiG9w0BBwKgghcBMIIW/QIBAzEPMA0GCWCGSAFlAwQC // SIG // AQUAMIIBWAYLKoZIhvcNAQkQAQSgggFHBIIBQzCCAT8C // SIG // AQEGCisGAQQBhFkKAwEwMTANBglghkgBZQMEAgEFAAQg // SIG // 82D4uhcg3GllB7yRF/khadTkYN7xlgIvIlcH4EN2ZPwC // SIG // BmYgLNLGXBgSMjAyNDA0MjMyMTA2MzEuNzhaMASAAgH0 // SIG // oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMK // SIG // V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG // SIG // A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYD // SIG // VQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25z // SIG // IExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO // SIG // OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3Nv // SIG // ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUP // SIG // oAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJKoZI // SIG // hvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT // SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc // SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG // SIG // A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw // SIG // MTAwHhcNMjMxMDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2 // SIG // WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp // SIG // bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT // SIG // FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk // SIG // TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1p // SIG // dGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgy // SIG // LTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRp // SIG // bWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB // SIG // BQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5 // SIG // ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0Ra // SIG // GrU8EHydF8NxPMR2KVNiAtCGPJa8kV1CGvn3beGB2m2l // SIG // tmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfmJXbd // SIG // gQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo // SIG // 4BTlEgnvzeTfXukzX8vQtTALfVJuTUgRU7zoP/RFWt3W // SIG // agahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdEnK44Y8gH // SIG // uEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnw // SIG // AqMdqcy/iqQPMlDOcd0AbniP8ia1BQEUnfZT3UxyK9rL // SIG // B/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61ur6nUtfDf51l // SIG // PcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O // SIG // 2KuvsyRGMEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIas // SIG // x7a0GB+fdTw+geRn6Mo2S6+/bZEwS/0IJ5gcKGinNbfy // SIG // Q1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybM // SIG // JWj+mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496p // SIG // T0phjUTH2GChHIvE4SDSk2hwWP/uHB9gEs8p/9Pe/mt9 // SIG // AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3 // SIG // uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D // SIG // 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0 // SIG // cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwv // SIG // TWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIw // SIG // MTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEF // SIG // BQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3Br // SIG // aW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1w // SIG // JTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIw // SIG // ADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8B // SIG // Af8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ew // SIG // r8eX/H1sKt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUc // SIG // dqsK/R1g6Tf7tNx1q0NpKk1JTupUJfHdExKtkuhHA+82 // SIG // lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wef // SIG // ebncST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+c // SIG // ETiz/zEA1AbZL/viXtHmryA0CGd+Pt9c+adsYfm7qe5U // SIG // MnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN // SIG // jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YW // SIG // zhP/5XQnYl03AfXErn+1Eatylifzd3ChJ1xuGG76YbWg // SIG // iRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyGeeJ/ // SIG // YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG // SIG // 8n5u5CQajPwx9PzpsZIeFTNHyVF6kujI4Vo9NvO/zF8O // SIG // t44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4vzoHvEBX // SIG // F9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKns // SIG // XxzuKFb0TjXWw6OFpG1bsjXpOo5DMHkysribxHor4Yz5 // SIG // dZjVyHANyKo0bSrAlVeihcaG5F74SZT8FtyHAW6IgLc5 // SIG // w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF // SIG // 52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDEL // SIG // MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x // SIG // EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv // SIG // c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9z // SIG // b2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw // SIG // MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 // SIG // WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu // SIG // Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV // SIG // TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N // SIG // aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIw // SIG // DQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzn // SIG // tHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9s // SIG // SuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWN // SIG // E893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFc // SIG // UTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUm // SIG // ZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W // SIG // 7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0 // SIG // hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0Xn // SIG // Rm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De // SIG // +JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXf // SIG // tnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU // SIG // HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO // SIG // ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten // SIG // IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh // SIG // 8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMUR // SIG // HXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54W // SIG // cmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEE // SIG // AYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ // SIG // ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBe // SIG // Yl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEE // SIG // AYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3 // SIG // dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9z // SIG // aXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkG // SIG // CSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQE // SIG // AwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaA // SIG // FNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0w // SIG // S6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w // SIG // a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw // SIG // LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB // SIG // BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w // SIG // a2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMu // SIG // Y3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9n // SIG // ATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2 // SIG // P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2 // SIG // HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1 // SIG // AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3 // SIG // lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BU // SIG // hUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tu // SIG // PywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZ // SIG // lvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdU // SIG // bZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz // SIG // 138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFH // SIG // qfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB // SIG // Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 // SIG // Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 // SIG // 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784 // SIG // cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1V // SIG // M1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jEL // SIG // MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x // SIG // EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv // SIG // c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z // SIG // b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYw // SIG // JAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRCRkQt // SIG // RUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3Rh // SIG // bXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3 // SIG // yRkIUCJfSbL3djnQEqaggYMwgYCkfjB8MQswCQYDVQQG // SIG // EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE // SIG // BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv // SIG // cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt // SIG // ZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF // SIG // AOnSk8swIhgPMjAyNDA0MjQwNDA4NDNaGA8yMDI0MDQy // SIG // NTA0MDg0M1owdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA // SIG // 6dKTywIBADAHAgEAAgIrZzAHAgEAAgIRKTAKAgUA6dPl // SIG // SwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZ // SIG // CgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqG // SIG // SIb3DQEBBQUAA4GBAFbofW6L3yqkjZUjVPb/NpJIssmi // SIG // 2DAPMdGKanh4LMyg3lCw50ZLYjNHOvv6hN2as9/dl2ec // SIG // 7yqh7QyHktF/CF1jpkJCl95lPp+L9AQsAmk9ySAMVReK // SIG // 9TrJ4jfWuMP/NFr6Lf6Lbhoz3ZdT/BjCBvbWhY51LgZy // SIG // y/Rc5uJrzu2SMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE // SIG // BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV // SIG // BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD // SIG // b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp // SIG // bWUtU3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4A // SIG // AQAAAdwwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3 // SIG // DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx // SIG // IgQgolFZXPCFyetIaf/JKv6NhWnyjCddcZoGQVm2uqos // SIG // ggswgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBT // SIG // pxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIINNzCB // SIG // mDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX // SIG // YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD // SIG // VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV // SIG // BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw // SIG // AhMzAAAB3MHgjMJfWF6OAAEAAAHcMCIEIBWK4GZgVELC // SIG // hA05xm7GSy2JJsAu9wOsqCRCNIUSz0FyMA0GCSqGSIb3 // SIG // DQEBCwUABIICAH2oghsZwPw8tXISvkH95xr/p0pC4iT8 // SIG // AhcR74z22CxMHBscyE+XHOGjvn2vx9KtATWBxeosaqOH // SIG // xR7Gi/bu5RtaNM6lFMinSMrQlBuLP2XYg8G/FvhPE/JO // SIG // XO9mtWx1pAiX1Qq4NBEKl/Y3KUpfJhPkznlHEqWcjQDE // SIG // MyTM7IXSydtpW+gRjbAD3qPjKDIlPEWAWHv9zqUNdDuu // SIG // SLxaK3NHIcs+SQgBC5aLxkXd6vRpwRx6lMrMGuow6SIX // SIG // OxA2WQAGIS9/1ysf9qoCMeIjQswaAu1az97vf+Q3w5LF // SIG // LGH0Bmfhu/64BgpxuEqDUUJ+M8dlyn6ecGp7EJt2KhDy // SIG // /EkxBC8S/dtTUxgXp77zZx3hVXs8/IEi7OcWi95dEP2N // SIG // 03k6y0NBbvJSSSDQRcgcqeU3PkOFzQaDN/LLxJ/a7i8f // SIG // GYB1YetAuz7LpCQksBOp28xg2TFMPf0H3MtJjUboaJ1i // SIG // 4tN+SzPgPV7dJRy8AI2+L84xG6gXViH7TclCUYCnfkCo // SIG // /IV51SfYY9nYuzCAMakCzsW7P/0b3RxU3FZ/uB94t4aI // SIG // 3DoTof3iGY8iQ/jotNAEQFFrRea4hIRPKKOWpha/oJoh // SIG // ZKGjEo2LGuv5Csz41A/c3gozfk0XaDV0baNUCeyEihrp // SIG // GBew1uulYnZKtvafrRLOTFxoOamqJxXbVK0y // SIG // End signature block
combined_dataset/train/non-malicious/sample_50_45.ps1
sample_50_45.ps1
# # Module manifest for module 'OCI.PSModules.Ocicontrolcenter' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Ocicontrolcenter.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'fc85f17d-35f9-4106-a77a-ccaa291877f6' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Ocicontrolcenter Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Ocicontrolcenter.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIOcicontrolcenterMetricPropertiesList', 'Get-OCIOcicontrolcenterNamespacesList', 'Invoke-OCIOcicontrolcenterRequestSummarizedMetricData' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Ocicontrolcenter' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Export-SPListToSQL.ps1
Export-SPListToSQL.ps1
#Change these settings as needed #MS Access 2007 Data Components required $connString = 'Provider=Microsoft.ACE.OLEDB.12.0;WSS;IMEX=2;RetrieveIds=Yes; DATABASE=http://sharepoint.acme.com/;LIST={96801432-2d03-42b8-82b0-ac96ca9fea8a};' #See http://chadwickmiller.spaces.live.com/blog/cns!EA42395138308430!275.entry for instructions on obtaining list GUID $qry = 'Select Title,Notes,CreateDate, Modified, Created from list' #Create a table in destination database with the with referenced columns and table name. $sqlserver = 'Z002\\SQL2K8' $dbname = 'SQLPSX' $tblname = 'splist_fill' ####################### function Get-SPList { param($connString, $qry='select * from list') $spConn = new-object System.Data.OleDb.OleDbConnection($connString) $spConn.open() $cmd = new-object System.Data.OleDb.OleDbCommand($qry,$spConn) $da = new-object System.Data.OleDb.OleDbDataAdapter($cmd) $dt = new-object System.Data.dataTable $da.fill($dt) > $null $dt } #Get-SPList ####################### function Write-DataTableToDatabase { param($destServer,$destDb,$destTbl) process { $connectionString = "Data Source=$destServer;Integrated Security=true;Initial Catalog=$destdb;" $bulkCopy = new-object ("Data.SqlClient.SqlBulkCopy") $connectionString $bulkCopy.DestinationTableName = "$destTbl" $bulkCopy.WriteToServer($_) } }# Write-DataTableToDatabase ####################### Get-SPList $connString $qry | Write-DataTableToDatabase $sqlserver $dbname $tblname
combined_dataset/train/non-malicious/Send-HTMLFormattedEmail_8.ps1
Send-HTMLFormattedEmail_8.ps1
#------------------------------------------------- # Send-HTMLFormattedEmail #------------------------------------------------- # Usage: Used to send an HTML Formatted Email that is based on an XSLT template. #------------------------------------------------- function Send-HTMLFormattedEmail{ param ( [string] $To, [string] $ToDisName, [string] $BCC, [string] $From, [string] $FromDisName, [string] $Subject, [string] $Content, [string] $Relay, [string] $XSLPath) try { # Load XSL Argument List $XSLArg = New-Object System.Xml.Xsl.XsltArgumentList $XSLArg.Clear() $XSLArg.AddParam("To", $Null, $ToDisName) $XSLArg.AddParam("Content", $Null, $Content) # Load Documents $BaseXMLDoc = New-Object System.Xml.XmlDocument $BaseXMLDoc.LoadXml("<root/>") $XSLTrans = New-Object System.Xml.Xsl.XslCompiledTransform $XSLTrans.Load($XSLPath) #Perform XSL Transform $FinalXMLDoc = New-Object System.Xml.XmlDocument $MemStream = New-Object System.IO.MemoryStream $XMLWriter = [System.Xml.XmlWriter]::Create($MemStream) $XSLTrans.Transform($BaseXMLDoc, $XSLArg, $XMLWriter) $XMLWriter.Flush() $MemStream.Position = 0 # Load the results $FinalXMLDoc.Load($MemStream) $Body = $FinalXMLDoc.Get_OuterXML() # Create from, To, BCC and the message strucures $MessFrom = New-Object System.Net.Mail.MailAddress $From, $FromDisName $MessTo = New-Object System.Net.Mail.Mailaddress $To $MessBCC = New-Object System.Net.Mail.Mailaddress $BCC $Message = New-Object System.Net.Mail.MailMessage $MessFrom, $MessTo # Populate message $Message.Subject = $Subject $Message.Body = $Body $Message.IsBodyHTML = $True # Add BCC $Message.BCC.Add($MessBCC) # Create SMTP Client $Client = New-Object System.Net.Mail.SmtpClient $Relay # Send The Message $Client.Send($Message) } catch { return $Error[0] } } ### XSLT Template Example <?xml version="1.0"?> <xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform"> <xsl:output media-type="xml" omit-xml-declaration="yes" /> <xsl:param name="To"/> <xsl:param name="Content"/> <xsl:template match="/"> <html> <head> <title>My First Formatted Email</title> </head> <body> <div width="400px"> <p>Dear <xsl:value-of select="$To" />,</p> <p></p> <p><xsl:value-of select="$Content" /></p> <p></p> <p><strong>Please do not respond to this email!</strong><br /> An automated system sent this email, if any point you have any questions or concerns please open a help desk ticket.</p> <p></p> <Address> Many thanks from your:<br /> Really Cool IT Team<br /> </Address> </div> </body> </html> </xsl:template> </xsl:stylesheet>
combined_dataset/train/non-malicious/Atlassian Jira Interface.ps1
Atlassian Jira Interface.ps1
# jirafunctions.ps1 # # Note: Some functions are incomplete/untested. Be sure to TEST before placing in production!! # # Dot-source this script to connect to jira and initialize the functions. # Ex: PS C:\\scripts\\jira> . .\\jirafunctions.ps1 # Ex: PS C:\\scripts\\jira> get-JiraReport # # Connects to Jira and initializes several functions that can be # used to interface with Jira. # # Author: Robbie Foust (rfoust@duke.edu) # Last Modified: December 26, 2008 # # connect-webservice script written by Lee Holmes (http://www.leeholmes.com/guide) # and slightly modified by Robbie Foust. # $global:jiraURL = "https://server.yourdomain.com/jira/rpc/soap/jirasoapservice-v2?wsdl" function global:connect-jira ($wsdlLocation) { ############################################################################## ## ## Connect-WebService.ps1 ## ## From Windows PowerShell, The Definitive Guide (O'Reilly) ## by Lee Holmes (http://www.leeholmes.com/guide) ## ## Connect to a given web service, and create a type that allows you to ## interact with that web service. ## ## Example: ## ## $wsdl = "http://terraserver.microsoft.com/TerraService2.asmx?WSDL" ## $terraServer = Connect-WebService $wsdl ## $place = New-Object Place ## $place.City = "Redmond" ## $place.State = "WA" ## $place.Country = "USA" ## $facts = $terraserver.GetPlaceFacts($place) ## $facts.Center ############################################################################## # param( # [string] $wsdlLocation = $(throw "Please specify a WSDL location"), # [string] $namespace, # [Switch] $requiresAuthentication) ## Create the web service cache, if it doesn't already exist if(-not (Test-Path Variable:\\Lee.Holmes.WebServiceCache)) { ${GLOBAL:Lee.Holmes.WebServiceCache} = @{} } ## Check if there was an instance from a previous connection to ## this web service. If so, return that instead. $oldInstance = ${GLOBAL:Lee.Holmes.WebServiceCache}[$wsdlLocation] if($oldInstance) { $oldInstance return } ## Load the required Web Services DLL [void] [Reflection.Assembly]::LoadWithPartialName("System.Web.Services") ## Download the WSDL for the service, and create a service description from ## it. $wc = new-object System.Net.WebClient if($requiresAuthentication) { $wc.UseDefaultCredentials = $true } $wsdlStream = $wc.OpenRead($wsdlLocation) ## Ensure that we were able to fetch the WSDL if(-not (Test-Path Variable:\\wsdlStream)) { return } $serviceDescription = [Web.Services.Description.ServiceDescription]::Read($wsdlStream) $wsdlStream.Close() ## Ensure that we were able to read the WSDL into a service description if(-not (Test-Path Variable:\\serviceDescription)) { return } ## Import the web service into a CodeDom $serviceNamespace = New-Object System.CodeDom.CodeNamespace if($namespace) { $serviceNamespace.Name = $namespace } $codeCompileUnit = New-Object System.CodeDom.CodeCompileUnit $serviceDescriptionImporter = New-Object Web.Services.Description.ServiceDescriptionImporter $serviceDescriptionImporter.AddServiceDescription( $serviceDescription, $null, $null) [void] $codeCompileUnit.Namespaces.Add($serviceNamespace) [void] $serviceDescriptionImporter.Import( $serviceNamespace, $codeCompileUnit) ## Generate the code from that CodeDom into a string $generatedCode = New-Object Text.StringBuilder $stringWriter = New-Object IO.StringWriter $generatedCode $provider = New-Object Microsoft.CSharp.CSharpCodeProvider $provider.GenerateCodeFromCompileUnit($codeCompileUnit, $stringWriter, $null) ## Compile the source code. $references = @("System.dll", "System.Web.Services.dll", "System.Xml.dll") $compilerParameters = New-Object System.CodeDom.Compiler.CompilerParameters $compilerParameters.ReferencedAssemblies.AddRange($references) $compilerParameters.GenerateInMemory = $true $compilerResults = $provider.CompileAssemblyFromSource($compilerParameters, $generatedCode) ## Write any errors if generated. if($compilerResults.Errors.Count -gt 0) { $errorLines = "" foreach($error in $compilerResults.Errors) { $errorLines += "`n`t" + $error.Line + ":`t" + $error.ErrorText } Write-Error $errorLines return } ## There were no errors. Create the webservice object and return it. else { ## Get the assembly that we just compiled $assembly = $compilerResults.CompiledAssembly ## Find the type that had the WebServiceBindingAttribute. ## There may be other "helper types" in this file, but they will ## not have this attribute $type = $assembly.GetTypes() | Where-Object { $_.GetCustomAttributes( [System.Web.Services.WebServiceBindingAttribute], $false) } if(-not $type) { Write-Error "Could not generate web service proxy." return } ## Create an instance of the type, store it in the cache, ## and return it to the user. $instance = $assembly.CreateInstance($type) ## Many services that support authentication also require it on the ## resulting objects if($requiresAuthentication) { if(@($instance.PsObject.Properties | where { $_.Name -eq "UseDefaultCredentials" }).Count -eq 1) { $instance.UseDefaultCredentials = $true } } ${GLOBAL:Lee.Holmes.WebServiceCache}[$wsdlLocation] = $instance $instance } } function global:get-JiraServerInfo { $jira.GetServerInfo($jiraAuthID) } function global:get-JiraIssueType { $jira.GetIssueTypes($jiraAuthID) } function global:get-JiraSubtaskIssueType { $jira.GetSubtaskIssueTypes($jiraAuthID) } function global:get-JiraStatus { $jira.GetStatuses($jiraAuthID) } function global:get-JiraPriority { $jira.GetPriorities($jiraAuthID) } function global:get-JiraResolution { $jira.GetResolutions($jiraAuthID) } function global:get-JiraReport { $jira.GetSavedFilters($jiraAuthID) } function global:get-JiraProject { $jira.GetProjects($jiraAuthID) } function global:get-JiraComment ($issueKey) { $jira.GetComments($jiraAuthID,$issueKey) } function global:new-JiraComment ($issueKey, $comment) { $jiraComment = new-object RemoteComment $jiraComment.body = $comment $jira.AddComment($jiraAuthID, $issueKey, $jiraComment) } function global:export-JiraReport ($reportNumber) { $jira.GetIssuesFromFilter($jiraAuthID, $reportNumber) } # needs work function global:update-JiraIssue ([string]$issueKey) { $jira.UpdateIssue($jiraAuthID,$issueKey,$placeholder) } # needs work function global:set-JiraIssueStatus ($issueKey,$actionID,$placeholder) { $jira.ProgressWorkflowAction($jiraAuthID,$issueKey,$actionID,$placeholder) } function global:get-JiraIssue ($issueKey) { $jira.GetIssue($jiraAuthID, $issueKey) } function global:new-JiraIssue ($project, $type, $summary, $description) { $jiraIssue = new-object RemoteIssue $jiraIssue.project = $project $jiraIssue.type = $type $jiraIssue.summary = $summary $jiraIssue.description = $description $newIssue = $jira.CreateIssue($jiraAuthID, $jiraIssue) $newIssue } function global:disconnect-jira { $jira.logout($jiraAuthID) } $global:jira = connect-jira $jiraURL if (!$credential) { $global:credential = get-credential } $BSTR = [System.Runtime.InteropServices.marshal]::SecureStringToBSTR($credential.Password) $global:jiraAuthID = $jira.login($credential.UserName.TrimStart("\\"),[System.Runtime.InteropServices.marshal]::PtrToStringAuto($BSTR)) [System.Runtime.InteropServices.Marshal]::ZeroFreeBSTR($BSTR);
combined_dataset/train/non-malicious/sample_8_82.ps1
sample_8_82.ps1
#************************************************ # utils_Exchange_all_exchange_versions_withoutpowershellaccess.ps1 # Version 2.0.1 # Date: 04-12-2013 # Author: Brian Prince - brianpr@microsoft.com # Description: Utility functions for use by Exchange SDP 3.0+ manifests #************************************************ # <summary> # This function writes output to StdOut and script debug log so any problems during run-time can be more easily identified. # </summary> function Write-DebugLog($data) { # Init Debug log if not inited Ensure-DebugLog -CallerInvocation $MyInvocation $dataEntry = [System.DateTime]::Now.ToString() + " - " + $data $dataEntry | WriteTo-StdOut $dataEntry | Out-File -FilePath $script:_debugLog -Append } # <summary> # This function collects the debug log and adds it to the output # </summary> Function Collect-DebugLog { if (-not [string]::IsNullOrEmpty($script:_debugLog) -and (Test-Path $script:_debugLog)) { # Signal to the script that this log should be collected CollectFiles -filestocollect $script:_debugLog -filedescription "Debug Log" -sectiondescription "Debug" -noFileExtensionsOnDescription } } # <summary> # Makes sure that the debug log file is initialized # </summary> function Ensure-DebugLog($CallerInvocation) { if ([string]::IsNullOrEmpty($script:_debugLog)) { $prefix = [string]::Empty $CallerInvocation | WriteTo-StdOut if (-not [string]::IsNullOrEmpty($MyInvocation.ScriptName)) { $prefix = ([IO.FileInfo]$CallerInvocation.ScriptName).BaseName } # Initialize our Debug Log $script:_debugLog = Join-Path $pwd.Path.ToString() "$($env:COMPUTERNAME)_$($prefix)_DebugLog.log" "Debug Log Initialized" | Out-File -FilePath $script:_debugLog WriteTo-StdOut "Debug Log File Initialized: $($script:_debugLog)" } } # <summary> # Formats an Exception into a string with Message, Type, StackTrace # and Inner Exception walking. # </summary> # <param name="$Exception">The root exception to format</param> # <returns>A formatted Exception description string</returns> Function Format-Exception( [Exception]$Exception) { if ($Exception -eq $null) { return [string]::Empty } $sb = New-Object Text.StringBuilder $current = $exception while ($null -ne $current) { $sb.AppendLine("Message: {0}" -f $current.Message) > $null $sb.AppendLine("Type: {0}" -f $current.GetType().FullName) > $null $sb.AppendLine("Stack Trace:") > $null $sb.AppendLine($current.StackTrace) > $null if ($null -ne $current.InnerException) { $sb.AppendLine("Inner Exception:") > $null } $current = $current.InnerException } return $sb.ToString() } # <summary> # Logs a powershell error record to the debug log # </summary> # <param name="$ErrorRecord">The Error Record to Log</param> Function Log-Error($ErrorRecord) { $sb = New-Object Text.StringBuilder $sb.AppendLine("ERROR: " + $_) | Out-Null $sb.AppendLine($ErrorRecord.InvocationInfo.ScriptName + ": Line " + $ErrorRecord.InvocationInfo.ScriptLineNumber) | Out-Null $sb.AppendLine("Stack Trace: " + $ErrorRecord.ScriptStackTrace) | Out-Null if ($null -ne $_.Exception) { $sb.AppendLine((Format-Exception $_.Exception)) | Out-Null } Write-DebugLog $sb.ToString() } # GetExchangeVersion Function function GetExchangeVersionInstalled { If ($global:wasGetExchangeVersionInstalledAlreadyCalled -eq $false) #Skip if we already the info cached { # Check installed version of Exchange Server if ((Test-Path "HKLM:\SOFTWARE\Microsoft\ExchangeServer\v15\Setup") -eq $true) { ("Exchange 2013 Detected") | WriteTo-StdOut $global:exinstall = (get-itemproperty -Path HKLM:\SOFTWARE\Microsoft\ExchangeServer\v15\Setup -Name MsiInstallPath).MsiInstallPath If ($null -ne $global:exinstall) { $global:ExchangeVersion = 15 # Check For Roles $global:CasRoleInstalled = Test-Path ("HKLM:\SOFTWARE\Microsoft\ExchangeServer\v15\CafeRole") $global:MbxRoleInstalled = Test-Path ("HKLM:\SOFTWARE\Microsoft\ExchangeServer\v15\MailboxRole") $global:ExchangeInstallPath = (Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\ExchangeServer\v15\Setup" -Name MsiInstallPath -ErrorAction SilentlyContinue).MsiInstallPath Write-DebugLog ("Exchange Server Installed, Path: {0}" -f $global:ExchangeInstallPath) $global:ExchInstalled = $true $global:exbin = Join-Path -Path $global:exinstall -ChildPath "bin\" $global:exscripts = Join-Path -Path $global:exinstall -ChildPath "scripts\" $global:exreg = (Get-Itemproperty HKLM:\SOFTWARE\Microsoft\ExchangeServer\v15) $global:exregSetupKey = (Get-Item HKLM:\SOFTWARE\Microsoft\ExchangeServer\v15\Setup) } } elseIf ((Test-Path "HKLM:\SOFTWARE\Microsoft\ExchangeServer\v14\Setup") -eq $true){ ("Exchange 2010 Detected") | WriteTo-StdOut $global:exinstall = (Get-Itemproperty HKLM:\SOFTWARE\Microsoft\ExchangeServer\v14\Setup -Name MsiInstallPath).MsiInstallPath If ($null -ne $global:exinstall) { $global:ExchangeVersion = 14 $global:ExchInstalled = $true $global:exbin = Join-Path -Path $global:exinstall -ChildPath "bin\" $global:exscripts = Join-Path -Path $global:exinstall -ChildPath "scripts\" $global:exreg = (Get-Itemproperty HKLM:\SOFTWARE\Microsoft\ExchangeServer\v14) $global:exregSetupKey = (Get-Item HKLM:\SOFTWARE\Microsoft\ExchangeServer\v14\Setup) } } ElseIf ((Test-Path "HKLM:\SOFTWARE\Microsoft\Exchange\v8.0") -eq $true){ ("Exchange 2007 Detected") | WriteTo-StdOut $global:ExchangeVersion = 8 $global:ExchInstalled = $true $global:exreg = (get-itemproperty HKLM:\SOFTWARE\Microsoft\Exchange) $global:exbin = Join-Path (get-itemproperty HKLM:\SOFTWARE\Microsoft\Exchange\Setup).MsiInstallPath bin\ $global:exinstall = (get-itemproperty HKLM:\SOFTWARE\Microsoft\Exchange\Setup).MsiInstallPath $global:exscripts = Join-Path (get-itemproperty HKLM:\SOFTWARE\Microsoft\Exchange\Setup).MsiInstallPath scripts\ $global:exregSetupKey = (Get-Item HKLM:\SOFTWARE\Microsoft\Exchange\Setup) } Else{ "Installed Exchange version could not be determined or is lower than 2007." | WriteTo-StdOut ("Installed Exchange version could not be determined or is lower than 2007.") | WriteTo-StdOut $global:ExchInstalled = $false } } Return $global:ExchInstalled } # <summary> # Sets the current section of the result report # </summary> # <param name="$section">The current section of the result report</param> Function Set-ReportSection($section) { $global:_reportSection = $section } # <summary> # Gets the current section of the result report # </summary> # <returns>The current section of the result report</returns> Function Get-ReportSection { return $global:_reportSection } # <summary> # Sets a description of the current activity # </summary> # <param name="$activity">The description of the current activity</param> Function Set-CurrentActivity($Activity) { $global:_activity = $Activity Write-DebugLog ("Current Activity Set to: '$($global:_activity))'") } # <summary> # Gets a description of the current activity # </summary> # <return>The description of the current activity</returns> Function Get-CurrentActivity { Write-DebugLog ("Current Activity returned: '$($global:_activity))'") return $global:_activity } # <summary> # Updates the current Activity with a new status # </summary> Function Update-ActivityProgress($status) { Write-DebugLog ("Updating Activity Progress, Current Activity: '$($global:_activity))'") Write-DiagProgress -Activity $global:_activity -Status $status } function GetFiles( $sourcePath = $null, $prefix = $null, $targetFolder = $null, $filedescription = $null, $reportsection = $null, $include = $null, [switch]$recurse, $newest = $null, $agemaxdays = $null, [switch]$cab) { trap [Exception] { Log-Error $_ Continue } $callingSection = Get-ReportSection $collectFiles = $null if ($null -eq $reportsection){ $reportsection = $callingSection } if ($null -ne $include){$include = "-include " + $include} else {$include = ""} if ($recurse.ispresent) {$rcrs = "-recurse"} else {$rcrs = ""} if ($null -ne $newest) {$newestCount = ("| sort LastWriteTime -Descending | select-object -First " + $newest)} else {$newestCount = ""} if ($null -ne $agemaxdays) {$agemaxdaysCount = ("| Where-Object {`$_.CreationTime -ge (Get-Date).AddDays(-" + $agemaxdays + ")}")} else {$agemaxdaysCount = ""} Write-DebugLog ("Get-ChildItem -path $sourcePath $include $rcrs $newestCount $agemaxdaysCount") $cmdstring = "Get-ChildItem -path '$sourcePath' $include $rcrs $newestCount $agemaxdaysCount" Update-ActivityProgress -Status $cmdstring $collectFiles = Invoke-Expression $cmdstring if ($null -ne $collectFiles){ Write-DebugLog ("Collecting " + $collectFiles.count + " files") if ($null -ne $targetFolder){ $CopyToPath = ($pwd.Path.ToString() + "\" + $targetFolder) } Else{ $CopyToPath = ($pwd.Path.ToString()) } if((Test-Path $CopyToPath) -eq $false){ new-item -path $CopyToPath -type DIR | Out-Null } foreach($file in $collectFiles){ $fp = ($file.tostring()) if ($recurse.ispresent){ $fn = $fp.substring($sourcePath.length,($fp.length-$sourcePath.Length)) if($fn[0] -eq "\"){$fn = $fn.substring(1,($fn.length-1))} $fn = $fn -replace "\\","_" } Else{ if ($null -ne $prefix){ $fn = $prefix + (Split-Path $file -leaf) } Else{ $fn = (Split-Path $file -leaf) } } $cmdstring = "copy-item -path '$file' -destination '$CopyToPath\$fn'" Write-DebugLog ("$cmdstring") Invoke-Expression -Command $cmdstring if ($null -eq $filedescription){$fildescription = $fn} Update-ActivityProgress -Status $file if(-not ($cab.ispresent -or $zip.ispresent)) { CollectFiles -filestocollect ($CopyToPath + "\" + $fn) -filedescription ($filedescription) -sectiondescription $reportsection -noFileExtensionsOnDescription } } if ($cab.ispresent){ $cabFileName = ($targetFolder + ".cab") $pathToCab = (($pwd.Path.ToString()) + "\" + $cabFileName) Write-DebugLog ("PathtoCab: " + $pathToCab) if ($null -eq $filedescription){$filedescription = $targetFolder} Write-DiagProgress -Activity ($GetExchDataStrings.ID_GetExchDataCompressingAct) -Status ($GetExchDataStrings.ID_GetExchDataCompressingStatus + " " + $cabFileName) runcmd -commandToRun ".\mpscab.exe /dir $CopyToPath /f $pathToCab" -fileDescription $filedescription -filesToCollect $pathToCab -sectionDescription $reportsection } if ($zip.ispresent){ #TBD } } Else{Write-DebugLog ("No files met criteria for collection")} } # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBxEO+HYHWyAiHx # tc/Z0IiOljv2bGVwEuQizbpPz7YjRaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKps # 5S72ZS8H0tGLWY/6teft0nLc+UXoI+ESDpbEXr/vMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAfRq5k0eIoJaseH0ji/4xRlYpH8/Jg8V9ZTUC # zI6FRQ0+oy8gp+qw2gidEFsm3XmOgUW1nCjohU2Slg6cVcvS20axtoveeFrnto+E # NqNNvWD7gSI5M8sK9DUkV19Uc7RzOXmVy8qcjORoV3a1hfx1LBSWYX7N28OWLGY1 # IV66S7RDdOloWEnpnE8eakBYgdgo3h1LTU5BEu9yRiUXWdbk2cVc9mxNCYKfROqZ # xvNzJkbL7/l8ZzpmJLPxKtX8ogSpoYFATRS5+ljNMnuM/K2T2R0EoqaM0buMwzZ2 # bY1OkFMnuGD3ZFozI4QHSgrY/ztVLQW/lURMwNI328oJfymFBKGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCx+GsL1tqOVqLfqx4WjmJjZg+AzLOaVfXa # DQX0HfF9lAIGZutwxmXGGBMyMDI0MTAyODExNDA0MS4yNTJaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAACAdFF # WZgQzEJPAAEAAAIBMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEyMloXDTI1MTAyMjE4MzEyMlowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjU1MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # tWrf+HzDu7sk50y5YHheCIJG0uxRSFFcHNek+Td9ZmyJj20EEjaU8JDJu5pWc4pP # AsBI38NEAJ1b+KBnlStqU8uvXF4qnEShDdi8nPsZZQsTZDKWAgUM2iZTOiWIuZcF # s5ZC8/+GlrVLM5h1Y9nfMh5B4DnUQOXMremAT9MkvUhg3uaYgmqLlmYyODmba4lX # ZBu104SLAFsXOfl/TLhpToT46y7lI9sbI9uq3/Aerh3aPi2knHvEEazilXeooXNL # Cwdu+Is6o8kQLouUn3KwUQm0b7aUtsv1X/OgPmsOJi6yN3LYWyHISvrNuIrJ4iYN # gHdBBumQYK8LjZmQaTKFacxhmXJ0q2gzaIfxF2yIwM+V9sQqkHkg/Q+iSDNpMr6m # r/OwknOEIjI0g6ZMOymivpChzDNoPz9hkK3gVHZKW7NV8+UBXN4G0aBX69fKUbxB # BLyk2cC+PhOoUjkl6UC8/c0huqj5xX8m+YVIk81e7t6I+V/E4yXReeZgr0FhYqNp # vTjGcaO2WrkP5XmsYS7IvMPIf4DCyIJUZaqoBMToAJJHGRe+DPqCHg6bmGPm97Mr # OWv16/Co6S9cQDkXp9vMSSRQWXy4KtJhZfmuDz2vr1jw4NeixwuIDGw1mtV/TdSI # +vpLJfUiLl/b9w/tJB92BALQT8e1YH8NphdOo1xCwkcCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBSwcq9blqLoPPiVrym9mFmFWbyyUjAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEAOjQAyz0cVztTFGqXX5JLRxFK/O/oMe55uDqEC8Vd1gbcM28KBUPgvUIP # Xm/vdDN2IVBkWHmwCp4AIcy4dZtkuUmd0fnu6aT9Mvo1ndsLp2YJcMoFLEt3Ttri # LaO+i4Grv0ZULtWXUPAW/Mn5Scjgn0xZduGPBD/Xs3J7+get9+8ZvBipsg/N7poi # mYOVsHxLcem7V5XdMNsytTm/uComhM/wgR5KlDYTVNAXBxcSKMeJaiD3V1+HhNkV # liMl5VOP+nw5xWF55u9h6eF2G7eBPqT+qSFQ+rQCQdIrN0yG1QN9PJroguK+FJQJ # dQzdfD3RWVsciBygbYaZlT1cGJI1IyQ74DQ0UBdTpfeGsyrEQ9PI8QyqVLqb2q7L # tI6DJMNphYu+jr//0spr1UVvyDPtuRnbGQRNi1COwJcj9OYmlkFgKNeCfbDT7U3u # EOvWomekX60Y/m5utRcUPVeAPdhkB+DxDaev3J1ywDNdyu911nAVPgRkyKgMK3US # LG37EdlatDk8FyuCrx4tiHyqHO3wE6xPw32Q8e/vmuQPoBZuX3qUeoFIsyZEenHq # 2ScMunhcqW32SUVAi5oZ4Z3nf7dAgNau21NEPwgW+2wkrNqDg7Hp8yHyoOKbgEBu # 6REQbvSfZ5Kh4PV+S2gxf2uq6GoYDnlqABOMYwz309ISi0bPMh8wggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA1+26cR/yH100 # DiNFGWhuAv2rYBqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJVyEwIhgPMjAyNDEwMjgwMDE5NDVaGA8yMDI0 # MTAyOTAwMTk0NVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6slXIQIBADAHAgEA # AgIBszAHAgEAAgITSjAKAgUA6sqooQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQABMN9oWsdpzGRztiY54MmqGWUVyuXmaxbDA6z8iE8obpRv+lydBHDEzF+b # zjdtPSXWUAH0/FMRRhX0teLdCIIacsSa/2bH70CbOdzWv6Q+8mYD34Mes4H/MfoC # K+NcUU2sDPmN4LqO/2eyh0kKM3DzfJuIidm6cvD2YA69CSh85IuoBwIJD3zHB1ga # wgzN2hPCeSdXzXZoMevJN33/MSsU3gjjZk0RGc4Xol2tzHMD3/GkJdRTW7K5OP46 # vX9QfJzbfGiC4yGAPtbIY98+0m5sKTxGYHp9nxOyMAa+aGUH5MqAgXkBYGlW86uW # YdQl/cvicZdjgMRYNUklFP/zfxppMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAIB0UVZmBDMQk8AAQAAAgEwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgmNufZi3uRblDWXD6jqlcAyb4rVmt4VEqlXdwg+E5Qs0wgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCBYa7I6TJQRcmx0HaSTWZdJgowdrl9+Zrr0pIdq # Htc4IzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAC # AdFFWZgQzEJPAAEAAAIBMCIEIKMcBulW2TKoXBfoaBGu0S2w65GKyV6YpORLn7xf # HyoaMA0GCSqGSIb3DQEBCwUABIICAC7HGRqEAZT+Jh0Ey1qgrXYCzs2BU9uEyAPs # zot4gPtdYvWskjwaDAzpmood8x/unWTs4hsY2lWJEWVIFrUbGwCv40O2ml+igYHy # R6Q3gz/jwEpdmwxlU/GB6q2UUXS4gtMUu8QRswCWL9B8h6lbuUkqtfpV+Wvu8df3 # 8+gASRp+3yUoGf1gdgaHgqcQE2hYz0mOlF3nfdZWXvbFwLcLA6ap7c2bW3m/AXp3 # clmGPwFX/l0LYcm2LzTqrM3pBJf92Oc52hgpgdS+EUi3tSiZa2StCvKwPVhNSCfE # 2tnPLwSt1sYWUrnWCMSV6rmeFMshYxyLxRrGh9Z5TFpmgyb7rCwD4OUd03ObeFxd # zpwxIjIC7uccFn9P/yhjw5ly8gcX6BgS/5q4vHNQAUCNYAvE8KMgrZ3cknfIGF/U # 0Ayexj6+8xahuLx71mca0ic2qok/Vhx5hZjWReYw8c6WzSOmPlxAp8F/N8+A6+Wr # i2BmwISTHFKplk2sqxHM+oy99SPgBws8vO+NLP3yyCGzLbWcXlCwGvOpjx5ZwhQ7 # KqVMFYJ6tbu+mqX711ZxOBaSTCCF/Gbecs0k2hlL/VnoytHmeARRhEwtx+3HbU8a # +I/1nVqoUixuB9qXfg1Px2DA7M0mp5/JXYxcXdEgmGnS/qpkSOWyOIW4H0bCy/h4 # T4HgEuWu # SIG # End signature block
combined_dataset/train/non-malicious/Compile-Help_2.ps1
Compile-Help_2.ps1
# Compile-Help.ps1 # by Jeff Hillman # # this script uses the text and XML PowerShell help files to generate HTML help # for all PowerShell Cmdlets, PSProviders, and "about" topics. the help topics # are compiled into a .chm file using HTML Help Workshop. # # Minor tweak by John Robbins to work on x64 when looking for HHC.EXE. param( [string] $outDirectory = ".\\PSHelp", [switch] $GroupByPSSnapIn ) function Html-Encode( [string] $value ) { # System.Web.HttpUtility.HtmlEncode() doesn't quite get everything, and # I don't want to load the System.Web assembly just for this. I'm sure # I missed something here, but these are the characters I saw that needed # to be encoded most often $value = $value -replace "&(?![\\w#]+;)", "&amp;" $value = $value -replace "<(?!!--)", "&lt;" $value = $value -replace "(?<!--)>", "&gt;" $value = $value -replace "’", "&#39;" $value = $value -replace '["“”]', "&quot;" $value = $value -replace "\\n", "<br />" $value } function Capitalize-Words( [string] $value ) { $capitalizedString = "" # convert the string to lower case and split it into individual words. for each one, # capitalize the first character, and append it to the converted string [regex]::Split( $value.ToLower(), "\\s" ) | ForEach-Object { $capitalizedString += ( [string]$_.Chars( 0 ) ).ToUpper() + $_.SubString( 1 ) + " " } $capitalizedString.Trim() } function Get-ParagraphedHtml( [string] $xmlText ) { $value = "" if ( $xmlText -match "<(\\w+:)?para" ) { $value = "" $options = [System.Text.RegularExpressions.RegexOptions]::Singleline foreach ( $match in [regex]::Matches( $xmlText, "<(?:\\w+:)?para[^>]*>(?<Text>.*?)</(?:\\w+:)?para>", $options ) ) { $value += "<p>$( Html-Encode $match.Groups[ 'Text' ].Value )</p>" } } else { $value = Html-Encode $xmlText } $value } function Get-SyntaxHtml( [xml] $syntaxXml ) { $syntaxHtml = "" # generate the HTML for each form of the Cmdlet syntax foreach ( $syntaxItem in $syntaxXml.syntax.syntaxItem ) { if ( $syntaxHtml -ne "" ) { $syntaxHtml += "<br /><br />`n" } $syntaxHtml += " $( $syntaxItem.name.get_InnerText().Trim() ) " if ( $syntaxItem.parameter ) { foreach ( $parameter in $syntaxItem.parameter ) { $required = [bool]::Parse( $parameter.required ) $syntaxHtml += "<nobr>[-$( $parameter.name.get_InnerText().Trim() )" if ( $required ) { $syntaxHtml += "]" } if ( $parameter.parameterValue ) { $syntaxHtml += " &lt;$( $parameter.parameterValue.get_InnerText().Trim() )&gt;" } if ( !$required ) { $syntaxHtml += "]" } $syntaxHtml += "</nobr> " } } $syntaxHtml += " <nobr>[&lt;CommonParameters&gt;]</nobr>" } $syntaxHtml.Trim() } function Get-ParameterHtml( [xml] $parameterXml ) { $parameterHtml = "" # generate HTML for each parameter foreach ( $parameter in $parameterXml.parameters.parameter ) { if ( $parameterHtml -ne "" ) { $parameterHtml += " <br /><br />`n" } $parameterHtml += " <nobr><span class=`"boldtext`">-$( $parameter.name.get_InnerText().Trim() )" if ( $parameter.parameterValue ) { $parameterHtml += " &lt;$( $parameter.parameterValue.get_InnerText().Trim() )&gt;" } $parameterHtml += "</span></nobr>`n" $parameterHtml += @" <br /> <div id="contenttext"> $( Get-ParagraphedHtml $parameter.description.get_InnerXml().Trim() ) "@ if ( $parameter.possibleValues ) { foreach ( $possibleValue in $parameter.possibleValues.possibleValue ) { $parameterHtml += @" $( $possibleValue.value.Trim() )<br /> "@ if ( $possibleValue.description.get_InnerText().Trim() -ne "" ) { $parameterHtml += @" <div id="contenttext"> $( Get-ParagraphedHtml $possibleValue.description.get_InnerXml().Trim() ) </div> "@ } } } $parameterHtml += @" <br /> </div> <table class="parametertable"> <tr> <td>Required</td> <td>$( $parameter.required )</td> </tr> <tr> <td>Position</td> <td>$( $parameter.position )</td> </tr> <tr> <td>Accepts pipeline input</td> <td>$( $parameter.pipelineInput )</td> </tr> <tr> <td>Accepts wildcard characters</td> <td>$( $parameter.globbing )</td> </tr> "@ if ( $parameter.defaultValue ) { if( $parameter.defaultValue.get_InnerText().Trim() -ne "" ) { $parameterHtml += @" <tr> <td>Default Value</td> <td>$( $parameter.defaultValue.get_InnerText().Trim() )</td> </tr> "@ } } $parameterHtml += @" </table> "@ } if ( $parameterHtml -ne "" ) { $parameterHtml += " <br /><br />`n" } $parameterHtml += @" <nobr><span class="boldtext">&lt;CommonParameters&gt;</span></nobr> <br /> <div id="contenttext"> <p> For more information about common parameters, type "Get-Help about_commonparameters". </p> </div> "@ $parameterHtml.Trim() } function Get-InputHtml( [xml] $inputXml ) { $inputHtml = "" $inputCount = 0 # generate HTML for each input type foreach ( $inputType in $inputXml.inputTypes.inputType ) { if ( $inputHtml -ne "" ) { $inputHtml += " <br /><br />`n" } if ( $inputType.type.name.get_InnerText().Trim() -ne "" -or $inputType.type.description.get_InnerText().Trim() -ne "" ) { $inputHtml += " $( $inputType.type.name.get_InnerText().Trim() )`n" $inputHtml += @" <div id="contenttext"> $( Get-ParagraphedHtml $inputType.type.description.get_InnerXml().Trim() ) </div> "@ $inputCount++ } } $inputHtml.Trim() $inputCount } function Get-ReturnHtml( [xml] $returnXml ) { $returnHtml = "" $returnCount = 0 # generate HTML for each return value foreach ( $returnValue in $returnXml.returnValues.returnValue ) { if ( $returnHtml -ne "" ) { $returnHtml += " <br /><br />`n" } if ( $returnValue.type.name.get_InnerText().Trim() -ne "" -or $returnValue.type.description.get_InnerText().Trim() -ne "" ) { $returnHtml += " $( $returnValue.type.name.get_InnerText().Trim() )`n" $returnHtml += @" <div id="contenttext"> $( Get-ParagraphedHtml $returnValue.type.description.get_InnerXml().Trim() ) </div> "@ $returnCount++ } } $returnHtml.Trim() $returnCount } function Get-ExampleHtml( [xml] $exampleXml ) { $exampleHtml = "" $exampleTotalCount = 0 $exampleCount = 0 foreach ( $example in $exampleXml.examples.example ) { $exampleTotalCount++ } # generate HTML for each example foreach ( $example in $exampleXml.examples.example ) { if ( $example.code -and $example.code.get_InnerText().Trim() -ne "" ) { if ( $exampleHtml -ne "" ) { $exampleHtml += " <br />`n" } if ( $exampleTotalCount -gt 1 ) { $exampleHtml += " <nobr><span class=`"boldtext`">Example $( $exampleCount + 1 )</span></nobr>`n" } $exampleCodeHtml = "$( Html-Encode $example.introduction.get_InnerText().Trim() )" + "$( Html-Encode $example.code.get_InnerText().Trim() )" $exampleHtml += " <div class=`"syntaxregion`">$exampleCodeHtml</div>`n" $foundFirstPara = $false foreach ( $para in $example.remarks.para ) { if ( $para.get_InnerText().Trim() -ne "" ) { # the first para is generally the description of the example. # other para tags usually contain sample output if ( !$foundFirstPara ) { $exampleHtml += @" <div id="contenttext"> <p> $( Html-Encode $para.get_InnerText().Trim() ) </p> </div> "@ $foundFirstPara = $true } else { $exampleHtml += @" <pre class="syntaxregion">$( $( ( Html-Encode $para.get_InnerText().Trim() ) -replace "<br />", "`n" ) )</pre> "@ } } } $exampleCount++ } } $exampleHtml.Trim() $exampleCount } function Get-TaskExampleHtml( [xml] $exampleXml ) { $exampleHtml = "" $exampleCount = 0 $exampleTotalCount = 0 foreach ( $example in $exampleXml.examples.example ) { $exampleTotalCount++ } # generate HTML for each example foreach ( $example in $exampleXml.examples.example ) { if ( $exampleHtml -ne "" ) { $exampleHtml += " <br />`n" } if ( $exampleTotalCount -gt 1 ) { $exampleHtml += " <nobr><span class=`"boldtext`">Example $( $exampleCount + 1 )</span></nobr>`n" } $exampleHtml += " <div>$( Get-ParagraphedHtml $example.introduction.get_InnerXml().Trim() )</div>`n" $exampleCodeHtml = ( Html-Encode $example.code.Trim() ) -replace "<br />", "`n" $exampleHtml += " <pre class=`"syntaxregion`">$exampleCodeHtml</pre>" $exampleHtml += " <div>$( Get-ParagraphedHtml $example.remarks.get_InnerXml().Trim() )</div>`n" $exampleCount++ } $exampleHtml.Trim() } function Get-LinkHtml( [xml] $linkXml ) { $linkHtml = "" $linkCount = 0 # generate HTML for each related link foreach ( $navigationLink in $linkXml.relatedLinks.navigationLink ) { if ( $navigationLink.linkText -and ` ( $helpHash.Keys | Foreach-Object { $_.ToUpper() } ) -contains $navigationLink.linkText.Trim().ToUpper() ) { $linkHtml += " $( $navigationLink.linkText.Trim() )<br />`n" $linkCount++ } } $linkHtml.Trim() $linkCount } function Get-TaskHtml( [xml] $taskXml ) { $taskHtml = "" $taskCount = 0 foreach ( $task in $taskXml.tasks.task ) { if ( $taskHtml -ne "" ) { $taskHtml += " <br />`n" } $taskHtml += " <nobr><span class=`"boldtext`">Task:</span> $( $task.title.Trim() )</nobr>`n" $taskDescriptionHtml = ( Get-ParagraphedHtml $task.description.get_InnerXml().Trim() ) $taskHtml += " <div id=`"contenttext`">$taskDescriptionHtml</div>`n" # add the example sections if ( $task.examples ) { $taskHtml += @" <div id="contenttext"> <p> $( Get-TaskExampleHtml ( [xml]$task.examples.get_OuterXml() ) ) </p> </div> "@ } $taskCount++ } $taskHtml.Trim() $taskCount } function Get-DynamicParameterHtml( [xml] $dynamicParameterXml ) { $dynamicParameterHtml = "" # generate HTML for each dynamic parameter foreach ( $dynamicParameter in $dynamicParameterXml.dynamicparameters.dynamicparameter ) { $dynamicParameterHtml += " <nobr><span class=`"boldtext`">-$( $dynamicParameter.name.Trim() )" if ( $dynamicParameter.type ) { $dynamicParameterHtml += " &lt;$( $dynamicParameter.type.name.Trim() )&gt;" } $dynamicParameterHtml += "</span></nobr>`n" $dynamicParameterHtml += @" <br /> <div id="contenttext"> <p> $( Html-Encode $dynamicParameter.description.Trim() ) </p> "@ if ( $dynamicParameter.possiblevalues ) { foreach ( $possibleValue in $dynamicParameter.possiblevalues.possiblevalue ) { $dynamicParameterHtml += @" <div id="contenttext"> <span class=`"boldtext`">$( $possibleValue.value )</span> <div id="contenttext"> $( Get-ParagraphedHtml $possibleValue.description.get_InnerXml().Trim() ) </div> </div> "@ } } $dynamicParameterHtml += @" <br /> <span class=`"boldtext`">Cmdlets Supported</span> <div id="contenttext"> <p> $( Html-Encode $dynamicParameter.cmdletsupported.Trim() ) </p> </div> </div> <br /> "@ } $dynamicParameterHtml.Trim() } function Write-AboutTopic( [string] $topicName, [string] $topicPath ) { # just dump the contents of the about topic exactly as it is. the only changes needed # are to encode the special HTML characters and add topic links $topicHtml = @" <html> <head> <link rel="stylesheet" type="text/css" href="powershell.css" /> <title>About $( Capitalize-Words ( $topicName -replace "(about)?_", " " ).Trim() )</title> </head> <body> <div id="topicheading"> <div id="topictitle">PowerShell Help</div> About $( Capitalize-Words ( $topicName -replace "(about)?_", " " ).Trim() ) </div> <pre> $( ( Html-Encode ( [string]::Join( [Environment]::NewLine, ( Get-Content -Path $topicPath ) ) ) ) -replace "<br />" ) </pre> </body> </html> "@ $topicHtml = Add-Links $topicName $topicHtml Out-File -FilePath "$outDirectory\\Topics\\$topicName.html" -Encoding Ascii -Input $topicHtml } function Write-ProviderTopic( [string] $providerFullName, [xml] $providerXml ) { $providerName = $providerXml.providerhelp.Name.Trim() $topicHtml = @" <html> <head> <link rel="stylesheet" type="text/css" href="powershell.css" /> <title>$providerName Help</title> </head> <body> <div id="topicheading"> <div id="topictitle">PowerShell Help</div> $providerName Provider <div style="text-align: right; padding-right: 3px;"> $( $providerFullName -replace "^\\w+\\." ) </div> </div> <div class="categorytitle">Drives</div> <div id="contenttext"> $( Get-ParagraphedHtml $providerXml.providerhelp.drives.get_InnerXml().Trim() ) </div> <div class="categorytitle">Synopsis</div> <div id="contenttext"> <p>$( Html-Encode $providerXml.providerhelp.synopsis.Trim() )</p> </div> "@ $topicHtml += @" <div class="categorytitle">Description</div> <div id="contenttext"> $( Get-ParagraphedHtml $providerXml.providerhelp.detaileddescription.get_InnerXml().Trim() ) </div> "@ if ( $providerXml.providerhelp.capabilities.get_InnerText().Trim() -ne "" ) { $topicHtml += @" <div class="categorytitle">Capabilities</div> <div id="contenttext"> $( Get-ParagraphedHtml $providerXml.providerhelp.capabilities.get_InnerXml().Trim() ) </div> "@ } $taskHtml, $taskCount = Get-TaskHtml( $providerXml.providerhelp.tasks.get_OuterXml() ) if ( $taskCount -gt 0 ) { $topicHtml += @" <div class="categorytitle">Task$( if ( $taskCount -gt 1 ) { "s" } )</div> <div id="contenttext"> $taskHtml </div> "@ } if ( $providerXml.providerhelp.dynamicparameters ) { $topicHtml += @" <div class="categorytitle">Dynamic Parameters</div> <div id="contenttext"> $( Get-DynamicParameterHtml( $providerXml.providerhelp.dynamicparameters.get_OuterXml() ) ) </div> "@ } if ( $providerXml.providerhelp.notes.Trim() -ne "" ) { $topicHtml += @" <div class="categorytitle">Notes</div> <div id="contenttext"> <p>$( Html-Encode $providerXml.providerhelp.notes.Trim() )</p> </div> "@ } $topicHtml += @" <div class="categorytitle">Related Links</div> <div id="contenttext"> <p>$( Html-Encode $providerXml.providerhelp.relatedlinks.Trim() )</p> </div> <br /> </body> </html> "@ $topicHtml = Add-Links $providerName $topicHtml Out-File -FilePath "$outDirectory\\Topics\\$providerFullName.html" -Encoding Ascii -Input $topicHtml } function Write-CmdletTopic( [string] $cmdletFullName, [xml] $cmdletXml ) { $cmdletName = $cmdletXml.command.details.name.Trim() # add the heading, syntax section, and description $topicHtml = @" <html> <head> <link rel="stylesheet" type="text/css" href="powershell.css" /> <title>$cmdletName Help</title> </head> <body> <div id="topicheading"> <div id="topictitle">PowerShell Help</div> $cmdletName Cmdlet <div style="text-align: right; padding-right: 3px;"> $( $cmdletFullName -replace "^\\w+-\\w+\\." ) </div> </div> <div class="categorytitle">Synopsis</div> <div id="contenttext"> $( Get-ParagraphedHtml $cmdletXml.command.details.description.get_InnerXml().Trim() ) </div> <div class="categorytitle">Syntax</div> <div id="contenttext"> <div class="syntaxregion">$( Get-SyntaxHtml ( [xml]$cmdletXml.command.syntax.get_OuterXml() ) )</div> </div> <div class="categorytitle">Description</div> <div id="contenttext"> $( Get-ParagraphedHtml $cmdletXml.command.description.get_InnerXml().Trim() ) </div> "@ # add the parameters section if ( $cmdletXml.command.parameters ) { $topicHtml += @" <div class="categorytitle">Parameters</div> <div id="contenttext"> <p> $( Get-ParameterHtml ( [xml]$cmdletXml.command.parameters.get_OuterXml() ) ) </p> </div> "@ } else { $topicHtml += @" <div class="categorytitle">Parameters</div> <div id="contenttext"> <p> <nobr><span class="boldtext">&lt;CommonParameters&gt;</span></nobr><br /> <div id="contenttext"> <p> For more information about common parameters, type "Get-Help about_commonparameters". </p> </div> </p> </div> "@ } # add the input types section if ( $cmdletXml.command.inputTypes ) { $inputHtml, $inputCount = Get-InputHtml ( [xml]$cmdletXml.command.inputTypes.get_OuterXml() ) if ( $inputCount -gt 0 ) { $topicHtml += @" <div class="categorytitle">Input Type$( if ( $inputCount -gt 1 ) { "s" } )</div> <div id="contenttext"> $inputHtml </div> "@ } } # add the return values section if ( $cmdletXml.command.returnValue ) { $returnHtml, $returnCount = Get-ReturnHtml ( [xml]$cmdletXml.command.returnValues.get_OuterXml() ) if ( $returnCount -gt 0 ) { $topicHtml += @" <div class="categorytitle">Return Value$( if ( $returnCount -gt 1 ) { "s" } )</div> <div id="contenttext"> $returnHtml </div> "@ } } # add the notes section if ( $cmdletXml.command.alertSet ) { if ( $cmdletXml.command.alertSet.get_InnerText().Trim() -ne "" ) { $topicHtml += @" <div class="categorytitle">Notes</div> <div id="contenttext"> $( Get-ParagraphedHtml $cmdletXml.command.alertSet.get_InnerXml().Trim() ) </div> "@ } } # add the example section if ( $cmdletXml.command.examples ) { $exampleHtml, $exampleCount = Get-ExampleHtml ( [xml]$cmdletXml.command.examples.get_OuterXml() ) if ( $exampleCount -gt 0 ) { $topicHtml += @" <div class="categorytitle">Example$( if ( $exampleCount -gt 1 ) { "s" } )</div> <div id="contenttext"> <p> $exampleHtml </p> </div> "@ } } # add the related links section if ( $cmdletXml.command.relatedLinks ) { $linkHtml, $linkCount = Get-LinkHtml ( [xml]$cmdletXml.command.relatedLinks.get_OuterXml() ) if ( $linkCount -gt 0 ) { $topicHtml += @" <div class="categorytitle">Related Link$( if ( $linkCount -gt 1 ) { "s" } )</div> <div id="contenttext"> <p> $linkHtml </p> </div> <br /> "@ } else { $topicHtml += " <br />`n" } } else { $topicHtml += " <br />`n" } $topicHtml += @" </body> </html> "@ $topicHtml = Add-Links $cmdletName $topicHtml Out-File -FilePath "$outDirectory\\Topics\\$cmdletFullName.html" -Encoding Ascii -Input $topicHtml } function Add-Links( [string] $topicName, [string] $topicHtml ) { # we only want to add links for Cmdlets and about topics $helpHash.Keys | Where-Object { $_ -match "(^\\w+-\\w+|^about_)" } | Foreach-Object { $searchText = $_ # keys representing Cmdlets are formatted like this: # <Cmdlet Name>.<PSProvider name> if ( $_ -match "^\\w+-\\w+" ) { # we only want to search for the Cmdlet name $searchText = $matches[ 0 ] } # if the search text isn't the topic being processed if ( $searchText -ne $topicName ) { $topicHtml = $topicHtml -replace "\\b($searchText)\\b", "<a href=`"Topics\\$_.html`"><nobr>`$1</nobr></a>" } } $topicHtml } # file dumping functions function Write-Hhp { # write the contents of the Html Help Project file Out-File -FilePath "$outDirectory\\powershell.hhp" -Encoding Ascii -Input @" [OPTIONS] Binary TOC=Yes Compatibility=1.1 or later Compiled file=PowerShell.chm Contents file=powershell.hhc Default topic=Topics/default.html Full-text search=Yes Language=0x409 English (United States) Title=PowerShell Help [INFOTYPES] "@ } function Write-DefaultPage { $defaultHtml = @" <html> <head> <link rel="stylesheet" type="text/css" href="powershell.css" /> <title>PowerShell Help</title> </head> <body style="margin: 5px 5px 5px 5px; color: #FFFFFF; background-color: #C86400;"> <h2>Windows PowerShell Help</h2> <br /> This complied help manual contains the help for all of the built-in PowerShell Cmdlets and PSProviders, as well as the help for any Cmdlets or PSProviders added through Add-PSSnapin, if help for them is available. Also included are all of the "about" topics. <br /><br /> To use this manual from the PowerShell command line, add the following function and alias to your PowerShell profile: <div id="contenttext"> <pre class="syntaxregion">function Get-CompiledHelp( [string] `$topic ) { if ( `$topic ) { # Get-Command will fail if the topic is a PSProvider or an "about" topic. `$ErrorActionPreference = "SilentlyContinue" # we don't want Get-Command to resolve to an application or a function `$command = Get-Command `$topic | Where-Object { `$_.CommandType -match "Alias|Cmdlet" } # if the topic is an alias or a Cmdlet, combine its name with # its PSProvider to get the full name of the help file if ( `$command -and `$command.CommandType -eq "Alias" ) { `$topic = "`$( `$command.Definition ).`$( `$command.ReferencedCommand.PSSnapIn.Name )" } elseif ( `$command -and `$command.CommandType -eq "Cmdlet" ) { `$topic = "`$( `$command.Name ).`$( `$command.PSSnapIn.Name )" } else { # check to see if we have a PSProvider `$psProvider = Get-PSProvider `$topic if ( `$psProvider ) { `$topic = "`$( `$psProvider.Name ).