full_path stringlengths 31 232 | filename stringlengths 4 167 | content stringlengths 0 48.3M |
|---|---|---|
combined_dataset/train/non-malicious/powertab patch.ps1 | powertab patch.ps1 | # When in the cert provider - objects returned by gci must be completed by a particular member (not by ToString).
# This can be done more generically but for now this is super handy to complete with these types
$firstChildType = $childitems[0].GetType()
if ($firstChildType -is [Microsoft.Powershell.Commands.X509StoreLocation])
{
$childitems = childitems | % { $_.Location }
}
if ($firstChildType -is [System.Security.Cryptography.X509Certificates.X509Store])
{
$childitems = childitems | % { $_.Name }
}
if ($firstChildType -is [Microsoft.Win32.RegistryKey])
{
# registry provider returns full path names - split by \\ and take the final item.
$childitems = childitems | % { $_.Name.Split("\\")[-1] }
}
|
combined_dataset/train/non-malicious/sample_36_81.ps1 | sample_36_81.ps1 | $ErrorActionPreference = 'Stop'
<#
.Synopsis
Returns payload information from glcm. This info is required to send a heart beat request to AA
#>
function Get-HeartbeatInfo
{
[CmdletBinding()]
param()
$glcm = Get-DscLocalConfigurationManager
$configurationName = ""
$aaServerUrls = New-Object System.Collections.ArrayList
if($glcm.ReportManagers)
{
$serverUrl = $glcm.ReportManagers.ServerURL
if($serverUrl -and !($aaServerUrls.Contains($serverUrl)))
{
$aaServerUrls.Add($serverUrl) > $null
}
}
if($glcm.ResourceModuleManagers)
{
$serverUrl = $glcm.ResourceModuleManagers.ServerURL
if($serverUrl -and !($aaServerUrls.Contains($serverUrl)))
{
$aaServerUrls.Add($serverUrl) > $null
}
}
if($glcm.ConfigurationDownloadManagers)
{
$serverUrl = $glcm.ConfigurationDownloadManagers.ServerURL
try
{
#get configuration name if available
if($glcm.ConfigurationDownloadManagers.CimClass -and $glcm.ConfigurationDownloadManagers.CimClass.CimClassProperties)
{
$configurationNamesExists = ($glcm.ConfigurationDownloadManagers.CimClass.CimClassProperties)['ConfigurationNames']
if($configurationNamesExists)
{
$configurationName = [string]($glcm.ConfigurationDownloadManagers.configurationNames)
}
}
}
catch
{
Write-Verbose "[WARNING] Could not retrieve ConfigurationNames from glcm $_ ..."
}
if($serverUrl -and !($aaServerUrls.Contains($serverUrl)))
{
$aaServerUrls.Add($serverUrl) > $null
}
}
$registrationMetaData = @{
NodeConfigurationName = $configurationName
ConfigurationMode = $glcm.ConfigurationMode
ConfigurationModeFrequencyMins = $glcm.ConfigurationModeFrequencyMins
RefreshFrequencyMins = $glcm.RefreshFrequencyMins
RebootNodeIfNeeded = $glcm.RebootNodeIfNeeded
ActionAfterReboot = $glcm.ActionAfterReboot
AllowModuleOverwrite = $glcm.AllowModuleOverWrite
}
return @{
ServerUrls = $aaServerUrls
RegistrationMetaData = $registrationMetaData
}
}
function Test-Command
{
param
(
[String] $Name
)
return ($null -ne (Get-Command -Name $Name -ErrorAction Continue 2> $null))
}
function GetComputerInfoEditionId
{
param()
$windowsEditionId = $null
if(Test-Command -Name Get-ComputerInfo)
{
$windowsEditionId = Get-ComputerInfo -Property WindowsEditionId -ErrorAction SilentlyContinue
}
return $windowsEditionId
}
function GetEditionId
{
param()
$windowsEditionId = $null
if(Test-Command -Name Get-ItemPropertyValue)
{
$windowsEditionId = Get-ItemPropertyValue 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name EditionId
}
elseif(Test-Command -Name Get-ItemProperty)
{
if($editionId = Get-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name EditionId -ErrorAction SilentlyContinue)
{
$windowsEditionId = $editionId.EditionID
}
}
return $windowsEditionId
}
<#
.synopsis
Returns windows edition id
For e.g.
on Nano Server returns - ServerDatacenterNano
on Windows Client - Enterprise
#>
function Get-WindowsEdition
{
param()
$windowsEditionId = GetEditionId
if(!$windowsEditionId)
{
if($windowsEditionId = GetComputerInfoEditionId)
{
$windowsEditionId = $windowsEditionId.WindowsEditionId
}
}
return $windowsEditionId
}
<#
.Synopsis
Returns OS major minor version
#>
function GetOSVersion {
[CmdletBinding()]
param()
$majorVersion = ""
$minorVersion = ""
if(Test-Command -Name Get-CimInstance)
{
$os = Get-CimInstance Win32_OperatingSystem
}
else
{
$os = Get-WmiObject Win32_OperatingSystem
}
$version = $os.Version
if($version)
{
# On PS/.NET 2.0, [System.Version] doesn't have a Parse method
if ($version -match '^(?<major>[0-9]+)\.(?<minor>[0-9]+)(\.[0-9]+)*$') {
$majorVersion = [int]::Parse($matches['major'])
$minorVersion = [int]::Parse($matches['minor'])
}
else
{
Write-Verbose "Invalid OS version: $version ..."
}
}
@{
Major = $majorVersion
Minor = $minorVersion
}
}
<#
.Synopsis
Returns VM UUID
#>
function Get-VMUUId
{
[CmdletBinding()]
param()
$vmuuid = ""
$status = "success"
try
{
if(Test-Command -Name Get-CimInstance)
{
$computerSystemProduct = Get-CimInstance Win32_ComputerSystemProduct
}
else
{
$computerSystemProduct = Get-WmiObject Win32_ComputerSystemProduct
}
if($computerSystemProduct)
{
$vmuuid = $computerSystemProduct.UUID
}
Write-Verbose "VMUUId is $vmuuid ..."
}
catch
{
Write-Verbose "[WARNING] An error occurred while retrieving VM UUID $_ ..."
$status = "error"
}
return @{
VMUUID = $vmuuid
Status = $status
}
}
<#
.Synopsis
Returns OS profile object
#>
function Get-OSProfile
{
[CmdletBinding()]
param()
$osName = Get-WindowsEdition
$osVersion = GetOSVersion
return @{
Name = $osName
Type = "Windows"
MajorVersion = $osVersion["Major"]
MinorVersion = $osVersion["Minor"]
VMUUID = (Get-VMUUId).VMUUID
}
}
function GetCimClass
{
[CmdletBinding()]
param(
[String] $ClassName,
[String] $Namespace
)
return (Get-CimClass -ClassName MSFT_DSCMetaConfiguration -Namespace root/microsoft/windows/desiredstateconfiguration -ErrorAction Continue)
}
<#
.Synopsis
Retrieves DSC agent id. Returns an empty string if agent id is not available
#>
function Get-DscAgentId
{
[CmdletBinding()]
param()
$agentID = ""
$status = "success"
#AgentID is not available in wmf 4.0. So return blank agent id if the property does not exists
try
{
if($getlcm = GetCimClass)
{
if($getlcm -and $getlcm.CimClassProperties -and ($getlcm.CimClassProperties)['AgentId'])
{
$agentID = (Get-DscLocalConfigurationManager).AgentId
}
}
Write-Verbose "AgentID is $agentID ..."
}
catch
{
Write-Verbose "[WARNING] An error occurred while retrieving agent ID $_ ..."
$status = "error"
}
return @{
AgentID = $agentID
Status = $status
}
}
<#
.Synopsis
Returns OAAS certificate from the local machine that is used to authenticate with AA pull server
#>
function Get-OAASCertificate
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$ServerUrl
)
$subject = 'CN=' + $ServerUrl
$certificate = Get-ChildItem Cert:\LocalMachine\My | ? Subject -eq $subject | Select-Object -First 1
if (!$certificate) {
throw "Failed to retrieve the OAAS certificate for heartbeat api request [ServerURL]: $ServerUrl ..."
}
return $certificate
}
<#
.Synopsis
Returns OAAS endpoint
#>
function GetOAASEndpoint {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $AgentId,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $ServerURL
)
return ($ServerURL + "/Nodes(AgentId='" + $AgentId + "')/ExtendedProperties")
}
function SendWebRequest {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[string] $Uri,
[Parameter(Mandatory=$true)]
[System.Security.Cryptography.X509Certificates.X509Certificate] $Certificate,
[Parameter(Mandatory=$true)]
[hashtable] $Payload
)
$jsonPayload = ConvertTo-Json $Payload -Depth 10
try
{
$response = Invoke-WebRequest `
-Uri ([Uri] $Uri) `
-ContentType 'application/json' `
-Method Post `
-Certificate $Certificate `
-Headers @{ "protocolversion" = "2.0" } `
-Body $jsonPayload `
-UseBasicParsing
return $response
}
finally
{
[System.Net.ServicePointManager]::CertificatePolicy = $null
}
}
<#
.Synopsis
Invokes AA server heartbeat endpoint to send the heartbeat request
#>
function Send-HeartbeatRequest {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $ServerURL,
[Parameter(Mandatory=$true)]
[hashtable] $Payload
)
$agentId = (Get-DscAgentId)["AgentID"]
$accountId = Split-Path -Path $ServerURL -Leaf
$certificate = Get-OAASCertificate -ServerUrl $ServerURL
$endpoint = GetOAASEndpoint -AgentId $agentId -ServerURL $ServerURL
try
{
$response = SendWebRequest -Uri $endpoint -Certificate $certificate -Payload $Payload
Write-Verbose "Heartbeat is sent successfully"
return
}
catch
{
#No retries when status code is 400,401,403,404
$message = "Invoking heartbeat web request failed for registration url {0}: {1}" -f ($ServerURL, $_.ToString().TrimEnd())
Write-Verbose $message
}
}
<#
.Synopsis
Send Guest config heartbeat
#>
function Send-Heartbeat {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[ValidateSet('GCAgentStart')]
[string]$Event
)
try
{
Write-Verbose "[INFO] Event $Event" -Verbose
if((Get-module PSDesiredStateConfiguration -ListAvailable -Verbose:$false) -eq $null) {
Write-Verbose "[ERROR] DSC is not installed ..."
Write-Verbose "[ERROR] No heartbeat sent ..."
return
}
# Get dsc local configuration manager properties
$heartbeatInfo = Get-HeartbeatInfo
$serverUrls = $heartbeatInfo["ServerUrls"]
if(!$serverUrls)
{
Write-Verbose "[ERROR] No AA Server URLs were returned with glcm ..."
Write-Verbose "[ERROR] No heartbeat sent ..."
return
}
else {
for ($i = 0; $i -lt $serverUrls.Count; $i++) {
if(-not $serverUrls.ToLower().Contains('agentservice')) {
Write-Verbose "[ERROR] Node is not registered to AA Server. Server URI : $serverUrls ..."
Write-Verbose "[ERROR] No heartbeat sent ..."
return
}
}
}
$extnInfo = @{
Name = "Microsoft.Powershell.DSC"
Version = "2.77.0.0"
}
# Get OS Profile
$osProfile = Get-OSProfile
# Get OMS cloud if
$omsCloudId = '7783-7084-3265-9085-8269-3286-77'
# Create request payload
$payload = @{
OMSCloudId = $omsCloudId
TimeStamp = (Get-Date -UFormat '%Y%m%d-%H%M%S')
VMResourceId = ""
ExtensionStatusEvent = $Event
ExtensionInformation = $extnInfo
OSProfile = $osProfile
LCMMetaData = $heartbeatInfo["RegistrationMetaData"]
}
# For each server that VM is registered to, send heartbeat request to AA
foreach($serverURL in $serverUrls)
{
Send-HeartbeatRequest -ServerURL $serverURL -Payload $payload
}
}
catch
{
Write-Verbose "[ERROR] occurred while sending heartbeat event: $Event ... $_"
}
}
<#
.Synopsis
Verify if DSC is enabled
#>
function Test-AutomationDscRegistration {
[CmdletBinding()]
param(
)
try
{
if((Get-module PSDesiredStateConfiguration -ListAvailable -Verbose:$false) -eq $null) {
Write-Verbose "[ERROR] DSC is not installed ..." -Verbose
exit 1
}
# Get dsc local configuration manager properties
$heartbeatInfo = Get-HeartbeatInfo
$serverUrls = $heartbeatInfo["ServerUrls"]
if(!$serverUrls)
{
Write-Verbose "[ERROR] No AA Server URLs were returned with glcm ..." -Verbose
exit 1
}
else {
$foundUrl = $false
for ($i = 0; $i -lt $serverUrls.Count; $i++) {
if($serverUrls.ToLower().Contains('agentsvc')) {
$foundUrl = $true
Write-Verbose "DSC is registered to pull server ..." -Verbose
exit 0
}
}
}
}
catch
{
Write-Verbose "[ERROR] occurred ... $_" -Verbose
}
Write-Verbose "[ERROR] No AA Server URLs were returned with glcm ..." -Verbose
exit 1
}
function IsFileOlderThanOneHour {
[CmdletBinding()]
param(
[String] $Path
)
$lastWrite = (get-item $Path).LastWriteTime
$timespan = New-TimeSpan -Days 0 -Hours 1 -Minutes 0
if (((Get-Date) - $lastWrite) -lt $timespan) {
return $false
}
return $true
}
<#
.Synopsis
Verify if ChangeTracking/Inventory is enabled
ChangeTracking solution saves the inventory and changetracking states under
'$env:ProgramFiles\Microsoft Monitoring Agent\Agent\Health Service State\CT*' or '$env:ProgramFiles\Microsoft Monitoring Agent\Agent\Health Service State\FCT*'
locations. this functions checks when these state files are modified.
if the state files are modified recently (within an hour) then this is considered as the solution is enabled otherwise disabled.
#>
function Test-ChangeTrackingEnabled {
[CmdletBinding()]
param(
)
try
{
$mmaServiceStateFolder = Join-Path $env:ProgramFiles 'Microsoft Monitoring Agent\Agent\Health Service State'
if(-not(Test-Path $mmaServiceStateFolder)) {
Write-Verbose "$mmaServiceStateFolder does not exist"
exit 1
}
$changeTrackingFolder = Get-ChildItem "$mmaServiceStateFolder\CT*"
if($changeTrackingFolder -ne $null) {
$chWorkFolder = "$changeTrackingFolder\work"
$serviceInventoryFile = "$chWorkFolder\ServiceInventory\ServiceInventory.json"
$serviceStateFile = "$chWorkFolder\ServiceState\ServiceState.json"
if(Test-Path $serviceInventoryFile) {
if(-not(IsFileOlderThanOneHour -Path $serviceInventoryFile)) {
Write-Verbose "ChangeTracking is enabled"
exit 0
}
}
if(Test-Path $serviceStateFile) {
if(-not(IsFileOlderThanOneHour -Path $serviceStateFile)) {
Write-Verbose "ChangeTracking is enabled"
exit 0
}
}
}
$fileCTFolder = Get-ChildItem "$mmaServiceStateFolder\FCT*"
if($fileCTFolder -ne $null) {
$fctWorkFolder = "$fileCTFolder\work"
$changedFilesFile = "$fctWorkFolder\ChangedFiles\localhost.json"
$changeTrackingFile = "$fctWorkFolder\localhost.json"
$inventoryFile = "$fctWorkFolder\Inventory\localhost.json"
if(Test-Path $changedFilesFile) {
if(-not(IsFileOlderThanOneHour -Path $changedFilesFile)) {
Write-Verbose "ChangeTracking is enabled"
exit 0
}
}
if(Test-Path $changeTrackingFile) {
if(-not(IsFileOlderThanOneHour -Path $changeTrackingFile)) {
Write-Verbose "ChangeTracking is enabled"
exit 0
}
}
if(Test-Path $inventoryFile) {
if(-not(IsFileOlderThanOneHour -Path $inventoryFile)) {
Write-Verbose "ChangeTracking is enabled"
exit 0
}
}
}
}
catch
{
Write-Verbose "[ERROR] occurred ... $_" -Verbose
}
Write-Verbose "ChangeTracking is not enabled ..." -Verbose
exit 1
}
Export-ModuleMember -Function @('Send-Heartbeat','Test-AutomationDscRegistration', 'Test-ChangeTrackingEnabled')
# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDEi08uUxmuV/k+
# eFo9XbeS5D+NnbKbBMmE5ssq40SCKaCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIL5+
# n+JMdZ50mpD1HGFaizpLLsNtiYBwj2i4vCIuf9wLMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAVtWuIrH3Uo3uiqZCVzU0HjwjrWQYHBKKC8U6
# YY7qvR7/4zll2Jz5PDyYXGyvyJspYAKui84cIXTowzPIft+KtidKuZBfdBdnU0vj
# WKPu2bpVlDwA4AKXfaAqI0cfk0+qT3T/4fIiadkOXCIxZxRAVNXZ5RIrs77sJ6U/
# /MDRPbaxB8P0F93ObaYXBAc451uVHVZos/UX9x6cT3z83FzVzt+9WDAwCzoj9AhN
# tq5tjYV0+Ctd4T87qU8HpwLqv9cEmsHtpq7S8ijDGYyMyFzWwSZFBONZSupi1Fgc
# OxOmc9ouG1mCtKjajMaA5syeX0iqyi0k/Bp3KyrUUTVcGYfTWqGCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCAj4A+fljOBK/mIX/N9vYRJ9jzy47NpOu1k
# RwTKMt0fcgIGZhfMgI/ZGBMyMDI0MDQxNzE0NDMyNS4zNTdaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgAB
# AAAB6TANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w
# M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yr
# APJnV6A7aZYnTw/yx90u1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZ
# Y5O8PCBu7Gq+x5Xe6plQt4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7L
# MpKwIKQMwXDctYKvCyQy6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5Mx
# ylRdTS7E1Jocl30NgcBiJfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9d
# xsyvng0lUVY+urq/G8QRFoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTp
# w2I6ZWaIhPwMu5DvdkEGzV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0
# VJBSGV+h66ZcaUJOxpbSIjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDC
# xHG4mW3mpNQopM/U1WJnjssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOa
# mGfwvkIe7dkylzm8BeAUQC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKF
# I30u9YlxDTzAuLDK073cndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022
# +yPwclmykssk30a4Rp3v9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYj
# uIj0Wuv+jcjtB+xOMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe6
# 1AE90Ken2XPgQHJDiS4SbLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz
# /HciZooyeoAvkHQaHmLhwBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20
# QpHDEukwKR8kfaBEX83AyvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQg
# eEBr8E4K2wQ2WXI/ZJxZS/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/Jnj
# XMChnm9bLDD1waJ7TPp5wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6
# QjegHzndX/tZrY792dfRAXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWG
# XYJL5H6LNnKyXJVEw/1FbO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsH
# ptAvREqCc+/YxzhIKkA88Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFv
# NRhh8ZBAenn1pW+5UBGYz2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMl
# PG3YjuqFxidiIsoAw2+MhI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2j
# JWgq7VlBuP1BuXjZ3qgym9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQCraYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6cozTDAi
# GA8yMDI0MDQxNzExMzg1MloYDzIwMjQwNDE4MTEzODUyWjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDpyjNMAgEAMAcCAQACAhEyMAcCAQACAhNiMAoCBQDpy4TMAgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAAW5PTF5D2JdfxcoiOpL3zntrvAg
# LWiB/k5ea2IRUN+lMd+AoI/EKXpSUaQhO5A0SRdRJH0zV4o8qQsVzpY5IFHejwpf
# KX1L1SCTyUkt6HI6TmTEXa0Dd3yjbWa5ev+FAVo8mU1WBXKxVuJAYBfWZEGCm4fn
# vHzIJyuUhF18kjc3uptsUq1FuAZ3N+n+sw3DDHXqfY27UJSaldZFazyROJNAWb+j
# UrhojEdaIlSaVgYuNE4IsXPTY+KZMcq4WSHDeHljRPcYVf0ast8cRApkMtMRQSYQ
# /f2kj2PR+2tlRYk566aIdcP//pKsUGNAAcVwUI4F7P1LctXUBaWLNlk9A+ExggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAekP
# cTB+XfESNgABAAAB6TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCAy9OliAi4Y9RSn3iexUb+tA255
# Uq3lSJezCEbB1s6lezCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQkniX
# aTcmj1TKQWF+x2U4riVorGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQgFh2KBNjr
# QdjmmRY4PV7eOI5AGWiQ1q/pa7+6MEoVkKAwDQYJKoZIhvcNAQELBQAEggIAisDq
# dY8NGjdtO/DyiwDKFb8HJbBLypYzViNySZE/S+VOsYBpYUg3TqgSj+TVAboAs5rI
# YHh8o6ujhXKJfh+mju4wyCGF1FCVM9Bist9UKLxI20S1XFS3BfykAY5K+TMfSf+V
# fwEAO29j+Li/CfC+tBtsWnRMwFcu3Pkt3bAbaUSdX1O9tMKO87rHGCbLH0HPb4+z
# SxggrKNeTWWPydNUT8+WvTwCpnKYzftmvGxKK5/E86CZ2frC9mKZOHDyfLFf90ry
# Bj6yWwrR38rQxXea6IMRp/BU9xkFgJ6hvWz9EBuHLEOoKfs/xt4larmdLdq5fhnD
# pm8VPp3gfImoXXwHObOUKARVwXnIK2uJYERopb+V9mlVM+70ukLU5yC9z33OioGC
# PmuU0QdVhIf98gC3cAkgEh7wrJakCft2FoDUXZpEgYtFlf77C1g/mPnwiVoy5vRt
# b3X6LqpfAGtCUp0SrAqEaMhgXuzm+Dtjb/r/VcNJcj7bKZrlURhx4/Mrj5gfujei
# qkORYDGHt8nNH2uuqf4aznVJdXLODcAmgomUMy7RuVzjO5A336jbKd+s7f/gKodC
# jOgZ5MgmYRcEev8GozF2Y+sLn5e2H8b285ZbNNFC4wzoEFG6vdzDKDi9PYRdJ2U/
# 36RpamwRuCiX0XpnF2zXwrEL3i/MAflgJPt8j+I=
# SIG # End signature block
|
combined_dataset/train/non-malicious/Citrix License Info.ps1 | Citrix License Info.ps1 | ###########################################
# Licence Checking Script for Citrix #
# Virtu-Al - http://teckinfo.blogspot.com/
###########################################
param( [string] $sendmailsched )
Function Sendemail ($LicTypeText, $InstalledLicNum, $InUseNum, $PercentageNum)
{
#Email options for automated emailed report
$smtpServer = "mysmtpserver.co.uk"
$msg = new-object Net.Mail.MailMessage
$smtp = new-object Net.Mail.SmtpClient($smtpServer)
$msg.From = "someone@mydomain.co.uk"
$msg.To.Add("me@mydomain.co.uk")
$msg.Subject = "Citrix License Server Stats"
$msg.Body = "The below is the current status of the license server:`n`nLicense Type: $LicTypeText`n`nInstalled Licences: $InstalledLicNum`n`nLicences In Use: $InUseNum`n`nPercentage: $PercentageNum%"
$smtp.Send($msg)
}
# Set licence server and temporary file
$licserver = "mylicserver.mydomain.co.uk"
$tempfile = "c:\\lictest.txt"
# Retrieve web page into a text file
$webClient = New-Object System.Net.WebClient
$webClient.credentials = New-Object system.net.networkcredential("usernametoaccesssite", "Password")
$webadd = "http://$licserver/lmc/current_usage/currentUsage.jsp"
$webClient.DownloadString($webadd) > $tempfile
# Find Line numbers of text
$Myline = Select-String -Path "$tempfile" -pattern "Enterprise"
$LicTypeLine = $Myline.LineNumber - 1
$InstalledLicLine = $LicTypeLine + 3
$InUseLine = $InstalledLicLine + 1
$PercentageLine = $LicTypeLine +6
# Read line for Installed Licences
$LicTypeRAW = @(gc $tempfile)[$LicTypeLine]
$LicTypeText = [regex]::match($LicTypeRAW,'(?<=).+(?=)').value
#Write "License Type: $LicTypeText"
# Read line for Installed Licences
$InstalledLicRAW = @(gc $tempfile)[$InstalledLicLine]
$InstalledLicNum = [regex]::match($InstalledLicRAW,'(?<=).+(?=)').value
#Write "Installed Licences: $InstalledLicNum"
# Read line for Licences in use
$InUseRAW = @(gc $tempfile)[$InUseLine]
$InUseNum = [regex]::match($InUseRAW,'(?<=).+(?=)').value
#Write "Licences In Use: $InUseNum"
# Read Percentage used line
$PercentageRAW = @(gc $tempfile)[$PercentageLine]
$PercentageNum = [regex]::match($PercentageRAW,'[0-9]+').value
#Write "Percentage: $PercentageNum%"
# Check the usage and send an email if over 90%
if ($PercentageNum -lt 90)
{
}
else
{
Sendemail $LicTypeText $InstalledLicNum $InUseNum $PercentageNum
}
if ($sendmailsched -eq "send")
{
Sendemail $LicTypeText $InstalledLicNum $InUseNum $PercentageNum
}
# Remove the temporary contents file
Remove-Item $tempfile
|
combined_dataset/train/non-malicious/sample_34_37.ps1 | sample_34_37.ps1 | <#############################################################
# #
# Copyright (C) Microsoft Corporation. All rights reserved. #
# #
#############################################################>
$MetaData = @{
"OperationType" = @("Upgrade")
"UIName" = 'Azure Stack HCI Storage'
"UIDescription" = 'Check storage spaces requirements'
}
function Test-AzStackHciStorage
{
param (
[parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
$Parameters,
[parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
$OperationType,
[parameter(Mandatory = $false)]
[switch]
$FailFast
)
try
{
$ENV:EnvChkrOp = $OperationType
if ($OperationType -eq 'Upgrade')
{
Trace-Execution "Starting storage validation"
$storageRole = $Parameters.Roles["Storage"].PublicConfiguration
$poolConfigXml = [xml]($storageRole.PublicInfo.StoragePool.OuterXml)
[array]$Result = Invoke-AzStackHciStorageValidation -PoolConfigXml $poolConfigXml -PassThru -OutputPath "$($env:LocalRootFolderPath)\MASLogs\"
[EnvironmentValidator]::ParseResult($Result, 'Storage', $FailFast)
}
else
{
Trace-Execution "No interface found for $OperationType"
}
}
catch
{
Trace-Execution "Validator failed. $_"
Trace-Execution "$($_.ScriptStackTrace)"
throw $_
}
}
Export-ModuleMember -Function Test-AzStackHciStorage -Variable MetaData
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBo4ssS59UM8+sC
# CazyPG67uXAlviLfvfXx1ueZMr1JcaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILgBIkbOLiHpCCW+yq1UBLe3
# XDem55vuWIR7hJTMu/GSMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAVA9POZHLiJl5xvWS7NmcpIfAb5H202aSbyYIZjJ6ozoQAMwYOjaqB5Hv
# Gu3uF47lOLN3h6IHfk9WfGY2+lhZstx9i9JiWgs/cdI3/2SN+wGeIEXcsVGkOXlJ
# o9a++ACrAtOjs7Jp0WYzGJGeoxRMUVy0ktqM3+L7QFovrKYeW9/kEUqjRupPa3H1
# QjTn3zBC59W/7jvtgDeHj6gMd0kKon9TzrtZI6v8jKNtO2XwVBSkEIbWlqhIVJqN
# qsGdAg1z0qYjm9WlR9BdQErJ9OXXyTianCb0IfQIcohZsPtQLRmC1VXzfRW+8DS7
# uRQT9crzdEdjLZMkefKTIysp3qxL8aGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBWd6BZWFUUGvg9mOWaEP7141E29dzMuMkfXbzbmZYyWgIGZbqk0RWn
# GBMyMDI0MDIxMjE0MDUyOS4zNDZaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC
# RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis
# DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI
# ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z
# ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR
# IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE
# lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s
# /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4
# aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB
# fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT
# me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy
# qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui
# hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds
# lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf
# sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t
# Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU
# +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7
# qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6
# Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+
# x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4
# 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5
# ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV
# PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4
# y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk
# 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG
# QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOl0S1kwIhgPMjAyNDAyMTIxNTQ2MzNaGA8yMDI0MDIxMzE1NDYzM1owdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6XRLWQIBADAHAgEAAgIVwzAHAgEAAgIUTzAKAgUA
# 6XWc2QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKSvdq5/OwSqLipXDPR/
# fz5CiLbm0lCxv+PjDUqfK5ccPWEVkKsD9zmiB4N1ZQarjww5WUro+QdoUzSzV/Ly
# OaxhyB8c2JwDLLMQK8JyHWefD6cG4cvgYDg5iEzioerBrjSnrGxsb3qVV0n31Fhc
# Z9Hh71O9RocFcjpVHRSVEF7MMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQg/2qaVRczBPwuIvDaWDEitjNLTKcVpjMthuhd3RqtxJwwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJCI9/
# /zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4pmZ
# lfHc4yDrAAEAAAHiMCIEII1oQoIqDDF/dls2LazpjkRTP0GoZvbNELQJtb8XKdao
# MA0GCSqGSIb3DQEBCwUABIICABA2wbgUCsFgt9EeW+h+Qp5YWWjhp3HW5hX5weZr
# EbLkWs4rlxQL0c6ptT6/Ab78kvpVArWcqRi4u8ZVVU9nc+NxhSO9ylZuk7IReFGl
# JO9d/qGrF/HqJLSn5LUCCZdwsdBHg1GXopyj0caZhVlhuewJAQSg9kiJZee4pZRP
# dgZ7NllSTSeCBIp+addg+kaBtBsM5vDeH/T++zB8Q0WzYgr1+qW4RpSnbNUNuMvU
# +P6u8Gz6nQpHxXWRlSJ0YW8DHh1bFcAjDgZb1yGPG8vKfC/iOcCnS8aEM2Usqg+y
# 4RUnAKC1/lFUIMTy5xoI+OKnJKGNhl/0qm1dtvwQSQqiOzDSSQQusAfMw2RO70Uk
# PlkqKwrzOQW9gpwXb7DxyvnIN27Tw+M7B0YQpjy6bASA1Px5MLaa+rSsmJoyImCQ
# CyCDKNOwH0kHK/F34RMCs9NfanjJ1enGs6ZR1SH/pyOJiibb8vX8t6XgvdUb/vZ4
# 9nrqZJS+DKmMj3K30RNgt5lu1eCgePybW2D2OK/gHIIaXyh2vvz64tvxeVI5xBe0
# 0sPQrv1dTVvb0ns6WQOKukqbrThTsSEEsUcKD2Fg6iEu4rDRi/DXTqRPinhgYPZI
# oPIbtQUlS5qeR/BU/AOPACZ9jVODhIylPqonKsFoTiGbvWDqWArnqGnA8OUFhFzo
# EB3Y
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_56_40.ps1 | sample_56_40.ps1 | #
# Module manifest for module 'OCI.PSModules.Loggingingestion'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Loggingingestion.dll'
# Version number of this module.
ModuleVersion = '82.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'ed6ebc41-8c84-4a4f-aaec-c687cb3245b5'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Loggingingestion Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Loggingingestion.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Write-OCILoggingingestionLogs'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Loggingingestion'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_53_81.ps1 | sample_53_81.ps1 | # ----------------------------------------------------------------------------------
#
# Copyright Microsoft Corporation
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Removes an EventHub Authorization Rule
.Description
Removes an EventHub Authorization Rule
#>
function Remove-AzEventHubAuthorizationRule{
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.EventHub.Models.IAuthorizationRule])]
[CmdletBinding(DefaultParameterSetName = 'RemoveExpandedNamespace', PositionalBinding = $false, SupportsShouldProcess, ConfirmImpact = 'Medium')]
param(
[Parameter(ParameterSetName = 'RemoveExpandedEntity', HelpMessage = "The name of the Authorization Rule")]
[Parameter(ParameterSetName = 'RemoveExpandedNamespace', HelpMessage = "The name of the Authorization Rule")]
[Alias('AuthorizationRuleName')]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')]
[System.String]
# The name of the Authorization Rule.
${Name},
[Parameter(ParameterSetName = 'RemoveExpandedEntity', Mandatory, HelpMessage = "The name of the EventHub entity.")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')]
[System.String]
# The name of the EventHub entity.
${EventHubName},
[Parameter(ParameterSetName = 'RemoveExpandedNamespace', Mandatory, HelpMessage = "The name of EventHub namespace")]
[Parameter(ParameterSetName = 'RemoveExpandedEntity', Mandatory, HelpMessage = "The name of EventHub namespace")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')]
[System.String]
# The name of EventHub namespace
${NamespaceName},
[Parameter(ParameterSetName = 'RemoveExpandedNamespace', Mandatory, HelpMessage = "The name of the resource group. The name is case insensitive.")]
[Parameter(ParameterSetName = 'RemoveExpandedEntity', Mandatory, HelpMessage = "The name of the resource group. The name is case insensitive.")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')]
[System.String]
# The name of the resource group.
# The name is case insensitive.
${ResourceGroupName},
[Parameter(ParameterSetName = 'RemoveExpandedNamespace', HelpMessage = "The ID of the target subscription.")]
[Parameter(ParameterSetName = 'RemoveExpandedEntity', HelpMessage = "The ID of the target subscription.")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Runtime.DefaultInfo(Script = '(Get-AzContext).Subscription.Id')]
[System.String]
# The ID of the target subscription.
${SubscriptionId},
[Parameter(ParameterSetName = 'RemoveViaIdentityExpanded', Mandatory, ValueFromPipeline, HelpMessage = "Identity parameter. To construct, see NOTES section for INPUTOBJECT properties and create a hash table.")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Models.IEventHubIdentity]
# Identity Parameter
# To construct, see NOTES section for INPUTOBJECT properties and create a hash table.
${InputObject},
[Parameter(HelpMessage = "The credentials, account, tenant, and subscription used for communication with Azure.")]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Azure')]
[System.Management.Automation.PSObject]
# The credentials, account, tenant, and subscription used for communication with Azure.
${DefaultProfile},
[Parameter(HelpMessage = "Run the command as a job")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command as a job
${AsJob},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter(HelpMessage = "Run the command asynchronously")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command asynchronously
${NoWait},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process{
try{
$null = $PSBoundParameters.Remove('WhatIf')
$null = $PSBoundParameters.Remove('Confirm')
if ($PSCmdlet.ParameterSetName -eq 'RemoveExpandedNamespace'){
if ($PSCmdlet.ShouldProcess("EventHub Namespace Authorization Rule $($Name)", "Deleting")) {
Az.EventHub.private\Remove-AzEventHubNamespaceAuthorizationRule_Delete @PSBoundParameters
}
}
elseif ($PSCmdlet.ParameterSetName -eq 'RemoveExpandedEntity'){
if ($PSCmdlet.ShouldProcess("EventHub Entity Authorization Rule $($Name)", "Deleting")) {
Az.EventHub.private\Remove-AzEventHubAuthorizationRule_Delete @PSBoundParameters
}
}
elseif ($PSCmdlet.ParameterSetName -eq 'RemoveViaIdentityExpanded'){
if($InputObject.Id -ne $null){
$ResourceHashTable = ParseResourceId -ResourceId $InputObject.Id
}
else{
$ResourceHashTable = ParseResourceId -ResourceId $InputObject
}
if ($ResourceHashTable['EventHubName'] -ne $null){
if ($PSCmdlet.ShouldProcess("EventHub Entity Authorization Rule $($ResourceHashTable['AuthorizationRuleName'])", "Deleting")) {
Az.EventHub.private\Remove-AzEventHubAuthorizationRule_DeleteViaIdentity @PSBoundParameters
}
}
elseif ($ResourceHashTable['NamespaceName'] -ne $null){
if ($PSCmdlet.ShouldProcess("EventHub Namespace Authorization Rule $($ResourceHashTable['AuthorizationRuleName'])", "Deleting")) {
Az.EventHub.private\Remove-AzEventHubNamespaceAuthorizationRule_DeleteViaIdentity @PSBoundParameters
}
}
else{
throw 'Invalid -InputObject'
}
}
}
catch{
throw
}
}
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC+pQMHzpw79YZK
# NMumPj0cnQmsySNgFu5Fv0mNac0NraCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIH0SOL1ODtKGD2z9wPta/HfG
# rmc5Nx48Y8FBnQCXbOtoMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAogBTESUBDFg8pfS+JdN7622QzAAZbZRVfw9K2gI/WdSozpRfD/kLGDgi
# rchJpo9iEvOWrnox/H3gH4NQn/hzjquPnSsKO85yLkO5tmc8q/KPSJaNiQuym+fX
# RPDMP9/9ekLIpJlA9X7n82FJaYVg25USzsgMB/cltKMNT4WniX9aQtlYnzMDXEDB
# rRW8OGzivuqSOrtHOeGHPYbeN8BDE/K+UWa6uelfjENFtBdIZ78vDL3clGqNRtN4
# Y9pZhpSMDw5tIbfPrvSE3bYtwnXZd2eTcQN3f30641xrLFVnOxVS8ps2wbAE/egI
# MUK9nNjOkn7fUZOu3Z5My+HCJJYFD6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAkV31TS46N/aEOF6WnG8SuoMp/YlKsFwxI25aB0vRHhgIGZjOahILL
# GBMyMDI0MDUxNjA2NDIxNC4zMDZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAe4F0wIwspqdpwABAAAB7jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NDRaFw0yNTAzMDUxODQ1NDRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RTAwMi0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC+8byl16KEia8xKS4vVL7REOOR7LzYCLXEtWgeqyOV
# lrzuEz+AoCa4tBGESjbHTXECeMOwP9TPeKaKalfTU5XSGjpJhpGx59fxMJoTYWPz
# zD0O2RAlyBmOBBmiLDXRDQJL1RtuAjvCiLulVQeiPI8V7+HhTR391TbC1beSxwXf
# dKJqY1onjDawqDJAmtwsA/gmqXgHwF9fZWcwKSuXiZBTbU5fcm3bhhlRNw5d04Ld
# 15ZWzVl/VDp/iRerGo2Is/0Wwn/a3eGOdHrvfwIbfk6lVqwbNQE11Oedn2uvRjKW
# EwerXL70OuDZ8vLzxry0yEdvQ8ky+Vfq8mfEXS907Y7rN/HYX6cCsC2soyXG3OwC
# tLA7o0/+kKJZuOrD5HUrSz3kfqgDlmWy67z8ZZPjkiDC1dYW1jN77t5iSl5Wp1HK
# Bp7JU8RiRI+vY2i1cb5X2REkw3WrNW/jbofXEs9t4bgd+yU8sgKn9MtVnQ65s6QG
# 72M/yaUZG2HMI31tm9mooH29vPBO9jDMOIu0LwzUTkIWflgd/vEWfTNcPWEQj7fs
# WuSoVuJ3uBqwNmRSpmQDzSfMaIzuys0pvV1jFWqtqwwCcaY/WXsb/axkxB/zCTdH
# SBUJ8Tm3i4PM9skiunXY+cSqH58jWkpHbbLA3Ofss7e+JbMjKmTdcjmSkb5oN8qU
# 1wIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFBCIzT8a2dwgnr37xd+2v1/cdqYIMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQB3ZyAva2EKOWSVpBnYkzX8f8GZjaOs577F
# 9o14Anh9lKy6tS34wXoPXEyQp1v1iI7rJzZVG7rpUznay2n9csfn3p6y7kYkHqtS
# ugCGmTiiBkwhFfSByKPI08MklgvJvKTZb673yGfpFwPjQwZeI6EPj/OAtpYkT7IU
# XqMki1CRMJKgeY4wURCccIujdWRkoVv4J3q/87KE0qPQmAR9fqMNxjI3ZClVxA4w
# iM3tNVlRbF9SgpOnjVo3P/I5p8Jd41hNSVCx/8j3qM7aLSKtDzOEUNs+ZtjhznmZ
# gUd7/AWHDhwBHdL57TI9h7niZkfOZOXncYsKxG4gryTshU6G6sAYpbqdME/+/g1u
# er7VGIHUtLq3W0Anm8lAfS9PqthskZt54JF28CHdsFq/7XVBtFlxL/KgcQylJNni
# a+anixUG60yUDt3FMGSJI34xG9NHsz3BpqSWueGtJhQ5ZN0K8ju0vNVgF+Dv05si
# rPg0ftSKf9FVECp93o8ogF48jh8CT/B32lz1D6Truk4Ezcw7E1OhtOMf7DHgPMWf
# 6WOdYnf+HaSJx7ZTXCJsW5oOkM0sLitxBpSpGcj2YjnNznCpsEPZat0h+6d7ulRa
# WR5RHAUyFFQ9jRa7KWaNGdELTs+nHSlYjYeQpK5QSXjigdKlLQPBlX+9zOoGAJho
# Zfrpjq4nQDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkUwMDItMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCI
# o6bVNvflFxbUWCDQ3YYKy6O+k6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e/khTAiGA8yMDI0MDUxNjAxNDg1
# M1oYDzIwMjQwNTE3MDE0ODUzWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDp7+SF
# AgEAMAcCAQACAhI8MAcCAQACAhLtMAoCBQDp8TYFAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAAxEjKnSk7z0bXwcEuWQw97AgLqpP6QXnwEZM41HdkQ6IjWR
# 80WQra5fw3/m4qY8wuDmJtG7uCD/olcakGKUKmhwvb3cKYRsYimEb3p8Bs0pBosm
# 85tb23aIP6SaYP9RDzyFc0lbTZFgve3dvH5HBA05maKu/SGUwj6YFbCUwkePhxlc
# PwoJht+JDTulGIR60ACLGdEVDfcUZs7CEO4jApeHyK2003zb9kPdjogvdegfmIm3
# t2tuHLEv2/UsXl8nukg/Rp8Xg8xspddR3tZMT6xr/Kt2tdCzUQaW67J+MZBuX6cD
# +zcbEo8FH0fMF0WfCSvSurqFZiM/h6+6P21scbsxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe4F0wIwspqdpwABAAAB7jAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCD8rrJdZqLJlk9FdStuGqWrQBLE883mJleVC4F/jxsETTCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIE9QdxSVhfq+Vdf+DPs+5EIkBz9o
# CS/OQflHkVRhfjAhMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHuBdMCMLKanacAAQAAAe4wIgQgrf1hyXgV+TDcVONGGqbNRYWZJ3gR
# eAJl4GXFk1yOgFkwDQYJKoZIhvcNAQELBQAEggIARGJFCOAT+s79dVy1zg5lr+Hm
# RVK+QcqADNfh4+rkYsju2blroheTOU4tHlRy84vSres1MCY+DhGGUFh8LjYlrC+N
# MStDnvvq9t3ZftyEp+vEWM8hR0IYEccXXyWLLMcWPaopUiU+8Evp4edqE6FbnDHR
# UJvqvFgsaf0V46NMhrxgqkxaz6M4yQ5asnrxmL0NVSGMFP/eKubqte/BQj6bZE5j
# g33n0E5++WchPIxSlH0E9A5Oj7ig7t3BMDMAmp41GIjGWfEkok5e+sdCs/srpQsO
# lg87iLZ+py6qrJqC8NlI0zKjAE5pezKRF25n1SSRlZS4RdgFbC94Tg0AIw0d6bVu
# Gi9o8FHoKDaI5tN5nytE6FvZnkucfHNTJWlh+JLy0iBZGCYqv9D+/KYNAg5ckhBc
# 9KYzc7BLehJIz7Rot1NmueYfdf8/HdGKNYCb9AU3LQbpfkEwbARmwO1mx2UgHmig
# 6VbXyLMGNV+HsdIaDN+asR/i11zcl3jonTENxyLiagIrSafDG2ve6/gNoykJAihb
# UeT6kiLFVBn2XQRfFt8MYeboiAFXHmZeqohQtdCC94L9/3S2CHADawuBtICuu0j0
# DkSvWrGYkijElJkan0ZE9syGEm/6Q/ZYk1LhVpL1VIYjKT6TStVV6g/0Wj91HD6P
# S5a0/qANATkDZzQIegQ=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_25_39.ps1 | sample_25_39.ps1 | <###################################################
# #
# Copyright (c) Microsoft. All rights reserved. #
# #
##################################################>
<#
.Synopsis
Compares two .NET versions and checks them for equality with the assumption
that unknown parts of the version are the same as 0.