`$( `$psProvider.PSSnapIn.Name )" } } hh.exe "mk:@MSITStore:$( Resolve-Path "$outDirectory" )\\PowerShell.chm::/Topics/`$topic.html" } else { hh.exe "$( Resolve-Path "$outDirectory" )\\PowerShell.chm" } } Set-Alias chelp Get-CompiledHelp</pre> </div> <br /> The path in the Get-CompliedHelp function corresponds to the location where this compiled help manual was originally created. If this file is moved to another location, the path in the function will need to be updated. <br /> <br /> To view the help topic for Get-ChildItem, type the following: <div id="contenttext"> <div class="syntaxregion">PS$ Get-CompiledHelp Get-ChildItem</div> </div> <br /> Because "ls" is an alias for Get-ChildItem, and "chelp" is an alias for Get-CompliedHelp, the following also works: <div id="contenttext"> <div class="syntaxregion">PS$ chelp ls</div> </div> </body> </html> "@ $defaultHtml = Add-Links "" $defaultHtml Out-File -FilePath "$outDirectory\\Topics\\default.html" -Encoding Ascii -Input $defaultHtml } function Write-Css { Out-File -FilePath "$outDirectory\\powershell.css" -Encoding Ascii -Input @" body { margin: 0px 0px 0px 0px; padding: 0px 0px 0px 0px; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 70%; width: 100%; } div#topicheading { position: relative; left: 0px; padding: 5px 0px 5px 10px; border-bottom: 1px solid #999999; color: #FFFFFF; background-color: #C86400; font-size: 110%; font-weight: bold; text-align: left; } div#topictitle { padding: 5px 5px 5px 5px; color: #FFFFFF font-size: 90%; font-weight: normal; } div#contenttext { top: 0px; padding: 0px 25px 0px 25px; } p { margin: 5px 0px 5px 0px; } a:link { color: #0000FF; } a:visited { color: #0000FF; } a:hover { color: #3366FF; } table.parametertable { margin-left: 25px; font-size: 100%; border-collapse:collapse } table.parametertable td { font-size: 100%; border: solid #999999 1px; padding: 0in 5.4pt 0in 5.4pt } pre.syntaxregion, div.syntaxregion { background: #DDDDDD; padding: 4px 8px; cursor: text; margin-top: 1em; margin-bottom: 1em; margin-left: .6em; color: #000000; border-width: 1px; border-style: solid; border-color: #999999; } .categorytitle { padding-top: .8em; font-size: 110%; font-weight: bold; text-align: left; margin-left: 5px; } .boldtext { font-weight: bold; } "@ } ### main ### # create the topics directory New-Item -Type Directory -Path "$outDirectory" -Force | Out-Null New-Item -Type Directory -Path "$outDirectory\\Topics" -Force | Out-Null "`nRetrieving help content...`n" # initialize variables for HHC file $hhcContentsHtml = "" $cmdletCategoryHtml = "" $cmdletCategoryHash = @{} # help content hash $helpHash = @{} # get the Cmdlet help Get-PSSnapIn | Sort-Object -Property Name | Foreach-Object { $psSnapInName = $_.Name $helpFilePath = Join-Path $_.ApplicationBase ( ( Get-Command -PSSnapIn $_ ) | Select-Object -First 1 ).HelpFile # the culture needs to be added to the path on Vista if ( !( Test-Path $helpFilePath ) ) { $helpFilePath = "$( $_.ApplicationBase )\\$( $Host.CurrentUICulture.Name )\\$( Split-Path -Leaf $helpFilePath )" } if ( Test-Path $helpFilePath ) { $helpXml = [xml]( Get-Content $helpFilePath ) $cmdletCategoryContents = "" Get-Command -PSSnapIn $_ | Foreach-Object { $commandName = $_.Name $helpXml.helpitems.command | Where-Object { $_.details.name -and $_.details.name.Trim() -imatch "\\b$commandName\\b" } | Foreach-Object { # add the Xml Help of the Cmdlet to the help hashtable $helpHash[ "{0}.{1}" -f $commandName, $psSnapInName ] = $_.get_OuterXml() $cmdletTopicItem = @" <li><object type="text/sitemap"> <param name="Name" value="$commandName"> <param name="Local" value="Topics\\$( "{0}.{1}" -f $commandName, $psSnapInName ).html"> </object> "@ if ( $GroupByPSSnapIn ) { $cmdletCategoryContents += $cmdletTopicItem } else { # save the topics so they can be sorted properly and added to the HHC later $cmdletCategoryHash[ "{0}.{1}" -f $commandName, $psSnapInName ] = $cmdletTopicItem } } } if ( $GroupByPSSnapIn ) { # add a category in the HHC for this PSSnapIn and its Cmdlets $cmdletCategoryHtml += @" <li><object type="text/sitemap"> <param name="Name" value="$psSnapInName"> </object> <ul> $( $cmdletCategoryContents.Trim() ) </ul> "@ } } } # sort the Cmdlets so they are added to the HHC in a logical order if ( !$GroupByPSSnapIn ) { $cmdletCategoryHash.Keys | Sort-Object | Foreach-Object { $cmdletCategoryHtml += $cmdletCategoryHash[ $_ ] } } # add the Cmdlet category to the HHC $hhcContentsHtml += @" <li><object type="text/sitemap"> <param name="Name" value="Cmdlet Help"> </object> <ul> $( $cmdletCategoryHtml.Trim() ) </ul> "@ $providerCategoryHtml = "" $providerCategoryHash = @{} # get the PSProvider help Get-PSSnapIn | Sort-Object -Property Name | Foreach-Object { $psSnapInName = $_.Name $helpFilePath = Join-Path $_.ApplicationBase ( ( Get-Command -PSSnapIn $_ ) | Select-Object -First 1 ).HelpFile # the culture needs to be added to the path on Vista if ( !( Test-Path $helpFilePath ) ) { $helpFilePath = "$( $_.ApplicationBase )\\$( $Host.CurrentUICulture.Name )\\$( Split-Path -Leaf $helpFilePath )" } if ( Test-Path $helpFilePath ) { $helpXml = [xml]( Get-Content $helpFilePath ) $providerCategoryContents = "" Get-PSProvider | Where-Object { $_.PSSnapin.Name -eq $psSnapInName } | Foreach-Object { $psProviderName = $_.Name $helpXml.helpitems.providerhelp | Where-Object { $_.name.Trim() -imatch "\\b$psProviderName\\b" } | Foreach-Object { $helpHash[ "{0}.{1}" -f $psProviderName, $psSnapInName ] = $_.get_OuterXml() # add a category in the HHC for this PSProvider $providerTopicItem = @" <li><object type="text/sitemap"> <param name="Name" value="$psProviderName"> <param name="Local" value="Topics\\$( "{0}.{1}" -f $psProviderName, $psSnapInName ).html"> </object> "@ if ( $GroupByPSSnapIn ) { $providerCategoryContents += $providerTopicItem } else { # save the topics so they can be sorted properly and added to the HHC later $providerCategoryHash[ "{0}.{1}" -f $psProviderName, $psSnapInName ] = $providerTopicItem } } } if ( $GroupByPSSnapIn -and $providerCategoryContents -ne "" ) { # add a category in the HHC for this PSSnapIn and its Cmdlets $providerCategoryHtml += @" <li><object type="text/sitemap"> <param name="Name" value="$psSnapInName"> </object> <ul> $( $providerCategoryContents.Trim() ) </ul> "@ } } } # sort the PSProviders so they are added to the HHC in a logical order if ( !$GroupByPSSnapIn ) { $providerCategoryHash.Keys | Sort-Object | Foreach-Object { $providerCategoryHtml += $providerCategoryHash[ $_ ] } } # add the PSProvider category to the HHC $hhcContentsHtml += @" <li><object type="text/sitemap"> <param name="Name" value="Provider Help"> </object> <ul> $( $providerCategoryHtml.Trim() ) </ul> "@ # get the about topics $about_TopicPaths = @() $helpPath = "" if ( Resolve-Path "$pshome\\about_*.txt" ) { $helpPath = "$pshome" } elseif ( Resolve-Path "$pshome\\$( $Host.CurrentUICulture.Name )\\about_*.txt" ) { $helpPath = "$pshome\\$( $Host.CurrentUICulture.Name )" } if ( Test-Path $helpPath ) { $about_TopicPaths += Get-ChildItem "$helpPath\\about_*.txt" } # we SilentlyContinue with Get-ChildItem errors because the ModuleName # for the built-in PSSnapins doesn't resolve to anything, since the assemblies # are only in the GAC. $about_TopicPaths += Get-PSSnapin | Foreach-Object { ( Get-ChildItem $_.ModuleName -ErrorAction "SilentlyContinue" ).DirectoryName } | Foreach-Object { Get-ChildItem "$_\\about_*.txt" } if ( $about_TopicPaths.Count -gt 0 ) { $aboutCategoryHtml = "" $about_TopicPaths | Sort-Object -Unique -Property @{ Expression = { $_.Name.ToUpper() } }| Foreach-Object { # pull the topic name out of the file name $name = ( $_.Name -replace "(.xml)?.help.txt", "`$1" ) # add the path of the topic to the help hashtable $helpHash[ $name ] = $_.FullName $topicName = Capitalize-Words ( $name -replace "(about)?_", " " ).Trim() # add a category in the HHC for this about topic $aboutCategoryHtml += @" <li><object type="text/sitemap"> <param name="Name" value="$topicName"> <param name="Local" value="Topics\\$name.html"> </object> "@ } # add the About Topics category to the HHC $hhcContentsHtml += @" <li><object type="text/sitemap"> <param name="Name" value="About Topics"> </object> <ul> $( $aboutCategoryHtml.Trim() ) </ul> "@ } # write the contents file Out-File -FilePath "$outDirectory\\powershell.hhc" -Encoding Ascii -Input @" <!doctype html public "-//ietf//dtd html//en"> <html> <head> <meta name="Generator" content="Microsoft&reg; HTML Help Workshop 4.1"> <!-- Sitemap 1.0 --> </head> <body> <object type="text/site properties"> <param name="Window Styles" value="0x800025"> </object> <ul> <li><object type="text/sitemap"> <param name="Name" value="PowerShell Help"> <param name="Local" value="Topics\\default.html"> </object> $( $hhcContentsHtml.Trim() ) </ul> </body> </html> "@ $helpHash.Keys | Sort-Object | Foreach-Object { switch -regex ( $_ ) { # about topic "about_" { "Creating help for the $_ about topic..." Write-AboutTopic $_ $helpHash[ $_ ] } # Verb-Noun: Cmdlet "\\w+-\\w+" { "Creating help for the $( $_ -replace '(^\\w+-\\w+).*', '$1' ) Cmdlet..." Write-CmdletTopic $_ $helpHash[ $_ ] } # PSProvider default { "Creating help for the $( $_ -replace '(^\\w+).*', '$1' ) PSProvider..." Write-ProviderTopic $_ $helpHash[ $_ ] } } } Write-DefaultPage Write-Css Write-Hhp $progDir = "C:\\Program Files" if ( $(Test-Path env:"ProgramFiles(x86)") -eq $True ) { $progDir = $(get-item env:"ProgramFiles(x86)").value } if ( Test-Path $progDir + "\\HTML Help Workshop\\hhc.exe" ) { # compile the help "`nCompiling the help manual...`n" Push-Location Set-Location $outDirectory & $progDir + "\\HTML Help Workshop\\hhc.exe" powershell.hhp Pop-Location # open the help file & "$outDirectory\\PowerShell.chm" } else { Write-Host -ForegroundColor Red @" HTML Help Workshop is not installed, or it was not installed in its default location of "C:\\Program Files [x86]\\HTML Help Workshop". HTML Help Workshop is required to compile the help manual. It can be downloaded free of charge from Microsoft: http://www.microsoft.com/downloads/details.aspx?familyid=00535334-c8a6-452f-9aa0-d597d16580cc&displaylang=en If you do not want to install HTML Help Workshop on this machine, all of the files necessary to compile the manual have been created here: $( Resolve-Path $outDirectory ) Copy these files to a machine with HTML Help Workshop, and you can compile the manual there, with the following command: <HTML Help Workshop location>\\hhc.exe powershell.hhp "@ }
combined_dataset/train/non-malicious/Get-InstalledProgram.ps1
Get-InstalledProgram.ps1
function Get-InstalledProgram() { param ( [String[]]$Computer, $User ) ############################################################################################# if ($User -is [String]) { $Connection = Get-Credential -Credential $User } ############################################################################################# foreach ($Comp in $Computer){ if ($Connection -eq $null){ $Install_soft = gwmi win32_product -ComputerName $Comp | where {$_.vendor -notlike "*Microsoft*" -and` $_.vendor -notlike "*PGP*" -and $_.vendor -notlike "*Intel*" -and $_.vendor -notlike "*Corel*" -and $_.vendor -notlike "*Adobe*" -and $_.vendor -notlike "*ABBYY*" -and $_.vendor -notlike "*Sun*" -and $_.vendor -ne "SAP" -and $_.vendor -ne "Marvell" -and $_.vendor -ne "Hewlett-Packard" } | select __SERVER,Name,Version,InstallDate $Install_soft } else { $Install_soft = gwmi win32_product -ComputerName $Comp -Credential $Connection | where {$_.vendor -notlike "*Microsoft*" -and` $_.vendor -notlike "*PGP*" -and $_.vendor -notlike "*Intel*" -and $_.vendor -notlike "*Corel*" -and $_.vendor -notlike "*Adobe*" -and $_.vendor -notlike "*ABBYY*" -and $_.vendor -notlike "*Sun*" -and $_.vendor -ne "SAP" -and $_.vendor -ne "Marvell" -and $_.vendor -ne "Hewlett-Packard" } | select __SERVER,Name,Version,InstallDate $Install_soft } } ############################################################################################# }
combined_dataset/train/non-malicious/sample_23_92.ps1
sample_23_92.ps1
# # Script module for module 'Az.ServiceBus' that is executed when 'Az.ServiceBus' is imported in a PowerShell session. # # Generated by: Microsoft Corporation # # Generated on: 05/16/2024 06:33:09 # $PSDefaultParameterValues.Clear() Set-StrictMode -Version Latest function Test-DotNet { try { if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 }))) { throw ".NET Framework versions lower than 4.7.2 are not supported in Az. Please upgrade to .NET Framework 4.7.2 or higher." } } catch [System.Management.Automation.DriveNotFoundException] { Write-Verbose ".NET Framework version check failed." } } function Preload-Assembly { param ( [string] $AssemblyDirectory ) if($PSEdition -eq 'Desktop' -and (Test-Path $AssemblyDirectory -ErrorAction Ignore)) { try { Get-ChildItem -ErrorAction Stop -Path $AssemblyDirectory -Filter "*.dll" | ForEach-Object { try { Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null } catch { Write-Verbose $_ } } } catch {} } } if ($true -and ($PSEdition -eq 'Desktop')) { if ($PSVersionTable.PSVersion -lt [Version]'5.1') { throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher." } Test-DotNet } if ($true -and ($PSEdition -eq 'Core')) { if ($PSVersionTable.PSVersion -lt [Version]'6.2.4') { throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher." } } if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore) { Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object { . $_.FullName } } # [windows powershell] preload assemblies # [windows powershell] preload module alc assemblies $preloadPath = (Join-Path $PSScriptRoot -ChildPath "ModuleAlcAssemblies") Preload-Assembly -AssemblyDirectory $preloadPath if (Get-Module AzureRM.profile -ErrorAction Ignore) { Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.") throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.") } $module = Get-Module Az.Accounts if ($module -ne $null -and $module.Version -lt [System.Version]"3.0.0") { Write-Error "This module requires Az.Accounts version 3.0.0. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop } elseif ($module -eq $null) { Import-Module Az.Accounts -MinimumVersion 3.0.0 -Scope Global } Import-Module (Join-Path -Path $PSScriptRoot -ChildPath Microsoft.Azure.PowerShell.Cmdlets.ServiceBus.dll) if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore) { Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object { . $_.FullName } } $FilteredCommands = @('Test-AzServiceBusNameAvailability:ResourceGroupName') if ($Env:ACC_CLOUD -eq $null) { $FilteredCommands | ForEach-Object { $existingDefault = $false foreach ($key in $global:PSDefaultParameterValues.Keys) { if ($_ -like "$key") { $existingDefault = $true } } if (!$existingDefault) { $global:PSDefaultParameterValues.Add($_, { if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null) { $context = Get-AzureRmContext } else { $context = Get-AzContext } if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) { $context.ExtendedProperties["Default Resource Group"] } }) } } } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAHybLU/boUp6Fr # dFtwQwR7dMtpVWclHxHrAZ+/rdw2EKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKX+1XLGXPYsJMN7T79uGkgs # wwgMVFTq5EUnR2nhCFA/MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAM9xGZhDJ2a/J5+5R8I2oO8OGXwU29iuKHej/n9vOa7xcCSAGB0iSQtsF # UPQ5xVjwjmDG6R21gB1Kzb7KAJsU2FvHFvIep2pQUMLXfZpR1LFE02ou93SRp2hO # nps9kAyGcsENEIRYc77ZBUMD+XexV1qNx+YKRSTRQKVW357kaJOYePJUyAKy3E1S # CSJkzyuiMsgOaKFMR2s/rDiMuQTcTtaNyxbBovZNFdAH6w+rw5KgZzWrkUKPdyIZ # 1ay+4OnbMJVzoqSmmsdsdoWauRx3DYSC/YwNsJ04VUY//kbW4u35LhQRquEIm4vY # Czts2OemAsG3HQsR9XMK/eQKHrnOxKGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAybP8WBr9VSDlMAz4b5HrMnelaKByAMyyxe9LO6c//KQIGZjOaa5xR # GBMyMDI0MDUxNjA2NDIxNC4yNTNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAe+JP1ahWMyo2gABAAAB7zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NDhaFw0yNTAzMDUxODQ1NDhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCjC1jinwzgHwhOakZqy17oE4BIBKsm5kX4DUmCBWI0 # lFVpEiK5mZ2Kh59soL4ns52phFMQYGG5kypCipungwP9Nob4VGVE6aoMo5hZ9Nyt # XR5ZRgb9Z8NR6EmLKICRhD4sojPMg/RnGRTcdf7/TYvyM10jLjmLyKEegMHfvIwP # mM+AP7hzQLfExDdqCJ2u64Gd5XlnrFOku5U9jLOKk1y70c+Twt04/RLqruv1fGP8 # LmYmtHvrB4TcBsADXSmcFjh0VgQkX4zXFwqnIG8rgY+zDqJYQNZP8O1Yo4kSckHT # 43XC0oM40ye2+9l/rTYiDFM3nlZe2jhtOkGCO6GqiTp50xI9ITpJXi0vEek8AejT # 4PKMEO2bPxU63p63uZbjdN5L+lgIcCNMCNI0SIopS4gaVR4Sy/IoDv1vDWpe+I28 # /Ky8jWTeed0O3HxPJMZqX4QB3I6DnwZrHiKn6oE38tgBTCCAKvEoYOTg7r2lF0Iu # bt/3+VPvKtTCUbZPFOG8jZt9q6AFodlvQntiolYIYtqSrLyXAQIlXGhZ4gNcv4dv # 1YAilnbWA9CsnYh+OKEFr/4w4M69lI+yaoZ3L/t/UfXpT/+yc7hS/FolcmrGFJTB # YlS4nE1cuKblwZ/UOG26SLhDONWXGZDKMJKN53oOLSSk4ldR0HlsbT4heLlWlOEl # JQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFO1MWqKFwrCbtrw9P8A63bAVSJzLMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAYGZa3aCDudbk9EVdkP8xcQGZuIAIPRx9K # 1CA7uRzBt80fC0aWkuYYhQMvHHJRHUobSM4Uw3zN7fHEN8hhaBDb9NRaGnFWdtHx # mJ9eMz6Jpn6KiIyi9U5Og7QCTZMl17n2w4eddq5vtk4rRWOVvpiDBGJARKiXWB9u # 2ix0WH2EMFGHqjIhjWUXhPgR4C6NKFNXHvWvXecJ2WXrJnvvQGXAfNJGETJZGpR4 # 1nUN3ijfiCSjFDxamGPsy5iYu904Hv9uuSXYd5m0Jxf2WNJSXkPGlNhrO27pPxgT # 111myAR61S3S2hc572zN9yoJEObE98Vy5KEM3ZX53cLefN81F1C9p/cAKkE6u9V6 # ryyl/qSgxu1UqeOZCtG/iaHSKMoxM7Mq4SMFsPT/8ieOdwClYpcw0CjZe5KBx2xL # a4B1neFib8J8/gSosjMdF3nHiyHx1YedZDtxSSgegeJsi0fbUgdzsVMJYvqVw52W # qQNu0GRC79ZuVreUVKdCJmUMBHBpTp6VFopL0Jf4Srgg+zRD9iwbc9uZrn+89odp # InbznYrnPKHiO26qe1ekNwl/d7ro2ItP/lghz0DoD7kEGeikKJWHdto7eVJoJhkr # UcanTuUH08g+NYwG6S+PjBSB/NyNF6bHa/xR+ceAYhcjx0iBiv90Mn0JiGfnA2/h # Lj5evhTcAjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjk2MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBL # cI81gxbea1Ex2mFbXx7ck+0g/6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e/kajAiGA8yMDI0MDUxNjAxNDgy # NloYDzIwMjQwNTE3MDE0ODI2WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp7+Rq # AgEAMAoCAQACAgS3AgH/MAcCAQACAhN0MAoCBQDp8TXqAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBALtBSk4n+rSTeMZQUhoJ92GGdhj/jk7xMXLu2WF7hT9p # RDrcDzyuPb/LrKVcqHr4jQhbjki+rY8hL06zkH6nseJ4W068zeChPtNs0nsSbTn9 # fL7U3Q5uvHvrDEJFj6ivToez8EGBaaWb51Kly8UVOgxOTO3KwBHEs7ASmVVF9gpc # dCFtHBgAUd43l6hy/lD4Gvmq4IsGPqhaqsHhRNDH2F+zUNNjXhRCJZ6P3WSCCQru # var3pvQfoHziPJR+Xxe9ctl6PScXAGjGlDc8M3j7XOpxTK34C/cH5Rslt5NQXCcb # bG4EqFc/jGvGhsnvCA8iS3LYRtbP6pOe0WWEB+QfGRwxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe+JP1ahWMyo2gABAAAB # 7zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCCxnBSGhgWStY/WszUltDATKbcuK9KwJMkErd7yWNEY # BTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPBhKEW4Fo3wUz09NQx2a0Db # cdsX8jovM5LizHmnyX+jMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHviT9WoVjMqNoAAQAAAe8wIgQgcg/hgnHklArzGbBkon+iztsk # ir9etKkTtBy2hJg2l+MwDQYJKoZIhvcNAQELBQAEggIAW83ANSr4iSGHj1yUOQbI # i0TN0nGfazekqn83tP1SAHHI7pceysq8RsPremU0wbxEf9IKQvhEwVaZXsNyjWmr # 0svAr/1dX3xSzSAW9ODfp6Y/f67wmqck8Y3XxRMUzeQiPj8U33L0Ql7NFJmjGTmn # tMXPPw7kwYhp4YoZnTWgi29IEdV3GavIW/9YNcLS6biqky7fzr78LHi483XoZbS3 # ZzC+C/QLjgE2ht+hHKMEN2l2C/bymHUuZ7PPBIj5DYq42enf3TjuCyW6OKXJeDag # 7gj9iBKJ4Wp2R89Sa9vQAD2ym3vu9zk9o9E6S9N0ap3UKy9WSzH1UAB8pvx/vuqK # +IJWj211vvCIfnkF1ulG/qudila7Ssuf/KmE8vpy+3FG7soque0eX4s9usx/HuhE # vxejAlth1DqXN5UY9moW5WnJC5EQqeM/7lYYprBseJzCiBOXzVxcU99waKXmY2xQ # C4hLhPKyVo6bEko54OD+Rregac/EGv/sZufauS9fntFxUDshMH0R8y+YijWd9J7/ # MK67LSxRmZ84iGErMjeRGEu8N6rk0YCHaRh2e+Jg5rVZbEOlKsctjdVh/4Wmx75i # Oh0GTwGpIvWM0Q+U8g+2QNtD9pFp4Mb1mB/htOVaTZZEUzCyorbSOVXjvJPBm05A # 8SKt3ie6/w6CrBNzPM5DggA= # SIG # End signature block
combined_dataset/train/non-malicious/sample_15_49.ps1
sample_15_49.ps1
<# .NOTES Author: @jhowardmsft Summary: Windows native build script. This is similar to functionality provided by hack\make.sh, but uses native Windows PowerShell semantics. It does not support the full set of options provided by the Linux counterpart. For example: - You can't cross-build Linux docker binaries on Windows - Hashes aren't generated on binaries - 'Releasing' isn't supported. - Integration tests. This is because they currently cannot run inside a container, and require significant external setup. It does however provided the minimum necessary to support parts of local Windows development and Windows to Windows CI. Usage Examples (run from repo root): "hack\make.ps1 -Client" to build docker.exe client 64-bit binary (remote repo) "hack\make.ps1 -TestUnit" to run unit tests "hack\make.ps1 -Daemon -TestUnit" to build the daemon and run unit tests "hack\make.ps1 -All" to run everything this script knows about that can run in a container "hack\make.ps1" to build the daemon binary (same as -Daemon) "hack\make.ps1 -Binary" shortcut to -Client and -Daemon .PARAMETER Client Builds the client binaries. .PARAMETER Daemon Builds the daemon binary. .PARAMETER Binary Builds the client and daemon binaries. A convenient shortcut to `make.ps1 -Client -Daemon`. .PARAMETER Race Use -race in go build and go test. .PARAMETER Noisy Use -v in go build. .PARAMETER ForceBuildAll Use -a in go build. .PARAMETER NoOpt Use -gcflags -N -l in go build to disable optimisation (can aide debugging). .PARAMETER CommitSuffix Adds a custom string to be appended to the commit ID (spaces are stripped). .PARAMETER DCO Runs the DCO (Developer Certificate Of Origin) test (must be run outside a container). .PARAMETER PkgImports Runs the pkg\ directory imports test (must be run outside a container). .PARAMETER GoFormat Runs the Go formatting test (must be run outside a container). .PARAMETER TestUnit Runs unit tests. .PARAMETER TestIntegration Runs integration tests. .PARAMETER TestIntegrationCli Runs integration-cli tests. .PARAMETER All Runs everything this script knows about that can run in a container. TODO - Unify the head commit - Add golint and other checks (swagger maybe?) #> param( [Parameter(Mandatory=$False)][switch]$Client, [Parameter(Mandatory=$False)][switch]$Daemon, [Parameter(Mandatory=$False)][switch]$Binary, [Parameter(Mandatory=$False)][switch]$Race, [Parameter(Mandatory=$False)][switch]$Noisy, [Parameter(Mandatory=$False)][switch]$ForceBuildAll, [Parameter(Mandatory=$False)][switch]$NoOpt, [Parameter(Mandatory=$False)][string]$CommitSuffix="", [Parameter(Mandatory=$False)][switch]$DCO, [Parameter(Mandatory=$False)][switch]$PkgImports, [Parameter(Mandatory=$False)][switch]$GoFormat, [Parameter(Mandatory=$False)][switch]$TestUnit, [Parameter(Mandatory=$False)][switch]$TestIntegration, [Parameter(Mandatory=$False)][switch]$TestIntegrationCli, [Parameter(Mandatory=$False)][switch]$All ) $ErrorActionPreference = "Stop" $ProgressPreference = "SilentlyContinue" $pushed=$False # To restore the directory if we have temporarily pushed to one. Set-Variable GOTESTSUM_LOCATION -option Constant -value "$env:GOPATH/bin/" # Utility function to get the commit ID of the repository Function Get-GitCommit() { if (-not (Test-Path ".\.git")) { # If we don't have a .git directory, but we do have the environment # variable DOCKER_GITCOMMIT set, that can override it. if ($env:DOCKER_GITCOMMIT.Length -eq 0) { Throw ".git directory missing and DOCKER_GITCOMMIT environment variable not specified." } Write-Host "INFO: Git commit ($env:DOCKER_GITCOMMIT) assumed from DOCKER_GITCOMMIT environment variable" return $env:DOCKER_GITCOMMIT } $gitCommit=$(git rev-parse --short HEAD) if ($(git status --porcelain --untracked-files=no).Length -ne 0) { $gitCommit="$gitCommit-unsupported" Write-Host "" Write-Warning "This version is unsupported because there are uncommitted file(s)." Write-Warning "Either commit these changes, or add them to .gitignore." git status --porcelain --untracked-files=no | Write-Warning Write-Host "" } return $gitCommit } # Utility function to determine if we are running in a container or not. # In Windows, we get this through an environment variable set in `Dockerfile.Windows` Function Check-InContainer() { if ($env:FROM_DOCKERFILE.Length -eq 0) { Write-Host "" Write-Warning "Not running in a container. The result might be an incorrect build." Write-Host "" return $False } return $True } # Utility function to warn if the version of go is correct. Used for local builds # outside of a container where it may be out of date with master. Function Verify-GoVersion() { Try { $goVersionDockerfile=(Select-String -Path ".\Dockerfile" -Pattern "^ARG[\s]+GO_VERSION=(.*)$").Matches.groups[1].Value -replace '\.0$','' $goVersionInstalled=(go version).ToString().Split(" ")[2].SubString(2) } Catch [Exception] { Throw "Failed to validate go version correctness: $_" } if (-not($goVersionInstalled -eq $goVersionDockerfile)) { Write-Host "" Write-Warning "Building with golang version $goVersionInstalled. You should update to $goVersionDockerfile" Write-Host "" } } # Utility function to get the commit for HEAD Function Get-HeadCommit() { $head = Invoke-Expression "git rev-parse --verify HEAD" if ($LASTEXITCODE -ne 0) { Throw "Failed getting HEAD commit" } return $head } # Utility function to get the commit for upstream Function Get-UpstreamCommit() { Invoke-Expression "git fetch -q https://github.com/docker/docker.git refs/heads/master" if ($LASTEXITCODE -ne 0) { Throw "Failed fetching" } $upstream = Invoke-Expression "git rev-parse --verify FETCH_HEAD" if ($LASTEXITCODE -ne 0) { Throw "Failed getting upstream commit" } return $upstream } # Build a binary (client or daemon) Function Execute-Build($type, $additionalBuildTags, $directory, $ldflags) { # Generate the build flags $buildTags = "" $ldflags = "-linkmode=internal " + $ldflags if ($Noisy) { $verboseParm=" -v" } if ($Race) { Write-Warning "Using race detector"; $raceParm=" -race"} if ($ForceBuildAll) { $allParm=" -a" } if ($NoOpt) { $optParm=" -gcflags "+""""+"-N -l"+"""" } if ($additionalBuildTags -ne "") { $buildTags += $(" " + $additionalBuildTags) } # Do the go build in the appropriate directory # Note -linkmode=internal is required to be able to debug on Windows. # https://github.com/golang/go/issues/14319#issuecomment-189576638 Write-Host "INFO: Building $type..." Push-Location $root\cmd\$directory; $global:pushed=$True $buildCommand = "go build" + ` $raceParm + ` $verboseParm + ` $allParm + ` $optParm + ` " -tags """ + $buildTags + """" + ` " -ldflags """ + $ldflags + """" + ` " -o $root\bundles\"+$directory+".exe" Invoke-Expression $buildCommand if ($LASTEXITCODE -ne 0) { Throw "Failed to compile $type" } Pop-Location; $global:pushed=$False } # Validates the DCO marker is present on each commit Function Validate-DCO($headCommit, $upstreamCommit) { Write-Host "INFO: Validating Developer Certificate of Origin..." # Username may only contain alphanumeric characters or dashes and cannot begin with a dash $usernameRegex='[a-zA-Z0-9][a-zA-Z0-9-]+' $dcoPrefix="Signed-off-by:" $dcoRegex="^(Docker-DCO-1.1-)?$dcoPrefix ([^<]+) <([^<>@]+@[^<>]+)>( \(github: ($usernameRegex)\))?$" $counts = Invoke-Expression "git diff --numstat $upstreamCommit...$headCommit" if ($LASTEXITCODE -ne 0) { Throw "Failed git diff --numstat" } # Counts of adds and deletes after removing multiple white spaces. AWK anyone? :( $adds=0; $dels=0; $($counts -replace '\s+', ' ') | %{ $a=$_.Split(" "); if ($a[0] -ne "-") { $adds+=[int]$a[0] } if ($a[1] -ne "-") { $dels+=[int]$a[1] } } if (($adds -eq 0) -and ($dels -eq 0)) { Write-Warning "DCO validation - nothing to validate!" return } $commits = Invoke-Expression "git log $upstreamCommit..$headCommit --format=format:%H%n" if ($LASTEXITCODE -ne 0) { Throw "Failed git log --format" } $commits = $($commits -split '\s+' -match '\S') $badCommits=@() $commits | ForEach-Object{ # Skip commits with no content such as merge commits etc if ($(git log -1 --format=format: --name-status $_).Length -gt 0) { # Ignore exit code on next call - always process regardless $commitMessage = Invoke-Expression "git log -1 --format=format:%B --name-status $_" if (($commitMessage -match $dcoRegex).Length -eq 0) { $badCommits+=$_ } } } if ($badCommits.Length -eq 0) { Write-Host "Congratulations! All commits are properly signed with the DCO!" } else { $e = "`nThese commits do not have a proper '$dcoPrefix' marker:`n" $badCommits | %{ $e+=" - $_`n"} $e += "`nPlease amend each commit to include a properly formatted DCO marker.`n`n" $e += "Visit the following URL for information about the Docker DCO:`n" $e += "https://github.com/docker/docker/blob/master/CONTRIBUTING.md#sign-your-work`n" Throw $e } } # Validates that .\pkg\... is safely isolated from internal code Function Validate-PkgImports($headCommit, $upstreamCommit) { Write-Host "INFO: Validating pkg import isolation..." # Get a list of go source-code files which have changed under pkg\. Ignore exit code on next call - always process regardless $files=@(); $files = Invoke-Expression "git diff $upstreamCommit...$headCommit --diff-filter=ACMR --name-only -- `'pkg\*.go`'" $badFiles=@(); $files | ForEach-Object{ $file=$_ # For the current changed file, get its list of dependencies, sorted and uniqued. $imports = Invoke-Expression "go list -e -f `'{{ .Deps }}`' $file" if ($LASTEXITCODE -ne 0) { Throw "Failed go list for dependencies on $file" } $imports = $imports -Replace "\[" -Replace "\]", "" -Split(" ") | Sort-Object | Get-Unique # Filter out what we are looking for $imports = @() + $imports -NotMatch "^github.com/docker/docker/pkg/" ` -NotMatch "^github.com/docker/docker/vendor" ` -NotMatch "^github.com/docker/docker/internal" ` -Match "^github.com/docker/docker" ` -Replace "`n", "" $imports | ForEach-Object{ $badFiles+="$file imports $_`n" } } if ($badFiles.Length -eq 0) { Write-Host 'Congratulations! ".\pkg\*.go" is safely isolated from internal code.' } else { $e = "`nThese files import internal code: (either directly or indirectly)`n" $badFiles | ForEach-Object{ $e+=" - $_"} Throw $e } } # Validates that changed files are correctly go-formatted Function Validate-GoFormat($headCommit, $upstreamCommit) { Write-Host "INFO: Validating go formatting on changed files..." # Verify gofmt is installed if ($(Get-Command gofmt -ErrorAction SilentlyContinue) -eq $nil) { Throw "gofmt does not appear to be installed" } # Get a list of all go source-code files which have changed. Ignore exit code on next call - always process regardless $files=@(); $files = Invoke-Expression "git diff $upstreamCommit...$headCommit --diff-filter=ACMR --name-only -- `'*.go`'" $files = $files | Select-String -NotMatch "^vendor/" $badFiles=@(); $files | %{ # Deliberately ignore error on next line - treat as failed $content=Invoke-Expression "git show $headCommit`:$_" # Next set of hoops are to ensure we have LF not CRLF semantics as otherwise gofmt on Windows will not succeed. # Also note that gofmt on Windows does not appear to support stdin piping correctly. Hence go through a temporary file. $content=$content -join "`n" $content+="`n" $outputFile=[System.IO.Path]::GetTempFileName() if (Test-Path $outputFile) { Remove-Item $outputFile } [System.IO.File]::WriteAllText($outputFile, $content, (New-Object System.Text.UTF8Encoding($False))) $currentFile = $_ -Replace("/","\") Write-Host Checking $currentFile Invoke-Expression "gofmt -s -l $outputFile" if ($LASTEXITCODE -ne 0) { $badFiles+=$currentFile } if (Test-Path $outputFile) { Remove-Item $outputFile } } if ($badFiles.Length -eq 0) { Write-Host 'Congratulations! All Go source files are properly formatted.' } else { $e = "`nThese files are not properly gofmt`'d:`n" $badFiles | ForEach-Object{ $e+=" - $_`n"} $e+= "`nPlease reformat the above files using `"gofmt -s -w`" and commit the result." Throw $e } } # Run the unit tests Function Run-UnitTests() { Write-Host "INFO: Running unit tests..." $testPath="./..." $goListCommand = "go list -e -f '{{if ne .Name """ + '\"github.com/docker/docker\"' + """}}{{.ImportPath}}{{end}}' $testPath" $pkgList = $(Invoke-Expression $goListCommand) if ($LASTEXITCODE -ne 0) { Throw "go list for unit tests failed" } $pkgList = $pkgList | Select-String -Pattern "github.com/docker/docker" $pkgList = $pkgList | Select-String -NotMatch "github.com/docker/docker/vendor" $pkgList = $pkgList | Select-String -NotMatch "github.com/docker/docker/man" $pkgList = $pkgList | Select-String -NotMatch "github.com/docker/docker/integration" $pkgList = $pkgList -replace "`r`n", " " $jsonFilePath = $bundlesDir + "\go-test-report-unit-tests.json" $xmlFilePath = $bundlesDir + "\junit-report-unit-tests.xml" $coverageFilePath = $bundlesDir + "\coverage-report-unit-tests.txt" $goTestArg = "--format=standard-verbose --jsonfile=$jsonFilePath --junitfile=$xmlFilePath -- " + $raceParm + " -coverprofile=$coverageFilePath -covermode=atomic -ldflags -w -a """ + "-test.timeout=10m" + """ $pkgList" Write-Host "INFO: Invoking unit tests run with $GOTESTSUM_LOCATION\gotestsum.exe $goTestArg" $pinfo = New-Object System.Diagnostics.ProcessStartInfo $pinfo.FileName = "$GOTESTSUM_LOCATION\gotestsum.exe" $pinfo.WorkingDirectory = "$($PWD.Path)" $pinfo.UseShellExecute = $false $pinfo.Arguments = $goTestArg $p = New-Object System.Diagnostics.Process $p.StartInfo = $pinfo $p.Start() | Out-Null $p.WaitForExit() if ($p.ExitCode -ne 0) { Throw "Unit tests failed" } } # Run the integration tests Function Run-IntegrationTests() { $escRoot = [Regex]::Escape($root) $env:DOCKER_INTEGRATION_DAEMON_DEST = $bundlesDir + "\tmp" $dirs = go list -test -f '{{- if ne .ForTest "" -}}{{- .Dir -}}{{- end -}}' .\integration\... ForEach($dir in $dirs) { # Normalize directory name for using in the test results files. $normDir = $dir.Trim() $normDir = $normDir -replace $escRoot, "" $normDir = $normDir -replace "\\", "-" $normDir = $normDir -replace "\/", "-" $normDir = $normDir -replace "\.", "-" if ($normDir.StartsWith("-")) { $normDir = $normDir.TrimStart("-") } if ($normDir.EndsWith("-")) { $normDir = $normDir.TrimEnd("-") } $jsonFilePath = $bundlesDir + "\go-test-report-int-tests-$normDir" + ".json" $xmlFilePath = $bundlesDir + "\junit-report-int-tests-$normDir" + ".xml" $coverageFilePath = $bundlesDir + "\coverage-report-int-tests-$normDir" + ".txt" Set-Location $dir Write-Host "Running $($PWD.Path)" $pinfo = New-Object System.Diagnostics.ProcessStartInfo $pinfo.FileName = "gotestsum.exe" $pinfo.WorkingDirectory = "$($PWD.Path)" $pinfo.UseShellExecute = $false $pinfo.Arguments = "--format=standard-verbose --jsonfile=$jsonFilePath --junitfile=$xmlFilePath -- -coverprofile=$coverageFilePath -covermode=atomic -test.timeout=60m $env:INTEGRATION_TESTFLAGS" $p = New-Object System.Diagnostics.Process $p.StartInfo = $pinfo $p.Start() | Out-Null $p.WaitForExit() if ($p.ExitCode -ne 0) { Throw "Integration tests failed" } } } # Run the integration-cli tests Function Run-IntegrationCliTests() { Write-Host "INFO: Running integration-cli tests..." $goTestRun = "" $reportSuffix = "" if ($env:INTEGRATION_TESTRUN.Length -ne 0) { $goTestRun = "-test.run=($env:INTEGRATION_TESTRUN)/" $reportSuffixStream = [IO.MemoryStream]::new([byte[]][char[]]$env:INTEGRATION_TESTRUN) $reportSuffix = "-" + (Get-FileHash -InputStream $reportSuffixStream -Algorithm SHA256).Hash } $jsonFilePath = $bundlesDir + "\go-test-report-int-cli-tests$reportSuffix.json" $xmlFilePath = $bundlesDir + "\junit-report-int-cli-tests$reportSuffix.xml" $coverageFilePath = $bundlesDir + "\coverage-report-int-cli-tests$reportSuffix.txt" $goTestArg = "--format=standard-verbose --packages=./integration-cli/... --jsonfile=$jsonFilePath --junitfile=$xmlFilePath -- -coverprofile=$coverageFilePath -covermode=atomic -tags=autogen -test.timeout=200m $goTestRun $env:INTEGRATION_TESTFLAGS" Write-Host "INFO: Invoking integration-cli tests run with gotestsum.exe $goTestArg" $pinfo = New-Object System.Diagnostics.ProcessStartInfo $pinfo.FileName = "gotestsum.exe" $pinfo.WorkingDirectory = "$($PWD.Path)" $pinfo.UseShellExecute = $false $pinfo.Arguments = $goTestArg $p = New-Object System.Diagnostics.Process $p.StartInfo = $pinfo $p.Start() | Out-Null $p.WaitForExit() if ($p.ExitCode -ne 0) { Throw "integration-cli tests failed" } } # Start of main code. Try { Write-Host -ForegroundColor Cyan "INFO: make.ps1 starting at $(Get-Date)" # Get to the root of the repo $root = $(Split-Path $MyInvocation.MyCommand.Definition -Parent | Split-Path -Parent) Push-Location $root # Ensure the bundles directory exists $bundlesDir = $root + "\bundles" Set-Variable bundlesDir -option ReadOnly New-Item -Force $bundlesDir -ItemType Directory | Out-Null # Handle the "-All" shortcut to turn on all things we can handle. # Note we expressly only include the items which can run in a container - the validations tests cannot # as they require the .git directory which is excluded from the image by .dockerignore if ($All) { $Client=$True; $Daemon=$True; $TestUnit=$True; } # Handle the "-Binary" shortcut to build both client and daemon. if ($Binary) { $Client = $True; $Daemon = $True } # Default to building the daemon if not asked for anything explicitly. if (-not($Client) -and -not($Daemon) -and -not($DCO) -and -not($PkgImports) -and -not($GoFormat) -and -not($TestUnit) -and -not($TestIntegration) -and -not($TestIntegrationCli)) { $Daemon=$True } # Verify git is installed if ($(Get-Command git -ErrorAction SilentlyContinue) -eq $nil) { Throw "Git does not appear to be installed" } # Verify go is installed if ($(Get-Command go -ErrorAction SilentlyContinue) -eq $nil) { Throw "GoLang does not appear to be installed" } # Get the git commit. This will also verify if we are in a repo or not. Then add a custom string if supplied. $gitCommit=Get-GitCommit if ($CommitSuffix -ne "") { $gitCommit += "-"+$CommitSuffix -Replace ' ', '' } # Get the version of docker (eg 17.04.0-dev) $dockerVersion="0.0.0-dev" # Overwrite dockerVersion if VERSION Environment variable is available if (Test-Path Env:\VERSION) { $dockerVersion=$env:VERSION } # Give a warning if we are not running in a container and are building binaries or running unit tests. # Not relevant for validation tests as these are fine to run outside of a container. if ($Client -or $Daemon -or $TestUnit) { $inContainer=Check-InContainer } # If we are not in a container, validate the version of GO that is installed. if (-not $inContainer) { Verify-GoVersion } # Verify GOPATH is set if ($env:GOPATH.Length -eq 0) { Throw "Missing GOPATH environment variable. See https://pkg.go.dev/cmd/go#hdr-GOPATH_environment_variable" } # Run autogen if building daemon. if ($Daemon) { Write-Host "INFO: Invoking autogen..." Try { .\hack\make\.go-autogen.ps1 -CommitString $gitCommit -DockerVersion $dockerVersion -Platform "$env:PLATFORM" -Product "$env:PRODUCT" -PackagerName "$env:PACKAGER_NAME" } Catch [Exception] { Throw $_ } } $ldflags = "-X 'github.com/docker/docker/dockerversion.Version="+$dockerVersion+"'" $ldflags += " -X 'github.com/docker/docker/dockerversion.GitCommit="+$gitCommit+"'" $ldflags += " -X 'github.com/docker/docker/dockerversion.BuildTime="+$env:BUILDTIME+"'" $ldflags += " -X 'github.com/docker/docker/dockerversion.PlatformName="+$env:PLATFORM+"'" $ldflags += " -X 'github.com/docker/docker/dockerversion.ProductName="+$env:PRODUCT+"'" $ldflags += " -X 'github.com/docker/docker/dockerversion.DefaultProductLicense="+$env:DEFAULT_PRODUCT_LICENSE+"'" # DCO, Package import and Go formatting tests. if ($DCO -or $PkgImports -or $GoFormat) { # We need the head and upstream commits for these $headCommit=Get-HeadCommit $upstreamCommit=Get-UpstreamCommit # Run DCO validation if ($DCO) { Validate-DCO $headCommit $upstreamCommit } # Run `gofmt` validation if ($GoFormat) { Validate-GoFormat $headCommit $upstreamCommit } # Run pkg isolation validation if ($PkgImports) { Validate-PkgImports $headCommit $upstreamCommit } } # Build the binaries if ($Client -or $Daemon) { # Perform the actual build if ($Daemon) { Execute-Build "daemon" "daemon" "dockerd" $ldflags } if ($Client) { # Get the Docker channel and version from the environment, or use the defaults. if (-not ($channel = $env:DOCKERCLI_CHANNEL)) { $channel = "stable" } if (-not ($version = $env:DOCKERCLI_VERSION)) { $version = "17.06.2-ce" } # Download the zip file and extract the client executable. Write-Host "INFO: Downloading docker/cli version $version from $channel..." $url = "https://download.docker.com/win/static/$channel/x86_64/docker-$version.zip" Invoke-WebRequest $url -OutFile "docker.zip" Try { Add-Type -AssemblyName System.IO.Compression.FileSystem $zip = [System.IO.Compression.ZipFile]::OpenRead("$PWD\docker.zip") Try { if (-not ($entry = $zip.Entries | Where-Object { $_.Name -eq "docker.exe" })) { Throw "Cannot find docker.exe in $url" } [System.IO.Compression.ZipFileExtensions]::ExtractToFile($entry, "$PWD\bundles\docker.exe", $true) } Finally { $zip.Dispose() } } Finally { Remove-Item -Force "docker.zip" } } } # Run unit tests if ($TestUnit) { Run-UnitTests } # Run integration tests if ($TestIntegration) { Run-IntegrationTests } # Run integration-cli tests if ($TestIntegrationCli) { Run-IntegrationCliTests } # Gratuitous ASCII art. if ($Daemon -or $Client) { Write-Host Write-Host -ForegroundColor Green " ________ ____ __." Write-Host -ForegroundColor Green " \_____ \ `| `|/ _`|" Write-Host -ForegroundColor Green " / `| \`| `<" Write-Host -ForegroundColor Green " / `| \ `| \" Write-Host -ForegroundColor Green " \_______ /____`|__ \" Write-Host -ForegroundColor Green " \/ \/" Write-Host } } Catch [Exception] { Write-Host -ForegroundColor Red ("`nERROR: make.ps1 failed:`n$_") Write-Host -ForegroundColor Red ($_.InvocationInfo.PositionMessage) # More gratuitous ASCII art. Write-Host Write-Host -ForegroundColor Red "___________ .__.__ .___" Write-Host -ForegroundColor Red "\_ _____/____ `|__`| `| ____ __`| _/" Write-Host -ForegroundColor Red " `| __) \__ \ `| `| `| _/ __ \ / __ `| " Write-Host -ForegroundColor Red " `| \ / __ \`| `| `|_\ ___// /_/ `| " Write-Host -ForegroundColor Red " \___ / (____ /__`|____/\___ `>____ `| " Write-Host -ForegroundColor Red " \/ \/ \/ \/ " Write-Host exit 1 } Finally { Pop-Location # As we pushed to the root of the repo as the very first thing if ($global:pushed) { Pop-Location } Write-Host -ForegroundColor Cyan "INFO: make.ps1 ended at $(Get-Date)" }
combined_dataset/train/non-malicious/sample_18_30.ps1
sample_18_30.ps1
# # Module manifest for module 'OCI.PSModules.Dataintegration' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Dataintegration.dll' # Version number of this module. ModuleVersion = '75.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '769e2e00-1fe3-46af-a9e9-c24a01403239' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Dataintegration Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dataintegration.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIDataintegrationApplication', 'Get-OCIDataintegrationApplicationDetailedDescription', 'Get-OCIDataintegrationApplicationsList', 'Get-OCIDataintegrationCompositeState', 'Get-OCIDataintegrationConnection', 'Get-OCIDataintegrationConnectionsList', 'Get-OCIDataintegrationConnectionValidation', 'Get-OCIDataintegrationConnectionValidationsList', 'Get-OCIDataintegrationCopyObjectRequest', 'Get-OCIDataintegrationCopyObjectRequestsList', 'Get-OCIDataintegrationCountStatistic', 'Get-OCIDataintegrationDataAsset', 'Get-OCIDataintegrationDataAssetsList', 'Get-OCIDataintegrationDataEntitiesList', 'Get-OCIDataintegrationDataEntity', 'Get-OCIDataintegrationDataFlow', 'Get-OCIDataintegrationDataFlowsList', 'Get-OCIDataintegrationDataFlowValidation', 'Get-OCIDataintegrationDataFlowValidationsList', 'Get-OCIDataintegrationDependentObject', 'Get-OCIDataintegrationDependentObjectsList', 'Get-OCIDataintegrationDisApplication', 'Get-OCIDataintegrationDisApplicationDetailedDescription', 'Get-OCIDataintegrationDisApplicationsList', 'Get-OCIDataintegrationDisApplicationTaskRunLineagesList', 'Get-OCIDataintegrationExportRequest', 'Get-OCIDataintegrationExportRequestsList', 'Get-OCIDataintegrationExternalPublication', 'Get-OCIDataintegrationExternalPublicationsList', 'Get-OCIDataintegrationExternalPublicationValidation', 'Get-OCIDataintegrationExternalPublicationValidationsList', 'Get-OCIDataintegrationFolder', 'Get-OCIDataintegrationFoldersList', 'Get-OCIDataintegrationFunctionLibrariesList', 'Get-OCIDataintegrationFunctionLibrary', 'Get-OCIDataintegrationImportRequest', 'Get-OCIDataintegrationImportRequestsList', 'Get-OCIDataintegrationPatch', 'Get-OCIDataintegrationPatchChangesList', 'Get-OCIDataintegrationPatchesList', 'Get-OCIDataintegrationPipeline', 'Get-OCIDataintegrationPipelinesList', 'Get-OCIDataintegrationPipelineValidation', 'Get-OCIDataintegrationPipelineValidationsList', 'Get-OCIDataintegrationProject', 'Get-OCIDataintegrationProjectsList', 'Get-OCIDataintegrationPublishedObject', 'Get-OCIDataintegrationPublishedObjectsList', 'Get-OCIDataintegrationReference', 'Get-OCIDataintegrationReferencesList', 'Get-OCIDataintegrationRuntimeOperator', 'Get-OCIDataintegrationRuntimeOperatorsList', 'Get-OCIDataintegrationRuntimePipeline', 'Get-OCIDataintegrationRuntimePipelinesList', 'Get-OCIDataintegrationSchedule', 'Get-OCIDataintegrationSchedulesList', 'Get-OCIDataintegrationSchema', 'Get-OCIDataintegrationSchemasList', 'Get-OCIDataintegrationTask', 'Get-OCIDataintegrationTaskRun', 'Get-OCIDataintegrationTaskRunLineagesList', 'Get-OCIDataintegrationTaskRunLogsList', 'Get-OCIDataintegrationTaskRunsList', 'Get-OCIDataintegrationTaskSchedule', 'Get-OCIDataintegrationTaskSchedulesList', 'Get-OCIDataintegrationTasksList', 'Get-OCIDataintegrationTaskValidation', 'Get-OCIDataintegrationTaskValidationsList', 'Get-OCIDataintegrationTemplate', 'Get-OCIDataintegrationTemplatesList', 'Get-OCIDataintegrationUserDefinedFunction', 'Get-OCIDataintegrationUserDefinedFunctionsList', 'Get-OCIDataintegrationUserDefinedFunctionValidation', 'Get-OCIDataintegrationUserDefinedFunctionValidationsList', 'Get-OCIDataintegrationWorkRequest', 'Get-OCIDataintegrationWorkRequestErrorsList', 'Get-OCIDataintegrationWorkRequestLogsList', 'Get-OCIDataintegrationWorkRequestsList', 'Get-OCIDataintegrationWorkspace', 'Get-OCIDataintegrationWorkspacesList', 'Move-OCIDataintegrationCompartment', 'Move-OCIDataintegrationDisApplicationCompartment', 'New-OCIDataintegrationApplication', 'New-OCIDataintegrationApplicationDetailedDescription', 'New-OCIDataintegrationConnection', 'New-OCIDataintegrationConnectionValidation', 'New-OCIDataintegrationCopyObjectRequest', 'New-OCIDataintegrationDataAsset', 'New-OCIDataintegrationDataFlow', 'New-OCIDataintegrationDataFlowValidation', 'New-OCIDataintegrationDisApplication', 'New-OCIDataintegrationDisApplicationDetailedDescription', 'New-OCIDataintegrationEntityShape', 'New-OCIDataintegrationExportRequest', 'New-OCIDataintegrationExternalPublication', 'New-OCIDataintegrationExternalPublicationValidation', 'New-OCIDataintegrationFolder', 'New-OCIDataintegrationFunctionLibrary', 'New-OCIDataintegrationImportRequest', 'New-OCIDataintegrationPatch', 'New-OCIDataintegrationPipeline', 'New-OCIDataintegrationPipelineValidation', 'New-OCIDataintegrationProject', 'New-OCIDataintegrationSchedule', 'New-OCIDataintegrationTask', 'New-OCIDataintegrationTaskRun', 'New-OCIDataintegrationTaskSchedule', 'New-OCIDataintegrationTaskValidation', 'New-OCIDataintegrationUserDefinedFunction', 'New-OCIDataintegrationUserDefinedFunctionValidation', 'New-OCIDataintegrationWorkspace', 'Remove-OCIDataintegrationApplication', 'Remove-OCIDataintegrationApplicationDetailedDescription', 'Remove-OCIDataintegrationConnection', 'Remove-OCIDataintegrationConnectionValidation', 'Remove-OCIDataintegrationCopyObjectRequest', 'Remove-OCIDataintegrationDataAsset', 'Remove-OCIDataintegrationDataFlow', 'Remove-OCIDataintegrationDataFlowValidation', 'Remove-OCIDataintegrationDisApplication', 'Remove-OCIDataintegrationDisApplicationDetailedDescription', 'Remove-OCIDataintegrationExportRequest', 'Remove-OCIDataintegrationExternalPublication', 'Remove-OCIDataintegrationExternalPublicationValidation', 'Remove-OCIDataintegrationFolder', 'Remove-OCIDataintegrationFunctionLibrary', 'Remove-OCIDataintegrationImportRequest', 'Remove-OCIDataintegrationPatch', 'Remove-OCIDataintegrationPipeline', 'Remove-OCIDataintegrationPipelineValidation', 'Remove-OCIDataintegrationProject', 'Remove-OCIDataintegrationSchedule', 'Remove-OCIDataintegrationTask', 'Remove-OCIDataintegrationTaskRun', 'Remove-OCIDataintegrationTaskSchedule', 'Remove-OCIDataintegrationTaskValidation', 'Remove-OCIDataintegrationUserDefinedFunction', 'Remove-OCIDataintegrationUserDefinedFunctionValidation', 'Remove-OCIDataintegrationWorkspace', 'Start-OCIDataintegrationWorkspace', 'Stop-OCIDataintegrationWorkspace', 'Update-OCIDataintegrationApplication', 'Update-OCIDataintegrationApplicationDetailedDescription', 'Update-OCIDataintegrationConnection', 'Update-OCIDataintegrationCopyObjectRequest', 'Update-OCIDataintegrationDataAsset', 'Update-OCIDataintegrationDataFlow', 'Update-OCIDataintegrationDisApplication', 'Update-OCIDataintegrationDisApplicationDetailedDescription', 'Update-OCIDataintegrationExportRequest', 'Update-OCIDataintegrationExternalPublication', 'Update-OCIDataintegrationFolder', 'Update-OCIDataintegrationFunctionLibrary', 'Update-OCIDataintegrationImportRequest', 'Update-OCIDataintegrationPipeline', 'Update-OCIDataintegrationProject', 'Update-OCIDataintegrationReference', 'Update-OCIDataintegrationSchedule', 'Update-OCIDataintegrationTask', 'Update-OCIDataintegrationTaskRun', 'Update-OCIDataintegrationTaskSchedule', 'Update-OCIDataintegrationUserDefinedFunction', 'Update-OCIDataintegrationWorkspace' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dataintegration' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_37_92.ps1
sample_37_92.ps1
@{ GUID="c61d6278-02a3-4618-ae37-a524d40a7f44 " Author="PowerShell" CompanyName="Microsoft Corporation" Copyright="Copyright (c) Microsoft Corporation." ModuleVersion="7.0.0.0" CompatiblePSEditions = @("Core") PowerShellVersion="3.0" ModuleToProcess="PSDiagnostics.psm1" FunctionsToExport="Disable-PSTrace","Disable-PSWSManCombinedTrace","Disable-WSManTrace","Enable-PSTrace","Enable-PSWSManCombinedTrace","Enable-WSManTrace","Get-LogProperties","Set-LogProperties","Start-Trace","Stop-Trace" CmdletsToExport = @() AliasesToExport = @() HelpInfoUri="https://aka.ms/powershell72-help" } # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD/dfsIexbywzf4 # vgDANLKxbLCeK+0wW4ZnFQP22V0sXqCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKE9 # EH5+riBUJ+gxlnEM8N+P+B8xa5xGG7rt2EJalaGkMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAguHGTiAuU2YXy7A+F5bBr/5KLiA/4RswnkA3 # Mg0YDdaxk6UIS7QWUVGwBKYf/VVlIdVAIsqkkSnj/ewKebttSvR4xbndqoWGyGHy # A9cS6l/X/8GqHxd7EkhF4MgRgA51DFHuM4D1Y8cNbyz+YtQ0MSoOJnQ7WSiYCAYv # hBpHifdtknlDiZs8Db11rT+ie/iMCTnxhZ2i0XoikWBYuUepn6BoYcfJ4vreAg7t # 7VoIMHclRo0WAQT5tG17lJZ6iBlsguytERZPVQ2z9r+j4QJUEoHU9YcFpVcodJrR # Z9dMZyA3RJmdfaRA59bygEXYZSqbVHCavlzNUO/n1fuAY4f/L6GCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBbIOdbh9/HEBmk988TLwooEuXa9MbcEyv6 # gY8Pf6OxfQIGZh+2TAHnGBMyMDI0MDQyMzAyMjQxMS4xOTFaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHenkie # lp8oRD0AAQAAAd4wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjoyQUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB # 9ByF9UIDhA6xFrOniw/xsDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SU # IBkVQS0Ml6kR+TagkUPbaEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWo # KySY8/ROIKdpphgI7OJb4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3yn # vwrS8/bcorANO6DjuysyS9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2 # RC4odQcEPnY12jypYPnS6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9 # OmGo0S94Bxg3N/3aE6fUbnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdS # qf85FklCXIIkg4sm7nM9TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1 # G7nUD1pteuXvQp8fE1KpTjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++ # 5Hyg/L68pe+DrZoZPXJaGU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhy # k/EebwuXVJY+rTyfbRfuh9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlK # IX5d3aQLo9fDda1ZTOw+XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUazAmbxseaapgdxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBAOKUwHsXDacGOvUIgs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSu # y+GsxiVHzkhMW+FqK8gruLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1X # EUsXYOSJUPitY7E8bbldmmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDi # D28gAVGrPA3NykiSChvdqS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+S # QmI9VIayYsIGRjvelmNa0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMY # huWfWRSHZCKyIANA0aJL4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx7 # 8GqBKfylp25aOWJ/qPhC+DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41Fjg # Bg4m3OTFDGot5DSuVkQgjku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6r # rZM/PCwRG6girYmnTRLLsicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg # 82/FMqCk9wK3LvyLAyDHN+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqH # doNwQYROVm+ZX10RX3n6bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjoyQUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy # 22CJZExE2vOggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOnRdFswIhgPMjAyNDA0MjMwNzQyMTlaGA8yMDI0MDQy # NDA3NDIxOVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6dF0WwIBADAHAgEAAgIP # 1DAHAgEAAgISDjAKAgUA6dLF2wIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # AEJvaXp7B6ROIyclfeGn07zKDXR6j3SVyMoghjl4uaUoj81WJxX0deLVeJPyURtm # jt81hVk2KWSjB0VOr021zUyWvsyxdVhVb7tPPKXiwtIRNqgzBqarwwym7mrG+Pbm # bV7A1+HUEMMjKI5J/owUuFsNsJZTIa0ZOsOsKcJDwA+AMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0AAQAA # Ad4wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQgDMORgMca/n0sQwOZPRCszvcU2CLOhhaJPh/7IJJm # gzAwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCOPiOfDcFeEBBJAn/mC3Mg # rT5w/U2z81LYD44Hc34dezCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB3p5InpafKEQ9AAEAAAHeMCIEIA5fJ/+nEdtN6jKLrCIbid59 # sN9SleZy9MT3WBZD8wBAMA0GCSqGSIb3DQEBCwUABIICAG/FN/QtZj6kR/f807V9 # EE9ZOv0jhKH95d/wjwX/+LzVL9DB7ePZcSjOFIgslJDL22zXlZXpBxQKFy2R6Z6w # iaxmQjDN6UfjxdM9x7W0cX9wZwACQdxnkQrM/Oq/9Req4LW5zlF8okHJGRjKTvea # FmvT1uajSh9Q96VdU7KxX934gGFHicXir9lNw8empy2i5f7DCd5gVR8tfNH3NV0G # nV6Zw1k1Mffh2dVqp0h++aGBq878x41TR0KQiJF2BJE4z+532kWho969UPzLo6NM # QlQlUyGFAy0AjTqfhdIZZCzURwce9SfNMfauj8IRMot4qojodALKW4GnJBwE4NU9 # c4fj5dpGJYrvV+4xt9K5jPve6nBkdd7qQ6OtVq4THCpT1ahBECJUPrj7Yb+T0Xf+ # 9Wvf8PgFPmLYZW+b6EcKgRyPAKEHFz5SuKVcHdk5S/Ydz6joOKxt/g7e2yBPQA8x # kdazpoPYII3RnXG4Qq4CLXTVWt5XNt0ULNkDUhr0Y8qn2URBroswgFVYZTPn8K03 # iBq1imTIYlx3xIroKc0xFB2AljuyueuUtdYFcqS/9Wrs3/OYqhLOk9nqjk96JZx7 # yfNyr0LzBf9KVUdT2XhJLfY9oSvZSmKVEE/8AreLIt1518j0nc9fa32sMaBeXwPg # /vT4YgAR/G/97rSY2v24e370 # SIG # End signature block
combined_dataset/train/non-malicious/VMtoolsUpgrade.ps1
VMtoolsUpgrade.ps1
##################################################################### # # Purpose: "Check and upgrade Tools during power cycling" # Author: David Chung # Support: IT Infrastructure # Docs: N/A # # Instruction: 1. Create CSV file with list of servers # 2. Execute script from PowerCLI # 3. Enter virtual server name # ##################################################################### $viserver = read-host "Please enter vCenter Server:" connect-viserver $viserver $vms = Import-Csv c:\\server.csv foreach ($vm.name in $vms) { Write-Host $vm.name " - Enabling VMTools Update at Power Cycle" $vmConfig = New-Object VMware.Vim.VirtualMachineConfigSpec $vmConfig.Tools = New-Object VMware.Vim.ToolsConfigInfo $vmConfig.Tools.ToolsUpgradePolicy = "UpgradeAtPowerCycle" Get-VM $vm.name | where {$_.Extensiondata.ReconfigVM($vmconfig)} }
combined_dataset/train/non-malicious/sample_35_69.ps1
sample_35_69.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Create an in-memory object for LogicAppReceiver. .Description Create an in-memory object for LogicAppReceiver. .Outputs Microsoft.Azure.PowerShell.Cmdlets.Monitor.ActionGroup.Models.LogicAppReceiver .Link https://learn.microsoft.com/powershell/module/Az.Monitor/new-azactiongrouplogicappreceiverobject #> function New-AzActionGroupLogicAppReceiverObject { [OutputType('Microsoft.Azure.PowerShell.Cmdlets.Monitor.ActionGroup.Models.LogicAppReceiver')] [CmdletBinding(PositionalBinding=$false)] Param( [Parameter(Mandatory, HelpMessage="The callback url where http request sent to.")] [string] $CallbackUrl, [Parameter(Mandatory, HelpMessage="The name of the logic app receiver. Names must be unique across all receivers within an action group.")] [string] $Name, [Parameter(Mandatory, HelpMessage="The azure resource id of the logic app receiver.")] [string] $ResourceId, [Parameter(HelpMessage="Indicates whether to use common alert schema.")] [bool] $UseCommonAlertSchema ) process { $Object = [Microsoft.Azure.PowerShell.Cmdlets.Monitor.ActionGroup.Models.LogicAppReceiver]::New() if ($PSBoundParameters.ContainsKey('CallbackUrl')) { $Object.CallbackUrl = $CallbackUrl } if ($PSBoundParameters.ContainsKey('Name')) { $Object.Name = $Name } if ($PSBoundParameters.ContainsKey('ResourceId')) { $Object.ResourceId = $ResourceId } if ($PSBoundParameters.ContainsKey('UseCommonAlertSchema')) { $Object.UseCommonAlertSchema = $UseCommonAlertSchema } return $Object } } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDYmAAHcyflP2Ak # sM8Wg2Ehqg3lQiIFZHzpEZ1QZ8qQhqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGYfKBmi+Y3gy0ZceCg4eea2 # r4JGho2SQPpcUKwW6xohMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAWKg4skcaMzYNl7Ruz8hUgM7QvE8jAxV/iiuhAHYt8iicqqi1PbaQkAn/ # tLDaKWaVtLOlE9g5ziLi9LvS3dLc1X2DhPciDYiz2lOh0vsne80aH71IBda+LBxX # CnqfZytGArvPu10URaOyum8VlwuDVsluSqgDt1JJ1I63dqGZrXrlL1zSLRYjoTtC # Z+f771uUUVkdGYt/tovYxIeJCJib9wkAPG/e1hmVhW4UI3Z9k0ND9tgs4s/KZVdy # Mc5JrYBlL0xObi7Z4hyTPNypsmp+XH+IKDdz7VePLodUUwrwP1hCkBw3fIPaESJT # KWQq7eTbBSQGDPAid9JVhd+15zDNJ6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBK6zHid51fAjWG7lSTYfYoB+J2RTkv3PIZrZ/ycZkUNwIGZjLBLzPO # GBMyMDI0MDUxNjA2NDIxNC40NjdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfGzRfUn6MAW1gABAAAB8TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NTVaFw0yNTAzMDUxODQ1NTVaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCxulCZttIf8X97rW9/J+Q4Vg9PiugB1ya1/DRxxLW2 # hwy4QgtU3j5fV75ZKa6XTTQhW5ClkGl6gp1nd5VBsx4Jb+oU4PsMA2foe8gP9bQN # PVxIHMJu6TYcrrn39Hddet2xkdqUhzzySXaPFqFMk2VifEfj+HR6JheNs2LLzm8F # DJm+pBddPDLag/R+APIWHyftq9itwM0WP5Z0dfQyI4WlVeUS+votsPbWm+RKsH4F # QNhzb0t/D4iutcfCK3/LK+xLmS6dmAh7AMKuEUl8i2kdWBDRcc+JWa21SCefx5SP # hJEFgYhdGPAop3G1l8T33cqrbLtcFJqww4TQiYiCkdysCcnIF0ZqSNAHcfI9SAv3 # gfkyxqQNJJ3sTsg5GPRF95mqgbfQbkFnU17iYbRIPJqwgSLhyB833ZDgmzxbKmJm # dDabbzS0yGhngHa6+gwVaOUqcHf9w6kwxMo+OqG3QZIcwd5wHECs5rAJZ6PIyFM7 # Ad2hRUFHRTi353I7V4xEgYGuZb6qFx6Pf44i7AjXbptUolDcVzYEdgLQSWiuFajS # 6Xg3k7Cy8TiM5HPUK9LZInloTxuULSxJmJ7nTjUjOj5xwRmC7x2S/mxql8nvHSCN # 1OED2/wECOot6MEe9bL3nzoKwO8TNlEStq5scd25GA0gMQO+qNXV/xTDOBTJ8zBc # GQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLy2xe59sCE0SjycqE5Erb4YrS1gMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDhSEjSBFSCbJyl3U/QmFMW2eLPBknnlsfI # D/7gTMvANEnhq08I9HHbbqiwqDEHSvARvKtL7j0znICYBbMrVSmvgDxU8jAGqMyi # LoM80788So3+T6IZV//UZRJqBl4oM3bCIQgFGo0VTeQ6RzYL+t1zCUXmmpPmM4xc # ScVFATXj5Tx7By4ShWUC7Vhm7picDiU5igGjuivRhxPvbpflbh/bsiE5tx5cuOJE # JSG+uWcqByR7TC4cGvuavHSjk1iRXT/QjaOEeJoOnfesbOdvJrJdbm+leYLRI67N # 3cd8B/suU21tRdgwOnTk2hOuZKs/kLwaX6NsAbUy9pKsDmTyoWnGmyTWBPiTb2rp # 5ogo8Y8hMU1YQs7rHR5hqilEq88jF+9H8Kccb/1ismJTGnBnRMv68Ud2l5LFhOZ4 # nRtl4lHri+N1L8EBg7aE8EvPe8Ca9gz8sh2F4COTYd1PHce1ugLvvWW1+aOSpd8N # nwEid4zgD79ZQxisJqyO4lMWMzAgEeFhUm40FshtzXudAsX5LoCil4rLbHfwYtGO # pw9DVX3jXAV90tG9iRbcqjtt3vhW9T+L3fAZlMeraWfh7eUmPltMU8lEQOMelo/1 # ehkIGO7YZOHxUqeKpmF9QaW8LXTT090AHZ4k6g+tdpZFfCMotyG+E4XqN6ZWtKEB # QiE3xL27BDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQD7 # n7Bk4gsM2tbU/i+M3BtRnLj096CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e+z1TAiGA8yMDI0MDUxNTIyMjEw # OVoYDzIwMjQwNTE2MjIyMTA5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp77PV # AgEAMAoCAQACAh7AAgH/MAcCAQACAhPGMAoCBQDp8QVVAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBABqo8eDklp7xyj/J1KHqvohAT+xcQr7bazGDtKl9n8WO # tiREz4ym2gXdI+q9HOX2GTdPfhozzW/5ltP/s57ozGCb5wJgSyjaXlNkcz1IDWFX # /fDNxkNB1RHhcVZIW1CzbIsqJSOPgZgF1XOZsXDDqEDHsTF2Nzeq43CXEU5tEmHW # gVGsqnaJgBIeF6T0ddxH82RNCi3JYZNFkjTklFVc52/KrCeP/gh3tEz1fEprvwQs # zcpL/wBWz9uMoosCZ6cpxiD1gz0QtAXhAEfoehTFUtH5SYoGf+2Lff3yA+f+TLCU # YX2jzcOmlHw1i+2IkchTDotbhEmUvRQsIyHhF4HS7sYxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfGzRfUn6MAW1gABAAAB # 8TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCD922d2A6VU3pHAydXuL1awoz+IHYmwI8GVAmgRhi+T # yTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINV3/T5hS7ijwao466RosB7w # wEibt0a1P5EqIwEj9hF4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHxs0X1J+jAFtYAAQAAAfEwIgQgsWLIpvK+iLqUI4xKW7vuW7TE # 1NRQThTsMKE0ok33WUwwDQYJKoZIhvcNAQELBQAEggIAMpZFpxafQ3eoCHsm6NCV # MMhBnE5eqyyMHO05w4O4WYKNV8aDmc0aae7OHh0wPWQw8EOPQC7y1tMHAwogpD6J # ifaOSgu6UE++8HU0VR/j1ryJV54Gzh/1qCSvmvxvbpsGcWj/huIXUHREYAzKlfYk # dimJ4YjDCSZmeRchHtg197HD5+L4Yp4KIzu27oOklzg+xT/MgpGI1JXelzUmNjj1 # nfrMIDSPGUN2JYy/yi1gbEa3Fpya2jMXuDHabKMYwH+IyrsE+8ObGkazD4snzF7y # uB1ebIwISRfedO70UQdbLPxNi34f23SqwuAUaR6FTWv7SqUsxmteErO0uRTuBTRF # rj4aAMX6GBB8a04C4xL9u++isZpdbl6wXe469XcaUWQ37i8xJHAv4RQokNSRftcx # 5dhcMnqv4IpEy013VMai1vXAoMp0K/r1PsMe+ugz+4SRoJ5Q5KFFifCxRWet7CEF # KtEHUvjejo4bpMUC2OsWWPbaqnKH448nJKcoKGHNzwk6PnSS6K1cSShqMAZ6N8iX # +KxnV1dXtXgDD7uAWoJ7UFJMeX3DqpkQFF2MWgVeOpJ5Nx/mnHTXdRc3Cjo92Ouu # LOfCLnP2ktq78ubzbPp9rpkiU5JgK3WvAbsfsrFf2YHHiyqcYtp7MXgZKRkXPdyY # IKBu/3bokGWCyVtlZjqD45I= # SIG # End signature block
combined_dataset/train/non-malicious/1972.ps1
1972.ps1
Describe "Remove-PSBreakpoint" -Tags "CI" { $testScript = Join-Path -Path (Join-Path -Path $PSScriptRoot -ChildPath assets) -ChildPath psbreakpointtestscript.ps1 $script = "`$var = 1 `$var2 = Get-Command Get-Date " $script > $testScript BeforeEach { $line = Set-PSBreakpoint -Line 1,2,3 -Script $testScript $command = Set-PSBreakpoint -Command "Get-Date" -Script $testScript $variable = Set-PSBreakpoint -Variable var2 -Script $testScript } Context "Basic Removal Methods Tests" { It "Should be able to remove a breakpoint by breakpoint Id" { $NumberOfBreakpoints = $(Get-PSBreakpoint).Id.length $BreakID = $(Get-PSBreakpoint).Id[0] Remove-PSBreakpoint -Id $BreakID $(Get-PSBreakpoint).Id.length | Should -Be ($NumberOfBreakpoints -1) } It "Should be able to remove a breakpoint by variable" { $NumberOfBreakpoints = $(Get-PSBreakpoint).Id.length Remove-PSBreakpoint -Breakpoint $variable $(Get-PSBreakpoint).Id.length | Should -Be ($NumberOfBreakpoints -1) } It "Should be able to remove a breakpoint by command" { $NumberOfBreakpoints = $(Get-PSBreakpoint).Id.length Remove-PSBreakpoint -Breakpoint $command $(Get-PSBreakpoint).Id.length | Should -Be ($NumberOfBreakpoints -1) } It "Should be able to pipe breakpoint objects to Remove-PSBreakpoint" { $NumberOfBreakpoints = $(Get-PSBreakpoint).Id.length $variable | Remove-PSBreakpoint $(Get-PSBreakpoint).Id.length | Should -Be ($NumberOfBreakpoints -1) } } It "Should Remove all breakpoints" { $(Get-PSBreakpoint).Id.Length | Should -Not -BeNullOrEmpty Get-PSBreakpoint | Remove-PSBreakpoint $(Get-PSBreakpoint).Id.Length | Should -Be 0 } Remove-Item $testScript }
combined_dataset/train/non-malicious/2695.ps1
2695.ps1
function Get-CSDisassembly { [OutputType([Capstone.Instruction])] [CmdletBinding(DefaultParameterSetName = 'Disassemble')] Param ( [Parameter(Mandatory, ParameterSetName = 'Disassemble')] [Capstone.Architecture] $Architecture, [Parameter(Mandatory, ParameterSetName = 'Disassemble')] [Capstone.Mode] $Mode, [Parameter(Mandatory, ParameterSetName = 'Disassemble')] [ValidateNotNullOrEmpty()] [Byte[]] $Code, [Parameter( ParameterSetName = 'Disassemble' )] [UInt64] $Offset = 0, [Parameter( ParameterSetName = 'Disassemble' )] [UInt32] $Count = 0, [Parameter( ParameterSetName = 'Disassemble' )] [ValidateSet('Intel', 'ATT')] [String] $Syntax, [Parameter( ParameterSetName = 'Disassemble' )] [Switch] $DetailOn, [Parameter( ParameterSetName = 'Version' )] [Switch] $Version ) if ($PsCmdlet.ParameterSetName -eq 'Version') { $Disassembly = New-Object Capstone.Capstone([Capstone.Architecture]::X86, [Capstone.Mode]::Mode16) $Disassembly.Version return } $Disassembly = New-Object Capstone.Capstone($Architecture, $Mode) if ($Disassembly.Version -ne [Capstone.Capstone]::BindingVersion) { Write-Error "capstone.dll version ($([Capstone.Capstone]::BindingVersion.ToString())) should be the same as libcapstone.dll version. Otherwise, undefined behavior is likely." } if ($Syntax) { switch ($Syntax) { 'Intel' { $SyntaxMode = [Capstone.OptionValue]::SyntaxIntel } 'ATT' { $SyntaxMode = [Capstone.OptionValue]::SyntaxATT } } $Disassembly.SetSyntax($SyntaxMode) } if ($DetailOn) { $Disassembly.SetDetail($True) } $Disassembly.Disassemble($Code, $Offset, $Count) }
combined_dataset/train/non-malicious/sample_61_32.ps1
sample_61_32.ps1
#!/usr/bin/env pwsh $basedir=Split-Path $MyInvocation.MyCommand.Definition -Parent $exe="" if ($PSVersionTable.PSVersion -lt "6.0" -or $IsWindows) { # Fix case when both the Windows and Linux builds of Node # are installed in the same directory $exe=".exe" } $ret=0 if (Test-Path "$basedir/node$exe") { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "$basedir/node$exe" "$basedir/../which/bin/node-which" $args } else { & "$basedir/node$exe" "$basedir/../which/bin/node-which" $args } $ret=$LASTEXITCODE } else { # Support pipeline input if ($MyInvocation.ExpectingInput) { $input | & "node$exe" "$basedir/../which/bin/node-which" $args } else { & "node$exe" "$basedir/../which/bin/node-which" $args } $ret=$LASTEXITCODE } exit $ret # SIG # Begin signature block # MIIn4wYJKoZIhvcNAQcCoIIn1DCCJ9ACAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCzqHfUg4ZKfSAa # +XY4bhX2rGcRZxKbLBQphr5PAF2xQqCCDZowggYYMIIEAKADAgECAhMzAAADgxRi # cQvfm6Y9AAAAAAODMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMwNzEzMjM0NTM2WhcNMjQwOTE1MjM0NTM2WjCBiDEL # MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v # bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWlj # cm9zb2Z0IDNyZCBQYXJ0eSBBcHBsaWNhdGlvbiBDb21wb25lbnQwggEiMA0GCSqG # SIb3DQEBAQUAA4IBDwAwggEKAoIBAQCVnpFfGLqyxBtSgu7CxSDwvPHlzZQHSRzp # ojCo8uAVAAd3wW6OzZ47snNdXEDXKLOpapzL/s5DQHK3M+gzT8OizgwIK3xWh+bj # UnuqgmUjW9G3dEfT6fV50WkqL5ds50OqpkE+PH98EsVrgcvlQPe7xp0U6bP9i4KA # ey/yrmjLOC2If1xFqZxQQGV1h5vWPOiCJKS2oZ447psFUKrRjak4JIQ6kCpEdla5 # GhmsGdH0PFv7nh+oW4z05odAC3Tbk88CnDgbbJZJ6uyz1MQ5Untgn0XdCeQEbBsc # ipETD7NRC10Qj2QBqLo2IPxT21L/dC59nPsMjY+fDemfBA4pFQ6TAgMBAAGjggGC # MIIBfjAfBgNVHSUEGDAWBgorBgEEAYI3TBEBBggrBgEFBQcDAzAdBgNVHQ4EFgQU # tuoiUpjIEWGVH5RshyUbdVvfXHQwVAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1p # Y3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMx # NTIyKzUwMTE1NzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNV # HR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2Ny # bC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUw # UzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # ZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQC # MAAwDQYJKoZIhvcNAQELBQADggIBAIm7jWfeie51+VZ/l2C5mKnOQdnQmUAONVh7 # vziYlflUmase8NtFuuFPMphtwtubH6tZMRlGHDmPDtA4vX6M0Iw4BjoHSg/skFoK # EeIAHlOmyE0RB43mTuNOvdwa0JSPWO5e6e1D0Byinam4vrK7GKaL41HcYwBi5b8N # vGlAz5t6v41QQYf8e5CvX1/51uQIb4G0WhVeX6iMVss0MciV62eKhyGPUXlGld0x # clJZV4koo1sG4ZruWf5PVelQxQ0b5QQcqZTlbVBb0espboVaxh5B9/og0YtD20V/ # eW+e+6RV0mOWPK+v86ZC+XVpSVKEwjFzWSh4hsySaoHdDYBIqLFfXA6fGHzQVw1G # 1x++WxJ8yFD23wFN9pCU4cBJMHiu7/1sodNCww332I2PkU/0z8YLYtEuIDDbMBxq # SamPwsh3MG7ekT7lldE5pYUgZyCVLfk6gRu3UzTqBBpOb9rY1JTkoGScBolCAJHS # V1eZO3CgVFZtwBfaFTN/0rbFKE2MpmKcke9A9Hc78xTbfIuHPAo9AiTLTz6ELwUl # aBPxcbIA+vUnR/euCP7OTzhIHjbwC73kEJkOusSWTVxan8/cpLfZDZ9VShMYT+++ # /lq+tzX5RB+3WSNjgVMNQvw/Bq1WKVxLvnkYkpWGN0U4YTv4fsjqpSAK2FS8ZMcG # C4xMTj2qMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCB # iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMp # TWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEw # NzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5n # IFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAc # Lq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDI # OdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXp # ZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t # 00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD # 2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVO # VpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWY # OUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0P # UUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF # 78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhf # si+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCV # mj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQB # gjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEE # AYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB # /zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+g # TaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9N # aWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBO # BggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9N # aWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEG # CSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAd # AEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAd # MA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5 # DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzS # Gksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9Msm # AkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXv # biWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ # 2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQamASooPoI/E01mC8Cz # TfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNb # B5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85el # CUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4 # GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFci # oXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMT # DXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIw # MTECEzMAAAODFGJxC9+bpj0AAAAAA4MwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZI # hvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcC # ARUwLwYJKoZIhvcNAQkEMSIEIPiXudg9Ki64tUj9BnQOTYsBZcVOyx+3fun7RbeX # Sw8JMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBho # dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAZuSqJ86n # G2cBq+9rvJeisbaUUH22retulmrC27sRdzn6w/uclAFD90GH+COireA6Ur9ZNzjd # oPMVCrK/G0s25HyAufZVm5+SFw/mP9GkF2kKPKw6uzGinm+R8mvLUjLoVdIA7U8N # LbA9ooqMckvdf9xklJt6e67qRTaJJBDGxupN1KMYPG2SVHk3fMWnV2VuJ1J5T+Pk # eR9YNF+OwSSNIvgHv+6jjk5HB5cDMDz5TsdG6sLlz1GE+j3HYjuYkekFwFjDZfkJ # EMVjilr329dP4oJ2k9ILQ38avTQiWyxd4Y84UMjHSwHh07OXZLiBo/qH9mTQaXzx # uyG79EQBobWciqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEH # AqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCC # AUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCDZYaMd # unGCJ3T930d8ifYlulfXF9ImMnO47dcsmV9EKAIGZk3kfImDGBMyMDI0MDUyNDIx # MjMyMS4xNTRaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRp # b25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjNCRDQtNEI4MC02 # OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCC # BycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJKoZIhvcNAQELBQAw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMxMDEyMTkwNzM1WhcN # MjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 # b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1p # dGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRCODAtNjlDMzElMCMG # A1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcN # AQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9aXai//eNyP5MLWZr # mUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2+UCLGrN1P77n9fq/ # mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800CcD6d/Ndoommkd196 # VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH+Bu7i1h+FDRR8F7W # zUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChDK7klDcCw+/gVoEuS # Ol5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5HIeb8Ta1JfjRUzSv # 3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JDkMFqSRwj1v+mc6LK # Klj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPNx/9zF1dv8yXBdzmW # JPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAAZAWoKbmtYI+Ciz4C # YyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS+cLCeoQ+q0n0IALv # V+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRscv1WwJFAuyyCMQvLd # mPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEifEXlCQgFOXgMh6ow # HwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKg # UIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0 # JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAw # XjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # ZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQw # DAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8E # BAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8GkEJ9oLBuvfjndMyGQ # 9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDiMDBLLWRMTJHWVeUY # 1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQIyPR2PiXQhT5PyerM # gag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyUOzKpyMvqVaubo+Gl # f/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbixYifTwAivPcKNdei # sZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgHEh60KoZyzlBXz3Vx # EirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71RKimZA/KXlWpmBvk # JkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7PqqxqMF2Cn4q2a0mEMn # pBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lyppO22ePjBjnwoEvVxb # DjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIRNF0oaviF+QZcUZLW # zWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjrxh7lnwrxV/fMy0F9 # fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg # VGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC # ggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+ # F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU # 88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqY # O7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzp # cGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0Xn # Rm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1 # zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZN # N3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLR # vWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTY # uVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUX # k8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB # 2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKR # PEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0g # BFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5t # aWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQM # MAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQE # AwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQ # W9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNv # bS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBa # BggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqG # SIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOX # PTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6c # qYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/z # jj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz # /AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyR # gNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdU # bZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo # 3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4K # u+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10Cga # iQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9 # vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGC # AtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9u # cyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRCODAtNjlD # MzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcG # BSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCkfjB8MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg # VGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOn7BbwwIhgPMjAy # NDA1MjQyMDI1MzJaGA8yMDI0MDUyNTIwMjUzMlowdDA6BgorBgEEAYRZCgQBMSww # KjAKAgUA6fsFvAIBADAHAgEAAgIiNjAHAgEAAgISDDAKAgUA6fxXPAIBADA2Bgor # BgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAID # AYagMA0GCSqGSIb3DQEBBQUAA4GBAJEjla0cvlGCDsRpimpPwen8tPwbVo/4xylY # uVoaMS3OJmKFDKeklE5p1DdAUvYWVAbnZNHwTacVmw2GrqS88Aze9qRI/XRRPChK # 6InN2MLEwURRlwd4/jcyndwgPSeTgVYb+NGnvSEcTzK4OIyhkEDAVcYL+AXXjpho # cUHOY7QQMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG # SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgtZNhTUzG2bHs # fsV+H6nk/pHsLs2iYHSX0SL0+o1CLEYwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk # MIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U697TCBmDCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9qwPM9tAujAAEAAAHl # MCIEID/1DtCg6evgnVXgmwCm3XTZm2Z061Au+Dyo/HCrEIRCMA0GCSqGSIb3DQEB # CwUABIICAHw0VduyBkEl6YrZE9DU963+2ZMWkoQGR+HPnDLD3gMgO9yF5S8C7EBo # K7/xvksHwxxgF6GNT5x7LxGkhmeXPGkz3GwD0jdOTqWGqz/EtQUTPUTdFvfUCn94 # R1ieaTe3dLW010Lk1f3tpow1vWIcMGpc6gj689wAibI0t7OJlJKyas038l+Bh5Jf # ikF3DpIIcbO9yfWHImP7lAOIer9RCwgojv0nBN8k1Gi++vc7XWhThUAYtbUmGVZP # N5BpRZb9mIvUi7qOORNtl7mfF8XJDgOzIoG1HVC3snntP5FaRzRyyAq2C2x7bg4J # RR44WhL5YAdS0Ih6KMNY/k/15g/a14+e4IdVFyx0WPFC8NU15N0CZwYcS1/S9z+j # h/qUzJ6yo1k2RT8PaAve/pkByK4peIlVOr5bfichwH/8UDKAeZ/nFO1QazOwEdKx # GIjeZbk+t5halSyeyYpTkKCAneIRr40Owwe933rv8QqyhMNhvFmNuG+1SsBDnw/a # HKJTVki+B3uLJQn3WqCsQkumt9bX/f9wDMQhYKwgduMLXE90EgNzHWo/XsyIPqIE # HC5oXoOLXbln2VyfLd6A2WmJ6TrASkA1+V8gg/PY1YUQqTGGlweNSv/bVSqJGBpb # WVwChEvtX2yOqBW0LvCcwDWtV0IvPOjinjop/jQWhhpTBNsr34sn # SIG # End signature block
combined_dataset/train/non-malicious/sample_55_46.ps1
sample_55_46.ps1
########################################################### # # 'ServiceHelper' module # ########################################################### $ErrorActionPreference = 'Stop' Set-StrictMode -Version Latest $global:GCServiceName = "GCService" $script:GCServiceBinaryName = "gc_service.exe" $script:GCServiceDisplayName = "Guest Configuration Service" $script:GCServiceDescription = "This service monitors desired state of the machine." $global:GCArcServiceName = "GCArcService" $script:GCArcServiceBinaryName = "gc_arc_service.exe" $script:GCArcServiceDisplayName = "Guest Configuration Arc Service" $script:GCArcServiceDescription = "This service monitors desired state of the machine." $global:ExtServiceName = "ExtensionService" $script:ExtServiceBinaryName = "gc_extension_service.exe" $script:ExtDisplayName = "Guest Configuration Extension service" $script:ExtDescription = "The service installs the requested extensions" $script:GCInstallPath = "$PSScriptRoot\..\..\.." $script:GCBinariesFolderName = "GC" $script:MigratedDataFolderName = "MigratedData" $script:GCBinariesPath = Join-Path $script:GCInstallPath $script:GCBinariesFolderName <# .SYNOPSIS Install GC Service. By default it calculates the GC Service Binary Path based on this GC Install Module location. .Example Install-ServiceInternal #> Function Install-ServiceInternal { [CmdletBinding()] Param( [Parameter()] [string] $ServiceType = "GC" ) Write-Verbose -Message "In Install-ServiceInternal" if ($ServiceType -eq "GC" -and (CheckServiceExists($global:GCServiceName))) { Write-Error "GC service already exists, can not install new service" } elseif ($ServiceType -eq "Extension" -and (CheckServiceExists($global:ExtServiceName))) { Write-Error "Extension service already exists, can not install new service" } elseif ($ServiceType -eq "GCArc" -and (CheckServiceExists($global:GCArcServiceName))) { Write-Error "GC Arc service already exists, can not install new service" } else { # Default values for GC Azure Service $serviceName = $global:GCServiceName $serviceBinaryName = $script:GCServiceBinaryName $displayName = $script:GCServiceDisplayName $description = $script:GCServiceDescription if ($ServiceType -eq "Extension") { $serviceName = $global:ExtServiceName $serviceBinaryName = $script:ExtServiceBinaryName $displayName = $script:ExtDisplayName $description = $script:ExtDescription } elseif ($ServiceType -eq "GCArc") { $serviceName = $global:GCArcServiceName $serviceBinaryName = $script:GCArcServiceBinaryName $displayName = $script:GCArcServiceDisplayName $description = $script:GCArcServiceDescription } $serviceBinaryPath = Join-Path $script:GCBinariesPath $serviceBinaryName $absolutePath = [System.IO.Path]::GetFullPath($serviceBinaryPath) Write-Verbose -Message "GC Service binary path : $absolutePath." $serviceApplication = Get-Command -Name $absolutePath -TotalCount 1 if ($serviceApplication.CommandType -ne "Application") { Write-Error "Service binary type is not as expected" } $servicePathWithQuotes = '"{0}"' -f $absolutePath $serviceBinaryPathCommand = $servicePathWithQuotes + " -k netsvcs" New-Service -Name $serviceName -BinaryPathName $serviceBinaryPathCommand -DisplayName $displayName -Description $description -StartupType Automatic $command = "sc.exe config $ServiceName start= delayed-auto" $Output = Invoke-Expression -Command $Command -ErrorAction Stop if ($LASTEXITCODE -ne 0) { Write-Warning "Failed to set $ServiceName to delayed start. More details: $Output" } else { Write-Verbose "Successfully changed $ServiceName service to delayed start" } # For windows 2008 R2 + sp1 start-process with -Wait parameter does not work. Hence sleep for 10 sec instead. $osVersion=[Environment]::OSVersion.Version if (($osVersion.Major -eq 6) -and ($osVersion.Minor -eq 1) -and ($osVersion.Build -le 7601)) { # configure recovery of the service during failure. $configureProcess = Start-Process sc.exe -ArgumentList "failure $serviceName reset= 30 actions= restart/10000/restart/20000/restart/30000" -PassThru Start-Sleep -Seconds 10 } else { # configure recovery of the service during failure. $configureProcess = Start-Process sc.exe -ArgumentList "failure $serviceName reset=30 actions=restart/10000/restart/20000/restart/30000" -PassThru -Wait } if ($null -eq $configureProcess) { Write-Error "Failed to start sc.exe process to configure $serviceName service." } # on 2008R2 ExitCode is not set. if (($configureProcess.ExitCode -ne 0) -and ($null -ne $configureProcess.ExitCode)) { Write-Warning "configuring service recovery options failed with exit-code:- $($configureProcess.ExitCode)" } Write-Verbose -Message "Successfully Installed new $serviceName." } Write-Verbose -Message "Validating $serviceName Properties." # Validate service Properties as returend by Get-Service. $serviceObject = Get-Service -Name $serviceName if ($serviceObject.Status -eq 'Stopped') { Write-Verbose -Message "$serviceName is in Stopped State." } else { Write-Error -Message "$serviceName is in unexpected state: $($serviceObject.Status)" } if ($serviceObject.CanPauseAndContinue -eq $false) { Write-Verbose -Message "$serviceName has correct CanPauseAndContinue State." } else { Write-Error -Message "$serviceName has unexpected CanPauseAndContinue: $($serviceObject.CanPauseAndContinue)" } if ($serviceObject.CanShutdown -eq $false) { Write-Verbose -Message "$serviceName has correct CanShutdown State." } else { Write-Error -Message "$serviceName has unexpected CanShutdown: $($serviceObject.CanShutdown)" } if ($serviceObject.CanStop -eq $false) { Write-Verbose -Message "$serviceName has correct CanStop State." } else { Write-Error -Message "$serviceName has unexpected CanStop: $($serviceObject.CanStop)" } if ($serviceObject.ServiceType -eq "Win32OwnProcess") { Write-Verbose -Message "$serviceName will run as Win32OwnProcess." } else { Write-Error -Message "$serviceName has unexpected ServiceType: $($serviceObject.ServiceType)" } # For windows 2008 R2 + sp1 Get-Service cmdlet does not populate StartType if ($serviceObject.PSObject.Properties['StartType']) { if ($serviceObject.StartType -eq "Automatic") { Write-Verbose -Message "$serviceName will be started Automatically." } else { Write-Warning -Message "$serviceName has unexpected StartType: $($serviceObject.StartType)" } } else { # Configure recovery of the service during failure. We need to look for the value of the start type because the type will be localized based on # the language of the machine. Since we're only looking for one startType: '(DELAYED)' we can just search for that and assume that if we can't # find it then it is configured incorrectly. $ServiceStartType = ([string](sc.exe qc $serviceName | Select-String '(DELAYED)')).Split(' ',[System.StringSplitOptions]::RemoveEmptyEntries)[-1] if ($ServiceStartType -imatch '(DELAYED)') { Write-Verbose -Message "$serviceName will be started Automatically." } else { Write-Warning -Message "$serviceName has unexpected StartType or the StartType cannot be found on the object. StartType: $ServiceStartType" } } # Also validate some service properties from the registry database of scm. $serviceRegistryData = Get-ItemProperty hklm:\SYSTEM\CurrentControlSet\Services\$serviceName if ($serviceRegistryData.ImagePath -eq $serviceBinaryPathCommand) { Write-Verbose -Message "$serviceName Binary is Installed Correctly." } else { Write-Error -Message "$serviceName binary is not Installed correctly: $($serviceRegistryData.ImagePath)" } if ($serviceRegistryData.ObjectName -eq "LocalSystem") { Write-Verbose -Message "$serviceName will run under LocalSystem Account." } else { Write-Error -Message "$serviceName has unexpected AccountType: $($serviceRegistryData.ObjectName)" } if ($ServiceType -eq "GC") { if ($serviceRegistryData.DisplayName -eq $script:GCServiceDisplayName) { Write-Verbose -Message "$serviceName has correct Display Name." } else { Write-Error -Message "$serviceName has unexpected DisplayName: $($serviceRegistryData.DisplayName)" } if ($serviceRegistryData.Description -eq $script:GCServiceDescription) { Write-Verbose -Message "$serviceName has correct Description Data." } else { Write-Error -Message "$serviceName has unexpected Description: $($serviceRegistryData.Description)" } } elseif ($ServiceType -eq "GCArc") { if ($serviceRegistryData.DisplayName -eq $script:GCArcServiceDisplayName) { Write-Verbose -Message "$serviceName has correct Display Name." } else { Write-Error -Message "$serviceName has unexpected DisplayName: $($serviceRegistryData.DisplayName)" } if ($serviceRegistryData.Description -eq $script:GCArcServiceDescription) { Write-Verbose -Message "$serviceName has correct Description Data." } else { Write-Error -Message "$serviceName has unexpected Description: $($serviceRegistryData.Description)" } } elseif ($ServiceType -eq "Extension") { if ($serviceRegistryData.DisplayName -eq $script:ExtDisplayName) { Write-Verbose -Message "$serviceName has correct Display Name." } else { Write-Error -Message "$serviceName has unexpected DisplayName: $($serviceRegistryData.DisplayName)" } if ($serviceRegistryData.Description -eq $script:ExtDescription) { Write-Verbose -Message "$serviceName has correct Description Data." } else { Write-Error -Message "$serviceName has unexpected Description: $($serviceRegistryData.Description)" } } } <# .Synopsis Get Guest Config data path. #> function Get-GuestConfigDataPath { [CmdletBinding()] param () return Join-Path $env:ProgramData 'GuestConfig' } <# .Synopsis Set Acl permissions on given path #> function Set-AclPermissions { [CmdletBinding()] Param ( [Parameter()] [string] $ServiceType, [Parameter()] [string] $Path ) try { Write-Verbose -Message "Attempting to set ACL permissions on the path '$Path' with PowerShell..." if ($ServiceType -eq 'GC') { Write-Verbose -Message "Using Get-Acl" $acl = Get-Acl $Path } else { # Ext deployment fails in azure with "[System.IO.DirectoryInfo] does not contain a method named 'GetAccessControl'" error # So we are calling this only for Hybrid scenarios. Write-Verbose -Message "Using Get-Item GetAccessControl" $acl = (Get-Item $Path).GetAccessControl('Access') } # Removing inherited access rules Write-Verbose -Message "Clearing existing ACL permissions" $acl.SetAccessRuleProtection($True, $False) # Adding new access rules for the target directory Write-Verbose -Message "Setting ACL permissions for the built-in Administrator" $BuiltinAdminSID = New-Object System.Security.Principal.SecurityIdentifier 'S-1-5-32-544' #Built-in Administrators SID $rule = New-Object System.Security.AccessControl.FileSystemAccessRule($BuiltinAdminSID, 'FullControl', 'ContainerInherit, ObjectInherit', 'None', 'Allow') $acl.AddAccessRule($rule) Set-Acl $Path $acl Write-Verbose -Message "Setting ACL permissions for the Local System" $BuiltinLocalSystemSID = New-Object System.Security.Principal.SecurityIdentifier 'S-1-5-18' #Local System SID $rule = New-Object System.Security.AccessControl.FileSystemAccessRule($BuiltinLocalSystemSID, 'FullControl', 'ContainerInherit, ObjectInherit', 'None', 'Allow') $acl.AddAccessRule($rule) Set-Acl $Path $acl Write-Verbose -Message "Suceeded setting ACL permissions with PowerShell" } catch { Write-Verbose -Message "Failed to set ACL permissions with PowerShell. Attempting with icacls..." # For windows 2008 R2 + sp1 start-process with -Wait parameter does not work. Hence sleep for 5 sec instead. $osVersion=[Environment]::OSVersion.Version if (($osVersion.Major -eq 6) -and ($osVersion.Minor -eq 1) -and ($osVersion.Build -le 7601)) { $processGrantAdminUserAccess = Start-Process icacls.exe -ArgumentList "$Path /grant *S-1-5-32-544:(OI)(CI)F" -PassThru $processGrantLocalSystemUserAccess = Start-Process icacls.exe -ArgumentList "$Path /grant *S-1-5-18:(OI)(CI)F" -PassThru Start-Sleep -Seconds 5 } else { $processGrantAdminUserAccess = Start-Process icacls.exe -ArgumentList "$Path /grant *S-1-5-32-544:(OI)(CI)F" -PassThru -Wait $processGrantLocalSystemUserAccess = Start-Process icacls.exe -ArgumentList "$Path /grant *S-1-5-18:(OI)(CI)F" -PassThru -Wait } if ($null -eq $processGrantAdminUserAccess) { Write-Error "Failed to start icacls.exe process to set Administrator user permission on $Path." } if ($null -eq $processGrantLocalSystemUserAccess) { Write-Error "Failed to start icacls.exe process to set LocalSystem user permission on $Path." } # on 2008R2 ExitCode is not set. if (($processGrantAdminUserAccess.ExitCode -ne 0) -and ($null -ne $processGrantAdminUserAccess.ExitCode)) { Write-Error "icacls.exe failed to set Administrator user permission on $Path. Exit code: $($processGrantAdminUserAccess.ExitCode)" } if (($processGrantLocalSystemUserAccess.ExitCode -ne 0) -and ($null -ne $processGrantLocalSystemUserAccess.ExitCode)) { Write-Error "icacls.exe failed to set LocalSystem user permission on $Path. Exit code: $($processGrantLocalSystemUserAccess.ExitCode)" } } } <# .SYNOPSIS Start the GC Service. Report Failure if service is not able to start. .Example Start-ServiceInternal #> Function Start-ServiceInternal { [CmdletBinding()] Param( [Parameter()] [string] $ServiceType = "GC" ) Write-Verbose -Message "In Start-ServiceInternal" if ($ServiceType -eq "GC") { $serviceName = $global:GCServiceName } elseif ($ServiceType -eq "GCArc") { $serviceName = $global:GCArcServiceName } elseif ($ServiceType -eq "Extension") { $serviceName = $global:ExtServiceName } # Start GC Timer Service, may be retry on failure. Start-Service $serviceName $serviceObject = Get-Service -Name $serviceName if ($serviceObject.Status -eq 'Running') { Write-Verbose -Message "$serviceName is running." } else { Write-Error "$serviceName can not be started." } } <# .SYNOPSIS Stop the GC service and then uninstall it. .Example Uninstall-ServiceInternal #> Function Uninstall-ServiceInternal { [CmdletBinding()] Param( [Parameter()] [string] $ServiceType = "GC" ) Write-Verbose -Message "In Uninstall-ServiceInternal" if ($ServiceType -eq "GC") { $serviceName = $global:GCServiceName } elseif ($ServiceType -eq "GCArc") { $serviceName = $global:GCArcServiceName } elseif ($ServiceType -eq "Extension") { $serviceName = $global:ExtServiceName } # Unregister GC Service $timeOut = [timespan]::FromMinutes(5) $stopRetry = [DateTime]::Now.Add($timeOut) $secondsBetweenRetry = 3 Stop-Service $serviceName -ErrorAction SilentlyContinue -ErrorVariable stopTimeError if (Get-Service $serviceName -ErrorAction SilentlyContinue) { if (Get-Service -Name $serviceName -ErrorAction SilentlyContinue) { while (((Get-Service -Name $serviceName).Status -ne 'Stopped') -and ([dateTime]::Now -le $stopRetry)) { Write-Verbose "Wait for service to stop" -Verbose Start-Sleep -Seconds $secondsBetweenRetry } } $serviceObject = Get-Service -Name $serviceName if ($serviceObject.Status -eq 'Stopped') { Write-Verbose -Message "$serviceName is stopped." sc.exe delete $serviceName } else { Write-Error "$serviceName can not be Uninstalled because we are not able to stop it." } } else { Write-Verbose "Service already stopped" -Verbose } # some basic validation to check service is Uninstalled. $serviceRegistryExists = Get-ItemProperty hklm:\SYSTEM\CurrentControlSet\Services\$serviceName -ErrorAction SilentlyContinue if ($serviceRegistryExists -ne $null) { # sometimes the registry clean up does not happen right away. Hence do retry for the check. while (($serviceRegistryExists -ne $null) -and ([dateTime]::Now -le $stopRetry)) { Start-Sleep -Seconds $secondsBetweenRetry $serviceRegistryExists = Get-ItemProperty hklm:\SYSTEM\CurrentControlSet\Services\$serviceName -ErrorAction SilentlyContinue } # if service registry entry still exist. if ($serviceRegistryExists -ne $null) { Write-Error "$serviceName is not Uninstalled correctly. Information is Present in Registry Database." } } $getService = Get-Service $serviceName -ErrorAction SilentlyContinue if ($getService -ne $null) { Write-Error "$serviceName is not Uninstalled correctly. Service is reporting status." } } Function CheckServiceExists { [CmdletBinding()] Param( [Parameter()] [string] $ServiceName = $global:GCServiceName ) if (Get-Service $serviceName -ErrorAction SilentlyContinue) { return $true } return $false } function Invoke-ScriptWithRetry { [CmdletBinding()] param( [Parameter(Mandatory = $true, Position = 0)] [ScriptBlock] $Script = {}, [Parameter()] [int] $RetryCount = 3 ) $results = $null $exceptionObject = $null $keepRetrying = $true Write-Verbose "Invoke-ScriptWithRetry:: Start time : $((Get-Date).ToString())" for($i = 0; (($i -lt $RetryCount) -and ($keepRetrying -eq $true)); $i++) { try { $exceptionObject = $null $results = Invoke-Command -ScriptBlock $Script $keepRetrying = $false } catch { Write-Verbose "Retry Count $i" Write-Warning "$_" $exceptionObject = $_ } try { # Processor utilization $processorObj = Get-WmiObject -Class win32_processor -ErrorAction SilentlyContinue if($processorObj -ne $null) { $cpuUsage = ($processorObj | Measure-Object -Property LoadPercentage -Average | Select-Object Average).Average Write-Verbose "CPU Usage : '$($cpuUsage)%'" } # Memory utilization $computerMemory = Get-WmiObject -Class win32_operatingsystem -ErrorAction SilentlyContinue if($computerMemory -ne $null) { $memory = ((($computerMemory.TotalVisibleMemorySize - $computerMemory.FreePhysicalMemory)*100)/ $computerMemory.TotalVisibleMemorySize) Write-Verbose "Memory Usage : '$($memory)%'" } } catch { Write-Warning "Failed to compute Memory/CPU usage. Error : $_" } } Write-Verbose "Invoke-ScriptWithRetry:: End time : $((Get-Date).ToString())" if($exceptionObject -ne $null) { throw $exceptionObject } return $results } # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBI071bx7Qv02kc # Weh4vvZKzNcnYWFqPkN3/xZky5fV4aCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMss # vOiwDaWmswar3r1SHuBOB1NIyHWOe9fjKR9gTfsZMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEALcoAIZrP8GoAiGreNv/977Tt//lFUnGEaPm2 # CEkRVgtSZnb8/FPlfoTpxHQ7MnxBhZpzkWGyOgPxFtm4uubA4WnpBIxo6XY8bxQs # SL+Do+K2/bvwJ9+QmUKHyUV7/pTOFrCGwQ+c5kmbxXQ5TbW37BLFo1llc67fc7Hu # ttRqrUmAjcoomqJ0fHIuQpcyH56bC9Fuexi1+kY85m9N/JTEgKIofIovS7/wm2TV # CHDf4lT7PJ+ln0RHtJwmYfycBclEgSJdGCQJtJBI9jV2VdzBbO0f4Lo5NQ457kPj # 8mUUkuOL4MdKY9iyt2UcPdDTzUiyylxCGQuUugB8fMvC5fWLbKGCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCC7soZyl57Ulv+iQ6qh7I7TvsDJ4ix5Hg4J # t/qTPeLxfAIGZnLVz+uKGBMyMDI0MDcxMTIxMjQzMy40MjJaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA # 8z20C6MAAQAAAeUwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjozQkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl7 # 4Drau2O6LLrJO3HyTvO9aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIY # SyJHjkMIUGmuh0rPV5/2+UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4 # dru2Gymmt1rrGcNe800CcD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/Pllq # cM/eWntkQMs0lK0zmCfH+Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgE # izY+vFmgx+zDuuU/GChDK7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1J # VqpP3dpKPAP/4udNqpR5HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/ # 8cZ11kco1JvUyOQ8x/JDkMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQu # QR7FV7eCqV/lfajoLpPNx/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQm # z2L96TdxnIO2OGmYxBAAZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CTocc # c/Up/jpFfQitLfjd71cS+cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zd # JzJnGskVJ5ozhji0YRscv1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQU3/+fh7tNczEifEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBADP6whOFjD1ad8GkEJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKG # gFBiWwI6XOgw82hdolDiMDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEup # gC48I+b+2x2VNgGJUsQIyPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EU # wFeO5+3oSX4JeCNZvgyUOzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQg # oYipbaTvv7xmixUJGTbixYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjD # YZyeHyAysMEALbIhdXgHEh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hu # dctnXCG55JuMw/wb7c71RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si3 # 6Tql84VfpYe9iHmy7PqqxqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5Sflu # uJ/MB61yRvT1mUx3lyppO22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTD # C+TdZQlj+VMgIm8ZeEIRNF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaY # FpxBZUE8mnLKuDlYobjrxh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjozQkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWD # d85EpM6RiwqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOo5qi0wIhgPMjAyNDA3MTEwODQ3NDFaGA8yMDI0MDcx # MjA4NDc0MVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6jmqLQIBADAHAgEAAgIC # VTAHAgEAAgIR2jAKAgUA6jr7rQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # AJOBJXkQWxga8BNiFYPrYXG9WFSpIa1wjAPoNd/EsI7zxBWmi0bdo5AvNqOebdwi # ss7sI3YxBKvFivowbZZbVPD7dTLH5j+jBt8KqJ041LMHoYtziADNfktZcqubbvzl # yzjIn4m8bJ5n4WSu24IoLmy5wlQK9qxDzC3vzgFwtePcMYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAA # AeUwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQglmpaMRYMoUeQiGPks7rZTwKX0dHpb4AsqTD/6Mud # pAkwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb # 8I/pAof01CwhbxUH9U697TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB5Y9qwPM9tAujAAEAAAHlMCIEIKRqUSnZT1yg+1StuEH1uuTh # HuYzBX205kXcJq39Q+qIMA0GCSqGSIb3DQEBCwUABIICAJoSuILNI7sDP/ya2mL+ # QgIPK/Mt311WSwH25GQEfGh02tOot5+6vxSEMpBMkVHPW2AD8W5YyPSoT723dJEa # yM/P3dxtlSDvXdub4IMkoVsmJYbEbIvc/P0jis4GZZi/z4pdr8XsxmSboVHtpE4O # Dr7DG6y+iidQ0t3xXbhuomidGav0y0MvcDF02T7TY7FqjjjyY5EmKIzSUT3RC0X/ # y7JkhIxVGb6Drqel7euGpPN5Cc1ZvQK46PFka6lcp/8jtOvY3SRxVRovc+PyXjdq # 4zJkBr90eCLKzP4XI7KEjq43xY9GQ1uXSigatdB8SfJjKRPJjgu83g1PW5xkssiv # sn1HdmFEJQjqWNWl1IugGSoyPnA88msSPZ9wnhR2CcuOWSX6xg224kLkfNttMXZe # f8ezkS/iInEr0DQqRRtPUN+LPegKHHTcFacJ94oKEkiodxeD+TfP22xCigxS69Kt # 97bAu5ZKN3A77xQl7L4I/WnR7SKx/yNACjk0+RTXWQ4zKXoa888oAp92RD29Bjxh # mLTnT2cBhEEJEP7SHdecSTZ1evrclbGpEMJqF7CVQIrhcO2gX/MrigsbGuFHC6ol # qwdPnPhtKd3bZbXjngmTT1LPEA9nN7dL5/kSEf8vqJokv81BblWzdd6xL6n96Yzc # uhyCqU2iBVVVqU71vqFKFUsv # SIG # End signature block
combined_dataset/train/non-malicious/Short PS Prompt.ps1
Short PS Prompt.ps1
<# .Synopsis Dynamically shortens the prompt based upon window size .Notes I got really annoyed by having my PowerShell prompt extend across 2/3 of my window when in a deeply-nested directory structure. This shortens the prompt to roughly 1/3 of the window width, at a minimum showing the first and last piece of the path (usually the PSPROVIDER & the current directory) Additional detail is added, starting at the current directory's parent and working up from there. The omitted portion of the path is represented with an ellipsis (...) #> # Window title borrowed from Joel Bennett @ http://poshcode.org/1834 # This should go OUTSIDE the prompt function, it doesn't need re-evaluation # We're going to calculate a prefix for the window title # Our basic title is "PoSh - C:\\Your\\Path\\Here" showing the current path if(!$global:WindowTitlePrefix) { # But if you're running "elevated" on vista, we want to show that ... if( ([System.Environment]::OSVersion.Version.Major -gt 5) -and ( # Vista and ... new-object Security.Principal.WindowsPrincipal ( [Security.Principal.WindowsIdentity]::GetCurrent()) # current user is admin ).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator) ) { $global:WindowTitlePrefix = "PoSh (ADMIN)" } else { $global:WindowTitlePrefix = "PoSh" } } function prompt { # Put the full path in the title bar for reference $host.ui.rawui.windowtitle = $global:WindowTitlePrefix + " - " + $(get-location); # Capture the maximum length of the prompt. If you want a longer prompt, adjust the math as necessary. $winWidth = $host.UI.RawUI.WindowSize.Width; $maxPromptPath = [Math]::Round($winWidth/3); # In the PowerShell ISE (version 2.0 at least), $host.UI.RawUI.WindowSize.Widthis $null. # For now, I'm just going to leave the default prompt for this scenario, as I don't work in the ISE. if (-not ($winWidth -eq $null)) { $currPath = (get-location).path; if ($currPath.length -ge $maxPromptPath){ $pathParts = $currPath.split([System.IO.Path]::DirectorySeparatorChar); # Absolute minimum path - PSPROVIDER and the current directory $myPrompt = $pathParts[0] + [System.IO.Path]::DirectorySeparatorChar+ "..." + [System.IO.Path]::DirectorySeparatorChar + $pathParts[$pathParts.length - 1]; $counter = $pathParts.length - 2; # This builds up the prompt until it reaches the maximum length we set earlier. # Start at the current directory's parent and keep going up until the whole prompt reaches the previously-determined limit. while( ($myPrompt.replace("...","..."+[System.IO.Path]::DirectorySeparatorChar+$pathParts[$counter]).length -lt $maxPromptPath) -and ($counter -ne 0)) { $myPrompt = $myPrompt.replace("...","..."+[System.IO.Path]::DirectorySeparatorChar+$pathParts[$counter]); $counter--; } $($myPrompt) + ">"; } else{ # If there's enough room for the full prompt, use the Powershell default prompt $(if (test-path variable:/PSDebugContext) { '[DBG]: ' } else { '' }) + 'PS ' + $(Get-Location) + $(if ($nestedpromptlevel -ge 1) { '>>' }) + '> ' } } }
combined_dataset/train/non-malicious/sample_45_51.ps1
sample_45_51.ps1
# # Module manifest for module 'OCI.PSModules.Artifacts' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Artifacts.dll' # Version number of this module. ModuleVersion = '83.2.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '1fe5e04b-2e80-402c-b279-8d3ea9eca7dc' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Artifacts Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Artifacts.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIArtifactsContainerConfiguration', 'Get-OCIArtifactsContainerImage', 'Get-OCIArtifactsContainerImageSignature', 'Get-OCIArtifactsContainerImageSignaturesList', 'Get-OCIArtifactsContainerImagesList', 'Get-OCIArtifactsContainerRepositoriesList', 'Get-OCIArtifactsContainerRepository', 'Get-OCIArtifactsGenericArtifact', 'Get-OCIArtifactsGenericArtifactByPath', 'Get-OCIArtifactsGenericArtifactsList', 'Get-OCIArtifactsRepositoriesList', 'Get-OCIArtifactsRepository', 'Move-OCIArtifactsContainerRepositoryCompartment', 'Move-OCIArtifactsRepositoryCompartment', 'New-OCIArtifactsContainerImageSignature', 'New-OCIArtifactsContainerRepository', 'New-OCIArtifactsRepository', 'Remove-OCIArtifactsContainerImage', 'Remove-OCIArtifactsContainerImageSignature', 'Remove-OCIArtifactsContainerRepository', 'Remove-OCIArtifactsContainerVersion', 'Remove-OCIArtifactsGenericArtifact', 'Remove-OCIArtifactsGenericArtifactByPath', 'Remove-OCIArtifactsRepository', 'Restore-OCIArtifactsContainerImage', 'Update-OCIArtifactsContainerConfiguration', 'Update-OCIArtifactsContainerImage', 'Update-OCIArtifactsContainerImageSignature', 'Update-OCIArtifactsContainerRepository', 'Update-OCIArtifactsGenericArtifact', 'Update-OCIArtifactsGenericArtifactByPath', 'Update-OCIArtifactsRepository' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Artifacts' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/d657a0f0-47e1-4233-9e3b-cffc0495188f.ps1
d657a0f0-47e1-4233-9e3b-cffc0495188f.ps1
function Start-ISE () { <# .synopsis Load some file into ISE .Description Load some file into ISE .Parameter fileObjOrFileName file to be loaded .ReturnValue $null .Notes Author: bernd kriszio e-mail: bkriszio@googlemail.com Created: 2008-12-28 Requires: V2 CTP 3 Todo: I do not see the solution using advanced functions for a variable number of arguments Start-ISE .\\foo.ps1 .\\bar.ps1 fails. .Example Start-ISE $profile .Example get-childitem *.ps1 | Start-ISE .Example 'foo.ps1', 'bar.ps1' | Start-ISE #> param( [Parameter(Position = 0, Mandatory=$false, ValueFromPipeline=$True)] $fileObjOrFileName ) PROCESS { if ($fileObjOrFileName -ne $null){ if ($fileObjOrFileName.gettype().Name -eq 'FileInfo'){ & "$PSHome\\powershell_ise.exe" $fileObjOrFileName.Fullname } elseif ($fileObjOrFileName.gettype().Name -eq 'String') { if(Test-path $fileObjOrFileName) { & "$PSHome\\powershell_ise.exe" "$fileObjOrFileName" } else { & "$PSHome\\powershell_ise.exe" "$(pwd)\\$fileObjOrFileName" } } } } <# End{ foreach ($file in $args) { if ($file.gettype().Name -eq 'FileInfo'){ & "$PSHome/powershell_ise.exe" $file.Fullname } elseif ($file.gettype().Name -eq 'String') { & "$PSHome/powershell_ise.exe" "$(pwd)\\$file" } } } #> }
combined_dataset/train/non-malicious/sample_52_50.ps1
sample_52_50.ps1
# # Module manifest for module 'OCI.PSModules.Threatintelligence' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Threatintelligence.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'c229474b-5b4b-4431-8a80-8bdccc68f37d' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Threatintelligence Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Threatintelligence.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIThreatintelligenceIndicator', 'Get-OCIThreatintelligenceIndicatorCountsList', 'Get-OCIThreatintelligenceIndicatorsList', 'Get-OCIThreatintelligenceThreatTypesList', 'Invoke-OCIThreatintelligenceSummarizeIndicators' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Threatintelligence' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/3073.ps1
3073.ps1
function Get-Planet ([string]$Name = '*') { $planets = @( @{ Name = 'Mercury' } @{ Name = 'Venus' } @{ Name = 'Earth' } @{ Name = 'Mars' } @{ Name = 'Jupiter' } @{ Name = 'Saturn' } @{ Name = 'Uranus' } @{ Name = 'Neptune' } ) | foreach { New-Object -TypeName PSObject -Property $_ } $planets | where { $_.Name -like $Name } }
combined_dataset/train/non-malicious/sample_44_93.ps1
sample_44_93.ps1
<# .SYNOPSIS Dump information about installed certificates .DESCRIPTION - Dump certificates from Computer and Personal stores; - In debug mode, dump information about Certificate Authority .PARAMETER outFolder Folder where to save output .PARAMETER outFormat Output format. Can be "txt" (default), "csv" or "stdout". With "stdout" format the script doesn't save the information to files but redirects the output to a standard console output. .PARAMETER dumpTCA Dump information about Certificate Authority .EXAMPLE .\dump_certs.ps1 -outFolder C:\MyFolder Save output files in C:\MyFolder directory .EXAMPLE .\dump_certs.ps1 -outFormat csv Save output as csv Format can be "txt" (default), "csv" or "stdout". Note: Information about Certificate Authority is always collected in txt format (either to file or to console output) .EXAMPLE .\dump_certs.ps1 -outFormat stdout Print the information to console .EXAMPLE .\dump_certs.ps1 -dumpTCA Dumps information about Certificate Authority. Requires connection to domain controller .NOTES Copyright (c) Check Point Software Technologies, 2023. All Rights reserved. #> param ( [string]$outFolder = ".", [string]$outFormat = "txt", [switch]$dumpTCA = $false, [switch]$verbose = $false ) function SaveTxt { param ( $certList, $outFile ) $PSDefaultParameterValues['out-file:width'] = 2000 $PSDefaultParameterValues['out-string:width'] = 2000 $output = "" foreach ($cert in $certList) { $nonemptyProperties = [System.Collections.ArrayList]@() foreach ($p in $certProperties) { try { $v = $cert | select-object -ExpandProperty $p 2> $null} catch {} if ($v) { $nonemptyProperties.Add($p) *> $null } } $output += $cert | Select-Object -Property $nonemptyProperties | fl | out-string } if ($printConsole) { Write-Output $output } else { $output | out-file -FilePath $outFile } $PSDefaultParameterValues.Remove('out-file:width') $PSDefaultParameterValues.Remove('out-string:width') } function SaveCsv { param ( $certList, $outFile ) $certList | Select-Object -Property $certProperties | Export-Csv -Path $outFile -NoTypeInformation } switch ($outFormat) { "txt" { $save_command = $function:SaveTxt $printFile = $true $printConsole=$false break } "csv" { $save_command = $function:SaveCsv $printFile = $true $printConsole=$false break } "stdout" { $save_command = $function:SaveTxt $printFile = $false $printConsole=$true break } Default { "Unknown format: {0}" -f $outFormat | write-host "Use `"Get-Help .\dump_certs.ps1`" for more details" | write-host exit 1 } } if ( [bool](Test-Path -Path $outFolder) -ne $true) { "Output folder is not available: `"{0}`"" -f $outFolder | write-host exit 1 } if ($printFile) { # Log files $outFileCA = "{0}\Certificates_{1}_{2}_TCAInfo.txt" -f $outFolder, $Env:UserName, $Env:ComputerName $outFileUser = "{0}\Certificates_{1}_{2}_User.{3}" -f $outFolder, $Env:UserName, $Env:ComputerName, $outFormat $outFileComputer = "{0}\Certificates_{1}_{2}_Computer.