.Description
Different tools and services (e.g. nuget.exe, PackageManagement cmdlets, Service Fabric) that deal with
nuget versions, treat them somewhat differently, with some tools stripping off trailing zeros.
E.g. 1.1910.5.0 becomes 1.1910.5.
To .NET, these are different versions, so this wrapper removes these tool-specific differences and
compares versions as if trailing zeros in the Build and Revision parts are the same as unknown values.
#>
function Test-VersionsEqual
{
[CmdletBinding()]
param (
[Parameter(Mandatory=$true)]
[Version]
$Version1,
[Parameter(Mandatory=$true)]
[Version]
$Version2
)
return ((Get-NormalizedVersion $Version1) -eq (Get-NormalizedVersion $Version2))
}
<#
.Synopsis
Return a version based on the input $Version, but with unknown Build and Revision
parts replaced with 0.
#>
function Get-NormalizedVersion
{
[CmdletBinding()]
param (
[Parameter(Mandatory=$true)]
[Version]
$Version
)
function ReplaceUnknown ([int]$VersionPart)
{
if ($VersionPart -eq -1)
{
return 0
}
return $VersionPart
}
return [Version]::new(
$Version.Major,
$Version.Minor,
(ReplaceUnknown $Version.Build),
(ReplaceUnknown $Version.Revision))
}
Export-ModuleMember -Function Test-VersionsEqual
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCk94vy+PXQq+Pf
# LMookjNbThCFmyFVLV0gUTMdTqs/gqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDn5jU9O6NkiEnxxSUPfjXg3
# ZgU1YncPYctWAw5F1m1ZMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAYwRO+J6qK3UM966DJ/UneM/vc8bbEJQ3rqgAZlIdqkzeRTvygAFFsxYM
# LN18M82Mvuj6W+FNFoGYNQIvTOiNIuznxiS9a5vQmL68cdNdc2UrfFr5WGlGDEQz
# OHrGbBo7Rc08YIizhxDOj5Jk8sSveHDqcbMPX24ZgRFxMF1tR5WEUcyz4rGkLESY
# l2ZQxHkiZfnMjTlfSimw228k9gbAbr8jV6kl9XOBTzixxVSwN/U3YWe/hoB3EZ1A
# xSrMQgXnBkktB/YK4dCAL3fPZsUP9zimRIztwBpJsjYCgTgMMTIZO+ziQl6Qouk1
# q+0yrI+Hn8wZeJTcYScNZgCRN2Ih1aGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCC31Yzio8loLW8xTx8V2bkGhAkroUnsKATORYjmZczqMwIGZbwTqN+Q
# GBMyMDI0MDIxMjE0MDkxMi40ODZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAevgGGy1tu847QABAAAB6zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MzRaFw0yNTAzMDUxODQ1MzRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDBFWgh2lbgV3eJp01oqiaFBuYbNc7hSKmktvJ15NrB
# /DBboUow8WPOTPxbn7gcmIOGmwJkd+TyFx7KOnzrxnoB3huvv91fZuUugIsKTnAv
# g2BU/nfN7Zzn9Kk1mpuJ27S6xUDH4odFiX51ICcKl6EG4cxKgcDAinihT8xroJWV
# ATL7p8bbfnwsc1pihZmcvIuYGnb1TY9tnpdChWr9EARuCo3TiRGjM2Lp4piT2lD5
# hnd3VaGTepNqyakpkCGV0+cK8Vu/HkIZdvy+z5EL3ojTdFLL5vJ9IAogWf3XAu3d
# 7SpFaaoeix0e1q55AD94ZwDP+izqLadsBR3tzjq2RfrCNL+Tmi/jalRto/J6bh4f
# PhHETnDC78T1yfXUQdGtmJ/utI/ANxi7HV8gAPzid9TYjMPbYqG8y5xz+gI/SFyj
# +aKtHHWmKzEXPttXzAcexJ1EH7wbuiVk3sErPK9MLg1Xb6hM5HIWA0jEAZhKEyd5
# hH2XMibzakbp2s2EJQWasQc4DMaF1EsQ1CzgClDYIYG6rUhudfI7k8L9KKCEufRb
# K5ldRYNAqddr/ySJfuZv3PS3+vtD6X6q1H4UOmjDKdjoW3qs7JRMZmH9fkFkMzb6
# YSzr6eX1LoYm3PrO1Jea43SYzlB3Tz84OvuVSV7NcidVtNqiZeWWpVjfavR+Jj/J
# OQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFHSeBazWVcxu4qT9O5jT2B+qAerhMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCDdN8voPd8C+VWZP3+W87c/QbdbWK0sOt9
# Z4kEOWng7Kmh+WD2LnPJTJKIEaxniOct9wMgJ8yQywR8WHgDOvbwqdqsLUaM4Nre
# rtI6FI9rhjheaKxNNnBZzHZLDwlkL9vCEDe9Rc0dGSVd5Bg3CWknV3uvVau14F55
# ESTWIBNaQS9Cpo2Opz3cRgAYVfaLFGbArNcRvSWvSUbeI2IDqRxC4xBbRiNQ+1qH
# XDCPn0hGsXfL+ynDZncCfszNrlgZT24XghvTzYMHcXioLVYo/2Hkyow6dI7uULJb
# KxLX8wHhsiwriXIDCnjLVsG0E5bR82QgcseEhxbU2d1RVHcQtkUE7W9zxZqZ6/jP
# maojZgXQO33XjxOHYYVa/BXcIuu8SMzPjjAAbujwTawpazLBv997LRB0ZObNckJY
# yQQpETSflN36jW+z7R/nGyJqRZ3HtZ1lXW1f6zECAeP+9dy6nmcCrVcOqbQHX7Zr
# 8WPcghHJAADlm5ExPh5xi1tNRk+i6F2a9SpTeQnZXP50w+JoTxISQq7vBij2nitA
# sSLaVeMqoPi+NXlTUNZ2NdtbFr6Iir9ZK9ufaz3FxfvDZo365vLOozmQOe/Z+pu4
# vY5zPmtNiVIcQnFy7JZOiZVDI5bIdwQRai2quHKJ6ltUdsi3HjNnieuE72fT4eWh
# xtmnN5HYCDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCA
# Bol1u1wwwYgUtUowMnqYvbul3qCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XRomDAiGA8yMDI0MDIxMjA5NTEy
# MFoYDzIwMjQwMjEzMDk1MTIwWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpdGiY
# AgEAMAoCAQACAgsyAgH/MAcCAQACAhMwMAoCBQDpdboYAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAI/UbL5fs6bEybEwXAuJcBkJhh+8iZ2jSmRxHWdnWCKP
# QexjvYjasY7O3LwI6wddB438CEK45jKRVUcISWGy4Ywh14ZM6yQ60OtJ1eBTDtQd
# A2zWVtgNqwCSAXCAzWYx+Vb6ulRVMG6eOo28MPfYKN4ecm07GElNizdGsUEbrYhW
# 6J+zM0CJM+uOPAazp36Duhn+sFWnN9J2/CjuNm2CnlZlYyZ2blr5bm6Bkrjogbjx
# HV/G9l4b/YbZZ5vutRIEcZzC+RVVkYfGKZ95cAa2vWVgFz/wOzVu1zNnzWzWSN+f
# +s/ZtAQrii6mQycgKCHv+p6R8+b7UpsKUanGmqeghScxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAevgGGy1tu847QABAAAB
# 6zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCDiQY8vjwFxSs2P9rFNLyJNhLKIiPKB9bgAKsEYXHMY
# AjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM63a75faQPhf8SBDTtk2DSU
# gIbdizXsz76h1JdhLCz4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHr4BhstbbvOO0AAQAAAeswIgQgSZ+doyWD+RmpVksUHUQMZ+kz
# pobpuBsBXOyPSrKzQLswDQYJKoZIhvcNAQELBQAEggIARkrHUwy3Y+ar1GVQDaXK
# 4KE3YFKp9h55+bRSXYZQi8eEsdtxwJrxPbxrEIhdWv5fNT1+v20ZO15qwFrD4p+d
# Eg3/ZzykV/VBMH0J/UrhuJHTjkW1ENS2yKcysepVPMrq6b5b1Rfl8nWx6hucvFwP
# Tg4c/GKKsl9ck0NMyXwNa0hMxjWH27o7tX7PVq7znyaCM2CQWZoh+ImHKpseEnxQ
# /tVKke/h10rtL8Qv0+MkTtj9pTAnR0BGwbPv+/GhnsdqNPH7YQGNkzl9s2JMj4Cl
# ZmCX15Hv76ZBTmmaN2ATgeIoVKZFVZ7lAAGsWlq33EN2hUyFvikZMVzqslyw2Rmj
# t+NOZ0yLBjmotb3DksBkVsHipMdpC+7jUs9MtE8VA6AiROESNygV69GqbNacqZ5n
# RHBoDkaUcNSP6raMphP3YzONjXysh82o9d4hf2TsvktSw+SISiFmWB/LWf6eMC6R
# 39qqXiHrK+6rMwQLFIq9H3QKjTcmthriXI/6872H8XcAaPZ/oIRaulHanWnqveyF
# PYEIbR9c8lXz9hyf609ifUBxwro72v4xHp4LE2xqMtwSLz53K/xYdLdRWZZdLTO+
# pHpmKk13Qr8kc7WQRTNN+/nOtKsFpBR5IhFgAid0uqLgvROIxzu42jTOSZ10N8+H
# Gb9RQTG7aJk54T2KLBMTCt0=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_58_78.ps1 | sample_58_78.ps1 | #requires -Version 5.0
using namespace Microsoft.Dynamics.Framework.UI.Client
using namespace Microsoft.Dynamics.Framework.UI.Client.Interactions
class ClientContext {
$events = @()
$clientSession = $null
$culture = ""
$caughtForm = $null
$IgnoreErrors = $true
ClientContext([string] $serviceUrl, [pscredential] $credential, [timespan] $interactionTimeout, [string] $culture)
{
$this.Initialize($serviceUrl, ([AuthenticationScheme]::UserNamePassword), (New-Object System.Net.NetworkCredential -ArgumentList $credential.UserName, $credential.Password), $interactionTimeout, $culture)
}
ClientContext([string] $serviceUrl, [pscredential] $credential)
{
$this.Initialize($serviceUrl, ([AuthenticationScheme]::UserNamePassword), (New-Object System.Net.NetworkCredential -ArgumentList $credential.UserName, $credential.Password), ([timespan]::FromHours(12)), 'en-US')
}
ClientContext([string] $serviceUrl, [timespan] $interactionTimeout, [string] $culture)
{
$this.Initialize($serviceUrl, ([AuthenticationScheme]::Windows), $null, $interactionTimeout, $culture)
}
ClientContext([string] $serviceUrl)
{
$this.Initialize($serviceUrl, ([AuthenticationScheme]::Windows), $null, ([timespan]::FromHours(12)), 'en-US')
}
ClientContext([string] $serviceUrl, [Microsoft.Dynamics.Framework.UI.Client.tokenCredential] $tokenCredential, [timespan] $interactionTimeout = ([timespan]::FromHours(12)), [string] $culture = 'en-US')
{
$this.Initialize($serviceUrl, ([AuthenticationScheme]::AzureActiveDirectory), $tokenCredential, $interactionTimeout, $culture)
}
Initialize([string] $serviceUrl, [AuthenticationScheme] $authenticationScheme, [System.Net.ICredentials] $credential, [timespan] $interactionTimeout, [string] $culture) {
$clientServicesUrl = $serviceUrl
if((-not $clientServicesUrl.Contains("/cs/")) -and (-not $clientServicesUrl.Contains("/cs?")))
{
if($clientServicesUrl.Contains("?"))
{
$clientServicesUrl = $clientServicesUrl.Insert($clientServicesUrl.LastIndexOf("?"),"cs/")
}
else
{
$clientServicesUrl = $clientServicesUrl.TrimEnd("/")
$clientServicesUrl = $clientServicesUrl + "/cs/"
}
}
$addressUri = New-Object System.Uri -ArgumentList $clientServicesUrl
$jsonClient = New-Object JsonHttpClient -ArgumentList $addressUri, $credential, $authenticationScheme
$httpClient = ($jsonClient.GetType().GetField("httpClient", [Reflection.BindingFlags]::NonPublic -bor [Reflection.BindingFlags]::Instance)).GetValue($jsonClient)
$httpClient.Timeout = $interactionTimeout
$this.clientSession = New-Object ClientSession -ArgumentList $jsonClient, (New-Object NonDispatcher), (New-Object 'TimerFactory[TaskTimer]')
$this.culture = $culture
$this.OpenSession()
}
OpenSession() {
$clientSessionParameters = New-Object ClientSessionParameters
$clientSessionParameters.CultureId = $this.culture
$clientSessionParameters.UICultureId = $this.culture
$clientSessionParameters.AdditionalSettings.Add("IncludeControlIdentifier", $true)
$this.events += @(Register-ObjectEvent -InputObject $this.clientSession -EventName MessageToShow -Action {
Write-Host -ForegroundColor Yellow "Message : $($EventArgs.Message)"
})
$this.events += @(Register-ObjectEvent -InputObject $this.clientSession -EventName CommunicationError -Action {
HandleError -ErrorMessage "CommunicationError : $($EventArgs.Exception.Message)"
})
$this.events += @(Register-ObjectEvent -InputObject $this.clientSession -EventName UnhandledException -Action {
HandleError -ErrorMessage "UnhandledException : $($EventArgs.Exception.Message)"
})
$this.events += @(Register-ObjectEvent -InputObject $this.clientSession -EventName InvalidCredentialsError -Action {
HandleError -ErrorMessage "InvalidCredentialsError"
})
$this.events += @(Register-ObjectEvent -InputObject $this.clientSession -EventName UriToShow -Action {
Write-Host -ForegroundColor Yellow "UriToShow : $($EventArgs.UriToShow)"
})
$this.events += @(Register-ObjectEvent -InputObject $this.clientSession -EventName DialogToShow -Action {
$form = $EventArgs.DialogToShow
if ( $form.ControlIdentifier -eq "00000000-0000-0000-0800-0000836bd2d2" ) {
$errorControl = $form.ContainedControls | Where-Object { $_ -is [ClientStaticStringControl] } | Select-Object -First 1
HandleError -ErrorMessage "ERROR: $($errorControl.StringValue)"
}
if ( $form.ControlIdentifier -eq "00000000-0000-0000-0300-0000836bd2d2" ) {
$errorControl = $form.ContainedControls | Where-Object { $_ -is [ClientStaticStringControl] } | Select-Object -First 1
Write-Host -ForegroundColor Yellow "WARNING: $($errorControl.StringValue)"
}
})
$this.clientSession.OpenSessionAsync($clientSessionParameters)
$this.Awaitstate([ClientSessionState]::Ready)
}
SetIgnoreServerErrors([bool] $IgnoreServerErrors) {
$this.IgnoreErrors = $IgnoreServerErrors
}
HandleError([string] $ErrorMessage) {
Remove-ClientSession
if ($this.IgnoreErrors) {
Write-Host -ForegroundColor Red $ErrorMessage
} else {
throw $ErrorMessage
}
}
Dispose() {
$this.events | % { Unregister-Event $_.Name }
$this.events = @()
try {
if ($this.clientSession -and ($this.clientSession.State -ne ([ClientSessionState]::Closed))) {
$this.clientSession.CloseSessionAsync()
$this.AwaitState([ClientSessionState]::Closed)
}
}
catch {
}
}
AwaitState([ClientSessionState] $state) {
While ($this.clientSession.State -ne $state) {
Start-Sleep -Milliseconds 100
if ($this.clientSession.State -eq [ClientSessionState]::InError) {
throw "ClientSession in Error"
}
if ($this.clientSession.State -eq [ClientSessionState]::TimedOut) {
throw "ClientSession timed out"
}
if ($this.clientSession.State -eq [ClientSessionState]::Uninitialized) {
throw "ClientSession is Uninitialized"
}
}
}
InvokeInteraction([ClientInteraction] $interaction) {
$this.clientSession.InvokeInteractionAsync($interaction)
$this.AwaitState([ClientSessionState]::Ready)
}
[ClientLogicalForm] InvokeInteractionAndCatchForm([ClientInteraction] $interaction) {
$Global:PsTestRunnerCaughtForm = $null
$formToShowEvent = Register-ObjectEvent -InputObject $this.clientSession -EventName FormToShow -Action {
$Global:PsTestRunnerCaughtForm = $EventArgs.FormToShow
}
try {
$this.InvokeInteraction($interaction)
if (!($Global:PsTestRunnerCaughtForm)) {
$this.CloseAllWarningForms()
}
}
catch
{
$ErrorMessage = $_.Exception.Message
$FailedItem = $_.Exception.ItemName
Write-Host "Error:" $ErrorMessage "Item: " $FailedItem
}
finally {
Unregister-Event -SourceIdentifier $formToShowEvent.Name
}
$form = $Global:PsTestRunnerCaughtForm
Remove-Variable PsTestRunnerCaughtForm -Scope Global
return $form
}
[ClientLogicalForm] OpenForm([int] $page) {
$interaction = New-Object OpenFormInteraction
$interaction.Page = $page
return $this.InvokeInteractionAndCatchForm($interaction)
}
CloseForm([ClientLogicalControl] $form) {
$this.InvokeInteraction((New-Object CloseFormInteraction -ArgumentList $form))
}
[ClientLogicalForm[]]GetAllForms() {
$forms = @()
$this.clientSession.OpenedForms.GetEnumerator() | % { $forms += $_ }
return $forms
}
[string]GetErrorFromErrorForm() {
$errorText = ""
$this.clientSession.OpenedForms.GetEnumerator() | % {
$form = $_
if ( $form.ControlIdentifier -eq "00000000-0000-0000-0800-0000836bd2d2" ) {
$form.ContainedControls | Where-Object { $_ -is [ClientStaticStringControl] } | % {
$errorText = $_.StringValue
}
}
}
return $errorText
}
[string]GetWarningFromWarningForm() {
$warningText = ""
$this.clientSession.OpenedForms.GetEnumerator() | % {
$form = $_
if ( $form.ControlIdentifier -eq "00000000-0000-0000-0300-0000836bd2d2" ) {
$form.ContainedControls | Where-Object { $_ -is [ClientStaticStringControl] } | % {
$warningText = $_.StringValue
}
}
}
return $warningText
}
[Hashtable]GetFormInfo([ClientLogicalForm] $form) {
function Dump-RowControl {
Param(
[ClientLogicalControl] $control
)
@{
"$($control.Name)" = $control.ObjectValue
}
}
function Dump-Control {
Param(
[ClientLogicalControl] $control,
[int] $indent
)
$output = @{
"name" = $control.Name
"type" = $control.GetType().Name
}
if ($control -is [ClientGroupControl]) {
$output += @{
"caption" = $control.Caption
"mappingHint" = $control.MappingHint
}
} elseif ($control -is [ClientStaticStringControl]) {
$output += @{
"value" = $control.StringValue
}
} elseif ($control -is [ClientInt32Control]) {
$output += @{
"value" = $control.ObjectValue
}
} elseif ($control -is [ClientStringControl]) {
$output += @{
"value" = $control.stringValue
}
} elseif ($control -is [ClientActionControl]) {
$output += @{
"caption" = $control.Caption
}
} elseif ($control -is [ClientFilterLogicalControl]) {
} elseif ($control -is [ClientRepeaterControl]) {
$output += @{
"$($control.name)" = @()
}
$index = 0
while ($true) {
if ($index -ge ($control.Offset + $control.DefaultViewport.Count)) {
$this.ScrollRepeater($control, 1)
}
$rowIndex = $index - $control.Offset
if ($rowIndex -ge $control.DefaultViewport.Count) {
break
}
$row = $control.DefaultViewport[$rowIndex]
$rowoutput = @{}
$row.Children | % { $rowoutput += Dump-RowControl -control $_ }
$output[$control.name] += $rowoutput
$index++
}
}
else {
}
$output
}
return @{
"title" = "$($form.Name) $($form.Caption)"
"controls" = $form.Children | % { Dump-Control -output $output -control $_ -indent 1 }
}
}
CloseAllForms() {
$this.GetAllForms() | % { $this.CloseForm($_) }
}
CloseAllErrorForms() {
$this.GetAllForms() | % {
if ($_.ControlIdentifier -eq "00000000-0000-0000-0800-0000836bd2d2") {
$this.CloseForm($_)
}
}
}
CloseAllWarningForms() {
$this.GetAllForms() | % {
if ($_.ControlIdentifier -eq "00000000-0000-0000-0300-0000836bd2d2") {
$this.CloseForm($_)
}
}
}
[ClientLogicalControl]GetControlByCaption([ClientLogicalControl] $control, [string] $caption) {
return $control.ContainedControls | Where-Object { $_.Caption.Replace("&","") -eq $caption } | Select-Object -First 1
}
[ClientLogicalControl]GetControlByName([ClientLogicalControl] $control, [string] $name) {
return $control.ContainedControls | Where-Object { $_.Name -eq $name } | Select-Object -First 1
}
[ClientLogicalControl]GetControlByType([ClientLogicalControl] $control, [Type] $type) {
return $control.ContainedControls | Where-Object { $_ -is $type } | Select-Object -First 1
}
SaveValue([ClientLogicalControl] $control, [string] $newValue) {
$this.InvokeInteraction((New-Object SaveValueInteraction -ArgumentList $control, $newValue))
}
ScrollRepeater([ClientRepeaterControl] $repeater, [int] $by) {
$this.InvokeInteraction((New-Object ScrollRepeaterInteraction -ArgumentList $repeater, $by))
}
ActivateControl([ClientLogicalControl] $control) {
$this.InvokeInteraction((New-Object ActivateControlInteraction -ArgumentList $control))
}
[ClientActionControl]GetActionByCaption([ClientLogicalControl] $control, [string] $caption) {
return $control.ContainedControls | Where-Object { ($_ -is [ClientActionControl]) -and ($_.Caption.Replace("&","") -eq $caption) } | Select-Object -First 1
}
[ClientActionControl]GetActionByName([ClientLogicalControl] $control, [string] $name) {
return $control.ContainedControls | Where-Object { ($_ -is [ClientActionControl]) -and ($_.Name -eq $name) } | Select-Object -First 1
}
InvokeAction([ClientActionControl] $action) {
$this.InvokeInteraction((New-Object InvokeActionInteraction -ArgumentList $action))
}
[ClientLogicalForm]InvokeActionAndCatchForm([ClientActionControl] $action) {
return $this.InvokeInteractionAndCatchForm((New-Object InvokeActionInteraction -ArgumentList $action))
}
}
|
combined_dataset/train/non-malicious/4207.ps1 | 4207.ps1 | function Decrypt-RDCMan ($FilePath) {
if (!$FilePath) {
[xml]$config = Get-Content "$env:LOCALAPPDATA\microsoft\remote desktop connection manager\rdcman.settings"
$Xml = Select-Xml -Xml $config -XPath "//FilesToOpen/*"
$Xml | select-object -ExpandProperty "Node"| % {Write-Output "Decrypting file: " $_.InnerText; Decrypt-RDCMan $_.InnerText}
} else {
[xml]$Types = Get-Content $FilePath
$Xml = Select-Xml -Xml $Types -XPath "//logonCredentials"
$Xml | select-object -ExpandProperty "Node" | % { $pass = Decrypt-DPAPI $_.Password; $_.Domain + "\" + $_.Username + " - " + $Pass + " - " + "Hash:" + $_.Password + "`n" }
$Xml | select-object -ExpandProperty "Node" | % { $pass = Decrypt-DPAPI $_.Password."
}
}
function Decrypt-DPAPI ($EncryptedString) {
Add-Type -assembly System.Security
$encoding= [System.Text.Encoding]::ASCII
$uencoding = [System.Text.Encoding]::UNICODE
try {
$encryptedBytes = [System.Convert]::FromBase64String($encryptedstring)
$bytes1 = [System.Security.Cryptography.ProtectedData]::Unprotect($encryptedBytes, $null, [System.Security.Cryptography.DataProtectionScope]::CurrentUser)
[System.Text.Encoding]::Convert([System.Text.Encoding]::UNICODE, $encoding, $bytes1) | % { $myStr1 += [char]$_}
echo $myStr1
}
catch {
try {
$encryptedBytes = [System.Convert]::FromBase64String($encryptedstring)
$bytes1 = [System.Security.Cryptography.ProtectedData]::Unprotect($encryptedBytes, $null, [System.Security.Cryptography.DataProtectionScope]::LocalMachine)
[System.Text.Encoding]::Convert([System.Text.Encoding]::UNICODE, $encoding, $bytes1) | % { $myStr1 += [char]$_}
echo $myStr1
}
catch {
echo "Could not decrypt password"
}
}
}
|
combined_dataset/train/non-malicious/New-SQLComputerLogin_1.ps1 | New-SQLComputerLogin_1.ps1 | # Depends on Invoke-SQLCmd2 http://poshcode.org/2950
# Depends on Get-ADComputer http://poshcode.org/3009
function New-SqlComputerLogin {
#.Synopsis
# Creates a Login on the specified SQL server for a computer account
#.Example
# New-SqlComputerLogin -SQL DevDB2 -Computer BuildBox2 -Force
#
# Specifying the Force parameter causes us to lookup the SID and remove a duplicate entry (in case your computer had an account before under another name).
[CmdletBinding()]
param(
[Parameter(Mandatory=$true, Position=0)]
[String]$SQLServer,
[Parameter(ValueFromPipelineByPropertyName=$true, Position=1)]
[String]$ComputerName,
[Switch]$Force
)
process {
# Import-Module QAD, SQLPS -DisableNameChecking
$Computer = Get-ADComputer $ComputerName
#$NTAccountName = $Computer.NTAccountName
#if(!$SID) { $SID = $Computer.SID.ToString() }
invoke-sqlcmd2 -ServerInstance $SQLServer -Query "CREATE LOGIN [$($Computer.NTAccountName)] FROM WINDOWS" -ErrorVariable SqlError -ErrorAction SilentlyContinue
## If this principal already exists, fail, or clean it out and recreate it:
if($SqlError[0].Exception.Message.EndsWith("already exists.")) {
if(!$Force) {
Write-Error $SqlError[0].Exception
} else {
$ExistingAccount =
invoke-sqlcmd2 -ServerInstance $SQLServer -Query "select name, sid, create_date from sys.server_principals where type IN ('U','G')" |
add-member -membertype ScriptProperty SSDL { new-object security.principal.securityidentifier $this.SID, 0 } -passthru |
where-object {$_.SSDL -eq $Computer.SID}
invoke-sqlcmd2 -ServerInstance $SQLServer -Query "DROP LOGIN [$($ExistingAccount.Name)]" -ErrorAction Stop
invoke-sqlcmd2 -ServerInstance $SQLServer -Query "CREATE LOGIN [$($Computer.NTAccountName)] FROM WINDOWS"
}
}
}}
|
combined_dataset/train/non-malicious/SetDefaultPrinter_1.ps1 | SetDefaultPrinter_1.ps1 | <#
.SYNOPSIS
Sets the Default Printer for any user on any machine in active directory.
.DESCRIPTION
Search AD for Computername; Select User Account and Printer and make that printer the default
printer for that user on that computer.
.PARAMETER Hostnme
This parameter is required and should reflect the computer name (or names) you wish to inventory.
This is basically a search criteria because the first thing the script will do is search Active
Directory for computer names matching this input.
.NOTES
Author: Brad Blaylock
Version: 3.2
Date: October 3, 2011
Contact: brad.blaylock@gmail.com
Details: This Script accepts an AD Query (Computername) in the form of an entire computer name
or partial computername as in sbcomp* or *2471wk1 and will find any listed computers
that match the criteria in AD. This list will be presented to the user. The user will
select the computer they are needing, and click [LOAD]. Load will find all user accounts
that have ever had a profile on that computer; Load will also list all printers installed
on that computer. The user will then select the user account and printer and click
[Set Default]. SetDefault will make the selected printer default for the selected user
on the selected computer.
3.0 -If the selected user is not logged into the selected computer at the time, SetDefault
will Load the selected user's NTUSER.DAT registry Hive and make the selected changes offline.
3.2 -Added Current User Display
Issues: None Discovered as of Yet.
}
#>
#~~~~~~~~Global \\ Script Variables~~~~~~#
$Script:ping = new-object System.Net.NetworkInformation.Ping
$Script:tcpClient = New-Object System.Net.Sockets.TcpClient
$Script:Search = New-Object DirectoryServices.DirectorySearcher([ADSI]“”)
$Script:hku = 2147483651
$Script:hklm = 2147483650
$Script:UserPath = "SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\ProfileList"
$Script:PrinterPath = "Software\\Microsoft\\Windows NT\\CurrentVersion\\Print\\Printers"
$Script:domain = $env:USERDOMAIN
#~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~#
#~~~~~~~~~~~CUSTOM FUNCTIONS~~~~~~~~~~~~#
function Test-Alive($comp) {
$stat=$ping.Send("$comp")
$reply = $stat.status
trap {
$False
continue;
}
if($reply -eq "Success") {$True}
}
function Ping-Port([string]$server, [int]$port) {
trap {
$False
continue;
}
$tcpClient.Connect($server,$port)
if ($tcpClient.Connected) {$True}
}
Function ADSearch {
$Input = $Args[0]
$Search.filter = “(&(objectClass=Computer)(Name=$Input))”
$Results = $Search.Findall()
foreach ($i in $Results)
{
$Item = $i.properties
$lbxServers.Items.Add("$($Item.cn)")
}
}
function LoadUsers {
$UserWMI = [WMIClass]"\\\\$Computer\\root\\default:stdRegProv"
$Accounts = $UserWMI.EnumKey($hklm,$UserPath)
foreach ($Account in $Accounts.snames) {
$User = $UserWMI.GetStringValue($hklm,"$UserPath\\$Account","ProfileImagePath")
$UserName = ($User.svalue).split("\\")[2]
$cbxUserAccount.Items.Add($Username)
}
$currentuser = (gwmi win32_ComputerSystem -computername $Computer | select UserName).UserName
$tbxCurrentUser.Text = $currentuser
}
Function LoadPrinters {
$PrinterWMI = [WMIClass]"\\\\$Computer\\root\\default:stdRegProv"
$Printers = $PrinterWMI.EnumKey($hklm,$PrinterPath)
foreach ($Printer in $Printers.snames) {
$Print = $PrinterWMI.GetStringValue($hklm,"$PrinterPath\\$Printer","Name")
$PrinterName = $Print.svalue
$cbxPrinter.Items.Add($PrinterName)
}
}
Function SetWithLocalRegHive {
#<#
#Test OS Version (2000, XP or Vista\\7\\8)
$ostest = (gwmi win32_operatingsystem -computername $Computer | select Version | %{$_ -replace "@{Version=", ""} | %{$_ -replace "}", ""})
$tbxStatus.ForeColor = [System.Drawing.Color]::FromArgb(255,69,139,0)
Switch -wildcard ($ostest) {
"5.0*" {$tbxStatus.Text = "Windows 2000"; $profileroot = "Documents and Settings"}
"5.1*" {$tbxStatus.Text = "Windows XP"; $profileroot = "Documents and Settings"}
"6.0*" {$tbxStatus.Text = "Windows Vista"; $profileroot = "Users" }
"6.1*" {$tbxStatus.Text = "Windows 7"; $profileroot = "Users"}
}
Reg Load HKLM\\TemporaryHive \\\\$Computer\\C$\\$profileroot\\$UserName\\NTUSER.DAT
$LocalDefPrinter = (New-Object -ComObject Wscript.shell).RegRead("HKLM\\TemporaryHive\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\Device")
$localDetailsTest = Test-Path "HKLM\\TemporaryHive\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Devices"
If (!$LocalDetailsTest) {
$tbxStatus.ForeColor = [System.Drawing.Color]::FromArgb(255,255,64,64)
$tbxStatus.Text = "Incomplete User Profile"
}
Else {
$LocalDefPrinterDetails = (New-Object -ComObject Wscript.Shell).RegRead("HKLM\\TemporaryHive\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Devices\\$PrinterName")
$LocalDefaultPrinter = ($LocalDefPrinter).split(",")[0]
$Localspool = ($LocalDefPrinterDetails).split(",")[0]
$LocalPort = ($LocalDefPrinterDetails).split(",")[1]
$LocalNewDefPrinter = $PrinterName + "," + $Localspool + "," + $LocalPort
(New-Object -comobject Wscript.Shell).regWrite("HKLM\\TemporaryHive\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\Device", "$LocalNewDefPrinter", "REG_SZ")
Reg Unload HKLM\\TemporaryHive
$tbxStatus.Text = "Default Printer Changed!"
}
}
Function SetDefaultPrinter {
Get-service -ComputerName $Computer -Include 'RemoteRegistry' | Start-Service
$ntAccount = new-object System.Security.Principal.NTAccount($domain, $UserName)
$sid = $ntAccount.Translate([System.Security.Principal.SecurityIdentifier])
$ActionPath = "$sid\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Windows"
$DevicesPath = "$sid\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Devices"
$ActionWMI = [WMIClass]"\\\\$Computer\\root\\default:stdRegProv"
$DefPrinter = $ActionWMI.GetStringValue($hku,"$ActionPath","Device")
$DefPrinterDetails = $ActionWMI.GetStringValue($hku,"$DevicesPath","$PrinterName")
$testRegKey = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey($hku,$Computer)
$testReg = $testRegKey.OpenSubKey("$sid")
If (!$testReg) {
SetWithLocalRegHive
}
Else {
$DefaultPrinter = ($DefPrinter.svalue).split(",")[0]
$spool = ($DefPrinterDetails.svalue).split(",")[0]
$Port = ($DefPrinterDetails.svalue).split(",")[1]
$NewDefPrinter = $PrinterName + "," + $spool + "," + $Port
$ActionWMI.SetStringValue($HKU,"$ActionPath","Device","$NewDefPrinter") #SET THE DEFAULT PRINTER#
$tbxStatus.ForeColor = [System.Drawing.Color]::FromArgb(255,69,139,0)
$tbxStatus.Text = "Default Printer Changed!"
}
$cbxUserAccount.ResetText()
$cbxPrinter.ResetText()
}
#~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~#
#Generated Form Function
function GenerateForm {
########################################################################
# Code Generated By: SAPIEN Technologies PrimalForms (Community Edition) v1.0.8.0
# Generated On: 2/28/2011 11:35 AM
# Generated By: bwblaylock
########################################################################
#region Import the Assemblies
[reflection.assembly]::loadwithpartialname("System.Drawing") | Out-Null
[reflection.assembly]::loadwithpartialname("System.Windows.Forms") | Out-Null
[reflection.assembly]::loadwithpartialname("System.Windows.Forms.VisualStyles") | Out-Null
[System.Windows.Forms.Application]::EnableVisualStyles()
#endregion
#region Generated Form Objects
$FrmMain = New-Object System.Windows.Forms.Form
$pgbProgress = New-Object System.Windows.Forms.ProgressBar
$lblPrinter = New-Object System.Windows.Forms.Label
$lblUserAccount = New-Object System.Windows.Forms.Label
$lblSearch = New-Object System.Windows.Forms.Label
$btnSearch = New-Object System.Windows.Forms.Button
$tbxSearch = New-Object System.Windows.Forms.TextBox
$btnClose = New-Object System.Windows.Forms.Button
$btnLoad = New-Object System.Windows.Forms.Button
$tbxServer = New-Object System.Windows.Forms.TextBox
$tbxStatus = New-Object System.Windows.Forms.TextBox
$tbxCurrentUser = New-Object System.Windows.Forms.TextBox
$lbxServers = New-Object System.Windows.Forms.ListBox
$btnSetDefault = New-Object System.Windows.Forms.Button
$cbxPrinter = New-Object System.Windows.Forms.ComboBox
$cbxUserAccount = New-Object System.Windows.Forms.ComboBox
$InitialFormWindowState = New-Object System.Windows.Forms.FormWindowState
#endregion Generated Form Objects
#----------------------------------------------
#Generated Event Script Blocks
#----------------------------------------------
#Provide Custom Code for events specified in PrimalForms.
$btnClose_OnClick=
{
$FrmMain.Close()
}
$lbxServers.add_SelectedIndexChanged({
$tbxStatus.Text = $Null
$tbxStatus.Refresh()
$tbxServer.Text = $lbxServers.SelectedItem
$tbxServer.Refresh()
$tbxCurrentUser.Text = $null
$tbxCurrentUser.Refresh()
$cbxPrinter.Items.clear()
$cbxPrinter.Text = $null
$cbxPrinter.Refresh()
$cbxUserAccount.Items.clear()
$cbxUserAccount.Text = $null
$cbxUserAccount.Refresh()
})
$btnLoad_OnClick=
{
$tbxStatus.ForeColor = [System.Drawing.Color]::FromArgb(255,255,255,0)
$tbxStatus.Text = "Loading..."
$tbxStatus.Refresh()
$Computer = $tbxServer.Text
If (Test-Alive $Computer) {
if ( (ping-port $Computer 135) -and (ping-port $Computer 445) ) {
LoadUsers $Computer
LoadPrinters $Computer
$tbxStatus.ForeColor = [System.Drawing.Color]::FromArgb(255,69,139,0)
$tbxStatus.Text = "Ready..."
}
Else {
$tbxStatus.ForeColor = [System.Drawing.Color]::FromArgb(255,255,64,64)
$tbxStatus.Text = "RPC Server Not Available"
}
}
Else {
$tbxStatus.ForeColor = [System.Drawing.Color]::FromArgb(255,255,64,64)
$tbxStatus.Text = "Server Offline"
}
$pgbProgress.Visible = $False
}
$btnSetDefault_OnClick=
{
$Script:Computer = $tbxServer.Text
$Script:UserName = $cbxUserAccount.SelectedItem
$Script:PrinterName = $cbxPrinter.SelectedItem
SetDefaultPrinter
}
$btnSearch_OnClick=
{
$lbxServers.Items.Clear()
$Criteria = $tbxSearch.Text
ADSearch $Criteria
}
$OnLoadForm_StateCorrection=
{#Correct the initial state of the form to prevent the .Net maximized form issue
$FrmMain.WindowState = $InitialFormWindowState
}
#----------------------------------------------
#region Generated Form Code
#Main Form
$FrmMain.CancelButton = $btnClose
$FrmMain.BackColor = [System.Drawing.Color]::FromArgb(255,166,202,240)
$FrmMain.Text = "Set Default Printer"
$FrmMain.Name = "FrmMain"
$FrmMain.KeyPreview = $True
$FrmMain.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 439
$System_Drawing_Size.Height = 272
$FrmMain.ClientSize = $System_Drawing_Size
$FrmMain.AcceptButton = $btnSearch
$FrmMain.FormBorderStyle = 2
#Search Label
$lblSearch.TabIndex = 0
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 14
$lblSearch.Size = $System_Drawing_Size
$lblSearch.Text = "Search"
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 13
$System_Drawing_Point.Y = 9
$lblSearch.Location = $System_Drawing_Point
$lblSearch.DataBindings.DefaultDataSourceUpdateMode = 0
$lblSearch.Name = "lblSearch"
$FrmMain.Controls.Add($lblSearch)
#Printer Label
$lblPrinter.TabIndex = 0
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 12
$lblPrinter.Size = $System_Drawing_Size
$lblPrinter.Text = "Printer:"
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 258
$System_Drawing_Point.Y = 185
$lblPrinter.Location = $System_Drawing_Point
$lblPrinter.DataBindings.DefaultDataSourceUpdateMode = 0
$lblPrinter.Name = "lblPrinter"
$FrmMain.Controls.Add($lblPrinter)
#UserAccount Label
$lblUserAccount.TabIndex = 0
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 13
$lblUserAccount.Size = $System_Drawing_Size
$lblUserAccount.Text = "User Account:"
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 259
$System_Drawing_Point.Y = 145
$lblUserAccount.Location = $System_Drawing_Point
$lblUserAccount.DataBindings.DefaultDataSourceUpdateMode = 0
$lblUserAccount.Name = "lblUserAccount"
$FrmMain.Controls.Add($lblUserAccount)
#Progress Bar
$pgbProgress.DataBindings.DefaultDataSourceUpdateMode = 0
$pgbProgress.BackColor = [System.Drawing.Color]::FromArgb(255,166,202,240)
$pgbProgress.ForeColor = [System.Drawing.Color]::FromArgb(255,0,255,0)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 191
$System_Drawing_Size.Height = 8
$pgbProgress.Size = $System_Drawing_Size
$pgbProgress.Step = 1
$pgbProgress.TabIndex = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 246
$System_Drawing_Point.Y = 105
$pgbProgress.Location = $System_Drawing_Point
$pgbProgress.Style = [System.Windows.Forms.ProgressBarStyle]::Marquee #2
$pgbProgress.MarqueeAnimationSpeed = 50
$pgbProgress.Visible = $False
$pgbProgress.Name = "pgbProgress"
$FrmMain.Controls.Add($pgbProgress)
#Status Textbox
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 168
$System_Drawing_Size.Height = 17
$tbxStatus.Size = $System_Drawing_Size
$tbxStatus.DataBindings.DefaultDataSourceUpdateMode = 0
$tbxStatus.TextAlign = 2
$tbxStatus.BorderStyle = 0
$tbxStatus.Font = New-Object System.Drawing.Font("Microsoft Sans Serif",10,1,3,0)
$tbxStatus.Name = "tbxStatus"
$tbxStatus.BackColor = [System.Drawing.Color]::FromArgb(255,166,202,240)
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 259
$System_Drawing_Point.Y = 88
$tbxStatus.Location = $System_Drawing_Point
$tbxStatus.TabIndex = 20
$FrmMain.Controls.Add($tbxStatus)
#Server Textbox
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 168
$System_Drawing_Size.Height = 17
$tbxServer.Size = $System_Drawing_Size
$tbxServer.DataBindings.DefaultDataSourceUpdateMode = 0
$tbxServer.TextAlign = 2
$tbxServer.BorderStyle = 0
$tbxServer.Font = New-Object System.Drawing.Font("Microsoft Sans Serif",10,1,3,1)
$tbxServer.Name = "tbxServer"
$tbxServer.BackColor = [System.Drawing.Color]::FromArgb(255,166,202,240)
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 259
$System_Drawing_Point.Y = 32
$tbxServer.Location = $System_Drawing_Point
$tbxServer.TabIndex = 19
$FrmMain.Controls.Add($tbxServer)
#CurrentUser Textbox
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 168
$System_Drawing_Size.Height = 17
$tbxCurrentUser.Size = $System_Drawing_Size
$tbxCurrentUser.DataBindings.DefaultDataSourceUpdateMode = 0
$tbxCurrentUser.TextAlign = 2
$tbxCurrentUser.BorderStyle = 0
$tbxCurrentUser.Font = New-Object System.Drawing.Font("Microsoft Sans Serif",8,[Drawing.FontStyle]'Italic') #0,3,1)
$tbxCurrentUser.Name = "tbxCurrentUser"
$tbxCurrentUser.BackColor = [System.Drawing.Color]::FromArgb(255,166,202,240)
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 259
$System_Drawing_Point.Y = 60
$tbxCurrentUser.Location = $System_Drawing_Point
$tbxCurrentUser.TabIndex = 20
$FrmMain.Controls.Add($tbxCurrentUser)
#Search Button
$btnSearch.TabIndex = 2
$btnSearch.Name = "btnSearch"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 60
$System_Drawing_Size.Height = 23
$btnSearch.Size = $System_Drawing_Size
$btnSearch.UseVisualStyleBackColor = $True
$btnSearch.Text = "Search"
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 180
$System_Drawing_Point.Y = 26
$btnSearch.Location = $System_Drawing_Point
$btnSearch.DataBindings.DefaultDataSourceUpdateMode = 0
$btnSearch.add_Click($btnSearch_OnClick)
$FrmMain.Controls.Add($btnSearch)
#Load Button
$btnLoad.TabIndex = 4
$btnLoad.Name = "btnLoad"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 60
$System_Drawing_Size.Height = 23
$btnLoad.Size = $System_Drawing_Size
$btnLoad.UseVisualStyleBackColor = $True
$btnLoad.Text = "Load"
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 310
$System_Drawing_Point.Y = 120
$btnLoad.Location = $System_Drawing_Point
$btnLoad.DataBindings.DefaultDataSourceUpdateMode = 0
$btnLoad.add_Click($btnLoad_OnClick)
$FrmMain.Controls.Add($btnLoad)
#Close Button
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 351
$System_Drawing_Point.Y = 236
$btnClose.Location = $System_Drawing_Point
$btnClose.DataBindings.DefaultDataSourceUpdateMode = 0
$btnClose.DialogResult = 2
$btnClose.add_Click($btnClose_OnClick)
$FrmMain.Controls.Add($btnClose)
#SetDefault Button
$btnSetDefault.TabIndex = 7
$btnSetDefault.Name = "btnSetDefault"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 75
$System_Drawing_Size.Height = 23
$btnSetDefault.Size = $System_Drawing_Size
$btnSetDefault.UseVisualStyleBackColor = $True
$btnSetDefault.Text = "Set Default"
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 259
$System_Drawing_Point.Y = 236
$btnSetDefault.Location = $System_Drawing_Point
$btnSetDefault.DataBindings.DefaultDataSourceUpdateMode = 0
$btnSetDefault.add_Click($btnSetDefault_OnClick)
$FrmMain.Controls.Add($btnSetDefault)
#Search Textbox
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 161
$System_Drawing_Size.Height = 20
$tbxSearch.Size = $System_Drawing_Size
$tbxSearch.DataBindings.DefaultDataSourceUpdateMode = 0
$tbxSearch.Name = "tbxSearch"
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 13
$System_Drawing_Point.Y = 29
$tbxSearch.Location = $System_Drawing_Point
$tbxSearch.TabIndex = 1
$FrmMain.Controls.Add($tbxSearch)
$btnClose.TabIndex = 8
$btnClose.Name = "btnClose"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 75
$System_Drawing_Size.Height = 23
$btnClose.Size = $System_Drawing_Size
$btnClose.UseVisualStyleBackColor = $True
$btnClose.Text = "Close"
#Servers Listbox
#$lbxServers.UseCompatibleStateImageBehavior = $False
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 227
$System_Drawing_Size.Height = 205
$lbxServers.Size = $System_Drawing_Size
$lbxServers.DataBindings.DefaultDataSourceUpdateMode = 0
$lbxServers.Name = "lbxServers"
#$lbxServers.View = 3
$lbxServers.TabIndex = 3
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 13
$System_Drawing_Point.Y = 55
$lbxServers.Location = $System_Drawing_Point
$FrmMain.Controls.Add($lbxServers)
#Printer Combobox
$cbxPrinter.FormattingEnabled = $True
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 168
$System_Drawing_Size.Height = 21
$cbxPrinter.Size = $System_Drawing_Size
$cbxPrinter.DataBindings.DefaultDataSourceUpdateMode = 0
$cbxPrinter.Name = "cbxPrinter"
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 258
$System_Drawing_Point.Y = 200
$cbxPrinter.Location = $System_Drawing_Point
$cbxPrinter.TabIndex = 6
$FrmMain.Controls.Add($cbxPrinter)
#UserAccount Combobox
$cbxUserAccount.FormattingEnabled = $True
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 168
$System_Drawing_Size.Height = 21
$cbxUserAccount.Size = $System_Drawing_Size
$cbxUserAccount.DataBindings.DefaultDataSourceUpdateMode = 0
$cbxUserAccount.Name = "cbxUserAccount"
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 258
$System_Drawing_Point.Y = 161
$cbxUserAccount.Location = $System_Drawing_Point
$cbxUserAccount.TabIndex = 5
$FrmMain.Controls.Add($cbxUserAccount)
#endregion Generated Form Code
#Save the initial state of the form
$InitialFormWindowState = $FrmMain.WindowState
#Init the OnLoad event to correct the initial state of the form
$FrmMain.add_Load($OnLoadForm_StateCorrection)
#Show the Form
$FrmMain.ShowDialog()| Out-Null
} #End Function
#Call the Function
GenerateForm
|
combined_dataset/train/non-malicious/sample_30_42.ps1 | sample_30_42.ps1 | . "$PSScriptRoot\..\project\api.ps1"
. "$PSScriptRoot\..\project\java.ps1"
. "$PSScriptRoot\helpers.ps1"
. "$PSScriptRoot\..\database\helpers.ps1"
function List-Changelog {
$query = "SELECT FILENAME FROM DATABASECHANGELOG"
return Execute-Query-From-Php -Query $query
}
function Get-Liquibase-Directory {
return "$PSScriptRoot/liquibase"
}
function Get-Liquibase-ZipFile {
if (-Not (Test-Path -Path "$PSScriptRoot/download/")) {
return $null
}
return "$PSScriptRoot/download/liquibase.zip"
}
function Get-Liquibase-Exe {
if ($IsLinux) {
return Join-Path -Path (Get-Liquibase-Directory) -ChildPath "liquibase"
} else {
return Join-Path -Path (Get-Liquibase-Directory) -ChildPath "liquibase.bat"
}
}
function Changelog-Updated {
"" | Out-File -FilePath $PSScriptRoot/error.txt
$res = Invoke-Liquibase "status"
$rawError = Get-Content -Path $PSScriptRoot/error.txt -Raw
if ($rawError) {
$res.output += "`n" + $rawError
}
if (-Not $res.success) {
$host.ui.WriteErrorLine($res.output)
} else {
$host.ui.WriteLine($res.output)
}
return $res.success
}
function Is-Liquibase-Installed {
$liquibaseZipFile = Get-Liquibase-ZipFile
if (-Not $liquibaseZipFile) {
return $false
}
$outputLiquibase = Get-Liquibase-Directory
if (-Not (Test-Path -Path $outputLiquibase)) {
return $false
}
return $true
}
function Force-Install-Liquibase {
$outputLiquibase = Get-Liquibase-Directory
Remove-Item -Recurse -Force $outputLiquibase -ErrorAction 'silentlycontinue'
Install-Liquibase
}
function Install-Liquibase {
$outputLiquibase = Get-Liquibase-Directory
$liquibaseBat = Get-Liquibase-Exe
if (-Not (Test-Path -Path $liquibaseBat)) {
Expand-Archive -LiteralPath (Get-Liquibase-ZipFile) -DestinationPath $outputLiquibase
if (Test-Path -Path "$PSScriptRoot/download/drivers.zip") {
Expand-Archive -LiteralPath "$PSScriptRoot/download/drivers.zip" -DestinationPath "$outputLiquibase\lib"
}
if (Test-Path -Path "$PSScriptRoot/download/drivers") {
Copy-Item -Path "$PSScriptRoot/download/drivers/*" -Destination "$outputLiquibase\lib"
}
if ($IsLinux) {
& "chmod" "777" (Get-Liquibase-Exe)
}
}
}
function Invoke-Liquibase {
param(
[Parameter(
Mandatory=$True,
ValueFromRemainingArguments=$true,
Position = 0
)][string[]]
$liquibaseParameters
)
Install-Liquibase
$databaseInfo = Get-Database-Info
$liquibaseUrl = Get-Liquibase-Url($databaseInfo)
$login = $databaseInfo.login
$password = $databaseInfo.password
$liquibaseDirectory = Get-Liquibase-Directory
$env:Path += ";$liquibaseDirectory\lib"
Configure-Java
Set-Location $PSScriptRoot
$liquibaseProperties = Get-Content -Path "liquibase.properties.base" -Raw
Copy-Item -Path "liquibase.properties.base" -Destination "liquibase.properties"
if ($password) {
$liquibaseProperties += "`npassword=$password"
$liquibaseProperties += "`nusername=$login"
}
$liquibaseProperties += "`nurl=$liquibaseUrl"
$liquibaseProperties += "`nchangelog-file=database-changelog.xml"
$liquibaseProperties | Out-File -FilePath "liquibase.properties"
$liquibaseBat = Get-Liquibase-Exe
$environmentName = Get-Environment-Name
$oldEnvironmentName = Get-Old-Environment-Name
if ($IsLinux) {
& "chmod" "777" "${liquibaseBat}"
}
if ($IsWindows) {
$result = (& $liquibaseBat $liquibaseParameters "--log-level" "INFO" "-Denvironment=$oldEnvironmentName" "-DenvironmentName=$environmentName" "2>&1" ) -join "`n"
} else {
$result = (& $liquibaseBat $liquibaseParameters "--log-level" "INFO" "-Denvironment=$oldEnvironmentName" "-DenvironmentName=$environmentName" 2>&1) -join "`n"
}
$ok = $LastExitCode -eq 0
return @{
success=$ok
output=$result
}
}
function Update-Liquibase-Schema {
"" | Out-File -FilePath $PSScriptRoot/error.txt
"" | Out-File -FilePath $PSScriptRoot/error_run-sql-file.txt
"" | Out-File -FilePath $PSScriptRoot/liquibase.log
$res = Invoke-Liquibase "update"
$rawError = Get-Content -Path $PSScriptRoot/error.txt -Raw
$rawError += Get-Content -Path $PSScriptRoot/error_run-sql-file.txt -Raw
if ($rawError) {
$res.output += "`n" + $rawError
}
$logs = Get-Content -Path $PSScriptRoot/liquibase.log -Raw
if (-Not $res.success) {
$host.ui.WriteErrorLine($res.output)
$host.ui.WriteErrorLine($logs)
} else {
$host.ui.WriteLine($res.output)
$host.ui.WriteLine($logs)
}
return $res.success
}
|
combined_dataset/train/non-malicious/3912.ps1 | 3912.ps1 |
function Test-GetPartner
{
$partnerId="5127255"
$partner = New-AzManagementPartner -PartnerId $partnerId
$partner = Get-AzManagementPartner -PartnerId $partnerId
Assert-AreEqual $partnerId $partner.PartnerId
Assert-NotNull $partner.TenantId
Assert-NotNull $partner.ObjectId
Assert-NotNull $partner.State
Remove-AzManagementPartner -PartnerId $partnerId
}
function Test-GetPartnerNoPartnerId
{
$partnerId="5127255"
$partner = New-AzManagementPartner -PartnerId $partnerId
$partner = Get-AzManagementPartner
Assert-AreEqual $partnerId $partner.PartnerId
Assert-NotNull $partner.TenantId
Assert-NotNull $partner.ObjectId
Assert-NotNull $partner.State
Remove-AzManagementPartner -PartnerId $partnerId
}
function Test-NewPartner
{
$partnerId="5127255"
$partner = New-AzManagementPartner -PartnerId $partnerId
Assert-AreEqual $partnerId $partner.PartnerId
Assert-NotNull $partner.TenantId
Assert-NotNull $partner.ObjectId
Assert-NotNull $partner.State
Remove-AzManagementPartner -PartnerId $partnerId
}
function Test-UpdatePartner
{
$partnerId="5127255"
$partner = New-AzManagementPartner -PartnerId $partnerId
$newPartnerId="5127254"
$partner = Update-AzManagementPartner -PartnerId $newPartnerId
Assert-AreEqual $newPartnerId $partner.PartnerId
Assert-NotNull $partner.TenantId
Assert-NotNull $partner.ObjectId
Assert-NotNull $partner.State
Remove-AzManagementPartner -PartnerId $newPartnerId
}
function Test-RemovePartner
{
$partnerId="5127255"
$partner = New-AzManagementPartner -PartnerId $partnerId
Remove-AzManagementPartner -PartnerId $partnerId
}
|
combined_dataset/train/non-malicious/sample_54_35.ps1 | sample_54_35.ps1 | COURSE DATASHEET MS-900T01A Microsoft 365 Fundamentals 6 Learning path 2: Describe Microsoft 365 apps and services Module 1: What is Microsoft 365? 1. Introduction 2. Describe the differences between Office 365 and Microsoft 365 3. Describe Windows 365 4. Describe how Microsoft 365 empowers workers in this hybrid world of work 5. Explore Microsoft 365 tenant 6. Knowledge check 7. Summary and resources Module 2: Describe productivity solutions of Microsoft 365 1. Introduction 2. Describe the productivity capabilities and benefits of Microsoft 365 3. Describe Microsoft 365 Apps 4. Describe work management tools in Microsoft 365 5. Describe additional Microsoft 365 productivity apps (Note: this content is not part of the Objective Domain, it is included for awareness) 6. Knowledge check 7. Summary and resources Module 3: Describe collaboration solutions of Microsoft 365 1. Introduction 2. Describe the collaboration capabilities and benefits of Microsoft 365 3. Describe how Microsoft Teams promotes collaboration and enhances teamwork 4. Describe the Microsoft Viva apps 5. Describe how Yammer helps communities connect and grow 6. Knowledge check 7. Summary and resources Module 1, Unit 5 - Hands-on exercise or demo (10 min) Module 3, Unit 3 - Get to know Microsoft Teams (cloudguides.com) - Interactive guide (10 min) Learning path: MS-900 Microsoft 365 Fundamentals: Describe Microsoft 365 apps and services - Training | Microsoft Learn |
combined_dataset/train/non-malicious/935.ps1 | 935.ps1 |
$uniqueId=$(-join ((97..122) + (48..57) | Get-Random -Count 15 | % {[char]$_}))
$apiVersion = "2015-04-08"
$location = "West US 2"
$resourceGroupName = "mjbArmTest"
$accountName = "mycosmosaccount-$uniqueId"
$apiType = "EnableTable"
$accountResourceType = "Microsoft.DocumentDb/databaseAccounts"
$tableName = "table1"
$tableResourceName = $accountName + "/table/" + $tableName
$tableResourceType = "Microsoft.DocumentDb/databaseAccounts/apis/tables"
$throughput = 400
$locations = @(
@{ "locationName"="West US 2"; "failoverPriority"=0 },
@{ "locationName"="East US 2"; "failoverPriority"=1 }
)
$consistencyPolicy = @{ "defaultConsistencyLevel"="Session" }
$accountProperties = @{
"capabilities"= @( @{ "name"=$apiType } );
"databaseAccountOfferType"="Standard";
"locations"=$locations;
"consistencyPolicy"=$consistencyPolicy;
"enableMultipleWriteLocations"="false"
}
New-AzResource -ResourceType $accountResourceType `
-ApiVersion $apiVersion -ResourceGroupName $resourceGroupName -Location $location `
-Name $accountName -PropertyObject $accountProperties -Force
$tableProperties = @{
"resource"=@{ "id"=$tableName };
"options"=@{ "Throughput"= $throughput }
}
New-AzResource -ResourceType $tableResourceType `
-ApiVersion $apiVersion -ResourceGroupName $resourceGroupName `
-Name $tableResourceName -PropertyObject $tableProperties -Force
|
combined_dataset/train/non-malicious/1033.ps1 | 1033.ps1 |
$probename = "AppPortProbe6"
$rulename="AppPortLBRule6"
$RGname="mysftestclustergroup"
$port=8303
$subscriptionID = 'subscription ID'
Connect-AzAccount
Get-AzSubscription -SubscriptionId $subscriptionID | Select-AzSubscription
$resource = Get-AzResource | Where {$_.ResourceGroupName –eq $RGname -and $_.ResourceType -eq "Microsoft.Network/loadBalancers"}
$slb = Get-AzLoadBalancer -Name $resource.Name -ResourceGroupName $RGname
$slb | Add-AzLoadBalancerProbeConfig -Name $probename -Protocol Tcp -Port $port -IntervalInSeconds 15 -ProbeCount 2
$probe = Get-AzLoadBalancerProbeConfig -Name $probename -LoadBalancer $slb
$slb | Add-AzLoadBalancerRuleConfig -Name $rulename -BackendAddressPool $slb.BackendAddressPools[0] -FrontendIpConfiguration $slb.FrontendIpConfigurations[0] -Probe $probe -Protocol Tcp -FrontendPort $port -BackendPort $port
$slb | Set-AzLoadBalancer
|
combined_dataset/train/non-malicious/4406.ps1 | 4406.ps1 | function Test-MicrosoftCertificate
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[System.Management.Automation.Signature]
$AuthenticodeSignature
)
$IsMicrosoftCertificate = $false
if($AuthenticodeSignature.SignerCertificate -and
('Microsoft.PowerShell.Commands.PowerShellGet.Win32Helpers' -as [Type]))
{
$X509Chain = $null
$SafeX509ChainHandle = $null
try
{
$X509Chain = New-Object System.Security.Cryptography.X509Certificates.X509Chain
$null = $X509Chain.Build($AuthenticodeSignature.SignerCertificate)
if($script:IsSafeX509ChainHandleAvailable)
{
$SafeX509ChainHandle = [Microsoft.PowerShell.Commands.PowerShellGet.Win32Helpers]::CertDuplicateCertificateChain($X509Chain.SafeHandle)
}
else
{
$SafeX509ChainHandle = [Microsoft.PowerShell.Commands.PowerShellGet.Win32Helpers]::CertDuplicateCertificateChain($X509Chain.ChainContext)
}
$IsMicrosoftCertificate = [Microsoft.PowerShell.Commands.PowerShellGet.Win32Helpers]::IsMicrosoftCertificate($SafeX509ChainHandle)
}
catch
{
Write-Debug "Exception in Test-MicrosoftCertificate function: $_"
}
finally
{
if($SafeX509ChainHandle) { $SafeX509ChainHandle.Dispose() }
if($X509Chain -and (Get-Member -InputObject $X509Chain -Name Dispose -ErrorAction SilentlyContinue)) { $X509Chain.Dispose() }
}
}
return $IsMicrosoftCertificate
} |
combined_dataset/train/non-malicious/sample_57_27.ps1 | sample_57_27.ps1 | # ------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License (MIT). See License.txt in the repo root for license information.
# ------------------------------------------------------------
[CmdletBinding(DefaultParametersetName="Unsecure")]
param (
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $NodeName,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $NodeType,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $NodeIpAddressOrFQDN,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $ExistingClientConnectionEndpoint,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $UpgradeDomain,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $FaultDomain,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[switch] $AcceptEULA,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[switch] $Force,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[switch] $NoCleanupOnFailure,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[switch] $BypassUpgradeStateValidation,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[switch] $FabricIsPreInstalled,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[string] $FabricRuntimePackagePath,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[int] $TimeoutInSeconds,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[switch] $X509Credential,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[string] $ServerCertThumbprint,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[string] $StoreLocation,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[string] $StoreName,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[string] $FindValueThumbprint,
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[switch] $WindowsCredential
)
$Identity = [System.Security.Principal.WindowsIdentity]::GetCurrent()
$Principal = New-Object System.Security.Principal.WindowsPrincipal($Identity)
$IsAdmin = $Principal.IsInRole([System.Security.Principal.WindowsBuiltInRole]::Administrator)
if(!$IsAdmin)
{
Write-Host "Please run the script with administrative privileges." -ForegroundColor "Red"
exit 1
}
if(!$AcceptEULA.IsPresent)
{
$EulaAccepted = Read-Host 'Do you accept the license terms for using Microsoft Azure Service Fabric located in the root of your package download? If you do not accept the license terms you may not use the software.
[Y] Yes [N] No [?] Help (default is "N")'
if($EulaAccepted -ne "y" -and $EulaAccepted -ne "Y")
{
Write-host "You need to accept the license terms for using Microsoft Azure Service Fabric located in the root of your package download before you can use the software." -ForegroundColor "Red"
exit 1
}
}
$ThisScriptPath = $(Split-Path -parent $MyInvocation.MyCommand.Definition)
$DeployerBinPath = Join-Path $ThisScriptPath -ChildPath "DeploymentComponents"
if(!(Test-Path $DeployerBinPath))
{
$DCAutoExtractorPath = Join-Path $ThisScriptPath "DeploymentComponentsAutoextractor.exe"
if(!(Test-Path $DCAutoExtractorPath))
{
Write-Host "Standalone package DeploymentComponents and DeploymentComponentsAutoextractor.exe are not present local to the script location."
exit 1
}
#Extract DeploymentComponents
$DCAutoExtractorCommand = "`"$DCAutoExtractorPath`" /E /Y /L `"$ThisScriptPath`""
# special case for older powershell versions < 5
if ($PSVersionTable.PSVersion.Major -lt 5)
{
$DCAutoExtractorCommand = "`"`"$DCAutoExtractorPath`" /E /Y /L `"$ThisScriptPath`"`""
}
Write-Host "running autoextractor command: $DCAutoExtractorCommand"
$DCExtractOutput = cmd.exe /c "$DCAutoExtractorCommand && exit 0 || exit 1"
if($LASTEXITCODE -eq 1)
{
Write-Host "Extracting DeploymentComponents Cab ran into an issue."
Write-Host $DCExtractOutput
exit 1
}
else
{
Write-Host "DeploymentComponents extracted."
}
}
$SystemFabricModulePath = Join-Path $DeployerBinPath -ChildPath "System.Fabric.dll"
if(!(Test-Path $SystemFabricModulePath))
{
Write-Host "Run the script local to the Standalone package directory."
exit 1
}
$MicrosoftServiceFabricCabFileAbsolutePath = $null
if ((Test-Path variable:FabricRuntimePackagePath) `
-and ![string]::IsNullOrEmpty($FabricRuntimePackagePath))
{
$MicrosoftServiceFabricCabFileAbsolutePath = Resolve-Path $FabricRuntimePackagePath
if(!(Test-Path $MicrosoftServiceFabricCabFileAbsolutePath))
{
Write-Host "Microsoft Service Fabric Runtime package not found in the specified directory : $FabricRuntimePackagePath"
exit 1
}
Write-Verbose "Using runtime package $MicrosoftServiceFabricCabFileAbsolutePath"
}
else
{
$RuntimeBinPath = Join-Path $ThisScriptPath -ChildPath "DeploymentRuntimePackages"
if(!(Test-Path $RuntimeBinPath))
{
Write-Host "No directory exists for Runtime packages. Creating a new directory."
md $RuntimeBinPath | Out-Null
Write-Host "Done creating $RuntimeBinPath"
}
Write-Verbose "Will use downloaded runtime package for deployment from $RuntimeBinPath"
}
$ServiceFabricPowershellModulePath = Join-Path $DeployerBinPath -ChildPath "ServiceFabric.psd1"
if (!(Test-Path variable:TimeoutInSeconds) `
-or ($TimeoutInSeconds -le 0))
{
$TimeoutInSeconds = 300
Write-Verbose "TimeoutInSeconds was not set. Defaulting to $TimeoutInSeconds seconds."
}
$parentVerbosePreference = $VerbosePreference
# Invoke in separate AppDomain
if($X509Credential)
{
Write-Verbose "X509Credential: $X509Credential"
$argList = @{
"DeployerBinPath" = $DeployerBinPath;
"ExistingClientConnectionEndpoint" = $ExistingClientConnectionEndpoint;
"ServiceFabricPowershellModulePath" = $ServiceFabricPowershellModulePath;
"NodeName" = $NodeName;
"NodeType" = $NodeType;
"NodeIpAddressOrFQDN" = $NodeIpAddressOrFQDN;
"UpgradeDomain" = $UpgradeDomain;
"FaultDomain" = $FaultDomain;
"Force" = $Force.IsPresent;
"NoCleanupOnFailure" = $NoCleanupOnFailure.IsPresent;
"BypassUpgradeStateValidation" = $BypassUpgradeStateValidation.IsPresent;
"FabricIsPreInstalled" = $FabricIsPreInstalled.IsPresent;
"MicrosoftServiceFabricCabFileAbsolutePath" = $MicrosoftServiceFabricCabFileAbsolutePath;
"TimeoutInSeconds" = $TimeoutInSeconds;
"parentVerbosePreference" = $parentVerbosePreference;
"WindowsCredential" = $false;
"X509Credential" = $true;
"ServerCertThumbprint" = $ServerCertThumbprint;
"StoreLocation" = $StoreLocation;
"StoreName" = $StoreName;
"FindValueThumbprint" = $FindValueThumbprint;
}
}
else
{
if($WindowsCredential)
{
Write-Verbose "WindowsCredential: $WindowsCredential"
$argList = @{
"DeployerBinPath" = $DeployerBinPath;
"ExistingClientConnectionEndpoint" = $ExistingClientConnectionEndpoint;
"ServiceFabricPowershellModulePath" = $ServiceFabricPowershellModulePath;
"NodeName" = $NodeName;
"NodeType" = $NodeType;
"NodeIpAddressOrFQDN" = $NodeIpAddressOrFQDN;
"UpgradeDomain" = $UpgradeDomain;
"FaultDomain" = $FaultDomain;
"Force" = $Force.IsPresent;
"NoCleanupOnFailure" = $NoCleanupOnFailure.IsPresent;
"BypassUpgradeStateValidation" = $BypassUpgradeStateValidation.IsPresent;
"FabricIsPreInstalled" = $FabricIsPreInstalled.IsPresent;
"MicrosoftServiceFabricCabFileAbsolutePath" = $MicrosoftServiceFabricCabFileAbsolutePath;
"TimeoutInSeconds" = $TimeoutInSeconds;
"parentVerbosePreference" = $parentVerbosePreference;
"WindowsCredential" = $true;
}
}
else
{
Write-Verbose "Not X509Credential nor WindowsCredential."
$argList = @{
"DeployerBinPath" = $DeployerBinPath;
"ExistingClientConnectionEndpoint" = $ExistingClientConnectionEndpoint;
"ServiceFabricPowershellModulePath" = $ServiceFabricPowershellModulePath;
"NodeName" = $NodeName;
"NodeType" = $NodeType;
"NodeIpAddressOrFQDN" = $NodeIpAddressOrFQDN;
"UpgradeDomain" = $UpgradeDomain;
"FaultDomain" = $FaultDomain;
"Force" = $Force.IsPresent;
"NoCleanupOnFailure" = $NoCleanupOnFailure.IsPresent;
"BypassUpgradeStateValidation" = $BypassUpgradeStateValidation.IsPresent;
"FabricIsPreInstalled" = $FabricIsPreInstalled.IsPresent;
"MicrosoftServiceFabricCabFileAbsolutePath" = $MicrosoftServiceFabricCabFileAbsolutePath;
"TimeoutInSeconds" = $TimeoutInSeconds;
"parentVerbosePreference" = $parentVerbosePreference;
}
}
}
if ($parentVerbosePreference -ne "SilentlyContinue")
{
$argList.Keys | ForEach-Object { Write-Verbose "$($_)=$($argList.$_)" }
}
$standaloneArgsFilepath=Join-Path $([System.IO.Path]::GetTempPath()) "SFStandaloneArgs.txt"
if (Test-Path $standaloneArgsFilepath)
{
Remove-Item $standaloneArgsFilepath -Force 2> $null
}
$argList.Keys | ForEach-Object { Add-Content $standaloneArgsFilepath "$($_)=$($argList.$_)" }
$standaloneArgsFilepath = Resolve-Path $standaloneArgsFilepath
$shelloutArgs = @( $standaloneArgsFilepath )
Powershell -Command {
param (
[Parameter(Mandatory=$true)]
[string] $ParamFilepath
)
Get-Content $ParamFilepath | Where-Object {$_.length -gt 0} | Where-Object {!$_.StartsWith("#")} | ForEach-Object {
$var = $_.Split('=')
if ($var.Length -eq 2)
{
New-Variable -Name $var[0] -Value $var[1] -Force
}
}
Remove-Item $ParamFilepath -Force 2> $null
if (![string]::IsNullOrEmpty($Force)) { $Force = [Convert]::ToBoolean($Force); } else { $Force = $false}
if (![string]::IsNullOrEmpty($NoCleanupOnFailure)) { $NoCleanupOnFailure = [Convert]::ToBoolean($NoCleanupOnFailure); } else { $NoCleanupOnFailure = $false}
if (![string]::IsNullOrEmpty($BypassUpgradeStateValidation)) { $BypassUpgradeStateValidation = [Convert]::ToBoolean($BypassUpgradeStateValidation); } else { $BypassUpgradeStateValidation = $false}
if (![string]::IsNullOrEmpty($FabricIsPreInstalled)) { $FabricIsPreInstalled = [Convert]::ToBoolean($FabricIsPreInstalled); } else { $FabricIsPreInstalled = $false}
if (![string]::IsNullOrEmpty($WindowsCredential)) { $WindowsCredential = [Convert]::ToBoolean($WindowsCredential); } else { $WindowsCredential = $false}
if (![string]::IsNullOrEmpty($X509Credential)) { $X509Credential = [Convert]::ToBoolean($X509Credential); } else { $X509Credential = $false}
if (![string]::IsNullOrEmpty($TimeoutInSeconds)) { $TimeoutInSeconds = [Convert]::ToInt32($TimeoutInSeconds); }
#Add FabricCodePath Environment Path
$env:path = "$($DeployerBinPath);" + $env:path
#Import Service Fabric Powershell Module
Import-Module $ServiceFabricPowershellModulePath
Try
{
# Connect to the existing cluster
Write-Verbose "Connecting to the cluster at $ExistingClientConnectionEndpoint"
if($X509Credential)
{
Connect-ServiceFabricCluster -ConnectionEndpoint $ExistingClientConnectionEndpoint -X509Credential -ServerCertThumbprint $ServerCertThumbprint -StoreLocation $StoreLocation -StoreName $StoreName -FindValue $FindValueThumbprint -FindType FindByThumbprint
}
else
{
if($WindowsCredential)
{
Connect-ServiceFabricCluster $ExistingClientConnectionEndpoint -WindowsCredential
}
else
{
Connect-ServiceFabricCluster $ExistingClientConnectionEndpoint
}
}
}
Catch
{
Write-Host "Cannot form client connection to cluster. Check your ClientConnectionEndpoint and security credentials. Exception thrown : $($_.Exception.ToString())" -ForegroundColor Red
exit 1
}
if ($ClusterConnection -eq $null) {
Write-Host "Could not form client connection to cluster. Check your ClientConnectionEndpoint and security credentials." -ForegroundColor Red
exit 1
}
if ($FabricIsPreInstalled)
{
Write-Host "Switch FabricIsPreInstalled is set, so assuming Fabric runtime is already installed on the machine."
}
elseif (!(Test-Path variable:MicrosoftServiceFabricCabFileAbsolutePath) `
-or [string]::IsNullOrEmpty($MicrosoftServiceFabricCabFileAbsolutePath))
{
Try
{
# Get runtime package details
$UpgradeStatus = Get-ServiceFabricClusterUpgrade
}
Catch
{
Write-Host "Could not query current cluster version. Check your ClientConnectionEndpoint and security credentials." -ForegroundColor Red
exit 1
}
if ($UpgradeStatus.UpgradeState -ne "RollingForwardCompleted" -And $UpgradeStatus.UpgradeState -ne "RollingBackCompleted")
{
if ($BypassUpgradeStateValidation)
{
Write-Host "BypassUpgradeStateValidation is set but cannot be used without FabricRuntimePackagePath when cluster version cannot be automatically inferred from the upgrade state." -ForegroundColor Red
}
Write-Host "New node cannot be added to the cluster while upgrade is in progress or before cluster has finished bootstrapping. To monitor upgrade state run Get-ServiceFabricClusterUpgrade and wait until UpgradeState switches to either RollingForwardCompleted or RollingBackCompleted." -ForegroundColor Red
exit 1
}
Try
{
$RuntimeCabFilename = "MicrosoftAzureServiceFabric." + $UpgradeStatus.TargetCodeVersion + ".cab"
$DeploymentPackageRoot = Split-Path -parent $DeployerBinPath
$RuntimeBinPath = Join-Path $DeploymentPackageRoot -ChildPath "DeploymentRuntimePackages"
$MicrosoftServiceFabricCabFilePath = Join-Path $RuntimeBinPath -ChildPath $RuntimeCabFilename
if (!(Test-Path $MicrosoftServiceFabricCabFilePath))
{
$RuntimePackageDetails = Get-ServiceFabricRuntimeSupportedVersion
$RequiredPackage = $RuntimePackageDetails.RuntimePackages | where { $_.Version -eq $UpgradeStatus.TargetCodeVersion }
if ($RequiredPackage -eq $null)
{
Write-Host "The required runtime version is no longer supported. Please upgrade your cluster to the latest version before adding a node." -ForegroundColor Red
exit 1
}
$Version = $UpgradeStatus.TargetCodeVersion
Write-Host "Runtime package version $Version was not found in DeploymentRuntimePackages folder and needed to be downloaded."
(New-Object System.Net.WebClient).DownloadFile($RuntimePackageDetails.GoalRuntimeLocation, $MicrosoftServiceFabricCabFilePath)
Write-Host "Runtime package has been successfully downloaded to $MicrosoftServiceFabricCabFilePath."
}
$MicrosoftServiceFabricCabFileAbsolutePath = Resolve-Path $MicrosoftServiceFabricCabFilePath
}
Catch
{
Write-Host "Runtime package cannot be downloaded. Check your internet connectivity. If the cluster is not connected to the internet run Get-ServiceFabricClusterUpgrade and note the TargetCodeVersion. Run Get-ServiceFabricRuntimeSupportedVersion from a machine connected to the internet to get the download links for all supported fabric versions. Download the package corresponding to your TargetCodeVersion. Pass -FabricRuntimePackageOutputDirectory <Path to runtime package> to AddNode.ps1 in addition to other parameters. Exception thrown : $($_.Exception.ToString())" -ForegroundColor Red
exit 1
}
}
#Add Node to an existing cluster
Try
{
$AddNodeTimeoutDuration=[System.TimeSpan]::FromSeconds($TimeoutInSeconds)
$AddNodeTimeout=[System.DateTime]::UtcNow + $AddNodeTimeoutDuration
Get-ServiceFabricNode | ft
$VerbosePreference = $parentVerbosePreference
$params = @{
'NodeName' = $NodeName;
'NodeType' = $NodeType;
'IpAddressOrFQDN' = $NodeIpAddressOrFQDN;
'UpgradeDomain' = $UpgradeDomain;
'FaultDomain' = $FaultDomain;
'FabricRuntimePackagePath' = $MicrosoftServiceFabricCabFileAbsolutePath;
'NoCleanupOnFailure' = $NoCleanupOnFailure;
'Force' = $Force;
'BypassUpgradeStateValidation' = $BypassUpgradeStateValidation;
'FabricIsPreInstalled' = $FabricIsPreInstalled;
}
if ((Test-Path variable:TimeoutInSeconds) `
-and ($TimeoutInSeconds -gt 0))
{
$params += @{'TimeoutSec' = $TimeoutInSeconds;}
}
Write-Host "Adding Node $NodeName"
Add-ServiceFabricNode @params
Write-Host "Waiting for node to join cluster." -NoNewline
$nodeJoined=$false
$firstRun=$true
do
{
if (!$nodeJoined -and !$firstRun)
{
Write-Host "." -NoNewline
Start-Sleep -s 10
}
$result=Get-ServiceFabricNode | Where-Object { [System.String]::Compare($_.NodeName, $NodeName, [System.StringComparison]::InvariantCulture) -eq 0 }
$nodeJoined=$result.Count -gt 0
$firstRun=$false
} while(!$nodeJoined -and ([System.DateTime]::UtcNow -lt $AddNodeTimeout))
Write-Host "" # Newline
if(-not $nodeJoined)
{
Write-Host "Node did not join within timeout of $TimeoutInSeconds seconds." -ForegroundColor Red
exit 1
}
Get-ServiceFabricNode | ft
Write-Host "Node $NodeName joined the cluster!" -ForegroundColor Green
}
Catch
{
if($VerbosePreference -eq "SilentlyContinue")
{
Write-Host "Add Node failed. Call with -Verbose for more details" -ForegroundColor Red
}
Write-Host "Add node to existing cluster failed with exception: $($_.Exception.ToString())" -ForegroundColor Red
exit 1
}
} -args $shelloutArgs -OutputFormat Text
$env:Path = [System.Environment]::GetEnvironmentVariable("path","Machine")
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAaWS1eDTImCPqr
# XkXx+JOiU509Id8D94uRE9I3NDASNqCCDXYwggX0MIID3KADAgECAhMzAAADTrU8
# esGEb+srAAAAAANOMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI5WhcNMjQwMzE0MTg0MzI5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDdCKiNI6IBFWuvJUmf6WdOJqZmIwYs5G7AJD5UbcL6tsC+EBPDbr36pFGo1bsU
# p53nRyFYnncoMg8FK0d8jLlw0lgexDDr7gicf2zOBFWqfv/nSLwzJFNP5W03DF/1
# 1oZ12rSFqGlm+O46cRjTDFBpMRCZZGddZlRBjivby0eI1VgTD1TvAdfBYQe82fhm
# WQkYR/lWmAK+vW/1+bO7jHaxXTNCxLIBW07F8PBjUcwFxxyfbe2mHB4h1L4U0Ofa
# +HX/aREQ7SqYZz59sXM2ySOfvYyIjnqSO80NGBaz5DvzIG88J0+BNhOu2jl6Dfcq
# jYQs1H/PMSQIK6E7lXDXSpXzAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUnMc7Zn/ukKBsBiWkwdNfsN5pdwAw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMDUxNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAD21v9pHoLdBSNlFAjmk
# mx4XxOZAPsVxxXbDyQv1+kGDe9XpgBnT1lXnx7JDpFMKBwAyIwdInmvhK9pGBa31
# TyeL3p7R2s0L8SABPPRJHAEk4NHpBXxHjm4TKjezAbSqqbgsy10Y7KApy+9UrKa2
# kGmsuASsk95PVm5vem7OmTs42vm0BJUU+JPQLg8Y/sdj3TtSfLYYZAaJwTAIgi7d
# hzn5hatLo7Dhz+4T+MrFd+6LUa2U3zr97QwzDthx+RP9/RZnur4inzSQsG5DCVIM
# pA1l2NWEA3KAca0tI2l6hQNYsaKL1kefdfHCrPxEry8onJjyGGv9YKoLv6AOO7Oh
# JEmbQlz/xksYG2N/JSOJ+QqYpGTEuYFYVWain7He6jgb41JbpOGKDdE/b+V2q/gX
# UgFe2gdwTpCDsvh8SMRoq1/BNXcr7iTAU38Vgr83iVtPYmFhZOVM0ULp/kKTVoir
# IpP2KCxT4OekOctt8grYnhJ16QMjmMv5o53hjNFXOxigkQWYzUO+6w50g0FAeFa8
# 5ugCCB6lXEk21FFB1FdIHpjSQf+LP/W2OV/HfhC3uTPgKbRtXo83TZYEudooyZ/A
# Vu08sibZ3MkGOJORLERNwKm2G7oqdOv4Qj8Z0JrGgMzj46NFKAxkLSpE5oHQYP1H
# tPx1lPfD7iNSbJsP6LiUHXH1MIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAANOtTx6wYRv6ysAAAAAA04wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFV94myVv8uodI4+8m0NDbyF
# cRyY34Apv8ogTu5v5GZjMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAlL1dxxDZtaUj2Bci5mTmjOYv/ovT5HTtu2Hd0zPkLeH+GwVfvl4idJyR
# lC109XfXTAFqv9kPmJroHgUGJZcaD5LdgEIUkQpzZpi56KpM38Vm+Nc801dYPAPk
# 0gRfnix57e9zZKYgDQkKJyLPRtu8d4hGVEdhTPQXxDe2nISnOwTZJqg1a/XsYlll
# YfcXTkv0G+2OQ41LopDI/TvDChN2jpeU43JIJZr0Xfu+blmLDaA1Hhcwvphh/gRx
# 9J7hZXSs+96VQsfvdUDL1bFtGKwpIeoRzLIOyvG6bDhDVV90gCIjmFQ7rJiEnyff
# MyKAv2NF4Gr2Ux7CC1m9lxIc+CzCiqGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAhU4+j+p/eP4G4pI64rUxEKbR05MmMyzFYseftTkKTdwIGZQPW9E5O
# GBMyMDIzMDkyOTE5MDcyNi44NzhaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAdYnaf9yLVbIrgABAAAB1jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEy
# MzRaFw0yNDAyMDExOTEyMzRaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDPLM2Om8r5u3fcbDEOXydJtbkW5U34KFaftC+8QyNq
# plMIzSTC1ToE0zcweQCvPIfpYtyPB3jt6fPRprvhwCksUw9p0OfmZzWPDvkt40BU
# Stu813QlrloRdplLz2xpk29jIOZ4+rBbKaZkBPZ4R4LXQhkkHne0Y/Yh85ZqMMRa
# MWkBM6nUwV5aDiwXqdE9Jyl0i1aWYbCqzwBRdN7CTlAJxrJ47ov3uf/lFg9hnVQc
# qQYgRrRFpDNFMOP0gwz5Nj6a24GZncFEGRmKwImL+5KWPnVgvadJSRp6ZqrYV3Fm
# bBmZtsF0hSlVjLQO8nxelGV7TvqIISIsv2bQMgUBVEz8wHFyU3863gHj8BCbEpJz
# m75fLJsL3P66lJUNRN7CRsfNEbHdX/d6jopVOFwF7ommTQjpU37A/7YR0wJDTt6Z
# sXU+j/wYlo9b22t1qUthqjRs32oGf2TRTCoQWLhJe3cAIYRlla/gEKlbuDDsG392
# 6y4EMHFxTjsjrcZEbDWwjB3wrp11Dyg1QKcDyLUs2anBolvQwJTN0mMOuXO8tBz2
# 0ng/+Xw+4w+W9PMkvW1faYi435VjKRZsHfxIPjIzZ0wf4FibmVPJHZ+aTxGsVJPx
# ydChvvGCf4fe8XfYY9P5lbn9ScKc4adTd44GCrBlJ/JOsoA4OvNHY6W+XcKVcIIG
# WwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFGGaVDY7TQBiMCKg2+j/zRTcYsZOMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDUv+RjNidwJxSbMk1IvS8LfxNM8VaVhpxR
# 1SkW+FRY6AKkn2s3On29nGEVlatblIv1qVTKkrUxLYMZ0z+RA6mmfXue2Y7/YBbz
# M5kUeUgU2y1Mmbin6xadT9DzECeE7E4+3k2DmZxuV+GLFYQsqkDbe8oy7+3BSiU2
# 9qyZAYT9vRDALPUC5ZwyoPkNfKbqjl3VgFTqIubEQr56M0YdMWlqCqq0yVln9mPb
# hHHzXHOjaQsurohHCf7VT8ct79po34Fd8XcsqmyhdKBy1jdyknrik+F3vEl/90qa
# on5N8KTZoGtOFlaJFPnZ2DqQtb2WWkfuAoGWrGSA43Myl7+PYbUsri/NrMvAd9Z+
# J9FlqsMwXQFxAB7ujJi4hP8BH8j6qkmy4uulU5SSQa6XkElcaKQYSpJcSjkjyTDI
# Opf6LZBTaFx6eeoqDZ0lURhiRqO+1yo8uXO89e6kgBeC8t1WN5ITqXnjocYgDvyF
# pptsUDgnRUiI1M/Ql/O299VktMkIL72i6Qd4BBsrj3Z+iLEnKP9epUwosP1m3N2v
# 9yhXQ1HiusJl63IfXIyfBJaWvQDgU3Jk4eIZSr/2KIj4ptXt496CRiHTi011kcwD
# pdjQLAQiCvoj1puyhfwVf2G5ZwBptIXivNRba34KkD5oqmEoF1yRFQ84iDsf/giy
# n/XIT7YY/zCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQD5
# r3DVRpAGQo9sTLUHeBC87NpK+qCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6MFxqzAiGA8yMDIzMDkyOTE1NTQx
# OVoYDzIwMjMwOTMwMTU1NDE5WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDowXGr
# AgEAMAcCAQACAgGUMAcCAQACAhLyMAoCBQDowsMrAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAFMQCnbLNWa1oyo7oUFszm+HO7zbDAEYIsmxQDNzObEtf85+
# MZhkPifK3PSTAsT7VHqmw38oIf4IdCw9CIisgOoq8nQ8t1ahR/AzU/2WP9PvCCwp
# 7j8H84uiQiCuFnvFVScB0/WFMFz4iscSXsNENpAnNrpSm+bkZp/zxHLVPCBgHTpF
# UbOZ0F5dG69LzfEP/K7wLE0Fy587kmiTZFqah3M5In1mze1fLnEG02GeUyxvg8D7
# nGciMgKMqRttWajjdcW8g5YNJxb0Q1T0KG9wDa8kIa5PLDgRqRtz5N9LY1ghZ57Q
# hU4RkfV7xgu6SnIWQ/egmR69oWhqQsiKp9Udyu0xggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdYnaf9yLVbIrgABAAAB1jAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCC5pPUpVhKr6RW19f1PMe6d1eEGSlGevQ0iRhd2kDa2/jCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINbLTQ1XeNM+EBinOEJMjZd0jMND
# ur+AK+O8P12j5ST8MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHWJ2n/ci1WyK4AAQAAAdYwIgQgfIoZamFpperPD0Llk1NvlZLCv4rs
# ImIr1chOovL1gDkwDQYJKoZIhvcNAQELBQAEggIAPHG5XrusR1rsNRIXGXksKCel
# JFnE7C42leJISexiAJ2fezwcO3Lz6S7nmul5GSn6zarDU+VNbLF5aXFHEY5aKuy+
# qgebUbaM6d98cFLftN+tCSeq2xgHAysKNRvgYxqBC1NhhRj3GK85enkvcDK+TMFG
# DEWK86eAdhGL/NATltEp9qXJwPRhNjHiJGRhXGPGFjSIvu2FwfFEfHpRFgynZsM3
# Xc7ZkmG67mU+tSBlVyhceLdJq+NJ89K4eWLKtOG1TKM/yxwg4obvW7gnvCLGUsaI
# uYMHcERmGiLMO1Po1HNtORx13EYQzPNZ/AkFTre+uYpCwpFd1LFdQIozL00FC6+2
# tO9oBttNP4Wsh6UP2vejIA7rpplZnck159jK2OKJz5tKbv48VSdUTbuDhsqGqkZx
# YDS1TThXMQoRORcPwCVkunco8QZPzyFaCkCP8Mp+Ke5Xa2miH45XmCx2S9aVFWfg
# cCEKvo66MCC6xMwfivqx7WovM/OjABRIhGZirj8Ab06fPlzi4lqZHtltNVl1iFYW
# yUGqp6WlbKEyo+15Qa0mOTXW4eRqyvdhz3fReg4ivZq4UTqMtAvhtWKuNuPQcOQQ
# U89+85OCO/o1IdulnXOLiTTk/KIkgb+KKYj4QHB+niFUHacnSuai4xSuR+NAhBdI
# yE54Ce7XK+YCu1vfYx8=
# SIG # End signature block
|
combined_dataset/train/non-malicious/4220.ps1 | 4220.ps1 |
function Invoke-SqlQuery {
param (
[String]$ConnectionString,
[String]$Sqlserver,
[String]$Username,
[String]$Password,
[String]$Catalog,
[String]$Database,
[String]$Query
)
if (!$Database){
$Database = ";"
} else {
$Database = "$Database;"
}
if (!$Catalog){
$Catalog = "Initial Catalog=Master;"
} else {
$Catalog = "Initial Catalog=$Catalog;"
}
if ($Username -and $Password){
$Authentication = "User Id=$Username;Password=$Password;"
} else {
$Authentication = "Integrated Security=True;"
}
if (!$query){
$Query = 'SELECT @@version';
}
$SqlConnection = New-Object System.Data.SqlClient.SqlConnection
$SqlConnection.ConnectionString = "Data Source=$Sqlserver;$Catalog$Authentication$Database"
$SqlCmd = New-Object System.Data.SqlClient.SqlCommand
$SqlCmd.CommandText = $Query
$SqlCmd.Connection = $SqlConnection
$SqlAdapter = New-Object System.Data.SqlClient.SqlDataAdapter
$SqlAdapter.SelectCommand = $SqlCmd
$DataSet = New-Object System.Data.DataSet
$SqlAdapter.Fill($DataSet)
$DataSet.Tables[0]
} |
combined_dataset/train/non-malicious/4099.ps1 | 4099.ps1 |
function Install-EXEUpdates {
Set-Variable -Name Arguments -Scope Local -Force
Set-Variable -Name ErrCode -Scope Local -Force
Set-Variable -Name File -Scope Local -Force
Set-Variable -Name EXEFiles -Scope Local -Force
Set-Variable -Name RelativePath -Scope Local -Force
$RelativePath = (split-path $SCRIPT:MyInvocation.MyCommand.Path -parent) + "\"
$EXEFiles = Get-ChildItem -Path $RelativePath -Force | where { $_.Name -like "*.exe*" }
If ($EXEFiles.Count -ge 1) {
$EXEFiles | Sort-Object
cls
foreach ($File in $EXEFiles) {
$Arguments = "/passive /norestart"
Write-Host "Installing"$File.Name"....." -NoNewline
$ErrCode = (Start-Process -FilePath $File.Fullname -ArgumentList $Arguments -Wait -Passthru).ExitCode
If ($ErrCode -eq 0) {
Write-Host "Success" -ForegroundColor Yellow
} else {
Write-Host "Failed with error code"$ErrCode -ForegroundColor Red
}
}
}
Remove-Variable -Name Arguments -Scope Local -Force
Remove-Variable -Name ErrCode -Scope Local -Force
Remove-Variable -Name File -Scope Local -Force
Remove-Variable -Name EXEFiles -Scope Local -Force
Remove-Variable -Name RelativePath -Scope Local -Force
}
function Install-MSUUpdates {
Set-Variable -Name Arguments -Scope Local -Force
Set-Variable -Name ErrCode -Scope Local -Force
Set-Variable -Name Executable -Value $env:windir"\System32\wusa.exe" -Scope Local -Force
Set-Variable -Name File -Scope Local -Force
Set-Variable -Name MSUFiles -Scope Local -Force
Set-Variable -Name RelativePath -Scope Local -Force
$RelativePath = (split-path $SCRIPT:MyInvocation.MyCommand.Path -parent) + "\"
$MSUFiles = Get-ChildItem -Path $RelativePath -Force | where { $_.Name -like "*.msu*" }
If ($MSUFiles.Count -ge 1) {
$MSUFiles | Sort-Object
cls
foreach ($File in $MSUFiles) {
$Arguments = $File.FullName + [char]32 + "/quiet /norestart"
Write-Host "Installing"$File.Name"....." -NoNewline
$ErrCode = (Start-Process -FilePath $Executable -ArgumentList $Arguments -Wait -Passthru).ExitCode
If (($ErrCode -eq 0) -or ($ErrCode -eq 2359302)) {
Write-Host "Success" -ForegroundColor Yellow
} else {
Write-Host "Failed with error code"$ErrCode -ForegroundColor Red
}
}
}
Remove-Variable -Name Arguments -Scope Local -Force
Remove-Variable -Name ErrCode -Scope Local -Force
Remove-Variable -Name Executable -Scope Local -Force
Remove-Variable -Name File -Scope Local -Force
Remove-Variable -Name MSUFiles -Scope Local -Force
Remove-Variable -Name RelativePath -Scope Local -Force
}
cls
Install-EXEUpdates
Install-MSUUpdates
Start-Sleep -Seconds 5
|
combined_dataset/train/non-malicious/8b815eb7-c620-4159-b0fc-435ceeca036b.ps1 | 8b815eb7-c620-4159-b0fc-435ceeca036b.ps1 | # Add the Active Directory bits and not complain if they're already there
Import-Module ActiveDirectory -ErrorAction SilentlyContinue
# set default password
# change pass@word1 to whatever you want the account passwords to be
$defpassword = (ConvertTo-SecureString "pass@word1" -AsPlainText -force)
# Get domain DNS suffix
$dnsroot = '@' + (Get-ADDomain).dnsroot
# Import the file with the users. You can change the filename to reflect your file
$users = Import-Csv .\\users.csv
foreach ($user in $users) {
if ($user.manager -eq "") # In case it's a service account or a boss
{
try {
New-ADUser -SamAccountName $user.SamAccountName -Name ($user.FirstName + " " + $user.LastName) `
-DisplayName ($user.FirstName + " " + $user.LastName) -GivenName $user.FirstName -Surname $user.LastName `
-EmailAddress ($user.SamAccountName + $dnsroot) -UserPrincipalName ($user.SamAccountName + $dnsroot) `
-Title $user.title -Enabled $true -ChangePasswordAtLogon $false -PasswordNeverExpires $true `
-AccountPassword $defpassword -PassThru `
}
catch [System.Object]
{
Write-Output "Could not create user $($user.SamAccountName), $_"
}
}
else
{
try {
New-ADUser -SamAccountName $user.SamAccountName -Name ($user.FirstName + " " + $user.LastName) `
-DisplayName ($user.FirstName + " " + $user.LastName) -GivenName $user.FirstName -Surname $user.LastName `
-EmailAddress ($user.SamAccountName + $dnsroot) -UserPrincipalName ($user.SamAccountName + $dnsroot) `
-Title $user.title -manager $user.manager `
-Enabled $true -ChangePasswordAtLogon $false -PasswordNeverExpires $true `
-AccountPassword $defpassword -PassThru `
}
catch [System.Object]
{
Write-Output "Could not create user $($user.SamAccountName), $_"