{3}" -f $outFolder, $Env:UserName, $Env:ComputerName, $outFormat } #we must change $Global:FormatEnumerationLimit only after all possible 'exit' calls, so we can revert it later $FormatEnumerationLimitOld = $Global:FormatEnumerationLimit $Global:FormatEnumerationLimit = 15 $signature = @" [DllImport("Crypt32.dll", SetLastError = true, CharSet = CharSet.Auto)] public static extern bool CertGetCertificateContextProperty( IntPtr pCertContext, uint dwPropId, IntPtr pvData, ref uint pcbData ); [StructLayout(LayoutKind.Sequential, CharSet=CharSet.Unicode)] public struct CRYPT_KEY_PROV_INFO { [MarshalAs(UnmanagedType.LPWStr)] public string pwszContainerName; [MarshalAs(UnmanagedType.LPWStr)] public string pwszProvName; public uint dwProvType; public uint dwFlags; public uint cProvParam; public IntPtr rgProvParam; public uint dwKeySpec; } [DllImport("ncrypt.dll", SetLastError = true)] public static extern int NCryptOpenStorageProvider( ref IntPtr phProvider, [MarshalAs(UnmanagedType.LPWStr)] string pszProviderName, uint dwFlags ); [DllImport("ncrypt.dll", SetLastError = true)] public static extern int NCryptOpenKey( IntPtr hProvider, ref IntPtr phKey, [MarshalAs(UnmanagedType.LPWStr)] string pszKeyName, uint dwLegacyKeySpec, uint dwFlags ); [DllImport("ncrypt.dll", SetLastError = true)] public static extern int NCryptGetProperty( IntPtr hObject, [MarshalAs(UnmanagedType.LPWStr)] string pszProperty, byte[] pbOutput, int cbOutput, ref int pcbResult, int dwFlags ); [DllImport("ncrypt.dll", CharSet=CharSet.Auto, SetLastError=true)] public static extern int NCryptFreeObject( IntPtr hObject ); "@ try { Add-Type -MemberDefinition $signature -Namespace PKI -Name Tools } catch { } $numOfSteps = if ( $dumpTCA ) { 3 } else { 2 } $certProperties = [System.Collections.ArrayList]@( "Path", # Custom property for storage "PSChildName", "SerialNumber", "Subject" "FriendlyName", "NotBefore", "NotAfter", "Issuer", "Thumbprint", "DnsNameList", "EnhancedKeyUsageList", "Archived", "PubKey.KeySize", # Custom property for Public Key properties "PubKey.KeyExchangeAlgorithm", # Custom property for Public Key properties "PubKey.SignatureAlgorithm", # Custom property for Public Key properties "HasPrivateKey", "KeyContainer", # Custom property for Key Conteiner info "ContainerName", # Custom property for Key Conteiner info "ProviderName", # Custom property for Provide Name "PrivKey.KeySize", # Custom property for Private Key properties "PrivKey.KeyExchangeAlgorithm", # Custom property for Private Key properties "PrivKey.SignatureAlgorithm", # Custom property for Private Key properties "PrivKey.CspKeyContainerInfo", # Custom property for Private Key properties "SigAlg.Value", # Custom property for Signature Algorithm "SigAlg.FriendlyName", # Custom property for Signature Algorithm "Validity", # Custom property for Signature Algorithm "Version" ) function Validate-Certificate { param ( $cert ) $result = Select-Object @{n = 'Status'; e = {'False'}}, @{n = 'Message'; e = {''}} -InputObject '' $tc = Test-Certificate -Cert $cert -User 3>&1 2>$null if ($tc -eq "True") { $result.Status = $tc } else { # $result.Status = "False" by default $result.Message = ($tc | out-string) -creplace 'False' -replace '(\w)\s*$', '$1' } return $result } function Get-CertificatesFromStore { param ( $storeName ) $certList = Get-ChildItem $storeName | Where-Object {($_.PSIsContainer -ne 'True')} foreach ($cert in $certList) { # Remove "Microsoft.PowerShell.Security\Certificate::" from "PSParentPath" property $path = $cert.PSParentPath -replace "Microsoft.PowerShell.Security\\Certificate::", "" $cert | Add-Member -MemberType NoteProperty -Name "Path" -Value $path # Fetch Signature Algorithm properties $cert | Add-Member -MemberType NoteProperty -Name "SigAlg.Value" -Value $cert.SignatureAlgorithm.Value $cert | Add-Member -MemberType NoteProperty -Name "SigAlg.FriendlyName" -Value $cert.SignatureAlgorithm.FriendlyName # Fetch Public Key properties $cert | Add-Member -MemberType NoteProperty -Name "PubKey.KeySize" -Value $cert.PublicKey.Key.KeySize $cert | Add-Member -MemberType NoteProperty -Name "PubKey.KeyExchangeAlgorithm" -Value $cert.PublicKey.Key.KeyExchangeAlgorithm $cert | Add-Member -MemberType NoteProperty -Name "PubKey.SignatureAlgorithm" -Value $cert.PublicKey.Key.SignatureAlgorithm # Fetch Private Key properties if ($cert.HasPrivateKey -eq $true) { # Key Container and Provider # Code snipet from https://www.sysadmins.lv/blog-en/retrieve-cng-key-container-name-and-unique-name.aspx $OPEN_KEY_FLAG = if ( ($storeName -like "*localmachine*") ) { 0x20 } else { 0x0 } $CERT_KEY_PROV_INFO_PROP_ID = 0x2 # from Wincrypt.h header file $pcbData = 0 [void][PKI.Tools]::CertGetCertificateContextProperty($cert.Handle, $CERT_KEY_PROV_INFO_PROP_ID, [IntPtr]::Zero, [ref]$pcbData) $pvData = [Runtime.InteropServices.Marshal]::AllocHGlobal($pcbData) $r = [PKI.Tools]::CertGetCertificateContextProperty($cert.Handle, $CERT_KEY_PROV_INFO_PROP_ID, $pvData, [ref]$pcbData) $keyProv = [Runtime.InteropServices.Marshal]::PtrToStructure($pvData, [type][PKI.Tools+CRYPT_KEY_PROV_INFO]) [Runtime.InteropServices.Marshal]::FreeHGlobal($pvData) $phProvider = [IntPtr]::Zero $phKey = [IntPtr]::Zero [void][PKI.Tools]::NCryptOpenStorageProvider([ref]$phProvider, $keyProv.pwszProvName, 0) [void][PKI.Tools]::NCryptOpenKey($phProvider, [ref]$phKey, $keyProv.pwszContainerName, 0, $OPEN_KEY_FLAG) $pcbResult = 0 [void][PKI.Tools]::NCryptGetProperty($phKey, "Unique Name", $null, 0, [ref]$pcbResult, 0) $pbOutput = New-Object byte[] -ArgumentList $pcbResult [void][PKI.Tools]::NCryptGetProperty($phKey, "Unique Name", $pbOutput, $pbOutput.length, [ref]$pcbResult, 0) $containerName = [Text.Encoding]::Unicode.GetString($pbOutput) $cert | Add-Member -MemberType NoteProperty -Name "KeyContainer" -Value $containerName $cert | Add-Member -MemberType NoteProperty -Name "ContainerName" -Value $keyProv.pwszContainerName $cert | Add-Member -MemberType NoteProperty -Name "ProviderName" -Value $keyProv.pwszProvName if ($cert.PrivateKey) { $cert | Add-Member -MemberType NoteProperty -Name "PrivKey.KeySize" -Value $cert.PrivateKey.KeySize $cert | Add-Member -MemberType NoteProperty -Name "PrivKey.KeyExchangeAlgorithm" -Value $cert.PrivateKey.KeyExchangeAlgorithm $cert | Add-Member -MemberType NoteProperty -Name "PrivKey.SignatureAlgorithm" -Value $cert.PrivateKey.SignatureAlgorithm } else { [void][PKI.Tools]::NCryptGetProperty($phKey, "Length", $null, 0, [ref]$pcbResult, 0) $pBuf = New-Object byte[] -ArgumentList $pcbResult [void][PKI.Tools]::NCryptGetProperty($phKey, "Length", $pBuf, $pBuf.length, [ref]$pcbResult, 0) if ( $pBuf.length -eq 0 ) { $keyLength = "No data" } else { $keyLength = [uint32]("0x{0}" -f (($pBuf -join '') | out-string)) } $cert | Add-Member -MemberType NoteProperty -Name "PrivKey.KeySize" -Value $keyLength } [void][PKI.Tools]::NCryptFreeObject($phProvider) [void][PKI.Tools]::NCryptFreeObject($phKey) if ($verbose) { $cspContainerInfo = ($cert.PrivateKey.CspKeyContainerInfo | out-string) -replace '^\s*|\s*$', '' $cert | Add-Member -MemberType NoteProperty -Name "PrivKey.CspKeyContainerInfo" -Value $cspContainerInfo } } $cert | Add-Member -MemberType NoteProperty -Name "Validity" -Value "" $v = Validate-Certificate -Cert $cert if ($v.Status -eq "True") { $cert.Validity = $v.Status } else { $cert.Validity = "{0}`r`n{1}" -f $v.Status, $v.Message } } return $certList } function Get-Certificates { param ( $storeList ) $certList = @() foreach ($store in $storeList) { $storePath = "Cert:\{0}\{1}" -f $store.Location, $store.Name try { $certList += Get-CertificatesFromStore -storeName $storePath } catch [System.ComponentModel.Win32Exception] { "Can't access store '{0}'" -f $storePath | write-warning } catch { "General Exception: `r`n{0}" -f $_ | write-warning } } return $certList } "[1 of {0}] Dumping user's certificates" -f $numOfSteps | write-host $UserCertificates = Get-Certificates -storeList (Get-ChildItem "Cert:\CurrentUser") & $save_command -certList $UserCertificates -outFile $outFileUser "[2 of {0}] Dumping computer's certificates" -f $numOfSteps | write-host $ComputerCertificates = Get-Certificates -storeList (Get-ChildItem "Cert:\LocalMachine") & $save_command -certList $ComputerCertificates -outFile $outFileComputer if ( $dumpTCA ) { "[3 of {0}] Dumping Certificate Authority information" -f $numOfSteps | write-host if ($printConsole) { certutil -v -tcainfo } else { certutil -v -tcainfo > $outFileCA } } $Global:FormatEnumerationLimit = $FormatEnumerationLimitOld # SIG # Begin signature block # MIInywYJKoZIhvcNAQcCoIInvDCCJ7gCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAe1hzmhfxYxU5R # 0SF25TO1ecrLJjx8Ask6SLWuTczHqqCCIIswggWDMIIDa6ADAgECAg5F5rsDgzPD # hWVI5v9FUTANBgkqhkiG9w0BAQwFADBMMSAwHgYDVQQLExdHbG9iYWxTaWduIFJv # b3QgQ0EgLSBSNjETMBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFs # U2lnbjAeFw0xNDEyMTAwMDAwMDBaFw0zNDEyMTAwMDAwMDBaMEwxIDAeBgNVBAsT # F0dsb2JhbFNpZ24gUm9vdCBDQSAtIFI2MRMwEQYDVQQKEwpHbG9iYWxTaWduMRMw # EQYDVQQDEwpHbG9iYWxTaWduMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKC # AgEAlQfoc8pm+ewUyns89w0I8bRFCyyCtEjG61s8roO4QZIzFKRvf+kqzMawiGvF # tonRxrL/FM5RFCHsSt0bWsbWh+5NOhUG7WRmC5KAykTec5RO86eJf094YwjIElBt # QmYvTbl5KE1SGooagLcZgQ5+xIq8ZEwhHENo1z08isWyZtWQmrcxBsW+4m0yBqYe # +bnrqqO4v76CY1DQ8BiJ3+QPefXqoh8q0nAue+e8k7ttU+JIfIwQBzj/ZrJ3YX7g # 6ow8qrSk9vOVShIHbf2MsonP0KBhd8hYdLDUIzr3XTrKotudCd5dRC2Q8YHNV5L6 # frxQBGM032uTGL5rNrI55KwkNrfw77YcE1eTtt6y+OKFt3OiuDWqRfLgnTahb1SK # 8XJWbi6IxVFCRBWU7qPFOJabTk5aC0fzBjZJdzC8cTflpuwhCHX85mEWP3fV2ZGX # hAps1AJNdMAU7f05+4PyXhShBLAL6f7uj+FuC7IIs2FmCWqxBjplllnA8DX9ydoo # jRoRh3CBCqiadR2eOoYFAJ7bgNYl+dwFnidZTHY5W+r5paHYgw/R/98wEfmFzzNI # 9cptZBQselhP00sIScWVZBpjDnk99bOMylitnEJFeW4OhxlcVLFltr+Mm9wT6Q1v # uC7cZ27JixG1hBSKABlwg3mRl5HUGie/Nx4yB9gUYzwoTK8CAwEAAaNjMGEwDgYD # VR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFK5sBaOTE+Ki # 5+LXHNbH8H/IZ1OgMB8GA1UdIwQYMBaAFK5sBaOTE+Ki5+LXHNbH8H/IZ1OgMA0G # CSqGSIb3DQEBDAUAA4ICAQCDJe3o0f2VUs2ewASgkWnmXNCE3tytok/oR3jWZZip # W6g8h3wCitFutxZz5l/AVJjVdL7BzeIRka0jGD3d4XJElrSVXsB7jpl4FkMTVlez # orM7tXfcQHKso+ubNT6xCCGh58RDN3kyvrXnnCxMvEMpmY4w06wh4OMd+tgHM3ZU # ACIquU0gLnBo2uVT/INc053y/0QMRGby0uO9RgAabQK6JV2NoTFR3VRGHE3bmZbv # GhwEXKYV73jgef5d2z6qTFX9mhWpb+Gm+99wMOnD7kJG7cKTBYn6fWN7P9BxgXwA # 6JiuDng0wyX7rwqfIGvdOxOPEoziQRpIenOgd2nHtlx/gsge/lgbKCuobK1ebcAF # 0nu364D+JTf+AptorEJdw+71zNzwUHXSNmmc5nsE324GabbeCglIWYfrexRgemSq # aUPvkcdM7BjdbO9TLYyZ4V7ycj7PVMi9Z+ykD0xF/9O5MCMHTI8Qv4aW2ZlatJlX # HKTMuxWJU7osBQ/kxJ4ZsRg01Uyduu33H68klQR4qAO77oHl2l98i0qhkHQlp7M+ # S8gsVr3HyO844lyS8Hn3nIS6dC1hASB+ftHyTwdZX4stQ1LrRgyU4fVmR3l31VRb # H60kN8tFWk6gREjI2LCZxRWECfbWSUnAZbjmGnFuoKjxguhFPmzWAtcKZ4MFWsmk # EDCCBlkwggRBoAMCAQICDQHsHJJA3v0uQF18R3QwDQYJKoZIhvcNAQEMBQAwTDEg # MB4GA1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjYxEzARBgNVBAoTCkdsb2Jh # bFNpZ24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMTgwNjIwMDAwMDAwWhcNMzQx # MjEwMDAwMDAwWjBbMQswCQYDVQQGEwJCRTEZMBcGA1UEChMQR2xvYmFsU2lnbiBu # di1zYTExMC8GA1UEAxMoR2xvYmFsU2lnbiBUaW1lc3RhbXBpbmcgQ0EgLSBTSEEz # ODQgLSBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAPAC4jAj+uAb # 4Zp0s691g1+pR1LHYTpjfDkjeW10/DHkdBIZlvrOJ2JbrgeKJ+5Xo8Q17bM0x6zD # DOuAZm3RKErBLLu5cPJyroz3mVpddq6/RKh8QSSOj7rFT/82QaunLf14TkOI/pMZ # F9nuMc+8ijtuasSI8O6X9tzzGKBLmRwOh6cm4YjJoOWZ4p70nEw/XVvstu/SZc9F # C1Q9sVRTB4uZbrhUmYqoMZI78np9/A5Y34Fq4bBsHmWCKtQhx5T+QpY78Quxf39G # mA6HPXpl69FWqS69+1g9tYX6U5lNW3TtckuiDYI3GQzQq+pawe8P1Zm5P/RPNfGc # D9M3E1LZJTTtlu/4Z+oIvo9Jev+QsdT3KRXX+Q1d1odDHnTEcCi0gHu9Kpu7hOEO # rG8NubX2bVb+ih0JPiQOZybH/LINoJSwspTMe+Zn/qZYstTYQRLBVf1ukcW7sUwI # S57UQgZvGxjVNupkrs799QXm4mbQDgUhrLERBiMZ5PsFNETqCK6dSWcRi4LlrVqG # p2b9MwMB3pkl+XFu6ZxdAkxgPM8CjwH9cu6S8acS3kISTeypJuV3AqwOVwwJ0WGe # Joj8yLJN22TwRZ+6wT9Uo9h2ApVsao3KIlz2DATjKfpLsBzTN3SE2R1mqzRzjx59 # fF6W1j0ZsJfqjFCRba9Xhn4QNx1rGhTfAgMBAAGjggEpMIIBJTAOBgNVHQ8BAf8E # BAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU6hbGaefjy1dFOTOk # 8EC+0MO9ZZYwHwYDVR0jBBgwFoAUrmwFo5MT4qLn4tcc1sfwf8hnU6AwPgYIKwYB # BQUHAQEEMjAwMC4GCCsGAQUFBzABhiJodHRwOi8vb2NzcDIuZ2xvYmFsc2lnbi5j # b20vcm9vdHI2MDYGA1UdHwQvMC0wK6ApoCeGJWh0dHA6Ly9jcmwuZ2xvYmFsc2ln # bi5jb20vcm9vdC1yNi5jcmwwRwYDVR0gBEAwPjA8BgRVHSAAMDQwMgYIKwYBBQUH # AgEWJmh0dHBzOi8vd3d3Lmdsb2JhbHNpZ24uY29tL3JlcG9zaXRvcnkvMA0GCSqG # SIb3DQEBDAUAA4ICAQB/4ojZV2crQl+BpwkLusS7KBhW1ky/2xsHcMb7CwmtADpg # Mx85xhZrGUBJJQge5Jv31qQNjx6W8oaiF95Bv0/hvKvN7sAjjMaF/ksVJPkYROwf # wqSs0LLP7MJWZR29f/begsi3n2HTtUZImJcCZ3oWlUrbYsbQswLMNEhFVd3s6Uqf # XhTtchBxdnDSD5bz6jdXlJEYr9yNmTgZWMKpoX6ibhUm6rT5fyrn50hkaS/SmqFy # 9vckS3RafXKGNbMCVx+LnPy7rEze+t5TTIP9ErG2SVVPdZ2sb0rILmq5yojDEjBO # sghzn16h1pnO6X1LlizMFmsYzeRZN4YJLOJF1rLNboJ1pdqNHrdbL4guPX3x8pEw # BZzOe3ygxayvUQbwEccdMMVRVmDofJU9IuPVCiRTJ5eA+kiJJyx54jzlmx7jqoSC # iT7ASvUh/mIQ7R0w/PbM6kgnfIt1Qn9ry/Ola5UfBFg0ContglDk0Xuoyea+SKor # VdmNtyUgDhtRoNRjqoPqbHJhSsn6Q8TGV8Wdtjywi7C5HDHvve8U2BRAbCAdwi3o # C8aNbYy2ce1SIf4+9p+fORqurNIveiCx9KyqHeItFJ36lmodxjzK89kcv1NNpEdZ # fJXEQ0H5JeIsEH6B+Q2Up33ytQn12GByQFCVINRDRL76oJXnIFm2eMakaqoimzCC # BmgwggRQoAMCAQICEAFIkD3CirynoRlNDBxXuCkwDQYJKoZIhvcNAQELBQAwWzEL # MAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExMTAvBgNVBAMT # KEdsb2JhbFNpZ24gVGltZXN0YW1waW5nIENBIC0gU0hBMzg0IC0gRzQwHhcNMjIw # NDA2MDc0MTU4WhcNMzMwNTA4MDc0MTU4WjBjMQswCQYDVQQGEwJCRTEZMBcGA1UE # CgwQR2xvYmFsU2lnbiBudi1zYTE5MDcGA1UEAwwwR2xvYmFsc2lnbiBUU0EgZm9y # IE1TIEF1dGhlbnRpY29kZSBBZHZhbmNlZCAtIEc0MIIBojANBgkqhkiG9w0BAQEF # AAOCAY8AMIIBigKCAYEAwsncA7YbUPoqDeicpCHbKKcd9YC1EnQj/l4vwxpdlrIg # GRlQX3YjJjXGIeyU77WiOsWQgZsh7wsnpOMXZDvak9RWLzzXWPltrMAvkHgjScD4 # wY9wE9Rr3yaIWnZ7SPfhpKbvCxrzJVQPgJ4jEhIT0bD3AuMrDf9APgBCQ94a70z0 # h6nynjzQBufiY9LrTFvdXViU0+WlOSiqB152IzD8/H+YDcVlbRvVdEU6RrCiFnXe # osIqcHy2drzZG666XZz2h5XOqqjitaOxk25ApZsQiHYWTjSh/J7x4RpU0cgkV5R2 # rcLH7KOjlnXixihrAgXoS7m14FIreAGMKjEsTOgF5W+fD4QmLmhs+stNGXwYwf9q # GqnLvqN1+OnIGLLM3S9BQCAcz4gLF8mwikPL4muTUfERvkK8+FHy2gACvggYKAUn # xNw7XXcpHhnUQSpmfbRSc1xCpZDTjcWjqjfOcwGUJBlCQ9GUj0t+3cttvBtOe/mq # CyJLSYBJcBstT940YD69AgMBAAGjggGeMIIBmjAOBgNVHQ8BAf8EBAMCB4AwFgYD # VR0lAQH/BAwwCgYIKwYBBQUHAwgwHQYDVR0OBBYEFFtre/RwdAjBDSrI7/HEuUDS # Ssb9MEwGA1UdIARFMEMwQQYJKwYBBAGgMgEeMDQwMgYIKwYBBQUHAgEWJmh0dHBz # Oi8vd3d3Lmdsb2JhbHNpZ24uY29tL3JlcG9zaXRvcnkvMAwGA1UdEwEB/wQCMAAw # gZAGCCsGAQUFBwEBBIGDMIGAMDkGCCsGAQUFBzABhi1odHRwOi8vb2NzcC5nbG9i # YWxzaWduLmNvbS9jYS9nc3RzYWNhc2hhMzg0ZzQwQwYIKwYBBQUHMAKGN2h0dHA6 # Ly9zZWN1cmUuZ2xvYmFsc2lnbi5jb20vY2FjZXJ0L2dzdHNhY2FzaGEzODRnNC5j # cnQwHwYDVR0jBBgwFoAU6hbGaefjy1dFOTOk8EC+0MO9ZZYwQQYDVR0fBDowODA2 # oDSgMoYwaHR0cDovL2NybC5nbG9iYWxzaWduLmNvbS9jYS9nc3RzYWNhc2hhMzg0 # ZzQuY3JsMA0GCSqGSIb3DQEBCwUAA4ICAQAuaz6Pf7CwYNnxnYTclbbfXw2/JFHj # GgaqVQTLYcHvZXGuC/2UJFcAx+T2DLwYlX0vGWpgM6a+0AhVVgS24/4eu+UQdlQ7 # q1whXio1TUbLpky6BEBgYCzb0/ad3soyEAx4sLtWxQdLcLynD6tyvI3L6+7BTGvZ # +pihdD7pqMh5fHZ3SP3P4/ANwenDkuAHDBMvP2t/NdnVt+5vfFjA8T8MGbICo0lM # nATD8LSXp+BNaiW6NBZiZsh4vGlzql9yojVYHibrvzIUqhJ66/SWa39yrOqnOQgz # ATY+YSR+EZ0RHnYiVONAuy6GDHaeadLEHD2iC4yIBANU3ukbF/4sK57Z1lsiOPxk # QIbNF3/hqZ+5v5JBqG8mavQPKLBAkZAvTrZ2ULxNI9l/T2uTKads59AwPqmTH8JQ # KznFsvhNJyTR/XbYvvmT9KlUCtV2WNE8nuoa6CTE+zbxL1nTksPsy2BSHhxGJQj/ # ftmTrhSVqIaKBy5Ui3NMNxU4UFaH8U+uHI/JoWwvC/y7HG8tvaq262gj8O2UJxRj # y6z0Z4osgdMUEhgBP4R6ruxHYD9oWJnJSsKhmRUFwq3eou/Xp1V8vIQbTZS7jkqF # RNmBPaqjJVVfpGvNNmwA+f9y3lrs/8mgQZYaQGqFkRyvdWOoy1oztZQzfrKND3O+ # h/yvOnMfeyDbcjCCBrAwggSYoAMCAQICEAitQLJg0pxMn17Nqb2TrtkwDQYJKoZI # hvcNAQEMBQAwYjELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZ # MBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEhMB8GA1UEAxMYRGlnaUNlcnQgVHJ1 # c3RlZCBSb290IEc0MB4XDTIxMDQyOTAwMDAwMFoXDTM2MDQyODIzNTk1OVowaTEL # MAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMUEwPwYDVQQDEzhE # aWdpQ2VydCBUcnVzdGVkIEc0IENvZGUgU2lnbmluZyBSU0E0MDk2IFNIQTM4NCAy # MDIxIENBMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANW0L0LQKK14 # t13VOVkbsYhC9TOM6z2Bl3DFu8SFJjCfpI5o2Fz16zQkB+FLT9N4Q/QX1x7a+dLV # ZxpSTw6hV/yImcGRzIEDPk1wJGSzjeIIfTR9TIBXEmtDmpnyxTsf8u/LR1oTpkyz # ASAl8xDTi7L7CPCK4J0JwGWn+piASTWHPVEZ6JAheEUuoZ8s4RjCGszF7pNJcEIy # j/vG6hzzZWiRok1MghFIUmjeEL0UV13oGBNlxX+yT4UsSKRWhDXW+S6cqgAV0Tf+ # GgaUwnzI6hsy5srC9KejAw50pa85tqtgEuPo1rn3MeHcreQYoNjBI0dHs6EPbqOr # bZgGgxu3amct0r1EGpIQgY+wOwnXx5syWsL/amBUi0nBk+3htFzgb+sm+YzVsvk4 # EObqzpH1vtP7b5NhNFy8k0UogzYqZihfsHPOiyYlBrKD1Fz2FRlM7WLgXjPy6Ojs # CqewAyuRsjZ5vvetCB51pmXMu+NIUPN3kRr+21CiRshhWJj1fAIWPIMorTmG7NS3 # DVPQ+EfmdTCN7DCTdhSmW0tddGFNPxKRdt6/WMtyEClB8NXFbSZ2aBFBE1ia3CYr # AfSJTVnbeM+BSj5AR1/JgVBzhRAjIVlgimRUwcwhGug4GXxmHM14OEUwmU//Y09M # u6oNCFNBfFg9R7P6tuyMMgkCzGw8DFYRAgMBAAGjggFZMIIBVTASBgNVHRMBAf8E # CDAGAQH/AgEAMB0GA1UdDgQWBBRoN+Drtjv4XxGG+/5hewiIZfROQjAfBgNVHSME # GDAWgBTs1+OC0nFdZEzfLmc/57qYrhwPTzAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0l # BAwwCgYIKwYBBQUHAwMwdwYIKwYBBQUHAQEEazBpMCQGCCsGAQUFBzABhhhodHRw # Oi8vb2NzcC5kaWdpY2VydC5jb20wQQYIKwYBBQUHMAKGNWh0dHA6Ly9jYWNlcnRz # LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRSb290RzQuY3J0MEMGA1UdHwQ8 # MDowOKA2oDSGMmh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0 # ZWRSb290RzQuY3JsMBwGA1UdIAQVMBMwBwYFZ4EMAQMwCAYGZ4EMAQQBMA0GCSqG # SIb3DQEBDAUAA4ICAQA6I0Q9jQh27o+8OpnTVuACGqX4SDTzLLbmdGb3lHKxAMqv # bDAnExKekESfS/2eo3wm1Te8Ol1IbZXVP0n0J7sWgUVQ/Zy9toXgdn43ccsi91qq # kM/1k2rj6yDR1VB5iJqKisG2vaFIGH7c2IAaERkYzWGZgVb2yeN258TkG19D+D6U # /3Y5PZ7Umc9K3SjrXyahlVhI1Rr+1yc//ZDRdobdHLBgXPMNqO7giaG9OeE4Ttpu # uzad++UhU1rDyulq8aI+20O4M8hPOBSSmfXdzlRt2V0CFB9AM3wD4pWywiF1c1LL # RtjENByipUuNzW92NyyFPxrOJukYvpAHsEN/lYgggnDwzMrv/Sk1XB+JOFX3N4qL # CaHLC+kxGv8uGVw5ceG+nKcKBtYmZ7eS5k5f3nqsSc8upHSSrds8pJyGH+PBVhsr # I/+PteqIe3Br5qC6/To/RabE6BaRUotBwEiES5ZNq0RA443wFSjO7fEYVgcqLxDE # DAhkPDOPriiMPMuPiAsNvzv0zh57ju+168u38HcT5ucoP6wSrqUvImxB+YJcFWbM # bA7KxYbD9iYzDAdLoNMHAmpqQDBISzSoUSC7rRuFCOJZDW3KBVAr6kocnqX9oKcf # BnTn8tZSkP2vhUgh+Vc7tJwD7YZF9LRhbr9o4iZghurIr6n+lB3nYxs6hlZ4TjCC # B4MwggVroAMCAQICEAJ4kjMAgbOgBj+mGblTm3YwDQYJKoZIhvcNAQELBQAwaTEL # MAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMUEwPwYDVQQDEzhE # aWdpQ2VydCBUcnVzdGVkIEc0IENvZGUgU2lnbmluZyBSU0E0MDk2IFNIQTM4NCAy # MDIxIENBMTAeFw0yMTExMjUwMDAwMDBaFw0yNDExMjYyMzU5NTlaMIGHMQswCQYD # VQQGEwJJTDEWMBQGA1UEBxMNVGVsIEF2aXYtWWFmbzEvMC0GA1UEChMmQ2hlY2sg # UG9pbnQgU29mdHdhcmUgVGVjaG5vbG9naWVzIEx0ZC4xLzAtBgNVBAMTJkNoZWNr # IFBvaW50IFNvZnR3YXJlIFRlY2hub2xvZ2llcyBMdGQuMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEArNqKs7SZ7VJrIsQczTZZvVzIo2mNLDft9Xt+C3tm # ERvTHZ4KmaLxxYKIxV3soXd+HIKWq0Wm38anps1YZh8CPpcHYdiNtHIXYTCefygQ # 7w8lQ58dF1TO76a8T2ceNQEtzxXn1o49NQGDsP7uVilAWJG8JzfwJdikk1Cruq2K # vZIm0bMrUCJ8+l/v1rmyp9WUqi70GhKkFFHVxU2TFnLhw7YQWPtgmR9Uj1nb/57Y # ZZQUq5EuluFD9iAhKlfDh8YdkysSCd2uiaemCFSTTo2MlUpd1Lc5PPD2qb2uQnVg # ADSjSYaaAZEPITXe4k75Q9lhXPdw4Z87KAe6XbuVEMkFtIn/MJXvbjHxKj+A9iVI # 6iI/QyH50+fPQRMjFqIAdDin9E7BWrCp2pGZ7jCXMgv4gahZiK9J15W9j8nGLIkh # 0pCAlAWiRthrUCIuwijY8dTLvFKI3mT51b8IhFcvL4eY5g/4fwWDB3FbY0V/h4LH # 6fsLxpqBY9ZA2nrXBObEGZa/bLj4wi+x07WlcwCTc4g1xJS4hWf/EVGLw3cpV7/W # iTb96kDRYc3e3N29JbBzERE4Bp7dMGcUAIrOzvRLNdos3jjbv3tuxR6S66F+8weM # OboUaaea3n5h5QiUDO9mWNSXfdgg2eW1EwtP8+b+AWWyzs2v3lP8yaHWLwmtftT1 # rE0CAwEAAaOCAgYwggICMB8GA1UdIwQYMBaAFGg34Ou2O/hfEYb7/mF7CIhl9E5C # MB0GA1UdDgQWBBTLgFP4KTaEMvGdiRLYMtbhVgZkXjAOBgNVHQ8BAf8EBAMCB4Aw # EwYDVR0lBAwwCgYIKwYBBQUHAwMwgbUGA1UdHwSBrTCBqjBToFGgT4ZNaHR0cDov # L2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0Q29kZVNpZ25pbmdS # U0E0MDk2U0hBMzg0MjAyMUNBMS5jcmwwU6BRoE+GTWh0dHA6Ly9jcmw0LmRpZ2lj # ZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWduaW5nUlNBNDA5NlNIQTM4 # NDIwMjFDQTEuY3JsMD4GA1UdIAQ3MDUwMwYGZ4EMAQQBMCkwJwYIKwYBBQUHAgEW # G2h0dHA6Ly93d3cuZGlnaWNlcnQuY29tL0NQUzCBlAYIKwYBBQUHAQEEgYcwgYQw # JAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBcBggrBgEFBQcw # AoZQaHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0 # Q29kZVNpZ25pbmdSU0E0MDk2U0hBMzg0MjAyMUNBMS5jcnQwDAYDVR0TAQH/BAIw # ADANBgkqhkiG9w0BAQsFAAOCAgEAA5ner1jTwdVk0zhjDqSjVWWF2LG1ItCOe5oq # g3B3GTXUHA3KJzCTo2jTJGUCC8G1wPnapR5fK8GGGZ3lryks4/DrRmWMB6P40ygE # yi5v08LVAx4XvFkC0DbqqdOu8zZ6f5fzgc0rVGWOR9IZPwrp1MIJE/woZdmvmzm3 # bUWlR1p2N/e/iQs5iGjueRns+/o39f4EvF1EmFWdZCkW0tgNSsU0VBVknDtrD1E2 # edSdh7n+QSYAxAehiwLs9ladKjKS7vq44YLxTQKy43zLt8k1xwu0Gaq9w5MWydf3 # Ltkwn6myxXT906lv17YYJLI6oZEPfQIvxEhRJJjIXxKlH6IkDbtQAoKQboECemru # MM88rKoM0W33ka1bCKm53PEs3WMwpvwGsmaUKqeSsX5UDgfrgo8LqQfVcofo0wle # Ktviy4GId0aeBUqHLiOus2xcco3cTCfI2clja2cVhDN5RuSAQ4EmXLdVbZiH0/jt # ISMi5bp5SJmKGXG3xElTw1g1dw80GqKobJncVxwsnz9XdWUidtHcfJlIF4sXyYNU # 2uC1LpcMUi5YQrb03vikT1BLP4LadeW0BYJXKVbVuiSyCdXy9jqevVR4q1aWrFcO # gx4RMAlAiy+/r7wFC+ciLmCezzXBFH14w47CHAi08a4Y09IOS4vphF5C++3C0pW2 # 6clugMExggaWMIIGkgIBATB9MGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdp # Q2VydCwgSW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNp # Z25pbmcgUlNBNDA5NiBTSEEzODQgMjAyMSBDQTECEAJ4kjMAgbOgBj+mGblTm3Yw # DQYJYIZIAWUDBAIBBQCgfDAQBgorBgEEAYI3AgEMMQIwADAZBgkqhkiG9w0BCQMx # DAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkq # hkiG9w0BCQQxIgQgdW2OteQm6din0V9a9wgVXoyrdXrQT48TdVR8bj1SfAowDQYJ # KoZIhvcNAQEBBQAEggIAf41h+8okM0QPzllrzzwMkUXGhu5djE/w0ML7CRzFEn18 # tC2V7hGr6chSx8eDCaHy6dYi8L0YlTE5SWsJPUeHXuiVxiRlXH3P/Mg8knpLhzEe # jh80pYVnV/a8ZSlMJmXYoao1N8FGrlXJZ6kLtf4c8QIHnpFCZb5Po/SbbxdtrZ6w # WmQ6hm3i5m39NdqiilcvcoIF08ITciqRf98mg0upSWgXQV2VQ82vvqZYauVVPyjH # q2p2VDFZ0hxUDVTUOgH8R4gHLPVgyryuSMafPribqnIh95JldIjCNuptNVQFBB4Y # /EV1III0zxzL7n7K1EM01YH7Rjc0pfD2JqX4YLKoKk6uKAi2Kz2QvDDp3pHinQkM # BFyscrPa2JogI7L7u+DQxUVC/lxJYdWbAwbmv3cSCv5oYsBNZe5Jxqlj3TWgS2dZ # Ny24btQUCSWNXgel+/g9OSKv7qpecXnMDpZyJpvMOw76iTeXRmZNvgne+11bcsB2 # AqkmJWgRu9jNIWzH7dSr9L/mClzwiH5LUUAiMTjf94PM2YvCXvztqaQR+QHUPXVW # 3tg7cYOojhwQkZiI7f3248yudjrahtbfmQfA39umf6RZKpiWQ79o7BqcaG0CgNEJ # hdUAYyiY+W4ocp/AGIHqXc/AmRFNArW9xeYZQj582X14ff43ThV3DewhKQO4IASh # ggNsMIIDaAYJKoZIhvcNAQkGMYIDWTCCA1UCAQEwbzBbMQswCQYDVQQGEwJCRTEZ # MBcGA1UEChMQR2xvYmFsU2lnbiBudi1zYTExMC8GA1UEAxMoR2xvYmFsU2lnbiBU # aW1lc3RhbXBpbmcgQ0EgLSBTSEEzODQgLSBHNAIQAUiQPcKKvKehGU0MHFe4KTAL # BglghkgBZQMEAgGgggE9MBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJKoZI # hvcNAQkFMQ8XDTI0MDMxOTEwMDIzOVowKwYJKoZIhvcNAQk0MR4wHDALBglghkgB # ZQMEAgGhDQYJKoZIhvcNAQELBQAwLwYJKoZIhvcNAQkEMSIEIFsH9q0ZOJPouYIh # RHUcNIhU9+dk6rPSgLjE3rVL34P0MIGkBgsqhkiG9w0BCRACDDGBlDCBkTCBjjCB # iwQUMQMOF2qkWS6rLIut6DKZ/LVYXc8wczBfpF0wWzELMAkGA1UEBhMCQkUxGTAX # BgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExMTAvBgNVBAMTKEdsb2JhbFNpZ24gVGlt # ZXN0YW1waW5nIENBIC0gU0hBMzg0IC0gRzQCEAFIkD3CirynoRlNDBxXuCkwDQYJ # KoZIhvcNAQELBQAEggGAWled+JtkJqV+64nFZyH3siXGsER33nFdGYKCPcmEZr7P # JIDgzYd1TvLm1hesn6SbXM+8B9ewB8gRNzZcRsN8r4FOM6KjU5Gb/2nxLuJ5FGgy # za75WLKNHuQqEAsTpl+XBMwL9UxYaMpeSsdhx95hhDj0RVQNVD/OxLAAQ6n8aH+3 # OkWsw/DcGg5a6iPi+YDMUhJyBz+8tFNik6jVxgDvSyYenMEJmXHec4f1wUJBR2yD # RffxU5pyTCTIOYwUIN/u2Due6xhmeva6jQBFicYF8uchKwWwQny9VF8NzFR5cekh # FgNlX1D1BI7qN9E4B4Qqgxvr9CMBRDo582unxvWcSHnXXtHwC6CuGjqals8NezZ/ # hvV0rj22f+3jmnhQjc034xcw5Tn/6VSDcy0gtnIocaFL8U+yomaw9BNtD+Sqiwx1 # ZZHPlHJoX7KgAQIRRISDc6Or6Bbh4yKIl1wZkxLHy861zRWw+0j1u2NuZSJfT8vt # GaqNmEywkAf+nqoIkR8L # SIG # End signature block
combined_dataset/train/non-malicious/Reflection Module 4.1.ps1
Reflection Module 4.1.ps1
#requires -version 2.0 # ALSO REQUIRES Autoload for some functionality (Latest version: http://poshcode.org/3173) # You should create a Reflection.psd1 with the contents: # @{ ModuleToProcess="Reflection.psm1"; RequiredModules = @("Autoload"); GUID="64b5f609-970f-4e65-b02f-93ccf3e60cbb"; ModuleVersion="4.1.0.0" } #History: # 1.0 - First public release (March 19, 2010) # 2.0 - Private Build # - Included the Accelerator function inline # - Added a few default aliases # 3.0 - September 3, 2010 # - Included the New-ConstructorFunction feature (ripped from PowerBoots to serve a more generic and powerful purpose!) # - New-ConstructorFunction and Import-ConstructorFunctions depend on the Autoload Module: http://poshcode.org/2312 # 3.5 - January 28, 2011 # - Fixed several bugs in Add-Assembly, Get-Assembly, Get-MemberSignature # - Fixed alias exporting so aliases will show up now # - Added New-ModuleManifestFromSnapin to create module manifests from snapin assemblies # 3.6 - January 28, 2011 # - Added *basic* support for CustomPSSnapin to New-ModuleManifestFromSnapin # 3.7 - February 1, 2001 - NOT RELEASED # - Added [TransformAttribute] type # 3.8 - May 4, 2011 - NOT RELEASED # - Huge rewrite of Invoke-Generic (also published separately: http://poshcode.org/2649) # 3.9 - May 25, 2011 - NOT RELEASED # - Added "Interface" parameter to Get-Type # 4.0 - Sept 27, 2011 # - Fix conflicts with PowerShell 3 # 4.1 - Oct 27, 2011 # - Fix PowerShell 3 changes so they don't break PowerShell 2 (huy!) Add-Type -TypeDefinition @" using System; using System.ComponentModel; using System.Management.Automation; using System.Collections.ObjectModel; [AttributeUsage(AttributeTargets.Field | AttributeTargets.Property)] public class TransformAttribute : ArgumentTransformationAttribute { private ScriptBlock _scriptblock; private string _noOutputMessage = "Transform Script had no output."; public override string ToString() { return string.Format("[Transform(Script='{{{0}}}')]", Script); } public override Object Transform( EngineIntrinsics engine, Object inputData) { try { Collection<PSObject> output = engine.InvokeCommand.InvokeScript( engine.SessionState, Script, inputData ); if(output.Count > 1) { Object[] transformed = new Object[output.Count]; for(int i =0; i < output.Count;i++) { transformed[i] = output[i].BaseObject; } return transformed; } else if(output.Count == 1) { return output[0].BaseObject; } else { throw new ArgumentTransformationMetadataException(NoOutputMessage); } } catch (ArgumentTransformationMetadataException) { throw; } catch (Exception e) { throw new ArgumentTransformationMetadataException(string.Format("Transform Script threw an exception ('{0}'). See `$Error[0].Exception.InnerException.InnerException for more details.",e.Message), e); } } public TransformAttribute() { this.Script = ScriptBlock.Create("{`$args}"); } public TransformAttribute( ScriptBlock Script ) { this.Script = Script; } public ScriptBlock Script { get { return _scriptblock; } set { _scriptblock = value; } } public string NoOutputMessage { get { return _noOutputMessage; } set { _noOutputMessage = value; } } } "@ function Get-Type { <# .Synopsis Gets the types that are currenty loaded in .NET, or gets information about a specific type .Description Gets information about one or more loaded types, or gets the possible values for an enumerated type or value. .Parameter Assembly The Assemblies to search for types. Can be an actual Assembly object or a regex to pass to Get-Assembly. .Parameter TypeName The type name(s) to search for (wildcard patterns allowed). .Parameter BaseType A Base type they should derive from (wildcard patterns allowed). .Parameter Interface An interface they should implement (wildcard patterns allowed). .Parameter Enum An enumeration to list all of enumeration values for .Parameter Namespace A namespace to restrict where we selsect types from (wildcard patterns allowed). .Parameter Force Causes Private types to be included .Example Get-Type Gets all loaded types (takes a VERY long time to print out) .Example Get-Type -Assembly ([PSObject].Assembly) Gets types from System.Management.Automation .Example [Threading.Thread]::CurrentThread.ApartmentState | Get-Type Gets all of the possible values for the ApartmentState property .Example [Threading.ApartmentState] | Get-Type Gets all of the possible values for an apartmentstate #> [CmdletBinding(DefaultParameterSetName="Assembly")] param( # The assembly to collect types from [Parameter(ValueFromPipeline=$true)] [PsObject[]]$Assembly , # The type names to return from [Parameter(Mandatory=$false,Position=0)] [String[]]$TypeName , # The type names to return from [Parameter(Mandatory=$false)] [String[]]$Namespace , # A Base Type they should derive from [Parameter(Mandatory=$false)] [String[]]$BaseType , # An Interface they should implement [Parameter(Mandatory=$false)] [String[]]$Interface , # The enumerated value to get all of the possibilties of [Parameter(ParameterSetName="Enum")] [PSObject]$Enum , [Parameter()][Alias("Private","ShowPrivate")] [Switch]$Force ) process { if($psCmdlet.ParameterSetName -eq 'Enum') { if($Enum -is [Enum]) { [Enum]::GetValues($enum.GetType()) } elseif($Enum -is [Type] -and $Enum.IsEnum) { [Enum]::GetValues($enum) } else { throw "Specified Enum is neither an enum value nor an enumerable type" } } else { if($Assembly -as [Reflection.Assembly[]]) { ## This is what we expected, move along } elseif($Assembly -as [String[]]) { $Assembly = Get-Assembly $Assembly } elseif(!$Assembly) { $Assembly = [AppDomain]::CurrentDomain.GetAssemblies() } :asm foreach ($asm in $assembly) { Write-Verbose "Testing Types from Assembly: $($asm.Location)" if ($asm) { trap { if( $_.Exception.LoaderExceptions[0] -is [System.IO.FileNotFoundException] ) { $PSCmdlet.WriteWarning( "Unable to load some types from $($asm.Location), required assemblies were not found. Use -Debug to see more detail") continue asm } Write-Error "Unable to load some types from $($asm.Location). Try with -Debug to see more detail" Write-Debug $( $_.Exception.LoaderExceptions | Out-String ) continue asm } $asm.GetTypes() | Where { ( $Force -or $_.IsPublic ) -AND ( !$Namespace -or $( foreach($n in $Namespace) { $_.Namespace -like $n } ) ) -AND ( !$TypeName -or $( foreach($n in $TypeName) { $_.Name -like $n -or $_.FullName -like $n } ) -contains $True ) -AND ( !$BaseType -or $( foreach($n in $BaseType) { $_.BaseType -like $n } ) -contains $True ) -AND ( !$Interface -or @( foreach($n in $Interface) { $_.GetInterfaces() -like $n } ).Count -gt 0 ) } } } } } } function Add-Assembly { #.Synopsis # Load assemblies #.Description # Load assemblies from a folder #.Parameter Path # Specifies a path to one or more locations. Wildcards are permitted. The default location is the current directory (.). #.Parameter Passthru # Returns System.Runtime objects that represent the types that were added. By default, this cmdlet does not generate any output. # Aliased to -Types #.Parameter Recurse # Gets the items in the specified locations and in all child items of the locations. # # Recurse works only when the path points to a container that has child items, such as C:\\Windows or C:\\Windows\\*, and not when it points to items that do not have child items, such as C:\\Windows\\*.dll [CmdletBinding()] param( [Parameter(ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true, Position=0)] [Alias("PSPath")] [string[]]$Path = "." , [Alias("Types")] [Switch]$Passthru , [Switch]$Recurse ) process { foreach($file in Get-ChildItem $Path -Filter *.dll -Recurse:$Recurse) { Add-Type -Path $file.FullName -Passthru:$Passthru | Where { $_.IsPublic } } } } function Get-Assembly { <# .Synopsis Get a list of assemblies available in the runspace .Description Returns AssemblyInfo for all the assemblies available in the current AppDomain, optionally filtered by partial name match .Parameter Name A regex to filter the returned assemblies. This is matched against the .FullName or Location (path) of the assembly. #> [CmdletBinding()] param( [Parameter(ValueFromPipeline=$true, Position=0)] [string[]]$Name = '' ) process { [appdomain]::CurrentDomain.GetAssemblies() | Where { $Assembly = $_ if($Name){ $( foreach($n in $Name){ if(Resolve-Path $n -ErrorAction 0) { $n = [Regex]::Escape( (Resolve-Path $n).Path ) } $Assembly.FullName -match $n -or $Assembly.Location -match $n -or ($Assembly.Location -and (Split-Path $Assembly.Location) -match $n) } ) -contains $True } else { $true } } } } function Update-PSBoundParameters { #.Synopsis # Ensure a parameter value is set #.Description # Update-PSBoundParameters takes the name of a parameter, a default value, and optionally a min and max value, and ensures that PSBoundParameters has a value for it. #.Parameter Name # The name (key) of the parameter you want to set in PSBoundParameters #.Parameter Default # A Default value for the parameter, in case it's not already set #.Parameter Min # The Minimum allowed value for the parameter #.Parameter Max # The Maximum allowed value for the parameter #.Parameter PSBoundParameters # The PSBoundParameters you want to affect (this picks the local PSBoundParameters object, so you shouldn't have to set it) Param( [Parameter(Mandatory=$true, Position=0)] [String]$Name , [Parameter(Mandatory=$false, Position=1)] $Default , [Parameter()] $Min , [Parameter()] $Max , [Parameter(Mandatory=$true, Position=99)] $PSBoundParameters=$PSBoundParameters ) end { $outBuffer = $null ## If it's not set, and you passed a default, we set it to the default if($Default) { if (!$PSBoundParameters.TryGetValue($Name, [ref]$outBuffer)) { $PSBoundParameters[$Name] = $Default } } ## If you passed a $max, and it's set greater than $max, we set it to $max if($Max) { if ($PSBoundParameters.TryGetValue($Name, [ref]$outBuffer) -and $outBuffer -gt $Max) { $PSBoundParameters[$Name] = $Max } } ## If you passed a $min, and it's set less than $min, we set it to $min if($Min) { if ($PSBoundParameters.TryGetValue($Name, [ref]$outBuffer) -and $outBuffer -lt $Min) { $PSBoundParameters[$Name] = $Min } } $PSBoundParameters } } function Get-Constructor { <# .Synopsis Returns RuntimeConstructorInfo for the (public) constructor methods of the specified Type. .Description Get the RuntimeConstructorInfo for a type and add members "Syntax," "SimpleSyntax," and "Definition" to each one containing the syntax information that can use to call that constructor. .Parameter Type The type to get the constructor for .Parameter Force Force inclusion of Private and Static constructors which are hidden by default. .Parameter NoWarn Serves as the replacement for the broken -WarningAction. If specified, no warnings will be written for types without public constructors. .Example Get-Constructor System.IO.FileInfo Description ----------- Gets all the information about the single constructor for a FileInfo object. .Example Get-Type System.IO.*info mscorlib | Get-Constructor -NoWarn | Select Syntax Description ----------- Displays the constructor syntax for all of the *Info objects in the System.IO namespace. Using -NoWarn supresses the warning about System.IO.FileSystemInfo not having constructors. .Example $path = $pwd $driveName = $pwd.Drive $fileName = "$Profile" Get-Type System.IO.*info mscorlib | Get-Constructor -NoWarn | ForEach-Object { Invoke-Expression $_.Syntax } Description ----------- Finds and invokes the constructors for DirectoryInfo, DriveInfo, and FileInfo. Note that we pre-set the parameters for the constructors, otherwise they would fail with null arguments, so this example isn't really very practical. #> [CmdletBinding()] param( [Parameter(Mandatory=$true, ValueFromPipeline=$True, ValueFromPipelineByPropertyName=$true, Position=0)] [Alias("ParameterType")] [Type]$Type , [Switch]$Force , [Switch]$NoWarn ) process { $type.GetConstructors() | Where-Object { $Force -or $_.IsPublic -and -not $_.IsStatic } -OutVariable ctor | Select *, @{ name = "TypeName"; expression = { $_.ReflectedType.FullName } }, @{ name = "Definition"; expression = {Get-MemberSignature $_ -Simple} }, @{ name = "Syntax"; expression = {Get-MemberSignature $_ -Simple} }, @{ name = "SafeSyntax"; expression = {Get-MemberSignature $_} } if(!$ctor -and !$NoWarn) { Write-Warning "There are no public constructors for $($type.FullName)" } } } function Get-Method { <# .Synopsis Returns MethodInfo for the (public) methods of the specified Type. .Description Get the MethodInfo for a type and add members "Syntax," "SimpleSyntax," and "Definition" to each one containing the syntax information that can use to call that method. .Parameter Type The type to get methods on .Parameter Name The name(s) of the method(s) you want to retrieve (Accepts Wildcard Patterns) .Parameter Force Force inclusion of Private methods and property accessors which are hidden by default. #> [CmdletBinding(DefaultParameterSetName="Type")] param( [Parameter(ParameterSetName="Type", Mandatory=$true, ValueFromPipeline=$True, ValueFromPipelineByPropertyName=$true, Position=0)] [Type]$Type , [Parameter(Mandatory=$false, ValueFromPipelineByPropertyName=$true, Position=1)] [String[]]$Name ="*" , [Switch]$Definition , [Switch]$Force ) process { foreach($method in $type.GetMethods() + $type.GetConstructors() | Where-Object { $Force -or $_.IsPublic } | # Hide the Property accessor methods Where-Object { $Force -or !$_.IsSpecialName -or $_.Name -notmatch "^get_|^set_" } | Where-Object { $( foreach($n in $Name) { $_.Name -like $n } ) -contains $True } ) { $method | Add-Member NoteProperty TypeName -Value $($method.ReflectedType.FullName ) -Passthru | Add-Member NoteProperty Definition -Value $(Get-MemberSignature $method -Simple) -Passthru | Add-Member AliasProperty Syntax Definition -Passthru | #Add-Member NoteProperty Syntax -Value $(Get-MemberSignature $method -Simple) -Passthru | Add-Member NoteProperty SafeSyntax -Value $(Get-MemberSignature $method ) -Passthru } } } function Get-MemberSignature { [CmdletBinding()] param( [Parameter(ValueFromPipeline=$true,Mandatory=$true)] [System.Reflection.MethodBase]$MethodBase, [Switch]$Simple ) process { $parameters = $( foreach($param in $MethodBase.GetParameters()) { # Write-Host $param.ParameterType.FullName.TrimEnd('&'), $param.Name -fore cyan Write-Verbose "$($param.ParameterType.UnderlyingSystemType.FullName) - $($param.ParameterType)" if($param.ParameterType.Name.EndsWith('&')) { $ref = '[ref]' } else { $ref = '' } if($param.ParameterType.IsArray) { $array = ',' } else { $array = '' } if($Simple) { '{0} {1}' -f $param.ParameterType.ToString(), $param.Name } else { '{0}({1}[{2}]${3})' -f $ref, $array, $param.ParameterType.ToString().TrimEnd('&'), $param.Name } } ) if($MethodBase.IsConstructor) { "New-Object $($MethodBase.ReflectedType.FullName) $($parameters -join ', ')" } elseif($Simple) { "$($MethodBase.ReturnType.FullName) $($MethodBase.Name)($($parameters -join ', '))" } elseif($MethodBase.IsStatic) { "[$($MethodBase.ReturnType.FullName)] [$($MethodBase.ReflectedType.FullName)]::$($MethodBase.Name)($($parameters -join ', '))" } else { "[$($MethodBase.ReturnType.FullName)] `$$($MethodBase.ReflectedType.Name)Object.$($MethodBase.Name)($($parameters -join ', '))" } } } function Read-Choice { [CmdletBinding()] param( [Parameter(Mandatory=$true, ValueFromRemainingArguments=$true)] [hashtable[]]$Choices , [Parameter(Mandatory=$False)] [string]$Caption = "Please choose!" , [Parameter(Mandatory=$False)] [string]$Message = "Choose one of the following options:" , [Parameter(Mandatory=$False)] [int[]]$Default = 0 , [Switch]$MultipleChoice , [Switch]$Passthru ) begin { [System.Collections.DictionaryEntry[]]$choices = $choices | % { $_.GetEnumerator() } } process { $Descriptions = [System.Management.Automation.Host.ChoiceDescription[]]( $( foreach($choice in $choices) { New-Object System.Management.Automation.Host.ChoiceDescription $choice.Key,$choice.Value } ) ) if(!$MultipleChoice) { [int]$Default = $Default[0] } [int[]]$Answer = $Host.UI.PromptForChoice($Caption,$Message,$Descriptions,$Default) if($Passthru) { Write-Verbose "$Answer" Write-Output $Descriptions[$Answer] } else { Write-Output $Answer } } } function Get-Argument { param( [Type]$Target , [ref]$Method , [Array]$Arguments ) end { trap { write-error $_ break } $flags = [System.Reflection.BindingFlags]"public,ignorecase,invokemethod,instance" [Type[]]$Types = @( foreach($arg in $Arguments) { if($arg -is [type]) { $arg } else { $arg.GetType() } } ) try { Write-Verbose "[$($Target.FullName)].GetMethod('$($Method.Value)', [$($Flags.GetType())]'$flags', `$null, ([Type[]]($(@($Types|%{$_.Name}) -join ','))), `$null)" $MethodBase = $Target.GetMethod($($Method.Value), $flags, $null, $types, $null) $Arguments if($MethodBase) { $Method.Value = $MethodBase.Name } } catch { } if(!$MethodBase) { Write-Verbose "Try again to get $($Method.Value) Method on $($Target.FullName):" $MethodBase = Get-Method $target $($Method.Value) if(@($MethodBase).Count -gt 1) { $i = 0 $i = Read-Choice -Choices $(foreach($mb in $MethodBase) { @{ "$($mb.SafeSyntax) &$($i = $i+1;$i)`b`n" = $mb.SafeSyntax } }) -Default ($MethodBase.Count-1) -Caption "Choose a Method." -Message "Please choose which method overload to invoke:" [System.Reflection.MethodBase]$MethodBase = $MethodBase[$i] } ForEach($parameter in $MethodBase.GetParameters()) { $found = $false For($a =0;$a -lt $Arguments.Count;$a++) { if($argument[$a] -as $parameter.ParameterType) { Write-Output $argument[$a] if($a -gt 0 -and $a -lt $Arguments.Count) { $Arguments = $Arguments | Select -First ($a-1) -Last ($Arguments.Count -$a) } elseif($a -eq 0) { $Arguments = $Arguments | Select -Last ($Arguments.Count - 1) } else { # a -eq count $Arguments = $Arguments | Select -First ($Arguments.Count - 1) } $found = $true break } } if(!$Found) { $userInput = Read-Host "Please enter a [$($parameter.ParameterType.FullName)] value for $($parameter.Name)" if($userInput -match '^{.*}$' -and !($userInput -as $parameter.ParameterType)) { Write-Output ((Invoke-Expression $userInput) -as $parameter.ParameterType) } else { Write-Output ($userInput -as $parameter.ParameterType) } } } } } } function Invoke-Member { [CmdletBinding()] param( [parameter(position=10, valuefrompipeline=$true, mandatory=$true)] [allowemptystring()] $InputObject , [parameter(position=0, mandatory=$true)] [validatenotnullorempty()] $Member , [parameter(position=1, valuefromremainingarguments=$true)] [allowemptycollection()] $Arguments , [parameter()] [switch]$Static ) # begin { # if(!(get-member SafeSyntax -input $Member -type Property)){ # if(get-member Name -inpup $Member -Type Property) { # $Member = Get-Method $InputObject $Member.Name # } else { # $Member = Get-Method $InputObject $Member # } # } # $SafeSyntax = [ScriptBlock]::Create( $Member.SafeSyntax ) # } process { # if ($InputObject) # { # if ($InputObject | Get-Member $Member -static:$static) # { if ($InputObject -is [type]) { $target = $InputObject } else { $target = $InputObject.GetType() } if(Get-Member $Member -InputObject $InputObject -Type Properties) { $_.$Member } elseif($Member -match "ctor|constructor") { $Member = ".ctor" [System.Reflection.BindingFlags]$flags = "CreateInstance" $InputObject = $Null } else { [System.Reflection.BindingFlags]$flags = "IgnoreCase,Public,InvokeMethod" if($Static) { $flags = "$Flags,Static" } else { $flags = "$Flags,Instance" } } [ref]$Member = $Member [Object[]]$Parameters = Get-Argument $Target $Member $Arguments [string]$Member = $Member.Value Write-Verbose $(($Parameters | %{ '[' + $_.GetType().FullName + ']' + $_ }) -Join ", ") try { Write-Verbose "Invoking $Member on [$target]$InputObject with [$($Flags.GetType())]'$flags' and [$($Parameters.GetType())]($($Parameters -join ','))" Write-Verbose "[$($target.FullName)].InvokeMember('$Member', [System.Reflection.BindingFlags]'$flags', `$null, '$InputObject', ([object[]]($(($Parameters | %{ '[' + $_.GetType().FullName + ']''' + $_ + ''''}) -join', '))))" $target.InvokeMember($Member, [System.Reflection.BindingFlags]"$flags", $null, $InputObject, $Parameters) } catch { Write-Warning $_.Exception if ($_.Exception.Innerexception -is [MissingMethodException]) { write-warning "Method argument count (or type) mismatch." } } # } else { # write-warning "Method $Member not found." # } # } } } function Invoke-Generic { #.Synopsis # Invoke Generic method definitions via reflection: [CmdletBinding()] param( [Parameter(Position=0,Mandatory=$true,ValueFromPipelineByPropertyName=$true)] [Alias('On')] $InputObject , [Parameter(Position=1,ValueFromPipelineByPropertyName=$true)] [Alias('Named')] [string]$MethodName , [Parameter(Position=2)] [Alias("Types")] [Type[]]$ParameterTypes , [Parameter(Position=4, ValueFromRemainingArguments=$true, ValueFromPipelineByPropertyName=$true)] [Object[]]$WithArgs , [Switch]$Static ) begin { if($Static) { $BindingFlags = [System.Reflection.BindingFlags]"IgnoreCase,Public,Static" } else { $BindingFlags = [System.Reflection.BindingFlags]"IgnoreCase,Public,Instance" } } process { $Type = $InputObject -as [Type] if(!$Type) { $Type = $InputObject.GetType() } if($WithArgs -and -not $ParameterTypes) { $ParameterTypes = $withArgs | % { $_.GetType() } } elseif(!$ParameterTypes) { $ParameterTypes = [Type]::EmptyTypes } trap { continue } $MemberInfo = $Type.GetMethod($MethodName, $BindingFlags) if(!$MemberInfo) { $MemberInfo = $Type.GetMethod($MethodName, $BindingFlags, $null, $NonGenericArgumentTypes, $null) } if(!$MemberInfo) { $MemberInfo = $Type.GetMethods($BindingFlags) | Where-Object { $MI = $_ [bool]$Accept = $MI.Name -eq $MethodName if($Accept){ Write-Verbose "$Accept = $($MI.Name) -eq $($MethodName)" [Array]$GenericTypes = @($MI.GetGenericArguments() | Select -Expand Name) [Array]$Parameters = @($MI.GetParameters() | Add-Member ScriptProperty -Name IsGeneric -Value { $GenericTypes -Contains $this.ParameterType } -Passthru) $Accept = $ParameterTypes.Count -eq $Parameters.Count Write-Verbose " $Accept = $($Parameters.Count) Arguments" if($Accept) { for($i=0;$i -lt $Parameters.Count;$i++) { $Accept = $Accept -and ( $Parameters[$i].IsGeneric -or ($ParameterTypes[$i] -eq $Parameters[$i].ParameterType)) Write-Verbose " $Accept =$(if($Parameters[$i].IsGeneric){' GENERIC or'}) $($ParameterTypes[$i]) -eq $($Parameters[$i].ParameterType)" } } } return $Accept } | Sort { @($_.GetGenericArguments()).Count } | Select -First 1 } Write-Verbose "Time to make generic methods." Write-Verbose $MemberInfo [Type[]]$GenericParameters = @() [Array]$ConcreteTypes = @($MemberInfo.GetParameters() | Select -Expand ParameterType) for($i=0;$i -lt $ParameterTypes.Count;$i++){ Write-Verbose "$($ParameterTypes[$i]) ? $($ConcreteTypes[$i] -eq $ParameterTypes[$i])" if($ConcreteTypes[$i] -ne $ParameterTypes[$i]) { $GenericParameters += $ParameterTypes[$i] } $ParameterTypes[$i] = Add-Member -in $ParameterTypes[$i] -Type NoteProperty -Name IsGeneric -Value $($ConcreteTypes[$i] -ne $ParameterTypes[$i]) -Passthru } $ParameterTypes | Where-Object { $_.IsGeneric } Write-Verbose "$($GenericParameters -join ', ') generic parameters" $MemberInfo = $MemberInfo.MakeGenericMethod( $GenericParameters ) Write-Verbose $MemberInfo if($WithArgs) { [Object[]]$Arguments = $withArgs | %{ $_.PSObject.BaseObject } Write-Verbose "Arguments: $(($Arguments | %{ $_.GetType().Name }) -Join ', ')" $MemberInfo.Invoke( $InputObject, $Arguments ) } else { $MemberInfo.Invoke( $InputObject ) } } } # get a reference to the Type $xlr8r = [psobject].assembly.gettype("System.Management.Automation.TypeAccelerators") function Import-Namespace { [CmdletBinding()] param( [Parameter(ValueFromPipeline=$true)] [string]$Namespace , [Switch]$Force ) Get-Type -Namespace $Namespace -Force:$Force | Add-Accelerator } function Add-Accelerator { <# .Synopsis Add a type accelerator to the current session .Description The Add-Accelerator function allows you to add a simple type accelerator (like [regex]) for a longer type (like [System.Text.RegularExpressions.Regex]). .Example Add-Accelerator list System.Collections.Generic.List``1 $list = New-Object list[string] Creates an accelerator for the generic List[T] collection type, and then creates a list of strings. .Example Add-Accelerator "List T", "GList" System.Collections.Generic.List``1 $list = New-Object "list t[string]" Creates two accelerators for the Generic List[T] collection type. .Parameter Accelerator The short form accelerator should be just the name you want to use (without square brackets). .Parameter Type The type you want the accelerator to accelerate (without square brackets) .Notes When specifying multiple values for a parameter, use commas to separate the values. For example, "-Accelerator string, regex". PowerShell requires arguments that are "types" to NOT have the square bracket type notation, because of the way the parsing engine works. You can either just type in the type as System.Int64, or you can put parentheses around it to help the parser out: ([System.Int64]) Also see the help for Get-Accelerator and Remove-Accelerator .Link http://huddledmasses.org/powershell-2-ctp3-custom-accelerators-finally/ #> [CmdletBinding()] param( [Parameter(Position=0,ValueFromPipelineByPropertyName=$true)] [Alias("Key","Name")] [string[]]$Accelerator , [Parameter(Position=1,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)] [Alias("Value","FullName")] [type]$Type ) process { # add a user-defined accelerator foreach($a in $Accelerator) { if($xlr8r::AddReplace) { $xlr8r::AddReplace( $a, $Type) } else { $null = $xlr8r::Remove( $a ) $xlr8r::Add( $a, $Type) } trap [System.Management.Automation.MethodInvocationException] { if($xlr8r::get.keys -contains $a) { if($xlr8r::get[$a] -ne $Type) { Write-Error "Cannot add accelerator [$a] for [$($Type.FullName)]`n [$a] is already defined as [$($xlr8r::get[$a].FullName)]" } Continue; } throw } } } } function Get-Accelerator { <# .Synopsis Get one or more type accelerator definitions .Description The Get-Accelerator function allows you to look up the type accelerators (like [regex]) defined on your system by their short form or by type .Example Get-Accelerator System.String Returns the KeyValue pair for the [System.String] accelerator(s) .Example Get-Accelerator ps*,wmi* Returns the KeyValue pairs for the matching accelerator definition(s) .Parameter Accelerator One or more short form accelerators to search for (Accept wildcard characters). .Parameter Type One or more types to search for. .Notes When specifying multiple values for a parameter, use commas to separate the values. For example, "-Accelerator string, regex". Also see the help for Add-Accelerator and Remove-Accelerator .Link http://huddledmasses.org/powershell-2-ctp3-custom-accelerators-finally/ #> [CmdletBinding(DefaultParameterSetName="ByType")] param( [Parameter(Position=0, ParameterSetName="ByAccelerator", ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [Alias("Key","Name")] [string[]]$Accelerator , [Parameter(Position=0, ParameterSetName="ByType", ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [Alias("Value","FullName")] [type[]]$Type ) process { # add a user-defined accelerator switch($PSCmdlet.ParameterSetName) { "ByAccelerator" { $xlr8r::get.GetEnumerator() | % { foreach($a in $Accelerator) { if($_.Key -like $a) { $_ } } } break } "ByType" { if($Type -and $Type.Count) { $xlr8r::get.GetEnumerator() | ? { $Type -contains $_.Value } } else { $xlr8r::get.GetEnumerator() | %{ $_ } } break } } } } function Remove-Accelerator { <# .Synopsis Remove a type accelerator from the current session .Description The Remove-Accelerator function allows you to remove a simple type accelerator (like [regex]) from the current session. You can pass one or more accelerators, and even wildcards, but you should be aware that you can remove even the built-in accelerators. .Example Remove-Accelerator int Add-Accelerator int Int64 Removes the "int" accelerator for Int32 and adds a new one for Int64. I can't recommend doing this, but it's pretty cool that it works: So now, "$(([int]3.4).GetType().FullName)" would return "System.Int64" .Example Get-Accelerator System.Single | Remove-Accelerator Removes both of the default accelerators for System.Single: [float] and [single] .Example Get-Accelerator System.Single | Remove-Accelerator -WhatIf Demonstrates that Remove-Accelerator supports -Confirm and -Whatif. Will Print: What if: Removes the alias [float] for type [System.Single] What if: Removes the alias [single] for type [System.Single] .Parameter Accelerator The short form accelerator that you want to remove (Accept wildcard characters). .Notes When specifying multiple values for a parameter, use commas to separate the values. For example, "-Accel string, regex". Also see the help for Add-Accelerator and Get-Accelerator .Link http://huddledmasses.org/powershell-2-ctp3-custom-accelerators-finally/ #> [CmdletBinding(SupportsShouldProcess=$true)] param( [Parameter(Position=0, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [Alias("Key","FullName")] [string[]]$Accelerator ) process { foreach($a in $Accelerator) { foreach($key in $xlr8r::Get.Keys -like $a) { if($PSCmdlet.ShouldProcess( "Removes the alias [$($Key)] for type [$($xlr8r::Get[$key].FullName)]", "Remove the alias [$($Key)] for type [$($xlr8r::Get[$key].FullName)]?", "Removing Type Accelerator" )) { # remove a user-defined accelerator $xlr8r::remove($key) } } } } } ############################################################################### ##### Imported from PowerBoots $Script:CodeGenContentProperties = 'Content','Child','Children','Frames','Items','Pages','Blocks','Inlines','GradientStops','Source','DataPoints', 'Series', 'VisualTree' $DependencyProperties = @{} if(Test-Path $PSScriptRoot\\DependencyPropertyCache.xml) { #$DependencyProperties = [System.Windows.Markup.XamlReader]::Parse( (gc $PSScriptRoot\\DependencyPropertyCache.xml) ) $DependencyProperties = Import-CliXml $PSScriptRoot\\DependencyPropertyCache.xml } function Get-ReflectionModule { $executioncontext.sessionstate.module } function Set-ObjectProperties { [CmdletBinding()] param( $Parameters, [ref]$DObject ) if($DObject.Value -is [System.ComponentModel.ISupportInitialize]) { $DObject.Value.BeginInit() } if($DebugPreference -ne "SilentlyContinue") { Write-Host; Write-Host ">>>> $($Dobject.Value.GetType().FullName)" -fore Black -back White } foreach ($param in $Parameters) { if($DebugPreference -ne "SilentlyContinue") { Write-Host "Processing Param: $($param|Out-String )" } ## INGORE DEPENDENCY PROPERTIES FOR NOW :) if($param.Key -eq "DependencyProps") { ## HANDLE EVENTS .... } elseif ($param.Key.StartsWith("On_")) { $EventName = $param.Key.SubString(3) if($DebugPreference -ne "SilentlyContinue") { Write-Host "Event handler $($param.Key) Type: $(@($param.Value)[0].GetType().FullName)" } $sb = $param.Value -as [ScriptBlock] if(!$sb) { $sb = (Get-Command $param.Value -CommandType Function,ExternalScript).ScriptBlock } $Dobject.Value."Add_$EventName".Invoke( $sb ); # $Dobject.Value."Add_$EventName".Invoke( ($sb.GetNewClosure()) ); # $Dobject.Value."Add_$EventName".Invoke( $PSCmdlet.MyInvocation.MyCommand.Module.NewBoundScriptBlock( $sb.GetNewClosure() ) ); } ## HANDLE PROPERTIES .... else { try { ## TODO: File a BUG because Write-DEBUG and Write-VERBOSE die here. if($DebugPreference -ne "SilentlyContinue") { Write-Host "Setting $($param.Key) of $($Dobject.Value.GetType().Name) to $($param.Value.GetType().FullName): $($param.Value)" -fore Gray } if(@(foreach($sb in $param.Value) { $sb -is [ScriptBlock] }) -contains $true) { $Values = @() foreach($sb in $param.Value) { $Values += & (Get-ReflectionModule) $sb } } else { $Values = $param.Value } if($DebugPreference -ne "SilentlyContinue") { Write-Host ([System.Windows.Markup.XamlWriter]::Save( $Dobject.Value )) -foreground green } if($DebugPreference -ne "SilentlyContinue") { Write-Host ([System.Windows.Markup.XamlWriter]::Save( @($Values)[0] )) -foreground green } Set-Property $Dobject $Param.Key $Values if($DebugPreference -ne "SilentlyContinue") { Write-Host ([System.Windows.Markup.XamlWriter]::Save( $Dobject.Value )) -foreground magenta } if($DebugPreference -ne "SilentlyContinue") { if( $Dobject.Value.$($param.Key) -ne $null ) { Write-Host $Dobject.Value.$($param.Key).GetType().FullName -fore Green } } } catch [Exception] { Write-Host "COUGHT AN EXCEPTION" -fore Red Write-Host $_ -fore Red Write-Host $this -fore DarkRed } } while($DependencyProps) { $name, $value, $DependencyProps = $DependencyProps $name = ([string]@($name)[0]).Trim("-") if($name -and $value) { Set-DependencyProperty -Element $Dobject.Value -Property $name -Value $Value } } } if($DebugPreference -ne "SilentlyContinue") { Write-Host "<<<< $($Dobject.Value.GetType().FullName)" -fore Black -back White; Write-Host } if($DObject.Value -is [System.ComponentModel.ISupportInitialize]) { $DObject.Value.EndInit() } } function Set-Property { PARAM([ref]$TheObject, $Name, $Values) $DObject = $TheObject.Value if($DebugPreference -ne "SilentlyContinue") { Write-Host ([System.Windows.Markup.XamlWriter]::Save( $DObject )) -foreground DarkMagenta } if($DebugPreference -ne "SilentlyContinue") { Write-Host ([System.Windows.Markup.XamlWriter]::Save( @($Values)[0] )) -foreground DarkMagenta } $PropertyType = $DObject.GetType().GetProperty($Name).PropertyType if('System.Windows.FrameworkElementFactory' -as [Type] -and $PropertyType -eq [System.Windows.FrameworkElementFactory] -and $DObject -is [System.Windows.FrameworkTemplate]) { if($DebugPreference -ne "SilentlyContinue") { Write-Host "Loading a FrameworkElementFactory" -foreground Green} # [Xml]$Template = [PoshWpf.XamlHelper]::ConvertToXaml( $DObject ) # [Xml]$Content = [PoshWpf.XamlHelper]::ConvertToXaml( (@($Values)[0]) ) # In .Net 3.5 the recommended way to programmatically create a template is to load XAML from a string or a memory stream using the Load method of the XamlReader class. [Xml]$Template = [System.Windows.Markup.XamlWriter]::Save( $DObject ) [Xml]$Content = [System.Windows.Markup.XamlWriter]::Save( (@($Values)[0]) ) $Template.DocumentElement.PrependChild( $Template.ImportNode($Content.DocumentElement, $true) ) | Out-Null $TheObject.Value = [System.Windows.Markup.XamlReader]::Parse( $Template.get_OuterXml() ) } elseif('System.Windows.Data.Binding' -as [Type] -and @($Values)[0] -is [System.Windows.Data.Binding] -and !$PropertyType.IsAssignableFrom([System.Windows.Data.BindingBase])) { $Binding = @($Values)[0]; if($DebugPreference -ne "SilentlyContinue") { Write-Host "$($DObject.GetType())::$Name is $PropertyType and the value is a Binding: $Binding" -fore Cyan} if(!$Binding.Source -and !$Binding.ElementName) { $Binding.Source = $DObject.DataContext } if($DependencyProperties.ContainsKey($Name)) { $field = @($DependencyProperties.$Name.Keys | Where { $DObject -is $_ -and $PropertyType -eq ([type]$DependencyProperties.$Name.$_.PropertyType)})[0] # -or -like "*$Class" -and ($Param1.Value -as ([type]$_.PropertyType) if($field) { if($DebugPreference -ne "SilentlyContinue") { Write-Host "$($field)" -fore Blue } if($DebugPreference -ne "SilentlyContinue") { Write-Host "Binding: ($field)::`"$($DependencyProperties.$Name.$field.Name)`" to $Binding" -fore Blue} $DObject.SetBinding( ([type]$field)::"$($DependencyProperties.$Name.$field.Name)", $Binding ) | Out-Null } else { throw "Couldn't figure out $( @($DependencyProperties.$Name.Keys) -join ', ' )" } } else { if($DebugPreference -ne "SilentlyContinue") { Write-Host "But $($DObject.GetType())::${Name}Property is not a Dependency Property, so it probably can't be bound?" -fore Cyan } try { $DObject.SetBinding( ($DObject.GetType()::"${Name}Property"), $Binding ) | Out-Null if($DebugPreference -ne "SilentlyContinue") { Write-Host ([System.Windows.Markup.XamlWriter]::Save( $Dobject )) -foreground yellow } } catch { Write-Host "Nope, was not able to set it." -fore Red Write-Host $_ -fore Red Write-Host $this -fore DarkRed } } } elseif($PropertyType -ne [Object] -and $PropertyType.IsAssignableFrom( [System.Collections.IEnumerable] ) -and ($DObject.$($Name) -eq $null)) { if($Values -is [System.Collections.IEnumerable]) { if($DebugPreference -ne "SilentlyContinue") { Write-Host "$Name is $PropertyType which is IEnumerable, and the value is too!" -fore Cyan } $DObject.$($Name) = $Values } else { if($DebugPreference -ne "SilentlyContinue") { Write-Host "$Name is $PropertyType which is IEnumerable, but the value is not." -fore Cyan } $DObject.$($Name) = new-object "System.Collections.ObjectModel.ObservableCollection[$(@($Values)[0].GetType().FullName)]" $DObject.$($Name).Add($Values) } } elseif($DObject.$($Name) -is [System.Collections.IList]) { foreach ($value in @($Values)) { try { $null = $DObject.$($Name).Add($value) } catch { # Write-Host "CAUGHT array problem" -fore Red if($_.Exception.Message -match "Invalid cast from 'System.String' to 'System.Windows.UIElement'.") { $null = $DObject.$($Name).Add( (New-System.Windows.Controls.TextBlock $value) ) } else { Write-Error $_.Exception throw } } } } else { ## If they pass an array of 1 when we only want one, we just use the first value if($Values -is [System.Collections.IList] -and $Values.Count -eq 1) { if($DebugPreference -ne "SilentlyContinue") { Write-Host "Value is an IList ($($Values.GetType().FullName))" -fore Cyan} if($DebugPreference -ne "SilentlyContinue") { Write-Host "But we'll just use the first ($($Values[0].GetType().FullName))" -fore Cyan} if($DebugPreference -ne "SilentlyContinue") { Write-Host ([System.Windows.Markup.XamlWriter]::Save( $Values[0] )) -foreground White} try { $DObject.$($Name) = $Values[0] } catch [Exception] { # Write-Host "CAUGHT collection value problem" -fore Red if($_.Exception.Message -match "Invalid cast from 'System.String' to 'System.Windows.UIElement'.") { $null = $DObject.$($Name).Add( (TextBlock $Values[0]) ) }else { throw } } } else ## If they pass an array when we only want one, we try to use it, and failing that, cast it to strings { if($DebugPreference -ne "SilentlyContinue") { Write-Host "Value is just $Values" -fore Cyan} try { $DObject.$($Name) = $Values } catch [Exception] { # Write-Host "CAUGHT value problem" -fore Red if($_.Exception.Message -match "Invalid cast from 'System.String' to 'System.Windows.UIElement'.") { $null = $DObject.$($Name).Add( (TextBlock $values) ) }else { throw } } } } } function Set-DependencyProperty { [CmdletBinding()] PARAM( [Parameter(Position=0,Mandatory=$true)] $Property , [Parameter(Mandatory=$true,ValueFromPipeline=$true)] $Element , [Parameter()] [Switch]$Passthru ) DYNAMICPARAM { $paramDictionary = new-object System.Management.Automation.RuntimeDefinedParameterDictionary $Param1 = new-object System.Management.Automation.RuntimeDefinedParameter $Param1.Name = "Value" # $Param1.Attributes.Add( (New-ParameterAttribute -Position 1) ) $Param1.Attributes.Add( (New-Object System.Management.Automation.ParameterAttribute -Property @{ Position = 1 }) ) if( $Property ) { if($Property.GetType() -eq ([System.Windows.DependencyProperty]) -or $Property.GetType().IsSubclassOf(([System.Windows.DependencyProperty]))) { $Param1.ParameterType = $Property.PropertyType } elseif($Property -is [string] -and $Property.Contains(".")) { $Class,$Property = $Property.Split(".") if($DependencyProperties.ContainsKey($Property)){ $type = $DependencyProperties.$Property.Keys -like "*$Class" if($type) { $Param1.ParameterType = [type]@($DependencyProperties.$Property.$type)[0].PropertyType } } } elseif($DependencyProperties.ContainsKey($Property)){ if($Element) { if($DependencyProperties.$Property.ContainsKey( $element.GetType().FullName )) { $Param1.ParameterType = [type]$DependencyProperties.$Property.($element.GetType().FullName).PropertyType } } else { $Param1.ParameterType = [type]$DependencyProperties.$Property.Values[0].PropertyType } } else { $Param1.ParameterType = [PSObject] } } else { $Param1.ParameterType = [PSObject] } $paramDictionary.Add("Value", $Param1) return $paramDictionary } PROCESS { trap { Write-Host "ERROR Setting Dependency Property" -Fore Red Write-Host "Trying to set $Property to $($Param1.Value)" -Fore Red continue } if($Property.GetType() -eq ([System.Windows.DependencyProperty]) -or $Property.GetType().IsSubclassOf(([System.Windows.DependencyProperty])) ){ trap { Write-Host "ERROR Setting Dependency Property" -Fore Red Write-Host "Trying to set $($Property.FullName) to $($Param1.Value)" -Fore Red continue } $Element.SetValue($Property, ($Param1.Value -as $Property.PropertyType)) } else { if("$Property".Contains(".")) { $Class,$Property = "$Property".Split(".") } if( $DependencyProperties.ContainsKey("$Property" ) ) { $fields = @( $DependencyProperties.$Property.Keys -like "*$Class" | ? { $Param1.Value -as ([type]$DependencyProperties.$Property.$_.PropertyType) } ) if($fields.Count -eq 0 ) { $fields = @($DependencyProperties.$Property.Keys -like "*$Class" ) } if($fields.Count) { $success = $false foreach($field in $fields) { trap { Write-Host "ERROR Setting Dependency Property" -Fore Red Write-Host "Trying to set $($field)::$($DependencyProperties.$Property.$field.Name) to $($Param1.Value) -as $($DependencyProperties.$Property.$field.PropertyType)" -Fore Red continue } $Element.SetValue( ([type]$field)::"$($DependencyProperties.$Property.$field.Name)", ($Param1.Value -as ([type]$DependencyProperties.$Property.$field.PropertyType))) if($?) { $success = $true; break } } if(!$success) { throw "food" } } else { Write-Host "Couldn't find the right property: $Class.