}
}
# Put picture part here.
$filename = "$($user.SamAccountName).jpg"
Write-Output $filename
if (test-path -path $filename)
{
Write-Output "Found picture for $($user.SamAccountName)"
$photo = [byte[]](Get-Content $filename -Encoding byte)
Set-ADUser $($user.SamAccountName) -Replace @{thumbnailPhoto=$photo}
}
}
|
combined_dataset/train/non-malicious/3336.ps1 | 3336.ps1 |
function Remove-Role {
[PoshBot.BotCommand(
Aliases = ('rr', 'remove-role'),
Permissions = 'manage-roles'
)]
[cmdletbinding()]
param(
[parameter(Mandatory)]
$Bot,
[parameter(Mandatory, Position = 0)]
[string[]]$Name
)
$removed = @()
$notFound = @()
$failedToRemove = @()
$response = @{
Type = 'Normal'
Text = ''
Title = $null
ThumbnailUrl = $thumb.success
}
foreach ($roleName in $Name) {
if ($r = $Bot.RoleManager.GetRole($roleName)) {
$Bot.RoleManager.RemoveRole($r)
if ($r = $Bot.RoleManager.GetRole($roleName)) {
$failedToRemove += $roleName
} else {
$removed += $roleName
}
} else {
$notFound += $roleName
}
}
if ($removed.Count -ge 1) {
if ($removed.Count -gt 1) {
$successMessage = 'Roles [{0}] removed.' -f ($removed -join ', ')
} else {
$successMessage = "Role [$removed] removed"
}
$response.Type = 'Normal'
$response.Text = $successMessage
$response.Title = $null
$response.ThumbnailUrl = $thumb.success
}
if ($notFound.Count -ge 1) {
if ($notFound.Count -gt 1) {
$warningMessage = 'Roles [{0}] not found :(' -f ($removed -join ', ')
} else {
$warningMessage = "Role [$notFound] not found :("
}
$response.Type = 'Warning'
$response.Text = $warningMessage
$response.Title = $null
$response.ThumbnailUrl = $thumb.rutrow
}
if ($failedToRemove.Count -ge 1) {
if ($failedToRemove.Count -gt 1) {
$errMsg = "Roles [{0}] could not be removed. Check logs for more information." -f ($failedToRemove -join ', ')
} else {
$errMsg = "Role [$failedToRemove] could not be created. Check logs for more information."
}
$response.Type = 'Error'
$response.Text = $errMsg
$response.Title = $null
$response.ThumbnailUrl = $thumb.error
}
New-PoshBotCardResponse @response
}
|
combined_dataset/train/non-malicious/3133.ps1 | 3133.ps1 |
function Invoke-IPv4NetworkScan
{
[CmdletBinding(DefaultParameterSetName='CIDR')]
Param(
[Parameter(
ParameterSetName='Range',
Position=0,
Mandatory=$true,
HelpMessage='Start IPv4-Address like 192.168.1.10')]
[IPAddress]$StartIPv4Address,
[Parameter(
ParameterSetName='Range',
Position=1,
Mandatory=$true,
HelpMessage='End IPv4-Address like 192.168.1.100')]
[IPAddress]$EndIPv4Address,
[Parameter(
ParameterSetName='CIDR',
Position=0,
Mandatory=$true,
HelpMessage='IPv4-Address which is in the subnet')]
[Parameter(
ParameterSetName='Mask',
Position=0,
Mandatory=$true,
HelpMessage='IPv4-Address which is in the subnet')]
[IPAddress]$IPv4Address,
[Parameter(
ParameterSetName='CIDR',
Position=1,
Mandatory=$true,
HelpMessage='CIDR like /24 without "/"')]
[ValidateRange(0,31)]
[Int32]$CIDR,
[Parameter(
ParameterSetName='Mask',
Position=1,
Mandatory=$true,
Helpmessage='Subnetmask like 255.255.255.0')]
[ValidateScript({
if($_ -match "^(254|252|248|240|224|192|128).0.0.0$|^255.(254|252|248|240|224|192|128|0).0.0$|^255.255.(254|252|248|240|224|192|128|0).0$|^255.255.255.(254|252|248|240|224|192|128|0)$")
{
return $true
}
else
{
throw "Enter a valid subnetmask (like 255.255.255.0)!"
}
})]
[String]$Mask,
[Parameter(
Position=2,
HelpMessage='Maxmium number of ICMP checks for each IPv4-Address (Default=2)')]
[Int32]$Tries=2,
[Parameter(
Position=3,
HelpMessage='Maximum number of threads at the same time (Default=256)')]
[Int32]$Threads=256,
[Parameter(
Position=4,
HelpMessage='Resolve DNS for each IP (Default=Enabled)')]
[Switch]$DisableDNSResolving,
[Parameter(
Position=5,
HelpMessage='Resolve MAC-Address for each IP (Default=Disabled)')]
[Switch]$EnableMACResolving,
[Parameter(
Position=6,
HelpMessage='Get extendend informations like BufferSize, ResponseTime and TTL (Default=Disabled)')]
[Switch]$ExtendedInformations,
[Parameter(
Position=7,
HelpMessage='Include inactive devices in result')]
[Switch]$IncludeInactive,
[Parameter(
Position=8,
HelpMessage='Update IEEE Standards Registration Authority from IEEE.org (https://standards.ieee.org/develop/regauth/oui/oui.csv)')]
[Switch]$UpdateList
)
Begin{
Write-Verbose -Message "Script started at $(Get-Date)"
$IEEE_MACVendorList_WebUri = "http://standards.ieee.org/develop/regauth/oui/oui.csv"
$CSV_MACVendorList_Path = "$PSScriptRoot\Resources\IEEE_Standards_Registration_Authority.csv"
$CSV_MACVendorList_BackupPath = "$PSScriptRoot\Resources\IEEE_Standards_Registration_Authority.csv.bak"
function UpdateListFromIEEE
{
try{
Write-Verbose -Message "Create backup of the IEEE Standards Registration Authority list..."
if(Test-Path -Path $CSV_MACVendorList_Path -PathType Leaf)
{
Rename-Item -Path $CSV_MACVendorList_Path -NewName $CSV_MACVendorList_BackupPath
}
Write-Verbose -Message "Updating IEEE Standards Registration Authority from IEEE.org..."
Invoke-WebRequest -Uri $IEEE_MACVendorList_WebUri -OutFile $CSV_MACVendorList_Path -ErrorAction Stop
Write-Verbose -Message "Remove backup of the IEEE Standards Registration Authority list..."
if(Test-Path -Path $CSV_MACVendorList_BackupPath -PathType Leaf)
{
Remove-Item -Path $CSV_MACVendorList_BackupPath
}
}
catch{
Write-Verbose -Message "Cleanup downloaded file and restore backup..."
if(Test-Path -Path $CSV_MACVendorList_Path)
{
Remove-Item -Path $CSV_MACVendorList_Path -Force
}
if(Test-Path -Path $CSV_MACVendorList_BackupPath -PathType Leaf)
{
Rename-Item -Path $CSV_MACVendorList_BackupPath -NewName $CSV_MACVendorList_Path
}
$_.Exception.Message
}
}
function AssignVendorToMAC
{
param(
$Result
)
Begin{
}
Process {
$Vendor = [String]::Empty
if(-not([String]::IsNullOrEmpty($Result.MAC)))
{
$MAC_VendorSearch = $Job_Result.MAC.Replace("-","").Substring(0,6)
foreach($ListEntry in $MAC_VendorList)
{
if($ListEntry.Assignment -eq $MAC_VendorSearch)
{
$Vendor = $ListEntry."Organization Name"
break
}
}
}
[pscustomobject] @{
IPv4Address = $Result.IPv4Address
Status = $Result.Status
Hostname = $Result.Hostname
MAC = $Result.MAC
Vendor = $Vendor
BufferSize = $Result.BufferSize
ResponseTime = $Result.ResponseTime
TTL = $Result.TTL
}
}
End {
}
}
}
Process{
$CSV_MACVendorList_Available = Test-Path -Path $CSV_MACVendorList_Path -PathType Leaf
if($UpdateList)
{
UpdateListFromIEEE
}
elseif(($EnableMACResolving) -and ($CSV_MACVendorList_Available -eq $false))
{
Write-Warning -Message "No CSV-File to assign vendor with MAC-Address found! Use the parameter ""-UpdateList"" to download the latest version from IEEE.org. This warning does not affect the scanning procedure."
}
if($PSCmdlet.ParameterSetName -eq 'CIDR' -or $PSCmdlet.ParameterSetName -eq 'Mask')
{
if($PSCmdlet.ParameterSetName -eq 'Mask')
{
$CIDR = (Convert-Subnetmask -Mask $Mask).CIDR
}
$Subnet = Get-IPv4Subnet -IPv4Address $IPv4Address -CIDR $CIDR
$StartIPv4Address = $Subnet.NetworkID
$EndIPv4Address = $Subnet.Broadcast
}
$StartIPv4Address_Int64 = (Convert-IPv4Address -IPv4Address $StartIPv4Address.ToString()).Int64
$EndIPv4Address_Int64 = (Convert-IPv4Address -IPv4Address $EndIPv4Address.ToString()).Int64
if($StartIPv4Address_Int64 -gt $EndIPv4Address_Int64)
{
Write-Error -Message "Invalid IP-Range... Check your input!" -Category InvalidArgument -ErrorAction Stop
}
$IPsToScan = ($EndIPv4Address_Int64 - $StartIPv4Address_Int64)
Write-Verbose -Message "Scanning range from $StartIPv4Address to $EndIPv4Address ($($IPsToScan + 1) IPs)"
Write-Verbose -Message "Running with max $Threads threads"
Write-Verbose -Message "ICMP checks per IP is set to $Tries"
$PropertiesToDisplay = @()
$PropertiesToDisplay += "IPv4Address", "Status"
if($DisableDNSResolving -eq $false)
{
$PropertiesToDisplay += "Hostname"
}
if($EnableMACResolving)
{
$PropertiesToDisplay += "MAC"
}
if($EnableMACResolving -and $CSV_MACVendorList_Available)
{
$AssignVendorToMAC = $true
$PropertiesToDisplay += "Vendor"
$MAC_VendorList = Import-Csv -Path $CSV_MACVendorList_Path | Select-Object -Property "Assignment", "Organization Name"
}
else
{
$AssignVendorToMAC = $false
}
if($ExtendedInformations)
{
$PropertiesToDisplay += "BufferSize", "ResponseTime", "TTL"
}
[System.Management.Automation.ScriptBlock]$ScriptBlock = {
Param(
$IPv4Address,
$Tries,
$DisableDNSResolving,
$EnableMACResolving,
$ExtendedInformations,
$IncludeInactive
)
$Status = [String]::Empty
for($i = 0; $i -lt $Tries; i++)
{
try{
$PingObj = New-Object System.Net.NetworkInformation.Ping
$Timeout = 1000
$Buffer = New-Object Byte[] 32
$PingResult = $PingObj.Send($IPv4Address, $Timeout, $Buffer)
if($PingResult.Status -eq "Success")
{
$Status = "Up"
break
}
else
{
$Status = "Down"
}
}
catch
{
$Status = "Down"
break
}
}
$Hostname = [String]::Empty
if((-not($DisableDNSResolving)) -and ($Status -eq "Up" -or $IncludeInactive))
{
try{
$Hostname = ([System.Net.Dns]::GetHostEntry($IPv4Address).HostName)
}
catch { }
}
$MAC = [String]::Empty
if(($EnableMACResolving) -and (($Status -eq "Up") -or ($IncludeInactive)))
{
$Arp_Result = (arp -a ).ToUpper()
foreach($Line in $Arp_Result)
{
if($Line.TrimStart().StartsWith($IPv4Address))
{
$MAC = [Regex]::Matches($Line,"([0-9A-F][0-9A-F]-){5}([0-9A-F][0-9A-F])").Value
}
}
if([String]::IsNullOrEmpty($MAC))
{
try{
$Nbtstat_Result = nbtstat -A $IPv4Address | Select-String "MAC"
$MAC = [Regex]::Matches($Nbtstat_Result, "([0-9A-F][0-9A-F]-){5}([0-9A-F][0-9A-F])").Value
}
catch{ }
}
}
$BufferSize = [String]::Empty
$ResponseTime = [String]::Empty
$TTL = $null
if($ExtendedInformations -and ($Status -eq "Up"))
{
try{
$BufferSize = $PingResult.Buffer.Length
$ResponseTime = $PingResult.RoundtripTime
$TTL = $PingResult.Options.Ttl
}
catch{ }
}
if(($Status -eq "Up") -or ($IncludeInactive))
{
[pscustomobject] @{
IPv4Address = $IPv4Address
Status = $Status
Hostname = $Hostname
MAC = $MAC
BufferSize = $BufferSize
ResponseTime = $ResponseTime
TTL = $TTL
}
}
else
{
$null
}
}
Write-Verbose -Message "Setting up RunspacePool..."
$RunspacePool = [System.Management.Automation.Runspaces.RunspaceFactory]::CreateRunspacePool(1, $Threads, $Host)
$RunspacePool.Open()
[System.Collections.ArrayList]$Jobs = @()
Write-Verbose -Message "Setting up Jobs..."
for ($i = $StartIPv4Address_Int64; $i -le $EndIPv4Address_Int64; $i++)
{
$IPv4Address = (Convert-IPv4Address -Int64 $i).IPv4Address
$ScriptParams = @{
IPv4Address = $IPv4Address
Tries = $Tries
DisableDNSResolving = $DisableDNSResolving
EnableMACResolving = $EnableMACResolving
ExtendedInformations = $ExtendedInformations
IncludeInactive = $IncludeInactive
}
try {
$Progress_Percent = (($i - $StartIPv4Address_Int64) / $IPsToScan) * 100
}
catch {
$Progress_Percent = 100
}
Write-Progress -Activity "Setting up jobs..." -Id 1 -Status "Current IP-Address: $IPv4Address" -PercentComplete $Progress_Percent
$Job = [System.Management.Automation.PowerShell]::Create().AddScript($ScriptBlock).AddParameters($ScriptParams)
$Job.RunspacePool = $RunspacePool
$JobObj = [pscustomobject] @{
RunNum = $i - $StartIPv4Address_Int64
Pipe = $Job
Result = $Job.BeginInvoke()
}
[void]$Jobs.Add($JobObj)
}
Write-Verbose -Message "Waiting for jobs to complete & starting to process results..."
$Jobs_Total = $Jobs.Count
Do {
$Jobs_ToProcess = $Jobs | Where-Object -FilterScript {$_.Result.IsCompleted}
if($null -eq $Jobs_ToProcess)
{
Write-Verbose -Message "No jobs completed, wait 500ms..."
Start-Sleep -Milliseconds 500
continue
}
$Jobs_Remaining = ($Jobs | Where-Object -FilterScript {$_.Result.IsCompleted -eq $false}).Count
try {
$Progress_Percent = 100 - (($Jobs_Remaining / $Jobs_Total) * 100)
}
catch {
$Progress_Percent = 100
}
Write-Progress -Activity "Waiting for jobs to complete... ($($Threads - $($RunspacePool.GetAvailableRunspaces())) of $Threads threads running)" -Id 1 -PercentComplete $Progress_Percent -Status "$Jobs_Remaining remaining..."
Write-Verbose -Message "Processing $(if($null -eq $Jobs_ToProcess.Count){"1"}else{$Jobs_ToProcess.Count}) job(s)..."
foreach($Job in $Jobs_ToProcess)
{
$Job_Result = $Job.Pipe.EndInvoke($Job.Result)
$Job.Pipe.Dispose()
$Jobs.Remove($Job)
if($Job_Result.Status)
{
if($AssignVendorToMAC)
{
AssignVendorToMAC -Result $Job_Result | Select-Object -Property $PropertiesToDisplay
}
else
{
$Job_Result | Select-Object -Property $PropertiesToDisplay
}
}
}
} While ($Jobs.Count -gt 0)
Write-Verbose -Message "Closing RunspacePool and free resources..."
$RunspacePool.Close()
$RunspacePool.Dispose()
Write-Verbose -Message "Script finished at $(Get-Date)"
}
End{
}
} |
combined_dataset/train/non-malicious/sample_22_53.ps1 | sample_22_53.ps1 | # Localized 12/03/2020 06:20 PM (GMT) 303:4.80.0411 Add-AppDevPackage.psd1
# Culture = "en-US"
ConvertFrom-StringData @'
###PSLOC
PromptYesString=&Evet
PromptNoString=&Hayır
BundleFound=Demet bulundu: {0}
PackageFound=Paket bulundu: {0}
EncryptedBundleFound=Şifreli demet bulundu: {0}
EncryptedPackageFound=Şifreli paket bulundu: {0}
CertificateFound=Sertifika bulundu: {0}
DependenciesFound=Bağımlılık paketleri bulundu:
GettingDeveloperLicense=Geliştirici lisansı alınıyor...
InstallingCertificate=Sertifika yükleniyor...
InstallingPackage=\nUygulama yükleniyor...
AcquireLicenseSuccessful=Geliştirici lisansı başarıyla alındı.
InstallCertificateSuccessful=Sertifika başarıyla yüklendi.
Success=\nBaşarılı: Uygulamanız başarıyla yüklendi.
WarningInstallCert=\nBilgisayarınızın Güvenilen Kişiler sertifika deposuna dijital bir sertifika yüklemek üzeresiniz. Bu işlem ciddi güvenlik riskleri taşır ve yalnızca bu dijital sertifikayı oluşturan kişiye güveniyorsanız yapılmalıdır.\n\nBu uygulamayı kullanmayı bıraktığınızda ilgili dijital sertifikayı el ile kaldırmanız gerekir. Bu işleme yönelik yönergeleri şurada bulabilirsiniz: http://go.microsoft.com/fwlink/?LinkId=243053\n\nDevam etmek istediğinizden emin misiniz?\n\n
ElevateActions=\nBu uygulamayı yüklemeden önce şunları yapmanız gerekir:
ElevateActionDevLicense=\t- Geliştirici liasnsı alın
ElevateActionCertificate=\t- İmza sertifikasını yükleyin
ElevateActionsContinue=Devam etmek için yönetici kimlik bilgileri gereklidir. Lütfen UAC istemini kabul edin ve istenirse yönetici parolanızı girin.
ErrorForceElevate=Devam etmek için yönetici kimlik bilgilerini sağlamalısınız. Lütfen bu betiği -Force parametresi olmadan veya yükseltilmiş bir PowerShell penceresinden çalıştırın.
ErrorForceDeveloperLicense=Geliştirici lisansı almak için kullanıcı etkileşimi gereklidir. Lütfen betiği -Force parametresi olmadan yeniden çalıştırın.
ErrorLaunchAdminFailed=Hata: Yönetici olarak yeni bir işlem başlatılamadı.
ErrorNoScriptPath=Hata: Bu betiği bir dosyadan başlatmalısınız.
ErrorNoPackageFound=Hata: Betik dizininde paket veya demet bulunamadı. Lütfen yüklemek istediğiniz paketin veya demetin bu betik ile aynı dizine yerleştirildiğinden emin olun.
ErrorManyPackagesFound=Hata: Betik dizininde birden fazla paket veya demet bulundu. Lütfen yalnızca yüklemek istediğiniz paketin veya demetin bu betik ile aynı dizine yerleştirildiğinden emin olun.
ErrorPackageUnsigned=Hata: Paket veya demet dijital olarak imzalanmamış veya imza bozuk.
ErrorNoCertificateFound=Hata: Betik dizininde sertifika bulunamadı. Lütfen yüklediğiniz paketi veya demeti imzalamak için kullanılan sertifikanın bu betik ile aynı dizine yerleştirildiğinden emin olun.
ErrorManyCertificatesFound=Hata: Betik dizininde birden fazla sertifika bulundu. Lütfen yalnızca yüklediğiniz paketi veya demeti imzalamak için kullanılan sertifikanın bu betik ile aynı dizine yerleştirildiğinden emin olun.
ErrorBadCertificate=Hata: "{0}" dosyası geçerli bir dijital sertifika değil. CertUtil hata kodu {1} ile döndürüldü.
ErrorExpiredCertificate=Hata: "{0}" geliştirici sertifikasının süresi doldu. Sistem saatinin doğru tarih ve saate ayarlanmamış olması buna neden olabilir. Sistem ayarları doğruysa, paketi veya demeti geçerli bir sertifika ile yeniden oluşturmak üzere uygulama sahibine başvurun.
ErrorCertificateMismatch=Hata: Sertifika, paketi veya demeti imzalamak için kullanılan sertifika ile eşleşmiyor.
ErrorCertIsCA=Hata: Sertifika bir sertifika yetkilisi olamaz.
ErrorBannedKeyUsage=Hata: Sertifika şu anahtar kullanımına sahip olamaz: {0}. Anahtar kullanımı belirtilmemiş veya "DigitalSignature" öğesine eşit olmalıdır.
ErrorBannedEKU=Hata: Sertifika şu genişletilmiş anahtar kullanımına sahip olamaz: {0}. Yalnızca Kod İmzalama ve Ömür Boyu İmzalama EKU'larına izin verilir.
ErrorNoBasicConstraints=Hata: Sertifikada temel kısıtlamalar uzantısı eksik.
ErrorNoCodeSigningEku=Hata: Sertifikada Kod İmzalama için genişletilmiş anahtar kullanımı eksik.
ErrorInstallCertificateCancelled=Hata: Sertifika yüklemesi iptal edildi.
ErrorCertUtilInstallFailed=Hata: Sertifika yüklenemedi. CertUtil hata kodu {0} ile döndürüldü.
ErrorGetDeveloperLicenseFailed=Hata: Geliştirici lisansı alınamadı. Daha fazla bilgi için, bkz. http://go.microsoft.com/fwlink/?LinkID=252740.
ErrorInstallCertificateFailed=Hata: Sertifika yüklenemedi. Durum: {0}. Daha fazla bilgi için, bkz. http://go.microsoft.com/fwlink/?LinkID=252740.
ErrorAddPackageFailed=Hata: Uygulama yüklenemedi.
ErrorAddPackageFailedWithCert=Hata: Uygulama yüklenemedi. Güvenliği sağlamak için, lütfen uygulamayı yükleyene kadar imza sertifikasını kaldırmayı deneyin. Bu işleme yönelik yönergeleri şurada bulabilirsiniz:\nhttp://go.microsoft.com/fwlink/?LinkId=243053
'@
# SIG # Begin signature block
# MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCTtgtZfMI5Tyhq
# bcWLtqjon/38+Q6hTNS7NNi8riMzbKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHWu0jjfEj6bFhisWc6kF5J/
# NiaFCmvRRdri/uwwOuOMMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEApu5bAsrWFbB2/RoEl2s6WACaDuc8/ZBly0Qe9P42SaCtby62qQInWDpc
# zbrpYEz1+GXf+i/+yQOaVAhgIJfKjhnth4mvdh6KEGUWORV61c2OOFSE/TZvQKtt
# VRJuwHETA549KMHuWCS0VvYneU2Vt3+UbbmBTzjDoDzWjr7Egpsp21m+Rfe/3M91
# ee68tM7W7A+ahBAgLFmEZc6j4JYb/5v9SrYyNBvG+gldTU0Q1ac9jPgx2BoLYxSP
# ojSaUWMsjkBX6xFUd/ePgPIYYlyYbcJO8N7X/kGLLT7PUerD609Cs6vdmUmYMeIr
# tj5Uj6KYC4BAaBBJgpPn16y4UTeqK6GCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC
# FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBsNAt7s7aWmsWHnYccUc1K88w2bPHaMGG2/v7l9sm+vQIGZfxnFT37
# GBMyMDI0MDQwNDIwNDIxOS45MDVaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHenkielp8oRD0AAQAAAd4wDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0LTRC
# OTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB9ByF9UIDhA6xFrOniw/x
# sDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SUIBkVQS0Ml6kR+TagkUPb
# aEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWoKySY8/ROIKdpphgI7OJb
# 4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3ynvwrS8/bcorANO6Djuysy
# S9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2RC4odQcEPnY12jypYPnS
# 6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9OmGo0S94Bxg3N/3aE6fU
# bnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdSqf85FklCXIIkg4sm7nM9
# TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1G7nUD1pteuXvQp8fE1Kp
# TjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++5Hyg/L68pe+DrZoZPXJa
# GU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhyk/EebwuXVJY+rTyfbRfu
# h9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlKIX5d3aQLo9fDda1ZTOw+
# XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUazAmbxseaapg
# dxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAOKUwHsXDacGOvUI
# gs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSuy+GsxiVHzkhMW+FqK8gr
# uLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1XEUsXYOSJUPitY7E8bbld
# mmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDiD28gAVGrPA3NykiSChvd
# qS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+SQmI9VIayYsIGRjvelmNa
# 0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMYhuWfWRSHZCKyIANA0aJL
# 4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx78GqBKfylp25aOWJ/qPhC
# +DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41FjgBg4m3OTFDGot5DSuVkQg
# jku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6rrZM/PCwRG6girYmnTRLL
# sicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg82/FMqCk9wK3LvyLAyDH
# N+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqHdoNwQYROVm+ZX10RX3n6
# bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoy
# QUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy22CJZExE2vOggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOm5WKQwIhgPMjAyNDA0MDUwMDQ5NDBaGA8yMDI0MDQwNjAwNDk0MFowdzA9Bgor
# BgEEAYRZCgQBMS8wLTAKAgUA6blYpAIBADAKAgEAAgIGzwIB/zAHAgEAAgIR+TAK
# AgUA6bqqJAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAETWsZmA4SFylu2U
# 50Zg9cuRI4+t8afMv34B2RXd/d5JnHpcUaETz8lgNX/+HTD0SrALBaSZOB7BlOHu
# fsSxR4vKQed09vTJ/amFHb+6QtQwLxsJAbZ+GXEnYA4tsE2IPCElU7ffWIBxCAl1
# FWo3Y1n60XVsp7N1djPZNeU5TmO1MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0AAQAAAd4wDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgnx7uIqiYxSPSP7MNuAyy3uMoX0JmyRlVKS2krr7UrVIwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCCOPiOfDcFeEBBJAn/mC3MgrT5w/U2z81LYD44H
# c34dezCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 3p5InpafKEQ9AAEAAAHeMCIEID2hiK1qomnFBQKBgKWPbn5UzsuA1aMsE+kiWy5B
# b0ObMA0GCSqGSIb3DQEBCwUABIICACClgWHJ0ZXcT2tFPVa1NmmFeVYgX8IeaftE
# E9ZlYVNuMMQXkyk94OVj4nSTLPXBsqK8sWJ2ugbNWqsaf+029NhK1I9lLwToQjJn
# Vl4NT5DkeWKYEEAD1CJdCQCzmhiGd16+5kCEiA5oLhZObUYnAWduo3l8SbYVIiB5
# +g+7cmX87UR0DO0orrLDfZLEnSbkM2EalmuNtGIClFERH6JV8AKYL+Bo0t8oJTeg
# sTbENKAFqol80Vqe60ftsmi7k7irPIv7cYs7qFBx7FWA4zNkZpXFOUewv9wsra4n
# +9NxKpF1RJEYOTA+2izJkpfoi12yIqGHuUWxW3YlfZQdgsj41Vn9EJNqIQ8v63dj
# FqDrI4b430745df2muis4G39/mfjLO17SHNfy/+qoWuC/r4Y/rlAOwz16OU7YEfl
# XT0yHARFK2a6uvKny5F3fG/4bi6uzd41Z8Ba6zCgWCxmLEhDiVvOaBi14aqW6CMe
# PYztjImZ+Lt4r3h1FF50HMMe14spsVKbmMH89c47jYjBnHT9J+JDOtXDjvz31n10
# WPPozdMJ2+vF0kXunf5OjbARyP7iHmkEoz/dysp0iAFuVA5ZcXWUnVLR7WVmNGWG
# L0I1l7XCTQLg1U4WMCN6sGAJAzI5SJjbMmQVNhWXAmqwFNBQoOUaB5yic1Z6D/E3
# fAFkPYBE
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_12_60.ps1 | sample_12_60.ps1 | #
# Module manifest for module 'OCI.PSModules.Marketplace'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Marketplace.dll'
# Version number of this module.
ModuleVersion = '81.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'b7f90e90-3cc1-4fca-9773-f27b90f7945b'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Marketplace Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Marketplace.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Export-OCIMarketplaceListing',
'Get-OCIMarketplaceAcceptedAgreement',
'Get-OCIMarketplaceAcceptedAgreementsList',
'Get-OCIMarketplaceAgreement', 'Get-OCIMarketplaceAgreementsList',
'Get-OCIMarketplaceCategoriesList',
'Get-OCIMarketplaceLaunchEligibility', 'Get-OCIMarketplaceListing',
'Get-OCIMarketplaceListingsList', 'Get-OCIMarketplacePackage',
'Get-OCIMarketplacePackagesList', 'Get-OCIMarketplacePublication',
'Get-OCIMarketplacePublicationPackage',
'Get-OCIMarketplacePublicationPackagesList',
'Get-OCIMarketplacePublicationsList',
'Get-OCIMarketplacePublishersList', 'Get-OCIMarketplaceReportsList',
'Get-OCIMarketplaceReportTypesList', 'Get-OCIMarketplaceTaxesList',
'Get-OCIMarketplaceThirdPartyPaidListingEligibility',
'Get-OCIMarketplaceWorkRequest',
'Get-OCIMarketplaceWorkRequestErrorsList',
'Get-OCIMarketplaceWorkRequestLogsList',
'Get-OCIMarketplaceWorkRequestsList',
'Invoke-OCIMarketplaceSearchListings',
'Move-OCIMarketplacePublicationCompartment',
'New-OCIMarketplaceAcceptedAgreement',
'New-OCIMarketplacePublication',
'Remove-OCIMarketplaceAcceptedAgreement',
'Remove-OCIMarketplacePublication',
'Update-OCIMarketplaceAcceptedAgreement',
'Update-OCIMarketplacePublication'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Marketplace'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_56_89.ps1 | sample_56_89.ps1 | ###########################################################
#
# 'ExtensionService' module
#
###########################################################
$ErrorActionPreference = 'Stop'
Set-StrictMode -Version Latest
Import-Module "$PSScriptRoot\ServiceHelper.psm1"
$script:GCInstallPath = "$PSScriptRoot\..\..\.."
$script:GCBinariesFolderName = "GC"
$script:GCBinariesPath = Join-Path $script:GCInstallPath $script:GCBinariesFolderName
$script:OperationRetryCount = 5
<#
.SYNOPSIS
Install Guest Configuration Extension Service.
.Example
Install-ExtensionService
#>
Function Install-ExtensionService {
[CmdletBinding()]
Param()
Write-Verbose -Message "In Install-ExtensionService"
$ServiceType = "Extension"
$gcConfigPath = Join-Path $script:GCBinariesPath 'gc.config'
'{ "ServiceType": "Extension" }' | Out-File $gcConfigPath -Encoding utf8
New-Item $(Get-GuestConfigDataPath) -Force -ItemType Directory
Set-AclPermissions -ServiceType $ServiceType -Path $(Get-GuestConfigDataPath)
$packagesPath = Join-Path $env:SystemDrive 'Packages'
$extensionInstallPath = Join-Path $packagesPath 'Plugins'
if (!(Test-Path -Path $extensionInstallPath))
{
# Create extension install directory if it doesn't exist
New-Item $extensionInstallPath -Force -ItemType Directory
}
Set-AclPermissions -ServiceType $ServiceType -Path $extensionInstallPath
Invoke-ScriptWithRetry -Script {
[CmdletBinding()]
Param()
# Install GC Service and verify it is installed correctly.
Install-ServiceInternal -ServiceType "Extension"
} -RetryCount $script:OperationRetryCount -Verbose:($PSBoundParameters['Verbose'] -eq $true)
}
<#
.SYNOPSIS
Enable and start Guest Configuration Extension Service.
.Example
Enable-ExtensionService
#>
Function Enable-ExtensionService {
[CmdletBinding()]
Param()
Invoke-ScriptWithRetry -Script {
[CmdletBinding()]
Param()
Write-Verbose -Message "In Enable-ExtensionService"
$ServiceType = "Extension"
Start-ServiceInternal -ServiceType $ServiceType
} -RetryCount $script:OperationRetryCount -Verbose:($PSBoundParameters['Verbose'] -eq $true)
}
<#
.SYNOPSIS
Uninstall Guest Configuration Extension Service.
.Example
Uninstall-ExtensionService
#>
Function Uninstall-ExtensionService {
[CmdletBinding()]
Param()
Write-Verbose -Message "In Uninstall-ExtensionService"
$ServiceType = "Extension"
# Unregister GC Service
Uninstall-ServiceInternal -ServiceType $ServiceType
}
<#
.SYNOPSIS
Update Guest Configuration Extension service.