$Property on $( $Element.GetType().Name ) of type $( $Param1.Value.GetType().FullName )" -Fore Red } } else { Write-Host "Unknown Dependency Property Key: $Property on $($Element.GetType().Name)" -Fore Red } } if( $Passthru ) { $Element } } } Add-Type -Assembly WindowsBase function Add-ConstructorFunction { <# .Synopsis Add support for a new class by creating the dynamic constructor function(s). .Description Creates a New-Namespace.Type function for each type passed in, as well as a short form "Type" alias. Exposes all of the properties and events of the type as perameters to the function. NOTE: The Type MUST have a default parameterless constructor. .Parameter Assembly The Assembly you want to generate constructors for. All public types within it will be generated if possible. .Parameter Type The type you want to create a constructor function for. It must have a default parameterless constructor. .Example Add-ConstructorFunction System.Windows.Controls.Button Creates a new function for the Button control. .Example [Reflection.Assembly]::LoadWithPartialName( "PresentationFramework" ).GetTypes() | Add-ConstructorFunction Will create constructor functions for all the WPF components in the PresentationFramework assembly. Note that you could also load that assembly using GetAssembly( "System.Windows.Controls.Button" ) or Load( "PresentationFramework, Version=3.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35" ) .Example Add-ConstructorFunction -Assembly PresentationFramework Will create constructor functions for all the WPF components in the PresentationFramework assembly. .Links http://HuddledMasses.org/powerboots .ReturnValue The name(s) of the function(s) created -- so you can export them, if necessary. .Notes AUTHOR: Joel Bennett http://HuddledMasses.org LASTEDIT: 2009-01-13 16:35:23 #> [CmdletBinding(DefaultParameterSetName="FromType")] PARAM( [Parameter(Position=0,ValueFromPipeline=$true,ParameterSetName="FromType",Mandatory=$true)] [type[]]$type , [Alias("FullName")] [Parameter(Position=0,ValueFromPipelineByPropertyName=$true,ParameterSetName="FromAssembly",Mandatory=$true)] [string[]]$Assembly , [Parameter()] [string]$Path = "$PSScriptRoot\\Types_Generated" , [switch]$Force , [switch]$ShortAliases , [Switch]$Quiet ) BEGIN { [Type[]]$Empty=@() if(!(Test-Path $Path)) { MkDir $Path } $ErrorList = @() } END { #Set-Content -Literal $PSScriptRoot\\DependencyPropertyCache.xml -Value ([System.Windows.Markup.XamlWriter]::Save( $DependencyProperties )) Export-CliXml -Path $PSScriptRoot\\DependencyPropertyCache.xml -InputObject $DependencyProperties if($ErrorList.Count) { Write-Warning "Some New-* functions not aliased." } $ErrorList | Write-Error } PROCESS { if($PSCmdlet.ParameterSetName -eq "FromAssembly") { [type[]]$type = @() foreach($lib in $Assembly) { $asm = $null trap { continue } if(Test-Path $lib) { $asm = [Reflection.Assembly]::LoadFrom( (Convert-Path (Resolve-Path $lib -EA "SilentlyContinue") -EA "SilentlyContinue") ) } if(!$asm) { ## BUGBUG: LoadWithPartialName is "Obsolete" -- but it still works in 2.0/3.5 $asm = [Reflection.Assembly]::LoadWithPartialName( $lib ) } if($asm) { $type += $asm.GetTypes() | ?{ $_.IsPublic -and !$_.IsEnum -and !$_.IsAbstract -and !$_.IsInterface -and $_.GetConstructor( "Instance,Public", $Null, $Empty, @() )} } else { Write-Error "Can't find the assembly $lib, please check your spelling and try again" } } } foreach($T in $type) { $TypeName = $T.FullName $ScriptPath = Join-Path $Path "New-$TypeName.ps1" Write-Verbose $TypeName ## Collect all dependency properties .... $T.GetFields() | Where-Object { $_.FieldType -eq [System.Windows.DependencyProperty] } | ForEach-Object { [string]$Field = $_.DeclaringType::"$($_.Name)".Name [string]$TypeName = $_.DeclaringType.FullName if(!$DependencyProperties.ContainsKey( $Field )) { $DependencyProperties.$Field = @{} } $DependencyProperties.$Field.$TypeName = @{ Name = [string]$_.Name PropertyType = [string]$_.DeclaringType::"$($_.Name)".PropertyType.FullName } } if(!( Test-Path $ScriptPath ) -OR $Force) { $Pipelineable = @(); ## Get (or generate) a set of parameters based on the the Type Name $PropertyNames = New-Object System.Text.StringBuilder "@(" $Parameters = New-Object System.Text.StringBuilder "[CmdletBinding(DefaultParameterSetName='Default')]`nPARAM(`n" ## Add all properties $Properties = $T.GetProperties("Public,Instance,FlattenHierarchy") | Where-Object { $_.CanWrite -Or $_.PropertyType.GetInterface([System.Collections.IList]) } $Properties = ($T.GetEvents("Public,Instance,FlattenHierarchy") + $Properties) | Sort-Object Name -Unique foreach ($p in $Properties) { $null = $PropertyNames.AppendFormat(",'{0}'",$p.Name) switch( $p.MemberType ) { Event { $null = $PropertyNames.AppendFormat(",'{0}__'",$p.Name) $null = $Parameters.AppendFormat(@' [Parameter()] [PSObject]${{On_{0}}} , '@, $p.Name) } Property { if($p.Name -match "^$($CodeGenContentProperties -Join '$|^')`$") { $null = $Parameters.AppendFormat(@' [Parameter(Position=1,ValueFromPipeline=$true)] [Object[]]${{{0}}} , '@, $p.Name) $Pipelineable += @(Add-Member -in $p.Name -Type NoteProperty -Name "IsCollection" -Value $($p.PropertyType.GetInterface([System.Collections.IList]) -ne $null) -Passthru) } elseif($p.PropertyType -eq [System.Boolean]) { $null = $Parameters.AppendFormat(@' [Parameter()] [Switch]${{{0}}} , '@, $p.Name) } else { $null = $Parameters.AppendFormat(@' [Parameter()] [Object[]]${{{0}}} , '@, $p.Name) } } } } $null = $Parameters.Append(' [Parameter(ValueFromRemainingArguments=$true)] [string[]]$DependencyProps )') $null = $PropertyNames.Remove(2,1).Append(')') $collectable = [bool]$(@(foreach($p in @($Pipelineable)){$p.IsCollection}) -contains $true) $ofs = "`n"; $function = $( " if(!( '$TypeName' -as [Type] )) { $( if( $T.Assembly.GlobalAssemblyCache ) { " `$null = [Reflection.Assembly]::Load( '$($T.Assembly.FullName)' ) " } else { " `$null = [Reflection.Assembly]::LoadFrom( '$($T.Assembly.Location)' ) " } ) } ## if(`$ExecutionContext.SessionState.Module.Guid -ne (Get-ReflectionModule).Guid) { ## Write-Warning `"$($T.Name) not invoked in ReflectionModule context. Attempting to reinvoke.`" ## # `$scriptParam = `$PSBoundParameters ## # return iex `"& (Get-ReflectionModule) '`$(`$MyInvocation.MyCommand.Path)' ```@PSBoundParameters`" ## } Write-Verbose ""$($T.Name) in module `$(`$executioncontext.sessionstate.module) context!"" function New-$TypeName { <# .Synopsis Create a new $($T.Name) object .Description Generates a new $TypeName object, and allows setting all of it's properties. (From the $($T.Assembly.GetName().Name) assembly v$($T.Assembly.GetName().Version)) .Notes GENERATOR : $((Get-ReflectionModule).Name) v$((Get-ReflectionModule).Version) by Joel Bennett http://HuddledMasses.org GENERATED : $(Get-Date) ASSEMBLY : $($T.Assembly.FullName) FULLPATH : $($T.Assembly.Location) #> $Parameters BEGIN { `$DObject = New-Object $TypeName `$All = $PropertyNames } PROCESS { " if(!$collectable) { " # The content of $TypeName is not a collection # So if we're in a pipeline, make a new $($T.Name) each time if(`$_) { `$DObject = New-Object $TypeName } " } @' foreach($key in @($PSBoundParameters.Keys) | where { $PSBoundParameters[$_] -is [ScriptBlock] }) { $PSBoundParameters[$key] = $PSBoundParameters[$key].GetNewClosure() } Set-ObjectProperties @($PSBoundParameters.GetEnumerator() | Where { [Array]::BinarySearch($All,($_.Key -replace "^On_(.*)",'$1__')) -ge 0 } ) ([ref]$DObject) '@ if(!$collectable) { @' Microsoft.PowerShell.Utility\\Write-Output $DObject } #Process '@ } else { @' } #Process END { Microsoft.PowerShell.Utility\\Write-Output $DObject } '@ } @" } ## New-$TypeName `@PSBoundParameters "@ ) Set-Content -Path $ScriptPath -Value $Function } # Note: set the aliases global for now, because it's too late to export them # E.g.: New-Button = New-System.Windows.Controls.Button Set-Alias -Name "New-$($T.Name)" "New-$TypeName" -ErrorAction SilentlyContinue -ErrorVariable +ErrorList -Scope Global -Passthru:(!$Quiet) if($ShortAliases) { # E.g.: Button = New-System.Windows.Controls.Button Set-Alias -Name $T.Name "New-$TypeName" -ErrorAction SilentlyContinue -ErrorVariable +ErrorList -Scope Global -Passthru:(!$Quiet) } New-AutoLoad -Name $ScriptPath -Alias "New-$TypeName" } }#PROCESS } function Import-ConstructorFunctions { #.Synopsis # Autoload pre-generated constructor functions and generate aliases for them. #.Description # Parses the New-* scripts in the specified path, and uses the Autoload module to pre-load them as commands and set up aliases for them, without parsing them into memory. #.Parameter Path # The path to a folder with functions to preload param( [Parameter()] [Alias("PSPath")] [string[]]$Path = "$PSScriptRoot\\Types_Generated" ) end { $Paths = $(foreach($p in $Path) { Join-Path $p "New-*.ps1" }) Write-Verbose "Importing Constructors from: `n`t$($Paths -join "`n`t")" foreach($script in Get-ChildItem $Paths -ErrorAction 0) { $TypeName = $script.Name -replace 'New-(.*).ps1','$1' $ShortName = ($TypeName -split '\\.')[-1] Write-Verbose "Importing constructor for type: $TypeName ($ShortName)" # Note: set the aliases global for now, because it's too late to export them # E.g.: New-Button = New-System.Windows.Controls.Button Set-Alias -Name "New-$ShortName" "New-$TypeName" -ErrorAction SilentlyContinue -ErrorVariable +ErrorList -Scope Global -Passthru:(!$Quiet) if($ShortAliases) { # E.g.: Button = New-System.Windows.Controls.Button Set-Alias -Name $ShortName "New-$TypeName" -ErrorAction SilentlyContinue -ErrorVariable +ErrorList -Scope Global -Passthru:(!$Quiet) } New-Autoload -Name $Script.FullName -Alias "New-$TypeName" # Write-Host -fore yellow $(Get-Command "New-$TypeName" | Out-String) Get-Command "New-$TypeName" } } } #.Parameter Snapin # The full path to where the snapin .dll is #.Parameter OutputPath # Force the module manifest(s) to output in a different location than where the snapin .dll is #.Parameter ModuleName # Override the snapin name(s) for the module manifest #.Parameter Author # Overrides the Company Name from the manifest when generating the module's "Author" comment #.Parameter Passthru # Returns the ModuleManifest (same as -Passthru on New-ModuleManifest) #.Example # New-ModuleManifestFromSnapin ".\\Quest Software\\Management Shell for AD" -ModuleName QAD # # Description # ----------- # Generates a new module manifest file: QAD.psd1 in the folder next to the Quest.ActiveRoles.ArsPowerShellSnapIn.dll #.Example # New-ModuleManifestFromSnapin "C:\\Program Files (x86)\\Microsoft SQL Server\\100\\Tools\\Binn\\" -Output $pwd # # Description # ----------- # Generates module manifest files for the SqlServer PSSnapins and stores them in the current folder function New-ModuleManifestFromSnapin { param( [Parameter(Mandatory=$true, Position="0", ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)] [Alias("FullName")] [String[]]$Snapin , [Parameter()] $OutputPath , [Parameter()] $ModuleName , [Parameter()] [String]$Author , [Switch]$Passthru ) # $SnapinPath = $(Get-ChildItem $SnapinPath -Filter *.dll) $EAP = $ErrorActionPreference $ErrorActionPreference = "SilentlyContinue" Add-Assembly $Snapin $ErrorActionPreference = $EAP $SnapinTypes = Get-Assembly $Snapin | Get-Type -BaseType System.Management.Automation.PSSnapIn, System.Management.Automation.CustomPSSnapIn -WarningAction SilentlyContinue foreach($SnapinType in $SnapinTypes) { $Installer = New-Object $SnapinType if(!$PSBoundParameters.ContainsKey("OutputPath")) { $OutputPath = (Split-Path $SnapinType.Assembly.Location) } if(!$PSBoundParameters.ContainsKey("ModuleName")) { $ModuleName = $Installer.Vendor } if(!$PSBoundParameters.ContainsKey("Author")) { $Author = $Installer.Name } $ManifestPath = (Join-Path $OutputPath "$ModuleName.psd1") Write-Verbose "Creating Module Manifest: $ManifestPath" $RequiredAssemblies = @( $SnapinType.Assembly.GetReferencedAssemblies() | Get-Assembly | Where-Object { (Split-Path $_.Location) -eq (Split-Path $SnapinType.Assembly.Location) } | Select-Object -Expand Location | Resolve-Path -ErrorAction Continue) # New-ModuleManifest has a bad bug -- it makes paths relative to the current location (and it does it wrong). Push-Location $OutputPath if($Installer -is [System.Management.Automation.CustomPSSnapIn]) { $Cmdlets = $Installer.Cmdlets | Select-Object -Expand Name $Types = $Installer.Types | Select-Object -Expand FileName | %{ $path = Resolve-Path $_ -ErrorAction Continue; if(!$path){ $_ } else { $path } } $Formats = $Installer.Formats | Select-Object -Expand FileName | %{ $path = Resolve-Path $_ -ErrorAction Continue; if(!$path){ $_ } else { $path } } } else { $Types = $Installer.Types | %{ $path = Resolve-Path $_ -ErrorAction Continue; if(!$path){ $_ } else { $path } } $Formats = $Installer.Formats | %{ $path = Resolve-Path $_ -ErrorAction Continue; if(!$path){ $_ } else { $path } } } if(!$Cmdlets) { $Cmdlets = "*" } if(!$Types) { $Types = @() } if(!$Formats) { $Formats = @() } New-ModuleManifest -Path $ManifestPath -Author $Author -Company $Installer.Vendor -Description $Installer.Description ` -ModuleToProcess $SnapinType.Assembly.Location -Types $Types -Formats $Formats -Cmdlets $Cmdlets ` -RequiredAssemblies $RequiredAssemblies -Passthru:$Passthru ` -NestedModules @() -Copyright $Installer.Vendor -FileList @() Pop-Location } } Add-Accelerator list System.Collections.Generic.List``1 Add-Accelerator dictionary System.Collections.Generic.Dictionary``2 Set-Alias aasm Add-Assembly Set-Alias gt Get-Type Set-Alias gasm Get-Assembly Set-Alias gctor Get-Constructor
combined_dataset/train/non-malicious/sample_60_90.ps1
sample_60_90.ps1
<# # .DESCRIPTION # Run powershell scripts using scheduled task. # # .PARAMETER taskName # The task name. # # .PARAMETER script # The inlined script to execute on remote machine. # #> $ScriptFile = Join-Path -Path $env:LocalAppData -ChildPath "$taskName.ps1" $ResultFile = Join-Path -Path $env:temp -ChildPath "$taskName.log" if (Test-Path $ResultFile) { Remove-Item $ResultFile } $Script | Out-File $ScriptFile if (-Not(Test-Path $ScriptFile)) { $message = "Failed to create file:" + $ScriptFile Write-Error $message return #If failed to create script file, no need continue just return here } #Create a scheduled task $User = [Security.Principal.WindowsIdentity]::GetCurrent() $Role = (New-Object Security.Principal.WindowsPrincipal $User).IsInRole([Security.Principal.WindowsBuiltinRole]::Administrator) $arg = "-NoProfile -NoLogo -NonInteractive -ExecutionPolicy Bypass -c $ScriptFile" if(!$Role) { Write-Warning "To perform some operations you must run an elevated Windows PowerShell console." } $Scheduler = New-Object -ComObject Schedule.Service #Try to connect to schedule service 3 time since it may fail the first time for ($i=1; $i -le 3; $i++) { Try { $Scheduler.Connect() Break } Catch { if($i -ge 3) { Write-EventLog -LogName Application -Source "SME Register $taskName" -EntryType Error -EventID 1 -Message "Can't connect to Schedule service" Write-Error "Can't connect to Schedule service" -ErrorAction Stop } else { Start-Sleep -s 1 } } } $RootFolder = $Scheduler.GetFolder("\") #Delete existing task if($RootFolder.GetTasks(0) | Where-Object {$_.Name -eq $TaskName}) { Write-Debug("Deleting existing task" + $TaskName) $RootFolder.DeleteTask($TaskName,0) } $Task = $Scheduler.NewTask(0) $RegistrationInfo = $Task.RegistrationInfo $RegistrationInfo.Description = $TaskName $RegistrationInfo.Author = $User.Name $Triggers = $Task.Triggers $Trigger = $Triggers.Create(7) #TASK_TRIGGER_REGISTRATION: Starts the task when the task is registered. $Trigger.Enabled = $true $Settings = $Task.Settings $Settings.Enabled = $True $Settings.StartWhenAvailable = $True $Settings.Hidden = $False $Settings.ExecutionTimeLimit = "PT20M" # 20 minutes $Action = $Task.Actions.Create(0) $Action.Path = "powershell" $Action.Arguments = $arg #Tasks will be run with the highest privileges $Task.Principal.RunLevel = 1 #Start the task to run in Local System account. 6: TASK_CREATE_OR_UPDATE $RootFolder.RegisterTaskDefinition($TaskName, $Task, 6, "SYSTEM", $Null, 1) | Out-Null #Wait for running task finished $RootFolder.GetTask($TaskName).Run(0) | Out-Null while($Scheduler.GetRunningTasks(0) | Where-Object {$_.Name -eq $TaskName}) { Start-Sleep -s 1 } #Clean up $RootFolder.DeleteTask($TaskName,0) Remove-Item $ScriptFile if (Test-Path $ResultFile) { Get-Content -Path $ResultFile | Out-String -Stream Remove-Item $ResultFile } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAFawWBgVlvvTnH # 0q3/jqW3d148xPdv7v4lEgB3OPpwCqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILeNcb8Oi1TV9vzdw/WD18yK # A0kiyPtQdkyaGs1v/hFkMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAbStbGI6TzNDveeHZmbqk3C2GmTFUKqFi/O60Arqm8ESV1u/qqiSbHB4c # sKJdCEGNXbFeyY3ZUD11jX/RbvgiCm8LFndSwzKCn0I8DU9l6DrRqjeggY1tx+q4 # qa8Av3UprmNk7yjwnmSqtEM0nTJTo5SvKz6/7JftNymgHvP8FpGCaQvsVQ8Uuigf # vZcCyJo3YH6efloWSwt0sb2yXsCbZnv6OuBeZvdXdk0f+L0x9PAXI7gN5EGeuT6I # 3mqD2TgffrWqFjopYk/cdg/t9xdVhX2QwP4ZZBPatrNUqU/u3P4le5nK0srLaJXx # Z+7t0YoPvJd+R3djpa0FoTveDeMEyqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBe1h62MQ2pOD7XN4ROswBdOBpe0ji2sV9/4bFeBHDeXgIGZpZ+op5e # GBMyMDI0MDcyMzIxNTY1My43ODNaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRC # QjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyHnPOhxbvRATnGjb/6fuBh # h3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdKs+qIMUbvenlH+w53ssPa # 6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+yi+uwQ2TnJuxczceG5FD # HrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/YcM/bIMY/QYmd9F0B+ebF # Yi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/ # 5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd # 9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ # 2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQM # OmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknKXonHGQacSCaLZot2kyJV # RsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/obipX6uxjEpyUA9mbVPl # jlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKC # EI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8S # usoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAMATzg6R/A0ldO7M # qGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64tD3+3NT1JkphWzaAWf2w # KdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdf # RcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQRbWEoQozY24hAqOcwuRc # m6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfaVosmmPtsZsawgnpIjbBa # 55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw # 8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0 # SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsKi2AS1WaXvOhgZNmGw42S # FB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyC # qW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJXxFs6lwc8D86qlUeGjUy # o7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35OW3X4Spk5SiNulnLFRPM5 # XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjox # NzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOpKNrUwIhgPMjAyNDA3MjMyMjAzMzNaGA8yMDI0MDcyNDIyMDMzM1owdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6ko2tQIBADAHAgEAAgIEtjAHAgEAAgISozAKAgUA # 6kuINQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAIdsrY2dSXLhtcP75fhU # ZgDBvo+t9/PArpRlD/EDzgLaCT6b9otBWSCBEGO9Zt33BhXqLvKnQorPwNdR/1fK # kqYyJRjI5BQYZ7eDpLiIBl4jOuuqk50evCphStYgVwK+oKz6T1bFCC6u6oO9KVuy # zTJJdOdrJak0jZFsRETTJdb8MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQg/6lSIMyN8EKa3qsfdb34WG/PHwIurxIQ6dpRLysDLnMwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCSb4TZApY9nJm5whsK/2kK # wTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8 # HxMVH35dAAEAAAHgMCIEIL/qjLDixePO+ULtyH6QM3jSMz7TQEKQLKz9NxnzLLf1 # MA0GCSqGSIb3DQEBCwUABIICAFIwdgs60lh0gdxR8lwQWEUWZNZrGsZSY1DwDzUK # k3USUiH/1t5n2BMZDYEjU1GuIEHX17KqzDozz2Y/y3nsQR6aGi3EVBtJOYEP4dSY # WltqgPhAdZJ9hOUx4rh1XyNqEp9tRMjaa5o0WWfQserYk7nsbQ8PhDEsYOs3vPS9 # 7qmJIGIGD7cwCvXX6RrL9oUbDFG88AjSCi9CE+azXLoaPNHjdxHVL0OqhATDIOpY # Jaljhze2uQZUfqhpHTA5fAK1GKv4QQlgKTTQ9FuDDQ1LyHQnQ8U0/FrTfB5UYlEC # 6DJ1VOfPJ3jzr1QSQwUIUsGIfT94btrFu/VezSVEO8cHc65Fg9oqp6Dr9IG1bD8j # Uz66eVz8q7/+yTYooTYQXLTL9dFqNCtFVD8ljVD3UtJ/AlCVahWx2lXG+uHBXvo7 # sK1BINExiVSj7Ez7yYUvIzL4LFDXPild+ZuiLP8OTgo4Y9C1lTf6tei8f7jkejFk # BYxNT6FpLCm5MO9L6YjSi5O5bV3dGRGrqOAD0+SVHqX21CqK3lmYiSDi4kf1/bbb # 2P4eiAhvDc9yYEfgIcChv0xyXLaV4RJT2Auj2e6I4AhB27t87kMoYyh9JQbffnf9 # Esw/Sp+tTX+0kEC9OkwJ4QFkJyTFUpX+yiJUS7DG+Am05pgbkXfHL4Sb3IByPiqw # x+fa # SIG # End signature block
combined_dataset/train/non-malicious/WriteFileName.ps1
WriteFileName.ps1
# functions to print overwriting multi-line messages. Test script will accept a file/filespec/dir and iterate through all files in all subdirs printing a test message + file name to demostrate. # e.g. PS>.\\writefilename.ps1 c:\\ # call WriteFileName [string] # after done writing series of overwriting messages, call WriteFileNameEnd function WriteFileName ( [string]$writestr ) # this function prints multiline messages on top of each other, good for iterating through filenames without filling { # the console with a huge wall of text. Call this function to print each of the filename messages, then call WriteFileNameEnd when done # before printing anything else, so that you are not printing into a long file name with extra characters from it visible. # Features the ability to deal with end of console buffer overflows. if ($global:lastlen -eq $null) {$global:lastlen=0} $ctop=[console]::cursortop [console]::cursorleft=0 $oldwritestrlen=$writestr.length $spaces = "" if ($global:lastlen -gt $writestr.length) { $spaces = " " * ($global:lastlen-$writestr.length) } $writelines = [math]::divrem($writestr.length, [console]::bufferwidth, [ref]$null) $cwe = ($writelines-([console]::bufferheight-$ctop))+1 # calculate where text has scroll back to. if ($cwe -gt 0) { if (($ctop-$cwe0) -gt 0) { $ctop-=$cwe } else {$ctop=0} } write-host "$writestr" -nonewline $global:oldctop=[console]::cursortop if ([console]::cursorleft -ne 0) {$global:oldctop+=1} write-host "$spaces" -nonewline $global:lastlen = $oldwritestrlen [console]::cursortop=$ctop [console]::cursorleft=0 } function WriteFileNameEnd ( ) # call this function when you are done overwriting messages on top of each other { # and before printing something else if ($global:oldctop -eq $null) {return} [console]::cursortop=$global:oldctop [console]::cursorleft=0 } dir $args -recurse -ea 0 -force | %{$string="Test String. "*(get-random(100));$string+="Checking $($_.fullname) ..."; WriteFileName $string;sleep -seconds 1} #WriteFileName "Final Test String." WriteFileNameEnd write-host "Done! exiting."
combined_dataset/train/non-malicious/sample_23_80.ps1
sample_23_80.ps1
# # Module manifest for module 'OCI.PSModules.Osuborganizationsubscription' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Osuborganizationsubscription.dll' # Version number of this module. ModuleVersion = '82.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'e98d9d2f-0e34-4cf5-b62f-660dcfdc3e34' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Osuborganizationsubscription Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Osuborganizationsubscription.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIOsuborganizationsubscriptionOrganizationSubscriptionsList' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Osuborganizationsubscription' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_42_16.ps1
sample_42_16.ps1
# # Module manifest for module 'Az.PrivateDns' # # Generated by: Microsoft Corporation # # Generated on: 5/16/2024 # @{ # Script module or binary module file associated with this manifest. RootModule = 'Az.PrivateDns.psm1' # Version number of this module. ModuleVersion = '1.0.5' # Supported PSEditions CompatiblePSEditions = 'Core', 'Desktop' # ID used to uniquely identify this module GUID = 'f9850afe-b631-4369-ab61-eca7023f2f53' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = 'Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'Microsoft Azure PowerShell - Private DNS service cmdlets for Azure Resource Manager in Windows PowerShell and PowerShell Core. For more information on Private DNS, please visit the following: https://learn.microsoft.com/azure/privatedns/' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '5.1' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. DotNetFrameworkVersion = '4.7.2' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @() # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'Microsoft.Azure.Management.PrivateDns.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = @() # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-AzPrivateDnsRecordConfig', 'Get-AzPrivateDnsRecordSet', 'Get-AzPrivateDnsVirtualNetworkLink', 'Get-AzPrivateDnsZone', 'New-AzPrivateDnsRecordConfig', 'New-AzPrivateDnsRecordSet', 'New-AzPrivateDnsVirtualNetworkLink', 'New-AzPrivateDnsZone', 'Remove-AzPrivateDnsRecordConfig', 'Remove-AzPrivateDnsRecordSet', 'Remove-AzPrivateDnsVirtualNetworkLink', 'Remove-AzPrivateDnsZone', 'Set-AzPrivateDnsRecordSet', 'Set-AzPrivateDnsVirtualNetworkLink', 'Set-AzPrivateDnsZone' # Variables to export from this module # VariablesToExport = @() # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'Azure','ResourceManager','ARM','PrivateDNS' # A URL to the license for this module. LicenseUri = 'https://aka.ms/azps-license' # A URL to the main website for this project. ProjectUri = 'https://github.com/Azure/azure-powershell' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module ReleaseNotes = '* Removed the outdated deps.json file.' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCWNxWAuAMF/VIs # UojaGuq0+kBq7hgIXpxBQb2vi0Or3qCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPWX3/gDv2gFAHdusNe+jKi+ # ZOKosGQ4N98/E2j6ZYX+MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAjTNn3ylLPgNtOVFB9oJTN+36hDXvXIy4EHL4p8318vRH5G3rhcOH8oSu # eCEbuE8IdzneXUwwTRrEu5MaNbgcYYD1SKuzOGeDO9wACCOZhhXnAjWEJiZ2G/DF # lzNuRnihY3yuvZeEitawaMfFwfuCwXvIjWXrKxmHaOcZf0cdiO9796yFxdwJoCXX # l7POFuttY1KRsVforJXmoxszyemmBDSG+qywwwFsCeP9d3RuqHHGwFpP7SVLWoXU # p7PLMHfAdH0AZx/VnBoFxt69Scj9aMZQe0Gvdrr7ol0obFJymxHHfyMwg0wZlrxM # OtVATEn+1Peo9Q2b9LFIlfQfVNR/O6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAeSEED6SUHqOUCUGr9KNElWBIebqLP2OlY1cCqrDdcYwIGZjLBL+wg # GBMyMDI0MDUxNjA3MjMzNC43MzJaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfGzRfUn6MAW1gABAAAB8TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NTVaFw0yNTAzMDUxODQ1NTVaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCxulCZttIf8X97rW9/J+Q4Vg9PiugB1ya1/DRxxLW2 # hwy4QgtU3j5fV75ZKa6XTTQhW5ClkGl6gp1nd5VBsx4Jb+oU4PsMA2foe8gP9bQN # PVxIHMJu6TYcrrn39Hddet2xkdqUhzzySXaPFqFMk2VifEfj+HR6JheNs2LLzm8F # DJm+pBddPDLag/R+APIWHyftq9itwM0WP5Z0dfQyI4WlVeUS+votsPbWm+RKsH4F # QNhzb0t/D4iutcfCK3/LK+xLmS6dmAh7AMKuEUl8i2kdWBDRcc+JWa21SCefx5SP # hJEFgYhdGPAop3G1l8T33cqrbLtcFJqww4TQiYiCkdysCcnIF0ZqSNAHcfI9SAv3 # gfkyxqQNJJ3sTsg5GPRF95mqgbfQbkFnU17iYbRIPJqwgSLhyB833ZDgmzxbKmJm # dDabbzS0yGhngHa6+gwVaOUqcHf9w6kwxMo+OqG3QZIcwd5wHECs5rAJZ6PIyFM7 # Ad2hRUFHRTi353I7V4xEgYGuZb6qFx6Pf44i7AjXbptUolDcVzYEdgLQSWiuFajS # 6Xg3k7Cy8TiM5HPUK9LZInloTxuULSxJmJ7nTjUjOj5xwRmC7x2S/mxql8nvHSCN # 1OED2/wECOot6MEe9bL3nzoKwO8TNlEStq5scd25GA0gMQO+qNXV/xTDOBTJ8zBc # GQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLy2xe59sCE0SjycqE5Erb4YrS1gMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDhSEjSBFSCbJyl3U/QmFMW2eLPBknnlsfI # D/7gTMvANEnhq08I9HHbbqiwqDEHSvARvKtL7j0znICYBbMrVSmvgDxU8jAGqMyi # LoM80788So3+T6IZV//UZRJqBl4oM3bCIQgFGo0VTeQ6RzYL+t1zCUXmmpPmM4xc # ScVFATXj5Tx7By4ShWUC7Vhm7picDiU5igGjuivRhxPvbpflbh/bsiE5tx5cuOJE # JSG+uWcqByR7TC4cGvuavHSjk1iRXT/QjaOEeJoOnfesbOdvJrJdbm+leYLRI67N # 3cd8B/suU21tRdgwOnTk2hOuZKs/kLwaX6NsAbUy9pKsDmTyoWnGmyTWBPiTb2rp # 5ogo8Y8hMU1YQs7rHR5hqilEq88jF+9H8Kccb/1ismJTGnBnRMv68Ud2l5LFhOZ4 # nRtl4lHri+N1L8EBg7aE8EvPe8Ca9gz8sh2F4COTYd1PHce1ugLvvWW1+aOSpd8N # nwEid4zgD79ZQxisJqyO4lMWMzAgEeFhUm40FshtzXudAsX5LoCil4rLbHfwYtGO # pw9DVX3jXAV90tG9iRbcqjtt3vhW9T+L3fAZlMeraWfh7eUmPltMU8lEQOMelo/1 # ehkIGO7YZOHxUqeKpmF9QaW8LXTT090AHZ4k6g+tdpZFfCMotyG+E4XqN6ZWtKEB # QiE3xL27BDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQD7 # n7Bk4gsM2tbU/i+M3BtRnLj096CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e+z1TAiGA8yMDI0MDUxNTIyMjEw # OVoYDzIwMjQwNTE2MjIyMTA5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp77PV # AgEAMAoCAQACAh7AAgH/MAcCAQACAhPGMAoCBQDp8QVVAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBABqo8eDklp7xyj/J1KHqvohAT+xcQr7bazGDtKl9n8WO # tiREz4ym2gXdI+q9HOX2GTdPfhozzW/5ltP/s57ozGCb5wJgSyjaXlNkcz1IDWFX # /fDNxkNB1RHhcVZIW1CzbIsqJSOPgZgF1XOZsXDDqEDHsTF2Nzeq43CXEU5tEmHW # gVGsqnaJgBIeF6T0ddxH82RNCi3JYZNFkjTklFVc52/KrCeP/gh3tEz1fEprvwQs # zcpL/wBWz9uMoosCZ6cpxiD1gz0QtAXhAEfoehTFUtH5SYoGf+2Lff3yA+f+TLCU # YX2jzcOmlHw1i+2IkchTDotbhEmUvRQsIyHhF4HS7sYxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfGzRfUn6MAW1gABAAAB # 8TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCDkhwQ4u7iWKjoT0pobd3anrcvXzEYpcyk1lZijfAUz # CjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINV3/T5hS7ijwao466RosB7w # wEibt0a1P5EqIwEj9hF4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHxs0X1J+jAFtYAAQAAAfEwIgQgsWLIpvK+iLqUI4xKW7vuW7TE # 1NRQThTsMKE0ok33WUwwDQYJKoZIhvcNAQELBQAEggIAn21zUhMhixioBE6Eg5Tt # Y0l2xRmveCl4//fhHm3kiwyhOHcF55M34L9BuM2exC9mtgWMXmiXuU/gGaLZaU86 # xMBHUnrB04iQP2vWzzqHBqlNGBeFG/aaADp/+maYodQI+B80k+8yHJAK3ZCEFUzO # cbYbODw4VHcWlyDfebbEnXlS5v626OLePJn0iQO0/k6PQeBN2BQIlI/IliJ9+0nb # kx3g9iqH4wFLv7oolaaS+WSQCKvogAtLa/rylcpEwn6pejxDZ2HS/8dTvYwuGnEL # gId2v0KVMVnlgVrCqTCyQCB8gi7r1DhUTuvqbFNRz0AO2W+sToWXofu6rsCuyuBX # OhwfZoo6bif2hqkwQ4U9J8b+ndqsCxIWNpYOqrPNdGMnM0gPtiIWcs4ba4CO9rpk # +Nl4GvwQo6E2vCLNxrLBHiW8dD9KlmZ4q6I04kuOsYAMEcM70ullM5hATo2ckT6B # 7AvJxoURHka76Ok2A+7W+LRXyMbboj4PuS38QfjOADGmIJ7D0QZlXE3JcGWN5NVO # /KvLh4ITsPNHQJxGpHPymdAL8e4OOr8m3olKSgb4PL2vTKjJH+XEX4YNtXBOKSPc # De9ZygfXVf50PqdrN5ZFuzONzxGewQDMDHa/ACOP+LwkWv2WGc/LsGUoDesGqVZZ # dQtkx9D+BvNEooTBvcKV0Hc= # SIG # End signature block
combined_dataset/train/non-malicious/sample_31_64.ps1
sample_31_64.ps1
# # Module manifest for module 'OCI.PSModules.Databasemanagement' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Databasemanagement.dll' # Version number of this module. ModuleVersion = '73.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '0faf82fb-82c6-40fe-bbd2-87626481a704' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Databasemanagement Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Databasemanagement.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Add-OCIDatabasemanagementDataFiles', 'Add-OCIDatabasemanagementManagedDatabaseToManagedDatabaseGroup', 'Add-OCIDatabasemanagementmTasks', 'Confirm-OCIDatabasemanagementBasicFilter', 'Disable-OCIDatabasemanagementAutomaticInitialPlanCapture', 'Disable-OCIDatabasemanagementAutomaticSpmEvolveAdvisorTask', 'Disable-OCIDatabasemanagementExternalDbSystemDatabaseManagement', 'Disable-OCIDatabasemanagementExternalDbSystemStackMonitoring', 'Disable-OCIDatabasemanagementExternalExadataInfrastructureManagement', 'Disable-OCIDatabasemanagementHighFrequencyAutomaticSpmEvolveAdvisorTask', 'Disable-OCIDatabasemanagementSqlPlanBaselinesUsage', 'Edit-OCIDatabasemanagementSnapshotSettings', 'Enable-OCIDatabasemanagementAutomaticInitialPlanCapture', 'Enable-OCIDatabasemanagementAutomaticSpmEvolveAdvisorTask', 'Enable-OCIDatabasemanagementExternalDbSystemDatabaseManagement', 'Enable-OCIDatabasemanagementExternalDbSystemStackMonitoring', 'Enable-OCIDatabasemanagementExternalExadataInfrastructureManagement', 'Enable-OCIDatabasemanagementHighFrequencyAutomaticSpmEvolveAdvisorTask', 'Enable-OCIDatabasemanagementSqlPlanBaselinesUsage', 'Get-OCIDatabasemanagementAlertLogsList', 'Get-OCIDatabasemanagementAsmPropertiesList', 'Get-OCIDatabasemanagementAssociatedDatabasesList', 'Get-OCIDatabasemanagementAttentionLogsList', 'Get-OCIDatabasemanagementAwrDbReport', 'Get-OCIDatabasemanagementAwrDbsList', 'Get-OCIDatabasemanagementAwrDbSnapshotsList', 'Get-OCIDatabasemanagementAwrDbSqlReport', 'Get-OCIDatabasemanagementClusterCacheMetric', 'Get-OCIDatabasemanagementConsumerGroupPrivilegesList', 'Get-OCIDatabasemanagementCursorCacheStatementsList', 'Get-OCIDatabasemanagementDataAccessContainersList', 'Get-OCIDatabasemanagementDatabaseFleetHealthMetrics', 'Get-OCIDatabasemanagementDatabaseHomeMetrics', 'Get-OCIDatabasemanagementDatabaseParametersList', 'Get-OCIDatabasemanagementDbManagementPrivateEndpoint', 'Get-OCIDatabasemanagementDbManagementPrivateEndpointsList', 'Get-OCIDatabasemanagementExecutionPlanStatsComparision', 'Get-OCIDatabasemanagementExternalAsm', 'Get-OCIDatabasemanagementExternalAsmConfiguration', 'Get-OCIDatabasemanagementExternalAsmDiskGroupsList', 'Get-OCIDatabasemanagementExternalAsmInstance', 'Get-OCIDatabasemanagementExternalAsmInstancesList', 'Get-OCIDatabasemanagementExternalAsmsList', 'Get-OCIDatabasemanagementExternalAsmUsersList', 'Get-OCIDatabasemanagementExternalCluster', 'Get-OCIDatabasemanagementExternalClusterInstance', 'Get-OCIDatabasemanagementExternalClusterInstancesList', 'Get-OCIDatabasemanagementExternalClustersList', 'Get-OCIDatabasemanagementExternalDatabasesList', 'Get-OCIDatabasemanagementExternalDbHome', 'Get-OCIDatabasemanagementExternalDbHomesList', 'Get-OCIDatabasemanagementExternalDbNode', 'Get-OCIDatabasemanagementExternalDbNodesList', 'Get-OCIDatabasemanagementExternalDbSystem', 'Get-OCIDatabasemanagementExternalDbSystemConnector', 'Get-OCIDatabasemanagementExternalDbSystemConnectorsList', 'Get-OCIDatabasemanagementExternalDbSystemDiscoveriesList', 'Get-OCIDatabasemanagementExternalDbSystemDiscovery', 'Get-OCIDatabasemanagementExternalDbSystemsList', 'Get-OCIDatabasemanagementExternalExadataInfrastructure', 'Get-OCIDatabasemanagementExternalExadataInfrastructuresList', 'Get-OCIDatabasemanagementExternalExadataStorageConnector', 'Get-OCIDatabasemanagementExternalExadataStorageConnectorsList', 'Get-OCIDatabasemanagementExternalExadataStorageGrid', 'Get-OCIDatabasemanagementExternalExadataStorageServer', 'Get-OCIDatabasemanagementExternalExadataStorageServersList', 'Get-OCIDatabasemanagementExternalListener', 'Get-OCIDatabasemanagementExternalListenerServicesList', 'Get-OCIDatabasemanagementExternalListenersList', 'Get-OCIDatabasemanagementIormPlan', 'Get-OCIDatabasemanagementJob', 'Get-OCIDatabasemanagementJobExecution', 'Get-OCIDatabasemanagementJobExecutionsList', 'Get-OCIDatabasemanagementJobRun', 'Get-OCIDatabasemanagementJobRunsList', 'Get-OCIDatabasemanagementJobsList', 'Get-OCIDatabasemanagementManagedDatabase', 'Get-OCIDatabasemanagementManagedDatabaseGroup', 'Get-OCIDatabasemanagementManagedDatabaseGroupsList', 'Get-OCIDatabasemanagementManagedDatabasesList', 'Get-OCIDatabasemanagementManagedMySqlDatabase', 'Get-OCIDatabasemanagementManagedMySqlDatabaseConfigurationDataList', 'Get-OCIDatabasemanagementManagedMySqlDatabasesList', 'Get-OCIDatabasemanagementManagedMySqlDatabaseSqlDataList', 'Get-OCIDatabasemanagementMySqlFleetMetric', 'Get-OCIDatabasemanagementObjectPrivilegesList', 'Get-OCIDatabasemanagementOpenAlertHistory', 'Get-OCIDatabasemanagementOptimizerStatisticsAdvisorExecution', 'Get-OCIDatabasemanagementOptimizerStatisticsAdvisorExecutionScript', 'Get-OCIDatabasemanagementOptimizerStatisticsAdvisorExecutionsList', 'Get-OCIDatabasemanagementOptimizerStatisticsCollectionAggregationsList', 'Get-OCIDatabasemanagementOptimizerStatisticsCollectionOperation', 'Get-OCIDatabasemanagementOptimizerStatisticsCollectionOperationsList', 'Get-OCIDatabasemanagementPdbMetrics', 'Get-OCIDatabasemanagementPreferredCredential', 'Get-OCIDatabasemanagementPreferredCredentialsList', 'Get-OCIDatabasemanagementProxiedForUsersList', 'Get-OCIDatabasemanagementProxyUsersList', 'Get-OCIDatabasemanagementRolesList', 'Get-OCIDatabasemanagementSqlExecutionPlan', 'Get-OCIDatabasemanagementSqlPlanBaseline', 'Get-OCIDatabasemanagementSqlPlanBaselineConfiguration', 'Get-OCIDatabasemanagementSqlPlanBaselineJobsList', 'Get-OCIDatabasemanagementSqlPlanBaselinesList', 'Get-OCIDatabasemanagementSqlTuningAdvisorTaskFindingsList', 'Get-OCIDatabasemanagementSqlTuningAdvisorTaskRecommendationsList', 'Get-OCIDatabasemanagementSqlTuningAdvisorTasksList', 'Get-OCIDatabasemanagementSqlTuningAdvisorTaskSummaryReport', 'Get-OCIDatabasemanagementSqlTuningSetsList', 'Get-OCIDatabasemanagementSystemPrivilegesList', 'Get-OCIDatabasemanagementTablespace', 'Get-OCIDatabasemanagementTablespacesList', 'Get-OCIDatabasemanagementTableStatisticsList', 'Get-OCIDatabasemanagementTopSqlCpuActivity', 'Get-OCIDatabasemanagementUser', 'Get-OCIDatabasemanagementUsersList', 'Get-OCIDatabasemanagementWorkRequest', 'Get-OCIDatabasemanagementWorkRequestErrorsList', 'Get-OCIDatabasemanagementWorkRequestLogsList', 'Get-OCIDatabasemanagementWorkRequestsList', 'Invoke-OCIDatabasemanagementCheckExternalDbSystemConnectorConnectionStatus', 'Invoke-OCIDatabasemanagementCheckExternalExadataStorageConnector', 'Invoke-OCIDatabasemanagementCloneSqlTuningTask', 'Invoke-OCIDatabasemanagementConfigureAutomaticCaptureFilters', 'Invoke-OCIDatabasemanagementConfigureAutomaticSpmEvolveAdvisorTask', 'Invoke-OCIDatabasemanagementDiscoverExternalExadataInfrastructure', 'Invoke-OCIDatabasemanagementDropSqlPlanBaselines', 'Invoke-OCIDatabasemanagementDropSqlsInSqlTuningSet', 'Invoke-OCIDatabasemanagementDropSqlTuningSet', 'Invoke-OCIDatabasemanagementDropSqlTuningTask', 'Invoke-OCIDatabasemanagementDropTablespace', 'Invoke-OCIDatabasemanagementFetchSqlTuningSet', 'Invoke-OCIDatabasemanagementImplementOptimizerStatisticsAdvisorRecommendations', 'Invoke-OCIDatabasemanagementLoadSqlPlanBaselinesFromAwr', 'Invoke-OCIDatabasemanagementLoadSqlPlanBaselinesFromCursorCache', 'Invoke-OCIDatabasemanagementLoadSqlTuningSet', 'Invoke-OCIDatabasemanagementPatchExternalDbSystemDiscovery', 'Invoke-OCIDatabasemanagementResizeDataFile', 'Invoke-OCIDatabasemanagementRunHistoricAddm', 'Invoke-OCIDatabasemanagementSaveSqlTuningSetAs', 'Invoke-OCIDatabasemanagementSummarizeAlertLogCounts', 'Invoke-OCIDatabasemanagementSummarizeAttentionLogCounts', 'Invoke-OCIDatabasemanagementSummarizeAwrDbCpuUsages', 'Invoke-OCIDatabasemanagementSummarizeAwrDbMetrics', 'Invoke-OCIDatabasemanagementSummarizeAwrDbParameterChanges', 'Invoke-OCIDatabasemanagementSummarizeAwrDbParameters', 'Invoke-OCIDatabasemanagementSummarizeAwrDbSnapshotRanges', 'Invoke-OCIDatabasemanagementSummarizeAwrDbSysstats', 'Invoke-OCIDatabasemanagementSummarizeAwrDbTopWaitEvents', 'Invoke-OCIDatabasemanagementSummarizeAwrDbWaitEventBuckets', 'Invoke-OCIDatabasemanagementSummarizeAwrDbWaitEvents', 'Invoke-OCIDatabasemanagementSummarizeExternalAsmMetrics', 'Invoke-OCIDatabasemanagementSummarizeExternalClusterMetrics', 'Invoke-OCIDatabasemanagementSummarizeExternalDbNodeMetrics', 'Invoke-OCIDatabasemanagementSummarizeExternalDbSystemAvailabilityMetrics', 'Invoke-OCIDatabasemanagementSummarizeExternalListenerMetrics', 'Invoke-OCIDatabasemanagementSummarizeJobExecutionsStatuses', 'Invoke-OCIDatabasemanagementSummarizeManagedDatabaseAvailabilityMetrics', 'Invoke-OCIDatabasemanagementSummarizeManagedMySqlDatabaseAvailabilityMetrics', 'Invoke-OCIDatabasemanagementSummarizeSqlPlanBaselines', 'Invoke-OCIDatabasemanagementSummarizeSqlPlanBaselinesByLastExecution', 'Invoke-OCIDatabasemanagementTestPreferredCredential', 'Move-OCIDatabasemanagementDatabaseParameters', 'Move-OCIDatabasemanagementDbManagementPrivateEndpointCompartment', 'Move-OCIDatabasemanagementExternalDbSystemCompartment', 'Move-OCIDatabasemanagementExternalExadataInfrastructureCompartment', 'Move-OCIDatabasemanagementJobCompartment', 'Move-OCIDatabasemanagementManagedDatabaseGroupCompartment', 'Move-OCIDatabasemanagementPlanRetention', 'Move-OCIDatabasemanagementSpaceBudget', 'Move-OCIDatabasemanagementSqlPlanBaselinesAttributes', 'New-OCIDatabasemanagementAwrSnapshot', 'New-OCIDatabasemanagementDbManagementPrivateEndpoint', 'New-OCIDatabasemanagementExternalDbSystem', 'New-OCIDatabasemanagementExternalDbSystemConnector', 'New-OCIDatabasemanagementExternalDbSystemDiscovery', 'New-OCIDatabasemanagementExternalExadataInfrastructure', 'New-OCIDatabasemanagementExternalExadataStorageConnector', 'New-OCIDatabasemanagementJob', 'New-OCIDatabasemanagementManagedDatabaseGroup', 'New-OCIDatabasemanagementSqlTuningSet', 'New-OCIDatabasemanagementTablespace', 'Remove-OCIDatabasemanagementDataFile', 'Remove-OCIDatabasemanagementDbManagementPrivateEndpoint', 'Remove-OCIDatabasemanagementExternalDbSystem', 'Remove-OCIDatabasemanagementExternalDbSystemConnector', 'Remove-OCIDatabasemanagementExternalDbSystemDiscovery', 'Remove-OCIDatabasemanagementExternalExadataInfrastructure', 'Remove-OCIDatabasemanagementExternalExadataStorageConnector', 'Remove-OCIDatabasemanagementJob', 'Remove-OCIDatabasemanagementManagedDatabaseFromManagedDatabaseGroup', 'Remove-OCIDatabasemanagementManagedDatabaseGroup', 'Remove-OCIDatabasemanagementPreferredCredential', 'Reset-OCIDatabasemanagementDatabaseParameters', 'Start-OCIDatabasemanagementSqlTuningTask', 'Update-OCIDatabasemanagementDbManagementPrivateEndpoint', 'Update-OCIDatabasemanagementExternalAsm', 'Update-OCIDatabasemanagementExternalCluster', 'Update-OCIDatabasemanagementExternalClusterInstance', 'Update-OCIDatabasemanagementExternalDbNode', 'Update-OCIDatabasemanagementExternalDbSystem', 'Update-OCIDatabasemanagementExternalDbSystemConnector', 'Update-OCIDatabasemanagementExternalDbSystemDiscovery', 'Update-OCIDatabasemanagementExternalExadataInfrastructure', 'Update-OCIDatabasemanagementExternalExadataStorageConnector', 'Update-OCIDatabasemanagementExternalListener', 'Update-OCIDatabasemanagementJob', 'Update-OCIDatabasemanagementManagedDatabaseGroup', 'Update-OCIDatabasemanagementPreferredCredential', 'Update-OCIDatabasemanagementTablespace' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Databasemanagement' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_32_70.ps1
sample_32_70.ps1
# ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Remove the Windows virtual desktop registration info. .Description Remove the Windows virtual desktop registration info. #> function Remove-AzWvdRegistrationInfo { [CmdletBinding(PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials}, [Parameter(Mandatory, HelpMessage='help foo 1')] [Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] ${SubscriptionId}, [Parameter(Mandatory, HelpMessage='Resource Group Name')] [Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Path')] [System.String] ${ResourceGroupName}, [Parameter(Mandatory, HelpMessage='Host Pool Name')] [Microsoft.Azure.PowerShell.Cmdlets.DesktopVirtualization.Category('Path')] [System.String] ${HostPoolName} ) process { $hostpool = Az.DesktopVirtualization\Get-AzWvdHostPool @PSBoundParameters Az.DesktopVirtualization\New-AzWvdHostPool @PSBoundParameters ` -Location $hostpool.Location ` -HostPoolType $hostpool.HostPoolType ` -LoadBalancerType $hostpool.LoadBalancerType ` -RegistrationTokenOperation "Delete" ` -Description $hostpool.Description ` -FriendlyName $hostpool.FriendlyName ` -MaxSessionLimit $hostpool.MaxSessionLimit ` -VMTemplate $hostpool.VMTemplate ` -CustomRdpProperty $hostpool.CustomRdpProperty ` -Ring $hostpool.Ring ` -ValidationEnvironment:$hostpool.ValidationEnvironment ` -PreferredAppGroupType $hostpool.PreferredAppGroupType } } # SIG # Begin signature block # MIIn0QYJKoZIhvcNAQcCoIInwjCCJ74CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCAhGHv34/6V3ss # iqeK4kkynAkzKNSL2or8GehVnKxcAqCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKmj # Eb4VA3G2Vm+gPg+DmOmPlgTTvMqPv9aYqJVq5YvuMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEARs84PJRiRKirtST7FtrmsTPJ5zLFBXW2JL6m # mPnJVspijE1yktMzQ0mqa0EQvbwWSeb8EP48ZH6VneOanoh0QxAZiR78xgqH3hsT # SaxNIg8zR5OdHcOmLBJonBZ5aJRQqLM71hlGxgcfDnld/hAd5SDUE7Gpn+dDPsUL # FkoTUuy1l9jzMqlObnXnNghLI76dysIRs6s7sDenBgWRl5GL/E7krTTSrfUtRaKL # 9HFNGwfjygd2Fk+wOnFhe84gwYsh8WdpJE42duYmomK1YBdTmH2l7bPnXlj+094z # ggfB7hL/ICem4BCWGU5/1Vc9tOxqbWHg6f3KuuxMgt1Kh4dOkaGCFywwghcoBgor # BgEEAYI3AwMBMYIXGDCCFxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAsEI/haO4D7ooa+0m2oX4zjLnZ/G7ezZcI # OzxOZamqYwIGZh/GsphzGBMyMDI0MDQyMzEzMTUxNS4wMjJaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHj372b # mhxogyIAAQAAAeMwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzI5WhcNMjUwMTEwMTkwNzI5WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjo4RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL6k # DWgeRp+fxSBUD6N/yuEJpXggzBeNG5KB8M9AbIWeEokJgOghlMg8JmqkNsB4Wl1N # EXR7cL6vlPCsWGLMhyqmscQu36/8h2bx6TU4M8dVZEd6V4U+l9gpte+VF91kOI35 # fOqJ6eQDMwSBQ5c9ElPFUijTA7zV7Y5PRYrS4FL9p494TidCpBEH5N6AO5u8wNA/ # jKO94Zkfjgu7sLF8SUdrc1GRNEk2F91L3pxR+32FsuQTZi8hqtrFpEORxbySgiQB # P3cH7fPleN1NynhMRf6T7XC1L0PRyKy9MZ6TBWru2HeWivkxIue1nLQb/O/n0j2Q # Vd42Zf0ArXB/Vq54gQ8JIvUH0cbvyWM8PomhFi6q2F7he43jhrxyvn1Xi1pwHOVs # bH26YxDKTWxl20hfQLdzz4RVTo8cFRMdQCxlKkSnocPWqfV/4H5APSPXk0r8Cc/c # Mmva3g4EvupF4ErbSO0UNnCRv7UDxlSGiwiGkmny53mqtAZ7NLePhFtwfxp6ATIo # jl8JXjr3+bnQWUCDCd5Oap54fGeGYU8KxOohmz604BgT14e3sRWABpW+oXYSCyFQ # 3SZQ3/LNTVby9ENsuEh2UIQKWU7lv7chrBrHCDw0jM+WwOjYUS7YxMAhaSyOahpb # udALvRUXpQhELFoO6tOx/66hzqgjSTOEY3pu46BFAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQUsa4NZr41FbehZ8Y+ep2m2YiYqQMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBALe+my6p1NPMEW1t70a8Y2hGxj6siDSulGAs4UxmkfzxMAic4j0+GTPbHxk1 # 93mQ0FRPa9dtbRbaezV0GLkEsUWTGF2tP6WsDdl5/lD4wUQ76ArFOencCpK5svE0 # sO0FyhrJHZxMLCOclvd6vAIPOkZAYihBH/RXcxzbiliOCr//3w7REnsLuOp/7vlX # JAsGzmJesBP/0ERqxjKudPWuBGz/qdRlJtOl5nv9NZkyLig4D5hy9p2Ec1zaotiL # iHnJ9mlsJEcUDhYj8PnYnJjjsCxv+yJzao2aUHiIQzMbFq+M08c8uBEf+s37YbZQ # 7XAFxwe2EVJAUwpWjmtJ3b3zSWTMmFWunFr2aLk6vVeS0u1MyEfEv+0bDk+N3jms # CwbLkM9FaDi7q2HtUn3z6k7AnETc28dAvLf/ioqUrVYTwBrbRH4XVFEvaIQ+i7es # DQicWW1dCDA/J3xOoCECV68611jriajfdVg8o0Wp+FCg5CAUtslgOFuiYULgcxnq # zkmP2i58ZEa0rm4LZymHBzsIMU0yMmuVmAkYxbdEDi5XqlZIupPpqmD6/fLjD4ub # 0SEEttOpg0np0ra/MNCfv/tVhJtz5wgiEIKX+s4akawLfY+16xDB64Nm0HoGs/Gy # 823ulIm4GyrUcpNZxnXvE6OZMjI/V1AgSAg8U/heMWuZTWVUMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjo4RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAPYiXu8ORQ4hvKcuE # 7GK0COgxWnqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOnSLW4wIhgPMjAyNDA0MjMyMDUxNThaGA8yMDI0MDQy # NDIwNTE1OFowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6dItbgIBADAKAgEAAgIC # 3QIB/zAHAgEAAgIklzAKAgUA6dN+7gIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUA # A4GBAL5g/H2OsBvN7sRsWQpifcZ3xYuCaQCapfehI/sIyCMsEeFt/2Io5kSBiNhw # ofo99Xxk/KCzCACcFbyA216UwvxZQbZWgBcarXLP7Rn9Q+U10U19mENvKVuFTzZt # 3+19K/W7+QQ4Y0MOWaYZuM2O+a3lHbrYuq3jAheJ+WJ8OBwrMYIEDTCCBAkCAQEw # gZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHj372bmhxogyIA # AQAAAeMwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0B # CRABBDAvBgkqhkiG9w0BCQQxIgQgljMcyzMDhLz2jvdntUYoTs/6i4tohbzC67IC # xwwWXlYwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAz1COr5bD+ZPdEgQjW # vcIWuDJcQbdgq8Ndj0xyMuYmKjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwAhMzAAAB49+9m5ocaIMiAAEAAAHjMCIEIAjbaHNr0MEVS4sdIKFz # DEisoKgKMPqA12+DiwHa14RcMA0GCSqGSIb3DQEBCwUABIICAInw20G2c25D1oB8 # nB3JtzV/Moz4EzQ6GcVfgpgyHAGVWLlfG426QbDb+jjlLae2DEy1emuJ90V6wq3r # 1LYvBC/M37r6yfcK7xWTK9mvLRqR10hKkvB2j6Ym2hMzahMsGtPVE7iMG4EXSk9h # W7IxG3ZI98o78w67gxdudeEPjv/MlmGwOuHhV9QS0q5AKgMkFCg7OhSzIklJ2Txu # 8krRmAd/n0BwPc7WxA+jwGqRKaqt8v8r+Qd/5CE3YTzuK+IogpubxlX/WVehdOS0 # s5iiLT/KQ1rhZWYZfMkVZWFwbM45Zt7T0cGVCqwUJ3jQoacRyrOTUAOihAcM7pYR # e25kGv5oJOqqmTJ94uufqfcx0V8Egfk4z+I2ctzEHce7Cua91Kw4Ud2e6RgUdcXk # mWq4/OpWY+r5ASOYuAHQPw8R7Rg3/YoCpXuIAz+yZwI+dn3M/TAFB7xsKTnRcZ/H # z7BXLYmF0jfK8XagUsK8tdyz7gU7/y9v1SoqBiFaaPQHT99lt9vLDkn8sNtn+sHp # DqErEUolJjbFQHqqyZgIEEx8G0R0Nx5+JrEiQCMuBmh6rv74sNo/OD2t9UhmN8nQ # 9DHhaSs3d605dXRnAPcF0jxOBLtAG+5zF9Br+NRHYMY1/7rmad7Sn6kH1LgpyNIp # HvhbNFNBvDW97U7vGnE7KEVWHICN # SIG # End signature block
combined_dataset/train/non-malicious/AnalyzeScript.ps1
AnalyzeScript.ps1
<# .SYNOPSIS Analyzes script and gives starting lines & columns of script components .DESCRIPTION AnalyzeScript opens a dialog box for user selection; checks that input is a powershell script; parses and agrigates the script components into the following tokens: Unknown(s) Command(s) CommandParameter(s) CommandArgument(s) Variable(s) Member(s) LoopLabel(s) Attribute(s) Keyword(s) LineContinuation(s) .LINK None .NOTES Name: AnalizeScript.ps1 Author: Paul A. Drinnon Date Created: 03/24/2011 Date Revised: - (New Release) Version: 1.0 History: 1.0 This script can be altered to output other "Types" of tokenized content Below is a complete list Types ______________________________________ Name Example / Value Comment __________________ ___________ _____ Unknown 0 Command 1 CommandParameter 2 CommandArgument 3 Number 4 String 5 Variable -$! 6 Member 7 LoopLabel 8 Attribute 9 Type 10 Operator (-+*/=|...) 11 GroupStart ({ 12 GroupEnd )} 13 Keyword 14 Comment 15 StatementSeparator 16 NewLine 17 LineContinuation 18 Position 19 requires -Version 2.0 ** Licensed under a Creative Commons Attribution 3.0 License ** #> Add-Type -TypeDefinition @" using System; using System.Windows.Forms; public class WindowWrapper : IWin32Window { private IntPtr _hWnd; public WindowWrapper(IntPtr handle) { _hWnd = handle; } public IntPtr Handle { get { return _hWnd; } } } "@ -ReferencedAssemblies "System.Windows.Forms.dll" [System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms") | Out-Null $handle = [System.Diagnostics.Process]::GetCurrentProcess().MainWindowHandle $owner = New-Object WindowWrapper -ArgumentList $handle function Select-File { param ( [String]$Title = "Enter a Windows PowerShell script", [String]$InitialDirectory = $home, [String]$Filter = "All Files(*.*)|*.*" ) $dialog = New-Object System.Windows.Forms.OpenFileDialog $dialog.Filter = $filter $dialog.InitialDirectory = $initialDirectory $dialog.ShowHelp = $true $dialog.Title = $title $result = $dialog.ShowDialog($owner) if ($result -eq "OK") { return $dialog.FileName } else { Write-Error "Operation cancelled by user." } } function TokenName-Count ($file, $str) { $content = gc $file $a = [System.Management.Automation.PsParser]::Tokenize($content, [ref] $null) | ? { $_.Type -eq $str } | Measure-Object | select Count $su = $str.ToUpper() + "S" "$su`t`t$a" } function CustomTable ($file, $str) { $content = gc $file [System.Management.Automation.PsParser]::Tokenize($content, [ref] $null) | ? { $_.Type -eq $str } | ft content, startline, startcolumn -auto } $selectPSfile = "" while (-!($selectPSfile -match ".ps1|.psm1|.psd1|.ps1xml")) { $selectPSfile = Select-File } $TokenNames = ` "Unknown", ` "Command", ` "CommandParameter", ` "CommandArgument", ` "Variable", ` "Member", ` "LoopLabel",` "Attribute",` "Keyword", ` "LineContinuation" $date = (Get-Date).ToShortDateString() "`n$selectPSfile`t`t`t`t$date`n" $TokenNames | foreach { [string]$s = $_ TokenName-Count $selectPSfile $s CustomTable $selectPSfile $s }
combined_dataset/train/non-malicious/sample_65_19.ps1
sample_65_19.ps1
# # Module manifest for module 'ClientContext' # # Generated by: JakubVanak # # Generated on: 01.05.2024 # @{ # Script module or binary module file associated with this manifest. RootModule = 'ClientContext.psm1' # Version number of this module. ModuleVersion = '0.0.1' # Supported PSEditions # CompatiblePSEditions = @() # ID used to uniquely identify this module GUID = '57daa51b-9ec3-48bd-8da8-0dd1a671f31e' # Author of this module Author = 'Jakub Vanak' # Company or vendor of this module CompanyName = 'NaviPartner' # Copyright statement for this module Copyright = '(c) NaviPartner. All rights reserved.' # Description of the functionality provided by this module # Description = '' # Minimum version of the PowerShell engine required by this module # PowerShellVersion = '' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module # RequiredModules = @() # Assemblies that must be loaded prior to importing this module RequiredAssemblies = @( "$PSScriptRoot\..\..\..\.test-runner\CSLibs\Newtonsoft.Json.dll", "$PSScriptRoot\..\..\..\.test-runner\CSLibs\System.ServiceModel.Primitives.dll", "$PSScriptRoot\..\..\..\.test-runner\CSLibs\Microsoft.Dynamics.Framework.UI.Client.dll") # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = '*' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. # Tags = @() # A URL to the license for this module. # LicenseUri = '' # A URL to the main website for this project. # ProjectUri = '' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module # ReleaseNotes = '' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/TabExpansion for V2CTP_9.ps1
TabExpansion for V2CTP_9.ps1