.Example
Update-ExtensionService
#>
Function Update-ExtensionService{
[CmdletBinding()]
Param()
Write-Verbose -Message "In Update-ExtensionService"
}
Export-ModuleMember -Function @(
'Install-ExtensionService',
'Enable-ExtensionService',
'Uninstall-ExtensionService',
'Update-ExtensionService'
)
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCALlNBTkFMvQNzJ
# babyhzSqcfsu9XXh3hKpjS5zPO2U2KCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICd6lDcaMbiGzvIuiPF29+5B
# 15kGK6LA3sYRwkqpr26SMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAX/Z0rRzoMjIK8uSVZqBy0N4z5WzzSSk1K2I37De0Y5BEV4zIx5J9GOwy
# RHQc3PZqC15aHtUnpccsAKT0Jmf4oQeXjmzctbuDvVQzNsA2nXtYenTZgQU5lN+V
# Pv+VVC0KaVCA0AYKbesCQZDjqeo/asiQ+HSqgklqwVVXxPCYRRbz6LUWvDWlppeA
# ZrlrO1UKhvRoxS9LqgpobsYtEWPLWQPfpsVxqZ9szgL9KMUfdfQpL5deH03X1sqw
# klLxF2jk4+5ObmRvjnnoS6CasCnvrwnA0H47mvVWHpbhP7f5pw0sg5j1v9O/ev09
# OSa4Dp4KT5k67dAU6XJfhQ6IHYpCE6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBbgV3hyr+Ds8663VeFbPcQqSKULEy7HvRV+sO+/UuaOQIGZk3029Wf
# GBMyMDI0MDUyMzE2NDQwNy4yODJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# Ojg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4NkRGLTRC
# QkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKhOA5RE6i53nHURH4lnfKLp
# +9JvipuTtctairCxMUSrPSy5CWK2DtriQP+T52HXbN2g7AktQ1pQZbTDGFzK6d03
# vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzIHHLaiAaobE5vFJuoxZ0ZWdKMCs8acjhH
# UmfaY+79/CR7uN+B4+xjJqwvdpU/mp0mAq3earyH+AKmv6lkrQN8zgrcbCgHwsqv
# vqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5EW6NVnXMYOTRKuGPfyfBKdShualLo88k
# G7qa2mbA5l77+X06JAesMkoyYr4/9CgDFjHUpcHSODujlFBKMi168zRdLerdpW0b
# BX9EDux2zBMMaEK8NyxawCEuAq7++7ktFAbl3hUKtuzYC1FUZuUl2Bq6U17S4CKs
# qR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5gpv+YcvBM834bXFNwytd3ujDD24P9Dd8
# xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSvtFVi5Sa/ubGuYEpS8gF6GDWN5/KbveFk
# dsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zljEjKz5WW7BA4wpmFm24fhBmRjV4Nbp+n7
# 8cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnSeOXePT6hMF0Il598LMu0rw35ViUWcAQk
# UNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUbqL1toyPUdpF
# yyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAC5U2bINLgXIHWbM
# cqVuf9jkUT/K8zyLBvu5h8JrqYR2z/eaO2yo1Ooc9Shyvxbe9GZDu7kkUzxSyJ1I
# ZksZZw6FDq6yZNT3PEjAEnREpRBL8S+mbXg+O4VLS0LSmb8XIZiLsaqZ0fDEcv3H
# eA+/y/qKnCQWkXghpaEMwGMQzRkhGwcGdXr1zGpQ7HTxvfu57xFxZX1MkKnWFENJ
# 6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+zvGJNAF+5/5qBk7nr079zICbFXvxtidN
# N5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+OdAquBiDkYQ5kVfUMKS31yHQOGgmFxuCO
# zTpWHalrqpdIllsy8KNsj5U9sONiWAd9PNlyEHHbQZDmi9/BNlOYyTt0YehLbDov
# mZUNazk79Od/A917mqCdTqrExwBGUPbMP+/vdYUqaJspupBnUtjOf/76DAhVy8e/
# e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM9Rm6hUDBBkvYh+YjmGdcQ5HB6WT9Rec8
# +qDHmbhLhX4Zdaard5/OXeLbgx2f7L4QQQj3KgqjqDOWInVhNE1gYtTWLHe4882d
# /k7Lui0K1g8EZrKD7maOrsJLKPKlegceJ9FCqY1sDUKUhRa0EHUW+ZkKLlohKrS7
# FwjdrINWkPBgbQznCjdE2m47QjTbMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4
# NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUANiNHGWXbNaDPxnyiDbEOciSjFhCggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOn5xLEwIhgPMjAyNDA1MjMyMTM1NDVaGA8yMDI0MDUyNDIxMzU0NVowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6fnEsQIBADAHAgEAAgIB/DAHAgEAAgIRTzAKAgUA
# 6fsWMQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAFDLeDe0dFbkjsDDQNDG
# AJrNgLPWiHyr2giuOartGegXkwQE+cXDi+tM7h7fBh2BbYNo0+KYUh3a3bbEHXoG
# DJCkFldnC2IyeF2ulROhFL674GZr0veOTkUTuDrCr6qZPmf5p11f2NrqIjHtDb9q
# kZJmoMWW/64q51D6lA89AcPIMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgZpVrxEIdf8MTQHjqlwydoGkjGc7Pf44zAGJtdkUDglEwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCBh/w4tmmWsT3iZnHtH0Vk37UCN02lRxY+RiON6wDFj
# ZjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3V1X
# HZXUraobAAEAAAHdMCIEILdx7+ye1frhhBSGE65Npbr8RnNGllzngbCrOMpxcrMA
# MA0GCSqGSIb3DQEBCwUABIICAH9ZkwtbbfvDLQGezpA8DtlWFHXaW9BLqsTVWlQz
# 2kS1ozDF3/9K5LsQo18WAbd52ESFNam9ntCyneU3nCAxWjcbE/AtCVyv2XscfUWq
# 443IzjlXNq6GzUTVCxr5gvnaaNbOJG6D0PLCOJufF9uMmb3YNiANE7hMLYQtgwdd
# yWuXMyATnu9ARxXa08lpNH+FQTnWrRFK2ybyoXg10GFfQ/P5JwaHQI5R4FTn24PI
# RCHiUg3n/YUNSBlwt9yHad3MQHbIs+G2TMmoo9CRBOvi2lA/kB1L2KpM2dfyssWi
# BwP2FMbdrtq7F3pfyJwmvsx2SWhO8Ipu/o656hDKmLEZHSloPk8Y2ychb265n78j
# aD3rBC9mTiQ/muGdAZLfCv+W58ZG/inWs/tFopCV050UxpH9dA9VIu126DFeu5Su
# 6YgIv2F3KIKfHHo7px7KqoJaoBpGksR1ltaL1G4DQEMG2tY/z8znDZAoqfH86Kx9
# QDPIcsAPwB8yrx9xlkyzC+RWB685+jn2p7AbDfih27A3dmJ35qhAFUdxfnDbqxwx
# VdVjt/+dEJMfotoB+gBx8lxycI+1rrKk2P52bBjDmrw/SMiW4iFBfdIoF2TiRPSc
# aIJSuy7nrsfX9G2DgM+ZmrDqX+4P3GfMDjqYh/xPULFUf+fQBtjTeyRBhtPsJ2Ro
# ioEb
# SIG # End signature block
|
combined_dataset/train/non-malicious/1874.ps1 | 1874.ps1 |
Describe "Clear-Variable DRT Unit Tests" -Tags "CI" {
It "Clear-Variable normal variable Name should works"{
Set-Variable foo bar
Clear-Variable -Name foo
$var1=Get-Variable -Name foo
$var1.Name|Should -BeExactly "foo"
$var1.Value|Should -BeNullOrEmpty
$var1.Options|Should -BeExactly "None"
$var1.Description|Should -BeNullOrEmpty
}
It "Clear-Variable ReadOnly variable Name should throw exception and force Clear-Variable should works"{
Set-Variable foo bar -Option ReadOnly
$e = { Clear-Variable -Name foo -Scope 1 -ErrorAction Stop } | Should -Throw -ErrorId "VariableNotWritable,Microsoft.PowerShell.Commands.ClearVariableCommand" -PassThru
$e.CategoryInfo | Should -Match "SessionStateUnauthorizedAccessException"
Clear-Variable -Name foo -Force
$var1=Get-Variable -Name foo
$var1.Name|Should -BeExactly "foo"
$var1.Value|Should -BeNullOrEmpty
$var1.Options|Should -BeExactly "ReadOnly"
$var1.Description| Should -BeNullOrEmpty
}
It "Clear-Variable normal variable Name with local scope should works"{
Set-Variable foo bar
&{
Set-Variable foo baz
$foo | Should -Be baz
Clear-Variable -Name foo -Scope "local"
$var1=Get-Variable -Name foo -Scope "local"
$var1.Name|Should -BeExactly "foo"
$var1.Value|Should -BeNullOrEmpty
$var1.Options|Should -BeExactly "None"
$var1.Description|Should -BeNullOrEmpty
}
$var1=Get-Variable -Name foo
$var1.Name|Should -BeExactly "foo"
$var1.Value|Should -BeExactly "bar"
$var1.Options|Should -BeExactly "None"
$var1.Description|Should -BeNullOrEmpty
}
It "Clear-Variable Private variable Name should works and Get-Variable with local scope should throw exception"{
Set-Variable foo bar -Option Private
&{
$e = { Get-Variable -Name foo -Scope local -ErrorAction Stop } |
Should -Throw -ErrorId "VariableNotFound,Microsoft.PowerShell.Commands.GetVariableCommand" -PassThru
$e.CategoryInfo | Should -Match "ItemNotFoundException"
}
$var1=Get-Variable -Name foo
$var1.Name|Should -BeExactly "foo"
$var1.Value|Should -BeExactly "bar"
$var1.Options|Should -BeExactly "Private"
$var1.Description|Should -BeNullOrEmpty
}
It "Clear-Variable normal variable Name with local scope should works in different scope"{
Set-Variable foo bar
&{
Set-Variable foo baz
Clear-Variable -Name foo -Scope "local"
$var1=Get-Variable -Name foo -Scope "local"
$var1.Name|Should -BeExactly "foo"
$var1.Value|Should -BeNullOrEmpty
$var1.Options|Should -BeExactly "None"
$var1.Description|Should -BeNullOrEmpty
}
$var1=Get-Variable -Name foo
$var1.Name|Should -BeExactly "foo"
$var1.Value|Should -BeExactly "bar"
$var1.Options|Should -BeExactly "None"
$var1.Description|Should -BeNullOrEmpty
$var1=Get-Variable -Name foo -Scope "local"
$var1.Name|Should -BeExactly "foo"
$var1.Value|Should -BeExactly "bar"
$var1.Options|Should -BeExactly "None"
$var1.Description|Should -BeNullOrEmpty
}
}
Describe "Clear-Variable" -Tags "CI" {
BeforeEach {
$var1 = 3
}
It "Should be able to clear a variable using the Name switch" {
Clear-Variable -Name var1
$var1 | Should -BeNullOrEmpty
{ Get-Variable var1 } | Should -Not -Throw
}
It "Should be able to clear a variable without using the Name switch" {
Clear-Variable var1
$var1 | Should -BeNullOrEmpty
{ Get-Variable var1 } | Should -Not -Throw
}
It "Should be able to include a set of variables to clear" {
$var1 = 2
$var2 = 3
$var3 = 4
$variable1 = 23
$variable2 = 4
$variable3 = 2
$w = 3
Clear-Variable -Name w, vari* -Include w, vari*
$variable1 | Should -BeNullOrEmpty
$variable2 | Should -BeNullOrEmpty
$variable3 | Should -BeNullOrEmpty
$w | Should -BeNullOrEmpty
$var1 | Should -Not -BeNullOrEmpty
$var2 | Should -Not -BeNullOrEmpty
$var3 | Should -Not -BeNullOrEmpty
}
It "Should be able to exclude a set of variables to clear" {
$var1 = 2
$var2 = 3
$var3 = 4
$variable1 = 23
$variable2 = 4
$variable3 = 2
$w = 3
Clear-Variable -Name w, vari* -Exclude var*
$variable1 | Should -Not -BeNullOrEmpty
$variable2 | Should -Not -BeNullOrEmpty
$variable3 | Should -Not -BeNullOrEmpty
$var1 | Should -Not -BeNullOrEmpty
$var2 | Should -Not -BeNullOrEmpty
$var3 | Should -Not -BeNullOrEmpty
$w | Should -BeNullOrEmpty
}
It "Should be able to pass the cleared object through the pipeline using the passthru switch" {
{ Clear-Variable -Name var1 -PassThru | Format-Wide -Property Value } | Should -Not -Throw
}
It "Should not clear environment variables" {
$env:TEMPVARIABLE = "test data"
{ Clear-Variable -Name env:TEMPVARIABLE -ErrorAction Stop } | Should -Throw
}
It "Should clear variable even if it is read-only using the Force parameter" {
try
{
New-Variable -Name var2 -Option ReadOnly -Value 100
Clear-Variable -Name var1
Clear-Variable -Name var2 -Force
$var1 | Should -BeNullOrEmpty
$var2 | Should -BeNullOrEmpty
}
finally
{
Remove-Variable -Name var2 -Force
}
}
It "Should throw error when trying to clear variable that is read-only without using the Force parameter" {
New-Variable -Name var2 -Option ReadOnly -Value 100
{ Clear-Variable -Name var2 -Scope 1 -ErrorAction stop } | Should -Throw -ErrorId "VariableNotWritable,Microsoft.PowerShell.Commands.ClearVariableCommand"
$var2 | Should -Not -BeNullOrEmpty
Remove-Variable -Name var2 -Force
}
Context "Scope Tests" {
It "Should be able to clear a global scope variable using the global switch" {
New-Variable globalVar -Value 1 -Scope global -Force
Clear-Variable -Name globalVar -Scope global
$globalVar | Should -BeNullOrEmpty
}
It "Should not be able to clear a global scope variable using the local switch" {
New-Variable globalVar -Value 1 -Scope global -Force
{ Clear-Variable -Name globalVar -Scope local -ErrorAction Stop } |
Should -Throw -ErrorId "VariableNotFound,Microsoft.PowerShell.Commands.ClearVariableCommand"
}
It "Should not be able to clear a global variable using the script scope switch" {
New-Variable globalVar -Value 1 -Scope global -Force
{ Clear-Variable -Name localVar -Scope script -ErrorAction Stop } | Should -Throw -ErrorId "VariableNotFound,Microsoft.PowerShell.Commands.ClearVariableCommand"
}
It "Should be able to clear an item locally using the local switch" {
New-Variable localVar -Value 2 -Scope local -Force
Clear-Variable -Name localVar -Scope local
$localVar | Should -BeNullOrEmpty
{ Clear-Variable -Name localVar -Scope script -ErrorAction Stop } | Should -Throw -ErrorId "VariableNotFound,Microsoft.PowerShell.Commands.ClearVariableCommand"
}
It "Should not be able to clear an item locally using the global switch" {
New-Variable localVar -Value 2 -Scope local -Force
{ Clear-Variable -Name localVar -Scope global -ErrorAction Stop } | Should -Throw -ErrorId "VariableNotFound,Microsoft.PowerShell.Commands.ClearVariableCommand"
}
It "Should not be able to clear a local variable using the script scope switch" {
New-Variable localVar -Value 2 -Scope local -Force
{ Clear-Variable -Name localVar -Scope script -ErrorAction Stop } | Should -Throw -ErrorId "VariableNotFound,Microsoft.PowerShell.Commands.ClearVariableCommand"
}
It "Should be able to clear a script variable created using the script switch" {
{
New-Variable -Name derp2 -Value 3 -Scope script -Force
Clear-Variable -Name derp2 -Scope script
} | Should -Not -Throw
}
It "Should be able to clear a global script variable that was created using the script scope switch" {
{
New-Variable -Name derpx -Value 4 -Scope script -Force
Clear-Variable -Name derpx -Scope script
} | Should -Not -Throw
}
}
}
|
combined_dataset/train/non-malicious/100.ps1 | 100.ps1 |
function Get-AuthToken {
[cmdletbinding()]
param
(
[Parameter(Mandatory=$true)]
$User
)
$userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User
$tenant = $userUpn.Host
Write-Host "Checking for AzureAD module..."
$AadModule = Get-Module -Name "AzureAD" -ListAvailable
if ($AadModule -eq $null) {
Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview"
$AadModule = Get-Module -Name "AzureADPreview" -ListAvailable
}
if ($AadModule -eq $null) {
write-host
write-host "AzureAD Powershell module not installed..." -f Red
write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow
write-host "Script can't continue..." -f Red
write-host
exit
}
if($AadModule.count -gt 1){
$Latest_Version = ($AadModule | select version | Sort-Object)[-1]
$aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version }
if($AadModule.count -gt 1){
$aadModule = $AadModule | select -Unique
}
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
else {
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
[System.Reflection.Assembly]::LoadFrom($adal) | Out-Null
[System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null
$clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547"
$redirectUri = "urn:ietf:wg:oauth:2.0:oob"
$resourceAppIdURI = "https://graph.microsoft.com"
$authority = "https://login.microsoftonline.com/$Tenant"
try {
$authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority
$platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto"
$userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId")
$authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result
if($authResult.AccessToken){
$authHeader = @{
'Content-Type'='application/json'
'Authorization'="Bearer " + $authResult.AccessToken
'ExpiresOn'=$authResult.ExpiresOn
}
return $authHeader
}
else {
Write-Host
Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red
Write-Host
break
}
}
catch {
write-host $_.Exception.Message -f Red
write-host $_.Exception.ItemName -f Red
write-host
break
}
}
Function Get-AuditCategories(){
[cmdletbinding()]
param
(
$Name
)
$graphApiVersion = "Beta"
$Resource = "deviceManagement/auditEvents/getAuditCategories"
try {
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
Function Get-AuditEvents(){
[cmdletbinding()]
param
(
[Parameter(Mandatory=$true)]
$Category,
[Parameter(Mandatory=$false)]
[ValidateRange(1,30)]
[Int]$days
)
$graphApiVersion = "Beta"
$Resource = "deviceManagement/auditEvents"
if($days){ $days }
else { $days = 30 }
$daysago = "{0:s}" -f (get-date).AddDays(-$days) + "Z"
try {
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)?`$filter=category eq '$Category' and activityDateTime gt $daysago"
Write-Verbose $uri
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
write-host
if($global:authToken){
$DateTime = (Get-Date).ToUniversalTime()
$TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes
if($TokenExpires -le 0){
write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow
write-host
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
}
else {
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
$AuditCategories = Get-AuditCategories
Write-Host "Intune Audit Categories:" -ForegroundColor Yellow
$menu = @{}
for ($i=1;$i -le $AuditCategories.count; $i++)
{ Write-Host "$i. $($AuditCategories[$i-1])"
$menu.Add($i,($AuditCategories[$i-1]))}
Write-Host
[int]$ans = Read-Host 'Enter Category Name (Numerical value)'
$selection = $menu.Item($ans)
if($selection){
$selection
Write-Host
write-host "-------------------------------------------------------------------"
Write-Host
$Events = Get-AuditEvents -Category $selection
if($Events){
foreach($Event in ($Events | Sort-Object -Property activityDateTime )){
Write-Host $Event.displayName -f Yellow
Write-Host "Component Name:" $Event.componentName
Write-Host "Activity Type:" $Event.activityType
Write-Host "Activity Date Time:" $Event.activityDateTime
Write-Host "Application:" $Event.actor.applicationDisplayName
if($Event.activityResult -eq "Success"){
Write-Host "Activity Result:" $Event.activityResult -ForegroundColor Green
}
else {
Write-Host "Activity Result:" $Event.activityResult -ForegroundColor Red
}
Write-Host
Write-Host "User Information" -ForegroundColor Cyan
$Event.actor
Write-Host "Resource Information" -ForegroundColor Cyan
$Event.resources
Write-Host "-------------------------------------------------------------------"
Write-Host
}
}
else {
Write-Host "No audit events found for '$selection' in the past month..." -ForegroundColor Cyan
Write-Host
Write-Host "-------------------------------------------------------------------"
Write-Host
}
} |
combined_dataset/train/non-malicious/3046.ps1 | 3046.ps1 | function Should-BeIn($ActualValue, $ExpectedValue, [switch] $Negate, [string] $Because) {
[bool] $succeeded = $ExpectedValue -contains $ActualValue
if ($Negate) {
$succeeded = -not $succeeded
}
if (-not $succeeded) {
if ($Negate) {
return New-Object psobject -Property @{
Succeeded = $false
FailureMessage = "Expected collection $(Format-Nicely $ExpectedValue) to not contain $(Format-Nicely $ActualValue),$(Format-Because $Because) but it was found."
}
}
else {
return New-Object psobject -Property @{
Succeeded = $false
FailureMessage = "Expected collection $(Format-Nicely $ExpectedValue) to contain $(Format-Nicely $ActualValue),$(Format-Because $Because) but it was not found."
}
}
}
return New-Object psobject -Property @{
Succeeded = $true
}
}
Add-AssertionOperator -Name BeIn `
-InternalName Should-BeIn `
-Test ${function:Should-BeIn}
function ShouldBeInFailureMessage() {
}
function NotShouldBeInFailureMessage() {
}
|
combined_dataset/train/non-malicious/3584.ps1 | 3584.ps1 |
function Create-ResourceGroupForTest
{
$useExistingService = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigBool("useExistingService")
$location = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("Location")
$rg = $null
if($useExistingService)
{
$rgName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("ResourceGroupName")
$rg = Get-AzResourceGroup -Name $rgName -Location $location
}else{
$rgName = Get-ResourceGroupName
$rg = New-AzResourceGroup -Name $rgName -Location $location
}
Assert-NotNull $rg
return $rg
}
function Remove-ResourceGroupForTest ($rg)
{
if([Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigBool("cleanup")){
Remove-AzResourceGroup -Name $rg.ResourceGroupName -Force
}
}
function Get-ResourceGroupName
{
return getDmsAssetName "DmResource"
}
function Get-ServiceName
{
return getDmsAssetName "DmService"
}
function Get-ProjectName
{
return getDmsAssetName "DmProject"
}
function Get-TaskName
{
return getDmsAssetName "DmTask"
}
function Get-DbName
{
return getDmsAssetName "DmDbName"
}
function Create-DataMigrationService($rg)
{
$useExistingService = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigBool("useExistingService")
$service = $null
if($useExistingService){
$serviceName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("ServiceName")
$result = Get-AzDataMigrationService -ResourceGroupName $rg.ResourceGroupName -ServiceName $serviceName
Assert-AreEqual 1 $result.Count
$service = $result[0]
}else{
$serviceName = Get-ServiceName
$virtualSubNetId = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("VIRTUAL_SUBNET_ID")
$sku = "Premium_4vCores"
$service = New-AzDataMigrationService -ResourceGroupName $rg.ResourceGroupName -ServiceName $ServiceName -Location $rg.Location -Sku $sku -VirtualSubnetId $virtualSubNetId
}
Assert-NotNull $service
return $service
}
function Create-ProjectSqlSqlDb($rg, $service)
{
return Create-Project $rg $service SQLDB
}
function Create-ProjectSqlSqlDbMi($rg, $service)
{
return Create-Project $rg $service SQLMI
}
function Create-Project($rg, $service, $targetPlatform)
{
$ProjectName = Get-ProjectName
$db1 = New-ProjectDbInfos
$db2 = New-ProjectDbInfos
$dbList = @($db1, $db2)
$sourceConnInfo = New-SourceSqlConnectionInfo
$targetConnInfo = New-TargetSqlConnectionInfo
$project = New-AzDataMigrationProject -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $ProjectName -Location $rg.Location -SourceType SQL -TargetType $targetPlatform -SourceConnection $sourceConnInfo -TargetConnection $targetConnInfo -DatabaseInfo $dbList
return $project
}
function Create-ProjectMongoDbMongoDb($rg, $service)
{
$ProjectName = Get-ProjectName
$sourceConnInfo = New-SourceMongoDbConnectionInfo
$targetConnInfo = New-TargetMongoDbConnectionInfo
$project = New-AzDataMigrationProject -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $ProjectName -Location $rg.Location -SourceType MongoDb -TargetType MongoDb -SourceConnection $sourceConnInfo -TargetConnection $targetConnInfo
return $project
}
function New-SourceMongoDbConnectionInfo
{
$sourceConn = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("MONGODB_SOURCE_CONNECTIONSTRING")
$connectioninfo = New-AzDmsConnInfo -ServerType MongoDb -ConnectionString $sourceConn
return $connectioninfo
}
function New-TargetMongoDbConnectionInfo
{
$cosmosConn = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("COSMOSDB_TARGET_CONNECTIONSTRING")
$connectioninfo = New-AzDmsConnInfo -ServerType MongoDb -ConnectionString $cosmosConn
return $connectioninfo
}
function getDmsAssetName($prefix)
{
$assetName = [Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::GetAssetName("testName",$prefix+"-PsTestRun")
return $assetName
}
function New-SourceSqlConnectionInfo
{
$dataSource = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_SOURCE_DATASOURCE")
$connectioninfo = New-AzDmsConnInfo -ServerType SQL -DataSource $dataSource -AuthType SqlAuthentication -TrustServerCertificate:$true
return $connectioninfo
}
function New-TargetSqlConnectionInfo
{
$dataSource = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDB_TARGET_DATASOURCE")
$connectioninfo = New-AzDmsConnInfo -ServerType SQL -DataSource $dataSource -AuthType SqlAuthentication -TrustServerCertificate:$true
return $connectioninfo
}
function New-TargetSqlMiConnectionInfo
{
$dataSource = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDBMI_TARGET_DATASOURCE")
$connectioninfo = New-AzDmsConnInfo -ServerType SQL -DataSource $dataSource -AuthType SqlAuthentication -TrustServerCertificate:$true
return $connectioninfo
}
function Get-Creds($userName, $password)
{
$secpasswd = ConvertTo-SecureString -String $password -AsPlainText -Force
$creds = New-Object System.Management.Automation.PSCredential ($userName, $secpasswd)
return $creds
}
function New-ProjectDbInfos
{
$dbName = Get-DbName
$dbInfo = New-AzDataMigrationDatabaseInfo -SourceDatabaseName $dbName
return $dbInfo
}
function SleepTask($value){
if ([Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Mode -ne [Microsoft.Azure.Test.HttpRecorder.HttpRecorderMode]::Playback)
{
Start-Sleep -s $value
}else{
Start-Sleep -s 0
}
}
function New-TargetSqlMiSyncConnectionInfo
{
$miResourceId = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("MI_RESOURCE_ID")
$connectioninfo = New-AzDmsConnInfo -ServerType SQLMI -MiResourceId $miResourceId
return $connectioninfo
}
function New-AzureActiveDirectoryApp
{
$pwd = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("AZURE_AAD_APP_KEY")
$appId = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("AZURE_AAD_APP_ID")
$secpasswd = ConvertTo-SecureString $pwd -AsPlainText -Force
$app = New-AzDmsAadApp -ApplicationId $appId -AppKey $secpasswd
return $app
} |
combined_dataset/train/non-malicious/New-UrlFile.ps1 | New-UrlFile.ps1 | function New-UrlFile
{
param( $URL = "http://www.google.com")
$UrlFile = [system.io.Path]::ChangeExtension([system.io.Path]::GetTempFileName(),".url")
$UrlFileContents = `
"[InternetShortcut]",
"URL=$URL"
Write-Host $URL
$UrlFileContents | Set-Content -Path $UrlFile
Get-Item $UrlFile
}
|
combined_dataset/train/non-malicious/sample_25_85.ps1 | sample_25_85.ps1 | #
# Module manifest for module 'OCI.PSModules.Recovery'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Recovery.dll'
# Version number of this module.
ModuleVersion = '77.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '953d757b-6410-4a6e-b5dc-2141a7da241e'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Recovery Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Recovery.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIRecoveryProtectedDatabase',
'Get-OCIRecoveryProtectedDatabasesList',
'Get-OCIRecoveryProtectionPoliciesList',
'Get-OCIRecoveryProtectionPolicy', 'Get-OCIRecoveryServiceSubnet',
'Get-OCIRecoveryServiceSubnetsList', 'Get-OCIRecoveryWorkRequest',
'Get-OCIRecoveryWorkRequestErrorsList',
'Get-OCIRecoveryWorkRequestLogsList',
'Get-OCIRecoveryWorkRequestsList',
'Invoke-OCIRecoveryFetchProtectedDatabaseConfiguration',
'Move-OCIRecoveryProtectedDatabaseCompartment',
'Move-OCIRecoveryProtectionPolicyCompartment',
'Move-OCIRecoveryServiceSubnetCompartment',
'New-OCIRecoveryProtectedDatabase',
'New-OCIRecoveryProtectionPolicy', 'New-OCIRecoveryServiceSubnet',
'Remove-OCIRecoveryProtectedDatabase',
'Remove-OCIRecoveryProtectionPolicy',
'Remove-OCIRecoveryServiceSubnet',
'Update-OCIRecoveryProtectedDatabase',
'Update-OCIRecoveryProtectionPolicy',
'Update-OCIRecoveryServiceSubnet'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Recovery'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_49_95.ps1 | sample_49_95.ps1 | <#############################################################
# #
# Copyright (C) Microsoft Corporation. All rights reserved. #
# #
#############################################################>
Import-Module $PSScriptRoot\AzStackHci.Network.Helpers.psm1 -Force -DisableNameChecking -Global
Import-Module $PSScriptRoot\..\AzStackHci.EnvironmentChecker.Utilities.psm1 -Force -DisableNameChecking -Global
Import-Module $PSScriptRoot\..\AzStackHci.EnvironmentChecker.Reporting.psm1 -Force -DisableNameChecking -Global
Import-LocalizedData -BindingVariable lnTxt -FileName AzStackHci.Network.Strings.psd1
function Invoke-AzStackHciNetworkValidation
{
<#
.SYNOPSIS
Perform AzStackHci Network Validation
.DESCRIPTION
Perform AzStackHci Network Validation by attempting to ICMP and TCP ports 22 and 5896. No response from any test
consistutes a healthy result. The range is also validated for size and subnet.
.EXAMPLE
PS C:\> Invoke-AzStackHciNetworkValidation -StartingAddress 192.168.50.2 -EndingAddress 192.168.50.4
Perform Network validation against 192.168.50.2-192.168.50.4 from localhost.
.EXAMPLE
PS C:\> Invoke-AzStackHciNetworkValidation -AnswerFile C:\DeploymentData\AnswerFile.json
Perform Network validation against against the startingAddress and EndingAddress read from C:\DeploymentData\AnswerFile.json.
.INPUTS
Inputs (if any)
.OUTPUTS
Output (if any)
.LINK
https://docs.microsoft.com/en-us/azure-stack/hci/manage/use-environment-checker?tabs=network
#>
[CmdletBinding()]
param (
[Parameter(Mandatory = $true, ParameterSetName = 'Manual', HelpMessage = "Specify starting Management IP Range")]
[Parameter(Mandatory = $true, ParameterSetName = 'AddNode', HelpMessage = "Specify starting infra IP Range")]
[System.Net.IPAddress]
$StartingAddress,
[Parameter(Mandatory = $true, ParameterSetName = 'Manual', HelpMessage = "Specify end Management IP Range")]
[Parameter(Mandatory = $true, ParameterSetName = 'AddNode', HelpMessage = "Specify end infra IP Range")]
[System.Net.IPAddress]
$EndingAddress,
[Parameter(Mandatory = $true, ParameterSetName = 'AddNode', HelpMessage = "Specify the PsSession(s) used to validation from.")]
[System.Management.Automation.Runspaces.PSSession]
$PsSession,
[System.Management.Automation.Runspaces.PSSession[]]
$PsSessionAllNodes,
[Parameter(Mandatory = $true, ParameterSetName = 'AddNode', HelpMessage = "Run tests only for Add Node")]
[switch]
$AddNodeScenario,
[Parameter(Mandatory = $true, ParameterSetName = 'AddNode', HelpMessage = "Specify Host and Mgmt IP Mapping for Nodes")]
[Hashtable]
$NodeToManagementIPMap,
[Parameter(Mandatory = $true, ParameterSetName = 'AddNode', HelpMessage = "Specify First Adapter of Management Intent")]
[String]
$FirstAdapterName,
[Parameter(Mandatory = $true, ParameterSetName = 'AddNode', HelpMessage = "Specify Intent Name of Management Intent")]
[String]
$IntentName,
[Parameter(Mandatory = $false, HelpMessage = "Run tests specific to DHCP case")]
[switch]
$dhcpEnabled,
[Parameter(Mandatory = $true, ParameterSetName = 'AnswerFile', HelpMessage = "Specify full path to Deployment Answer File.")]
[ValidateScript({ Test-Path -Path $PSITEM <# should be full path to answer file #> })]
[string]
$AnswerFile,
[Parameter(Mandatory = $false, HelpMessage = "Return PSObject result.")]
[switch]
$PassThru,
[Parameter(Mandatory = $false, HelpMessage = "Tests to include.")]
[ArgumentCompleter({ Get-TestListByFunction -ModuleName AzStackHci.Network.Helpers })]
[ValidateScript({ $_ -in (Get-TestListByFunction -ModuleName AzStackHci.Network.Helpers) })]
[string[]]
$Include,
[Parameter(Mandatory = $false, HelpMessage = "Tests to exclude.")]
[ArgumentCompleter({ Get-TestListByFunction -ModuleName AzStackHci.Network.Helpers })]
[ValidateScript({ $_ -in (Get-TestListByFunction -ModuleName AzStackHci.Network.Helpers) })]
[string[]]
$Exclude,
[Parameter(Mandatory = $false, HelpMessage = "Directory path for log and report output")]
[string]$OutputPath,
[Parameter(Mandatory = $false, HelpMessage = "Remove all previous progress and create a clean report")]
[switch]$CleanReport = $false,
[Parameter(Mandatory = $false, HelpMessage = "Show only failed results on screen.")]
[switch]$ShowFailedOnly
)
try
{
$script:ErrorActionPreference = 'Stop'
Set-AzStackHciOutputPath -Path $OutputPath
Write-AzStackHciHeader -invocation $MyInvocation -params $PSBoundParameters -PassThru:$PassThru
#Test-ModuleUpdate -PassThru:$PassThru
# Call/Initialise reporting
$envcheckerReport = Get-AzStackHciEnvProgress -clean:$CleanReport
$envcheckerReport = Add-AzStackHciEnvJob -report $envcheckerReport
Import-Module $PSScriptRoot\AzStackHci.Network.Helpers.psm1 -Force -DisableNameChecking -Global
if ($AnswerFile)
{
$DeploymentData = Get-DeploymentData -Path $AnswerFile
$StartingAddress = $DeploymentData.InfrastructureNetwork.IpPools.StartingAddress
$EndingAddress = $DeploymentData.InfrastructureNetwork.IpPools.EndingAddress
$dhcpEnabled = $DeploymentData.InfrastructureNetwork.UseDHCP
if ([string]::IsNullOrEmpty($StartingAddress) -or [string]::IsNullOrEmpty($EndingAddress) -and $PassThru)
{
Log-Info $lnTxt.InvalidDeploymentData
return (New-Object PsObject -Property @{
Name = 'AzStackHci_Network_Test_AnswerFile'
Title = 'Test Answer File'
Severity = 'INFORMATIONAL'
Description = 'Test Answer File'
Remediation = 'https://learn.microsoft.com/en-us/azure-stack/hci/deploy/deployment-tool-checklist'
TargetResourceID = 'AnswerFile'
TargetResourceName = 'AnswerFile'
TargetResourceType = 'AnswerFile'
Timestamp = [datetime]::UtcNow
HealthCheckSource = $ENV:EnvChkrId
Status = 'Skipped'
AdditionalData = New-Object -TypeName PSObject -Property @{
Source = $ENV:COMPUTERNAME
Resource = 'AnswerFile'
Detail = 'Cannot find Management IP Range StartingAddress or EndingAddress'
Status = 'Skipped'
TimeStamp = [datetime]::UtcNow
}
})
}
}
Write-Progress -Id 1 -Activity "Checking AzStackHci Dependancies" -Status "Network Configuration" -PercentComplete 0 -ErrorAction SilentlyContinue
$TestList = Get-TestListByFunction -ModuleName AzStackHci.Network.Helpers
$script:envchktestList = Select-TestList -Include $Include -Exclude $Exclude -TestList $TestList
$TotalTestCount = ($script:envchktestList).Count
# Run validation
$i = 0
$Result = @()
$ProgressActivity = "Checking AzStackHci Network Compatibility"
$i = 0
$ProgressStatus = "Testing $ENV:ComputerName"
$progressParams = @{
Id = 1
Activity = $ProgressActivity
Status = $ProgressStatus
ErrorAction = 'SilentlyContinue'
}
Write-Progress @progressParams
if ($AddNodeScenario)
{
if ($dhcpEnabled)
{
$script:envchktestList = Select-TestList -TestList TestDHCPStatus
$TotalTestCount = ($script:envchktestList).Count
:noTestsBreak foreach ($test in $script:envchktestList)
{
$OpMsg = "Checking {0} on {1}" -f $test, $ENV:ComputerName
Log-Info -Message $OpMsg
Write-Progress @progressParams -CurrentOperation $OpMsg -PercentComplete (($i++ / $TotalTestCount) * 100)
$splat = @{
StartingAddress = $StartingAddress
EndingAddress = $EndingAddress
PSSession = $PsSession
}
$Result += Invoke-Expression "$test @splat"
}
}
else
{
$script:envchktestList = Select-TestList -TestList TestMgmtIPForNewNode
$TotalTestCount = ($script:envchktestList).Count
:noTestsBreak foreach ($test in $script:envchktestList)
{
$OpMsg = "Checking {0} on {1}" -f $test, $ENV:ComputerName
Log-Info -Message $OpMsg
Write-Progress @progressParams -CurrentOperation $OpMsg -PercentComplete (($i++ / $TotalTestCount) * 100)
$splat = @{
StartingAddress = $StartingAddress
EndingAddress = $EndingAddress
PSSession = $PsSession
NodeToManagementIPMap = $NodeToManagementIPMap
FirstAdapterName = $FirstAdapterName
IntentName = $IntentName
}
$Result += Invoke-Expression "$test @splat"
}
}
# The way the $AddNodeScenario tests are invoked are currently being refactored and this is temporary to invoke the tests.
$script:envchktestList = Select-TestList -TestList TestNetworkIntentStatus
$TotalTestCount = ($script:envchktestList).Count
:noTestsBreak foreach ($test in $script:envchktestList)
{
$OpMsg = "Checking {0} on {1}" -f $test, $ENV:ComputerName
Log-Info -Message $OpMsg
Write-Progress @progressParams -CurrentOperation $OpMsg -PercentComplete (($i++ / $TotalTestCount) * 100)
$splat = @{
PSSession = $PsSession
}
$Result += Invoke-Expression "$test @splat"
}
}
else
{
:noTestsBreak foreach ($test in $script:envchktestList)
{
$OpMsg = "Checking {0} on {1}" -f $test, $ENV:ComputerName
Log-Info -Message $OpMsg
Write-Progress @progressParams -CurrentOperation $OpMsg -PercentComplete (($i++ / $TotalTestCount) * 100)
$splat = @{
StartingAddress = $StartingAddress
EndingAddress = $EndingAddress
}
$Result += Invoke-Expression "$test @splat"
}
if ($dhcpEnabled)
{
$script:envchktestList = Select-TestList -TestList TestDHCPStatus
$TotalTestCount = ($script:envchktestList).Count
:noTestsBreak foreach ($test in $script:envchktestList)
{
$OpMsg = "Checking {0} on {1}" -f $test, $ENV:ComputerName
Log-Info -Message $OpMsg
Write-Progress @progressParams -CurrentOperation $OpMsg -PercentComplete (($i++ / $TotalTestCount) * 100)
$splat = @{
StartingAddress = $StartingAddress
EndingAddress = $EndingAddress
PSSession = $PsSessionAllNodes
}
$Result += Invoke-Expression "$test @splat"
}
}
}
# Feedback results - user scenario
Log-Info "Network Validation" -ConsoleOut:(-not $PassThru)
if (-not $PassThru)
{
$progressParams = @{
Id = 3
Activity = "Formating Results"
Status = "Writing Results for $($ENV:ComputerName)"
PercentComplete = 1
ErrorAction = 'SilentlyContinue'
}
Write-Progress @progressParams
Write-AzStackHciResult -Title "$($ENV:COMPUTERNAME):" -Result $result -ShowFailedOnly:$ShowFailedOnly -Seperator ': '
Write-Summary -Result $Result -Property1 Detail
}
else
{
return $result
}
}
catch
{
Log-Info -Message "" -ConsoleOut
Log-Info -Message "$($_.Exception.Message)" -ConsoleOut -Type Error
Log-Info -Message "$($_.ScriptStackTrace)" -ConsoleOut -Type Error
$cmdletFailed = $true
throw $_
}
finally
{
$Script:ErrorActionPreference = 'SilentlyContinue'
# Write result to telemetry channel
foreach ($r in $result)
{
Write-ETWResult -Result $r
}
# Write validation result to report object and close out report
$envcheckerReport | Add-Member -MemberType NoteProperty -Name 'Network' -Value $Result -Force
$envcheckerReport = Close-AzStackHciEnvJob -report $envcheckerReport
Write-AzStackHciEnvReport -report $envcheckerReport
Write-AzStackHciFooter -invocation $MyInvocation -Failed:$cmdletFailed -PassThru:$PassThru
}
}
# SIG # Begin signature block
# MIInvgYJKoZIhvcNAQcCoIInrzCCJ6sCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDBI0QrucoXiCsE
# rHswJMi4PAe6ETXdDfXm8Zk5UNbnx6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJOcgFPCvb3X8Vvtv79qhaRg
# gZfLelX3jrWunqflTmdLMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAm4cTLRJnnrEKwHvNO4ZXvQzd4XrT9qxy2MCTfW6PqN6xHKH/uv3c5Ir3
# DXJ942MHXRrSmz+79/JM424QPuAQl9uY+7UoNQwdusWxE+flr3JFZB5Xx1MGQ2vh
# 2KqaQoaZwoOkBM0AGAsvbpv7gKuJuhR8Kjh6MeMcFBvCHD80KxDs5bBBiowW+k4m
# cC+Upb3jnuFulnQVegQhw7guTWC0CjiM+t7zwTs8HsNxH1+77wC9UEYtgzXUAzhT
# +rHcu4PQUkgaad4hBHvF4Szuw83uw7A8/IeVbA4uSemJQ9atAmwZ2m/d/D1eZ/vW
# X5Udf6fBGFVW0Jauj4xdMxWqRL3/dqGCFygwghckBgorBgEEAYI3AwMBMYIXFDCC
# FxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFYBgsq
# hkiG9w0BCRABBKCCAUcEggFDMIIBPwIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAuYP2uIrtQzB5odtMgmHc+nM9TDh00Y9hVIxtYQYUV4AIGZbqjMw7x
# GBIyMDI0MDIxMjE0MDY0NC4yOVowBIACAfSggdikgdUwgdIxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs
# YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046
# M0JENC00QjgwLTY5QzMxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNl
# cnZpY2WgghF4MIIHJzCCBQ+gAwIBAgITMwAAAeWPasDzPbQLowABAAAB5TANBgkq
# hkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEw
# MTIxOTA3MzVaFw0yNTAxMTAxOTA3MzVaMIHSMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVy
# YXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjNCRDQtNEI4
# MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIIC
# IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqXvgOtq7Y7osusk7cfJO871p
# dqL/943I/kwtZmuZQY04kw/AwjTxX3MF9E81y5yt4hhLIkeOQwhQaa6HSs9Xn/b5
# QIsas3U/vuf1+r+Z3Ncw3UXOpo8d0oSUqd4lDxHpw/h2u7YbKaa3WusZw17zTQJw
# Pp3812iiaaR3X3pWo62NkUDVda74awUF5YeJ7P8+WWpwz95ae2RAyzSUrTOYJ8f4
# G7uLWH4UNFHwXtbNSv/szeOFV0+kB+rbNgIDxlUs2ASLNj68WaDH7MO65T8YKEMr
# uSUNwLD7+BWgS5I6XlyVCzJ1ZCMklftnbJX7UoLobUlWqk/d2ko8A//i502qlHkc
# h5vxNrUl+NFTNK/epKN7nL1FhP8CNY1hDuCx7O4NYz/xxnXWRyjUm9TI5DzH8kOQ
# wWpJHCPW/6ZzosoqWP/91YIb8fD2ml2VYlfqmwN6xC5BHsVXt4KpX+V9qOguk83H
# /3MXV2/zJcF3OZYk94KJ7ZdpCesAoOqUbfNe7H201CbPYv3pN3Gcg7Y4aZjEEABk
# Bagpua1gj4KLPgJjI7QWblndPjRrl3som5+0XoJOhxxz9Sn+OkV9CK0t+N3vVxL5
# wsJ6hD6rSfQgAu9X5pxsQ2i5I6uO/9C1jgUiMeUjnN0nMmcayRUnmjOGOLRhGxy/
# VbAkUC7LIIxC8t2Y910CAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTf/5+Hu01zMSJ8
# ReUJCAU5eAyHqjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNV
# HR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2Ny
# bC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYI
# KwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAy
# MDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMI
# MA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAM/rCE4WMPVp3waQQ
# n2gsG69+Od0zIZD1HgeAEpKU+3elrRdUtyKasmUOcoaAUGJbAjpc6DDzaF2iUOIw
# MEstZExMkdZV5RjWBThcHw44jEFz39DzfNvVzRFYS6mALjwj5v7bHZU2AYlSxAjI
# 9HY+JdCFPk/J6syBqD05Kh1CMXCk10aKudraulXbcRTAV47n7ehJfgl4I1m+DJQ7
# MqnIy+pVq5uj4aV/+mx9bm0hwyNlW3R6WzB+rSok1CChiKltpO+/vGaLFQkZNuLF
# iJ9PACK89wo116Kxma22zs4dsAzv3lm8otISpeJFSMNhnJ4fIDKwwQAtsiF1eAcS
# HrQqhnLOUFfPdXESKsTueG5w3Aza1WI6XAjsSR5TmG51y2dcIbnkm4zD/BvtzvVE
# qKZkD8peVamYG+QmQHQFkRLw4IYN37Nj9P0GdOnyyLfpOqXzhV+lh72IebLs+qrG
# owXYKfirZrSYQyekGu4MYT+BH1zxJUnae2QBHLlJ+W64n8wHrXJG9PWZTHeXKmk7
# bZ4+MGOfCgS9XFsONPWOF0w116864N4kbNEsr0c2ZMML5N1lCWP5UyAibxl4QhE0
# XShq+IX5BlxRktbNZtirrIOiTwRkoWJFHmi0GgYu9pgWnEFlQTyacsq4OVihuOvG
# HuWfCvFX98zLQX19KjYnEWa0uC0wggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZ
# AAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0
# ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVa
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEF
# AAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1
# V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9
# alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmv
# Haus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928
# jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3t
# pK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEe
# HT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26o
# ElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4C
# vEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ug
# poMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXps
# xREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0C
# AwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYE
# FCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtT
# NRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNo
# dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5o
# dG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBD
# AEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZW
# y4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5t
# aWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAt
# MDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0y
# My5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pc
# FLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpT
# Td2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0j
# VOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3
# +SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmR
# sqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSw
# ethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5b
# RAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmx
# aQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsX
# HRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0
# W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0
# HVUzWLOhcGbyoYIC1DCCAj0CAQEwggEAoYHYpIHVMIHSMQswCQYDVQQGEwJVUzET
# MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
# TWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFu
# ZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjNC
# RDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2
# aWNloiMKAQEwBwYFKw4DAhoDFQD3jaIa5gWuwTjDNYN3zkSkzpGLCqCBgzCBgKR+
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA
# 6XRIujAiGA8yMDI0MDIxMjE1MzUyMloYDzIwMjQwMjEzMTUzNTIyWjB0MDoGCisG
# AQQBhFkKBAExLDAqMAoCBQDpdEi6AgEAMAcCAQACAgwtMAcCAQACAhPfMAoCBQDp
# dZo6AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMH
# oSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAnj+yKn7+pzUTmB0iYm6O
# dGarMaTThkCXA354Q7meDEr+2FRhQtN1LFL569U0sE2u9Nq6wjKsLjnlAjbT1WLL
# 1VwwJjPkkyqrg7XTUch/MEZf9ZWwJLqyoAhLMdF//W4aRtoECn1t/I5HuGMzqYM2
# eNJLWRhxC67wLM9RxYiCvf0xggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzET
# MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
# TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T
# dGFtcCBQQ0EgMjAxMAITMwAAAeWPasDzPbQLowABAAAB5TANBglghkgBZQMEAgEF
# AKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEi
# BCDDMRWIGWikL/mxKkpNLtOTbQKq2dOhn8RQujNQEHCYIzCB+gYLKoZIhvcNAQkQ
# Ai8xgeowgecwgeQwgb0EIBWp0//+qPEYWF7ZhugRd5vwj+kCh/TULCFvFQf1Tr3t
# MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm
# MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHlj2rA
# 8z20C6MAAQAAAeUwIgQgTf7TSmFxgtZyZCzWMNj/KmqIcvbkP2KCw2VDtkHjj8Aw
# DQYJKoZIhvcNAQELBQAEggIAcwdpfAx4RVxTFOEuIoewYxwQnQlUsvWkV296//w4
# g517LymdlNFZSUjyqdB9SbOwbIW+fzKb5N4GyQiUft4ac7Vb5fMSslLroFsAXEey
# YuVc3UhEjRo/uNgXcBq295pWPoorJ7+dVnHQ97S04i4a/1nt2GORz5Kd6fhoHS4X
# SVRBlj3gNGvjX6PeMehuFCuoeTMf15xn2PWW6Bmxp7hQOY6foyzfGusNZxza8RrK
# PTLX09YA+1qlskLIghlmpQtwXEEJIWed7fuhX+t1UrWEItmojq0y4s16x+qBp+Zy
# UzMWdB/9RYlIC7T98j84oUWXei+ZYWhKo3IS8nirs6ooRiPilBZZ4oWxVyKsGMIL
# guxBUfMYkba5pdoxSF/tCgM/nPJf8c9de4bp02PIh+2X9q8+YWAaw20QtO7aBbof
# dqkEfXuGnZOHJiDQERZDHaq/yjNgexNeqQ03mVEe91DNL0cQ8L+Hspss9LG+Mu/K
# K0FAa5XBCd/p/r1mUXKMgprC7f4wxk/5VRkKyOBkJw75UiAmxIW5BLFN2nMfK3bf
# 1ZNVtixZv82nJZOqH+9FbZaJ2dXyOJWiJrFN5Wc+8q4Cya2NGlvTVnFKf7PB36k9
# cYW3t1YTVhFMsoXMael54hxheRw4DOw8ZPwUo8r6d4ROWLyh66bKTdzzDO+JQI3U
# XbU=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_14_44.ps1 | sample_14_44.ps1 | #########################################################################################
#
# Copyright (c) Microsoft Corporation. All rights reserved.
#
# Localized PackageManagement.Resources.psd1
#
#########################################################################################
ConvertFrom-StringData @'
###PSLOC
OldPowerShellCoreVersion=PackageManagement no longer supports PowerShell Core '{0}'. Please install the latest version of PowerShell Core from 'https://aka.ms/i6t6o3' and try again.
###PSLOC
'@
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBIBsoYrH/WngZG
# wcwl3oPmFWjeg9nVV4OusKRd1BszsaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEII0Mq4L3/1947bwnMVvGP5Dm
# wbb971etV96SBKgFIvZRMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAv05NsqhGTHODmsdhSMJG+E6/ok8HlhNVykU58NINPj2HMzn3YaN21+Tk
# JARZwQygvyQJ97JTITRPoCxx5H0kVbCj72rFclIJ4Tg2Ssge2XkWYD9NY2kf9gvw
# YsuVJY6ar9R6uP+CRrgEru8UaDpEO44ut2bzMnUOsGmMT9rh0ZLGYBBpZqDETKN3
# dwgHEmGHG6eixzbQoPt2Lrn0WHqQpTc0HKz4RfHdJ/eGBL61TJ0VCohZ1kZJwjr2
# 2JPQ1VvMhCf6Y+bASEGsSq+qkgW89joei6n+LYa5xBXahRR/75iRDA2kN9L1TOxr
# YGO/DcRBHNKU1M+L4YjAk8hPkk17vKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDRUUUUcSgOtzC0Pl2qnRID1w+g3TXbm+L6/SqZ+Mc/fAIGZh/+trf1
# GBMyMDI0MDQyMzAyMjQxMS4wMjFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# Ojg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4NkRGLTRC
# QkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKhOA5RE6i53nHURH4lnfKLp
# +9JvipuTtctairCxMUSrPSy5CWK2DtriQP+T52HXbN2g7AktQ1pQZbTDGFzK6d03
# vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzIHHLaiAaobE5vFJuoxZ0ZWdKMCs8acjhH
# UmfaY+79/CR7uN+B4+xjJqwvdpU/mp0mAq3earyH+AKmv6lkrQN8zgrcbCgHwsqv
# vqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5EW6NVnXMYOTRKuGPfyfBKdShualLo88k
# G7qa2mbA5l77+X06JAesMkoyYr4/9CgDFjHUpcHSODujlFBKMi168zRdLerdpW0b
# BX9EDux2zBMMaEK8NyxawCEuAq7++7ktFAbl3hUKtuzYC1FUZuUl2Bq6U17S4CKs
# qR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5gpv+YcvBM834bXFNwytd3ujDD24P9Dd8
# xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSvtFVi5Sa/ubGuYEpS8gF6GDWN5/KbveFk
# dsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zljEjKz5WW7BA4wpmFm24fhBmRjV4Nbp+n7
# 8cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnSeOXePT6hMF0Il598LMu0rw35ViUWcAQk
# UNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUbqL1toyPUdpF
# yyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAC5U2bINLgXIHWbM
# cqVuf9jkUT/K8zyLBvu5h8JrqYR2z/eaO2yo1Ooc9Shyvxbe9GZDu7kkUzxSyJ1I
# ZksZZw6FDq6yZNT3PEjAEnREpRBL8S+mbXg+O4VLS0LSmb8XIZiLsaqZ0fDEcv3H
# eA+/y/qKnCQWkXghpaEMwGMQzRkhGwcGdXr1zGpQ7HTxvfu57xFxZX1MkKnWFENJ
# 6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+zvGJNAF+5/5qBk7nr079zICbFXvxtidN
# N5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+OdAquBiDkYQ5kVfUMKS31yHQOGgmFxuCO
# zTpWHalrqpdIllsy8KNsj5U9sONiWAd9PNlyEHHbQZDmi9/BNlOYyTt0YehLbDov
# mZUNazk79Od/A917mqCdTqrExwBGUPbMP+/vdYUqaJspupBnUtjOf/76DAhVy8e/
# e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM9Rm6hUDBBkvYh+YjmGdcQ5HB6WT9Rec8
# +qDHmbhLhX4Zdaard5/OXeLbgx2f7L4QQQj3KgqjqDOWInVhNE1gYtTWLHe4882d
# /k7Lui0K1g8EZrKD7maOrsJLKPKlegceJ9FCqY1sDUKUhRa0EHUW+ZkKLlohKrS7
# FwjdrINWkPBgbQznCjdE2m47QjTbMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4
# NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUANiNHGWXbNaDPxnyiDbEOciSjFhCggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnRFEQwIhgPMjAyNDA0MjMwMDUyMjBaGA8yMDI0MDQyNDAwNTIyMFowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6dEURAIBADAHAgEAAgIOQzAHAgEAAgIR1jAKAgUA
# 6dJlxAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBANdnZOSIIMBRYn0pdmlC
# RnUyMIFBhpIvigsVwLH42J10gzWhU2iR9/7pEgonmmvqfkG2WL+d7CEG4UTjoKlZ
# 0znQMwxTT3N4CogAKkpGPfzhAfGcl9ec9j3MJe6BHbNKKpmY1JVCvkgkGxw1aKzM
# NWAb3IqSU7EBKc1X54nd6Z2kMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgyDMY68xAPeHuYhZc2DocGGiKx1PqYt75sB/2jnL1ipgwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCBh/w4tmmWsT3iZnHtH0Vk37UCN02lRxY+RiON6wDFj
# ZjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3V1X
# HZXUraobAAEAAAHdMCIEINt6H1rJgdi09+q84rzbg7gG/YnDpB173rorwOkM/XrI
# MA0GCSqGSIb3DQEBCwUABIICADuBrtT+idU8nUbRVjI1LBcgjK0W4qlVvUSbklSW
# 5KnF6c0vxrz/9TLPOQOtqO0cDCqvsNNq3/r02DO8K1cnRqnCGOX53U80dBCgx+Hy
# 28IUKGexslj5bVSXhVkq1sEup4ftgbFjjrpKLJlirKRVMvj1aoSNwwutUTQHEEO8
# PTCV3FasSuFqukdj4tDyG1NY6ykhB2AGwrD0gsni+twnQZrupbQhQ6SGoqcVDfb7
# 9mdX6QCHdVUmRTJdVAwEPD8nY86QbM9kkrCrX7QUwJEDYtpGvIouTTQ1SlzSGH8V
# +WCOKbgSMjUdK68g1A333iKAJnMr+5rN5pKw+/wRzgmeLfzy34kmxLFR4v938fJX
# 3LfIoSsnlgeJdhRoE5gnxX0Q209n+RNJu2bKUqEMvraPNq+4WEVBNDa5TAKS4PJ4
# vTXmKQp6YPfyh1suAjrX5N63mHOpBhNrCGtoKKc5zb5xs24elmcrs9V5aHRNupH9
# TOYN90/j6ebYJbEyIiWcJllgt6tXlAKa0FBzDtIVpain7/VKMr4vtJhjwFK9kjng
# 9KyFI92KS8UYDQI/nKYOG7pHJU0OpcnHXjOl+WjwXpAfZ0yr7Q/Imw+Oi8AmWWDh
# M4qeUCPbTnGBP1q/wHQ1ER/MKDuO9sHYrknknyzmTwkqpq/W0dxXBkS604YzEJHA
# +p8U
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_15_99.ps1 | sample_15_99.ps1 | ## Copyright (c) Microsoft Corporation. All rights reserved.
<#
.SYNOPSIS
This cmdlet collects a performance recording of Microsoft Defender Antivirus
scans.
.DESCRIPTION
This cmdlet collects a performance recording of Microsoft Defender Antivirus
scans. These performance recordings contain Microsoft-Antimalware-Engine
and NT kernel process events and can be analyzed after collection using the
Get-MpPerformanceReport cmdlet.
This cmdlet requires elevated administrator privileges.
The performance analyzer provides insight into problematic files that could
cause performance degradation of Microsoft Defender Antivirus. This tool is
provided "AS IS", and is not intended to provide suggestions on exclusions.
Exclusions can reduce the level of protection on your endpoints. Exclusions,
if any, should be defined with caution.
.EXAMPLE
New-MpPerformanceRecording -RecordTo:.\Defender-scans.etl
#>
function New-MpPerformanceRecording {
[CmdletBinding(DefaultParameterSetName='Interactive')]
param(
# Specifies the location where to save the Microsoft Defender Antivirus
# performance recording.
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$RecordTo,
# Specifies the duration of the performance recording in seconds.
[Parameter(Mandatory=$true, ParameterSetName='Timed')]
[ValidateRange(0,2147483)]
[int]$Seconds,
# Specifies the PSSession object in which to create and save the Microsoft
# Defender Antivirus performance recording. When you use this parameter,
# the RecordTo parameter refers to the local path on the remote machine.
[Parameter(Mandatory=$false)]
[System.Management.Automation.Runspaces.PSSession[]]$Session,
# Optional argument to specifiy a different tool for recording traces. Default is wpr.exe
# When $Session parameter is used this path represents a location on the remote machine.
[Parameter(Mandatory=$false)]
[string]$WPRPath = $null
)
[bool]$interactiveMode = ($PSCmdlet.ParameterSetName -eq 'Interactive')
[bool]$timedMode = ($PSCmdlet.ParameterSetName -eq 'Timed')
# Hosts
[string]$powerShellHostConsole = 'ConsoleHost'
[string]$powerShellHostISE = 'Windows PowerShell ISE Host'
[string]$powerShellHostRemote = 'ServerRemoteHost'
if ($interactiveMode -and ($Host.Name -notin @($powerShellHostConsole, $powerShellHostISE, $powerShellHostRemote))) {
$ex = New-Object System.Management.Automation.ItemNotFoundException 'Cmdlet supported only on local PowerShell console, Windows PowerShell ISE and remote PowerShell console.'
$category = [System.Management.Automation.ErrorCategory]::NotImplemented
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotImplemented',$category,$Host.Name
$psCmdlet.WriteError($errRecord)
return
}
if ($null -ne $Session) {
[int]$RemotedSeconds = if ($timedMode) { $Seconds } else { -1 }
Invoke-Command -Session:$session -ArgumentList:@($RecordTo, $RemotedSeconds) -ScriptBlock:{
param(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$RecordTo,
[Parameter(Mandatory=$true)]
[ValidateRange(-1,2147483)]
[int]$RemotedSeconds
)
if ($RemotedSeconds -eq -1) {
New-MpPerformanceRecording -RecordTo:$RecordTo -WPRPath:$WPRPath
} else {
New-MpPerformanceRecording -RecordTo:$RecordTo -Seconds:$RemotedSeconds -WPRPath:$WPRPath
}
}
return
}
if (-not (Test-Path -LiteralPath:$RecordTo -IsValid)) {
$ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot record Microsoft Defender Antivirus performance recording to path '$RecordTo' because the location does not exist."
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidPath',$category,$RecordTo
$psCmdlet.WriteError($errRecord)
return
}
# Resolve any relative paths
$RecordTo = $psCmdlet.SessionState.Path.GetUnresolvedProviderPathFromPSPath($RecordTo)
# Dependencies: WPR Profile
[string]$wprProfile = "$PSScriptRoot\MSFT_MpPerformanceRecording.wprp"
if (-not (Test-Path -LiteralPath:$wprProfile -PathType:Leaf)) {
$ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency file '$wprProfile' because it does not exist."
$category = [System.Management.Automation.ErrorCategory]::ObjectNotFound
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprProfile
$psCmdlet.WriteError($errRecord)
return
}
# Dependencies: WPR Version
try
{
# If user provides a valid string as $WPRPath we go with that.
[string]$wprCommand = $WPRPath
if (!$wprCommand) {
$wprCommand = "wpr.exe"
$wprs = @(Get-Command -All "wpr" 2> $null)
if ($wprs -and ($wprs.Length -ne 0)) {
$latestVersion = [System.Version]"0.0.0.0"
$wprs | ForEach-Object {
$currentVersion = $_.Version
$currentFullPath = $_.Source
$currentVersionString = $currentVersion.ToString()
Write-Host "Found $currentVersionString at $currentFullPath"
if ($currentVersion -gt $latestVersion) {
$latestVersion = $currentVersion
$wprCommand = $currentFullPath
}
}
}
}
}
catch
{
# Fallback to the old ways in case we encounter an error (ex: version string format change).
[string]$wprCommand = "wpr.exe"
}
finally
{
Write-Host "`nUsing $wprCommand version $((Get-Command $wprCommand).FileVersionInfo.FileVersion)`n"
}
#
# Test dependency presence
#
if (-not (Get-Command $wprCommand -ErrorAction:SilentlyContinue)) {
$ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find dependency command '$wprCommand' because it does not exist."
$category = [System.Management.Automation.ErrorCategory]::ObjectNotFound
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$wprCommand
$psCmdlet.WriteError($errRecord)
return
}
# Exclude versions that have known bugs or are not supported any more.
[int]$wprFileVersion = ((Get-Command $wprCommand).Version.Major) -as [int]
if ($wprFileVersion -le 6) {
$ex = New-Object System.Management.Automation.PSNotSupportedException "You are using an older and unsupported version of '$wprCommand'. Please download and install Windows ADK:`r`nhttps://docs.microsoft.com/en-us/windows-hardware/get-started/adk-install`r`nand try again."
$category = [System.Management.Automation.ErrorCategory]::NotInstalled
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'NotSupported',$category,$wprCommand
$psCmdlet.WriteError($errRecord)
return
}
function CancelPerformanceRecording {
Write-Host "`n`nCancelling Microsoft Defender Antivirus performance recording... " -NoNewline
& $wprCommand -cancel -instancename MSFT_MpPerformanceRecording
$wprCommandExitCode = $LASTEXITCODE
switch ($wprCommandExitCode) {
0 {}
0xc5583000 {
Write-Error "Cannot cancel performance recording because currently Windows Performance Recorder is not recording."
return
}
default {
Write-Error ("Cannot cancel performance recording: 0x{0:x08}." -f $wprCommandExitCode)
return
}
}
Write-Host "ok.`n`nRecording has been cancelled."
}
#
# Ensure Ctrl-C doesn't abort the app without cleanup
#
# - local PowerShell consoles: use [Console]::TreatControlCAsInput; cleanup performed and output preserved
# - PowerShell ISE: use try { ... } catch { throw } finally; cleanup performed and output preserved
# - remote PowerShell: use try { ... } catch { throw } finally; cleanup performed but output truncated
[bool]$canTreatControlCAsInput = $interactiveMode -and ($Host.Name -eq $powerShellHostConsole)
$savedControlCAsInput = $null
$shouldCancelRecordingOnTerminatingError = $false
try
{
if ($canTreatControlCAsInput) {
$savedControlCAsInput = [Console]::TreatControlCAsInput
[Console]::TreatControlCAsInput = $true
}
#
# Start recording
#
Write-Host "Starting Microsoft Defender Antivirus performance recording... " -NoNewline
$shouldCancelRecordingOnTerminatingError = $true
& $wprCommand -start "$wprProfile!Scans.Light" -filemode -instancename MSFT_MpPerformanceRecording
$wprCommandExitCode = $LASTEXITCODE
switch ($wprCommandExitCode) {
0 {}
0xc5583001 {
$shouldCancelRecordingOnTerminatingError = $false
Write-Error "Cannot start performance recording because Windows Performance Recorder is already recording."
return
}
default {
$shouldCancelRecordingOnTerminatingError = $false
Write-Error ("Cannot start performance recording: 0x{0:x08}." -f $wprCommandExitCode)
return
}
}
Write-Host "ok.`n`nRecording has started." -NoNewline
if ($timedMode) {
Write-Host "`n`n Recording for $Seconds seconds... " -NoNewline
Start-Sleep -Seconds:$Seconds
Write-Host "ok." -NoNewline
} elseif ($interactiveMode) {
$stopPrompt = "`n`n=> Reproduce the scenario that is impacting the performance on your device.`n`n Press <ENTER> to stop and save recording or <Ctrl-C> to cancel recording"
if ($canTreatControlCAsInput) {
Write-Host "${stopPrompt}: "
do {
$key = [Console]::ReadKey($true)
if (($key.Modifiers -eq [ConsoleModifiers]::Control) -and (($key.Key -eq [ConsoleKey]::C))) {
CancelPerformanceRecording
$shouldCancelRecordingOnTerminatingError = $false
#
# Restore Ctrl-C behavior
#
[Console]::TreatControlCAsInput = $savedControlCAsInput
return
}
} while (($key.Modifiers -band ([ConsoleModifiers]::Alt -bor [ConsoleModifiers]::Control -bor [ConsoleModifiers]::Shift)) -or ($key.Key -ne [ConsoleKey]::Enter))
} else {
Read-Host -Prompt:$stopPrompt
}
}
#
# Stop recording
#
Write-Host "`n`nStopping Microsoft Defender Antivirus performance recording... "
& $wprCommand -stop $RecordTo -instancename MSFT_MpPerformanceRecording
$wprCommandExitCode = $LASTEXITCODE
switch ($wprCommandExitCode) {
0 {
$shouldCancelRecordingOnTerminatingError = $false
}
0xc5583000 {
$shouldCancelRecordingOnTerminatingError = $false
Write-Error "Cannot stop performance recording because Windows Performance Recorder is not recording a trace."
return
}
default {
Write-Error ("Cannot stop performance recording: 0x{0:x08}." -f $wprCommandExitCode)
return
}
}
Write-Host "ok.`n`nRecording has been saved to '$RecordTo'."
Write-Host `
'
The performance analyzer provides insight into problematic files that could
cause performance degradation of Microsoft Defender Antivirus. This tool is
provided "AS IS", and is not intended to provide suggestions on exclusions.
Exclusions can reduce the level of protection on your endpoints. Exclusions,
if any, should be defined with caution.
'
Write-Host `
'
The trace you have just captured may contain personally identifiable information,
including but not necessarily limited to paths to files accessed, paths to
registry accessed and process names. Exact information depends on the events that
were logged. Please be aware of this when sharing this trace with other people.
'
} catch {
throw
} finally {
if ($shouldCancelRecordingOnTerminatingError) {
CancelPerformanceRecording
}
if ($null -ne $savedControlCAsInput) {
#
# Restore Ctrl-C behavior
#
[Console]::TreatControlCAsInput = $savedControlCAsInput
}
}
}
function PadUserDateTime
{
[OutputType([DateTime])]
param(
[Parameter(Mandatory = $true, Position = 0)]
[DateTime]$UserDateTime
)
# Padding user input to include all events up to the start of the next second.
if (($UserDateTime.Ticks % 10000000) -eq 0)
{
return $UserDateTime.AddTicks(9999999)
}
else
{
return $UserDateTime
}
}
function ValidateTimeInterval
{
[OutputType([PSCustomObject])]
param(
[DateTime]$MinStartTime = [DateTime]::MinValue,
[DateTime]$MinEndTime = [DateTime]::MinValue,
[DateTime]$MaxStartTime = [DateTime]::MaxValue,
[DateTime]$MaxEndTime = [DateTime]::MaxValue
)
$ret = [PSCustomObject]@{
arguments = [string[]]@()
status = $false
}
if ($MinStartTime -gt $MaxEndTime)
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxEndTime '$MaxEndTime'"
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxEndTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
if ($MinStartTime -gt $MaxStartTime)
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' should have been lower than MaxStartTime '$MaxStartTime'"
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinStartTime' .. '$MaxStartTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
if ($MinEndTime -gt $MaxEndTime)
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' should have been lower than MaxEndTime '$MaxEndTime'"
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Invalid time interval',$category,"'$MinEndTime' .. '$MaxEndTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
if ($MinStartTime -gt [DateTime]::MinValue)
{
try
{
$MinStartFileTime = $MinStartTime.ToFileTime()
}
catch
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MinStartTime '$MinStartTime' is not a valid timestamp."
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinStartTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
$ret.arguments += @('-MinStartTime', $MinStartFileTime)
}
if ($MaxEndTime -lt [DateTime]::MaxValue)
{
try
{
$MaxEndFileTime = $MaxEndTime.ToFileTime()
}
catch
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MaxEndTime '$MaxEndTime' is not a valid timestamp."
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxEndTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
$ret.arguments += @('-MaxEndTime', $MaxEndFileTime)
}
if ($MaxStartTime -lt [DateTime]::MaxValue)
{
try
{
$MaxStartFileTime = $MaxStartTime.ToFileTime()
}
catch
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MaxStartTime '$MaxStartTime' is not a valid timestamp."
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MaxStartTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
$ret.arguments += @('-MaxStartTime', $MaxStartFileTime)
}
if ($MinEndTime -gt [DateTime]::MinValue)
{
try
{
$MinEndFileTime = $MinEndTime.ToFileTime()
}
catch
{
$ex = New-Object System.Management.Automation.ValidationMetadataException "MinEndTime '$MinEndTime' is not a valid timestamp."
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'Value has to be a local DateTime between "January 1, 1601 12:00:00 AM UTC" and "December 31, 9999 11:59:59 PM UTC"',$category,"'$MinEndTime'"
$psCmdlet.WriteError($errRecord)
return $ret
}
$ret.arguments += @('-MinEndTime', $MinEndFileTime)
}
$ret.status = $true
return $ret
}
function ParseFriendlyDuration
{
[OutputType([TimeSpan])]
param(
[Parameter(Mandatory = $true, Position = 0)]
[string]
$FriendlyDuration
)
if ($FriendlyDuration -match '^(\d+)(?:\.(\d+))?(sec|ms|us)$')
{
[string]$seconds = $Matches[1]
[string]$decimals = $Matches[2]
[string]$unit = $Matches[3]
[uint32]$magnitude =
switch ($unit)
{
'sec' {7}
'ms' {4}
'us' {1}
}
if ($decimals.Length -gt $magnitude)
{
throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration: $($decimals.Length) decimals specified for time unit '$unit'; at most $magnitude expected.")
}
return [timespan]::FromTicks([int64]::Parse($seconds + $decimals.PadRight($magnitude, '0')))
}
[timespan]$result = [timespan]::FromTicks(0)
if ([timespan]::TryParse($FriendlyDuration, [ref]$result))
{
return $result
}
throw [System.ArgumentException]::new("String '$FriendlyDuration' was not recognized as a valid Duration; expected a value like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan.")
}
[scriptblock]$FriendlyTimeSpanToString = { '{0:0.0000}ms' -f ($this.Ticks / 10000.0) }
function New-FriendlyTimeSpan
{
param(
[Parameter(Mandatory = $true)]
[uint64]$Ticks,
[bool]$Raw = $false
)
if ($Raw) {
return $Ticks
}
$result = [TimeSpan]::FromTicks($Ticks)
$result.PsTypeNames.Insert(0, 'MpPerformanceReport.TimeSpan')
$result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyTimeSpanToString
$result
}
function New-FriendlyDateTime
{
param(
[Parameter(Mandatory = $true)]
[uint64]$FileTime,
[bool]$Raw = $false
)
if ($Raw) {
return $FileTime
}
[DateTime]::FromFileTime($FileTime)
}
function Add-DefenderCollectionType
{
param(
[Parameter(Mandatory = $true)]
[ref]$CollectionRef
)
if ($CollectionRef.Value.Length -and ($CollectionRef.Value | Get-Member -Name:'Processes','Files','Extensions','Scans','Folder'))
{
$CollectionRef.Value.PSTypeNames.Insert(0, 'MpPerformanceReport.NestedCollection')
}
}
[scriptblock]$FriendlyScanInfoToString = {
[PSCustomObject]@{
ScanType = $this.ScanType
StartTime = $this.StartTime
EndTime = $this.EndTime
Duration = $this.Duration
Reason = $this.Reason
Path = $this.Path
ProcessPath = $this.ProcessPath
ProcessId = $this.ProcessId
Image = $this.Image
}
}
function Get-ScanComments
{
param(
[PSCustomObject[]]$SecondaryEvents,
[bool]$Raw = $false
)
$Comments = @()
foreach ($item in @($SecondaryEvents | Sort-Object -Property:StartTime)) {
if (($item | Get-Member -Name:'Message' -MemberType:NoteProperty).Count -eq 1) {
if (($item | Get-Member -Name:'Duration' -MemberType:NoteProperty).Count -eq 1) {
$Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw
$StartTime = New-FriendlyDateTime -FileTime:$item.StartTime -Raw:$Raw
$Comments += "Expensive operation `"{0}`" started at {1} lasted {2}" -f ($item.Message, $StartTime, $Duration.ToString())
if (($item | Get-Member -Name:'Debug' -MemberType:NoteProperty).Count -eq 1) {
$item.Debug | ForEach-Object {
if ($_.EndsWith("is NOT trusted") -or $_.StartsWith("Not trusted, ") -or $_.ToLower().Contains("error") -or $_.Contains("Result of ValidateTrust")) {
$Comments += "$_"
}
}
}
}
else {
if ($item.Message.Contains("subtype=Lowfi")) {
$Comments += $item.Message.Replace("subtype=Lowfi", "Low-fidelity detection")
}
else {
$Comments += $item.Message
}
}
}
elseif (($item | Get-Member -Name:'ScanType' -MemberType:NoteProperty).Count -eq 1) {
$Duration = New-FriendlyTimeSpan -Ticks:$item.Duration -Raw:$Raw
$OpId = "Internal opertion"
if (($item | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) {
$OpId = $item.Path
}
elseif (($item | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) {
$OpId = $item.ProcessPath
}
$Comments += "{0} {1} lasted {2}" -f ($item.ScanType, $OpId, $Duration.ToString())
}
}
$Comments
}
filter ConvertTo-DefenderScanInfo
{
param(
[bool]$Raw = $false
)
$result = [PSCustomObject]@{
ScanType = [string]$_.ScanType
StartTime = New-FriendlyDateTime -FileTime:$_.StartTime -Raw:$Raw
EndTime = New-FriendlyDateTime -FileTime:$_.EndTime -Raw:$Raw
Duration = New-FriendlyTimeSpan -Ticks:$_.Duration -Raw:$Raw
Reason = [string]$_.Reason
SkipReason = [string]$_.SkipReason
}
if (($_ | Get-Member -Name:'Path' -MemberType:NoteProperty).Count -eq 1) {
$result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:([string]$_.Path)
}
if (($_ | Get-Member -Name:'ProcessPath' -MemberType:NoteProperty).Count -eq 1) {
$result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:([string]$_.ProcessPath)
}
if (($_ | Get-Member -Name:'Image' -MemberType:NoteProperty).Count -eq 1) {
$result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]$_.Image)
}
elseif ($_.ProcessPath -and (-not $_.ProcessPath.StartsWith("pid"))) {
try {
$result | Add-Member -NotePropertyName:'Image' -NotePropertyValue:([string]([System.IO.FileInfo]$_.ProcessPath).Name)
} catch {
# Silently ignore.
}
}
$ProcessId = if ($_.ProcessId -gt 0) { [int]$_.ProcessId } elseif ($_.ScannedProcessId -gt 0) { [int]$_.ScannedProcessId } else { $null }
if ($ProcessId) {
$result | Add-Member -NotePropertyName:'ProcessId' -NotePropertyValue:([int]$ProcessId)
}
if ($result.Image -and $result.ProcessId) {
$ProcessName = "{0} ({1})" -f $result.Image, $result.ProcessId
$result | Add-Member -NotePropertyName:'ProcessName' -NotePropertyValue:([string]$ProcessName)
}
if ((($_ | Get-Member -Name:'Extra' -MemberType:NoteProperty).Count -eq 1) -and ($_.Extra.Count -gt 0)) {
$Comments = @(Get-ScanComments -SecondaryEvents:$_.Extra -Raw:$Raw)
$result | Add-Member -NotePropertyName:'Comments' -NotePropertyValue:$Comments
}
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanInfo')
}
$result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScanInfoToString
$result
}
filter ConvertTo-DefenderScanOverview
{
param(
[bool]$Raw = $false
)
$vals = [ordered]@{}
foreach ($entry in $_.PSObject.Properties) {
if ($entry.Value) {
$Key = $entry.Name.Replace("_", " ")
if ($Key.EndsWith("Time")) {
$vals[$Key] = New-FriendlyDateTime -FileTime:$entry.Value -Raw:$Raw
}
elseif ($Key.EndsWith("Duration")) {
$vals[$Key] = New-FriendlyTimeSpan -Ticks:$entry.Value -Raw:$Raw
}
else {
$vals[$Key] = $entry.Value
}
}
}
# Remove duplicates
if (($_ | Get-Member -Name:'PerfHints' -MemberType:NoteProperty).Count -eq 1) {
$hints = [ordered]@{}
foreach ($hint in $_.PerfHints) {
$hints[$hint] = $true
}
$vals["PerfHints"] = @($hints.Keys)
}
$result = New-Object PSCustomObject -Property:$vals
$result
}
filter ConvertTo-DefenderScanStats
{
param(
[bool]$Raw = $false
)
$result = [PSCustomObject]@{
Count = $_.Count
TotalDuration = New-FriendlyTimeSpan -Ticks:$_.TotalDuration -Raw:$Raw
MinDuration = New-FriendlyTimeSpan -Ticks:$_.MinDuration -Raw:$Raw
AverageDuration = New-FriendlyTimeSpan -Ticks:$_.AverageDuration -Raw:$Raw
MaxDuration = New-FriendlyTimeSpan -Ticks:$_.MaxDuration -Raw:$Raw
MedianDuration = New-FriendlyTimeSpan -Ticks:$_.MedianDuration -Raw:$Raw
}
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScanStats')
}
$result
}
[scriptblock]$FriendlyScannedFilePathStatsToString = {
[PSCustomObject]@{
Count = $this.Count
TotalDuration = $this.TotalDuration
MinDuration = $this.MinDuration
AverageDuration = $this.AverageDuration
MaxDuration = $this.MaxDuration
MedianDuration = $this.MedianDuration
Path = $this.Path
}
}
filter ConvertTo-DefenderScannedFilePathStats
{
param(
[bool]$Raw = $false
)
$result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFilePathStats')
}
$result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path)
$result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFilePathStatsToString
if ($null -ne $_.Scans)
{
$result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@(
$_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans)
}
}
if ($null -ne $_.Processes)
{
$result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@(
$_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes)
}
}
$result
}
[scriptblock]$FriendlyScannedPathsStatsToString = {
[PSCustomObject]@{
Count = $this.Count
TotalDuration = $this.TotalDuration
MinDuration = $this.MinDuration
AverageDuration = $this.AverageDuration
MaxDuration = $this.MaxDuration
MedianDuration = $this.MedianDuration
Path = $this.Path
Folder = $this.Folder
}
}
filter ConvertTo-DefenderScannedPathsStats
{
param(
[bool]$Raw = $false
)
$result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedPathStats')
}
$result | Add-Member -NotePropertyName:'Path' -NotePropertyValue:($_.Path)
if ($null -ne $_.Folder)
{
$result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@(
$_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw
)
$result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedPathsStatsToString
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder)
}
}
if ($null -ne $_.Files)
{
$result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@(
$_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Files)
}
}
if ($null -ne $_.Scans)
{
$result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@(
$_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans)
}
}
if ($null -ne $_.Processes)
{
$result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@(
$_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes)
}
}
$result
}
[scriptblock]$FriendlyScannedFileExtensionStatsToString = {
[PSCustomObject]@{
Count = $this.Count
TotalDuration = $this.TotalDuration
MinDuration = $this.MinDuration
AverageDuration = $this.AverageDuration
MaxDuration = $this.MaxDuration
MedianDuration = $this.MedianDuration
Extension = $this.Extension
}
}
filter ConvertTo-DefenderScannedFileExtensionStats
{
param(
[bool]$Raw = $false
)
$result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedFileExtensionStats')
}
$result | Add-Member -NotePropertyName:'Extension' -NotePropertyValue:($_.Extension)
$result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedFileExtensionStatsToString
if ($null -ne $_.Scans)
{
$result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@(
$_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans)
}
}
if ($null -ne $_.Files)
{
$result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@(
$_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Files)
}
}
if ($null -ne $_.Processes)
{
$result | Add-Member -NotePropertyName:'Processes' -NotePropertyValue:@(
$_.Processes | ConvertTo-DefenderScannedProcessStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Processes)
}
}
if ($null -ne $_.Folder)
{
$result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@(
$_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder)
}
}
$result
}
[scriptblock]$FriendlyScannedProcessStatsToString = {
[PSCustomObject]@{
Count = $this.Count
TotalDuration = $this.TotalDuration
MinDuration = $this.MinDuration
AverageDuration = $this.AverageDuration
MaxDuration = $this.MaxDuration
MedianDuration = $this.MedianDuration
ProcessPath = $this.ProcessPath
}
}
filter ConvertTo-DefenderScannedProcessStats
{
param(
[bool]$Raw
)
$result = $_ | ConvertTo-DefenderScanStats -Raw:$Raw
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.ScannedProcessStats')
}
$result | Add-Member -NotePropertyName:'ProcessPath' -NotePropertyValue:($_.Process)
$result | Add-Member -Force -MemberType:ScriptMethod -Name:'ToString' -Value:$FriendlyScannedProcessStatsToString
if ($null -ne $_.Scans)
{
$result | Add-Member -NotePropertyName:'Scans' -NotePropertyValue:@(
$_.Scans | ConvertTo-DefenderScanInfo -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Scans)
}
}
if ($null -ne $_.Files)
{
$result | Add-Member -NotePropertyName:'Files' -NotePropertyValue:@(
$_.Files | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Files)
}
}
if ($null -ne $_.Extensions)
{
$result | Add-Member -NotePropertyName:'Extensions' -NotePropertyValue:@(
$_.Extensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Extensions)
}
}
if ($null -ne $_.Folder)
{
$result | Add-Member -NotePropertyName:'Folder' -NotePropertyValue:@(
$_.Folder | ConvertTo-DefenderScannedPathsStats -Raw:$Raw
)
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.Folder)
}
}
$result
}
<#
.SYNOPSIS
This cmdlet reports the file paths, file extensions, and processes that cause
the highest impact to Microsoft Defender Antivirus scans.
.DESCRIPTION
This cmdlet analyzes a previously collected Microsoft Defender Antivirus
performance recording and reports the file paths, file extensions and processes
that cause the highest impact to Microsoft Defender Antivirus scans.
The performance analyzer provides insight into problematic files that could
cause performance degradation of Microsoft Defender Antivirus. This tool is
provided "AS IS", and is not intended to provide suggestions on exclusions.
Exclusions can reduce the level of protection on your endpoints. Exclusions,
if any, should be defined with caution.
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopExtensions:10 -TopProcesses:10 -TopScans:10 -Raw | ConvertTo-Json
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopScansPerFile:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopFiles:10 -TopProcessesPerFile:3 -TopScansPerProcessPerFile:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopScansPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopScansPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopFilesPerPath:3 -TopScansPerFilePerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopFilesPerPath:3 -TopScansPerFilePerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopExtensionsPerPath:3 -TopScansPerExtensionPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopPathsDepth:3 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopPaths:10 -TopProcessesPerPath:3 -TopScansPerProcessPerPath:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopScansPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopPathsDepth:3 -TopScansPerPathPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopPathsPerExtension:3 -TopScansPerPathPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopFilesPerExtension:3 -TopScansPerFilePerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopExtensions:10 -TopProcessesPerExtension:3 -TopScansPerProcessPerExtension:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopScansPerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopExtensionsPerProcess:3 -TopScansPerExtensionPerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopFilesPerProcess:3 -TopScansPerFilePerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopPathsDepth:3 -TopScansPerPathPerProcess:3
.EXAMPLE
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopProcesses:10 -TopPathsPerProcess:3 -TopScansPerPathPerProcess:3
.EXAMPLE
# Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxEndTime:"5/14/2022 7:01:41 AM"
.EXAMPLE
# Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM"
.EXAMPLE
# Find top 10 scans with longest durations between MinStartTime and MaxStartTime, possibly partially overlapping this period
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM" -MaxStartTime:"5/14/2022 7:01:41 AM"
.EXAMPLE
# Find top 10 scans with longest durations that start at MinStartTime or later:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:01:11 AM"
.EXAMPLE
# Find top 10 scans with longest durations that start before or at MaxStartTime:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM"
.EXAMPLE
# Find top 10 scans with longest durations that end at MinEndTime or later:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:"5/14/2022 7:01:11 AM"
.EXAMPLE
# Find top 10 scans with longest durations that end before or at MaxEndTime:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxEndTime:"5/14/2022 7:01:11 AM"
.EXAMPLE
# Find top 10 scans with longest durations, impacting the current interval, that did not start or end between MaxStartTime and MinEndTime.
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM"
.EXAMPLE
# Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended later than MinEndTime.
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM"
.EXAMPLE
# Find top 10 scans with longest durations, impacting the current interval, that started before MaxStartTime, and ended between MinEndTime and MaxEndTime.
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM"
.EXAMPLE
# Find top 10 scans with longest durations, impacting the current interval, that started between MinStartTime and MaxStartTime, and ended between MinEndTime and MaxEndTime.
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:"5/14/2022 7:00:00 AM" -MaxStartTime:"5/14/2022 7:01:11 AM" -MinEndTime:"5/14/2022 7:01:41 AM" -MaxEndTime:"5/14/2022 7:02:00 AM"
.EXAMPLE
# Find top 10 scans with longest durations that both start and end between MinStartTime and MaxEndTime, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinStartTime:([DateTime]::FromFileTime(132969744714304340)) -MaxEndTime:([DateTime]::FromFileTime(132969745000971033))
.EXAMPLE
# Find top 10 scans with longest durations between MinEndTime and MaxStartTime, possibly partially overlapping this period, using DateTime as raw numbers in FILETIME format, e.g. from -Raw report format:
Get-MpPerformanceReport -Path:.\Defender-scans.etl -TopScans:10 -MinEndTime:([DateTime]::FromFileTime(132969744714304340)) -MaxStartTime:([DateTime]::FromFileTime(132969745000971033))
.EXAMPLE
# Display a summary or overview of the scans captured in the trace, in addition to the information displayed regularly through other arguments. Output is influenced by time interval arguments MinStartTime and MaxEndTime.
Get-MpPerformanceReport -Path:.\Defender-scans.etl [other arguments] -Overview
#>
function Get-MpPerformanceReport {
[CmdletBinding()]
param(
# Specifies the location of Microsoft Defender Antivirus performance recording to analyze.
[Parameter(Mandatory=$true,
Position=0,
ValueFromPipeline=$true,
ValueFromPipelineByPropertyName=$true,
HelpMessage="Location of Microsoft Defender Antivirus performance recording.")]
[ValidateNotNullOrEmpty()]
[string]$Path,
# Requests a top files report and specifies how many top files to output, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopFiles = 0,
# Specifies how many top scans to output for each top file, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerFile = 0,
# Specifies how many top processes to output for each top file, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopProcessesPerFile = 0,
# Specifies how many top scans to output for each top process for each top file, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerProcessPerFile = 0,
# Requests a top paths report and specifies how many top entries to output, sorted by "Duration". This is called recursively for each directory entry. Scans are grouped hierarchically per folder and sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopPaths = 0,
# Specifies the maxmimum depth (path-wise) that will be used to grop scans when $TopPaths is used.
[ValidateRange(1,1024)]
[int]$TopPathsDepth = 0,
# Specifies how many top scans to output for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerPath = 0,
# Specifies how many top files to output for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopFilesPerPath = 0,
# Specifies how many top scans to output for each top file for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerFilePerPath = 0,
# Specifies how many top extensions to output for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopExtensionsPerPath = 0,
# Specifies how many top scans to output for each top extension for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerExtensionPerPath = 0,
# Specifies how many top processes to output for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopProcessesPerPath = 0,
# Specifies how many top scans to output for each top process for each top path, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerProcessPerPath = 0,
# Requests a top extensions report and specifies how many top extensions to output, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopExtensions = 0,
# Specifies how many top scans to output for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerExtension = 0,
# Specifies how many top paths to output for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopPathsPerExtension = 0,
# Specifies how many top scans to output for each top path for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerPathPerExtension = 0,
# Specifies how many top files to output for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopFilesPerExtension = 0,
# Specifies how many top scans to output for each top file for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerFilePerExtension = 0,
# Specifies how many top processes to output for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopProcessesPerExtension = 0,
# Specifies how many top scans to output for each top process for each top extension, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerProcessPerExtension = 0,
# Requests a top processes report and specifies how many top processes to output, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopProcesses = 0,
# Specifies how many top scans to output for each top process in the Top Processes report, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerProcess = 0,
# Specifies how many top files to output for each top process, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopFilesPerProcess = 0,
# Specifies how many top scans to output for each top file for each top process, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerFilePerProcess = 0,
# Specifies how many top extensions to output for each top process, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopExtensionsPerProcess = 0,
# Specifies how many top scans to output for each top extension for each top process, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerExtensionPerProcess = 0,
# Specifies how many top paths to output for each top process, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopPathsPerProcess = 0,
# Specifies how many top scans to output for each top path for each top process, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScansPerPathPerProcess = 0,
# Requests a top scans report and specifies how many top scans to output, sorted by "Duration".
[ValidateRange(0,([int]::MaxValue))]
[int]$TopScans = 0,
## TimeSpan format: d | h:m | h:m:s | d.h:m | h:m:.f | h:m:s.f | d.h:m:s | d.h:m:.f | d.h:m:s.f => d | (d.)?h:m(:s(.f)?)? | ((d.)?h:m:.f)
# Specifies the minimum duration of any scans or total scan durations of files, extensions and processes included in the report.