## Tab-Completion ################# ## For V2CTP3. ## This won't work on V1 and V2CTP and V2CTP2. ## Please dot souce this script file. ## In first loading, it may take a several minutes, in order to generate ProgIDs and TypeNames list. ## ## What this can do is: ## ## [datetime]::n<tab> ## [datetime]::now.d<tab> ## $a = New-Object "Int32[,]" 2,3; $b = "PowerShell","PowerShell" ## $c = [ref]$a; $d = [ref]$b,$c ## $d[0].V<tab>[0][0].Get<tab> ## $d[1].V<tab>[0,0].tos<tab> ## $function:a<tab> ## $env:a<tab> ## [System.Type].a<tab> ## [datetime].Assembly.a<tab> ## ).a<tab> # shows System.Type properties and methods... ## #native command name expansion ## fsu<tab> ## #command option name expansion (for fsutil ipconfig net powershell only) ## fsutil <tab> ## ipconfig <tab> ## net <tab> ## powershell <tab> ## #TypeNames and Type accelerators expansion ## [Dec<tab> ## [system.Man<tab>.auto<tab>.p<tab> ## New-Object -TypeName IO.Dir<tab> ## New-Object System.win<tab>.for<tab>.bu<tab> ## #ProgIDs expansion ## New-Object -Com shel<tab> ## #Enum option expansion ## Set-ExecutionPolicy <tab> ## Set-ExecutionPolicy All<tab> ## Set-ExcusionPolisy -ex <tab> ## Get-TraceSource Inte<tab> ## iex -Errora <tab> -wa Sil<tab> ## #WmiClasses expansion ## Get-WmiObject -class Win32_<tab> ## gwmi __Instance<tab> ## #Encoding expansion ## [Out-File | Export-CSV | Select-String | Export-Clixml] -enc <tab> ## [Add-Content | Get-Content | Set-Content} -Encoding Big<tab> ## #PSProvider name expansion ## [Get-Location | Get-PSDrive | Get-PSProvider | New-PSDrive | Remove-PSDrive] -PSProvider <tab> ## Get-PSProvider <tab> ## pwd -psp al<tab> ## #PSDrive name expansion ## [Get-PSDrive | New-PSDrive | Remove-PSDrive] [-Name] <tab> ## Get-PSDrive <tab> ## pwd -psd <tab> ## #PSSnapin name expansion ## [Add-PSSnapin | Get-PSSnapin | Remove-PSSnapin ] [-Name] <tab> ## Get-Command -PSSnapin <tab> ## Remove-PSSnapin <tab> ## Get-PSSnapin M<tab> ## #Eventlog name and expansion ## Get-Eventlog -Log <tab> ## Get-Eventlog w<tab> ## #Eventlog's entrytype expansion ## Get-EventLog -EntryType <tab> ## Get-EventLog -EntryType Er<tab> ## Get-EventLog -Ent <tab> ## #Service name expansion ## [Get-Service | Restart-Service | Resume-Service | Start-Service | Stop-Service | Suspend-Service] [-Name] <tab> ## New-Service -DependsOn <tab> ## New-Service -Dep e<tab> ## Get-Service -n <tab> ## Get-Service <tab>,a<tab>,p<tab> ## gsv <tab> ## #Service display name expansion ## [Get-Service | Restart-Service | Resume-Service | Start-Service | Stop-Service | Suspend-Service] [-DisplayName] <tab> ## Get-Service -Dis <tab> ## gsv -Dis <tab>,w<tab>,b<tab> ## #Cmdlet and Topic name expansion (this also support default help function and man alias) ## Get-Help [-Name] about_<tab> ## Get-Help <tab> ## #Category name expansion (this also support default help function and man alias) ## Get-Help -Category c<tab>,<tab> ## #Command name expansion ## Get-Command [-Name] <tab> ## Get-Command -Name <tab> ## gcm a<tab>,<tab> ## #Scope expansion ## [Clear-Variable | Export-Alias | Get-Alias | Get-PSDrive | Get-Variable | Import-Alias ## New-Alias | New-PSDrive | New-Variable | Remove-Variable | Set-Alias | Set-Variable] -Scope <tab> ## Clear-Variable -Scope G<tab> ## Set-Alias -s <tab> ## #Process name expansion ## [Get-Process | Stop-Process] [-Name] <tab> ## Stop-Process -Name <tab> ## Stop-Process -N pow<tab> ## Get-Process <tab> ## ps power<tab> ## #Trace sources expansion ## [Trace-Command | Get-TraceSource | Set-TraceSource] [-Name] <tab>,a<tab>,p<tab> ## #Trace -ListenerOption expansion ## [Set-TraceSource | Trace-Command] -ListenerOption <tab> ## Set-TraceSource -Lis <tab>,n<tab> ## #Trace -Option expansion ## [Set-TraceSource | Trace-Command] -Option <tab> ## Set-TraceSource -op <tab>,con<tab> ## #ItemType expansion ## New-Item -Item <tab> ## ni -ItemType d<tab> ## #ErrorAction and WarningAction option expansion ## CMDLET [-ErrorAction | -WarningAction] <tab> ## CMDLET -Errora s<tab> ## CMDLET -ea con<tab> ## CMDLET -wa <tab> ## #Continuous expansion with comma when parameter can treat multiple option ## # if there are spaces, occur display bug in the line ## # if strings contains '$' or '-', not work ## Get-Command -CommandType <tab>,<tab><tab>,cm<tab> ## pwd -psp <tab>,f<tab>,va<tab> ## Get-EventLog -EntryType <tab>,i<tab>,s<tab> ## #Enum expansion in method call expression ## # this needs one or more spaces after left parenthesis or comma ## $str = "day night" ## $str.Split( " ",<space>rem<tab> ## >>> $str.Split( " ", "RemoveEmptyEntries" ) <Enter> ERROR ## $str.Split( " ", "RemoveEmptyEntries" -as<space><tab> ## >>> $str.Split( " ", "RemoveEmptyEntries" -as [System.StringSplitOptions] ) <Enter> Success ## $type = [System.Type] ## $type.GetMembers(<space>Def<tab> ## [IO.Directory]::GetFiles( "C:\\", "*",<space>All<tab> ## # this can do continuous enum expansion with comma and no spaces ## $type.GetMembers( "IgnoreCase<comma>Dec<tab><comma>In<tab>" ## [IO.Directory]::GetAccessControl( "C:\\",<space>au<tab><comma>ac<tab><comma>G<tab> ## #Better '$_.' expansion when cmdlet output objects or method return objects ## ls |group { $_.Cr<tab>.Tost<tab>"y")} | tee -var foo| ? { $_.G<tab>.c<tab> -gt 5 } | % { md $_.N<tab> ; copy $_.G<tab> $_.N<tab> } ## [IO.DriveInfo]::GetDrives() | ? { $_.A<tab> -gt 1GB } ## $Host.UI.RawUI.GetBufferContents($rect) | % { $str += $_.c<tab> } ## gcm Add-Content |select -exp Par<tab>| select -ExpandProperty Par<tab> | ? { $_.Par<tab>.N<tab> -eq "string" } ## $data = Get-Process ## $data[2,4,5] | % { $_.<tab> ## #when Get-PipeLineObject failed, '$_.' shows methods and properties name of FileInfo and String and Type ## #Property name expansion by -Property parameter ## [ Format-List | Format-Custom | Format-Table | Format-Wide | Compare-Object | ## ConvertTo-Html | Measure-Object | Select-Object | Group-Object | Sort-Object ] [-Property] <tab> ## Select-Object -ExcludeProperty <tab> ## Select-Object -ExpandProperty <tab> ## gcm Get-Acl|select -exp Par<tab> ## ps |group na<tab> ## ls | ft A<tab>,M<tab>,L<tab> ## #Hashtable key expansion in the variable name and '.<tab>' ## Get-Process | Get-Unique | % { $hash += @{$_.ProcessName=$_} } ## $hash.pow<tab>.pro<tab> ## #Parameter expansion for function, filter and script ## man -f<tab> ## 'param([System.StringSplitOptions]$foo,[System.Management.Automation.ActionPreference]$bar,[System.Management.Automation.CommandTypes]$baz) {}' > foobar.ps1 ## .\\foobar.ps1 -<tab> -b<tab> ## #Enum expansion for function, filter and scripts ## # this can do continuous enum expansion with comma and no spaces ## .\\foobar.ps1 -foo rem<tab> -bar <tab><comma>c<tab><comma>sc<tab> -ea silent<tab> -wa con<tab> ## #Enum expansion for assignment expression ## #needs space(s) after '=' and comma ## #strongly-typed with -as operator and space(s) ## $ErrorActionPreference =<space><tab> ## $cmdtypes = New-Object System.Management.Automation.CommandTypes[] 3 ## $cmdtypes =<space><tab><comma><space>func<tab><comma><space>cmd<tab> -as<space><tab> ## #Path expansion with variable and '\\' or '/' ## $PWD\\../../<tab>\\<tab> ## "$env:SystemDrive/pro<tab>/<tab> ## #Operator expansion which starts with '-' ## "Power","Shell" -m<tab> "Power" -r<tab> '(Pow)(er)','$1d$2' ## 1..9 -co<tab> 5 ## #Keyword expansion ## fu<tab> test { p<tab> $foo, $bar ) b<tab> "foo" } pr<tab> $_ } en<tab> "$bar" } } ## #Variable name expansion (only global scope) ## [Clear-Variable | Get-Variable | New-Variable | Remove-Variable | Set-Variable] [-Name] <tab> ## [Cmdlet | Function | Filter | ExternalScript] -ErrorVariable <tab> ## [Cmdlet | Function | Filter | ExternalScript] -OutVariable <tab> ## Tee-Object -Variable <tab> ## gv pro<tab>,<tab> ## Remove-Variable -Name out<tab>,<tab>,ps<tab> ## ... | ... | tee -v <tab> ## #Alias name expansion ## [Get-Alias | New-Alias | Set-Alias] [-Name] <tab> ## Export-Alias -Name <tab> ## Get-Alias i<tab>,e<tab>,a<tab> ## epal -n for<tab> ## #Property name expansion with -groupBy parameter ## [Format-List | Format-Custom | Format-Table | Format-Wide] -groupBy <tab> ## ps | ft -g <tab> ## gcm | Format-Wide -GroupBy Par<tab> ## #Type accelerators expansion with no characters ## [<tab> ## New-Object -typename <tab> ## New-Object <tab> ## # File glob expansion with '@' ## ls *.txt@<tab> ## ls file.txt, foo1.txt, 'bar``[1``].txt', 'foo bar .txt' # 1 <tab> expanding with comma ## ls * -Filter *.txt # 2 <tab> refactoring ## ls *.txt # 3 <tab> (or 1 <tab> & 1 <shift>+<tab>) return original glob pattern ## This can also use '^'(hat) or '~'(tilde) for Excluding ## ls <hat>*.txt@<tab> ## ls foo.ps1, 'bar``[1``].xml' # 1 <tab> expanding with comma ## ls * -Filter * -Excluding *.txt # 2 <tab> refactoring ## *.txt<tilde>foo*<tilde>bar*@<tab> ## ls file.txt # 1 <tab> expanding with comma ## ls * -Filter *.txt -Excluding foo*, bar* # 2 <tab> refactoring ## # Ported history expansion from V2CTP3 TabExpansion with '#' ( #<pattern> or #<id> ) ## ls * -Filter * -Excluding foo*, bar*<Enter> ## #ls<tab> ## #1<tab> ## # Command buffer stack with ';'(semicolon) ## ls * -Filter * -Excluding foo*, bar*<semicolon><tab> # push command1 ## echo "PowerShell"<semicolon><tab> # push command2 ## get-process<semicolon><tab> # push command3 ## {COMMAND}<Enter> # execute another command ## get-process # Auto pop command3 from stack by LIFO ## This can also hand-operated pop with ';,'(semicolon&comma) or ';:'(semicolon&colon) ## get-process; <semicolon><comma><tab> ## get-process; echo "PowerShell" # pop command2 from stack by LIFO ## # Function name expansion after 'function' or 'filter' keywords ## function cl<tab> ## #Switch syntax option expansion ## switch -w<tab> -f<tab> ## #Better powershell.exe option expansion with '-' ## powershell -no<tab> -<tab> -en<tab> ## #A part of PowerShell attributes expansion ( CmdletBinding, Parameter, Alias, Validate*, Allow* ) ## [par<tab> ## [cmd<tab> ## #Member expansion for CmdletBinding and Parameter attributes ## [Parameter(man<tab>,<tab>1,val<tab>$true)] ## [CmdletBinding( <tab>"foo", su<tab>$true)] ## #Several current date/time formats with Ctrl+D ## <Ctrl+D><tab><tab><tab><tab><tab>... ## #Hand-operated pop from command buffer with Ctrl+P (this is also available with ';:' or ';,') ## <command>;<tab> # push command ## <Ctrl+D><tab> # pop ## #Paste clipboard with Ctrl+V ## <Ctrl+V><tab> ## # Cut current line with Ctrl+X ## <command><Ctrl+X><tab> ## # Cut words with a character after Ctrl+X until the character ## 1: PS > dir -Filter *.txt<Ctrl+X>-<tab> # Cut words until '-' ## 2: PS > dir - ## 3: PS > dir -<Ctrl+V><tab> # Paste words that were copyed now ## # Cut last word in current line with Ctrl+Z ## 1: PS > Get-ChildItem *.txt<Ctrl+Z><tab> # Cut last word in current line ## 2: PS > Get-ChildItem ## 3: PS > Get-ChildItem -Exclude <Ctrl+V><tab> # Paste last word that was copyed now ## #[ScriptBlock] member expansion for [ScriptBlock] literal ## { 1+1 }.inv<tab> ## #Help document's section name expansion at a line that has only spaces ## .syn<tab> ## .func<tab> ## #A part of history commands expansion with Ctrl+L (using split(";"),split("|"),split(";|") ) ## ls -Force -Recurse -Filter *.txt | ? { $_.LastWriteTime -lt [DateTime]::Today } ; echo PowerShell ## ls<Ctrl+L><tab><tab> ## ?<Ctrl+L><tab><tab> ## ec<Ctrl+L><tab> ## # Now command name expansion's priority is, ## alias -> function -> filter -> cmdlet -> script -> external command ## # PSDrive and item name expansion in variable notation ## ${fu<tab> ## ${function:cl<tab> ## ${c:*<tab>\\*<tab> ## ${c:\\win<tab>/sys<tab>/<tab> ## # Using Ctrl+K, characters insertion (bihind space or semi-coron or pipe operator) feature : it encloses tokens with parnthesis by default ## 1 - 1 - 1 - 1<Ctrl+K><tab> ## 1 - 1 - 1 - (1)<tab> ## 1 - 1 - 1 (- 1)<tab> ## 1 - 1 - (1 - 1)<tab><tab><tab>... ## with double Ctrl+K, it encloses tokens with $( ) ## for ( $i=0;$j=1<Ctrl+K><Ctrl+K><tab><tab> ## for ( $($i=0;$j=1) ## if there is a character between <Ctrl+K> and <tab>, it is inserted between tokens ## 1+1 | {$_*2}<Ctrl+K>%<tab> ## 1+1 | %{$_*2} ## 1+1 +1+1<Ctrl+K>;<tab> ## 1+1 ;+1+1 ## if the character is ( or { or {, tokens are enclosed ( ) or { } or {} ## int<Ctrl+K>[<tab> ## [int] ## with double Ctrl+K, and if there is a character between <Ctrl+K> and <tab>, it is inserted between tokens with '$' ## C:\\WINDOWS\\system32\\notepad.exe<Ctrl+K><Ctrl+K>{<tab> ## ${C:\\WINDOWS\\system32\\notepad.exe} ## % and ? are given special treatment with double Ctrl+K, these enclose tokens with % { } or ? { } behind '|' ## ls | $_.LastWriteTime -gt "2009/5"<Ctrl+K><Ctrl+K>?<tab> ## ls | ? {$_.LastWriteTime -gt "2009/5"} ## ls | $_.FullName<Ctrl+K><Ctrl+K>%<tab> ## ls | % {$_.FullName} ## # Parameter name (and command alias) expansion with Ctrl+E ## ls -f *.txt -r | ? { $_.LastWriteTime -lt "2009/5" } | Select-String powershell -e OEM<Ctrl+E><tab> ## ## Get-ChildItem -Filter *.txt -Recurse | Where-Object { $_.LastWriteTime -lt "2009/5" } | Select-String powershell -Exclude OEM<tab> ## Get-ChildItem -Filter *.txt -Recurse | Where-Object { $_.LastWriteTime -lt "2009/5" } | Select-String powershell -Encoding OEM<tab> ## Get-ChildItem -Filter *.txt -Recurse | Where-Object { $_.LastWriteTime -lt "2009/5" } | Select-String powershell -ErrorAction OEM<tab><tab>... ## # WMI Namespaces expansion for Get-WmiObject ## gwmi -Namespace <tab> ## Get-WmiObject -Namespace root\\asp<tab> ## # WMI Classes expansion which is corresponding to WMI Namespace (*) ## gwmi -Namespace ROOT\\CIMV2\\ms_409 -Class <tab>_<tab> ### Generate ProgIDs list... if ( Test-Path $PSHOME\\ProgIDs.txt ) { $_ProgID = type $PSHOME\\ProgIDs.txt -ReadCount 0 } else { $_HKCR = [Microsoft.Win32.Registry]::ClassesRoot.OpenSubKey("CLSID\\") $_ProgID = New-Object ( [System.Collections.Generic.List``1].MakeGenericType([String]) ) foreach ( $_subkey in $_HKCR.GetSubKeyNames() ) { foreach ( $_i in [Microsoft.Win32.Registry]::ClassesRoot.OpenSubKey("CLSID\\$_subkey\\ProgID") ) { if ($_i -ne $null) { $_ProgID.Add($_i.GetValue("")) } } } '$_ProgID was updated...' | Out-Host $_ProgID = $_ProgID|sort -Unique Set-Content -Value $_ProgID -Path $PSHOME\\ProgIDs.txt -Verbose } ### Generate TypeNames list... if ( Test-Path $PSHOME\\TypeNames.txt ) { $_TypeNames = type $PSHOME\\TypeNames.txt -ReadCount 0 } else { $_TypeNames = New-Object ( [System.Collections.Generic.List``1].MakeGenericType([String]) ) foreach ( $_asm in [AppDomain]::CurrentDomain.GetAssemblies() ) { foreach ( $_type in $_asm.GetTypes() ) { $_TypeNames.Add($_type.FullName) } } '$_TypeNames was updated...' | Out-Host $_TypeNames = $_TypeNames | sort -Unique Set-Content -Value $_TypeNames -Path $PSHOME\\TypeNames.txt -Verbose } if ( Test-Path $PSHOME\\TypeNames_System.txt ) { $_TypeNames_System = type $PSHOME\\TypeNames_System.txt -ReadCount 0 } else { $_TypeNames_System = $_TypeNames -like "System.*" -replace '^System\\.' '$_TypeNames_System was updated...' | Out-Host Set-Content -Value $_TypeNames_System -Path $PSHOME\\TypeNames_System.txt -Verbose } ### Generate Namespaces list... if ( Test-Path $PSHOME\\WMINamespaces.txt ) { $_WMINamespaces = type $PSHOME\\WMINamespaces.txt -ReadCount 0 } else { $_WMINamespaces = & { $sb = { param ($ns) gwmi __NAMESPACE -Namespace $ns -com . | % { $ns = $_.__NAMESPACE + "\\" + $_.Name $ns & $sb $ns } } & $sb root } $_WMINamespaces = $_WMINamespaces + "ROOT" | sort '$_WMINamespaces was updated...' | Out-Host Set-Content -Value $_WMINamespaces -Path $PSHOME\\WMINamespaces.txt -Verbose } ### Get default WMI Namespace... $_WMIdftNS = $_WMINamespaces -eq (Get-ItemProperty HKLM:\\SOFTWARE\\Microsoft\\WBEM\\Scripting)."Default Namespace" ### Generate WMIClasses list... if ( Test-Path $PSHOME\\WMIClasses.txt ) { $_WMIClasses = Import-Clixml $PSHOME\\WMIClasses.txt } else { $_new = '=(New-Object ( [System.Collections.Generic.List``1].MakeGenericType([String]) ));' $_WMIClasses = iex ('@{"' + [String]::Join( "`"$_new`"", $_WMINamespaces ) + "`"$_new}") foreach ( $_namespace in $_WMINamespaces ) { foreach ( $_class in gwmi -Namespace $_namespace -List ) { $_WMIClasses.$_namespace.Add($_class.Name) } $_WMIClasses.$_namespace.Sort() } '$_WMIClasses was updated...' | Out-Host Export-Clixml -InputObject $_WMIClasses -Path $PSHOME\\WMIClasses.txt -Verbose } [Reflection.Assembly]::LoadWithPartialName( "System.Windows.Forms" ) | Out-Null $global:_cmdstack = New-Object Collections.Stack $global:_snapin = $null $global:_TypeAccelerators = [type]::gettype("System.Management.Automation.TypeAccelerators")::get.keys | sort $global:_cmdline = New-Object Collections.ArrayList iex (@' function prompt { h -Count 1 -OutVariable line | % { $_.CommandLine.Split("|"); $_.CommandLine.Split(";"); $_.CommandLine.Split(";"); $_.CommandLine.Split(";|") } | Get-Unique | ? { $_ -ne $line.CommandLine -and $_ -notmatch '^\\s*$' } | % { $_.Trim(" ") } | ? { $global:_cmdline -notcontains $_ } | % { Set-CommandLine $_ | Out-Null } if ($_cmdstack.Count -gt 0) { $line = $global:_cmdstack.Pop() -replace '([[\\]\\(\\)+{}?~%])','{$1}' [System.Windows.Forms.SendKeys]::SendWait($line) } '@ + @" ${function:prompt} } "@) function Write-ClassNames ( $data, $i, $prefix='', $sep='.' ) { $preItem = "" foreach ( $class in $data -like $_opt ) { $Item = $class.Split($sep) if ( $preItem -ne $Item[$i] ) { if ( $i+1 -eq $Item.Count ) { if ( $prefix -eq "[" ) { $suffix = "]" } elseif ( $sep -like "[_\\]" ) { $suffix = "" } else { $suffix = " " } } else { $suffix = "" } $prefix + $_opt.Substring(0, $_opt.LastIndexOf($sep)+1) + $Item[$i] + $suffix $preItem = $Item[$i] } } } function Get-PipeLineObject { $i = -2 $property = $null do { $str = $line.Split("|") # extract the command name from the string # first split the string into statements and pipeline elements # This doesn't handle strings however. $_cmdlet = [regex]::Split($str[$i], '[|;=]')[-1] # take the first space separated token of the remaining string # as the command to look up. Trim any leading or trailing spaces # so you don't get leading empty elements. $_cmdlet = $_cmdlet.Trim().Split()[0] if ( $_cmdlet -eq "?" ) { $_cmdlet = "Where-Object" } $global:_exp = $_cmdlet # now get the info object for it... $_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet)[0] # loop resolving aliases... while ($_cmdlet.CommandType -eq 'alias') { $_cmdlet = @(Get-Command -type 'cmdlet,alias' $_cmdlet.Definition)[0] } if ( "Select-Object" -eq $_cmdlet ) { if ( $str[$i] -match '\\s+-Exp\\w*[\\s:]+(\\w+)' ) { $property = $Matches[1] + ";" + $property } } $i-- } while ( "Get-Unique", "Select-Object", "Sort-Object", "Tee-Object", "Where-Object" -contains $_cmdlet ) if ( $global:_forgci -eq $null ) { $a = @(ls "Alias:\\")[0] $e = @(ls "Env:\\")[0] $f = @(ls "Function:\\")[0] $h = @(ls "HKCU:\\")[0] $v = @(ls "Variable:\\")[0] $c = @(ls "cert:\\")[0] $global:_forgci = gi $PSHOME\\powershell.exe | Add-Member -Name CommandType -MemberType 'NoteProperty' -Value $f.CommandType -PassThru | Add-Member -Name Definition -MemberType 'NoteProperty' -Value $a.Definition -PassThru | Add-Member -Name Description -MemberType 'NoteProperty' -Value $a.Description -PassThru | Add-Member -Name Key -MemberType 'NoteProperty' -Value $e.Key -PassThru | Add-Member -Name Location -MemberType 'NoteProperty' -Value $c.Location -PassThru | Add-Member -Name LocationName -MemberType 'NoteProperty' -Value $c.LocationName -PassThru | Add-Member -Name Options -MemberType 'NoteProperty' -Value $a.Options -PassThru | Add-Member -Name ReferencedCommand -MemberType 'NoteProperty' -Value $a.ReferencedCommand -PassThru | Add-Member -Name ResolvedCommand -MemberType 'NoteProperty' -Value $a.ResolvedCommand -PassThru | Add-Member -Name ScriptBlock -MemberType 'NoteProperty' -Value $f.ScriptBlock -PassThru | Add-Member -Name StoreNames -MemberType 'NoteProperty' -Value $c.StoreNames -PassThru | Add-Member -Name SubKeyCount -MemberType 'NoteProperty' -Value $h.SubKeyCount -PassThru | Add-Member -Name Value -MemberType 'NoteProperty' -Value $e.Value -PassThru | Add-Member -Name ValueCount -MemberType 'NoteProperty' -Value $h.ValueCount -PassThru | Add-Member -Name Visibility -MemberType 'NoteProperty' -Value $a.Visibility -PassThru | Add-Member -Name Property -MemberType 'NoteProperty' -Value $h.Property -PassThru | Add-Member -Name ResolvedCommandName -MemberType 'NoteProperty' -Value $a.ResolvedCommandName -PassThru | Add-Member -Name Close -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name CreateSubKey -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name DeleteSubKey -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name DeleteSubKeyTree -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name DeleteValue -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Flush -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetSubKeyNames -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetValue -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetValueKind -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetValueNames -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name IsValidValue -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name OpenSubKey -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name SetValue -MemberType 'ScriptMethod' -Value {} -PassThru } if ( $global:_mix -eq $null ) { $f = gi $PSHOME\\powershell.exe $t = [type] $s = "" $global:_mix = ` Add-Member -InputObject (New-Object PSObject) -Name Mode -MemberType 'NoteProperty' -Value $f.Mode -PassThru | Add-Member -Name Assembly -MemberType 'NoteProperty' -Value $t.Assembly -PassThru | Add-Member -Name AssemblyQualifiedName -MemberType 'NoteProperty' -Value $t.AssemblyQualifiedName -PassThru | Add-Member -Name Attributes -MemberType 'NoteProperty' -Value $f.Attributes -PassThru | Add-Member -Name BaseType -MemberType 'NoteProperty' -Value $t.BaseType -PassThru | Add-Member -Name ContainsGenericParameters -MemberType 'NoteProperty' -Value $t.ContainsGenericParameters -PassThru | Add-Member -Name CreationTime -MemberType 'NoteProperty' -Value $f.CreationTime -PassThru | Add-Member -Name CreationTimeUtc -MemberType 'NoteProperty' -Value $f.CreationTimeUtc -PassThru | Add-Member -Name DeclaringMethod -MemberType 'NoteProperty' -Value $t.DeclaringMethod -PassThru | Add-Member -Name DeclaringType -MemberType 'NoteProperty' -Value $t.DeclaringType -PassThru | Add-Member -Name Exists -MemberType 'NoteProperty' -Value $f.Exists -PassThru | Add-Member -Name Extension -MemberType 'NoteProperty' -Value $f.Extension -PassThru | Add-Member -Name FullName -MemberType 'NoteProperty' -Value $f.FullName -PassThru | Add-Member -Name GenericParameterAttributes -MemberType 'NoteProperty' -Value $t.GenericParameterAttributes -PassThru | Add-Member -Name GenericParameterPosition -MemberType 'NoteProperty' -Value $t.GenericParameterPosition -PassThru | Add-Member -Name GUID -MemberType 'NoteProperty' -Value $t.GUID -PassThru | Add-Member -Name HasElementType -MemberType 'NoteProperty' -Value $t.HasElementType -PassThru | Add-Member -Name IsAbstract -MemberType 'NoteProperty' -Value $t.IsAbstract -PassThru | Add-Member -Name IsAnsiClass -MemberType 'NoteProperty' -Value $t.IsAnsiClass -PassThru | Add-Member -Name IsArray -MemberType 'NoteProperty' -Value $t.IsArray -PassThru | Add-Member -Name IsAutoClass -MemberType 'NoteProperty' -Value $t.IsAutoClass -PassThru | Add-Member -Name IsAutoLayout -MemberType 'NoteProperty' -Value $t.IsAutoLayout -PassThru | Add-Member -Name IsByRef -MemberType 'NoteProperty' -Value $t.IsByRef -PassThru | Add-Member -Name IsClass -MemberType 'NoteProperty' -Value $t.IsClass -PassThru | Add-Member -Name IsCOMObject -MemberType 'NoteProperty' -Value $t.IsCOMObject -PassThru | Add-Member -Name IsContextful -MemberType 'NoteProperty' -Value $t.IsContextful -PassThru | Add-Member -Name IsEnum -MemberType 'NoteProperty' -Value $t.IsEnum -PassThru | Add-Member -Name IsExplicitLayout -MemberType 'NoteProperty' -Value $t.IsExplicitLayout -PassThru | Add-Member -Name IsGenericParameter -MemberType 'NoteProperty' -Value $t.IsGenericParameter -PassThru | Add-Member -Name IsGenericType -MemberType 'NoteProperty' -Value $t.IsGenericType -PassThru | Add-Member -Name IsGenericTypeDefinition -MemberType 'NoteProperty' -Value $t.IsGenericTypeDefinition -PassThru | Add-Member -Name IsImport -MemberType 'NoteProperty' -Value $t.IsImport -PassThru | Add-Member -Name IsInterface -MemberType 'NoteProperty' -Value $t.IsInterface -PassThru | Add-Member -Name IsLayoutSequential -MemberType 'NoteProperty' -Value $t.IsLayoutSequential -PassThru | Add-Member -Name IsMarshalByRef -MemberType 'NoteProperty' -Value $t.IsMarshalByRef -PassThru | Add-Member -Name IsNested -MemberType 'NoteProperty' -Value $t.IsNested -PassThru | Add-Member -Name IsNestedAssembly -MemberType 'NoteProperty' -Value $t.IsNestedAssembly -PassThru | Add-Member -Name IsNestedFamANDAssem -MemberType 'NoteProperty' -Value $t.IsNestedFamANDAssem -PassThru | Add-Member -Name IsNestedFamily -MemberType 'NoteProperty' -Value $t.IsNestedFamily -PassThru | Add-Member -Name IsNestedFamORAssem -MemberType 'NoteProperty' -Value $t.IsNestedFamORAssem -PassThru | Add-Member -Name IsNestedPrivate -MemberType 'NoteProperty' -Value $t.IsNestedPrivate -PassThru | Add-Member -Name IsNestedPublic -MemberType 'NoteProperty' -Value $t.IsNestedPublic -PassThru | Add-Member -Name IsNotPublic -MemberType 'NoteProperty' -Value $t.IsNotPublic -PassThru | Add-Member -Name IsPointer -MemberType 'NoteProperty' -Value $t.IsPointer -PassThru | Add-Member -Name IsPrimitive -MemberType 'NoteProperty' -Value $t.IsPrimitive -PassThru | Add-Member -Name IsPublic -MemberType 'NoteProperty' -Value $t.IsPublic -PassThru | Add-Member -Name IsSealed -MemberType 'NoteProperty' -Value $t.IsSealed -PassThru | Add-Member -Name IsSerializable -MemberType 'NoteProperty' -Value $t.IsSerializable -PassThru | Add-Member -Name IsSpecialName -MemberType 'NoteProperty' -Value $t.IsSpecialName -PassThru | Add-Member -Name IsUnicodeClass -MemberType 'NoteProperty' -Value $t.IsUnicodeClass -PassThru | Add-Member -Name IsValueType -MemberType 'NoteProperty' -Value $t.IsValueType -PassThru | Add-Member -Name IsVisible -MemberType 'NoteProperty' -Value $t.IsVisible -PassThru | Add-Member -Name LastAccessTime -MemberType 'NoteProperty' -Value $f.LastAccessTime -PassThru | Add-Member -Name LastAccessTimeUtc -MemberType 'NoteProperty' -Value $f.LastAccessTimeUtc -PassThru | Add-Member -Name LastWriteTime -MemberType 'NoteProperty' -Value $f.LastWriteTime -PassThru | Add-Member -Name LastWriteTimeUtc -MemberType 'NoteProperty' -Value $f.LastWriteTimeUtc -PassThru | Add-Member -Name MemberType -MemberType 'NoteProperty' -Value $t.MemberType -PassThru | Add-Member -Name MetadataToken -MemberType 'NoteProperty' -Value $t.MetadataToken -PassThru | Add-Member -Name Module -MemberType 'NoteProperty' -Value $t.Module -PassThru | Add-Member -Name Name -MemberType 'NoteProperty' -Value $t.Name -PassThru | Add-Member -Name Namespace -MemberType 'NoteProperty' -Value $t.Namespace -PassThru | Add-Member -Name Parent -MemberType 'NoteProperty' -Value $f.Parent -PassThru | Add-Member -Name ReflectedType -MemberType 'NoteProperty' -Value $t.ReflectedType -PassThru | Add-Member -Name Root -MemberType 'NoteProperty' -Value $f.Root -PassThru | Add-Member -Name StructLayoutAttribute -MemberType 'NoteProperty' -Value $t.StructLayoutAttribute -PassThru | Add-Member -Name TypeHandle -MemberType 'NoteProperty' -Value $t.TypeHandle -PassThru | Add-Member -Name TypeInitializer -MemberType 'NoteProperty' -Value $t.TypeInitializer -PassThru | Add-Member -Name UnderlyingSystemType -MemberType 'NoteProperty' -Value $t.UnderlyingSystemType -PassThru | Add-Member -Name PSChildName -MemberType 'NoteProperty' -Value $f.PSChildName -PassThru | Add-Member -Name PSDrive -MemberType 'NoteProperty' -Value $f.PSDrive -PassThru | Add-Member -Name PSIsContainer -MemberType 'NoteProperty' -Value $f.PSIsContainer -PassThru | Add-Member -Name PSParentPath -MemberType 'NoteProperty' -Value $f.PSParentPath -PassThru | Add-Member -Name PSPath -MemberType 'NoteProperty' -Value $f.PSPath -PassThru | Add-Member -Name PSProvider -MemberType 'NoteProperty' -Value $f.PSProvider -PassThru | Add-Member -Name BaseName -MemberType 'NoteProperty' -Value $f.BaseName -PassThru | Add-Member -Name Clone -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name CompareTo -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Contains -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name CopyTo -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Create -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name CreateObjRef -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name CreateSubdirectory -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Delete -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name EndsWith -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name FindInterfaces -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name FindMembers -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetAccessControl -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetArrayRank -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetConstructor -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetConstructors -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetCustomAttributes -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetDefaultMembers -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetDirectories -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetElementType -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetEnumerator -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetEvent -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetEvents -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetField -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetFields -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetFiles -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetFileSystemInfos -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetGenericArguments -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetGenericParameterConstraints -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetGenericTypeDefinition -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetInterface -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetInterfaceMap -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetInterfaces -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetLifetimeService -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetMember -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetMembers -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetMethod -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetMethods -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetNestedType -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetNestedTypes -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetObjectData -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetProperties -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetProperty -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name GetTypeCode -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name IndexOf -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name IndexOfAny -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name InitializeLifetimeService -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Insert -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name InvokeMember -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name IsAssignableFrom -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name IsDefined -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name IsInstanceOfType -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name IsNormalized -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name IsSubclassOf -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name LastIndexOf -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name LastIndexOfAny -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name MakeArrayType -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name MakeByRefType -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name MakeGenericType -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name MakePointerType -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name MoveTo -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Normalize -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name PadLeft -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name PadRight -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Refresh -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Remove -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Replace -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name SetAccessControl -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Split -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name StartsWith -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Substring -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name ToCharArray -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name ToLower -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name ToLowerInvariant -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name ToUpper -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name ToUpperInvariant -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Trim -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name TrimEnd -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name TrimStart -MemberType 'ScriptMethod' -Value {} -PassThru | Add-Member -Name Chars -MemberType 'NoteProperty' -Value $s.Chars -PassThru } if ( "Add-Member" -eq $_cmdlet ) { $global:_dummy = $null } if ( "Compare-Object" -eq $_cmdlet ) { $global:_dummy = (Compare-Object 1 2)[0] } if ( "ConvertFrom-SecureString" -eq $_cmdlet ) { $global:_dummy = $null } if ( "ConvertTo-SecureString" -eq $_cmdlet ) { $global:_dummy = convertto-securestring "P@ssW0rD!" -asplaintext -force } if ( "ForEach-Object" -eq $_cmdlet ) { $global:_dummy = $null } if ( "Get-Acl" -eq $_cmdlet ) { $global:_dummy = Get-Acl } if ( "Get-Alias" -eq $_cmdlet ) { $global:_dummy = (Get-Alias)[0] } if ( "Get-AuthenticodeSignature" -eq $_cmdlet ) { $global:_dummy = Get-AuthenticodeSignature $PSHOME\\powershell.exe } if ( "Get-ChildItem" -eq $_cmdlet ) { $global:_dummy = $global:_forgci } if ( "Get-Command" -eq $_cmdlet ) { $global:_dummy = @(iex $str[$i+1])[0] } if ( "Get-Content" -eq $_cmdlet ) { $global:_dummy = (type $PSHOME\\profile.ps1)[0] } if ( "Get-Credential" -eq $_cmdlet ) { $global:_dummy = $null } if ( "Get-Culture" -eq $_cmdlet ) { $global:_dummy = Get-Culture } if ( "Get-Date" -eq $_cmdlet ) { $global:_dummy = Get-Date } if ( "Get-Event" -eq $_cmdlet ) { $global:_dummy = (Get-Event)[0] } if ( "Get-EventLog" -eq $_cmdlet ) { $global:_dummy = @(iex $str[$i+1])[0] } if ( "Get-ExecutionPolicy" -eq $_cmdlet ) { $global:_dummy = Get-ExecutionPolicy } if ( "Get-Help" -eq $_cmdlet ) { $global:_dummy = Get-Help Add-Content } if ( "Get-History" -eq $_cmdlet ) { $global:_dummy = Get-History -Count 1 } if ( "Get-Host" -eq $_cmdlet ) { $global:_dummy = Get-Host } if ( "Get-Item" -eq $_cmdlet ) { $global:_dummy = $global:_forgci } if ( "Get-ItemProperty" -eq $_cmdlet ) { $global:_dummy = $null } if ( "Get-Location" -eq $_cmdlet ) { $global:_dummy = Get-Location } if ( "Get-Member" -eq $_cmdlet ) { $global:_dummy = (1|Get-Member)[0] } if ( "Get-Module" -eq $_cmdlet ) { $global:_dummy = (Get-Module)[0] } if ( "Get-PfxCertificate" -eq $_cmdlet ) { $global:_dummy = $null } if ( "Get-Process" -eq $_cmdlet ) { $global:_dummy = ps powershell } if ( "Get-PSBreakpoint" -eq $_cmdlet ) { $global:_dummy = Add-Member -InputObject (New-Object PSObject) -Name Action -MemberType 'NoteProperty' -Value '' -PassThru | Add-Member -Name Command -MemberType 'NoteProperty' -Value '' -PassThru | Add-Member -Name Enabled -MemberType 'NoteProperty' -Value '' -PassThru | Add-Member -Name HitCount -MemberType 'NoteProperty' -Value '' -PassThru | Add-Member -Name Id -MemberType 'NoteProperty' -Value '' -PassThru | Add-Member -Name Script -MemberType 'NoteProperty' -Value '' -PassThru } if ( "Get-PSCallStack" -eq $_cmdlet ) { $global:_dummy = Get-PSCallStack } if ( "Get-PSDrive" -eq $_cmdlet ) { $global:_dummy = Get-PSDrive Function } if ( "Get-PSProvider" -eq $_cmdlet ) { $global:_dummy = Get-PSProvider FileSystem } if ( "Get-PSSnapin" -eq $_cmdlet ) { $global:_dummy = Get-PSSnapin Microsoft.PowerShell.Core } if ( "Get-Service" -eq $_cmdlet ) { $global:_dummy = (Get-Service)[0] } if ( "Get-TraceSource" -eq $_cmdlet ) { $global:_dummy = Get-TraceSource AddMember } if ( "Get-UICulture" -eq $_cmdlet ) { $global:_dummy = Get-UICulture } if ( "Get-Variable" -eq $_cmdlet ) { $global:_dummy = Get-Variable _ } if ( "Get-WmiObject" -eq $_cmdlet ) { $global:_dummy = @(iex $str[$i+1])[0] } if ( "Group-Object" -eq $_cmdlet ) { $global:_dummy = 1 | group } if ( "Measure-Command" -eq $_cmdlet ) { $global:_dummy = Measure-Command {} } if ( "Measure-Object" -eq $_cmdlet ) { $global:_dummy = Measure-Object } if ( "New-PSDrive" -eq $_cmdlet ) { $global:_dummy = Get-PSDrive Alias } if ( "New-TimeSpan" -eq $_cmdlet ) { $global:_dummy = New-TimeSpan } if ( "Resolve-Path" -eq $_cmdlet ) { $global:_dummy = $PWD } if ( "Select-String" -eq $_cmdlet ) { $global:_dummy = " " | Select-String " " } if ( "Set-Date" -eq $_cmdlet ) { $global:_dummy = Get-Date } if ( $property -ne $null) { foreach ( $name in $property.Split(";", "RemoveEmptyEntries" -as [System.StringSplitOptions]) ) { $global:_dummy = @($global:_dummy.$name)[0] } } } function Set-CommandLine ( [string]$script ) { $global:_cmdline.Add($script) } function Get-CommandLine ( [string]$name ) { $name = $name -replace '\\?','`?' $global:_cmdline -like "$name*" } function TabExpansion { # This is the default function to use for tab expansion. It handles simple # member expansion on variables, variable name expansion and parameter completion # on commands. It doesn't understand strings so strings containing ; | ( or { may # cause expansion to fail. param($line, $lastWord) & { # Helper function to write out the matching set of members. It depends # on dynamic scoping to get $_base, _$expression and $_pat function Write-Members ($sep='.') { # evaluate the expression to get the object to examine... Invoke-Expression ('$_val=' + $_expression) if ( $_expression -match '^\\$global:_dummy' ) { $temp = $_expression -replace '^\\$global:_dummy(.*)','$1' $_expression = '$_' + $temp } $_method = [Management.Automation.PSMemberTypes] ` 'Method,CodeMethod,ScriptMethod,ParameterizedProperty' if ($sep -eq '.') { $params = @{view = 'extended','adapted','base'} } else { $params = @{static=$true} } if ( $_val -is [Hashtable] ) { [Object[]]$_keys = $null foreach ( $_name in $_val.Keys ) { $_keys += ` New-Object Microsoft.PowerShell.Commands.MemberDefinition ` [int],$_name,"Property",0 } } if ( $_keys -ne $null ) { $_members = [Object[]](Get-Member @params -InputObject $_val $_pat) + ($_keys | ? {$_.name -like $_pat}) } else { $_members = (Get-Member @params -InputObject $_val $_pat) } foreach ($_m in $_members | Sort-Object membertype,name) { if ($_m.MemberType -band $_method) { # Return a method... $_base + $_expression + $sep + $_m.name + '(' } else { # Return a property... $_base + $_expression + $sep + $_m.name } } } switch ([int]$line[-1]) { # Ctrl+D several date/time formats 4 { "[DateTime]::Now" [DateTime]::Now [DateTime]::Now.ToString("yyyyMMdd") [DateTime]::Now.ToString("MMddyyyy") [DateTime]::Now.ToString("yyyyMMddHHmmss") [DateTime]::Now.ToString("MMddyyyyHHmmss") 'd f g m o r t u y'.Split(" ") | % { [DateTime]::Now.ToString($_) } break; } # Ctrl+E command alias and parameter name expansion 5 { if ( $line -ne $( "=" + [Char]5 ) ) { $line = $line.SubString(0, $line.Length-1) $global:ctrlE = ""; $tail = 0 [Management.Automation.PSParser]::Tokenize($line, [ref]$null) | % { $word = $_.Content $head = $_.Start $spaces = ' ' * ($head-$tail) switch ( $_.Type ) { "Command" { $global:ctrlE = $global:ctrlE | % { $_ + $spaces + ($cmdinf = gcm ($word -replace '\\?','`?')).Definition.Split(" ")[0] } } "CommandParameter" { $_pat = $word.TrimStart("-") + "*" $global:ctrlE = $global:ctrlE | % { $temp = $_; $cmdinf.Parameters.Keys -like $_pat | % { $temp + $spaces + "-" + $_ } } } "Variable" { if ( $line[$head] -eq '$' ) { $sigil = '$' if ( $line[$head+1] -eq '{' ) { $global:ctrlE = $global:ctrlE | % { $_ + $spaces + '${' + $word + '}' } continue; } } elseif ( $line[$head] -eq '@' ) { $sigil = "@" } $global:ctrlE = $global:ctrlE | % { $_ + $spaces + $sigil + $word } } "String" { if ( $line[$head] -eq '"') { $quot = '"' } else { $quot = "'" } $global:ctrlE = $global:ctrlE | % { $_ + $spaces + $quot + $word + $quot } } default { $global:ctrlE = $global:ctrlE | % { $_ + $spaces + $word } } } $tail= $head + $_.Length } [Windows.Forms.SendKeys]::SendWait("{Esc}=^E{TAB}") } else { $global:ctrlE; } break TabExpansion; } # Ctrl+K put parentheses behind space or semi-coron or pipe operator 11 { if ( $line -ne $( "=" + [Char]11 ) ) { if ( $line[-2] -eq 11 ) { $left = '$' + "(" $line = $line.Substring(0,$line.length-2) } else { $left = "(" $line = $line.Substring(0,$line.length-1) } $global:_ctrlk = @() $l = $line.Length while ( $l -ge 0 ) { $i = $line.Substring(0,$l).LastIndexOfAny(" ;|") $global:_ctrlk += $line.Insert($i+1, $left) + ")" $l = $i } $global:_ctrlk += $line [Windows.Forms.SendKeys]::SendWait("{Esc}=^K{TAB}") } else { $global:_ctrlk } break TabExpansion; } # Ctrl+L a part of history commands expansion 12 { Get-CommandLine $lastWord.SubString(0, $lastword.Length-1) break; } # Ctrl+P hand-operated pop from command buffer stack 16 { $_base = $lastword.SubString(0, $lastword.Length-1) $_base + $global:_cmdstack.Pop() break; } # Ctrl+R $Host.UI.RawUI. 18 { '$Host.UI.RawUI.' '$Host.UI.RawUI' break; } # Ctrl+V paste clipboard 22 { $_base = $lastword.SubString(0, $lastword.Length-1) $_clip = New-Object System.Windows.Forms.TextBox $_clip.Multiline = $true $_clip.Paste() $_base + $_clip.Text break; } # Ctrl+X cut current line 24 { $_clip = new-object System.Windows.Forms.TextBox; $_clip.Multiline = $true; $_clip.Text = $line.SubString(0, $line.Length-1) $_clip.SelectAll() $_clip.Copy() [System.Windows.Forms.SendKeys]::SendWait("{ESC}") break; } # Ctrl+Z cut last word in current line 26 { $line.SubString(0, $line.Length-1) -match '(^(.*\\s)([^\\s]*)$)|(^[^\\s]*$)' | Out-Null $_clip = new-object System.Windows.Forms.TextBox; $_clip.Multiline = $true; $_clip.Text = $Matches[3] $_clip.SelectAll() $_clip.Copy() [System.Windows.Forms.SendKeys]::SendWait("{ESC}") $line = $Matches[2] -replace '([[\\]\\(\\)+{}?~%])','{$1}' [System.Windows.Forms.SendKeys]::SendWait($line) break; } } switch ( [int]$line[-2] ) { # Ctrl+K put character behind space or semi-coron or pipe operator 11 { switch ( $line[-1] ) { '{' { $right = '}' } '(' { $right = ')' } '[' { $right = ']' } } $left = $line[-1] $delimiter = " ;|" if ( $line[-3] -eq 11 ) { if ( $line[-1] -eq '%' -or $line[-1] -eq '?' ) { $left = ' ' + $left + ' {'; $right = '}' $delimiter = '|' } else { $left = '$' + $left } $line = $line.Substring(0,$line.length-3) } else { $line = $line.Substring(0,$line.length-2) } $global:_ctrlk = @() $l = $line.Length while ( $l -ge 0 ) { $i = $line.Substring(0,$l).LastIndexOfAny($delimiter) $global:_ctrlk += $line.Insert($i+1, $left) + $right $l = $i } $global:_ctrlk += $line [Windows.Forms.SendKeys]::SendWait("{Esc}=^K{TAB}") break TabExpansion; } # Ctrl+X cut words with a character after Ctrl+X until the character 24 { $line.SubString(0, $line.Length-2) -match "(^(.*$($line[-1]))([^$($line[-1])]*)`$)|(^[^\\$($line[-1])]*`$)" | Out-Null $_clip = new-object System.Windows.Forms.TextBox; $_clip.Multiline = $true; $_clip.Text = $Matches[3] $_clip.SelectAll() $_clip.Copy() [System.Windows.Forms.SendKeys]::SendWait("{ESC}") $line = $Matches[2] -replace '([[\\]\\(\\)+{}?~%])','{$1}' [System.Windows.Forms.SendKeys]::SendWait($line) break; } } switch -regex ($lastWord) { # Handle property and method expansion at '$_' '(^.*)(\\$_\\.)(\\w*)$' { $_base = $matches[1] $_expression = '$global:_dummy' $_pat = $matches[3] + '*' $global:_dummy = $null Get-PipeLineObject if ( $global:_dummy -eq $null ) { if ( $global:_exp -match '^\\$.*\\(.*$' ) { $type = ( iex $global:_exp.Split("(")[0] ).OverloadDefinitions[0].Split(" ")[0] -replace '\\[[^\\[\\]]*\\]$' -as [type] if ( $_expression -match '^\\$global:_dummy' ) { $temp = $_expression -replace '^\\$global:_dummy(.*)','$1' $_expression = '$_' + $temp } foreach ( $_m in $type.GetMembers() | sort membertype,name | group name | ? { $_.Name -like $_pat } | % { $_.Group[0] } ) { if ($_m.MemberType -eq "Method") { $_base + $_expression + '.' + $_m.name + '(' } else { $_base + $_expression + '.' + $_m.name } } break; } elseif ( $global:_exp -match '^\\[.*\\:\\:.*\\(.*$' ) { $tname, $mname = $_exp.Split(":(", "RemoveEmptyEntries"-as [System.StringSplitOptions])[0,1] $type = @(iex ($tname + '.GetMember("' + $mname + '")'))[0].ReturnType.FullName -replace '\\[[^\\[\\]]*\\]$' -as [type] if ( $_expression -match '^\\$global:_dummy' ) { $temp = $_expression -replace '^\\$global:_dummy(.*)','$1' $_expression = '$_' + $temp } foreach ( $_m in $type.GetMembers() | sort membertype,name | group name | ? { $_.Name -like $_pat } | % { $_.Group[0] } ) { if ($_m.MemberType -eq "Method") { $_base + $_expression + '.' + $_m.name + '(' } else { $_base + $_expression + '.' + $_m.name } } break; } elseif ( $global:_exp -match '^(\\$\\w+(\\[[0-9,\\.]+\\])*(\\.\\w+(\\[[0-9,\\.]+\\])*)*)$' ) { $global:_dummy = @(iex $Matches[1])[0] } else { $global:_dummy = $global:_mix } } Write-Members break; } # Handle property and method expansion rooted at variables... # e.g. $a.b.<tab> '(^.*)(\\$(\\w|\\.)+)\\.(\\w*)$' { $_base = $matches[1] $_expression = $matches[2] $_pat = $matches[4] + '*' [void] ( iex "$_expression.IsDataLanguageOnly" ) # for [ScriptBlock] if ( $_expression -match '^\\$_\\.' ) { $_expression = $_expression -replace '^\\$_(.*)',('$global:_dummy' + '$1') } Write-Members break; } # Handle simple property and method expansion on static members... # e.g. [datetime]::n<tab> '(^.*)(\\[(\\w|\\.)+\\])\\:\\:(\\w*)$' { $_base = $matches[1] $_expression = $matches[2] $_pat = $matches[4] + '*' Write-Members '::' break; } # Handle complex property and method expansion on static members # where there are intermediate properties... # e.g. [datetime]::now.d<tab> '(^.*)(\\[(\\w|\\.)+\\]\\:\\:(\\w+\\.)+)(\\w*)$' { $_base = $matches[1] # everything before the expression $_expression = $matches[2].TrimEnd('.') # expression less trailing '.' $_pat = $matches[5] + '*' # the member to look for... Write-Members break; } # Handle property and method expansion on [ScriptBlock] members... # e.g. { 1+1 }.inv<tab> '(^.*})\\.(\\w*)$' { $_base = $matches[1] $_pat = $matches[2] + '*' foreach ( $_m in {} | Get-Member $_pat | sort membertype,name ) { if ($_m.MemberType -eq "Method") { $_base + '.' + $_m.name + '(' } else { $_base + '.' + $_m.name } } break; } # Handle variable name expansion... '(^.*\\$)(\\w+)$' { $_prefix = $matches[1] $_varName = $matches[2] foreach ($_v in Get-ChildItem ('variable:' + $_varName + '*')) { $_prefix + $_v.name } break; } # Handle item name expansion in variable notation... '(^.*\\${)(((\\w+):([\\\\/]?))[^\\\\/]+([\\\\/][^\\\\/]*)*)$' { $_prefix = $matches[1] $_driveName = $matches[3] $_itemName = $matches[2] + "*" Get-ChildItem $_itemName | % { if ( $matches[5] -and $_.PSProvider.Name -eq "FileSystem" ) { $output = $_prefix + $_.FullName } elseif ( $_.PSProvider.Name -eq "FileSystem" -and $matches[6] ) { $cd = (Get-Location -PSDrive $matches[4]).Path $output = $_prefix + $_driveName + $_.FullName.Substring($cd.Length+1) } elseif ( $_.PSProvider.Name -eq "FileSystem" ) { $cd = (Get-Location -PSDrive $matches[4]).Path $output = $_prefix + $_driveName + $_.FullName.Substring($cd.Length+1) } else { $output = $_prefix + $_driveName + $_.Name } if ( $_.PSIsContainer ) { $output } else
combined_dataset/train/non-malicious/sample_66_74.ps1
sample_66_74.ps1
# # Module manifest for module 'OCI.PSModules.Capacitymanagement' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Capacitymanagement.dll' # Version number of this module. ModuleVersion = '84.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '847ff9d9-1cd2-4050-8297-31d3b08d96b0' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Capacitymanagement Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '84.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Capacitymanagement.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCICapacitymanagementInternalNamespaceOccOverviewsList', 'Get-OCICapacitymanagementOccAvailabilitiesList', 'Get-OCICapacitymanagementOccAvailabilityCatalog', 'Get-OCICapacitymanagementOccAvailabilityCatalogContent', 'Get-OCICapacitymanagementOccAvailabilityCatalogsInternalList', 'Get-OCICapacitymanagementOccAvailabilityCatalogsList', 'Get-OCICapacitymanagementOccCapacityRequest', 'Get-OCICapacitymanagementOccCapacityRequestsInternalList', 'Get-OCICapacitymanagementOccCapacityRequestsList', 'Get-OCICapacitymanagementOccCustomerGroup', 'Get-OCICapacitymanagementOccCustomerGroupsList', 'Get-OCICapacitymanagementOccOverviewsList', 'Invoke-OCICapacitymanagementPatchInternalOccCapacityRequest', 'Invoke-OCICapacitymanagementPatchOccCapacityRequest', 'Invoke-OCICapacitymanagementPublishOccAvailabilityCatalog', 'New-OCICapacitymanagementOccAvailabilityCatalog', 'New-OCICapacitymanagementOccCapacityRequest', 'Remove-OCICapacitymanagementOccAvailabilityCatalog', 'Remove-OCICapacitymanagementOccCapacityRequest', 'Update-OCICapacitymanagementInternalOccCapacityRequest', 'Update-OCICapacitymanagementOccAvailabilityCatalog', 'Update-OCICapacitymanagementOccCapacityRequest' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Capacitymanagement' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/3640.ps1
3640.ps1
function Test-CreateJobCredential { $a1 = Create-ElasticJobAgentTestEnvironment try { Test-CreateJobCredentialWithDefaultParam $a1 Test-CreateJobCredentialWithParentObject $a1 Test-CreateJobCredentialWithParentResourceId $a1 Test-CreateJobCredentialWithPiping $a1 } finally { Remove-ResourceGroupForTest $a1 } } function Test-GetJobCredential { $a1 = Create-ElasticJobAgentTestEnvironment try { Test-GetJobCredentialWithDefaultParam $a1 Test-GetJobCredentialWithParentObject $a1 Test-GetJobCredentialWithParentResourceId $a1 Test-GetJobCredentialWithPiping $a1 } finally { Remove-ResourceGroupForTest $a1 } } function Test-UpdateJobCredential { $a1 = Create-ElasticJobAgentTestEnvironment try { Test-UpdateJobCredentialWithDefaultParam $a1 Test-UpdateJobCredentialWithInputObject $a1 Test-UpdateJobCredentialWithResourceId $a1 Test-UpdateJobCredentialWithPiping $a1 } finally { Remove-ResourceGroupForTest $a1 } } function Test-RemoveJobCredential { $a1 = Create-ElasticJobAgentTestEnvironment try { Test-RemoveJobCredentialWithDefaultParam $a1 Test-RemoveJobCredentialWithInputObject $a1 Test-RemoveJobCredentialWithResourceId $a1 Test-RemoveJobCredentialWithPiping $a1 } finally { Remove-ResourceGroupForTest $a1 } } function Test-CreateJobCredentialWithDefaultParam ($a1) { $cn1 = Get-JobCredentialName $c1 = Get-ServerCredential $resp = New-AzSqlElasticJobCredential -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $cn1 -Credential $c1 Assert-AreEqual $resp.ResourceGroupName $a1.ResourceGroupName Assert-AreEqual $resp.ServerName $a1.ServerName Assert-AreEqual $resp.CredentialName $cn1 Assert-AreEqual $resp.UserName $c1.UserName } function Test-CreateJobCredentialWithParentObject ($a1) { $cn1 = Get-JobCredentialName $c1 = Get-ServerCredential $resp = New-AzSqlElasticJobCredential -ParentObject $a1 -Name $cn1 -Credential $c1 Assert-AreEqual $resp.ResourceGroupName $a1.ResourceGroupName Assert-AreEqual $resp.ServerName $a1.ServerName Assert-AreEqual $resp.CredentialName $cn1 Assert-AreEqual $resp.UserName $c1.UserName } function Test-CreateJobCredentialWithParentResourceId ($a1) { $cn1 = Get-JobCredentialName $c1 = Get-ServerCredential $resp = New-AzSqlElasticJobCredential -ParentResourceId $a1.ResourceId -Name $cn1 -Credential $c1 Assert-AreEqual $resp.ResourceGroupName $a1.ResourceGroupName Assert-AreEqual $resp.ServerName $a1.ServerName Assert-AreEqual $resp.CredentialName $cn1 Assert-AreEqual $resp.UserName $c1.UserName } function Test-CreateJobCredentialWithPiping ($a1) { $cn1 = Get-JobCredentialName $c1 = Get-ServerCredential $resp = $a1 | New-AzSqlElasticJobCredential -Name $cn1 -Credential $c1 Assert-AreEqual $resp.ResourceGroupName $a1.ResourceGroupName Assert-AreEqual $resp.ServerName $a1.ServerName Assert-AreEqual $resp.CredentialName $cn1 Assert-AreEqual $resp.UserName $c1.UserName } function Test-UpdateJobCredentialWithDefaultParam ($a1) { $jc1 = Create-JobCredentialForTest $a1 $newCred = Get-Credential $resp = Set-AzSqlElasticJobCredential -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $jc1.CredentialName -Credential $newCred Assert-AreEqual $resp.ResourceGroupName $a1.ResourceGroupName Assert-AreEqual $resp.ServerName $a1.ServerName Assert-AreEqual $resp.AgentName $a1.AgentName Assert-AreEqual $resp.CredentialName $jc1.CredentialName Assert-AreEqual $resp.UserName $newCred.UserName } function Test-UpdateJobCredentialWithInputObject ($a1) { $jc1 = Create-JobCredentialForTest $a1 $newCred = Get-Credential $resp = Set-AzSqlElasticJobCredential -InputObject $jc1 -Credential $newCred Assert-AreEqual $resp.ResourceGroupName $a1.ResourceGroupName Assert-AreEqual $resp.ServerName $a1.ServerName Assert-AreEqual $resp.AgentName $a1.AgentName Assert-AreEqual $resp.CredentialName $jc1.CredentialName Assert-AreEqual $resp.UserName $newCred.UserName } function Test-UpdateJobCredentialWithResourceId ($a1) { $jc1 = Create-JobCredentialForTest $a1 $newCred = Get-Credential $resp = Set-AzSqlElasticJobCredential -ResourceId $jc1.ResourceId -Credential $newCred Assert-AreEqual $resp.ResourceGroupName $a1.ResourceGroupName Assert-AreEqual $resp.ServerName $a1.ServerName Assert-AreEqual $resp.AgentName $a1.AgentName Assert-AreEqual $resp.CredentialName $jc1.CredentialName Assert-AreEqual $resp.UserName $newCred.UserName } function Test-UpdateJobCredentialWithPiping ($a1) { $jc1 = Create-JobCredentialForTest $a1 $newCred = Get-Credential $resp = $jc1 | Set-AzSqlElasticJobCredential -Credential $newCred Assert-AreEqual $resp.ResourceGroupName $a1.ResourceGroupName Assert-AreEqual $resp.ServerName $a1.ServerName Assert-AreEqual $resp.AgentName $a1.AgentName Assert-AreEqual $resp.CredentialName $jc1.CredentialName Assert-AreEqual $resp.UserName $newCred.UserName } function Test-GetJobCredentialWithDefaultParam ($a1) { $jc1 = Create-JobCredentialForTest $a1 $jc2 = Create-JobCredentialForTest $a1 $resp = Get-AzSqlElasticJobCredential -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $jc1.CredentialName Assert-AreEqual $resp.ResourceGroupName $a1.ResourceGroupName Assert-AreEqual $resp.ServerName $a1.ServerName Assert-AreEqual $resp.AgentName $a1.AgentName Assert-AreEqual $resp.CredentialName $jc1.CredentialName Assert-AreEqual $resp.UserName $jc1.UserName $resp = Get-AzSqlElasticJobCredential -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName Assert-True { $resp.Count -ge 2 } } function Test-GetJobCredentialWithParentObject ($a1) { $jc1 = Create-JobCredentialForTest $a1 $jc2 = Create-JobCredentialForTest $a1 $resp = Get-AzSqlElasticJobCredential -ParentObject $a1 -Name $jc1.CredentialName Assert-AreEqual $resp.ResourceGroupName $a1.ResourceGroupName Assert-AreEqual $resp.ServerName $a1.ServerName Assert-AreEqual $resp.AgentName $a1.AgentName Assert-AreEqual $resp.CredentialName $jc1.CredentialName Assert-AreEqual $resp.UserName $jc1.UserName $resp = Get-AzSqlElasticJobCredential -ParentObject $a1 Assert-True { $resp.Count -ge 2 } } function Test-GetJobCredentialWithParentResourceId ($a1) { $jc1 = Create-JobCredentialForTest $a1 $jc2 = Create-JobCredentialForTest $a1 $resp = Get-AzSqlElasticJobCredential -ParentResourceId $a1.ResourceId -Name $jc1.CredentialName Assert-AreEqual $resp.ResourceGroupName $a1.ResourceGroupName Assert-AreEqual $resp.ServerName $a1.ServerName Assert-AreEqual $resp.AgentName $a1.AgentName Assert-AreEqual $resp.CredentialName $jc1.CredentialName Assert-AreEqual $resp.UserName $jc1.UserName $resp = Get-AzSqlElasticJobCredential -ParentResourceId $a1.ResourceId Assert-True { $resp.Count -ge 2 } } function Test-GetJobCredentialWithPiping ($a1) { $jc1 = Create-JobCredentialForTest $a1 $jc2 = Create-JobCredentialForTest $a1 $resp = $a1 | Get-AzSqlElasticJobCredential -Name $jc1.CredentialName Assert-AreEqual $resp.ResourceGroupName $a1.ResourceGroupName Assert-AreEqual $resp.ServerName $a1.ServerName Assert-AreEqual $resp.AgentName $a1.AgentName Assert-AreEqual $resp.CredentialName $jc1.CredentialName Assert-AreEqual $resp.UserName $jc1.UserName $resp = $a1 | Get-AzSqlElasticJobCredential Assert-True { $resp.Count -ge 2 } } function Test-RemoveJobCredentialWithDefaultParam ($a1) { $jc1 = Create-JobCredentialForTest $a1 $resp = Remove-AzSqlElasticJobCredential -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $jc1.CredentialName Assert-AreEqual $resp.ResourceGroupName $a1.ResourceGroupName Assert-AreEqual $resp.ServerName $a1.ServerName Assert-AreEqual $resp.AgentName $a1.AgentName Assert-AreEqual $resp.CredentialName $jc1.CredentialName Assert-AreEqual $resp.UserName $jc1.UserName } function Test-RemoveJobCredentialWithInputObject ($a1) { $jc1 = Create-JobCredentialForTest $a1 $resp = Remove-AzSqlElasticJobCredential -InputObject $jc1 Assert-AreEqual $resp.ResourceGroupName $a1.ResourceGroupName Assert-AreEqual $resp.ServerName $a1.ServerName Assert-AreEqual $resp.AgentName $a1.AgentName Assert-AreEqual $resp.CredentialName $jc1.CredentialName Assert-AreEqual $resp.UserName $jc1.UserName } function Test-RemoveJobCredentialWithResourceId ($a1) { $jc1 = Create-JobCredentialForTest $a1 $resp = Remove-AzSqlElasticJobCredential -ResourceId $jc1.ResourceId Assert-AreEqual $resp.ResourceGroupName $a1.ResourceGroupName Assert-AreEqual $resp.ServerName $a1.ServerName Assert-AreEqual $resp.AgentName $a1.AgentName Assert-AreEqual $resp.CredentialName $jc1.CredentialName Assert-AreEqual $resp.UserName $jc1.UserName } function Test-RemoveJobCredentialWithPiping ($a1) { $jc1 = Create-JobCredentialForTest $a1 $jc2 = Create-JobCredentialForTest $a1 $resp = $jc1 | Remove-AzSqlElasticJobCredential Assert-AreEqual $resp.ResourceGroupName $a1.ResourceGroupName Assert-AreEqual $resp.ServerName $a1.ServerName Assert-AreEqual $resp.AgentName $a1.AgentName Assert-AreEqual $resp.CredentialName $jc1.CredentialName Assert-AreEqual $resp.UserName $jc1.UserName $all = $a1 | Get-AzSqlElasticJobCredential $resp = $all | Remove-AzSqlElasticJobCredential Assert-True { $resp.Count -ge 1 } Assert-Throws { $a1 | Get-AzSqlElasticJobCredential -Name $jc1.CredentialName } }
combined_dataset/train/non-malicious/sample_67_67.ps1
sample_67_67.ps1
# ------------------------------------------------------------ # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License (MIT). See License.txt in the repo root for license information. # ------------------------------------------------------------ function Publish-UpgradedServiceFabricApplication { <# .SYNOPSIS Publishes and starts an upgrade for an existing Service Fabric application in Service Fabric cluster. .DESCRIPTION This script registers & starts an upgrade for Service Fabric application. .NOTES Connection to service fabric cluster should be established by using 'Connect-ServiceFabricCluster' before invoking this cmdlet. .PARAMETER ApplicationPackagePath Path to the folder containing the Service Fabric application package OR path to the zipped service fabric applciation package. .PARAMETER ApplicationParameterFilePath Path to the application parameter file which contains Application Name and application parameters to be used for the application. .PARAMETER ApplicationName Name of Service Fabric application to be created. If value for this parameter is provided alongwith ApplicationParameterFilePath it will override the Application name specified in ApplicationParameter file. .PARAMETER Action Action which this script performs. Available Options are Register, Upgrade, RegisterAndUpgrade. Default Action is RegisterAndUpgrade. .PARAMETER ApplicationParameter Hashtable of the Service Fabric application parameters to be used for the application. If value for this parameter is provided, it will be merged with application parameters specified in ApplicationParameter file. In case a parameter is found ina pplication parameter file and on commandline, commandline parameter will override the one specified in application parameter file. .PARAMETER UpgradeParameters Hashtable of the upgrade parameters to be used for this upgrade. If Upgrade parameters are not specified then script will perform an UnmonitoredAuto upgrade. .PARAMETER UnregisterUnusedVersions Switch signalling if older vesions of the application need to be unregistered after upgrade. .PARAMETER SkipPackageValidation Switch signaling whether the package should be validated or not before deployment. .PARAMETER CopyPackageTimeoutSec Timeout in seconds for copying application package to image store. Default is 600 seconds. .PARAMETER CompressPackage Switch signaling whether the package should be compressed or not before deployment. .PARAMETER RegisterApplicationTypeTimeoutSec Timeout in seconds for registering application type. Default is 600 seconds. .PARAMETER UnregisterApplicationTypeTimeoutSec Timeout in seconds for unregistering application type. Default is 600 seconds. .PARAMETER StartupServicesFileMode StartupServicesFileMode should be true in case of StartupServices functionality. Default is false for backward compatibility. In this mode DefaultServices and Service Parameters will not be upgraded .EXAMPLE Publish-UpgradeServiceFabricApplication -ApplicationPackagePath 'pkg\Debug' -ApplicationParameterFilePath 'AppParameters.Local.xml' Registers & Upgrades an application with AppParameter file containing name of application and values for parameters that are defined in the application manifest. Publish-UpgradesServiceFabricApplication -ApplicationPackagePath 'pkg\Debug' -ApplicationName 'fabric:/Application1' Registers & Upgrades an application with the specified applciation name. #> [CmdletBinding(DefaultParameterSetName="ApplicationName")] Param ( [Parameter(Mandatory=$true,ParameterSetName="ApplicationParameterFilePath")] [Parameter(Mandatory=$true,ParameterSetName="ApplicationName")] [String]$ApplicationPackagePath, [Parameter(Mandatory=$true,ParameterSetName="ApplicationParameterFilePath")] [String]$ApplicationParameterFilePath, [Parameter(Mandatory=$true,ParameterSetName="ApplicationName")] [String]$ApplicationName, [Parameter(ParameterSetName="ApplicationParameterFilePath")] [Parameter(ParameterSetName="ApplicationName")] [ValidateSet('Register','Upgrade','RegisterAndUpgrade')] [String]$Action = 'RegisterAndUpgrade', [Parameter(ParameterSetName="ApplicationParameterFilePath")] [Parameter(ParameterSetName="ApplicationName")] [Hashtable]$ApplicationParameter, [Parameter(ParameterSetName="ApplicationParameterFilePath")] [Parameter(ParameterSetName="ApplicationName")] [Hashtable]$UpgradeParameters = @{UnmonitoredAuto = $true}, [Parameter(ParameterSetName="ApplicationParameterFilePath")] [Parameter(ParameterSetName="ApplicationName")] [Switch]$UnregisterUnusedVersions, [Parameter(ParameterSetName="ApplicationParameterFilePath")] [Parameter(ParameterSetName="ApplicationName")] [Switch]$SkipPackageValidation, [Parameter(ParameterSetName="ApplicationParameterFilePath")] [Parameter(ParameterSetName="ApplicationName")] [int]$CopyPackageTimeoutSec = 600, [Parameter(ParameterSetName="ApplicationParameterFilePath")] [Parameter(ParameterSetName="ApplicationName")] [Switch]$CompressPackage, [Parameter(ParameterSetName="ApplicationParameterFilePath")] [Parameter(ParameterSetName="ApplicationName")] [int]$RegisterApplicationTypeTimeoutSec = 600, [Parameter(ParameterSetName="ApplicationParameterFilePath")] [Parameter(ParameterSetName="ApplicationName")] [int]$UnregisterApplicationTypeTimeoutSec = 600, [Parameter(ParameterSetName="ApplicationParameterFilePath")] [Parameter(ParameterSetName="ApplicationName")] [bool]$StartupServicesFileMode = $false ) if (!(Test-Path $ApplicationPackagePath)) { $errMsg = "$ApplicationPackagePath is not found." throw $errMsg } if (Test-Path $ApplicationPackagePath -PathType Leaf) { if((Get-Item $ApplicationPackagePath).Extension -eq ".sfpkg") { $AppPkgPathToUse=[io.path]::combine($env:Temp, (Get-Item $ApplicationPackagePath).BaseName) Expand-ToFolder $ApplicationPackagePath $AppPkgPathToUse } else { $errMsg = "$ApplicationPackagePath is not a valid Service Fabric application package" throw $errMsg } } else { $AppPkgPathToUse = $ApplicationPackagePath } if ($PSBoundParameters.ContainsKey('ApplicationParameterFilePath') -and !(Test-Path $ApplicationParameterFilePath -PathType Leaf)) { $errMsg = "$ApplicationParameterFilePath is not found." throw $errMsg } try { [void](Test-ServiceFabricClusterConnection) } catch { Write-Warning "Unable to verify connection to Service Fabric cluster." throw } # Get image store connection string $clusterManifestText = Get-ServiceFabricClusterManifest $imageStoreConnectionString = Get-ImageStoreConnectionStringFromClusterManifest ([xml] $clusterManifestText) if(!$SkipPackageValidation) { $packageValidationSuccess = (Test-ServiceFabricApplicationPackage $AppPkgPathToUse -ImageStoreConnectionString $imageStoreConnectionString) if (!$packageValidationSuccess) { $errMsg = "Validation failed for package: " + $ApplicationPackagePath throw $errMsg } } $ApplicationManifestPath = "$AppPkgPathToUse\ApplicationManifest.xml" # If ApplicationName is not specified on command line get application name from Application parameter file. if(!$ApplicationName) { $ApplicationName = Get-ApplicationNameFromApplicationParameterFile $ApplicationParameterFilePath } $names = Get-NamesFromApplicationManifest -ApplicationManifestPath $ApplicationManifestPath if (!$names) { return } if ($Action.Equals('RegisterAndUpgrade') -or $Action.Equals('Register')) { ## Check existence of the application $oldApplication = Get-ServiceFabricApplication -ApplicationName $ApplicationName if (!$oldApplication) { $errMsg = "Application '$ApplicationName' doesn't exist in cluster." throw $errMsg } else { if($oldApplication.ApplicationTypeName -ne $names.ApplicationTypeName) { $errMsg = "Application type of application '$ApplicationName' doesn't match with the Application Type in application manifest specified in the new application package. Please ensure that the application being upgraded is of the same Applciation Type." throw $errMsg } } ## Check upgrade status $upgradeStatus = Get-ServiceFabricApplicationUpgrade -ApplicationName $ApplicationName if ($upgradeStatus.UpgradeState -ne "RollingBackCompleted" -and $upgradeStatus.UpgradeState -ne "RollingForwardCompleted" -and $upgradeStatus.UpgradeState -ne "Failed") { $errMsg = "An upgrade for the application '$names.ApplicationTypeName' is already in progress." throw $errMsg } $reg = Get-ServiceFabricApplicationType -ApplicationTypeName $names.ApplicationTypeName | Where-Object { $_.ApplicationTypeVersion -eq $names.ApplicationTypeVersion } if ($reg) { Write-Host 'Application Type '$names.ApplicationTypeName' and Version '$names.ApplicationTypeVersion' was already registered with Cluster, unregistering it...' $reg | Unregister-ServiceFabricApplicationType -Force -TimeoutSec $UnregisterApplicationTypeTimeoutSec } $applicationPackagePathInImageStore = $names.ApplicationTypeName Write-Host "Copying application package to image store..." Copy-ServiceFabricApplicationPackage -ApplicationPackagePath $AppPkgPathToUse -ImageStoreConnectionString $imageStoreConnectionString -ApplicationPackagePathInImageStore $applicationPackagePathInImageStore -TimeOutSec $CopyPackageTimeoutSec -CompressPackage:$CompressPackage if(!$?) { throw "Copying of application package to image store failed. Cannot continue with registering the application." } Write-Host "Registering application type..." Register-ServiceFabricApplicationType -ApplicationPathInImageStore $applicationPackagePathInImageStore -ApplicationPackageCleanupPolicy Manual -Async if(!$?) { throw "Registration of application type failed." } # Wait for app registration to finish. $ready = $false $retryTimeInterval = 2 $retryCount = $RegisterApplicationTypeTimeoutSec / $retryTimeInterval $prevStatusDetail = "" do { $appType = Get-ServiceFabricApplicationType -ApplicationTypeName $names.ApplicationTypeName -ApplicationTypeVersion $names.ApplicationTypeVersion if($appType.Status -eq "Available") { $ready = $true } elseif($appType.Status -eq "Failed") { if($appType.StatusDetails -ne "") { Write-Host $appType.StatusDetails } throw "Registration of application type failed." } else { if($appType.StatusDetails -ne "") { if($prevStatusDetail -ne $appType.StatusDetails) { Write-Host $appType.StatusDetails } $prevStatusDetail = $appType.StatusDetails } Start-Sleep -Seconds $retryTimeInterval $retryCount-- } } while (!$ready -and $retryCount -gt 0) if(!$ready) { throw "Registration of application package is not completed in specified timeout of $RegisterApplicationTypeTimeoutSec seconds. Please consider increasing this timout by passing a value for RegisterApplicationTypeTimeoutSec parameter." } else { Write-Host "Application package is registered." } } if ($Action.Equals('Upgrade') -or $Action.Equals('RegisterAndUpgrade')) { try { $UpgradeParameters["ApplicationName"] = $ApplicationName $UpgradeParameters["ApplicationTypeVersion"] = $names.ApplicationTypeVersion # If application parameters file is specified read values from and merge it with parameters passed on Commandline if ($PSBoundParameters.ContainsKey('ApplicationParameterFilePath')) { $appParamsFromFile = Get-ApplicationParametersFromApplicationParameterFile $ApplicationParameterFilePath if(!$ApplicationParameter) { $ApplicationParameter = $appParamsFromFile } else { $ApplicationParameter = Merge-Hashtables -HashTableOld $appParamsFromFile -HashTableNew $ApplicationParameter } } if($StartupServicesFileMode) { Write-Warning "Execution with StartupSerivces.xml doesnt upgrade service parameters. If you want to upgrade service parameters, use Update-ServiceFabricService." } $UpgradeParameters["ApplicationParameter"] = $ApplicationParameter $serviceTypeHealthPolicyMap = $upgradeParameters["ServiceTypeHealthPolicyMap"] if ($serviceTypeHealthPolicyMap -and $serviceTypeHealthPolicyMap -is [string]) { $upgradeParameters["ServiceTypeHealthPolicyMap"] = Invoke-Expression $serviceTypeHealthPolicyMap } Write-Host "Start upgrading application..." Start-ServiceFabricApplicationUpgrade @UpgradeParameters } catch [Exception] { Write-Host $_.Exception.Message # Unregister the application type and version if the action was RegisterAndUpgrade. # Don't Unregister the application type and version if the action was Upgrade as the application type and version could be in use by some other application instance. if ($Action.Equals('Upgrade')) { Write-Host "Unregister application type '$names.ApplicationTypeName' and version '$names.ApplicationTypeVersion' ..." Unregister-ServiceFabricApplicationType -ApplicationTypeName $names.ApplicationTypeName -ApplicationTypeVersion $names.ApplicationTypeVersion -Force -TimeoutSec $UnregisterApplicationTypeTimeoutSec } throw } if (!$UpgradeParameters["Monitored"] -and !$UpgradeParameters["UnmonitoredAuto"]) { return } Write-Host "Waiting for upgrade ..." do { Start-Sleep -Seconds 5 $upgradeStatus = Get-ServiceFabricApplicationUpgrade -ApplicationName $ApplicationName $completedUDs=0 foreach($ud in $upgradeStatus.UpgradeDomains) { if($ud.State -eq "Completed") { $completedUDs++ } } $totalUDs = $upgradeStatus.UpgradeDomains.Count Write-Host "Upgrade Progress: Completed $completedUDs/$totalUDs upgrade domains." } while ($upgradeStatus.UpgradeState -ne "RollingBackCompleted" -and $upgradeStatus.UpgradeState -ne "RollingForwardCompleted" -and $upgradeStatus.UpgradeState -ne "Failed") if($UnregisterUnusedVersions) { Write-Host 'Unregistering other unused versions for the application type...' foreach($registeredAppTypes in Get-ServiceFabricApplicationType -ApplicationTypeName $names.ApplicationTypeName | Where-Object { $_.ApplicationTypeVersion -ne $names.ApplicationTypeVersion }) { try { $registeredAppTypes | Unregister-ServiceFabricApplicationType -Force -TimeoutSec $UnregisterApplicationTypeTimeoutSec } catch [System.Fabric.FabricException] { # AppType and Version in use. } } } if($upgradeStatus.UpgradeState -eq "RollingForwardCompleted") { Write-Host "Upgrade completed successfully." } elseif($upgradeStatus.UpgradeState -eq "RollingBackCompleted") { Write-Error "Upgrade was Rolled back." } elseif($upgradeStatus.UpgradeState -eq "Failed") { if($upgradeStatus.UpgradeStatusDetails -ne "") { Write-Host $upgradeStatus.UpgradeStatusDetails } Write-Error "Upgrade Failed." } } } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA1aF0yYnXKPanR # 7iSEL53svKv/xbtVAYUryFkI7XHEK6CCDXYwggX0MIID3KADAgECAhMzAAADTrU8 # esGEb+srAAAAAANOMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI5WhcNMjQwMzE0MTg0MzI5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDdCKiNI6IBFWuvJUmf6WdOJqZmIwYs5G7AJD5UbcL6tsC+EBPDbr36pFGo1bsU # p53nRyFYnncoMg8FK0d8jLlw0lgexDDr7gicf2zOBFWqfv/nSLwzJFNP5W03DF/1 # 1oZ12rSFqGlm+O46cRjTDFBpMRCZZGddZlRBjivby0eI1VgTD1TvAdfBYQe82fhm # WQkYR/lWmAK+vW/1+bO7jHaxXTNCxLIBW07F8PBjUcwFxxyfbe2mHB4h1L4U0Ofa # +HX/aREQ7SqYZz59sXM2ySOfvYyIjnqSO80NGBaz5DvzIG88J0+BNhOu2jl6Dfcq # jYQs1H/PMSQIK6E7lXDXSpXzAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUnMc7Zn/ukKBsBiWkwdNfsN5pdwAw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMDUxNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAD21v9pHoLdBSNlFAjmk # mx4XxOZAPsVxxXbDyQv1+kGDe9XpgBnT1lXnx7JDpFMKBwAyIwdInmvhK9pGBa31 # TyeL3p7R2s0L8SABPPRJHAEk4NHpBXxHjm4TKjezAbSqqbgsy10Y7KApy+9UrKa2 # kGmsuASsk95PVm5vem7OmTs42vm0BJUU+JPQLg8Y/sdj3TtSfLYYZAaJwTAIgi7d # hzn5hatLo7Dhz+4T+MrFd+6LUa2U3zr97QwzDthx+RP9/RZnur4inzSQsG5DCVIM # pA1l2NWEA3KAca0tI2l6hQNYsaKL1kefdfHCrPxEry8onJjyGGv9YKoLv6AOO7Oh # JEmbQlz/xksYG2N/JSOJ+QqYpGTEuYFYVWain7He6jgb41JbpOGKDdE/b+V2q/gX # UgFe2gdwTpCDsvh8SMRoq1/BNXcr7iTAU38Vgr83iVtPYmFhZOVM0ULp/kKTVoir # IpP2KCxT4OekOctt8grYnhJ16QMjmMv5o53hjNFXOxigkQWYzUO+6w50g0FAeFa8 # 5ugCCB6lXEk21FFB1FdIHpjSQf+LP/W2OV/HfhC3uTPgKbRtXo83TZYEudooyZ/A # Vu08sibZ3MkGOJORLERNwKm2G7oqdOv4Qj8Z0JrGgMzj46NFKAxkLSpE5oHQYP1H # tPx1lPfD7iNSbJsP6LiUHXH1MIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAANOtTx6wYRv6ysAAAAAA04wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIN1RLXqDOUYHHHBbRKyea2QT # kKOGXrZAdvfA68RYvUcyMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAe+Jd48zajjGcDCFbwAEoEUW8/TEUd0SA9YVzsDi4iwee+eCmHWc0NOjZ # KbH82DESsf9PEd5M2zG13QZ4eghCOLe3oeMCqJb5XuwBZKjaGdzJcBYqw8F7w8/Y # Ijrlof4kmIhW3s/VYKMfbl1pna3aj+XbarJYJ56U8ZQhn1nmgJAtRgxLBw5rptIj # v1zlxKMLFEhXi373ijiaDqGUDoZjNK4e9TQoy5wOwNVZ+sn8rg9+0YVp7CEYu8Fz # vDclYFLV2g4r7tbsD2SqSvO55/TDVG9P+yNXpWCaBGaY0qYLwK2+4OgZsnzJmNME # RwbgSh0Wh5uEkNI5B9mNpdkn7A4kbqGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCA8tvyRqd/WQFSeH9Y07Y2+bXtNNvAioMuaMWB/dv76eQIGZSh37tGg # GBMyMDIzMTAxNzE4MjUyNy41OTNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAc1VByrnysGZHQABAAABzTANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEy # MDVaFw0yNDAyMDExOTEyMDVaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDTOCLVS2jmEWOqxzygW7s6YLmm29pjvA+Ch6VL7HlT # L8yUt3Z0KIzTa2O/Hvr/aJza1qEVklq7NPiOrpBAIz657LVxwEc4BxJiv6B68a8D # QiF6WAFFNaK3WHi7TfxRnqLohgNz7vZPylZQX795r8MQvX56uwjj/R4hXnR7Na4L # lu4mWsml/wp6VJqCuxZnu9jX4qaUxngcrfFT7+zvlXClwLah2n0eGKna1dOjOgyK # 00jYq5vtzr5NZ+qVxqaw9DmEsj9vfqYkfQZry2JO5wmgXX79Ox7PLMUfqT4+8w5J # kdSMoX32b1D6cDKWRUv5qjiYh4o/a9ehE/KAkUWlSPbbDR/aGnPJLAGPy2qA97YC # BeeIJjRKURgdPlhE5O46kOju8nYJnIvxbuC2Qp2jxwc6rD9M6Pvc8sZIcQ10YKZV # YKs94YPSlkhwXwttbRY+jZnQiDm2ZFjH8SPe1I6ERcfeYX1zCYjEzdwWcm+fFZml # JA9HQW7ZJAmOECONtfK28EREEE5yzq+T3QMVPhiEfEhgcYsh0DeoWiYGsDiKEuS+ # FElMMyT456+U2ZRa2hbRQ97QcbvaAd6OVQLp3TQqNEu0es5Zq0wg2CADf+QKQR/Y # 6+fGgk9qJNJW3Mu771KthuPlNfKss0B1zh0xa1yN4qC3zoE9Uq6T8r7G3/OtSFms # 4wIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFKGT+aY2aZrBAJVIZh5kicokfNWaMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBSqG3ppKIU+i/EMwwtotoxnKfw0SX/3T16 # EPbjwsAImWOZ5nLAbatopl8zFY841gb5eiL1j81h4DiEiXt+BJgHIA2LIhKhSscd # 79oMbr631DiEqf9X5LZR3V3KIYstU3K7f5Dk7tbobuHu+6fYM/gOx44sgRU7YQ+Y # TYHvv8k4mMnuiahJRlU/F2vavcHU5uhXi078K4nSRAPnWyX7gVi6iVMBBUF4823o # PFznEcHup7VNGRtGe1xvnlMd1CuyxctM8d/oqyTsxwlJAM5F/lDxnEWoSzAkad1n # WvkaAeMV7+39IpXhuf9G3xbffKiyBnj3cQeiA4SxSwCdnx00RBlXS6r9tGDa/o9R # S01FOABzKkP5CBDpm4wpKdIU74KtBH2sE5QYYn7liYWZr2f/U+ghTmdOEOPkXEcX # 81H4dRJU28Tj/gUZdwL81xah8Kn+cB7vM/Hs3/J8tF13ZPP+8NtX3vu4NrchHDJY # gjOi+1JuSf+4jpF/pEEPXp9AusizmSmkBK4iVT7NwVtRnS1ts8qAGHGPg2HPa4b2 # u9meueUoqNVtMhbumI1y+d9ZkThNXBXz2aItT2C99DM3T3qYqAUmvKUryVSpMLVp # se4je5WN6VVlCDFKWFRH202YxEVWsZ5baN9CaqCbCS0Ea7s9OFLaEM5fNn9m5s69 # lD/ekcW2qTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBo # qfem2KKzuRZjISYifGolVOdyBKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6NjkqTAiGA8yMDIzMTAxNzEwNDcw # NVoYDzIwMjMxMDE4MTA0NzA1WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDo2OSp # AgEAMAcCAQACAjgeMAcCAQACAhLrMAoCBQDo2jYpAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBABhIq5dG1ZKMlEh+lHHy4RYWVpCnexGr24SpzdLQtBob6mXg # 9EGj9zk2MaP5CjEjcDMx3NseriYNFvA4LvxYDc8ddPNcET8/4kK8qlir9NR/lfrd # GPZOtMvOG2sO9tQbA3l+DKHWy4fL3TvdS5XpXzOpjIP23ESj/7+VMQs3yR6XOL/F # /EAj5qSEGtnBKPdRXG67od1XM2URSEsOcD03s2lKRQn9qNYTXJ8ytOYXVduF80Pg # y23cQ4Cr4SjUKP26blWBysxxA/k2dvxOMcTo0v9iHgRh0zC7bzyB8n5R6UJKt4bi # SMAFTtqgGIyEJx7oEt9STM54MqQy2k0giLHWgbcxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAc1VByrnysGZHQABAAABzTAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCArMNgFVYPfzV6t0n7J4njMsNNXE/qmAdNxROQeOSvMRTCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIOJmpfitVr1PZGgvTEdTpStUc6GN # h7LNroQBKwpURpkKMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHNVQcq58rBmR0AAQAAAc0wIgQgZ0ElAfK6FCmBtJ68nwSFJYY+rxcz # lJNYdssEdz7+OxkwDQYJKoZIhvcNAQELBQAEggIAmE4pNvR164GyV6iy/DR9s+uq # SjZ7ztbavMnJm/FJtY4taWDDJnKn5LbckbY6/gDV4DsPVAyPK6qlPQl2ALrewGGu # dQxDvWKx9qBBsN3NSt4Z9WR42JTXBoz3n+IcBlWZxJOBPJ1DElx0ROcN4/Sard3G # 7rl7GOQcd/iu3VTZLuy/mhDXmVHF3Pzl7rsiD/uCTbciVG5FzcyQOBWLAPDrveHz # 1aXImkjaWcVC/8zh3z+IJFn1vSoBF38Rxk2op0vCBPWfaVSs+pa9f+C4HjZUkjov # SABDlMD7wK7PLsYmc7KBhvVEcYmJ14L0cOGRhUty9+Fx69z2xh3SnMfH7XeDxNzP # twQu+LBYfQtH1yDvz+ecz4rk3a87KuZzAIOg5dClZ+pfRyNBbghTAYHlLPXHXA8X # DS4hdWgChJ9ZDZ3O3mo8hA7zizPTaLeCkYyOCUNhzSEb+GPkto22aOqLvAYB34cF # NAttkblbud7r4RALL7FxmUcJAcpfCF2OBFftQi3TkwzNTqh3QFh9kS7oSRY4g073 # 74qyHI3R4x/ajN3FikLhcc7QkO5Kl3WgErBM3DZw96AWxyRFvC3MX3LYrl8fDRk1 # /hIxOccfN3+vtykVdRMBnUnWEaMqMKvvxEBwsPCNYogc6VrhzT0QvWCGWdVay9G6 # Vtzwf+Btd8ZKdtOGsJw= # SIG # End signature block
combined_dataset/train/non-malicious/2066.ps1
2066.ps1
Describe "Serialization Tests" -tags "CI" { BeforeAll { $testfileName="SerializationTest.txt" $testPath = Join-Path $TestDrive $testfileName $testfile = New-Item $testPath -Force function SerializeAndDeserialize([PSObject]$inputObject) { $xmlSerializer = New-Object System.Xml.Serialization.XmlSerializer($inputObject.GetType()) $stream = [System.IO.StreamWriter]$testPath $xmlWriter = [System.Xml.XmlWriter]::Create($stream) $xmlSerializer.Serialize($xmlWriter,$inputObject) $stream.Close() $stream = [System.IO.StreamReader]$testPath $xmlReader = [System.Xml.XmlReader]::Create($stream) $outputObject = $xmlSerializer.Deserialize($xmlReader) $stream.Close() $xmlReader.Dispose() return $outputObject; } enum MyColorFlag { RED BLUE } } AfterAll { Remove-Item $testPath -Force -ErrorAction SilentlyContinue } It 'Test DateTimeUtc serialize and deserialize work as expected.' { $inputObject = [System.DateTime]::UtcNow; SerializeAndDeserialize($inputObject) | Should -Be $inputObject } It 'Test DateTime stamps serialize and deserialize work as expected.' { $objs = [System.DateTime]::MaxValue, [System.DateTime]::MinValue, [System.DateTime]::Today, (new-object System.DateTime), (new-object System.DateTime 123456789) foreach($inputObject in $objs) { SerializeAndDeserialize($inputObject) | Should -Be $inputObject } } It 'Test system Uri objects serialize and deserialize work as expected.' -Pending:$true { $uristrings = "http://www.microsoft.com","http://www.microsoft.com:8000","http://www.microsoft.com/index.html","http://www.microsoft.com/default.asp","http://www.microsoft.com/Hello%20World.htm" foreach($uristring in $uristrings) { $inputObject = new-object System.Uri $uristring SerializeAndDeserialize($inputObject) | Should -Be $inputObject } } It 'Test a byte array serialize and deserialize work as expected.' { $objs1 = [byte]0, [byte]1, [byte]2, [byte]3, [byte]255 $objs2 = @() $objs3 = [byte]128 $objs4 = @() for($i=0;$i -lt 256;$i++) { $objs4 += [byte]$i } $objsArray = New-Object System.Collections.ArrayList $objsArray.Add($objs1) $objsArray.Add($objs2) $objsArray.Add($objs3) $objsArray.Add($objs4) foreach($inputObject in $objsArray ) { $outputs = SerializeAndDeserialize($inputObject); for($i=0;$i -lt $inputObject.Length;$i++) { $outputs[$i] | Should -Be $inputObject[$i] } } } It 'Test Enum serialize and deserialize work as expected.' { $inputObject = [MyColorFlag]::RED SerializeAndDeserialize($inputObject).ToString() | Should -Be $inputObject.ToString() } It 'Test SecureString serialize and deserialize work as expected.' { $inputObject = Convertto-Securestring -String "PowerShellRocks!" -AsPlainText -Force SerializeAndDeserialize($inputObject).Length | Should -Be $inputObject.Length } It 'Test ScriptProperty object serialize and deserialize work as expected.' { $versionObject = New-Object PSObject $versionObject | Add-Member -MemberType NoteProperty -Name TestNote -Value "TestNote" $versionObject | Add-Member -MemberType ScriptProperty -Name TestScriptProperty -Value { ($this.TestNote) } SerializeAndDeserialize($versionObject).TestScriptProperty | Should -Be $versionObject.TestScriptProperty } }
combined_dataset/train/non-malicious/sample_54_93.ps1
sample_54_93.ps1
# ---------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- <# .Synopsis Create a Continuous Export configuration of an Application Insights component. .Description Create a Continuous Export configuration of an Application Insights component. .Example PS C:\> {{ Add code here }} {{ Add output here }} .Example PS C:\> {{ Add code here }} {{ Add output here }} .Outputs Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Models.Api20150501.IApplicationInsightsComponentExportConfiguration .Link https://learn.microsoft.com/powershell/module/az.applicationinsights/new-azapplicationinsightscontinuousexport #> function New-AzApplicationInsightsContinuousExport { [OutputType([Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Models.Api20150501.IApplicationInsightsComponentExportConfiguration])] [CmdletBinding(DefaultParameterSetName='CreateExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Path')] [Alias("ApplicationInsightsComponentName", "ComponentName")] [System.String] # The name of the Application Insights component resource. ${Name}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] # The ID of the target subscription. ${SubscriptionId}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.String] # The Continuous Export destination type. # This has to be 'Blob'. ${DestinationType}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.String] # Deprecated ${NotificationQueueEnabled}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.String] # Deprecated ${NotificationQueueUri}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.String[]] # The document types to be exported, as comma separated values. # Allowed values include 'Requests', 'Custom Event', 'Exception', 'Metric', 'Page View', 'Page Load', 'Dependency', 'Performance Counter', 'Availability', 'Trace'. ${DocumentType}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.String] # The name of destination storage account. ${StorageAccountId}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.String] # The location ID of the destination storage container. ${StorageLocation}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')] [System.String] # The SAS URL for the destination storage container. # It must grant write permission. ${StorageSASUri}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { if ($PSBoundParameters['StorageAccountId']) { $PSBoundParameters['DestinationStorageSubscriptionId'] = [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Models.Utilities]::ParseSubscriptionFromId($PSBoundParameters['StorageAccountId']) } $PSBoundParameters['RecordType'] = [System.String]::Join(",", [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Models.Utilities]::ConvertToRecordType($PSBoundParameters['DocumentType'])) $null = $PSBoundParameters.Remove('DocumentType') $PSBoundParameters['IsEnabled'] = 'true' . Az.ApplicationInsights.internal\New-AzApplicationInsightsContinuousExport @PSBoundParameters } } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCALejs3xyqFRZ35 # p7ghHn4OWz3MmpA8YhsfX//sU93VFaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMxhDR0jngwBYBQEYD7/MExL # XbfHqpCfVCxXCi9V05PBMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAzRn+dkBW+6DqHa1m7wHbQmvx0IwuRFc61w62CE2PGiFJvtCcvv9WFc6G # v8z5ZDv5qmVMZ9IMEctJAkPbpAAznC/WBCHjqovVMtc9xhuqhv8rqZORwlggRFTw # Z7R9eCAdydPK+C8JpPIM2rMsASzssmbkIzKBPJG98/I1rKl6ViKOhH2ZMvr2oMSF # IFZVsDPoP2fvDAt19f7d0kfyn/eXpFwTYujlBMHr99X9sHIDA4Xtxd+RYK6PlCE6 # fxUden5DA57ZZ9pUyLVUoIkwvnZF2nq5WS79mDsQel1yxgahkfCWXz1MiXVxWaUQ # OrN4ba+MAyljOshkuW1T5Ytr6Hs/06GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCsKemHLLh/Eqp1oaeJr8Fdo3SD0ec8/Yy4dMEU1itU7gIGZhgFt5Ts # GBMyMDI0MDQyMzEzMTYxMy40MjVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAe3hX8vV96VdcwABAAAB7TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NDFaFw0yNTAzMDUxODQ1NDFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCoMMJskrrqapycLxPC1H7zD7g88NpbEaQ6SjcTIRbz # CVyYQNsz8TaL1pqFTEAPL1X7ojL4/EaEW+UjNqZs/ayMyW4YIpFPZP2x4FBMVCdd # seF2i+aMMjDHi0LcTQZxM2s3mFMrCZAWSfLYXYDIimFBz8j0oLWGy3VgLmBTKM4x # Lqv7DZUz8B2SoAmbEtp62ngSl0hOoN73SFwE+Y24SvGQMWhykpG+vXDwcpWvwDe+ # TgnrLR7ATRFXN5JS26dm2yy6SYFMRYnME3dMHCQ/UQIQQNC8nLmIvdKkAoWEMXtJ # sGEo3QrM2S2SBv4PpHRzRukzTtP+UAceGxM9JyrwUQP5OCEmW6YchEyRDSwP4hU9 # f7B0Ayh14Pw9vJo7jewNjeMPIkmneyLSi0ruv2ox/xRGtcJ9yBNC5BaRktjz7stP # aojR+PDA2fuBtCo8xKlkt53mUb7AY+CZHHqhLm76pdMF6BHv2TvwlVBeQRN22Xja # VVRwCgjgJnNewt7PejcrpUn0qHLgLq+1BN1DzYukWkTr7wT0zl0iXr+NtqUkWSOn # WRfe8N21tB6uv3VkW8nFdChtbbZZz24peLtJEZuNrN8Xf9PTPMzZXDJBI1EciR/9 # 1QcGoZFmVbFVb2rUIAs01+ZkewvbhmGVDefX9oZG4/K4gGUsTvTW+r1JZMxUT2Mw # qQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFM4b8Oz33hAqBEfKlAZf0NKh4CIZMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCd1gK2Rd+eGL0eHi+iE6/qDY8sbbsO4ema # ncp6KPN+xq5ZAatiBR4jmRRhm+9Vik0Fo0DLWi/N28bFI7dXYw09p3vCipbjy4Eo # ifm0Nud7/4U30i9+7RvW7XOQ3rx37+U7vq9lk6yYpGCNp0jlJ188/CuRPgqJnfq5 # EdeafH2AoG46hKWTeB7DuXasGt6spJOenGedSre34MWZqeTIQ0raOItZnFuGDy4+ # xoD1qRz2QW+u2gCHaG8AQjhYUM4uTi9t6kttj6c7Xamr2zrWuceDhz7sKLttLTJ7 # ws5YrA2I8cTlbMAf2KW0GVjKbYGd+LZGduEK7/7fs4GUkMqc51FsNdG1n+zgc7zH # u2oGGeCBg4s8ZR0ZFyx7jsgm9sSFCKQ5CsbAvlr/60Ndk5TeMR8Js2kNUicu2CqZ # 03833TsvTgk7iD1KLgfS16HEvjN6m4VKJKgjJ7OJJzabtS4JQgUnJrIZfyosk4D1 # 8rZni9pUwN03WgTmd10WTwiZOu4g8Un6iKcPMY/iFqTu4ntkzFUxBBpbFG6k1CIN # ZmoirEWmCtG3lyZ2IddmjtIefTkIvGWb4Jxzz7l2m/E2kGOixDJHsahZVmwsoNvh # y5ku/inU++dXHzw+hlvqTSFT89rIFVhcmsWPDJPNRSSpMhoJ33V2Za/lkKcbkUM0 # SbQgS9qsdzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg5MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDu # HayKTCaYsYxJh+oWTx6uVPFw+aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dGslDAiGA8yMDI0MDQyMzAzNDIx # MloYDzIwMjQwNDI0MDM0MjEyWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp0ayU # AgEAMAoCAQACAguYAgH/MAcCAQACAhM0MAoCBQDp0v4UAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAB/HTCL+NeyscoJT5vrggNW2MF+OvUrPZBqL5I18yqUR # Tqx4e9aijClQA6ukLYT3xYYaeIdBv5rQ+uAGSeELMr+F/Yq2YvHmki3wnINY8gzS # q4ASjjZzmPapWKQPah2HFtNU8WVj80uEvJXBq3Uc0zzRiw1d6LhrCyHmttuq5cqO # g9xJvg0MVZMPBF3TkWeajkbuXu+cgn1JgJlJOP12g9isdGUboHXq8nSGvTJWfbJ1 # Y6cu904Rx/VjbD1HO3hqa/C8acpIBYqnG5f5ADVwwzej52y/OyGxQTtlBGPoZZtx # jR3SdAScL0rS2TqwU2PZuXvZKbDAGe4Boxiw6xzWbp8xggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe3hX8vV96VdcwABAAAB # 7TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCBvogmtQxgaFWujOYkpHEIWgkhQqU6WYnB4mpogc7Y/ # HTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EII0uDWg0CFseKxK3A16l1wrI # wrsSDrXZ6xSf0F4xbMo5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHt4V/L1felXXMAAQAAAe0wIgQgqhzlsW7QzMbZ78sQGb7KX4MW # l6JwZlXqVb/suLPSMSMwDQYJKoZIhvcNAQELBQAEggIAW78bAfEeqmpJNA/4kFjc # 53yshEGr2mjrGiyNXUFYP3snE/iDxVDM7nP6WKkJwemVSsmyw+JzIJ9vya8iQIhv # 0OnjOuI2TXb0SY3DoGbI9+n/3FH95/X+XeUKQsTuQ8kI74yNpmfVOh7f7fN+2t9r # ULj7cbXSyNjitG6lA2mdoWt/coZ9GegXFhuTwfOk9BJiZlZ5B5JxjzDXTteEbPY+ # MPnD2wTCo9j9Hizqomkqo+YQVUb/zf7CQTBHA8RriNwTqAtuxm6TyC+EZ0QT1sI4 # lxxYnSTw8dQKcb7kpHKzmZeudZB8I3+LL49VrI2mZukTAhqL2IxVknH0gQVoXlxf # NDE/RX4tbtTQMvZL1MA4qZpaag4ypiTNid119+XtUk14cj5uJRIuCiG7iT1DTM9/ # f4rsz86umf29Na9dzyXT9kvPNithfe5JhQxx7BjQjVHTlreuQLp7/ksVNMw+Se5P # srZGcVCEiXymgkwJp0rcY0xyAEuK3si54xfxG5/v/2h4teaxp6RI6SeWT0iN2iW1 # aNm7+qk4GqPBz8DD8LBL1mtjxXjFxxZ0l8op9Bi2TOenS94JPaXpOAOGPMt5xS8C # c0CpenQhJ79AB3g4XpOOHavbtOvzFjaWxbD+yzxTlbN/sZwgM/VTl6fmSm+RQ+HF # ABPN66IeSiOohCPwc0QMJ/8= # SIG # End signature block
combined_dataset/train/non-malicious/sample_14_62.ps1
sample_14_62.ps1
# # Module manifest for module 'OCI.PSModules.Queue' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Queue.dll' # Version number of this module. ModuleVersion = '79.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '2c5d60ce-a44b-46ce-97f7-351848bec841' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Queue Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Queue.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIQueue', 'Get-OCIQueueChannelsList', 'Get-OCIQueueMessages', 'Get-OCIQueuesList', 'Get-OCIQueueStats', 'Get-OCIQueueWorkRequest', 'Get-OCIQueueWorkRequestErrorsList', 'Get-OCIQueueWorkRequestLogsList', 'Get-OCIQueueWorkRequestsList', 'Invoke-OCIQueuePurgeQueue', 'Move-OCIQueueCompartment', 'New-OCIQueue', 'Remove-OCIQueue', 'Remove-OCIQueueMessage', 'Remove-OCIQueueMessages', 'Update-OCIQueue', 'Update-OCIQueueMessage', 'Update-OCIQueueMessages', 'Write-OCIQueueMessages' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Queue' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_3_23.ps1
sample_3_23.ps1
// Copyright (c) 2016 Dell Inc. or its subsidiaries. All Rights Reserved. // ================================================================== // DCIM_LocalUserIdentity // ================================================================== [ dynamic, provider("dcismprovider"), Description ( "DCIM_LocalUserIdentity is a derivation of DCIM_Identity." "An instance of an Identity represents a ManagedElement that " "acts as a security principal within the scope in which it is defined and " "authenticated.") ] class DCIM_LocalUserIdentity : DCIM_Identity { [ Description ("It is a property that uniquely identify an instance of this class within the scope of the instantiating Namespace."), Key, Override ("InstanceID") ] string InstanceID; [ Description ("The user-friendly name of the class instance. This value does not have to be unique within its namespace."), Override ("ElementName"), Required ] string ElementName; }; /* SIG # Begin signature block */ /* MIItDgYJKoZIhvcNAQcCoIIs/zCCLPsCAQExDzANBglghkgBZQMEAgEFADB5Bgor */ /* BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG */ /* KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDYHicMP7chK2Vi */ /* IcaOzReZYTD8K6DP03+a83jAPclTk6CCEmMwggXfMIIEx6ADAgECAhBOQOQ3VO3m */ /* jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE */ /* ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s */ /* ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv */ /* ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy */ /* dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx */ /* MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu */ /* MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp */ /* b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK */ /* AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq */ /* gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l */ /* OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr */ /* +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d */ /* vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 */ /* HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn */ /* DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig */ /* nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z */ /* HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK */ /* Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u */ /* DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC */ /* AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw */ /* FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG */ /* AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn */ /* MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp */ /* MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O */ /* BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp */ /* UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 */ /* BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ */ /* LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv */ /* 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF */ /* VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX */ /* bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG */ /* CDCCA/CgAwIBAgIQBu9mzEaGqLK0hNoZKy1rYTANBgkqhkiG9w0BAQ0FADBPMQsw */ /* CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 */ /* cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yNDA0MTkwOTE2MDlaFw0y */ /* NTA1MTIwOTE2MDhaMIGEMQswCQYDVQQGEwJVUzEOMAwGA1UECBMFVGV4YXMxEzAR */ /* BgNVBAcTClJvdW5kIFJvY2sxEjAQBgNVBAoTCURlbGwgSW5jLjEoMCYGA1UECxMf */ /* U2VydmVyIFN5c3RlbXMgTWdtdCBFbmdpbmVlcmluZzESMBAGA1UEAxMJRGVsbCBJ */ /* bmMuMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAvFatHoJS1lbvBD4U */ /* x/jt6hrhOHlGpntV/TPJbKwAdvG6SCT6MfdFasEGShyzypfx8adv3v+sFWo84yYB */ /* GqnqH/Kkj48BTKNREXjN3x/jLZrv+rVRQJYG79us7u3vQVSBX0ds0Jcd9f7u2REE */ /* aLBKrd7ZwxmsHoiAaqKYBm8nMo4kmH4xOw6cOXxUW6mkYxNQxn60nxV5A2ZJvUKn */ /* YvanuULo5jGrl+t2A5jInOLyxSmNU62DdLbyhtE3B6cEhe5yQ54hi7d6c5IM2fNH */ /* FNrQkRavAWUyAxPPBpTSsR0g/IkNymbNPCTjgvDQOIJBcMp0C+q158RIBiE+IMwq */ /* QGi7aUvUUhzTQG9NcSDQan3hMmYfevU3RLQMw4OcoGIT/jOSYmgtcLHiB6lnOG/h */ /* iJ8EsQgW1s2yJ7vG2Fo/IHvQjbfFxefO+gluw4UjcLZgIqACIlFNYGaq4rzKtTeF */ /* 1NNy6DjjbJV2nt/JlD68YlFg0pU9rGDKglZFWvfWiLId8IJnAgMBAAGjggEoMIIB */ /* JDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRFrXrMchlvXUnwqKV0rQOPRSgzqzAf */ /* BgNVHSMEGDAWgBTvn7p5sHPyJR54nANSnBtThN6N7TBnBggrBgEFBQcBAQRbMFkw */ /* IwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAC */ /* hiZodHRwOi8vYWlhLmVudHJ1c3QubmV0L292Y3MyLWNoYWluLnA3YzAxBgNVHR8E */ /* KjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L292Y3MyLmNybDAOBgNV */ /* HQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwEwYDVR0gBAwwCjAIBgZn */ /* gQwBBAEwDQYJKoZIhvcNAQENBQADggIBACoeAWs2aV9gf+TF4AGOKc454/E55mVR */ /* Yz42M1ksqASl2j+ulObFIWcuy/paLjWhMSulehEA8Zb+YQ89fR6Y0TgJ0Eh09aK5 */ /* +GARB7q/+a+gRIw7nfrwmjMkXAwL+9lmbc1X64fEUuKY2NVdksjKC7xRKNMb5i50 */ /* NQyVN9neCJKIVSQDiBMXGgtDkAqPe1sH7/NGGQZKCXhIg3f3caq7dr/mZoiVAIOB */ /* XtHr++65DqG61aWyZV5tCfzSvXFvLpL0dbu14gH6gEo5Zvlp226Vk+HKr/cQ2Ynj */ /* /xXw/5UWHvmKwDOAkA/ld64jA4m466aoP2tKse8z1kSa/zw1wRSp0bwPn23gj2IO */ /* NmEG9dM9Lv3c5FH+oBKNuqJ2Vj5viCHVZEcw40UDQqdfboVK+Y1XSkNfa1CUjzCu */ /* Q2J3XMrfVK9ZCecopoCAXzYem7e/G/Md3rTQky2PTf7Z1hgYlqxisPoGEV3nguIg */ /* ooMbBkHbl/4iWAB237woZFlX0imdO5se7el67/nx58CSLYjNmj82Y4cthnFOrwP4 */ /* mUW7zVXlq9sZP9fCcrdrNMUF4KYS2x7/IIgHURKvOTjyT6f+ZRedEfwOlM1D12/l */ /* eL1OX+dPZq5BGGHal3r1xbLdLxHUlMg+IJJk0wmMwmSF3kzbqbMUTaM1FX9x0+E8 */ /* 4YVlsJB1ttLHMIIGcDCCBFigAwIBAgIQce9VdK81VMNaLGn2b0trzTANBgkqhkiG */ /* 9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFC */ /* MEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9u */ /* IEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjA0NVoXDTQwMTIyOTIzNTkw */ /* MFowTzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNV */ /* BAMTH0VudHJ1c3QgQ29kZSBTaWduaW5nIENBIC0gT1ZDUzIwggIiMA0GCSqGSIb3 */ /* DQEBAQUAA4ICDwAwggIKAoICAQCemXYXGp5WFwhjLJNNg2GEMzQCttlioN7CDrkg */ /* TMhXnQ/dVFsNDNYB3S9I4ZEJ4dvIFQSCtnvw2NYwOxlxcPuoppf2KV2kDKn0Uz5X */ /* 2wxObvx2218k6apfQ+OT5w7PyiW8xEwwC1oP5gb05W4MmWZYT4NhwnN8XCJvAUXF */ /* D/dAT2RL0BcKqQ4eAi+hj0zyZ1DbPuSfwk8/dOsxpNCU0Jm8MJIJasskzaLYdlLQ */ /* TnWYT2Ra0l6D9FjAXWp1xNg/ZDqLFA3YduHquWvnEXBJEThjE27xxvq9EEU1B+Z2 */ /* FdB1FqrCQ1f+q/5jc0YioLjz5MdwRgn5qTdBmrNLbB9wcqMH9jWSdBFkbvkC1cCS */ /* lfGXWX4N7qIl8nFVuJuNv83urt37DOeuMk5QjaHf0XO/wc5/ddqrv9CtgjjF54jt */ /* om06hhG317DhqIs7DEEXml/kW5jInQCf93PSw+mfBYd5IYPWC+3RzAif4PHFyVi6 */ /* U1/Uh7GLWajSXs1p0D76xDkJr7S17ec8+iKH1nP5F5Vqwxz1VXhf1PoLwFs/jHgV */ /* DlpMOm7lJpjQJ8wg38CGO3qNZUZ+2WFeqfSuPtT8r0XHOrOFBEqLyAlds3sCKFnj */ /* hn2AolhAZmLgOFWDq58pQSa6u+nYZPi2uyhzzRVK155z42ZMsVGdgSOLyIZ3srYs */ /* NyJwIQIDAQABo4IBLDCCASgwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU */ /* 75+6ebBz8iUeeJwDUpwbU4Teje0wHwYDVR0jBBgwFoAUgrrWPZfOn89x6JI3r/2z */ /* tWk1V88wMwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5l */ /* bnRydXN0Lm5ldDAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3Qu */ /* bmV0L2NzYnIxLmNybDAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUH */ /* AwMwRQYDVR0gBD4wPDAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cu */ /* ZW50cnVzdC5uZXQvcnBhMAgGBmeBDAEEATANBgkqhkiG9w0BAQ0FAAOCAgEAXvOG */ /* mTXBee7wEK/XkkPShdBb4Jig4HFRyRTLUJpgDrAEJkmxz+m6mwih2kNd1G8jorn4 */ /* QMdH/k0BC0iQP8jcarQ+UzUovkBKR4VqHndAzIB/YbQ8T3mo5qOmoH5EhnG/EhuV */ /* gXL3DaXQ3mefxqK48Wr5/P50ZsZk5nk9agNhTksfzCBiywIY7GPtfnE/lroLXmgi */ /* Z+wfwNIFFmaxsqTq/MWVo40SpfWN7xsgzZn35zLzWXEf3ZTmeeVSIxBWKvxZOL+/ */ /* eSWSasf9q2d3cbEEfTWtFME+qPwjF1YIGHzXeiJrkWrMNUVtTzudQ50FuJ3z/DQh */ /* XAQYMlc4NMHKgyNGpogjIcZ+FICrse+7C6wJP+5TkTGz4lREqrV9MDwsI5zoP6NY */ /* 6kAIF6MgX3rADNuq/wMWAw10ZCKalF4wNXYT9dPh4+AHytnqRYhGnFTVEOLzMglA */ /* tudcFzL+zK/rbc9gPHXz7lxgQFUbtVmvciNoTZx0BAwQya9QW6cNZg+W5ZqV4CCi */ /* GtCw7jhJnipnnpGWbJjbxBBtYHwebkjntn6vMwcSce+9lTu+qYPUQn23pzTXX4aR */ /* ta9WWNpVfRe927zNZEEVjTFRBk+0LrKLPZzzTeNYA1TMrIj4UjxOS0YJJRn/Feen */ /* mEYufbrq4+N8//m5GZW+drkNebICURpKyJ+IwkMxghoBMIIZ/QIBATBjME8xCzAJ */ /* BgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQDEx9FbnRy */ /* dXN0IENvZGUgU2lnbmluZyBDQSAtIE9WQ1MyAhAG72bMRoaosrSE2hkrLWthMA0G */ /* CWCGSAFlAwQCAQUAoIGsMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG */ /* AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCBCfZp0BaEW */ /* o90IuGr1dZvBwDtyW2xcgdYUe2mXryotMTBABgorBgEEAYI3AgEMMTIwMKAWgBQA */ /* RABlAGwAbAAsACAASQBuAGMALqEWgBRodHRwOi8vd3d3LmRlbGwuY29tIDANBgkq */ /* hkiG9w0BAQEFAASCAYCp74st1wcS4C5phklXupa8h8XlTJm4Zj0cAXCwlZgpBf+E */ /* 6/axEmknoxvGAdlJS5uOIXz2fJW+FYfskD0+EXFEldqeBd26NL8D4RUqtUiHipHM */ /* URHm7Jtc645C4siNkrLtiLZLawEnCR7M5yJwn+ViQoAuko6OrN+VY4e/PRs0wb+V */ /* aEB+1IGvjpBylhOqIRD7L6EdwwWD41QAyHuQdwAmY1yDm27A15l2yYGc2R6VrsWc */ /* asr7JmlIgXFsUtmsW7qd36ZiIFKB4fnwvVuNW9YpTcoNuHe+GRtnZ0euFSSD82Pg */ /* gnKYgCK8xAnW+NUA47g9Il1uWxpxe/y8rJYc9MLeJdEgne6arrG6A6/l3Flo4/J9 */ /* O8t48fyNuHObbowGWLksVywraTLtPYB5lwPK3airZQJn74nutMUC1JhULGwFc5U3 */ /* ecyEhT7ggrmEhcIdFyiOTeMww/YMB+6ogurc7tJZ7dkyaRYJfMDkAUnt/NGRJ/Gu */ /* 3JFjCzSosdPPjnBNLL6hghdAMIIXPAYKKwYBBAGCNwMDATGCFywwghcoBgkqhkiG */ /* 9w0BBwKgghcZMIIXFQIBAzEPMA0GCWCGSAFlAwQCAQUAMHgGCyqGSIb3DQEJEAEE */ /* oGkEZzBlAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgoIaxhOINB+OP */ /* p0eGlW20aAKGrazHeNEo1ePQcm8QDXYCEQCIzhKVMMj+euSKgAuEfwx3GA8yMDI0 */ /* MDkyMDA3MDExNVqgghMJMIIGwjCCBKqgAwIBAgIQBUSv85SdCDmmv9s/X+VhFjAN */ /* BgkqhkiG9w0BAQsFADBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQs */ /* IEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEy */ /* NTYgVGltZVN0YW1waW5nIENBMB4XDTIzMDcxNDAwMDAwMFoXDTM0MTAxMzIzNTk1 */ /* OVowSDELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMSAwHgYD */ /* VQQDExdEaWdpQ2VydCBUaW1lc3RhbXAgMjAyMzCCAiIwDQYJKoZIhvcNAQEBBQAD */ /* ggIPADCCAgoCggIBAKNTRYcdg45brD5UsyPgz5/X5dLnXaEOCdwvSKOXejsqnGfc */ /* YhVYwamTEafNqrJq3RApih5iY2nTWJw1cb86l+uUUI8cIOrHmjsvlmbjaedp/lvD */ /* 1isgHMGXlLSlUIHyz8sHpjBoyoNC2vx/CSSUpIIa2mq62DvKXd4ZGIX7ReoNYWyd */ /* /nFexAaaPPDFLnkPG2ZS48jWPl/aQ9OE9dDH9kgtXkV1lnX+3RChG4PBuOZSlbVH */ /* 13gpOWvgeFmX40QrStWVzu8IF+qCZE3/I+PKhu60pCFkcOvV5aDaY7Mu6QXuqvYk */ /* 9R28mxyyt1/f8O52fTGZZUdVnUokL6wrl76f5P17cz4y7lI0+9S769SgLDSb495u */ /* ZBkHNwGRDxy1Uc2qTGaDiGhiu7xBG3gZbeTZD+BYQfvYsSzhUa+0rRUGFOpiCBPT */ /* aR58ZE2dD9/O0V6MqqtQFcmzyrzXxDtoRKOlO0L9c33u3Qr/eTQQfqZcClhMAD6F */ /* aXXHg2TWdc2PEnZWpST618RrIbroHzSYLzrqawGw9/sqhux7UjipmAmhcbJsca8+ */ /* uG+W1eEQE/5hRwqM/vC2x9XH3mwk8L9CgsqgcT2ckpMEtGlwJw1Pt7U20clfCKRw */ /* o+wK8REuZODLIivK8SgTIUlRfgZm0zu++uuRONhRB8qUt+JQofM604qDy0B7AgMB */ /* AAGjggGLMIIBhzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADAWBgNVHSUB */ /* Af8EDDAKBggrBgEFBQcDCDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s */ /* BwEwHwYDVR0jBBgwFoAUuhbZbU2FL3MpdpovdYxqII+eyG8wHQYDVR0OBBYEFKW2 */ /* 7xPn783QZKHVVqllMaPe1eNJMFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwz */ /* LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZUaW1l */ /* U3RhbXBpbmdDQS5jcmwwgZAGCCsGAQUFBwEBBIGDMIGAMCQGCCsGAQUFBzABhhho */ /* dHRwOi8vb2NzcC5kaWdpY2VydC5jb20wWAYIKwYBBQUHMAKGTGh0dHA6Ly9jYWNl */ /* cnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZU */ /* aW1lU3RhbXBpbmdDQS5jcnQwDQYJKoZIhvcNAQELBQADggIBAIEa1t6gqbWYF7xw */ /* jU+KPGic2CX/yyzkzepdIpLsjCICqbjPgKjZ5+PF7SaCinEvGN1Ott5s1+FgnCvt */ /* 7T1IjrhrunxdvcJhN2hJd6PrkKoS1yeF844ektrCQDifXcigLiV4JZ0qBXqEKZi2 */ /* V3mP2yZWK7Dzp703DNiYdk9WuVLCtp04qYHnbUFcjGnRuSvExnvPnPp44pMadqJp */ /* ddNQ5EQSviANnqlE0PjlSXcIWiHFtM+YlRpUurm8wWkZus8W8oM3NG6wQSbd3lqX */ /* TzON1I13fXVFoaVYJmoDRd7ZULVQjK9WvUzF4UbFKNOt50MAcN7MmJ4ZiQPq1JE3 */ /* 701S88lgIcRWR+3aEUuMMsOI5ljitts++V+wQtaP4xeR0arAVeOGv6wnLEHQmjNK */ /* qDbUuXKWfpd5OEhfysLcPTLfddY2Z1qJ+Panx+VPNTwAvb6cKmx5AdzaROY63jg7 */ /* B145WPR8czFVoIARyxQMfq68/qTreWWqaNYiyjvrmoI1VygWy2nyMpqy0tg6uLFG */ /* hmu6F/3Ed2wVbK6rr3M66ElGt9V/zLY4wNjsHPW2obhDLN9OTH0eaHDAdwrUAuBc */ /* YLso/zjlUlrWrBciI0707NMX+1Br/wd3H3GXREHJuEbTbDJ8WC9nR2XlG3O2mflr */ /* LAZG70Ee8PBf4NvZrZCARK+AEEGKMIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o */ /* ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln */ /* aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE */ /* aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy */ /* MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x */ /* OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt */ /* ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1 */ /* BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z */ /* nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ */ /* Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6 */ /* 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk */ /* psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn */ /* LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq */ /* x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd */ /* OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ */ /* TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR */ /* k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo */ /* AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud */ /* EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G */ /* A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT */ /* BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG */ /* GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh */ /* Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD */ /* VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0 */ /* VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9 */ /* bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T */ /* zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS */ /* lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq */ /* T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl */ /* 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y */ /* r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05 */ /* et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um */ /* AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe */ /* Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr */ /* 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC */ /* JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga */ /* oSv27dZ8/DCCBY0wggR1oAMCAQICEA6bGI750C3n79tQ4ghAGFowDQYJKoZIhvcN */ /* AQEMBQAwZTELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcG */ /* A1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEkMCIGA1UEAxMbRGlnaUNlcnQgQXNzdXJl */ /* ZCBJRCBSb290IENBMB4XDTIyMDgwMTAwMDAwMFoXDTMxMTEwOTIzNTk1OVowYjEL */ /* MAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3 */ /* LmRpZ2ljZXJ0LmNvbTEhMB8GA1UEAxMYRGlnaUNlcnQgVHJ1c3RlZCBSb290IEc0 */ /* MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAv+aQc2jeu+RdSjwwIjBp */ /* M+zCpyUuySE98orYWcLhKac9WKt2ms2uexuEDcQwH/MbpDgW61bGl20dq7J58soR */ /* 0uRf1gU8Ug9SH8aeFaV+vp+pVxZZVXKvaJNwwrK6dZlqczKU0RBEEC7fgvMHhOZ0 */ /* O21x4i0MG+4g1ckgHWMpLc7sXk7Ik/ghYZs06wXGXuxbGrzryc/NrDRAX7F6Zu53 */ /* yEioZldXn1RYjgwrt0+nMNlW7sp7XeOtyU9e5TXnMcvak17cjo+A2raRmECQecN4 */ /* x7axxLVqGDgDEI3Y1DekLgV9iPWCPhCRcKtVgkEy19sEcypukQF8IUzUvK4bA3Vd */ /* eGbZOjFEmjNAvwjXWkmkwuapoGfdpCe8oU85tRFYF/ckXEaPZPfBaYh2mHY9WV1C */ /* doeJl2l6SPDgohIbZpp0yt5LHucOY67m1O+SkjqePdwA5EUlibaaRBkrfsCUtNJh */ /* besz2cXfSwQAzH0clcOP9yGyshG3u3/y1YxwLEFgqrFjGESVGnZifvaAsPvoZKYz */ /* 0YkH4b235kOkGLimdwHhD5QMIR2yVCkliWzlDlJRR3S+Jqy2QXXeeqxfjT/JvNNB */ /* ERJb5RBQ6zHFynIWIgnffEx1P2PsIV/EIFFrb7GrhotPwtZFX50g/KEexcCPorF+ */ /* CiaZ9eRpL5gdLfXZqbId5RsCAwEAAaOCATowggE2MA8GA1UdEwEB/wQFMAMBAf8w */ /* HQYDVR0OBBYEFOzX44LScV1kTN8uZz/nupiuHA9PMB8GA1UdIwQYMBaAFEXroq/0 */ /* ksuCMS1Ri6enIZ3zbcgPMA4GA1UdDwEB/wQEAwIBhjB5BggrBgEFBQcBAQRtMGsw */ /* JAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBDBggrBgEFBQcw */ /* AoY3aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElE */ /* Um9vdENBLmNydDBFBgNVHR8EPjA8MDqgOKA2hjRodHRwOi8vY3JsMy5kaWdpY2Vy */ /* dC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3JsMBEGA1UdIAQKMAgwBgYE */ /* VR0gADANBgkqhkiG9w0BAQwFAAOCAQEAcKC/Q1xV5zhfoKN0Gz22Ftf3v1cHvZqs */ /* oYcs7IVeqRq7IviHGmlUIu2kiHdtvRoU9BNKei8ttzjv9P+Aufih9/Jy3iS8UgPI */ /* TtAq3votVs/59PesMHqai7Je1M/RQ0SbQyHrlnKhSLSZy51PpwYDE3cnRNTnf+hZ */ /* qPC/Lwum6fI0POz3A8eHqNJMQBk1RmppVLC4oVaO7KTVPeix3P0c2PR3WlxUjG/v */ /* oVA9/HYJaISfb8rbII01YBwCA8sgsKxYoA5AY8WYIsGyWfVVa88nq2x2zm8jLfR+ */ /* cWojayL/ErhULSd+2DrZ8LaHlv1b0VysGMNNn3O3AamfV6peKOK5lDGCA3YwggNy */ /* AgEBMHcwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw */ /* OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT */ /* dGFtcGluZyBDQQIQBUSv85SdCDmmv9s/X+VhFjANBglghkgBZQMEAgEFAKCB0TAa */ /* BgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkFMQ8XDTI0MDky */ /* MDA3MDExNVowKwYLKoZIhvcNAQkQAgwxHDAaMBgwFgQUZvArMsLCyQ+CXc6qisnG */ /* Txmcz0AwLwYJKoZIhvcNAQkEMSIEIB/rOCzfS2b/FisjzNT1LTS1ikxYKtdYnc7H */ /* 3h3MJm+IMDcGCyqGSIb3DQEJEAIvMSgwJjAkMCIEINL25G3tdCLM0dRAV2hBNm+C */ /* itpVmq4zFq9NGprUDHgoMA0GCSqGSIb3DQEBAQUABIICAAYvhjxTYCCGwMmzFDhd */ /* oBAGYsR8yhq8WNrXlnDx2YYAU55O7AEFTkxtL4tgwzWRK/wPPbgPfdFY/jzlkbTe */ /* aybhh51qKdq+suY5Wdcd366TCksl+9GwdeXefyHieQCRWYSDwbZYeakHmy/dlJ8O */ /* X8Wqm2TtVFJzE6aDyfSqct0hnh0OtI5hkU5Ic3lMYWI0tcbKF8vnsr3v7q/8ZuHq */ /* 3pjP5E6KFOFm/pOdflSjJx2mTni+dgugfXZyQZ8m2oTjcGsAGjSE1KP5+tyOoQbq */ /* BElreNPjlL0Q3ViyMwY7EwLIooB2nElO2tbLy5PiO+KRZEyAeMN31A5t97/4lGo3 */ /* hdi8yfiaNqW6wFJof7ca0bGLr5Hnw46m+h5ZFmUOTbWyK93ZR9syL25s/whCu+5u */ /* oxr8QvsrATq2wK6RlgihLDeQ4pe/x5P0BVICufJ5n0urd3372WvbL8rYEstgAIhW */ /* 8FP8szWA5Yz8S9hil0EnY373NmblutjLvu/OZ1x46jqqfgeCX0RJDyOwEa+fsFWf */ /* R72qJzjZm+a0vW24CKI2V4qTMIMxwyrNGAcnAwvWYW29pEEmeI0dgp/iRMMUJ9Sr */ /* 2UTAx9XDqOyQsJOOPvhRjd5mmsyx/pbat5mQF91Z2LIPMmbZjwKZxjjADOrH0Yma */ /* gAWVCGPnXXtnIMCuRkga4aE3 */ /* SIG # End signature block */
combined_dataset/train/non-malicious/sample_58_83.ps1
sample_58_83.ps1
"use strict"; var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } return new (P || (P = Promise))(function (resolve, reject) { function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } step((generator = generator.apply(thisArg, _arguments || [])).next()); }); }; Object.defineProperty(exports, "__esModule", { value: true }); exports.deactivate = exports.activate = void 0; const vscode = require("vscode"); var terminalBC; var activeEditor; // this method is called when your extension is activated // your extension is activated the very first time the command is executed function activate(context) { var containerHelperPermissionsTerminal; containerHelperPermissionsTerminal = vscode.window.createTerminal('BcContainerHelperPermissions'); containerHelperPermissionsTerminal.show(true); containerHelperPermissionsTerminal.sendText("Check-BcContainerHelperPermissions -Fix"); containerHelperPermissionsTerminal.sendText("if($LASTEXITCODE -eq 0) { exit 0}"); //terminal.sendText("exit 0"); terminalBC = vscode.window.createTerminal('BCContainerTerminal'); vscode.window.onDidCloseTerminal(t => { if (t.name === 'RELLANGOutPut') { vscode.window.showInformationMessage(`Übersetzungen wurden erstellt`); } if (t.name === 'BCTestToolkit') { vscode.window.showInformationMessage(`Test Toolkit wurde importiert`); } if (t.name === 'flushDNSTerminal') { vscode.window.showInformationMessage(`Der DNS-Auflösungscache wurde geleert.`); } if (t.name === 'activateTaskScheduler') { vscode.window.showInformationMessage(`Die Aufgabenwarteschlange wurde aktiviert.`); } if (t.name === 'dactivateTaskScheduler') { vscode.window.showInformationMessage(`Die Aufgabenwarteschlange wurde deaktiviert.`); } }); vscode.commands.registerTextEditorCommand('relallang.CreateLangFiles', createLangFiles); vscode.commands.registerTextEditorCommand('relallang.CreateNewContainer', startNewConainer); vscode.commands.registerTextEditorCommand('relallang.GetContainers', getBCContainers); vscode.commands.registerTextEditorCommand('relallang.StopBCContainers', stopBCContainers); vscode.commands.registerTextEditorCommand('relallang.StartBCContainers', startBCContainers); vscode.commands.registerTextEditorCommand('relallang.RestartBCContainers', restartBCContainers); vscode.commands.registerTextEditorCommand('relallang.DownloadBCLic', downloadBCLic); vscode.commands.registerTextEditorCommand('relallang.UpdateBCContainerLic', updateBCContainerLic); vscode.commands.registerTextEditorCommand('relallang.GETEventLog', getEventLog); vscode.commands.registerTextEditorCommand('relallang.RemoveBCContainers', removeBCContainers); vscode.commands.registerTextEditorCommand('relallang.ImportTestToolkit', importTestToolkit); vscode.commands.registerTextEditorCommand('relallang.FlushDNS', flushDNS); vscode.commands.registerTextEditorCommand('relallang.ActivateTaskScheduler', activateTaskScheduler); vscode.commands.registerTextEditorCommand('relallang.DeactivateTaskScheduler', deactivateTaskScheduler); } exports.activate = activate; function activateTaskScheduler() { var tmpTerminal = vscode.window.createTerminal('activateTaskScheduler'); tmpTerminal.show(true); tmpTerminal.sendText("$selectedCont = (Get-BcContainers -includeLabels) | where {$_.status -notLike 'Exited*'} | Select Name | Out-GridView -PassThru -Title 'Wähle den Container aus in dem du die Aufgabenwarteschlange aktivieren möchtest:'"); tmpTerminal.sendText("if($selectedCont.name.length -gt 0) {"); tmpTerminal.sendText(" Set-BcContainerServerConfiguration -keyName EnableTaskScheduler -keyValue true -containerName $selectedCont.name"); tmpTerminal.sendText(" Restart-BcContainerServiceTier -ContainerName $selectedCont.name"); tmpTerminal.sendText("} else { write-Host 'abgebrochen'}"); tmpTerminal.sendText("if($LASTEXITCODE -eq 0) { exit 0}"); } function deactivateTaskScheduler() { var tmpTerminal = vscode.window.createTerminal('dactivateTaskScheduler'); tmpTerminal.show(true); tmpTerminal.sendText("$selectedCont = (Get-BcContainers -includeLabels) | where {$_.status -notLike 'Exited*'} | Select Name | Out-GridView -PassThru -Title 'Wähle den Container aus in dem du die Aufgabenwarteschlange aktivieren möchtest:'"); tmpTerminal.sendText("if($selectedCont.name.length -gt 0) {"); tmpTerminal.sendText(" Set-BcContainerServerConfiguration -keyName EnableTaskScheduler -keyValue false -containerName $selectedCont.name"); tmpTerminal.sendText(" Restart-BcContainerServiceTier -ContainerName $selectedCont.name"); tmpTerminal.sendText("} else { write-Host 'abgebrochen'}"); tmpTerminal.sendText("if($LASTEXITCODE -eq 0) { exit 0}"); } function flushDNS() { var flushDNSTerminal = vscode.window.createTerminal('flushDNSTerminal'); flushDNSTerminal.show(true); flushDNSTerminal.sendText("Start-Process powershell -Verb RunAs -ArgumentList '-Command \"& {ipconfig /flushdns}\"' -Wait"); flushDNSTerminal.sendText("exit 0"); } function importTestToolkit() { var testToolkitTerminal = vscode.window.createTerminal('BCTestToolkit'); testToolkitTerminal.show(true); testToolkitTerminal.sendText("$selectedCont = (Get-BcContainers -includeLabels) | where {$_.status -notLike 'Exited*'} | Select Name | Out-GridView -PassThru -Title 'Wähle den Container aus in den du das Test Toolkit importieren möchtest:'"); testToolkitTerminal.sendText("if($selectedCont.name.length -gt 0) {Import-TestToolkitToBcContainer -containerName $selectedCont.name} else { write-Host 'abgebrochen'}"); testToolkitTerminal.sendText("if($LASTEXITCODE -eq 0) { exit 0}"); } function getEventLog() { var bcEventTerminal = vscode.window.createTerminal('BCEventTerminal'); bcEventTerminal.show(true); bcEventTerminal.sendText("$selectedCont = (Get-BcContainers -includeLabels) | where {$_.status -notLike 'Exited*'} | Select Name | Out-GridView -PassThru -Title 'Wähle den Container aus dem du das Eventlog abrufen möchtest:'"); bcEventTerminal.sendText("if($selectedCont.name.length -gt 0) {"); bcEventTerminal.sendText(" Get-BcContainerEventLog $selectedCont.name"); bcEventTerminal.sendText("} else { write-Host 'abgebrochen'}"); bcEventTerminal.sendText("if($LASTEXITCODE -eq 0) { exit 0}"); } function updateBCContainerLic() { terminalBC.show(true); terminalBC.sendText("$Containers = Get-BcContainers -includeLabels"); terminalBC.sendText("$runingContainers = $Containers | where {$_.status -notLike 'Exited*'} | Select Name, Version"); terminalBC.sendText("$licpath = $env:BcLicenceDefaultLocation"); terminalBC.sendText("if(-not($licpath.lenth -gt 0)) {$licpath = 'C:\\ProgramData\\Relion\\BCLic'}"); terminalBC.sendText("foreach($u in $runingContainers) {"); terminalBC.sendText(" $flfPath = \"$($licpath)\\BC$($u.version.Substring(0,2)).flf\""); terminalBC.sendText(" $bclicensePath = \"$($licpath)\\BC$($u.version.Substring(0,2)).bclicense\""); terminalBC.sendText(" if([System.IO.File]::Exists($bclicensePath)){"); terminalBC.sendText(" Import-BcContainerLicense -containerName $u.name -licenseFile $bclicensePath"); terminalBC.sendText(" } else {"); terminalBC.sendText(" if([System.IO.File]::Exists($flfPath)) {"); terminalBC.sendText(" Import-BcContainerLicense -containerName $u.name -licenseFile $flfPath"); terminalBC.sendText(" } else {"); terminalBC.sendText(" Write-Host \"Keine Lizenz für den Container $($u.name) gefunden\""); terminalBC.sendText(" }"); terminalBC.sendText(" }"); terminalBC.sendText("}"); } function downloadBCLic() { terminalBC.show(); terminalBC.sendText("& C:\\ProgramData\\Relion\\RELionStudio\\RELionStudio.exe -DownloadLicense"); } function getBCContainers() { terminalBC.show(true); terminalBC.sendText("$Containers = Get-BcContainers -includeLabels"); terminalBC.sendText("$Containers | Select Name, Status ,Version"); } function removeBCContainers() { terminalBC.show(true); terminalBC.sendText("$Containers = Get-BcContainers -includeLabels"); terminalBC.sendText("$container = $Containers | Select Name | Out-GridView -PassThru -Title 'Wähle den Container den du entfernen möchtest:'"); terminalBC.sendText("if($container.name.length -gt 0) {remove-bcContainer -containerName $container.name} else { write-Host 'abgebrochen'}"); getBCContainers(); } function stopBCContainers() { terminalBC.show(true); terminalBC.sendText("$Containers = Get-BcContainers -includeLabels"); terminalBC.sendText("$stopcontainer = $Containers | where {$_.status -notLike 'Exited*'} | Select Name | Out-GridView -PassThru -Title 'Wähle den Container den du stopen möchtest:'"); terminalBC.sendText("if($stopcontainer.name.length -gt 0) {Stop-bcContainer $stopcontainer.name} else { write-Host 'abgebrochen'}"); getBCContainers(); } function startBCContainers() { terminalBC.show(true); terminalBC.sendText("$Containers = Get-BcContainers -includeLabels"); terminalBC.sendText("$stopcontainer = $Containers | where {$_.status -Like 'Exited*'} | Select Name | Out-GridView -PassThru -Title 'Wähle den Container den du starten möchtest:'"); terminalBC.sendText("if($stopcontainer.name.length -gt 0) {Start-bcContainer $stopcontainer.name} else { write-Host 'abgebrochen'}"); getBCContainers(); } function restartBCContainers() { terminalBC.show(true); terminalBC.sendText("$Containers = Get-BcContainers -includeLabels"); terminalBC.sendText("$stopcontainer = $Containers | where {$_.status -notLike 'Exited*'} | Select Name | Out-GridView -PassThru -Title 'Wähle den Container den du neu starten möchtest:'"); terminalBC.sendText("if($stopcontainer.name.length -gt 0) {restart-bcContainer $stopcontainer.name} else { write-Host 'abgebrochen'}"); getBCContainers(); } function startNewConainer() { activeEditor = activeEditor || vscode.window.activeTextEditor; var docpath = activeEditor === null || activeEditor === void 0 ? void 0 : activeEditor.document.uri.fsPath; var applicationDir = getApplicationDir(path.dirname(docpath)); terminalBC.show(true); terminalBC.sendText("& C:\\ProgramData\\Relion\\RELionStudio\\RELionStudio.exe -NewContainer -Dir \"" + applicationDir + "\""); } function createLangFiles() { var terminal = vscode.window.createTerminal('RELLANGOutPut'); terminal.show(true); activeEditor = activeEditor || vscode.window.activeTextEditor; var docpath = activeEditor === null || activeEditor === void 0 ? void 0 : activeEditor.document.uri.fsPath; var applicationDir = getApplicationDir(path.dirname(docpath)); var gFile = getGFile(applicationDir); terminal.sendText("& $env:RELTranslationToolV2 -CreateLangFile -MatchFileInformationToGEntry -AllLangs -File \"" + gFile + "\""); terminal.sendText("if($LASTEXITCODE -eq 0) { exit 0}"); } // this method is called when your extension is deactivated function deactivate() { } exports.deactivate = deactivate; const fs = require("fs"); const path = require("path"); function getUserInput(myplaceholder, myTitle) { return __awaiter(this, void 0, void 0, function* () { let userInputWindow = vscode.window.showInputBox({ placeHolder: myplaceholder, prompt: myTitle }); return userInputWindow; }); } function getApplicationDir(dirPath) { var s = getAppJson(dirPath); if (s.length > 0) { return path.dirname(s); } else { return ""; } } function getAppJson(dirPath) { var files = fs.readdirSync(dirPath); var returnfile = ""; files.forEach(function (file) { if (file === "app.json") { returnfile = path.join(dirPath, "/", file); } }); if (returnfile === "" && dirPath.length > 3) { return getAppJson(path.resolve(dirPath, '..')); } else { return returnfile; } } function getGFile(dirPath) { let fileList = fs.readdirSync(dirPath); var returnfile = ""; for (let i = 0; i < fileList.length; ++i) { if (fileList[i].includes(".g.xlf")) { returnfile = path.join(dirPath, "/", fileList[i]); } else if (fs.statSync(dirPath + "/" + fileList[i]).isDirectory()) { var ff = getGFile(dirPath + "/" + fileList[i]); if (!(ff === "")) { returnfile = ff; i = fileList.length; } } } return returnfile; } //# sourceMappingURL=extension.js.map
combined_dataset/train/non-malicious/626.ps1
626.ps1
param( [string]$Version, [string]$Path, [switch]$Force, $Update, [switch]$Uninstall ) $Configs = @{ Url = "http://c758482.r82.cf2.rackcdn.com/Sublime%20Text%202.0.2%20Setup.exe" Path = "$(Split-Path -Path $MyInvocation.MyCommand.Definition -Parent)\" Executable = "C:\Program Files (x86)\Sublime Text 2\sublime_text.exe" } $Configs | ForEach-Object{ try{ $_.Result = $null if(-not $_.Path){$_.Path = $Path} $Config = $_ if(-not $Uninstall){ if($_.ConditionExclusion){ $_.ConditionExclusionResult = $(Invoke-Expression $Config.ConditionExclusion -ErrorAction SilentlyContinue) } if(($_.ConditionExclusionResult -eq $null) -or $Force){ $_.Downloads = $_.Url | ForEach-Object{ Get-File -Url $_ -Path $Config.Path } $_.Downloads | ForEach-Object{ Start-Process -FilePath $(Join-Path $_.Path $_.Filename) -ArgumentList "/VERYSILENT /NORESTART" -Wait } if(Test-Path $_.Executable){Set-Content -Path (Join-Path $PSbin.Path "sublime_text.bat") -Value "@echo off`nstart `"`" `"$($_.Executable)`" %*"} Set-Content -Path (Join-Path $_.Path "Sublime Text 2 Context Add.bat") -Value @" rem add it for all file types reg add "HKEY_CLASSES_ROOT\*\shell\Open with Sublime Text 2" /t REG_SZ /v "" /d "Open with Sublime Text 2" /f reg add "HKEY_CLASSES_ROOT\*\shell\Open with Sublime Text 2" /t REG_EXPAND_SZ /v "Icon" /d "$($_.Executable),0" /f reg add "HKEY_CLASSES_ROOT\*\shell\Open with Sublime Text 2\command" /t REG_SZ /v "" /d "$($_.Executable) \"%%1\"" /f rem add it for folders reg add "HKEY_CLASSES_ROOT\Folder\shell\Open with Sublime Text 2" /t REG_SZ /v "" /d "Open with Sublime Text 2" /f reg add "HKEY_CLASSES_ROOT\Folder\shell\Open with Sublime Text 2" /t REG_EXPAND_SZ /v "Icon" /d "$($_.Executable),0" /f reg add "HKEY_CLASSES_ROOT\Folder\shell\Open with Sublime Text 2\command" /t REG_SZ /v "" /d "$($_.Executable) \"%%1\"" /f "@ & (Join-Path $_.Path "Sublime Text 2 Context Add.bat") | out-null $_.Downloads | ForEach-Object{ Remove-Item (Join-Path $_.Path $_.Filename) -Force } Remove-Item (Join-Path $_.Path "Sublime Text 2 Context Add.bat") -Force if($Update){$_.Result = "AppUpdated";$_ }else{$_.Result = "AppInstalled";$_} }else{ $_.Result = "ConditionExclusion";$_ } }else{ if(Test-Path (Join-Path $PSbin.Path "sublime_text.bat")){Remove-Item (Join-Path $PSbin.Path "sublime_text.bat")} $Executable = "C:\Program Files (x86)\Sublime Text 2\unins000.exe"; if(Test-Path $Executable){Start-Process -FilePath $Executable -ArgumentList "/VERYSILENT /NORESTART" -Wait} Set-Content -Path (Join-Path $_.Path "Sublime Text 2 Context Remove.bat") -Value @" rem remove for all file types reg delete "HKEY_CLASSES_ROOT\*\shell\Open with Sublime Text 2" /f rem remove for folders reg delete "HKEY_CLASSES_ROOT\Folder\shell\Open with Sublime Text 2" /f "@ & (Join-Path $_.Path "Sublime Text 2 Context Remove.bat") | out-null Remove-Item (Join-Path $_.Path "Sublime Text 2 Context Remove.bat") -Force $_.Result = "AppUninstalled";$_ } }catch{ $Config.Result = "Error";$Config } }
combined_dataset/train/non-malicious/sample_46_18.ps1
sample_46_18.ps1
//// Licensed to the Apache Software Foundation (ASF) under one or more contributor license agreements. See the NOTICE file distributed with this work for additional information regarding copyright ownership. The ASF licenses this file to you under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. //// [[HopRest]] :imagesdir: ../assets/images :description: hop-rest is a web application (and docker container) which is capable of working with the Hop ecosystem. :toc: = Hop REST Web Application == Description The Hop REST web application is deployed as a WAR file `hop-rest-<version>.war`. You can put this archive in the `webapps` folder of your favorite server (e.g. Apache Tomcat). We suggest that you rename it to `hop.war` or that you unzip it in a `hop` folder. == The base URL When deployed under a `webapps/hop` folder you will get the services, detailed below, under the base URL of `/hop/api/v1/`. == Configuration When the web application starts it will look for an environment variable called `HOP_REST_CONFIG_FOLDER` to determine where it will look for a file called `hop-rest.properties`. This file can contain the following properties to determine the configuration of the application: [cols="1,2"] |=== |Property|Description |`logLevel` |The logging level to use, one of `NOTHING`, `ERROR`, `MINIMAL`, `BASIC`, `DETAILED`, `DEBUG`, or `ROWLEVEL`. |`metadataExportFile` |The metadata to use for the web application in the form of a single JSON 'export' file. Use the GUI tools menu or `sh hop-conf.sh --export-metadata` to export metadata to a single file. |`environmentName` |In case the `projects` plugin is available it will enable this environment and the underlying project (to be configured on the system, point to a configuration with `HOP_CONFIG_FOLDER`) before starting the application. |`projectName` |In case the `projects` plugin is available it will enable this project (to be configured on the system, point to a configuration with `HOP_CONFIG_FOLDER`) before starting the application. |=== == Metadata services The metadata services are deployed under sub-path `metadata/`. === List the metadata type keys [cols="1,2"] |=== |Type |`GET` |Path |`metadata/types` |Produces |`application/json` |Example call |`curl -X GET http://localhost:8080/hop/api/v1/metadata/types` |Example output | `["dataset","workflow-log","async-web-service","execution-info-location","web-service","cassandra-connection","workflow-run-configuration","unit-test","rdbms","mongodb-connection","file-definition","splunk","pipeline-run-configuration","pipeline-log","server","partition","execution-data-profile","neo4j-connection","pipeline-probe","neo4j-graph-model"]` |=== === List the metadata elements for a key [cols="1,2"] |=== |Type |`GET` |Path |`metadata/list/\{key\}` |Arguments |`key` : the key of the metadata type |Produces |`application/json` |Example call |`curl -X GET http://localhost:8080/hop/api/v1/metadata/list/pipeline-run-configuration/` |Example output | `["local"]` |=== === Get a metadata element [cols="1,2"] |=== |Type |`GET` |Path |`metadata/\{key\}/\{name\}` |Arguments |`key` : the key of the metadata type, `\{name\}` : the name of the metadata element to get. |Produces |`application/json` |Example call |`curl -X GET http://localhost:8080/hop/api/v1/metadata/pipeline-run-configuration/local/` |Example output | `{"engineRunConfiguration":{"Local":{"feedback_size":"50000","sample_size":"1000","sample_type_in_gui":"None","wait_time":"2","rowset_size":"10000","safe_mode":false,"show_feedback":false,"topo_sort":false,"gather_metrics":false,"transactional":false}},"defaultSelection":false,"configurationVariables":[],"name":"local","description":"Runs your pipelines locally with the standard local Hop pipeline engine","dataProfile":"first-last","executionInfoLocationName":"local"}` |=== === Save a metadata element [cols="1,2"] |=== |Type |`POST` |Path |`metadata/\{key\}` |Arguments |`key` : the key of the metadata type to save |Consumes |`application/json` |Produces |`application/json` |Example call |`curl -X POST http://localhost:8080/hop/api/v1/metadata/pipeline-run-configuration/ -d '{"engineRunConfiguration":{"Local":{"feedback_size":"50000","sample_size":"1000","sample_type_in_gui":"None","wait_time":"2","rowset_size":"10000","safe_mode":false,"show_feedback":false,"topo_sort":false,"gather_metrics":false,"transactional":false}},"defaultSelection":false,"configurationVariables":[],"name":"local","description":"Runs your pipelines locally with the standard local Hop pipeline engine","dataProfile":"first-last","executionInfoLocationName":"local"}'` |=== === Delete a metadata element [cols="1,2"] |=== |Type |`DELETE` |Path |`metadata/\{key\}/\{name\}` |Arguments |`key` : the key of the metadata type to save. `name` : the name of the metadata element to delete. |Produces |`application/json` |Example call |`curl -X DELETE http://localhost:8080/hop/api/v1/metadata/pipeline-run-configuration/Flink/` |Output |`Flink` |=== == Plugins services The plugins services are deployed under sub-path `plugins/`. === List all the plugin type classes [cols="1,2"] |=== |Type |`GET` |Path |`plugins/types` |Produces |`application/json` |Example call |`curl -X GET http://localhost:8080/hop/api/v1/plugins/types` |Example output | `["org.apache.hop.core.compress.CompressionPluginType","org.apache.hop.core.row.value.ValueMetaPluginType","org.apache.hop.core.database.DatabasePluginType","org.apache.hop.core.plugins.TransformPluginType","org.apache.hop.core.auth.AuthenticationConsumerPluginType","org.apache.hop.imp.ImportPluginType","org.apache.hop.core.encryption.TwoWayPasswordEncoderPluginType","org.apache.hop.core.auth.AuthenticationProviderPluginType","org.apache.hop.core.plugins.PartitionerPluginType","org.apache.hop.core.logging.LoggingPluginType","org.apache.hop.execution.plugin.ExecutionInfoLocationPluginType","org.apache.hop.core.config.plugin.ConfigPluginType","org.apache.hop.core.plugins.HopServerPluginType","org.apache.hop.core.plugins.ActionPluginType","org.apache.hop.core.extension.ExtensionPointPluginType","org.apache.hop.pipeline.engine.PipelineEnginePluginType","org.apache.hop.pipeline.transform.RowDistributionPluginType","org.apache.hop.workflow.engine.WorkflowEnginePluginType","org.apache.hop.core.vfs.plugin.VfsPluginType","org.apache.hop.execution.sampler.ExecutionDataSamplerPluginType","org.apache.hop.metadata.plugin.MetadataPluginType"]` |=== === List all the plugins for a given type class [cols="1,2"] |=== |Type |`GET` |Path |`plugins/list/\{typeClassName\}/` |Arguments |`key` : the class name of the plugin type |Produces |`application/json` |Example call |`curl -X GET http://localhost:8080/hop/api/v1/plugins/list/org.apache.hop.pipeline.engine.PipelineEnginePluginType` This call retrieves all the information about all the pipeline engine plugins. |Example output | `[{"category":null,"name":"Beam DataFlow pipeline engine","description":"This allows you to run your pipeline on Google Cloud Platform DataFlow, provided by the Apache Beam community","ids":["BeamDataFlowPipelineEngine"],"pluginType":"org.apache.hop.pipeline.engine.PipelineEnginePluginType","imageFile":null,"separateClassLoaderNeeded":false,"classLoaderGroup":null,"nativePlugin":false, ... }` |=== == Execution services The 'Execution' services are deployed under sub-path `execution/`. === Execute a pipeline synchronously [cols="1,2"] |=== |Type |`POST` |Path |`execution/sync` |Produces |`application/json` |Example call |`curl -X POST http://localhost:8080/hop/api/v1/execution/sync/ -H 'Content-Type: application/json' -d '{ "service" : "test", "runConfig" : "local", "variables" : { "VAR1" : "value1", "VAR2" : "value2" }, "bodyContent" : "This is body content" }'` ` |Example output |The executing pipeline can produce output like this: `{ "rows" : [ { "id" : 1, "uuid" : "93b534f0-31ef-4992-8012-ffbfd3d7d489", "var1" : "value1", "var2" : "value2", "bodyContent" : "This is body content" }, ... ] }` |=== The body to post can contain the following options (see also: the example above) * `execute`: the name of the Web Service metadata element to use * `runConfig`: the name of the pipeline run configuration to use * `variables`: a map with variables (or parameters) with their names and values * `bodyContent`: this will be set as a variable using the body content variable option in the Web Service metadata. == Execution Information Location services The execution information location services are deployed under sub-path `location/`. === Get execution IDs [cols="1,2"] |=== |Type |`POST` |Path |`location/executions/\{locationName\}` |Arguments |`locationName` : the name of the execution information location to query. |Consumes |`application/json` |Produces |`application/json` |Example call |`curl -X GET http://localhost:8080/hop/api/v1/location/executions/local/ -H 'Content-Type: application/json' -d '{ "includeChildren" : "true", "limit" : 100 }'` ` |Example output |The list of execution IDs looks like this: `["af84cbc2-0166-4dea-956f-72b73cf66d0d", "bf84cbc2-0166-4dea-956f-72b73cf66d0e", "cf84cbc2-0166-4dea-956f-72b73cf66d0f"]` |=== The body to post can contain the following options (see also: the example above) * `includeChildren`: Set this to true if you want to see child executions of workflows and pipelines * `limit`: the maximum number of IDs to retrieve or a value <=0 to get all IDs === Get execution [cols="1,2"] |=== |Type |`GET` |Path |`location/executions/\{locationName\}/\{executionId\}` |Arguments |`locationName`: the name of the execution information location to query. `executionId`: the ID of the execution to retrieve. |Produces |`application/json` |Example call |`curl -X GET http://localhost:8080/hop/api/v1/location/executions/local/df84cbc2-0166-4dea-956f-72b73cf66d0d/` ` |Example output |The execution details look like this: `{"name":"pipeline-name","filename":"/path/filename.hpl","id":"df84cbc2-0166-4dea-956f-72b73cf66d0d","parentId":null,"executionType":"Pipeline", ... }` |=== === Get execution state [cols="1,2"] |=== |Type |`GET` |Path |`location/state/\{locationName\}/\{executionId\}` |Arguments |`locationName`: the name of the execution information location to query. `executionId`: the ID of the execution state to retrieve. |Produces |`application/json` |Example call |`curl -X GET http://localhost:8080/hop/api/v1/location/state/local/df84cbc2-0166-4dea-956f-72b73cf66d0d/` ` |Example output |The execution state looks like this: `{"executionType":"Pipeline","parentId":null,"id":"df84cbc2-0166-4dea-956f-72b73cf66d0d","name":"test-service","copyNr":null,"loggingText":"logging-text","lastLogLineNr":14,"metrics":[{"componentName":"id","componentCopy":"0","metrics":{"Read":5,"Buffers Output":0,"Errors":0,"Input":0,"Written":5,"Updated":0,"Output":0,"Rejected":0,"Buffers Input":0}},{"componentName":"uuid","componentCopy":"0","metrics":{"Read":5,"Buffers Output":0,"Errors":0,"Input":0,"Written":5,"Updated":0,"Output":0,"Rejected":0,"Buffers Input":0}},{"componentName":"Enhanced JSON Output","componentCopy":"0","metrics":{"Read":5,"Buffers Output":0,"Errors":0,"Input":0,"Written":1,"Updated":0,"Output":1,"Rejected":0,"Buffers Input":0}},{"componentName":"OUTPUT","componentCopy":"0","metrics":{"Read":1,"Buffers Output":0,"Errors":0,"Input":0,"Written":1,"Updated":0,"Output":0,"Rejected":0,"Buffers Input":0}},{"componentName":"5 rows","componentCopy":"0","metrics":{"Read":0,"Buffers Output":0,"Errors":0,"Input":0,"Written":5,"Updated":0,"Output":0,"Rejected":0,"Buffers Input":0}},{"componentName":"Get variables","componentCopy":"0","metrics":{"Read":5,"Buffers Output":0,"Errors":0,"Input":0,"Written":5,"Updated":0,"Output":0,"Rejected":0,"Buffers Input":0}}],"statusDescription":"Finished","updateTime":1678191016156,"childIds":["46690405-4b06-4353-973a-06aff689afe0","ec974060-e228-4438-8408-b049803eb316","f7344a76-06b0-4499-95a1-1b30bd987561","32837620-df15-4602-b32c-69111689767f","db2e3feb-3ab1-4491-a4dc-7036cc0c3a3f","4653fb73-ac94-4ac3-adef-a14e6129aa14"],"details":{},"failed":false,"containerId":"c7c90ed5-6684-408a-be11-d1fd1c65164a"}` |===
combined_dataset/train/non-malicious/Find Local Group Members.ps1
Find Local Group Members.ps1
# Author: Hal Rottenberg # Purpose: Find matching members in a local group # Used tip from RichS here: http://powershellcommunity.org/Forums/tabid/54/view/topic/postid/1528/Default.aspx # Change these two to suit your needs $ChildGroups = "Domain Admins", "Group Two" $LocalGroup = "Administrators" $MemberNames = @() # uncomment this line to grab list of computers from a file # $Servers = Get-Content serverlist.txt $Servers = $env:computername # for testing on local computer foreach ( $Server in $Servers ) { $Group= [ADSI]"WinNT://$Server/$LocalGroup,group" $Members = @($Group.psbase.Invoke("Members")) $Members | ForEach-Object { $MemberNames += $_.GetType().InvokeMember("Name", 'GetProperty', $null, $_, $null) } $ChildGroups | ForEach-Object { $output = "" | Select-Object Server, Group, InLocalAdmin $output.Server = $Server $output.Group = $_ $output.InLocalAdmin = $MemberNames -contains $_ Write-Output $output } }
combined_dataset/train/non-malicious/2349.ps1
2349.ps1
[CmdletBinding()] [OutputType('System.DirectoryServices.ActiveDirectorySecurity')] param ( [Parameter(Mandatory, ValueFromPipeline, ValueFromPipelineByPropertyName)] [string[]]$Hostname, [Parameter(ValueFromPipeline, ValueFromPipelineByPropertyName)] [string]$DomainName = (Get-ADDomain).Forest, [ValidateSet('Forest','Domain')] [Parameter(ValueFromPipeline, ValueFromPipelineByPropertyName)] [string[]]$AdDnsIntegration = 'Forest' ) begin { $ErrorActionPreference = 'Stop' Set-StrictMode -Version Latest } process { try { $Path = "AD:\DC=$DomainName,CN=MicrosoftDNS,DC=$AdDnsIntegration`DnsZones,DC=$($DomainName.Split('.') -join ',DC=')" foreach ($Record in (Get-ChildItem -Path $Path)) { if ($Hostname -contains $Record.Name) { Get-Acl -Path "ActiveDirectory:://RootDSE/$($Record.DistinguishedName)" } } } catch { Write-Error $_.Exception.Message } }
combined_dataset/train/non-malicious/298.ps1
298.ps1
function Register-PSFCallback { [CmdletBinding()] param ( [Parameter(Mandatory = $true, ValueFromPipelineByPropertyName = $true)] [string] $Name, [Parameter(Mandatory = $true, ValueFromPipelineByPropertyName = $true)] [string] $ModuleName, [Parameter(Mandatory = $true, ValueFromPipelineByPropertyName = $true)] [string] $CommandName, [Parameter(Mandatory = $true, ValueFromPipelineByPropertyName = $true)] [scriptblock] $ScriptBlock, [Parameter(ValueFromPipelineByPropertyName = $true)] [ValidateSet('CurrentRunspace', 'Process')] [string] $Scope = 'CurrentRunspace', [Parameter(ValueFromPipelineByPropertyName = $true)] [switch] $BreakAffinity ) process { $callback = New-Object PSFramework.Flowcontrol.Callback -Property @{ Name = $Name ModuleName = $ModuleName CommandName = $CommandName BreakAffinity = $BreakAffinity ScriptBlock = $ScriptBlock } if ($Scope -eq 'CurrentRunspace') { $callback.Runspace = [System.Management.Automation.Runspaces.Runspace]::DefaultRunspace.InstanceId } [PSFramework.FlowControl.CallbackHost]::Add($callback) } }
combined_dataset/train/non-malicious/New-XVM_8.ps1
New-XVM_8.ps1
#Examples <# New-XVM -Name "WS2012-TestServer01" -SwitchName "Switch(192.168.2.0/24)" -VhdType NoVHD New-XVM -Name "WS2012-TestServer02" -SwitchName "Switch(192.168.2.0/24)" -VhdType ExistingVHD -VhdPath 'D:\\vhds\\WS2012-TestServer02.vhdx' New-XVM -Name "WS2012-TestServer03" -SwitchName "Switch(192.168.2.0/24)" -VhdType NewVHD New-XVM -Name "WS2012-TestServer04" -SwitchName "Switch(192.168.2.0/24)" -VhdType NewVHD -DiskType Fixed -DiskSize 1GB New-XVM -Name "WS2012-TestServer05" -SwitchName "Switch(192.168.2.0/24)" -VhdType NewVHD -DiskType Dynamic New-XVM -Name "WS2012-TestServer06" -SwitchName "Switch(192.168.2.0/24)" -VhdType Differencing -ParentVhdPath 'D:\\vhds\\Windows Server 2012 RC Base.vhdx' New-XVM -Name "WS2012-TestServer07" -SwitchName "Switch(192.168.2.0/24)" -VhdType NewVHD -Configuration @{"MemoryStartupBytes"=1GB;"BootDevice"="LegacyNetworkAdapter"} #> Function New-XVM { [cmdletbinding()] Param ( [Parameter(Mandatory=$false,Position=1)] [string]$ComputerName=$env:COMPUTERNAME, [Parameter(Mandatory=$true,Position=2)] [string]$Name, [Parameter(Mandatory=$true,Position=3)] [string]$SwitchName, [Parameter(Mandatory=$true,Position=4)] [ValidateSet("NoVHD","ExistingVHD","NewVHD","Differencing")] [string]$VhdType, [Parameter(Mandatory=$false,Position=5)] [hashtable]$Configuration ) DynamicParam { Switch ($VhdType) { "ExistingVHD" { $attributes = New-Object System.Management.Automation.ParameterAttribute $attributes.ParameterSetName = "_AllParameterSets" $attributes.Mandatory = $true $attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute] $attributeCollection.Add($attributes) $vhdPath = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("VhdPath", [String], $attributeCollection) $paramDictionary = New-Object -Type System.Management.Automation.RuntimeDefinedParameterDictionary $paramDictionary.Add("VhdPath",$vhdPath) return $paramDictionary } "NewVHD" { $attributes = New-Object System.Management.Automation.ParameterAttribute $attributes.ParameterSetName = "_AllParameterSets" $attributes.Mandatory = $false $attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute] $attributeCollection.Add($attributes) $diskType = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("DiskType", [String], $attributeCollection) $paramDictionary = New-Object -Type System.Management.Automation.RuntimeDefinedParameterDictionary $paramDictionary.Add("DiskType",$diskType) $attributes = New-Object System.Management.Automation.ParameterAttribute $attributes.ParameterSetName = "_AllParameterSets" $attributes.Mandatory = $false $attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute] $attributeCollection.Add($attributes) $diskSize = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("DiskSize", [uint64], $attributeCollection) $paramDictionary.Add("DiskSize",$diskSize) return $paramDictionary } "Differencing" { $attributes = New-Object System.Management.Automation.ParameterAttribute $attributes.ParameterSetName = "_AllParameterSets" $attributes.Mandatory = $true $attributeCollection = New-Object -Type System.Collections.ObjectModel.Collection[System.Attribute] $attributeCollection.Add($attributes) $parentVhdPath = New-Object -Type System.Management.Automation.RuntimeDefinedParameter("ParentVhdPath", [String], $attributeCollection) $paramDictionary = New-Object -Type System.Management.Automation.RuntimeDefinedParameterDictionary $paramDictionary.Add("ParentVhdPath",$parentVhdPath) return $paramDictionary } } } Begin { Try { $vmHost = Get-VMHost -ComputerName $ComputerName -ErrorAction:Stop } Catch { $PSCmdlet.ThrowTerminatingError($Error[0]) } $defaultVirtualHardDiskPath = $vmHost.VirtualHardDiskPath } Process { $validConfigNames = "MemoryStartupBytes","BootDevice" $configParams = @() Switch ($VhdType) { "NoVHD" { $newVhdPath = $null } "ExistingVHD" { $newVhdPath = $vhdPath.Value } "NewVhd" { if (-not $diskType.IsSet) {$diskType.Value = "Dynamic"} if (-not $diskSize.IsSet) {$diskSize.Value = 127GB} $newVhdPath = Join-Path -Path $defaultVirtualHardDiskPath -ChildPath "$Name.vhdx" Switch ($diskType.Value) { "Fixed" { $vhdFile = New-VHD -Fixed -SizeBytes $diskSize.Value -Path $newVhdPath -ErrorAction Stop } "Dynamic" { $vhdFile = New-VHD -Dynamic -SizeBytes $diskSize.Value -Path $newVhdPath -ErrorAction Stop } } } "Differencing" { $newVhdPath = Join-Path -Path $defaultVirtualHardDiskPath -ChildPath "$Name.vhdx" $vhdFile = New-VHD -Differencing -ParentPath $parentVhdPath.Value -Path $newVhdPath -ErrorAction Stop } } if ($vhdFile -ne $null) { Try { $command = "New-VM -ComputerName $ComputerName -Name '$Name' -SwitchName '$SwitchName' -VHDPath '$($vhdFile.Path)'" } Catch { $PSCmdlet.WriteError($Error[0]) Remove-Item -Path $vhdFile.Path } } else { $command = "New-VM -ComputerName $ComputerName -Name '$Name' -SwitchName '$SwitchName' -NoVHD" } if ($Configuration -ne $null) { foreach ($configName in $Configuration.Keys.GetEnumerator()) { if ($validConfigNames -contains $configName) { $configParams += "-$configName" + " " + $Configuration[$configName] } } $configParams = $configParams -join " " } if ($configParams.Count -eq 0) { $command += " -ErrorAction Stop" } else { $command += " $configParams -ErrorAction Stop" } Invoke-Expression -Command $command } End {} }
combined_dataset/train/non-malicious/2524.ps1
2524.ps1
function SQL-Query{ param([string]$Query, [string]$SqlServer = $DEFAULT_SQL_SERVER, [string]$DB = $DEFAULT_SQL_DB, [string]$RecordSeparator = "`t") $conn_options = ("Data Source=$SqlServer; Initial Catalog=$DB;" + "Integrated Security=SSPI") $conn = New-Object System.Data.SqlClient.SqlConnection($conn_options) $conn.Open() $sqlCmd = New-Object System.Data.SqlClient.SqlCommand $sqlCmd.CommandTimeout = "300" $sqlCmd.CommandText = $Query $sqlCmd.Connection = $conn $reader = $sqlCmd.ExecuteReader() if(-not $?) { $lineno = Get-CurrentLineNumber ./logerror.ps1 $Output $date $lineno $title } [array]$serverArray $arrayCount = 0 while($reader.Read()){ $serverArray += ,($reader.GetValue(0)) $arrayCount++ } $serverArray } $ENV = $args[0] if ($ENV -eq $null){ $ENV = "PROD" } switch ($ENV) { "PA-PROD"{ $DBServer = "XSQLUTIL18"; $ArchiveDrive = "E" $DB = "Status"; $ServerQuery = "SELECT server_name , [Type] = CASE st.type_name WHEN 'BOS-IIS' THEN 'IIS' WHEN 'Web-IIS' THEN 'IIS' WHEN 'Web' THEN 'IIS' WHEN 'Citrix PVS' THEN 'PVS' WHEN 'Citrix XenApp' THEN 'XenApp' WHEN 'Opus App' THEN 'App' WHEN 'SQL' THEN 'SQL' ELSE st.type_name END , domain , ip_address , dns_host_name , perfmon_path , perfmon_drive , perfmon_start_time , perfmon_end_time FROM t_server s INNER JOIN t_server_properties sp ON s.server_id = sp.server_id INNER JOIN t_perfmon_properties pp ON s.server_id = pp.server_id INNER JOIN t_server_type_assoc sta ON s.server_id = sta.server_id INNER JOIN t_server_type st ON sta.type_id = st.type_id WHERE Active = '1' AND st.type_name NOT IN ('Payload', 'Utility', 'Queueing', 'PGP', 'Internal FTP', 'FTP', 'Connection', 'IISConnection', 'FileServer') --AND server_name = 'iwebcbs10' ORDER BY server_name "; } "PA-STAGE"{ $DBServer = "STGSQLCBS620"; $ArchiveDrive = "E" $DB = "Status"; $ServerQuery = "SELECT server_name , [Type] = CASE st.type_name WHEN 'BOS-IIS' THEN 'IIS' WHEN 'Web-IIS' THEN 'IIS' WHEN 'Web' THEN 'IIS' WHEN 'Citrix PVS' THEN 'PVS' WHEN 'Citrix XenApp' THEN 'XenApp' WHEN 'Opus App' THEN 'App' WHEN 'SQL' THEN 'SQL' ELSE st.type_name END , domain , ip_address --, dns_host_name , perfmon_path , perfmon_drive , perfmon_start_time , perfmon_end_time FROM t_server s INNER JOIN t_server_properties sp ON s.server_id = sp.server_id INNER JOIN t_perfmon_properties pp ON s.server_id = pp.server_id INNER JOIN t_server_type_assoc sta ON s.server_id = sta.server_id INNER JOIN t_server_type st ON sta.type_id = st.type_id WHERE Active = '1' AND st.type_name NOT IN ('Payload', 'Utility', 'Queueing', 'PGP', 'Internal FTP', 'FTP', 'Connection', 'IISConnection', 'FileServer') ORDER BY server_name "; } "PA-IMP"{ $DBServer = "ISQLDEV610"; $ArchiveDrive = "E" $DB = "StatusStage"; $ServerQuery = "SELECT server_name , [Type] = CASE st.type_name WHEN 'BOS-IIS' THEN 'IIS' WHEN 'Web-IIS' THEN 'IIS' WHEN 'Web' THEN 'IIS' WHEN 'Citrix PVS' THEN 'PVS' WHEN 'Citrix XenApp' THEN 'XenApp' WHEN 'Opus App' THEN 'App' WHEN 'SQL' THEN 'SQL' ELSE st.type_name END , domain , ip_address , dns_host_name , perfmon_path , perfmon_drive , perfmon_start_time , perfmon_end_time FROM t_server s INNER JOIN t_server_properties sp ON s.server_id = sp.server_id INNER JOIN t_perfmon_properties pp ON s.server_id = pp.server_id INNER JOIN t_server_type_assoc sta ON s.server_id = sta.server_id INNER JOIN t_server_type st ON sta.type_id = st.type_id WHERE Active = '1' AND st.type_name NOT IN ('Payload', 'Utility', 'Queueing', 'PGP', 'Internal FTP', 'FTP', 'Connection', 'IISConnection', 'FileServer') ORDER BY server_name "; } "PA-QA"{ $DBServer = "ISQLDEV610"; $ArchiveDrive = "E" $DB = "StatusIMP"; $ServerQuery = "SELECT server_name , [Type] = CASE st.type_name WHEN 'BOS-IIS' THEN 'IIS' WHEN 'Web-IIS' THEN 'IIS' WHEN 'Web' THEN 'IIS' WHEN 'Citrix PVS' THEN 'PVS' WHEN 'Citrix XenApp' THEN 'XenApp' WHEN 'Opus App' THEN 'App' WHEN 'SQL' THEN 'SQL' ELSE st.type_name END , domain , ip_address , dns_host_name , perfmon_path , perfmon_drive , perfmon_start_time , perfmon_end_time FROM t_server s INNER JOIN t_server_properties sp ON s.server_id = sp.server_id INNER JOIN t_perfmon_properties pp ON s.server_id = pp.server_id INNER JOIN t_server_type_assoc sta ON s.server_id = sta.server_id INNER JOIN t_server_type st ON sta.type_id = st.type_id WHERE Active = '1' AND st.type_name NOT IN ('Payload', 'Utility', 'Queueing', 'PGP', 'Internal FTP', 'FTP', 'Connection', 'IISConnection', 'FileServer') ORDER BY server_name "; } "DEN-PROD"{ $DBServer = "SQLUTIL01"; $ArchiveDrive = "D" $DB = "Status"; $ServerQuery = "SELECT server_name , [Type] = CASE st.type_name WHEN 'BOS-IIS' THEN 'IIS' WHEN 'Web-IIS' THEN 'IIS' WHEN 'Web' THEN 'IIS' WHEN 'Citrix PVS' THEN 'PVS' WHEN 'Citrix XenApp' THEN 'XenApp' WHEN 'Opus App' THEN 'App' WHEN 'SQL' THEN 'SQL' ELSE st.type_name END , domain , ip_address , dns_host_name , perfmon_path , perfmon_drive , perfmon_start_time , perfmon_end_time FROM t_server s INNER JOIN t_server_properties sp ON s.server_id = sp.server_id INNER JOIN t_perfmon_properties pp ON s.server_id = pp.server_id INNER JOIN t_server_type_assoc sta ON s.server_id = sta.server_id INNER JOIN t_server_type st ON sta.type_id = st.type_id WHERE Active = '1' --AND dns_host_name LIKE 'sql01.generation%' --AND server_name LIKE 'SQLUTIL%' --OR server_name LIKE 'HOpusSQL%' ORDER BY server_name "; } "LOU-PROD"{ $DBServer = "SQLUTIL02"; $ArchiveDrive = "D" $DB = "Status"; $ServerQuery = "SELECT server_name , [Type] = CASE st.type_name WHEN 'BOS-IIS' THEN 'IIS' WHEN 'Web-IIS' THEN 'IIS' WHEN 'Web' THEN 'IIS' WHEN 'Citrix PVS' THEN 'PVS' WHEN 'Citrix XenApp' THEN 'XenApp' WHEN 'Opus App' THEN 'App' WHEN 'SQL' THEN 'SQL' ELSE st.type_name END , domain , ip_address , dns_host_name , perfmon_path , perfmon_drive , perfmon_start_time , perfmon_end_time FROM t_server s INNER JOIN t_server_properties sp ON s.server_id = sp.server_id INNER JOIN t_perfmon_properties pp ON s.server_id = pp.server_id INNER JOIN t_server_type_assoc sta ON s.server_id = sta.server_id INNER JOIN t_server_type st ON sta.type_id = st.type_id WHERE Active = '1' --AND server_name LIKE 'SQLUTIL%' --OR server_name LIKE 'HOpusCap%' ORDER BY server_name "; } "FINALE"{ $DBServer = "FINREP01V"; $ArchiveDrive = "C" $DB = "Status"; $ServerQuery = "SELECT server_name , [Type] = CASE st.type_name WHEN 'BOS-IIS' THEN 'IIS' WHEN 'Web-IIS' THEN 'IIS' WHEN 'Web' THEN 'IIS' WHEN 'Citrix PVS' THEN 'PVS' WHEN 'Citrix XenApp' THEN 'XenApp' WHEN 'Opus App' THEN 'App' WHEN 'SQL' THEN 'SQL' ELSE st.type_name END , domain , ip_address , dns_host_name , perfmon_path , perfmon_drive , perfmon_start_time , perfmon_end_time FROM t_server s INNER JOIN t_server_properties sp ON s.server_id = sp.server_id INNER JOIN t_perfmon_properties pp ON s.server_id = pp.server_id INNER JOIN t_server_type_assoc sta ON s.server_id = sta.server_id INNER JOIN t_server_type st ON sta.type_id = st.type_id WHERE Active = '1'"; } } $Servers = ( Invoke-SQLCmd -query $ServerQuery -Server $DBServer -Database $DB ) $OutText = '' foreach ($Server in $Servers) { if ($Server -ne $null) { $ServerName = $($Server.dns_host_name) $ServerIPAddress = $($Server.ip_address) $ServerType = $($Server.Type) $PerfmonDrive = $($Server.perfmon_drive) Write-Host "----- Begin $ServerName. -----" $regex = [regex]'(?<DCS>[SystemHealth]+)\s+(?<Type>[Counter]+)\s+(?<Status>[Running | Stopped]+)' $StrCMDStatus = "C:\Windows\System32\Logman.exe -s $ServerName" $MyOutput = Invoke-Expression $StrCMDStatus | where { $_ -match $regex } if ( $MyOutput -eq $NULL ) { $OutText += $ServerName, "`t", $NULL, "`t", $NULL , "`t", $NULL, "`n" } else { $OutText += $ServerName, "`t", $Matches.DCS, "`t", $Matches.Type , "`t", $Matches.Status, "`n" } Write-Host "----- End $ServerName. -----" Write-Host "" } } $OutText | Sort-Object -Property Type, Status, DCS | Format-Table
combined_dataset/train/non-malicious/sample_18_83.ps1
sample_18_83.ps1
# Copyright (c) 2019-2024, The Khronos Group Inc. # SPDX-License-Identifier: Apache-2.0 param( [Parameter(Mandatory = $true, HelpMessage = "Path to unzipped openxr_loader_windows OpenXR-SDK release asset")] $SDKRelease, [Parameter(Mandatory = $true, HelpMessage = "Path to specification Makefile. Needed to extract the version")] $SpecMakefile, [Parameter(Mandatory = $true, HelpMessage = "Path create staged nuget directory layout")] $NugetStaging) $ErrorActionPreference = "Stop" if (-Not (Test-Path $SDKRelease)) { Throw "SDK Release folder not found: $SDKRelease" } if (-Not (Test-Path $SpecMakefile)) { Throw "Specification makefile not found: $SpecMakefile" } $NugetTemplate = Join-Path $PSScriptRoot "NugetTemplate" if (Test-Path $NugetStaging) { Remove-Item $NugetStaging -Recurse } # # Extract version from Specification makefile # $VersionMatch = Select-String -Path $SpecMakefile -Pattern "^SPECREVISION\s*=\s*(.+)" $SDKVersion = $VersionMatch.Matches[0].Groups[1] # # Start off using the NuGet template. # Write-Output "Copy-Item $NugetTemplate $NugetStaging -Recurse" Copy-Item $NugetTemplate $NugetStaging -Recurse # # Update the NuSpec # $NuSpecPath = Resolve-Path (Join-Path $NugetStaging "OpenXR.Loader.nuspec") $xml = [xml](Get-Content $NuSpecPath) $nsm = New-Object Xml.XmlNamespaceManager($xml.NameTable) $nsm.AddNamespace("ng", "http://schemas.microsoft.com/packaging/2010/07/nuspec.xsd") $xml.SelectSingleNode("/ng:package/ng:metadata/ng:version", $nsm).InnerText = $SDKVersion $xml.Save($NuSpecPath) # # Copy in the headers from the SDK release. # Copy-Item (Join-Path $SDKRelease "include") (Join-Path $NugetStaging "include") -Recurse # # Copy in the binaries from the SDK release. # function CopyLoader($Platform) { $PlatformSDKPath = Join-Path $SDKRelease "$Platform" if (Test-Path $PlatformSDKPath) { $NuGetPlatformPath = Join-Path $NugetStaging "native/$Platform/release" $NugetLibPath = Join-Path $NuGetPlatformPath "lib" New-Item $NugetLibPath -ItemType "directory" -Force Copy-Item (Join-Path $PlatformSDKPath "lib/openxr_loader.lib") $NugetLibPath $NugetBinPath = Join-Path $NuGetPlatformPath "bin" New-Item $NugetBinPath -ItemType "directory" -Force Copy-Item (Join-Path $PlatformSDKPath "bin/openxr_loader.dll") $NugetBinPath } } # Currently there are no non-UWP ARM/ARM64 binaries available from the SDK release. CopyLoader "x64" CopyLoader "Win32" CopyLoader "x64_uwp" CopyLoader "Win32_uwp" CopyLoader "arm64_uwp" CopyLoader "arm_uwp"
combined_dataset/train/non-malicious/172.ps1
172.ps1
function View-Cats { Param( [int]$refreshtime=5 ) $IE = new-object -ComObject internetexplorer.application $IE.visible = $true $IE.FullScreen = $true $shell = New-Object -ComObject wscript.shell $shell.AppActivate("Internet Explorer") while($true){ $request = Invoke-WebRequest -Uri "http://thecatapi.com/api/images/get" -Method get $IE.Navigate($request.BaseResponse.ResponseUri.AbsoluteUri) Start-Sleep -Seconds $refreshtime } }
combined_dataset/train/non-malicious/Findup_7.ps1
Findup_7.ps1
using System; using System.Collections; using System.Collections.Generic; using System.Text; using System.Security.Cryptography; using System.Runtime.InteropServices; using Microsoft.Win32; using System.IO; namespace Findup { public class FileInfoExt { public FileInfoExt(FileInfo fi) { FI = fi; } public FileInfo FI { get; private set; } public bool Checked { get; set; } public byte[] SHA512_1st1K { get; set; } public byte[] SHA512_All { get; set; } } class Recurse // Add FileInfoExt objects of files matching filenames, file specifications (IE: *.*), and in directories in pathRec, to returnList { public void Recursive(string[] pathRec, string searchPattern, Boolean recursiveFlag, List<FileInfoExt> returnList) { foreach (string d in pathRec) { Recursive(d, searchPattern, recursiveFlag, returnList); } return; } public void Recursive(string pathRec, string searchPattern, Boolean recursiveFlag, List<FileInfoExt> returnList) { if (File.Exists(pathRec)) { try { returnList.Add(new FileInfoExt(new FileInfo(pathRec))); } catch (Exception e) { Console.WriteLine("Add file error: " + e.Message); } } else if (Directory.Exists(pathRec)) { try { DirectoryInfo Dir = new DirectoryInfo(pathRec); foreach (FileInfo addf in (Dir.GetFiles(searchPattern))) { returnList.Add(new FileInfoExt(addf)); } } catch (Exception e) { Console.WriteLine("Add files from Directory error: " + e.Message); } if (recursiveFlag == true) { try { foreach (string d in (Directory.GetDirectories(pathRec))) { Recursive(d, searchPattern, recursiveFlag, returnList); } } catch (Exception e) { Console.WriteLine("Add Directory error: " + e.Message); } } } else { try { string filePart = Path.GetFileName(pathRec); string dirPart = Path.GetDirectoryName(pathRec); if (filePart.IndexOfAny(new char[] { '?', '*' }) >= 0) { if ((dirPart == null) || (dirPart == "")) dirPart = Directory.GetCurrentDirectory(); if (Directory.Exists(dirPart)) { Recursive(dirPart, filePart, recursiveFlag, returnList); } else { Console.WriteLine("Invalid file path, directory path, file specification, or program option specified: " + pathRec); } } else { Console.WriteLine("Invalid file path, directory path, file specification, or program option specified: " + pathRec); } } catch (Exception e) { Console.WriteLine("Parse error on: " + pathRec); Console.WriteLine("Make sure you don't end a directory with a \\\\ when using quotes. The console arg parser doesn't accept that."); Console.WriteLine("Exception: " + e.Message); return; } } return; } } class Findup { public static void Main(string[] args) { Console.WriteLine("Findup.exe v1.0 - use -help for usage information. Created in 2010 by James Gentile."); Console.WriteLine(" "); string[] paths = new string[0]; System.Boolean recurse = false; System.Boolean delete = false; System.Boolean noprompt = false; System.Boolean b4b = false; List<FileInfoExt> fs = new List<FileInfoExt>(); long bytesInDupes = 0; // bytes in all the duplicates long numOfDupes = 0; // number of duplicate files found. long bytesRec = 0; // number of bytes recovered. long delFiles = 0; // number of files deleted. int c = 0; int i = 0; string deleteConfirm; for (i = 0; i < args.Length; i++) { if ((System.String.Compare(args[i], "-help", true) == 0) || (System.String.Compare(args[i], "-h", true) == 0)) { Console.WriteLine("Usage: findup.exe <file/directory #1> <file/directory #2> ... <file/directory #N> [-recurse] [-delete] [-noprompt]"); Console.WriteLine(" "); Console.WriteLine("Options: -help - displays this help infomration."); Console.WriteLine(" -recurse - recurses through subdirectories."); Console.WriteLine(" -delete - deletes duplicates with confirmation prompt."); Console.WriteLine(" -noprompt - when used with -delete option, deletes files without confirmation prompt."); Console.WriteLine(" -b4b - do a byte-for-byte comparison, instead of SHA-512 hashing. Might be much slower, but most secure."); Console.WriteLine(" "); Console.WriteLine("Examples: findup.exe c:\\\\finances -recurse"); Console.WriteLine(" findup.exe c:\\\\users\\\\alice\\\\plan.txt d:\\\\data -recurse -delete -noprompt"); Console.WriteLine(" findup.exe c:\\\\data .\\\\*.txt c:\\\\reports\\\\quarter.doc -recurse -b4b"); Console.WriteLine(" "); return; } if (System.String.Compare(args[i], "-recurse", true) == 0) { recurse = true; continue; } if (System.String.Compare(args[i], "-delete", true) == 0) { delete = true; continue; } if (System.String.Compare(args[i], "-noprompt", true) == 0) { noprompt = true; continue; } if (System.String.Compare(args[i], "-b4b", true) == 0) { b4b = true; continue; } Array.Resize(ref paths, paths.Length + 1); paths[c] = args[i]; c++; } if (paths.Length == 0) { Console.WriteLine("No files specified, try findup.exe -help"); return; } Recurse recurseMe = new Recurse(); recurseMe.Recursive(paths, "*.*", recurse, fs); if (fs.Count < 2) { Console.WriteLine("Findup.exe needs at least 2 files to compare. try findup.exe -help"); return; } RNGCryptoServiceProvider rng = new RNGCryptoServiceProvider(); rng.GetBytes(randomNumber); // get SHA-512 salt. for (i = 0; i < fs.Count; i++) { if (fs[i].Checked == true) // If file was already matched, then skip to next. continue; for (c = i + 1; c < fs.Count; c++) { if (fs[c].Checked == true) // skip already matched inner loop files. continue; if (fs[i].FI.Length != fs[c].FI.Length) // If file size matches, then check hash. continue; if (System.String.Compare(fs[i].FI.FullName, fs[c].FI.FullName, true) == 0) // don't count the same file as a match. continue; if (fs[i].SHA512_1st1K == null) // check/hash first 1K first. fs[i].SHA512_1st1K = Compute1KHash(fs[i].FI.FullName); if (fs[c].SHA512_1st1K == null) fs[c].SHA512_1st1K = Compute1KHash(fs[c].FI.FullName); if (CompareHash(fs[i].SHA512_1st1K, fs[c].SHA512_1st1K) == false) // if the 1st 1K has the same hash.. continue; if (fs[i].SHA512_1st1K == null) // if hash error, then skip to next file. continue; if (b4b == true) // byte for byte comparison specified? { if (B4b(fs[i].FI.FullName, fs[c].FI.FullName) == false) // call the byte for byte comparison function continue; } else if (fs[i].FI.Length > 1024) // skip hashing the file again if < 1024 bytes. { if (fs[i].SHA512_All == null) // check/hash the rest of the files. fs[i].SHA512_All = ComputeFullHash(fs[i].FI.FullName); if (fs[c].SHA512_All == null) fs[c].SHA512_All = ComputeFullHash(fs[c].FI.FullName); if (CompareHash(fs[i].SHA512_All, fs[c].SHA512_All) == false) continue; if (fs[i].SHA512_All == null) // check for hash fail before declairing a duplicate. continue; } Console.WriteLine("Match : " + fs[i].FI.FullName); Console.WriteLine("with : " + fs[c].FI.FullName); fs[c].Checked = true; // do not check or match against this file again. numOfDupes++; // increase count of matches. bytesInDupes += fs[c].FI.Length; // accumulate number of bytes in duplicates. if (delete != true) // if delete is specified, try to delete the duplicate file. continue; if (noprompt == false) { Console.Write("Delete the duplicate file <Y/n>?"); deleteConfirm = Console.ReadLine(); if ((deleteConfirm[0] != 'Y') && (deleteConfirm[0] != 'y')) continue; } try { File.Delete(fs[c].FI.FullName); Console.WriteLine("Deleted: " + fs[c].FI.FullName); bytesRec += fs[c].FI.Length; delFiles++; } catch (Exception e) { Console.WriteLine("File delete error: " + e.Message); } } } Console.WriteLine(" "); Console.WriteLine("Files checked : {0:N0}", fs.Count); Console.WriteLine("Duplicate files : {0:N0}", numOfDupes); Console.WriteLine("Duplicate bytes : {0:N0}", bytesInDupes); Console.WriteLine("Duplicates deleted : {0:N0}", delFiles); Console.WriteLine("Recovered bytes : {0:N0}", bytesRec); return; } private static Boolean B4b(string path1, string path2) { try { using (var stream = File.OpenRead(path1)) { using (var stream2 = File.OpenRead(path2)) { System.Boolean EOF = false; do { var length = stream.Read(largeBuf, 0, largeBuf.Length); var length2 = stream2.Read(largeBuf2, 0, largeBuf2.Length); if (length != length2) return false; if (length != largeBuf.Length) EOF = true; int i = 0; while (i < length) { if (largeBuf[i] != largeBuf2[i]) return false; i++; } } while (EOF == false); } } return true; } catch (Exception e) { Console.WriteLine("Byte for Byte comparison failed: " + e.Message); return false; } } private static Boolean CompareHash(byte[] hash1, byte[] hash2) { int i = 0; while (i < hash1.Length) { if (hash1[i] != hash2[i]) return false; i++; } return true ; } private static readonly byte[] readBuf = new byte[1024 + 64]; private static readonly byte[] readBuf2 = new byte[1024 + 64]; private static readonly byte[] largeBuf = new byte[10240 + 64]; private static readonly byte[] largeBuf2 = new byte[10240 + 64]; private static readonly byte[] randomNumber = new byte[64]; private static byte[] hash = new byte[64]; private static byte[] Compute1KHash(string path) { Buffer.BlockCopy(randomNumber, 0, readBuf, 0, randomNumber.Length); try { using (var stream = File.OpenRead(path)) { var length = stream.Read(readBuf, hash.Length, readBuf.Length - hash.Length); hash = SHA512.Create().ComputeHash(readBuf, 0, length + hash.Length); return (hash); } } catch (Exception e) { Console.WriteLine("Hash Error: " + e.Message); return (null); } } private static byte[] ComputeFullHash(string path) { Buffer.BlockCopy(randomNumber, 0, largeBuf, 0, randomNumber.Length); try { var _SHA = SHA512.Create(); using (var stream = File.OpenRead(path)) { System.Boolean EOF = false; while (EOF == false) { var length = stream.Read(largeBuf, hash.Length, largeBuf.Length - hash.Length); if (length != (largeBuf.Length - hash.Length)) EOF = true; hash = _SHA.ComputeHash(largeBuf, 0, length + hash.Length); Buffer.BlockCopy(hash, 0, largeBuf, 0, hash.Length); } return (hash); } } catch (Exception e) { Console.WriteLine("Hash error: " + e.Message); return (null); } } } }
combined_dataset/train/non-malicious/sample_15_65.ps1
sample_15_65.ps1
<# .SYNOPSIS Scenario module for collecting machine licensing/activation related data .DESCRIPTION Collect machine licensing/activation related troubleshooting data .NOTES Author : Robert Klemencz Requires : MSRD-Collect.ps1 Version : See MSRD-Collect.ps1 version Feedback : https://aka.ms/MSRD-Collect-Feedback #> $msrdLogPrefix = "Activation" $msrdActivationLogFolder = $global:msrdBasicLogFolder + "Activation\" Function msrdCollectUEX_AVDActivationLog { param( [bool[]]$varsActivation ) if ($global:msrdSilentMode -eq 1) { msrdLogMessage $LogLevel.Normal "`n" -NoDate } else { " " | Out-File -Append $global:msrdOutputLogFile } msrdLogMessage $LogLevel.Info "$(msrdGetLocalizedText "activationmsg")" -silentException msrdCreateLogFolder $msrdActivationLogFolder #get Licensing/Activation information if ($varsActivation[0] -and ($global:msrdOSVer -notlike "*Server*2008*")) { if ($global:msrdAudioAssistMode -eq 1) { msrdLogMessageAssistMode "$(msrdGetLocalizedText "activationmsg2")" } $licdiagfile = Join-Path $msrdActivationLogFolder ($global:msrdLogFilePrefix + "licensingdiag.cab") $Commands = @( "licensingdiag /cab $licdiagfile 2>&1 | Out-Null" ) msrdRunCommands -LogPrefix $msrdLogPrefix -CmdletArray $Commands -ThrowException:$False -ShowMessage:$True -ShowError:$True } if ($varsActivation[1]) { if ($global:msrdAudioAssistMode -eq 1) { msrdLogMessageAssistMode "$(msrdGetLocalizedText "activationmsg3")" } $slmgrFile = Join-Path $msrdActivationLogFolder ($global:msrdLogFilePrefix + "slmgr-dlv.txt") $Commands = @( "cscript $env:windir\System32\slmgr.vbs /dlv 2>&1 | Out-File -Append $slmgrFile" ) msrdRunCommands -LogPrefix $msrdLogPrefix -CmdletArray $Commands -ThrowException:$False -ShowMessage:$True -ShowError:$True } #get local kms info if domain joined if ($varsActivation[2]) { $isDomain = (get-ciminstance -Class Win32_ComputerSystem).PartOfDomain if ($isDomain) { if ($global:msrdAudioAssistMode -eq 1) { msrdLogMessageAssistMode "$(msrdGetLocalizedText "activationmsg4")" } try { $vmdomain = ([System.Directoryservices.Activedirectory.Domain]::GetComputerDomain()).Name $kmsf = Join-Path $msrdActivationLogFolder ($global:msrdLogFilePrefix + "KMS-Servers.txt") Resolve-DnsName "_vlmcs._tcp.$vmdomain" -Type SRV -ErrorAction Continue 2>>$global:msrdErrorLogFile | Out-File -Append $kmsf } catch { $failedCommand = $_.InvocationInfo.Line.TrimStart() msrdLogException ("$(msrdGetLocalizedText "errormsg") $failedCommand") -ErrObj $_ } } } } Export-ModuleMember -Function msrdCollectUEX_AVDActivationLog # SIG # Begin signature block # MIIoRQYJKoZIhvcNAQcCoIIoNjCCKDICAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBJBTNS/Ase9Mrk # 0ZkN2Fm4s0nCwfa6zDBJifzaesrRsqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiUwghohAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEjDhHhzkCnp1VAK/g6rhWNp # 8oPuoO3QX/eP9t4D3Es6MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEADXac67oFuuTd/DYGMP+3RVGhQ9CJGh/6eeVWW/MjapIR3w5AY2Y2iovh # ZlAhdJT8JkvDa3Z5yUc5yDRBXmBphFdVrVO+rTynQ3OdCzitLPtKyz+dxNXXRfWA # UENWfn2NbKbcNnnTkRDR9GUZI5AQknYjdEimRTTw0DMwmrX4qsG8qTzZOo+F0hzb # hIgN7zK82eiGUNcp/Cfvtp3a9p1PlFqx6oh7ohPbJ/8mZhLPcCdHOUG6eZazOgs3 # h3b9hINb/CUWprHOGuKh6aRXvlRbNPt2VMgUO6gnKMLKLaRwZ16mvBqaX7S7wYuc # p3EBoB/yWGc8LbUgDjg2JFBpIc7JIKGCF68wgherBgorBgEEAYI3AwMBMYIXmzCC # F5cGCSqGSIb3DQEHAqCCF4gwgheEAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCB4WeBOe+x3yPFTWlWH+Cy58ey/umND9w8At+/wljbk+QIGZutLR/nT # GBIyMDI0MTAyODExMzcxOS4yN1owBIACAfSggdmkgdYwgdMxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs # YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNO # OjRDMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIR/jCCBygwggUQoAMCAQICEzMAAAH/Ejh898Fl1qEAAQAAAf8wDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjQw # NzI1MTgzMTE5WhcNMjUxMDIyMTgzMTE5WjCB0zELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046NEMxQS0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDJ6JXSkHtuDz+pz+aSIN0l # efMlY9iCT2ZMZ4jenNCmzKtElERZwpgd3/11v6DfPh1ThUKQBkReq+TE/lA1O0Eb # kil7GmmHg+FuIkrC9f5RLgqRIWF/XB+UMBjW270JCqGHF8cVXu+G2aocsIKYPGFk # +YIGH39d8UlAhTBVlHxG1SSDOY31uZaJiB9fRH5sMCedxR22nXGMaYKl0EzKCT8r # SHdtRNTNAdviQ9/bKWQo+hYVifYY1iBbDw8YFQ7S9MwqNgPqkt4E/SFkOHk/d/jG # EYubrH3zG4hCn9EWfMFuC2HJJcaX41PVxkCobISFPsvRJ1HupCW/mnAM16tsrdhI # QMqTewOH1LrSEsk2o/vWIcqQbXvkcDKDrOYTmnd842v398gSk8CULxiKzFdoZfhG # kMFhUqkaPQUJnCKyJmzGbRf3DplKTw45d/wnFNhYip9G5bN1SKvRneOI461oOrtd # 3KkHiBmuGv3Qpw9MNHC/LrTOtBxr/UPUns9AkAk5tuJpuiLXa6xXxrG2VP90J48L # id1wVxqvW/5+cKWGz27cWfouQcNFl83OFeAsMTBvp0DjLezob6BDfmj3SPaLpqZp # rwmxX9wIX6INIbMDFljWxDWat0ybPF9bNc3qw8kzLj212xZMiBlZU5JL25QeFJiR # uAzGct6Ipd4HkwH1Axw5JwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMP6leT+tP93 # sT/RATuEfTDP7pRhMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA5I03kykuLK6eb # zrp+tYiLSF1rMo0uBGndZk9+FiA8Lcr8M0zMuWJhBQCnpa2CiUitq2K9eM4bWUiN # rIb2vp7DgfWfldl0N8nXYMuOilqnl7WJT9iTR660/J86J699uwjNOT8bnX66JQmT # vvadXNq7qEjYobIYEk68BsBUVHSDymlnAuCFPjPeaQZmOr87hn89yZUa2MamzZMK # 0jitmM81bw7hz/holGZhD811b3UlGs5dGnJetMpQ97eQ3w3nqOmX2Si0uF293z1F # s6wk1/ZfOpsBXteNXhxoKCUDZu3MPFzJ9/BeEu70cxTd0thMAj3WBM1QXsED2rUS # 9KUIoqU3w3XRjiJTSfIiR+lHFjIBtHKrlA9g8kcYDRPLQ8PzdoK3v1FrQh0MgxK7 # BeWlSfIjLHCsPKWB84bLKxYHBD+Ozbj1upA5g92nI52BF7y1d0auAOgF65U4r5xE # KVemKY1jCvrWhnb+Q8zNWvNFRgyQFd71ap1J7OHy3K266VhhxEr3mqKEXSKtCzr9 # Y5AmW1Bfv2XMVcT0UWWf0yLHRqz4Lgc/N35LRsE3cDddFE7AC/TXogK5PyFjUifJ # buPBWY346RDXN6LroutTlG0DPSdPHHk54/KOdNoi1NJjg4a4ZTVJdofj0lI/e3zI # ZgD++ittbhWd54PvbUWDBolOgcWQ4jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNZMIICQQIBATCCAQGhgdmkgdYwgdMxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs # YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNO # OjRDMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCpE4xsxLwlxSVyc+TBEsVE9cWymaCBgzCB # gKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUA # AgUA6snaZTAiGA8yMDI0MTAyODA5Mzk0OVoYDzIwMjQxMDI5MDkzOTQ5WjB3MD0G # CisGAQQBhFkKBAExLzAtMAoCBQDqydplAgEAMAoCAQACAgU8AgH/MAcCAQACAhQp # MAoCBQDqyyvlAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAI # AgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAC5Q0mZXZYSZ # mBYEzcnJMnCN3t5Hxb7Mh+9aVdlRs4Ds6h6ctOa91ofI+MgGrNVVf46wKYwDisJI # GIVXK3u8PunDoLSBDsbvikcTgar2Kxq7z1XrIVlvRypaBzGly9Hn5cWIqjG02tn4 # gI1A0tIClGHW0Vn0Cc5rqkQATmkArMUWn+IpkZWd51ZxaIPp3Jg+OInXRmWUMkCQ # h5L/CjIpVWoRHGKp+e+aHgX30Fpj7f3ssB8u9ZBpDtpjyQ1q8MjADCb9YW1jNLAW # /+CVOOA5Ke8WHeYrqB7VGJwwzdVOWr98Dm9KK7r1r7izAPhAkFRjuT7rUWTleVm7 # qGj0XE7U7w4xggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg # MjAxMAITMwAAAf8SOHz3wWXWoQABAAAB/zANBglghkgBZQMEAgEFAKCCAUowGgYJ # KoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCAymcFep2I9 # 92WngLuJwuVkcq5nD5iBBPCPMgReIKp8JzCB+gYLKoZIhvcNAQkQAi8xgeowgecw # geQwgb0EIOQy777JAndprJwi4xPq8Dsk24xpU4jeoONIRXy6nKf9MIGYMIGApH4w # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH/Ejh898Fl1qEAAQAA # Af8wIgQg7T5lmlzzvfxlHMbUmRWINSo0bA6YaFy+4mQP1xdlyRswDQYJKoZIhvcN # AQELBQAEggIAE7uIp8zwfaY5zh8D1ZFHHhBgNyFHpg1DPcX8xajrgQKzlwmrfopc # +ccd6nMmBDv5tDuwuu6rrCbFCAgewqgJdPBCC9XG3CG/N3Lg1g3/DGWEonUfyWEf # D77xzwC6L8tXUrAJZ9iKmRzemW6NE30UV9MdEEljTrif0kEPiHYF2J+Zlo/RQ5Lw # JIOyUPgmvWXr1QvQR9e+u79+gbHi5OTTvOi1gziEp1Xl56o6o789f2XLCFC23YYI # VChgCGr25TlIKjFxr2HbJaVQo8Owx5JOiin397bn3fsHhRTulUxM0jzz/7Gf6k72 # yK2zwOLoymk/HSYknfimbe0srt+Qx+qEJCGMx5UzuPzgEo7XWnPiCKLrJSKtUlyl # JqbaRTJGUgxpN0w6EJ6mHsMGz7TfqoJlzccFJcA5dpm6qaw43gsGSGHyXOIPOuXY # desTElpkBhky8e6sLx1M9iEp42JPXl2pW3l0l9vjbnTZ0CnQWvILBaJCBA0RELqA # YYCarGkvHC5wJxktdaq0Bn+asNFUdF9oZ4rel6zp+oBbwerYv+gHFMXIydAq9/Mo # ETwRLSG55ymRVwk5pHSKmbf/VWJA3o49MFcCV/XiKPtIV79giGaEEmP3rZcDXHzB # SPmOC5zXTQ2yCBy9GBV1iIm2OV7IFlFgDM8kdEvvmZJKGvT2StlXOQc= # SIG # End signature block
combined_dataset/train/non-malicious/sample_26_66.ps1
sample_26_66.ps1
# virtualenv activation module # Activate with `overlay use activate.nu` # Deactivate with `deactivate`, as usual # # To customize the overlay name, you can call `overlay use activate.nu as foo`, # but then simply `deactivate` won't work because it is just an alias to hide # the "activate" overlay. You'd need to call `overlay hide foo` manually. export-env { def is-string [x] { ($x | describe) == 'string' } def has-env [...names] { $names | each {|n| $n in $env } | all {|i| $i == true} } # Emulates a `test -z`, but btter as it handles e.g 'false' def is-env-true [name: string] { if (has-env $name) { # Try to parse 'true', '0', '1', and fail if not convertible let parsed = (do -i { $env | get $name | into bool }) if ($parsed | describe) == 'bool' { $parsed } else { not ($env | get -i $name | is-empty) } } else { false } } let virtual_env = 'C:\Users\caleb\coding\projects\work\policy_engine_extension\.nox\update_packages' let bin = 'Scripts' let is_windows = ($nu.os-info.family) == 'windows' let path_name = (if (has-env 'Path') { 'Path' } else { 'PATH' } ) let venv_path = ([$virtual_env $bin] | path join) let new_path = ($env | get $path_name | prepend $venv_path) # If there is no default prompt, then use the env name instead let virtual_env_prompt = (if ('' | is-empty) { ($virtual_env | path basename) } else { '' }) let new_env = { $path_name : $new_path VIRTUAL_ENV : $virtual_env VIRTUAL_ENV_PROMPT : $virtual_env_prompt } let new_env = (if (is-env-true 'VIRTUAL_ENV_DISABLE_PROMPT') { $new_env } else { # Creating the new prompt for the session let virtual_prefix = $'(char lparen)($virtual_env_prompt)(char rparen) ' # Back up the old prompt builder let old_prompt_command = (if (has-env 'PROMPT_COMMAND') { $env.PROMPT_COMMAND } else { '' }) let new_prompt = (if (has-env 'PROMPT_COMMAND') { if 'closure' in ($old_prompt_command | describe) { {|| $'($virtual_prefix)(do $old_prompt_command)' } } else { {|| $'($virtual_prefix)($old_prompt_command)' } } } else { {|| $'($virtual_prefix)' } }) $new_env | merge { PROMPT_COMMAND : $new_prompt VIRTUAL_PREFIX : $virtual_prefix } }) # Environment variables that will be loaded as the virtual env load-env $new_env } export alias pydoc = python -m pydoc export alias deactivate = overlay hide activate
combined_dataset/train/non-malicious/Enable-RemotePsRemoting..ps1
Enable-RemotePsRemoting..ps1
##############################################################################\n##\n## Enable-RemotePsRemoting\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/guide)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nEnables PowerShell Remoting on a remote computer. Requires that the machine\nresponds to WMI requests, and that its operating system is Windows Vista or\nlater.\n\n.EXAMPLE\n\nEnable-RemotePsRemoting <Computer>\n\n#>\n\nparam(\n ## The computer on which to enable remoting\n $Computername,\n\n ## The credential to use when connecting\n $Credential = (Get-Credential)\n)\n\nSet-StrictMode -Version Latest\n$VerbosePreference = "Continue"\n\n$credential = Get-Credential $credential\n$username = $credential.Username\n$password = $credential.GetNetworkCredential().Password\n\n$script = @"\n\n`$log = Join-Path `$env:TEMP Enable-RemotePsRemoting.output.txt\nRemove-Item -Force `$log -ErrorAction SilentlyContinue\nStart-Transcript -Path `$log\n\n## Create a task that will run with full network privileges.\n## In this task, we call Enable-PsRemoting\nschtasks /CREATE /TN 'Enable Remoting' /SC WEEKLY /RL HIGHEST ``\n /RU $username /RP $password ``\n /TR "powershell -noprofile -command Enable-PsRemoting -Force" /F |\n Out-String\nschtasks /RUN /TN 'Enable Remoting' | Out-String\n\n`$securePass = ConvertTo-SecureString $password -AsPlainText -Force\n`$credential =\n New-Object Management.Automation.PsCredential $username,`$securepass\n\n## Wait for the remoting changes to come into effect\nfor(`$count = 1; `$count -le 10; `$count++)\n{\n `$output = Invoke-Command localhost { 1 } -Cred `$credential ``\n -ErrorAction SilentlyContinue\n if(`$output -eq 1) { break; }\n\n "Attempt `$count : Not ready yet."\n Sleep 5\n}\n\n## Delete the temporary task\nschtasks /DELETE /TN 'Enable Remoting' /F | Out-String\nStop-Transcript\n\n"@\n\n$commandBytes = [System.Text.Encoding]::Unicode.GetBytes($script)\n$encoded = [Convert]::ToBase64String($commandBytes)\n\nWrite-Verbose "Configuring $computername"\n$command = "powershell -NoProfile -EncodedCommand $encoded"\n$null = Invoke-WmiMethod -Computer $computername -Credential $credential `\n Win32_Process Create -Args $command\n\nWrite-Verbose "Testing connection"\nInvoke-Command $computername {\n Get-WmiObject Win32_ComputerSystem } -Credential $credential
combined_dataset/train/non-malicious/Invoke-ResetPassword.ps1
Invoke-ResetPassword.ps1
# From: Brandon Shell # Purpose: To Reset Local User Account # Example: # -- To Reset user Password # PS> Add-User -user Jsmith -password H!Th3r3 -server myserver1 # With Creds # PS> Add-User -user Jsmith -password H!Th3r3 -server myserver1 -luser adminGuy -lPassword HateClearText! ################################################################# Param([string]$user,[string]$password,[string]$server,[switch]$auth) If(!($server)){$server = get-content env:COMPUTERNAME} $dePath = "WinNT://$server/$user,user" if($auth) { $lUser = Read-Host "Enter UserName" $lPassword = Read-Host "Enter Password" $myuser = new-Object System.DirectoryServices.DirectoryEntry($dePath,$lUser,$lPassword) } else { $myuser = new-Object System.DirectoryServices.DirectoryEntry($dePath) } $myuser.psbase.invoke("SetPassword",$password) $myuser.psbase.CommitChanges() if($?){Write-Host "Reset Password Successful!"}else{Write-Host "Reset Failed"}
combined_dataset/train/non-malicious/sample_49_81.ps1
sample_49_81.ps1
# # Module manifest for module 'OCI.PSModules.Vbsinst' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Vbsinst.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'cc03b9ae-8da9-4b89-b900-8f068d3d2c43' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Vbsinst Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Vbsinst.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIVbsinstance', 'Get-OCIVbsinstancesList', 'Get-OCIVbsinstWorkRequest', 'Get-OCIVbsinstWorkRequestErrorsList', 'Get-OCIVbsinstWorkRequestLogsList', 'Get-OCIVbsinstWorkRequestsList', 'Move-OCIVbsinstanceCompartment', 'New-OCIVbsinstance', 'Remove-OCIVbsinstance', 'Update-OCIVbsinstance' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Vbsinst' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/18072022-fd64-4e12-ae6e-d021defcfff3.ps1
18072022-fd64-4e12-ae6e-d021defcfff3.ps1
# Name: zip.ps1 # Author: Shadow # Created: 05/12/2008 param([string]$zipfilename=$(throw "ZIP archive name needed!"), [string[]]$filetozip=$(throw "Supply the file(s) to compress (wildcards accepted)")) trap [Exception] {break;} #empyt zip file contents $emptyzipfile=80,75,5,6,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0; #create a new file with $ZIPFILENAME and copy the above array into it $fmode = [System.IO.FileMode]::Create; $zipfile = new-object -type System.IO.FileStream $zipfilename, $fmode; $zipfile.Write($emptyzipfile,0,22); $zipfile.Flush(); $zipfile.Close(); #open the new zip file as folder from Windows Shell Application $shell=new-object -comobject Shell.Application; $foldername=(ls $zipfile.Name).FullName; $zipfolder=$shell.Namespace($foldername); #Iterate files to zip, copying them to zip folder. #In the process, the shell compress them Write-Host "Compressing:"; $filetozip| %{ls $_}| foreach{ ("`t"+$_.fullname); $zipfolder.copyhere($_.fullname,20); [System.Threading.Thread]::Sleep(250); } $shell=$null; $zipfolder=$null;