# Accepts values like '0.1234567sec' or '0.1234ms' or '0.1us' or a valid TimeSpan.
[ValidatePattern('^(?:(?:(\d+)(?:\.(\d+))?(sec|ms|us))|(?:\d+)|(?:(\d+\.)?\d+:\d+(?::\d+(?:\.\d+)?)?)|(?:(\d+\.)?\d+:\d+:\.\d+))$')]
[string]$MinDuration = '0us',
# Specifies the minimum start time of scans included in the report. Accepts a valid DateTime.
[DateTime]$MinStartTime = [DateTime]::MinValue,
# Specifies the minimum end time of scans included in the report. Accepts a valid DateTime.
[DateTime]$MinEndTime = [DateTime]::MinValue,
# Specifies the maximum start time of scans included in the report. Accepts a valid DateTime.
[DateTime]$MaxStartTime = [DateTime]::MaxValue,
# Specifies the maximum end time of scans included in the report. Accepts a valid DateTime.
[DateTime]$MaxEndTime = [DateTime]::MaxValue,
# Adds an overview or summary of the scans captured in the trace to the regular output.
[switch]$Overview,
# Specifies that the output should be machine readable and readily convertible to serialization formats like JSON.
# - Collections and elements are not be formatted.
# - TimeSpan values are represented as number of 100-nanosecond intervals.
# - DateTime values are represented as number of 100-nanosecond intervals since January 1, 1601 (UTC).
[switch]$Raw
)
#
# Validate performance recording presence
#
if (-not (Test-Path -Path:$Path -PathType:Leaf)) {
$ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find path '$Path'."
$category = [System.Management.Automation.ErrorCategory]::ObjectNotFound
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$Path
$psCmdlet.WriteError($errRecord)
return
}
function ParameterValidationError {
[CmdletBinding()]
param (
[Parameter(Mandatory)]
[string]
$ParameterName,
[Parameter(Mandatory)]
[string]
$ParentParameterName
)
$ex = New-Object System.Management.Automation.ValidationMetadataException "Parameter '$ParameterName' requires parameter '$ParentParameterName'."
$category = [System.Management.Automation.ErrorCategory]::MetadataError
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidParameter',$category,$ParameterName
$psCmdlet.WriteError($errRecord)
}
#
# Additional parameter validation
#
if ($TopFiles -eq 0)
{
if ($TopScansPerFile -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFile' -ParentParameterName:'TopFiles'
}
if ($TopProcessesPerFile -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerFile' -ParentParameterName:'TopFiles'
}
}
if ($TopProcessesPerFile -eq 0)
{
if ($TopScansPerProcessPerFile -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerFile' -ParentParameterName:'TopProcessesPerFile'
}
}
if ($TopPathsDepth -gt 0)
{
if (($TopPaths -eq 0) -and ($TopPathsPerProcess -eq 0) -and ($TopPathsPerExtension -eq 0))
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsDepth' -ParentParameterName:'TopPaths or TopPathsPerProcess or TopPathsPerExtension'
}
}
if ($TopPaths -eq 0)
{
if ($TopScansPerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPath' -ParentParameterName:'TopPaths'
}
if ($TopFilesPerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerPath' -ParentParameterName:'TopPaths'
}
if ($TopExtensionsPerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerPath' -ParentParameterName:'TopPaths'
}
if ($TopProcessesPerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerPath' -ParentParameterName:'TopPaths'
}
}
if ($TopFilesPerPath -eq 0)
{
if ($TopScansPerFilePerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerPath' -ParentParameterName:'TopFilesPerPath'
}
}
if ($TopExtensionsPerPath -eq 0)
{
if ($TopScansPerExtensionPerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerPath' -ParentParameterName:'TopExtensionsPerPath'
}
}
if ($TopProcessesPerPath -eq 0)
{
if ($TopScansPerProcessPerPath -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerPath' -ParentParameterName:'TopProcessesPerPath'
}
}
if ($TopExtensions -eq 0)
{
if ($TopScansPerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtension' -ParentParameterName:'TopExtensions'
}
if ($TopFilesPerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerExtension' -ParentParameterName:'TopExtensions'
}
if ($TopProcessesPerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopProcessesPerExtension' -ParentParameterName:'TopExtensions'
}
if ($TopPathsPerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerExtension' -ParentParameterName:'TopExtensions'
}
}
if ($TopFilesPerExtension -eq 0)
{
if ($TopScansPerFilePerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerExtension' -ParentParameterName:'TopFilesPerExtension'
}
}
if ($TopProcessesPerExtension -eq 0)
{
if ($TopScansPerProcessPerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcessPerExtension' -ParentParameterName:'TopProcessesPerExtension'
}
}
if ($TopPathsPerExtension -eq 0)
{
if ($TopScansPerPathPerExtension -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerExtension' -ParentParameterName:'TopPathsPerExtension'
}
}
if ($TopProcesses -eq 0)
{
if ($TopScansPerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerProcess' -ParentParameterName:'TopProcesses'
}
if ($TopFilesPerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopFilesPerProcess' -ParentParameterName:'TopProcesses'
}
if ($TopExtensionsPerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopExtensionsPerProcess' -ParentParameterName:'TopProcesses'
}
if ($TopPathsPerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopPathsPerProcess' -ParentParameterName:'TopProcesses'
}
}
if ($TopFilesPerProcess -eq 0)
{
if ($TopScansPerFilePerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerFilePerProcess' -ParentParameterName:'TopFilesPerProcess'
}
}
if ($TopExtensionsPerProcess -eq 0)
{
if ($TopScansPerExtensionPerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerExtensionPerProcess' -ParentParameterName:'TopExtensionsPerProcess'
}
}
if ($TopPathsPerProcess -eq 0)
{
if ($TopScansPerPathPerProcess -gt 0)
{
ParameterValidationError -ErrorAction:Stop -ParameterName:'TopScansPerPathPerProcess' -ParentParameterName:'TopPathsPerProcess'
}
}
if (($TopFiles -eq 0) -and ($TopExtensions -eq 0) -and ($TopProcesses -eq 0) -and ($TopScans -eq 0) -and ($TopPaths -eq 0) -and (-not $Overview)) {
$ex = New-Object System.Management.Automation.ItemNotFoundException "At least one of the parameters 'TopFiles', 'TopPaths', 'TopExtensions', 'TopProcesses', 'TopScans' or 'Overview' must be present."
$category = [System.Management.Automation.ErrorCategory]::InvalidArgument
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'InvalidArgument',$category,$wprProfile
$psCmdlet.WriteError($errRecord)
return
}
# Dependencies
[string]$PlatformPath = (Get-ItemProperty -Path:'HKLM:\Software\Microsoft\Windows Defender' -Name:'InstallLocation' -ErrorAction:Stop).InstallLocation
#
# Test dependency presence
#
[string]$mpCmdRunCommand = "${PlatformPath}MpCmdRun.exe"
if (-not (Get-Command $mpCmdRunCommand -ErrorAction:SilentlyContinue)) {
$ex = New-Object System.Management.Automation.ItemNotFoundException "Cannot find '$mpCmdRunCommand'."
$category = [System.Management.Automation.ErrorCategory]::ObjectNotFound
$errRecord = New-Object System.Management.Automation.ErrorRecord $ex,'PathNotFound',$category,$mpCmdRunCommand
$psCmdlet.WriteError($errRecord)
return
}
# assemble report arguments
[string[]]$reportArguments = @(
$PSBoundParameters.GetEnumerator() |
Where-Object { $_.Key.ToString().StartsWith("Top") -and ($_.Value -gt 0) } |
ForEach-Object { "-$($_.Key)"; "$($_.Value)"; }
)
[timespan]$MinDurationTimeSpan = ParseFriendlyDuration -FriendlyDuration:$MinDuration
if ($MinDurationTimeSpan -gt [TimeSpan]::FromTicks(0))
{
$reportArguments += @('-MinDuration', ($MinDurationTimeSpan.Ticks))
}
$MaxEndTime = PadUserDateTime -UserDateTime:$MaxEndTime
$MaxStartTime = PadUserDateTime -UserDateTime:$MaxStartTime
$ret = ValidateTimeInterval -MinStartTime:$MinStartTime -MaxEndTime:$MaxEndTime -MaxStartTime:$MaxStartTime -MinEndTime:$MinEndTime
if ($false -eq $ret.status)
{
return
}
[string[]]$intervalArguments = $ret.arguments
if (($null -ne $intervalArguments) -and ($intervalArguments.Length -gt 0))
{
$reportArguments += $intervalArguments
}
if ($Overview)
{
$reportArguments += "-Overview"
}
$report = (& $mpCmdRunCommand -PerformanceReport -RecordingPath $Path @reportArguments) | Where-Object { -not [string]::IsNullOrEmpty($_) } | ConvertFrom-Json
$result = [PSCustomObject]@{}
if (-not $Raw) {
$result.PSTypeNames.Insert(0, 'MpPerformanceReport.Result')
}
if ($TopFiles -gt 0)
{
$reportTopFiles = @(if ($null -ne $report.TopFiles) { @($report.TopFiles | ConvertTo-DefenderScannedFilePathStats -Raw:$Raw) } else { @() })
$result | Add-Member -NotePropertyName:'TopFiles' -NotePropertyValue:$reportTopFiles
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.TopFiles)
}
}
if ($TopPaths -gt 0)
{
$reportTopPaths = @(if ($null -ne $report.TopPaths) { @($report.TopPaths | ConvertTo-DefenderScannedPathsStats -Raw:$Raw) } else { @() })
$result | Add-Member -NotePropertyName:'TopPaths' -NotePropertyValue:$reportTopPaths
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.TopPaths)
}
}
if ($TopExtensions -gt 0)
{
$reportTopExtensions = @(if ($null -ne $report.TopExtensions) { @($report.TopExtensions | ConvertTo-DefenderScannedFileExtensionStats -Raw:$Raw) } else { @() })
$result | Add-Member -NotePropertyName:'TopExtensions' -NotePropertyValue:$reportTopExtensions
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.TopExtensions)
}
}
if ($TopProcesses -gt 0)
{
$reportTopProcesses = @(if ($null -ne $report.TopProcesses) { @($report.TopProcesses | ConvertTo-DefenderScannedProcessStats -Raw:$Raw) } else { @() })
$result | Add-Member -NotePropertyName:'TopProcesses' -NotePropertyValue:$reportTopProcesses
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.TopProcesses)
}
}
if ($TopScans -gt 0)
{
$reportTopScans = @(if ($null -ne $report.TopScans) { @($report.TopScans | ConvertTo-DefenderScanInfo -Raw:$Raw) } else { @() })
$result | Add-Member -NotePropertyName:'TopScans' -NotePropertyValue:$reportTopScans
if (-not $Raw) {
Add-DefenderCollectionType -CollectionRef:([ref]$result.TopScans)
}
}
if ($Overview)
{
if ($null -ne $report.Overview) {
$reportOverview = $report.Overview | ConvertTo-DefenderScanOverview -Raw:$Raw
$result | Add-Member -NotePropertyName:'Overview' -NotePropertyValue:$reportOverview
if (-not $Raw) {
$result.Overview.PSTypeNames.Insert(0, 'MpPerformanceReport.Overview')
}
}
}
$result
}
$exportModuleMemberParam = @{
Function = @(
'New-MpPerformanceRecording'
'Get-MpPerformanceReport'
)
}
Export-ModuleMember @exportModuleMemberParam
# SIG # Begin signature block
# MIImAgYJKoZIhvcNAQcCoIIl8zCCJe8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCABOtUhuRLDSJsH
# 5LjfiBWymKYbjYNumRKF78V/LI3Gd6CCC1MwggTgMIIDyKADAgECAhMzAAAK7CQL
# sju2bxocAAAAAArsMA0GCSqGSIb3DQEBCwUAMHkxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xIzAhBgNVBAMTGk1pY3Jvc29mdCBXaW5kb3dzIFBD
# QSAyMDEwMB4XDTIzMTAxOTE5MTgwM1oXDTI0MTAxNjE5MTgwM1owcDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEaMBgGA1UEAxMRTWljcm9zb2Z0
# IFdpbmRvd3MwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDxlYs7SirE
# 2DMWmJDHmyPDmkzh+fLl2bNdYJFYVIxEDXmuYo7qVT/TlzRyHZNjfnCpNIN5BGy+
# tL1DHfbYMyeZ64rRBk5ZDyfxpC0PjuOKeo8l1Yp0DYH8o/tovvyg/7t7RBqawaFi
# 8mo9wrD5ISkTwSSMv2itkTg00L+gE8awFU17AUmplCQ9mZ91C/9wLp9wH9bIBGm5
# LnsMVzGxaxLbcqzuyi0CUj0ANTuQNZUFNTvLWj/k3W3j7iiNZRDaniVqF2i7UEpU
# Twl0A2/ET31/zrvHBzhJKaUtC31IicLI8HqTuUA96FAxGfczxleoZI6jXS2sWSYI
# wU6YnckWSSAhAgMBAAGjggFoMIIBZDAfBgNVHSUEGDAWBgorBgEEAYI3CgMGBggr
# BgEFBQcDAzAdBgNVHQ4EFgQUK97sk9qa9IVpYVlzmmULjVzY6akwRQYDVR0RBD4w
# PKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEWMBQGA1UEBRMN
# MjMwMDI4KzUwMTcwMjAfBgNVHSMEGDAWgBTRT6mKBwjO9CQYmOUA//PWeR03vDBT
# BgNVHR8ETDBKMEigRqBEhkJodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNXaW5QQ0FfMjAxMC0wNy0wNi5jcmwwVwYIKwYBBQUHAQEE
# SzBJMEcGCCsGAQUFBzAChjtodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2Nl
# cnRzL01pY1dpblBDQV8yMDEwLTA3LTA2LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqG
# SIb3DQEBCwUAA4IBAQArGdljm580qkATgRqYVsgvfdFUkL/7TpOb8yh1h5vk2SEL
# El5Bfz46bs3+ywayV/mXd8Y43M3yku5Dp7dMwRXkze6j4LJLpLQ4CMPN4fvtlPkb
# w+fQmXkHjogsb4bcJo/aUKfLy4hGUbw+uqKBLx0RRIEj6Vj2m5W7lB+rdBl8hhtr
# v5F4HYoy9lvXQhGGDwSsph+0uaZvCXSP7DOM3wOaYUQSNX6hYF5EHZsPrd334YGd
# dTWIPRHrOWqg9FplGJumgZLgdlwY+WNZbXGCZwEQN3P88LTgrH/gmlSD0fHbZDyM
# YZ77M6PFlz4eXvC6I7J3VemS8OoU4DzYgxSahDXFMIIGazCCBFOgAwIBAgIKYQxq
# GQAAAAAABDANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMTAwNzA2MjA0MDIzWhcNMjUwNzA2MjA1MDIz
# WjB5MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSMwIQYDVQQD
# ExpNaWNyb3NvZnQgV2luZG93cyBQQ0EgMjAxMDCCASIwDQYJKoZIhvcNAQEBBQAD
# ggEPADCCAQoCggEBAMB5uzqx8A+EuK1kKnUWc9C7B/Y+DZ0U5LGfwciUsDh8H9Az
# VfW6I2b1LihIU8cWg7r1Uax+rOAmfw90/FmV3MnGovdScFosHZSrGb+vlX2vZqFv
# m2JubUu8LzVs3qRqY1pf+/MNTWHMCn4x62wK0E2XD/1/OEbmisdzaXZVaZZM5Njw
# NOu6sR/OKX7ET50TFasTG3JYYlZsioGjZHeYRmUpnYMUpUwIoIPXIx/zX99vLM/a
# FtgOcgQo2Gs++BOxfKIXeU9+3DrknXAna7/b/B7HB9jAvguTHijgc23SVOkoTL9r
# XZ//XTMSN5UlYTRqQst8nTq7iFnho0JtOlBbSNECAwEAAaOCAeMwggHfMBAGCSsG
# AQQBgjcVAQQDAgEAMB0GA1UdDgQWBBTRT6mKBwjO9CQYmOUA//PWeR03vDAZBgkr
# BgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw
# AwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN
# MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0
# cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoG
# CCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDCBnQYDVR0gBIGVMIGSMIGPBgkrBgEE
# AYI3LgMwgYEwPQYIKwYBBQUHAgEWMWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9Q
# S0kvZG9jcy9DUFMvZGVmYXVsdC5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcA
# YQBsAF8AUABvAGwAaQBjAHkAXwBTAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZI
# hvcNAQELBQADggIBAC5Bpoa1Bm/wgIX6O8oX6cn65DnClHDDZJTD2FamkI7+5Jr0
# bfVvjlONWqjzrttGbL5/HVRWGzwdccRRFVR+v+6llUIz/Q2QJCTj+dyWyvy4rL/0
# wjlWuLvtc7MX3X6GUCOLViTKu6YdmocvJ4XnobYKnA0bjPMAYkG6SHSHgv1QyfSH
# KcMDqivfGil56BIkmobt0C7TQIH1B18zBlRdQLX3sWL9TUj3bkFHUhy7G8JXOqiZ
# VpPUxt4mqGB1hrvsYqbwHQRF3z6nhNFbRCNjJTZ3b65b3CLVFCNqQX/QQqbb7yV7
# BOPSljdiBq/4Gw+Oszmau4n1NQblpFvDjJ43X1PRozf9pE/oGw5rduS4j7DC6v11
# 9yxBt5yj4R4F/peSy39ZA22oTo1OgBfU1XL2VuRIn6MjugagwI7RiE+TIPJwX9hr
# cqMgSfx3DF3Fx+ECDzhCEA7bAq6aNx1QgCkepKfZxpolVf1Ayq1kEOgx+RJUeRry
# DtjWqx4z/gLnJm1hSY/xJcKLdJnf+ZMakBzu3ZQzDkJQ239Q+J9iguymghZ8Zrzs
# mbDBWF2osJphFJHRmS9J5D6Bmdbm78rj/T7u7AmGAwcNGw186/RayZXPhxIKXezF
# ApLNBZlyyn3xKhAYOOQxoyi05kzFUqOcasd9wHEJBA1w3gI/h+5WoezrtUyFMYIa
# BTCCGgECAQEwgZAweTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEjMCEGA1UEAxMaTWljcm9zb2Z0IFdpbmRvd3MgUENBIDIwMTACEzMAAArsJAuy
# O7ZvGhwAAAAACuwwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisG
# AQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcN
# AQkEMSIEIP1nRydeaI+1iJEMHgjg/lvzEqkxTM+0Vgz1fU+wYXo6MEIGCisGAQQB
# gjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1p
# Y3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEAcGClrSoglNDQcN62/WS1R8I3
# RwetZsjmZJ952i52+ck3ypJqRBbJhDingd1ejbzsypsYW4PuFbockKlHLL3k4aAq
# tHah9Vo9yd7QtxpZe3sOUjBsSTFERi7yAztpOwYEBNstQJP927K0QiIWUXqYh/V7
# EYivE0AC+/LxeBYozbyvD2Sz4wQ/f3b2d2YSW9RW3YN3IfTqysI2twnwi+ER4Fc/
# 6qNgF2MY9SWFerEXBdI75Slf1EmocucGLA9dvob+3328L1x8J1DkztC06ZcS5vtt
# SusCW1a5mUZUxzbrQY84UONUxXkUOdjtAdLfPpA0O1SNGiSRcMAdFmakMp1gf6GC
# F5QwgheQBgorBgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgED
# MQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIB
# AQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUABCBiOO9O5JDacZhQkDhZRhnL
# JZwfEO4YeUvzRyzBGzb6/QIGZZ/pHr4xGBMyMDI0MDExNzAwNTUyMi45MTZaMASA
# AgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQL
# Ex5uU2hpZWxkIFRTUyBFU046QTAwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAdB3
# CKrvoxfG3QABAAAB0DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEG
# A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj
# cm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFt
# cCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEyMTRaFw0yNDAyMDExOTEyMTRaMIHLMQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNy
# b3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBF
# U046QTAwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDfMlfn35fv
# M0XAUSmI5qiG0UxPi25HkSyBgzk3zpYO311d1OEEFz0QpAK23s1dJFrjB5gD+SMw
# 5z6EwxC4CrXU9KaQ4WNHqHrhWftpgo3MkJex9frmO9MldUfjUG56sIW6YVF6YjX+
# 9rT1JDdCDHbo5nZiasMigGKawGb2HqD7/kjRR67RvVh7Q4natAVu46Zf5MLviR0x
# N5cNG20xwBwgttaYEk5XlULaBH5OnXz2eWoIx+SjDO7Bt5BuABWY8SvmRQfByT2c
# ppEzTjt/fs0xp4B1cAHVDwlGwZuv9Rfc3nddxgFrKA8MWHbJF0+aWUUYIBR8Fy2g
# uFVHoHeOze7IsbyvRrax//83gYqo8c5Z/1/u7kjLcTgipiyZ8XERsLEECJ5ox1BB
# LY6AjmbgAzDdNl2Leej+qIbdBr/SUvKEC+Xw4xjFMOTUVWKWemt2khwndUfBNR7N
# zu1z9L0Wv7TAY/v+v6pNhAeohPMCFJc+ak6uMD8TKSzWFjw5aADkmD9mGuC86yvS
# KkII4MayzoUdseT0nfk8Y0fPjtdw2Wnejl6zLHuYXwcDau2O1DMuoiedNVjTF37U
# EmYT+oxC/OFXUGPDEQt9tzgbR9g8HLtUfEeWOsOED5xgb5rwyfvIss7H/cdHFcIi
# IczzQgYnsLyEGepoZDkKhSMR5eCB6Kcv/QIDAQABo4IBSTCCAUUwHQYDVR0OBBYE
# FDPhAYWS0oA+lOtITfjJtyl0knRRMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv
# bS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEw
# KDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cu
# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFt
# cCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAww
# CgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCX
# h+ckCkZaA06SNW+qxtS9gHQp4x7G+gdikngKItEr8otkXIrmWPYrarRWBlY91lqG
# iilHyIlZ3iNBUbaNEmaKAGMZ5YcS7IZUKPaq1jU0msyl+8og0t9C/Z26+atx3vsh
# HrFQuSgwTHZVpzv7k8CYnBYoxdhI1uGhqH595mqLvtMsxEN/1so7U+b3U6LCry5u
# wwcz5+j8Oj0GUX3b+iZg+As0xTN6T0Qa8BNec/LwcyqYNEaMkW2VAKrmhvWH8OCD
# TcXgONnnABQHBfXK/fLAbHFGS1XNOtr62/iaHBGAkrCGl6Bi8Pfws6fs+w+sE9r3
# hX9Vg0gsRMoHRuMaiXsrGmGsuYnLn3AwTguMatw9R8U5vJtWSlu1CFO5P0LEvQQi
# MZ12sQSsQAkNDTs9rTjVNjjIUgoZ6XPMxlcPIDcjxw8bfeb4y4wAxM2RRoWcxpkx
# +6IIf2L+b7gLHtBxXCWJ5bMW7WwUC2LltburUwBv0SgjpDtbEqw/uDgWBerCT+Zt
# y3Nc967iGaQjyYQH6H/h9Xc8smm2n6VjySRx2swnW3hr6Qx63U/xY9HL6FNhrGiF
# ED7ZRKrnwvvXvMVQUIEkB7GUEeN6heY8gHLt0jLV3yzDiQA8R8p5YGgGAVt9MEwg
# AJNY1iHvH/8vzhJSZFNkH8svRztO/i3TvKrjb8ZxwjCCB3EwggVZoAMCAQICEzMA
# AAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290
# IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMw
# MDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0G
# CSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3u
# nAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1
# jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZT
# fDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+
# jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c
# +gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+
# cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C6
# 26p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV
# 2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoS
# CtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxS
# UV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJp
# xq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkr
# BgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0A
# XmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYI
# KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9S
# ZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIE
# DB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNV
# HSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVo
# dHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29D
# ZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAC
# hj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1
# dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwEx
# JFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts
# 0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9I
# dQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYS
# EhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMu
# LGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT9
# 9kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2z
# AVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6Ile
# T53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6l
# MVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbh
# IurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3u
# gm2lBRDBcQZqELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9z
# b2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNO
# OkEwMDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQC8t8hT8KKUX91lU5FqRP9Cfu9MiaCBgzCB
# gKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUA
# AgUA6VD/ADAiGA8yMDI0MDExNjEzMTEyOFoYDzIwMjQwMTE3MTMxMTI4WjB0MDoG
# CisGAQQBhFkKBAExLDAqMAoCBQDpUP8AAgEAMAcCAQACAhL8MAcCAQACAhMhMAoC
# BQDpUlCAAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA
# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBABkCcPrh7Da2yQ3M
# rItWtzvU6+abIzMiV9GXxq9UQEO9vUUXt59r/KCTcW+NwJcVe0E+eAyZ7t11TR/y
# XK60/kircdt8uO3suqfPwUkJZG4q2ZNQz8ly9J78gsz+sEl5G9rNpOrwRS+kSu/5
# 8Pm0EmdoDhGJ/PCY80wuqJ4NY7DxZAhMi4ksFQhQFow9RaLH1yeCiY/p4UwhBJk1
# t/ff/yvDo7J3/BHS5Knhj5iqKM+PqhP/rAhmzjdx/3vGncZApLNQ5PFQ6Ee5QToD
# YRRIAlgtMRXcVk3qqmzJ3wqEdMb5Kg2yPaGpNmRxDiQgeU6r1dvZAvrXJXPtx5Gc
# iTHGzJ4xggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MAITMwAAAdB3CKrvoxfG3QABAAAB0DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZI
# hvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCAy3HCus2ymPTP9
# odOGMWcIgG1U3QAVmqIK3pwmA98BlzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQw
# gb0EIAiVQAZftNP/Md1E2Yw+fBXa9w6fjmTZ5WAerrTSPwnXMIGYMIGApH4wfDEL
# MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
# bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWlj
# cm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHQdwiq76MXxt0AAQAAAdAw
# IgQgCQs6RLyc6zInW5m6iX0raxru2QTPk83izfP8CPkXBxswDQYJKoZIhvcNAQEL
# BQAEggIAfXbojncIj+lZapn/ynZfKQIIJYoF2FhYGfJ1lZ1aye7j74EGHNNSFezE
# jxK5BkbtfwKgs3AAm/+rg9vfWoPBrQm8v+yGO5/wl/v14mIdTTwxkXEEViYUsM9e
# XyHBeHKDdM4Hk/3zGuZHTzZDC4OY91ZD/Z0dedF2VfY79TddUAuHc/GwmUd/PUuB
# w4Qtqt+QkhhVgF8KsE06uZ7x5UYTqdGCLypMPXiZcxuid2oyBXYTLRQ9hyzo0Pf/
# B1nH0yKZCLCCEQZkSz9xJeOcZZA09SCDZBI3EuSG7SSLwG8ckynmPSnn/7FUSAA+
# eRbPpEC68r/NzLEFyaeh88L1b3JLj+Wx5FZmvqOUueuqb7/T3Yz4/uoWK6qbrigR
# 8ncLyFnQLBvup89vgl20S1THkxeqnQYcPngXJvG21AtbJGyCIP7+VyULnv1oRRfs
# js5hzGUXOXYz5un5JXIdTuBemk268lHvp7ZwaIuHA9un3ib3Uwf0ntn49Gq6p9Ax
# gi2Aeh6Pv2xl6VHxtupvHQ/p19huIP2BWT7k0m6nVRbeQyX7gOokYJ0IzD/hO7re
# IY+g1z/qYWRnGBhpRlQQFVlfW1xbNzxgfLMRABbghcUxYaBnTTC99iykziTofd+K
# M1J1AWVD/750HoP4R0hHSIgqcyTaBA0WCnninKMPzYsWaqysBBY=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_17_85.ps1 | sample_17_85.ps1 | ##----------------------------------------------------------------------------
## Copyright (c) Axis Communications AB, SWEDEN. All rights reserved.
##----------------------------------------------------------------------------
# Import string constants
. ./StringConstants.ps1
# Import shared functions and vars
. ./Commonalities.ps1
# Install APPs
Start-Process -FilePath "VisualCppRedist_AIO_x86_x64.exe" -ArgumentList "/aiA"
# Gets location where the zip is unpacked
$fromDir = [string](Get-Location) + "\*"
# Get temporary scoped Environment variables from ACS component framework
$dataPath = Get-DataPath
$installationPath = Get-InstallationPath
# Removes old installation directory if it exists
if (Test-Path -Path $installationPath) {
Remove-AxisDirectory -AxisFilePath $installationPath
}
# Creates Directories with the passed name from enviroment variables
New-item $dataPath -ItemType "directory"
# Creates an updated dir without version number
New-item $installationPath -ItemType "directory"
# Writes env var to datafile. is used to set ComponentDataPath in service
$dataPath | Out-File -FilePath "$installationPath\ComponentDataPath.txt"
# Move everything from zip except files used by the ACS component framework
$installationFilesPostfix = @('*.ps1*', '*.txt', 'metadata.json')
Move-Item -Path $fromDir -Exclude $installationFilesPostfix -Destination $installationPath -ErrorAction SilentlyContinue -Force
# If the service exists removes it
Remove-Service -ServiceToRemove $ServiceConstants.serviceName
# Creates the service
$serviceParams = @{
Name = $ServiceConstants.serviceName
BinaryPathName = "`"$installationPath\$($SolutionConstants.binaryFile)`""
DisplayName = $ServiceConstants.serviceDisplayName
StartupType = $ServiceConstants.serviceStartupType
Description = $ServiceConstants.serviceDescription
}
New-Service @serviceParams
sc.exe failure $ServiceConstants.serviceName reset=3600 actions=restart/60000/restart/60000//1000
# SIG # Begin signature block
# MIIoIgYJKoZIhvcNAQcCoIIoEzCCKA8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBJphVG/7QwYror
# eoVVBjqInlsU9rID/6L0Q0QynLnDfqCCDY4wggawMIIEmKADAgECAhAIrUCyYNKc
# TJ9ezam9k67ZMA0GCSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNV
# BAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMTA0MjkwMDAwMDBaFw0z
# NjA0MjgyMzU5NTlaMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg
# SW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcg
# UlNBNDA5NiBTSEEzODQgMjAyMSBDQTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw
# ggIKAoICAQDVtC9C0CiteLdd1TlZG7GIQvUzjOs9gZdwxbvEhSYwn6SOaNhc9es0
# JAfhS0/TeEP0F9ce2vnS1WcaUk8OoVf8iJnBkcyBAz5NcCRks43iCH00fUyAVxJr
# Q5qZ8sU7H/Lvy0daE6ZMswEgJfMQ04uy+wjwiuCdCcBlp/qYgEk1hz1RGeiQIXhF
# LqGfLOEYwhrMxe6TSXBCMo/7xuoc82VokaJNTIIRSFJo3hC9FFdd6BgTZcV/sk+F
# LEikVoQ11vkunKoAFdE3/hoGlMJ8yOobMubKwvSnowMOdKWvObarYBLj6Na59zHh
# 3K3kGKDYwSNHR7OhD26jq22YBoMbt2pnLdK9RBqSEIGPsDsJ18ebMlrC/2pgVItJ
# wZPt4bRc4G/rJvmM1bL5OBDm6s6R9b7T+2+TYTRcvJNFKIM2KmYoX7BzzosmJQay
# g9Rc9hUZTO1i4F4z8ujo7AqnsAMrkbI2eb73rQgedaZlzLvjSFDzd5Ea/ttQokbI
# YViY9XwCFjyDKK05huzUtw1T0PhH5nUwjewwk3YUpltLXXRhTT8SkXbev1jLchAp
# QfDVxW0mdmgRQRNYmtwmKwH0iU1Z23jPgUo+QEdfyYFQc4UQIyFZYIpkVMHMIRro
# OBl8ZhzNeDhFMJlP/2NPTLuqDQhTQXxYPUez+rbsjDIJAsxsPAxWEQIDAQABo4IB
# WTCCAVUwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUaDfg67Y7+F8Rhvv+
# YXsIiGX0TkIwHwYDVR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0P
# AQH/BAQDAgGGMBMGA1UdJQQMMAoGCCsGAQUFBwMDMHcGCCsGAQUFBwEBBGswaTAk
# BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAC
# hjVodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9v
# dEc0LmNydDBDBgNVHR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNybDAcBgNVHSAEFTATMAcGBWeBDAED
# MAgGBmeBDAEEATANBgkqhkiG9w0BAQwFAAOCAgEAOiNEPY0Idu6PvDqZ01bgAhql
# +Eg08yy25nRm95RysQDKr2wwJxMSnpBEn0v9nqN8JtU3vDpdSG2V1T9J9Ce7FoFF
# UP2cvbaF4HZ+N3HLIvdaqpDP9ZNq4+sg0dVQeYiaiorBtr2hSBh+3NiAGhEZGM1h
# mYFW9snjdufE5BtfQ/g+lP92OT2e1JnPSt0o618moZVYSNUa/tcnP/2Q0XaG3Ryw
# YFzzDaju4ImhvTnhOE7abrs2nfvlIVNaw8rpavGiPttDuDPITzgUkpn13c5Ubdld
# AhQfQDN8A+KVssIhdXNSy0bYxDQcoqVLjc1vdjcshT8azibpGL6QB7BDf5WIIIJw
# 8MzK7/0pNVwfiThV9zeKiwmhywvpMRr/LhlcOXHhvpynCgbWJme3kuZOX956rEnP
# LqR0kq3bPKSchh/jwVYbKyP/j7XqiHtwa+aguv06P0WmxOgWkVKLQcBIhEuWTatE
# QOON8BUozu3xGFYHKi8QxAwIZDwzj64ojDzLj4gLDb879M4ee47vtevLt/B3E+bn
# KD+sEq6lLyJsQfmCXBVmzGwOysWGw/YmMwwHS6DTBwJqakAwSEs0qFEgu60bhQji
# WQ1tygVQK+pKHJ6l/aCnHwZ05/LWUpD9r4VIIflXO7ScA+2GRfS0YW6/aOImYIbq
# yK+p/pQd52MbOoZWeE4wggbWMIIEvqADAgECAhAILYwW0nV0JkMDtityXUvoMA0G
# CSqGSIb3DQEBCwUAMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg
# SW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcg
# UlNBNDA5NiBTSEEzODQgMjAyMSBDQTEwHhcNMjQwMjEyMDAwMDAwWhcNMjcwMjEx
# MjM1OTU5WjBeMQswCQYDVQQGEwJTRTENMAsGA1UEBxMETHVuZDEfMB0GA1UEChMW
# QXhpcyBDb21tdW5pY2F0aW9ucyBBQjEfMB0GA1UEAxMWQXhpcyBDb21tdW5pY2F0
# aW9ucyBBQjCCAaIwDQYJKoZIhvcNAQEBBQADggGPADCCAYoCggGBAOk0Sr22C6QH
# zDpps6p3+m4c4HrGKW9dju1+awvCWpNnrTrCxxcqC7Fexgt3VVR2GfI+hEHrkSV9
# hq7tCT20No1s4OqGdB/FasUvqq8jCuoXKQQnd5gqFhFz/aL+1ocr2NvtCsxuNihB
# UA3isiFf0R0uXcEIoi+tUiy0vJf5ZstopMEuSSOZlANhdWvwBTd8DL1EBYDp4Z/t
# 1kWLax6NI8fim1MJxi5OaVUd1haFQMbzeBiwDXlMVJCyYcSVH7fuKCRhoem4pX1g
# fdbM3yfhigegJPRui13ai6I69X71GoyRCBnkCgkrw8nUrOHGjrTe90sXLvVSU0Yu
# j3VZzcDkdxN16tHG2SK3NT/7d5EmgrUSwabvS36sTRy0VeSCmop4ByDlTUCljGiP
# cDO5viiyDF9SRbKa0BSuVAB9xtaaqjw9+sWRxiUqHVq8cRPOylBcziOMVFSE4ENc
# aH3A55N2kb2tBalRm0GPfvB1wRzHdow/ArdGYB1FYIrBi2IUcUsgKwIDAQABo4IC
# AzCCAf8wHwYDVR0jBBgwFoAUaDfg67Y7+F8Rhvv+YXsIiGX0TkIwHQYDVR0OBBYE
# FCCITo81URSaUaiF+AwqLquw/5UcMD4GA1UdIAQ3MDUwMwYGZ4EMAQQBMCkwJwYI
# KwYBBQUHAgEWG2h0dHA6Ly93d3cuZGlnaWNlcnQuY29tL0NQUzAOBgNVHQ8BAf8E
# BAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwgbUGA1UdHwSBrTCBqjBToFGgT4ZN
# aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0Q29kZVNp
# Z25pbmdSU0E0MDk2U0hBMzg0MjAyMUNBMS5jcmwwU6BRoE+GTWh0dHA6Ly9jcmw0
# LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWduaW5nUlNBNDA5
# NlNIQTM4NDIwMjFDQTEuY3JsMIGUBggrBgEFBQcBAQSBhzCBhDAkBggrBgEFBQcw
# AYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMFwGCCsGAQUFBzAChlBodHRwOi8v
# Y2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkRzRDb2RlU2lnbmlu
# Z1JTQTQwOTZTSEEzODQyMDIxQ0ExLmNydDAJBgNVHRMEAjAAMA0GCSqGSIb3DQEB
# CwUAA4ICAQBTl/rp/1EMC6RXuNwZmY8QNQpzSOODOmLbFU1hMlHq/iipWO+tsAnH
# fB4CnZlrbgkVa64syckD29gWMrYp2PMdTwsL/vHmUI0lZj1pJ3zCvB5E+4CnKkhY
# SIre1yukMyzbHR5y5X2bQ6kVtR0mkKqDTrT+vm6abBMmNcVwc+j5IJ9viHspncAs
# X/t7gnYDmMnHCWTQwR01wNYypEbmpf5ZtF8233I5toy+x2TGBx7PToduYzxWiF9G
# Hd18UNGuyNjsLPnHI0cY3vGNMo5GiaisR9e/CHYUq149MduRRifz9kkq8JA81k0j
# +DEsZb8lOORoA7gte007xnesv35OL4ezbfhjkKYICGjRVSB/Xu8YhH04Xs6AbFWB
# Boqi9/DH9RV3S0LH+JzxNIeDUw8LW7VNYrSOHWuRqPSazmtWll+MQUDV0p4LIUMl
# EjoUNsRBvsDYSMiZSTNizMgyp437XDv25+iO8GMtiKlymsOPuKYALFVn0TJxdIet
# ID0HnXa560C3FysEDxsGbVCI6L1l9j5RCmmF1qUs7o2oczvlDyplesA0sNOSlpJF
# xyTgvlXXloxJCH7Yaz/2ItvhfMt1CZhMtyp38Y1yWlgMqSTrlJVxAcXHOXzu/mEM
# aNvDTqF/zGnW5todKFHL092hQqm+8xGNOjL0C8G+ByZ2tzSh3y1R7jGCGeowghnm
# AgEBMH0waTELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMUEw
# PwYDVQQDEzhEaWdpQ2VydCBUcnVzdGVkIEc0IENvZGUgU2lnbmluZyBSU0E0MDk2
# IFNIQTM4NCAyMDIxIENBMQIQCC2MFtJ1dCZDA7Yrcl1L6DANBglghkgBZQMEAgEF
# AKB8MBAGCisGAQQBgjcCAQwxAjAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEE
# MBwGCisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCAq
# B0pClOY58kXXg9AI/1d1a7642/lU+YDAwYDLojpRezANBgkqhkiG9w0BAQEFAASC
# AYAAfWDJrFR728HOZjAeFkeqyl43NUGseLOSVC3HfMsjWYZILiRpZ4j3DwXfEOkX
# hwOyYPg9n37UpTXQjidWySrH4yNSnIOoh1pRheYoL7bfDt+TJTKwCV4H23lRB/cM
# uXaKnt/8pb8ZynStdEuZ9lPlcQULagpJ5bIUbk+m+Al96V01aX+eZyjVWTAhsQXy
# nZWb8O4Y5r03KpPy9bG38msKQHe74sU3noessYFNuXZear/BXFlaig1T8ps3KcDH
# dn+JhUBUvZJoDdd23uXSE83QvDQaqoloAdi+hiXWLQGZ2IZSO64pu8LG1mBVYXIO
# 83dwAuPGhrXueWhjoDm96rWwalOWO3nL42+M2IVJKqjOiHjKX/i16Wdszopkhequ
# YJKK5zplnDVjDEktd0EmeQGaaiapIN7chr+4FwBK1quwUgH+3zUzvQskVr55eAqq
# B05qPT/WfnKQ+OVwnv8dg0KpBjGuaJdTlwJQleSEgC6wK+D8MZ4Z9v+BQ5b1bA5E
# 7GmhghdAMIIXPAYKKwYBBAGCNwMDATGCFywwghcoBgkqhkiG9w0BBwKgghcZMIIX
# FQIBAzEPMA0GCWCGSAFlAwQCAQUAMHgGCyqGSIb3DQEJEAEEoGkEZzBlAgEBBglg
# hkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgWgrrF++ejnt2pGnjE5OMq8xG8xH+
# /t3PURwqXbltrX4CEQCxlcBRTJ43SSelFBnEBGapGA8yMDI0MDkyMDA5NTMzMlqg
# ghMJMIIGwjCCBKqgAwIBAgIQBUSv85SdCDmmv9s/X+VhFjANBgkqhkiG9w0BAQsF
# ADBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5BgNV
# BAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0YW1w
# aW5nIENBMB4XDTIzMDcxNDAwMDAwMFoXDTM0MTAxMzIzNTk1OVowSDELMAkGA1UE
# BhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMSAwHgYDVQQDExdEaWdpQ2Vy
# dCBUaW1lc3RhbXAgMjAyMzCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AKNTRYcdg45brD5UsyPgz5/X5dLnXaEOCdwvSKOXejsqnGfcYhVYwamTEafNqrJq
# 3RApih5iY2nTWJw1cb86l+uUUI8cIOrHmjsvlmbjaedp/lvD1isgHMGXlLSlUIHy
# z8sHpjBoyoNC2vx/CSSUpIIa2mq62DvKXd4ZGIX7ReoNYWyd/nFexAaaPPDFLnkP
# G2ZS48jWPl/aQ9OE9dDH9kgtXkV1lnX+3RChG4PBuOZSlbVH13gpOWvgeFmX40Qr
# StWVzu8IF+qCZE3/I+PKhu60pCFkcOvV5aDaY7Mu6QXuqvYk9R28mxyyt1/f8O52
# fTGZZUdVnUokL6wrl76f5P17cz4y7lI0+9S769SgLDSb495uZBkHNwGRDxy1Uc2q
# TGaDiGhiu7xBG3gZbeTZD+BYQfvYsSzhUa+0rRUGFOpiCBPTaR58ZE2dD9/O0V6M
# qqtQFcmzyrzXxDtoRKOlO0L9c33u3Qr/eTQQfqZcClhMAD6FaXXHg2TWdc2PEnZW
# pST618RrIbroHzSYLzrqawGw9/sqhux7UjipmAmhcbJsca8+uG+W1eEQE/5hRwqM
# /vC2x9XH3mwk8L9CgsqgcT2ckpMEtGlwJw1Pt7U20clfCKRwo+wK8REuZODLIivK
# 8SgTIUlRfgZm0zu++uuRONhRB8qUt+JQofM604qDy0B7AgMBAAGjggGLMIIBhzAO
# BgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEF
# BQcDCDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1sBwEwHwYDVR0jBBgw
# FoAUuhbZbU2FL3MpdpovdYxqII+eyG8wHQYDVR0OBBYEFKW27xPn783QZKHVVqll
# MaPe1eNJMFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNv
# bS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZUaW1lU3RhbXBpbmdDQS5j
# cmwwgZAGCCsGAQUFBwEBBIGDMIGAMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5k
# aWdpY2VydC5jb20wWAYIKwYBBQUHMAKGTGh0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0
# LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZUaW1lU3RhbXBpbmdD
# QS5jcnQwDQYJKoZIhvcNAQELBQADggIBAIEa1t6gqbWYF7xwjU+KPGic2CX/yyzk
# zepdIpLsjCICqbjPgKjZ5+PF7SaCinEvGN1Ott5s1+FgnCvt7T1IjrhrunxdvcJh
# N2hJd6PrkKoS1yeF844ektrCQDifXcigLiV4JZ0qBXqEKZi2V3mP2yZWK7Dzp703
# DNiYdk9WuVLCtp04qYHnbUFcjGnRuSvExnvPnPp44pMadqJpddNQ5EQSviANnqlE
# 0PjlSXcIWiHFtM+YlRpUurm8wWkZus8W8oM3NG6wQSbd3lqXTzON1I13fXVFoaVY
# JmoDRd7ZULVQjK9WvUzF4UbFKNOt50MAcN7MmJ4ZiQPq1JE3701S88lgIcRWR+3a
# EUuMMsOI5ljitts++V+wQtaP4xeR0arAVeOGv6wnLEHQmjNKqDbUuXKWfpd5OEhf
# ysLcPTLfddY2Z1qJ+Panx+VPNTwAvb6cKmx5AdzaROY63jg7B145WPR8czFVoIAR
# yxQMfq68/qTreWWqaNYiyjvrmoI1VygWy2nyMpqy0tg6uLFGhmu6F/3Ed2wVbK6r
# r3M66ElGt9V/zLY4wNjsHPW2obhDLN9OTH0eaHDAdwrUAuBcYLso/zjlUlrWrBci
# I0707NMX+1Br/wd3H3GXREHJuEbTbDJ8WC9nR2XlG3O2mflrLAZG70Ee8PBf4NvZ
# rZCARK+AEEGKMIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0oZipeWzANBgkqhkiG
# 9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkw
# FwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVz
# dGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIyMjM1OTU5WjBjMQsw
# CQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5BgNVBAMTMkRp
# Z2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0YW1waW5nIENB
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1BkmzwT1ySVFVxyUD
# xPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3znIkLf50fng8zH1AT
# CyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZKz5C3GeO6lE98NZW
# 1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald68Dd5n12sy+iEZLRS
# 8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zkpsUdzTYNXNXmG6jB
# ZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYnLvWHpo9OdhVVJnCY
# Jn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIqx5K/oN7jPqJz+ucf
# WmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOdOqPVA+C/8KI8ykLc
# GEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJTYsg0ixXNXkrqPNF
# YLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJRk8mMDDtbiiKowSYI
# +RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEoAA6EVO7O6V3IXjAS
# vUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1UdEwEB/wQIMAYBAf8C
# AQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8GA1UdIwQYMBaAFOzX
# 44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggr
# BgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3Nw
# LmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2NhY2VydHMuZGlnaWNl
# cnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYDVR0fBDwwOjA4oDag
# NIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RH
# NC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMA0GCSqGSIb3
# DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0TzzBTzr8Y+8dQXeJL
# Kftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYSlm/EUExiHQwIgqgW
# valWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaqT5Fmniye4Iqs5f2M
# vGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl2szwcqMj+sAngkSu
# mScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1yr8THwcFqcdnGE4AJ
# xLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05et3/JWOZJyw9P2un
# 8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6umAU+9Pzt4rUyt+8SV
# e+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSweJywm228Vex4Ziza4
# k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr7ZVBtzrVFZgxtGIJ
# Dwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYCJtnwZXZCpimHCUcr
# 5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzgaoSv27dZ8/DCCBY0w
# ggR1oAMCAQICEA6bGI750C3n79tQ4ghAGFowDQYJKoZIhvcNAQEMBQAwZTELMAkG
# A1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRp
# Z2ljZXJ0LmNvbTEkMCIGA1UEAxMbRGlnaUNlcnQgQXNzdXJlZCBJRCBSb290IENB
# MB4XDTIyMDgwMTAwMDAwMFoXDTMxMTEwOTIzNTk1OVowYjELMAkGA1UEBhMCVVMx
# FTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNv
# bTEhMB8GA1UEAxMYRGlnaUNlcnQgVHJ1c3RlZCBSb290IEc0MIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAv+aQc2jeu+RdSjwwIjBpM+zCpyUuySE98orY
# WcLhKac9WKt2ms2uexuEDcQwH/MbpDgW61bGl20dq7J58soR0uRf1gU8Ug9SH8ae
# FaV+vp+pVxZZVXKvaJNwwrK6dZlqczKU0RBEEC7fgvMHhOZ0O21x4i0MG+4g1ckg
# HWMpLc7sXk7Ik/ghYZs06wXGXuxbGrzryc/NrDRAX7F6Zu53yEioZldXn1RYjgwr
# t0+nMNlW7sp7XeOtyU9e5TXnMcvak17cjo+A2raRmECQecN4x7axxLVqGDgDEI3Y
# 1DekLgV9iPWCPhCRcKtVgkEy19sEcypukQF8IUzUvK4bA3VdeGbZOjFEmjNAvwjX
# WkmkwuapoGfdpCe8oU85tRFYF/ckXEaPZPfBaYh2mHY9WV1CdoeJl2l6SPDgohIb
# Zpp0yt5LHucOY67m1O+SkjqePdwA5EUlibaaRBkrfsCUtNJhbesz2cXfSwQAzH0c
# lcOP9yGyshG3u3/y1YxwLEFgqrFjGESVGnZifvaAsPvoZKYz0YkH4b235kOkGLim
# dwHhD5QMIR2yVCkliWzlDlJRR3S+Jqy2QXXeeqxfjT/JvNNBERJb5RBQ6zHFynIW
# IgnffEx1P2PsIV/EIFFrb7GrhotPwtZFX50g/KEexcCPorF+CiaZ9eRpL5gdLfXZ
# qbId5RsCAwEAAaOCATowggE2MA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFOzX
# 44LScV1kTN8uZz/nupiuHA9PMB8GA1UdIwQYMBaAFEXroq/0ksuCMS1Ri6enIZ3z
# bcgPMA4GA1UdDwEB/wQEAwIBhjB5BggrBgEFBQcBAQRtMGswJAYIKwYBBQUHMAGG
# GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBDBggrBgEFBQcwAoY3aHR0cDovL2Nh
# Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENBLmNydDBF
# BgNVHR8EPjA8MDqgOKA2hjRodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNl
# cnRBc3N1cmVkSURSb290Q0EuY3JsMBEGA1UdIAQKMAgwBgYEVR0gADANBgkqhkiG
# 9w0BAQwFAAOCAQEAcKC/Q1xV5zhfoKN0Gz22Ftf3v1cHvZqsoYcs7IVeqRq7IviH
# GmlUIu2kiHdtvRoU9BNKei8ttzjv9P+Aufih9/Jy3iS8UgPITtAq3votVs/59Pes
# MHqai7Je1M/RQ0SbQyHrlnKhSLSZy51PpwYDE3cnRNTnf+hZqPC/Lwum6fI0POz3
# A8eHqNJMQBk1RmppVLC4oVaO7KTVPeix3P0c2PR3WlxUjG/voVA9/HYJaISfb8rb
# II01YBwCA8sgsKxYoA5AY8WYIsGyWfVVa88nq2x2zm8jLfR+cWojayL/ErhULSd+
# 2DrZ8LaHlv1b0VysGMNNn3O3AamfV6peKOK5lDGCA3YwggNyAgEBMHcwYzELMAkG
# A1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTswOQYDVQQDEzJEaWdp
# Q2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVTdGFtcGluZyBDQQIQ
# BUSv85SdCDmmv9s/X+VhFjANBglghkgBZQMEAgEFAKCB0TAaBgkqhkiG9w0BCQMx
# DQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkFMQ8XDTI0MDkyMDA5NTMzMlowKwYL
# KoZIhvcNAQkQAgwxHDAaMBgwFgQUZvArMsLCyQ+CXc6qisnGTxmcz0AwLwYJKoZI
# hvcNAQkEMSIEINPSXsPWJ6vWSZvXUVD15rzdYfXnjEbq4I2j6R9Y8ZljMDcGCyqG
# SIb3DQEJEAIvMSgwJjAkMCIEINL25G3tdCLM0dRAV2hBNm+CitpVmq4zFq9NGprU
# DHgoMA0GCSqGSIb3DQEBAQUABIICAKARlXMGGTd7g5m1dHhlPTHNNef0Ho5DdFMT
# 919Nlwxj0zaMfBA8Vrh0Ng8rbk6/8qbwyoLExaLT/YpDwf6AL7DjDD21N+YAnsPD
# FGfweXfJoYXHCOjhq27ZIRQTsXveewm82BaRPZruWhFmcbUzO21AZVgIVp6vXFva
# 0bO5Ql5txGrUHWpAq7hhw93fJwGO/r2sDzsBw57pyem6vXpH7NyPKEKNunC8qWwp
# 00F5RHyiS5bc04Y1qcTZ3LPX3m6LvWRPduWsQaPNrx4GS5aEJ2xtDdwlPX0eDiN7
# kvqAofy6zhV4G9Ak8u4HodYpatdDcUkAWUfyvxevzME7A7s+SuOOWEqs4+h+goQZ
# 2rKgFoMYNQS6SlST91ILG857+X2CchrhIxeXejHM03WGwAmerwNC6Nb23fjzU7BW
# QP+Q4phPIP6T3/T72cLCF9NuI98IhdXO3xz2p2a2G/B62xvHFX0A1Zqdv9iECc3n
# d7DGGeyDRpz0ceDnLC1X3lrP3KJbddSoCsHBrU50o9yLVfX6ATxM4Ny7NN/BAz+o
# TJnwDmPJO0JQtq2ezjPj4entAUVm0fN2eEisVvEXE9BZpBrqo33eFLHM+A7iYvQ4
# rTqYVCtdJN9cffUKf3vZSoqMtvPLgpU1q9HSsRJot9bnnlz7kXFzz3ErCWE74R4I
# iLZLtKMi
# SIG # End signature block
|
combined_dataset/train/non-malicious/Get-PrivateKeyPath.ps1 | Get-PrivateKeyPath.ps1 | #requires -Version 2.0
function Get-PrivateKeyPath
{
param
(
[Parameter(Mandatory = $true, ValueFromPipeline = $true, Position = 0)]
[System.Security.Cryptography.X509Certificates.X509Certificate2]
[ValidateScript( { ( $_ -is [System.Security.Cryptography.X509Certificates.X509Certificate2] ) } ) ]
$Certificate,
[string]
[ValidateSet('TrustedPublisher','Remote Desktop','Root','REQUEST','TrustedDevices','CA','Windows Live ID Token Issuer','AuthRoot','TrustedPeople','AddressBook','My','SmartCardRoot','Trust','Disallowed')]
$StoreName = 'My',
[string]
[ValidateSet('LocalMachine','CurrentUser')]
$StoreScope = 'CurrentUser'
)
begin
{
Add-Type -AssemblyName System.Security
}
process
{
if ($Certificate.PrivateKey -eq $null){Write-Error ("Certificate doesn't have Private Key") -ErrorAction:Stop}
Switch ($StoreScope)
{
"LocalMachine" { $PrivateKeysPath = [System.Environment]::GetFolderPath([System.Environment+SpecialFolder]::CommonApplicationData) + "\\Microsoft\\Crypto\\RSA\\MachineKeys" }
"CurrentUser" { $PrivateKeysPath = [System.Environment]::GetFolderPath([System.Environment+SpecialFolder]::ApplicationData) + "\\Microsoft\\Crypto\\RSA" }
}
$PrivateKeyPath = $PrivateKeysPath + "\\" + $Certificate.PrivateKey.CspKeyContainerInfo.UniqueKeyContainerName
$PrivateKeyPath
}
end
{ }
}
|
combined_dataset/train/non-malicious/1687.ps1 | 1687.ps1 |
function Get-User {
param (
[string]$comp = $env:COMPUTERNAME,
[ValidateSet('computersystem', 'process', 'dir')]
$method = 'computersystem'
)
switch ($method) {
'dir' {
Get-ChildItem \\$comp\c$\users -Directory -Exclude '*$*' | % {Get-ChildItem $_.FullName ntuser.dat* -Force -ea 0} | sort LastWriteTime -Descending | select @{n='Computer';e={$comp}}, @{n='User';e={Split-Path (Split-Path $_.FullName) -Leaf}}, LastWriteTime | ? user -notmatch '\.net'| group computer, user | % {$_.group | select -f 1}
}
'computersystem' {
try {
(Get-WmiObject win32_computerSystem -ComputerName $comp).username
} catch {
try {
[Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey('LocalMachine', $comp).OpenSubKey('SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI').getvalue('LastLoggedOnUser')
Get-WmiObject Win32_NetworkLoginProfile -ComputerName $comp
} catch {
'Error'
}
}
}
'process' {
$owners = @{}
Get-WmiObject win32_process -Filter 'name = "explorer.exe"' -ComputerName $comp | % {$owners[$_.handle] = $_.getowner().user}
Get-Process explorer -ComputerName $comp | % {$owners[$_.id.tostring()]}
}
}
}
|
combined_dataset/train/non-malicious/Invoke-PoshCode.ps1 | Invoke-PoshCode.ps1 | # .Summary
# Download and execute a script block from PoshCode.org
# .Description
# Download the code for a PoshCode script based on search of by specific index.
# Execute the code as a script block, passing arguments to it.
#
# Note: this is scary, and you should only use it if you really know what you're doing ;) By invoking the downloaded code as a script block, we effenctively bypass the execution policy...
#
# Depends on the PoshCode module from http://poshcode.org/PoshCode.psm1
#
# .Parameter SearchTerms
# The terms to use when searching, or the Id of the spu
# .Parameter ArgumentList
# The arguments to be passed to the Invoked script
# .Example
# Invoke-PoshCode Test-Port localhost 80
#
# Search for "Test-Port" and invoke the first result with the parameters "localhost" and 80
# .Example
# Invoke-PoshCode 85 localhost 80
#
# Fetch http://poshcode.org/get/85 and invoke it with the parameters "localhost" and 80
# .Example
# Invoke-PoshCode 85 -ArgumentList @{srv="localhost";port="80"}
#
# Fetch http://poshcode.org/get/85 and invoke it with the parameters srv = "localhost" and port = 80
function Invoke-PoshCode {
param(
[Parameter(Mandatory=$true, Position=1)]$SearchTerms,
[Parameter(Position=2, ValueFromRemainingArguments=$true)]$ArgumentList)
Write-Verbose "Searching for: $SearchTerms"
if($SearchTerms -is [int]) {
$Code = Get-PoshCode -Id $SearchTerms -Passthru
} else {
$Code = Get-PoshCode -Query $SearchTerms | Select -First 1 | Get-PoshCode -Passthru
}
Invoke-Command -ScriptBlock ([ScriptBlock]::Create($Code)) -ArgumentList $ArgumentList
}
|
combined_dataset/train/non-malicious/sample_33_82.ps1 | sample_33_82.ps1 | #
# Module manifest for module 'OCI.PSModules.Rover'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Rover.dll'
# Version number of this module.
ModuleVersion = '74.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '6b3a22b9-6905-4ece-936d-982335059f13'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Rover Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Rover.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIRoverCluster', 'Get-OCIRoverClusterCertificate',
'Get-OCIRoverClusterRoverBundleRequestsList',
'Get-OCIRoverClustersList', 'Get-OCIRoverEntitlement',
'Get-OCIRoverEntitlementsList', 'Get-OCIRoverNode',
'Get-OCIRoverNodeCertificate', 'Get-OCIRoverNodeEncryptionKey',
'Get-OCIRoverNodeGetRpt', 'Get-OCIRoverNodeRoverBundleRequestsList',
'Get-OCIRoverNodesList', 'Get-OCIRoverShapesList',
'Get-OCIRoverWorkRequest', 'Get-OCIRoverWorkRequestErrorsList',
'Get-OCIRoverWorkRequestLogsList', 'Get-OCIRoverWorkRequestsList',
'Invoke-OCIRoverRequestAdditionalNodes',
'Invoke-OCIRoverRequestBundleRoverCluster',
'Invoke-OCIRoverRequestBundleRoverNode',
'Invoke-OCIRoverRetrieveAvailableBundleVersionsRoverCluster',
'Invoke-OCIRoverRetrieveAvailableBundleVersionsRoverNode',
'Invoke-OCIRoverRetrieveBundleStatusRoverCluster',
'Invoke-OCIRoverRetrieveBundleStatusRoverNode',
'Invoke-OCIRoverRoverNodeActionRetrieveCaBundle',
'Invoke-OCIRoverRoverNodeActionSetKey',
'Invoke-OCIRoverRoverNodeGenerateCertificate',
'Invoke-OCIRoverRoverNodeRenewCertificate',
'Invoke-OCIRoverRoverNodeReplaceCertificateAuthority',
'Invoke-OCIRoverRoverNodeRetrieveLeafCertificate',
'Move-OCIRoverClusterCompartment',
'Move-OCIRoverEntitlementCompartment',
'Move-OCIRoverNodeCompartment', 'New-OCIRoverCluster',
'New-OCIRoverEntitlement', 'New-OCIRoverNode',
'Remove-OCIRoverCluster', 'Remove-OCIRoverEntitlement',
'Remove-OCIRoverNode', 'Stop-OCIRoverWorkRequest',
'Update-OCIRoverCluster', 'Update-OCIRoverEntitlement',
'Update-OCIRoverNode'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Rover'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Get-Credential.ps1 | Get-Credential.ps1 | function Get-Credential{
PARAM([String]$Title, [String]$Message, [String]$Domain, [String]$UserName, [switch]$Console)
## Carefully EA=SilentlyContinue and check for $True because by default it's MISSING (not False, as you might expect)
$cp = (Get-ItemProperty HKLM:\\SOFTWARE\\Microsoft\\PowerShell\\1\\ShellIds ConsolePrompting -ea "SilentlyContinue").ConsolePrompting -eq $True
if($Console -and !$cp) {
Set-ItemProperty "HKLM:\\SOFTWARE\\Microsoft\\PowerShell\\1\\ShellIds" ConsolePrompting $True
} elseif(!$Console -and $Console.IsPresent -and $cp) {
Set-ItemProperty "HKLM:\\SOFTWARE\\Microsoft\\PowerShell\\1\\ShellIds" ConsolePrompting $False
}
## Now call the Host.UI method ... if they don't have one, we'll die, yay.
$Host.UI.PromptForCredential($Title,$Message,$UserName,$Domain)
## BoyScouts: Leave everything better than you found it (I'm tempted to leave it = True)
Set-ItemProperty "HKLM:\\SOFTWARE\\Microsoft\\PowerShell\\1\\ShellIds" ConsolePrompting $cp
}
|
combined_dataset/train/non-malicious/Get-MacAddressOui_1.ps1 | Get-MacAddressOui_1.ps1 | function Get-MacAddressOui {
<#
.SYNOPSIS
Gets a MAC address OUI (Organizationally Unique Identifier).
.DESCRIPTION
The Get-MacAddressOui function retrieves the MAC address OUI reference list maintained by the IEEE standards website and
returns the name of the company to which the MAC address OUI is assigned.
.PARAMETER MacAddress
Specifies the MAC address for which the OUI should be retrieved.
.EXAMPLE
Get-MacAddressOui 00:02:B3:FF:FF:FF
Returns the MAC address OUI and the company assigned that idenifier.
.INPUTS
System.String
.OUTPUTS
PSObject
.NOTES
Name: Get-MacAddressOui
Author: Rich Kusak (rkusak@hotmail.com)
Created: 2011-09-01
LastEdit: 2011-09-06 19:09
Version: 1.0.3.0
.LINK
http://standards.ieee.org/develop/regauth/oui/oui.txt
.LINK
about_regular_expressions
#>
[CmdletBinding()]
param (
[Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)]
[ValidateScript({
# Builds regex patterns for the 4 MAC address hex formats
$patterns = @(':', '-', $null) | ForEach {"^([0-9a-f]{2}$_){5}([0-9a-f]{2})$"}
$patterns += '^([0-9a-f]{4}\\.){2}([0-9a-f]{4})$'
if ($_ -match ($patterns -join '|')) {$true} else {
throw "The argument '$_' does not match a valid MAC address format."
}
})]
[string]$MacAddress
)
begin {
$uri = 'http://standards.ieee.org/develop/regauth/oui/oui.txt'
$webClient = New-Object System.Net.WebClient
try {
Write-Debug "Performing operation 'DownloadString' on target '$uri'."
$ouiReference = $webClient.DownloadString($uri)
} catch {
throw $_
}
$properties = 'MacAddress', 'OUI', 'Company'
} # begin
process {
$oui = ($MacAddress -replace '\\W').Remove(6)
$regex = "($oui)\\s*\\(base 16\\)\\s*(.+)"
New-Object PSObject -Property @{
'MacAddress' = $MacAddress
'OUI' = $oui
'Company' = [regex]::Match($ouiReference, $regex, 'IgnoreCase').Groups[2].Value
} | Select $properties
} # process
} # function Get-MacAddressOui
|
combined_dataset/train/non-malicious/Add-UniqueEndings.ps1 | Add-UniqueEndings.ps1 | ## Add-UniqueEndings
## Takes an array of strings and forces them to be unique by adding _<number> tails to duplicates.
####################################################################################################
## Usage:
## $$: (Add-UniqueEndings "one","two","three","one","two","one","one_5").ToString()
## one, two, three, one_1, two_1, one_2, one_3
##
## $$: ("one","two","three","one","two","one","one_5" | Add-UniqueEndings).ToString()
## one, two, three, one_1, two_1, one_2, one_3
####################################################################################################
## History:
## v1 - adds tails _ until the string is unique
## v2 - adds number tails _1 instead
## v2.5 - works with the array passed as an argument (default is on the pipeline)
####################################################################################################
function Add-UniqueEndings {
BEGIN {
if($args.Count) {
$args[0] | Add-UniqueEndings
} else {
$uniques = @{}
$collect = @()
}
}
PROCESS {
if($_){
$item = "$_" -replace "(.*)_\\d+",'$1'
$collect += $item
$uniques.$item += 1
}
}
END {
if(!$args.Count -and $collect.Count) {
[Array]::Reverse($collect)
$collect = $collect | % { if($uniques.$_-- -eq 1){ $_ } else { "$_$('_')$($uniques.$_)" } }
[Array]::Reverse($collect)
$collect
}
}
}
|
combined_dataset/train/non-malicious/sample_5_75.ps1 | sample_5_75.ps1 | ConvertFrom-StringData @'
id_setupapilogs=Setup API Logs
id_setupapilogsobtaining=Obtaining SetupAPI.*.Log
id_setupapilogsoutput=SetupAPI Log
id_setupapilogsoutputdesc=Device Drivers Instalation Logs
'@
# SIG # Begin signature block
# MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAid4/ABcHYJwN/
# QixTrWS30W7D1O5kfhsvFmK1dNPTvKCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMQY5q3TAi3YCW9CEMF+pg4Q
# YHM087wxy9VJg5ITQEGfMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAk3+uEbxVElw+ROJ7Sn7c5Ir5UG22vvU+qetfJ4tF9eNdh4AcD5qAMZ1w
# ZnBPJzt1LN+F2g4UobvwrhHsdClU/MlCECISdi10lIQtohqy1FRRfPKUcSYLqM8Z
# DOLj+3jRjY0BEdxahxTZZYIWx6z14oovxlMQ9BCwqTm636kbRrHpTJd9293V/lfN
# RMtMrcr/xq+Cr35ghJTRkUPAfboF4C4ptC/z6P8VNwGJsy6CkB4pNscTvcNVTZQV
# +fpyr2oDvcW0L8e+Wwtibedcfhxg7b34RrQMpkIEtIUK5cKwILUIvjjqNwNwjoJC
# OGZz/BlazYugYAkuh/0DYEtA7BV3LaGCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC
# F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDVVX4qDNfZ387VvVmCov3JVZq5xz5AcIEMe03fcmYK/wIGZuto66JJ
# GBMyMDI0MTAyODExNDA0MS43NDFaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB+8vLbDdn5TCVAAEAAAH7MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzExM1oXDTI1MTAyMjE4MzExM1owgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjU3MUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqMJWQeWAq4LwvSjYsjP0
# Uvhvm0j0aAOJiMLg0sLfxKoTXAdKD6oMuq5rF5oEiOxV+9ox0H95Q8fhoZq3x9lx
# guZyTOK4l2xtcgtJCtjXRllM2bTpjOg35RUrBy0cAloBU9GJBs7LBNrcbH6rBiOv
# qDQNicPRZwq16xyjMidU1J1AJuat9yLn7taifoD58blYEcBvkj5dH1la9zU846QD
# eOoRO6NcqHLsDx8/zVKZxP30mW6Y7RMsqtB8cGCgGwVVurOnaNLXs31qTRTyVHX8
# ppOdoSihCXeqebgJCRzG8zG/e/k0oaBjFFGl+8uFELwCyh4wK9Z5+azTzfa2GD4p
# 6ihtskXs3lnW05UKfDJhAADt6viOc0Rk/c8zOiqzh0lKpf/eWUY2o/hvcDPZNgLa
# HvyfDqb8AWaKvO36iRZSXqhSw8SxJo0TCpsbCjmtx0LpHnqbb1UF7cq09kCcfWTD
# PcN12pbYLqck0bIIfPKbc7HnrkNQks/mSbVZTnDyT3O8zF9q4DCfWesSr1akycDd
# uGxCdKBvgtJh1YxDq1skTweYx5iAWXnB7KMyls3WQZbTubTCLLt8Xn8t+slcKm5D
# kvobubmHSriuTA3wTyIy4FxamTKm0VDu9mWds8MtjUSJVwNVVlBXaQ3ZMcVjijyV
# oUNVuBY9McwYcIQK62wQ20ECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRHVSGYUNQ3
# RwOl71zIAuUjIKg1KjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAwzoIKOY2dnUj
# fWuMiGoz/ovoc1e86VwWaZNFdgRmOoQuRe4nLdtZONtTHNk3Sj3nkyBszzxSbZEQ
# 0DduyKHHI5P8V87jFttGnlR0wPP22FAebbvAbutkMMVQMFzhVBWiWD0VAnu9x0fj
# ifLKDAVXLwoun5rCFqwbasXFc7H/0DPiC+DBn3tUxefvcxUCys4+DC3s8CYp7WWX
# pZ8Wb/vdBhDliHmB7pWcmsB83uc4/P2GmAI3HMkOEu7fCaSYoQhouWOr07l/KM4T
# ndylIirm8f2WwXQcFEzmUvISM6ludUwGlVNfTTJUq2bTDEd3tlDKtV9AUY3rrnFw
# HTwJryLtT4IFhvgBfND3mL1eeSakKf7xTII4Jyt15SXhHd5oI/XGjSgykgJrWA57
# rGnAC7ru3/ZbFNCMK/Jj6X8X4L6mBOYa2NGKwH4A37YGDrecJ/qXXWUYvfLYqHGf
# 8ThYl12Yg1rwSKpWLolA/B1eqBw4TRcvVY0IvNNi5sm+//HJ9Aw6NJuR/uDR7X7v
# DXicpXMlRNgFMyADb8AFIvQPdHqcRpRorY+YUGlvzeJx/2gNYyezAokbrFhACsJ2
# BfyeLyCEo6AuwEHn511PKE8dK4JvlmLSoHj7VFR3NHDk3zRkx0ExkmF8aOdpvoKh
# uwBCxoZ/JhbzSzrvZ74GVjKKIyt5FA0wggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUABHHn7NCGusZz2RfVbyuwYwPykBWggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJT0swIhgPMjAyNDEwMjcyMzQ2MTlaGA8yMDI0MTAyODIzNDYxOVowdzA9
# BgorBgEEAYRZCgQBMS8wLTAKAgUA6slPSwIBADAKAgEAAgINvAIB/zAHAgEAAgIU
# vzAKAgUA6sqgywIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow
# CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQCt9+78tOBk
# 3G7InFWNeSnv+gNf7827NofcCXCIrLQa834+WZOE6YjVcA8B4zRZWYQt61ryjsP7
# nO4QK9AT7twzBe+cVhqFCO+umtt9HILo/02fBvZqGhC0aABNMEKKtN5mHLc0RqyR
# jYVeyJJgW3o+AuIAomNefMMnMlPFbCzeVx+VWfowu6aZGIf20olcJr1Udx5TxmnY
# dsKjQyDDl6Lmtl54TbeWFF6Uai0RRHKqDZXeiYK0nnazQchF9LlhnVpwArQ160lu
# nLrYsrAoYdqLC+X0Bz+PmzShMHudHvUpm9HSYaJSjBDw/SBZA3RVy2I0EMGwb608
# ErihFwOktb8UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAH7y8tsN2flMJUAAQAAAfswDQYJYIZIAWUDBAIBBQCgggFKMBoG
# CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgQRZ0uRUS
# Fl0/Z3W9GIkZGKI7iqhKPnK9T+7y22LoKcgwgfoGCyqGSIb3DQEJEAIvMYHqMIHn
# MIHkMIG9BCA52wKr/KCFlVNYiWsCLsB4qhjEYEP3xHqYqDu1SSTlGDCBmDCBgKR+
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+8vLbDdn5TCVAAEA
# AAH7MCIEIOcOJM95z1rtLRPImI9GcCxcLV/lXPRviSc4qDRq2ZeFMA0GCSqGSIb3
# DQEBCwUABIICABun074imeer6m3Dcwi0s+4/sG5qNf0CTkb/bPtTSxMqiETvYC9r
# XoGSEvI5oevpueKLngRrwSvUl8mQWVhbYGYMM8YwSG5yatdYoH6VHY070rDKqzzH
# FygOh1WGR9G8GitCuH30jEFg11LLTpYv9zp/x3aLaa3w5U7CGj+LrCpr+pe+rcfO
# UfQBzAHfhBYX24CKUCVjN3kclJK4Izf/F0CviwtFD6FhnYiY6N3tTyIEqbjXaS/a
# dt5t5Qn6DiaiEJHvOvbosqUgKsPa2T9W8tS+1M2h50O3tEO2E5sKdlqWZUNfLOTE
# BlkSN1/7sDg+6mFZ/rD8Df1zZcbFg4JcEXGzpPYciAZGfWwuY88vHmQHw+10YSHR
# Ucfb18z1sICj1owmpNLbPz7RujUSbR2kev78TQzkR206zU/0YR23EdhrOtjBHszA
# cJdzgeAQSsFmmrpiqnGVMShhP/5jiE3VcXWHS+X51kbw04HVic2VVKDdsafiFS1B
# f4sz7pNEetfYv5rib4z/6OYg3U4/XNZC3RSDJyIlsW1e40EgQizJYZFCDbpQxxzA
# wLI2nGvbz7YIRiYT4UJIwJqDND/UsNfme35sjkYTyzamBQmRPJBq1KLw1Jz87XQo
# v5KZVMIqnmahjWzei677p6HLNFvzjh650+VLLbN7tyForgbM2RV7z6gw
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_49_82.ps1 | sample_49_82.ps1 | <#
.SYNOPSIS
Common Reporting functions across all modules/scenarios
.DESCRIPTION
Logging, Reporting
.INPUTS
Inputs (if any)
.OUTPUTS
Output (if any)
.NOTES
General notes
#>
function Set-AzStackHciOutputPath
{
param ($Path, $Source='AzStackHciEnvironmentChecker/Diagnostic')
if ([string]::IsNullOrEmpty($Path))
{
$Path = Join-Path -Path $HOME -ChildPath ".AzStackHci"
}
$Global:AzStackHciEnvironmentLogFile = Join-Path -Path $Path -ChildPath 'AzStackHciEnvironmentChecker.log'
$Global:AzStackHciEnvironmentReport = Join-Path -Path $Path -ChildPath 'AzStackHciEnvironmentReport.json'
$Global:AzStackHciEnvironmentReportXml = Join-Path -Path $Path -ChildPath 'AzStackHciEnvironmentReport.xml'
Assert-EventLog -source $Source
Set-AzStackHciIdentifier
}
Import-LocalizedData -BindingVariable lTxt -FileName AzStackHci.EnvironmentChecker.Strings.psd1
function Get-AzStackHciEnvProgress
{
<#
.SYNOPSIS
Look for existing progress or create new progress.
.DESCRIPTION
Finds either the latest progress XML file or creates a new progress XML file
.EXAMPLE
PS C:\> <example usage>
Explanation of what the example does
.INPUTS
Clean switch, in case the user wants to start fresh
Path to search for progress run.
.OUTPUTS
PSCustomObject of progress.
.NOTES
#>
param ([switch]$clean, $path = $PSScriptRoot)
$latestReport = Get-Item -Path $Global:AzStackHciEnvironmentReportXml -ErrorAction SilentlyContinue
try { $report = Import-Clixml $latestReport.FullName } catch {}
if (-not $clean -and $latestReport -and $report)
{
Log-Info -Message ('Found existing report: {0}' -f $report.FilePath)
}
else
{
$hash = @{
FilePath = $Global:AzStackHciEnvironmentReportXml
Version = $MyInvocation.MyCommand.Module.Version.ToString()
Jobs = @{}
}
$report = New-Object PSObject -Property $hash
Log-Info -Message ('Creating new report {0}' -f $report.FilePath)
}
$report
}
function Write-AzStackHciEnvProgress
{
<#
.SYNOPSIS
Write report output to JSON
.DESCRIPTION
After all processing, take results object and convert to JSON report.
Any file already existing will be overwritten.
.EXAMPLE
Write-AzStackHciEnvProgress -report $report
Writes $report to JSON file
.INPUTS
[psobject]
.OUTPUTS
XML file on disk (path on disk is expected to be embedded in psobject)
.NOTES
General notes
#>
param ([psobject]$report)
try
{
$report | Export-Clixml -Depth 10 -Path $report.FilePath -Force
Log-Info -Message ('AzStackHCI progress written: {0}' -f $report.FilePath)
}
Catch
{
Log-Info -Message ('Writing XML progress to disk error {0}' -f $_.exception.message) -Type Error
throw $_.exception
}
}
function Add-AzStackHciEnvJob
{
<#
.SYNOPSIS
Adds a 'Job' to the progress object.
.DESCRIPTION
If a user runs the tool multiple time to check different assets
e.g. Certificates on one execution and Registration details on the next execution
Those executions are added to the progress for tracking purposes.
Execution/Job details include:
start time,
parameters,
parameterset (indicating what is being checked, certificates or Azure Accounts),
Placeholders for EndTime and Duration (later filled in by Close-AzStackHciEnvJob)
.EXAMPLE
Add-AzStackHciEnvJob -report $report
Adds execution job to progress object ($report)
.INPUTS
Report - psobject - containing all progress to date
.OUTPUTS
Report - psobject - updated with execution job log.
.NOTES
General notes
#>
param ($report)
$allJobs = @{}
$alljobs = $report.Jobs
# Index for jobs must be a string for json conversion later
if ($alljobs.Count)
{
$jobCount = ($alljobs.Count++).tostring()
}
else
{
$jobCount = '0'
}
# Record current job
$currentJob = @{
Index = $jobCount
StartTime = (Get-Date -f 'yyyy/MM/dd HH:mm:ss')
EndTime = $null
Duration = $null
}
Log-Info -Message ('Adding current job to progress: {0}' -f $currentJob)
# Add current job
$allJobs += @{"$jobcount" = $currentJob }
$report.Jobs = $allJobs
$report
}
function Close-AzStackHciEnvJob
{
<#
.SYNOPSIS
Writes endtime and duration for jobs
.DESCRIPTION
Find latest job entry and update time and calculates duration
calls function to update xml on disk
and updates and returns report object
.EXAMPLE
Close-AzStackHciEnvJob -report $report
.INPUTS
Report - psobject - containing all progress to date
.OUTPUTS
Report - psobject - updated with finished execution job log.
.NOTES
General notes
#>
param ($report)
try
{
$latestJob = $report.jobs.Keys -match '[0-9]' | ForEach-Object { [int]$_ } | Sort-Object -Descending | Select-Object -First 1
$report.jobs["$latestJob"].EndTime = (Get-Date -f 'yyyy/MM/dd HH:mm:ss')
$duration = (([dateTime]$report.jobs["$latestJob"].EndTime) - ([dateTime]$report.jobs["$latestJob"].StartTime)).TotalSeconds
$report.jobs["$latestJob"].Duration = $duration
Log-Info -Message ('Updating current job to progress with endTime: {0} and duration {1}' -f $report.jobs["$latestJob"].EndTime, $duration)
}
Catch
{
Log-Info -Message ('Updating current job to progress failed with exception: {0}' -f $_.exception) -Type Error
}
Write-AzStackHciEnvProgress -report $report
$report
}
function Write-AzStackHciEnvReport
{
<#
.SYNOPSIS
Writes progress to disk in JSON format
.DESCRIPTION
Write progress object to disk in JSON format, overwriting as neccessary.
The resulting blob is intended to be a portable record of what has been checked
including the results of that check
.EXAMPLE
Write-AzStackHciEnvReport -report $report
.INPUTS
Report - psobject - containing all progress to date
.OUTPUTS
JSON - file - named AzStackEnvReport.json
.NOTES
General notes
#>
param ([psobject]$report)
try
{
ConvertTo-Json -InputObject $report -Depth 8 -WarningAction SilentlyContinue | Out-File $AzStackHciEnvironmentReport -Force -Encoding UTF8
Log-Info -Message ('JSON report written to {0}' -f $AzStackHciEnvironmentReport)
}
catch
{
Log-Info -Message ('Writing JSON report failed:' -f $_.exception.message) -Type Error
throw $_.exception
}
}
function Log-Info
{
<#
.SYNOPSIS
Write verbose logging to disk
.DESCRIPTION
Formats and writes verbose logging to disk under scriptroot. Log type (or severity) is essentially cosmetic
to the verbose log file, no action should be inferred, such as termination of the script.
.EXAMPLE
Write-AzStackHciEnvironmentLog -Message ('Script messaging include data {0}' -f $data) -Type 'Info|Warning|Error' -Function 'FunctionName'
.INPUTS
Message - a string of the body of the log entry
Type - a cosmetic type or severity for the message, must be info, warning or error
Function - ideally the name of the function or the script writing the log entry.
.OUTPUTS
Appends Log entry to AzStackHciEnvironmentChecker.log under the script root.
.NOTES
General notes
#>
[cmdletbinding()]
param(
[string]
$Message,
[ValidateSet('INFO', 'INFORMATIONAL', 'WARNING', 'CRITICAL', 'ERROR', 'SUCCESS')]
[string]
$Type = 'INFORMATIONAL',
[ValidateNotNullOrEmpty()]
[string]$Function = ((Get-PSCallStack)[0].Command),
[switch]$ConsoleOut,
[switch]$Telemetry
)
$Message = RunMask $Message
if ($ConsoleOut)
{
#if ($PSEdition -eq 'desktop')
if ($true)
{
switch -wildcard ($function)
{
'*-AzStackHciEnvironment*' { $foregroundcolor = 'DarkYellow' }
default { $foregroundcolor = "White" }
}
switch ($Type)
{
'SUCCESS' { $foregroundcolor = 'Green' }
'WARNING' { $foregroundcolor = 'Yellow' }
'CRITICAL' { $foregroundcolor = 'Red' }
'ERROR' { $foregroundcolor = 'Red' }
default { $foregroundcolor = "White" }
}
Write-Host $message -ForegroundColor $foregroundcolor
}
else
{
Write-Host $message
}
}
else
{
Write-Verbose $message
}
if (-not [string]::IsNullOrEmpty($message))
{
# Log to ETW
if ($Telemetry)
{
$source = "AzStackHciEnvironmentChecker/Telemetry"
$EventId = 17201
}
else
{
$source = "AzStackHciEnvironmentChecker/Operational"
$EventId = 17203
}
$logName = 'AzStackHciEnvironmentChecker'
$EventType = switch ($Type)
{
"ERROR" { "Error" }
"CRITICAL" { "Error" }
"WARNING" { 'Warning' }
"SUCCESS" { "Information" }
"INFORMATIONAL" { "Information" }
Default { "Information" }
}
# Only write telemetry or non-info entries to the eventlog to save time and noise.
if ($Telemetry -or $EventType -ne "Information")
{
Write-ETWLog -Source $Source -logName $logName -Message $Message -EventType $EventType -EventId $EventId
}
# Log to file
$entry = "[{0}] [{1}] [{2}] {3}" -f ([datetime]::now).tostring(), $type.ToUpper(), $function, ($Message -replace "`n|`t", "")
# If the log file path doesnt exist, create it
if ([string]::IsNullOrEmpty($AzStackHciEnvironmentLogFile))
{
Set-AzStackHciOutputPath
}
if (-not (Test-Path $AzStackHciEnvironmentLogFile))
{
New-Item -Path $AzStackHciEnvironmentLogFile -Force | Out-Null
}
$retries = 3
for ($i = 1; $i -le $retries; $i++) {
try {
$entry | Out-File -FilePath $AzStackHciEnvironmentLogFile -Append -Force -Encoding UTF8
$writeFailed = $false
break
}
catch {
$writeFailed = "Log-info $i/$retries failed: $($_.ToString())"
start-sleep -Seconds 5
}
}
if ($writeFailed)
{
throw $writeFailed
}
}
}
function RunMask
{
[cmdletbinding()]
[OutputType([string])]
Param (
[Parameter(ValueFromPipeline = $True)]
[string]
$in
)
Begin {}
Process
{
try
{
<#$in | Get-PIIMask | Get-GuidMask#>
$in | Get-GuidMask
}
catch
{
$_.exception
}
}
End {}
}
function Get-PIIMask
{
[cmdletbinding()]
[OutputType([string])]
Param (
[Parameter(ValueFromPipeline = $True)]
[string]
$in
)
Begin
{
$pii = $($ENV:USERDNSDOMAIN), $($ENV:COMPUTERNAME), $($ENV:USERNAME), $($ENV:USERDOMAIN) | ForEach-Object {
if ($null -ne $PSITEM)
{
$PSITEM
}
}
$r = $pii -join '|'
}
Process
{
try
{
return [regex]::replace($in, $r, "[*redacted*]")
}
catch
{
$_.exception
}
}
End {}
}
function Get-GuidMask
{
[OutputType([string])]
[CmdletBinding()]
param (
[Parameter(ValueFromPipeline = $True)]
[String]
$guid
)
Begin
{
$r = [regex]::new("(-([a-fA-F0-9]{4}-){3})")
}
Process
{
try
{
return [regex]::replace($guid, $r, "-xxxx-xxxx-xxxx-")
}
catch
{
$_.exception
}
}
End {}
}
function Write-AzStackHciHeader
{
<#
.SYNOPSIS
Write invocation and system information into log and writes cmdlet name and version to screen.
#>
param (
[Parameter()]
[System.Management.Automation.InvocationInfo]
$invocation,
[psobject]
$params,
[switch]
$PassThru
)
try
{
$paramToString = (($params | Protect-SensitiveProperties).GetEnumerator() | ForEach-Object { "$($_.Key)=$($_.Value)" }) -join ';'
$cmdLetName = Get-CmdletName
$cmdletVersion = (Get-Command $cmdletName -ErrorAction SilentlyContinue).version.tostring()
Log-Info -Message ''
Log-Info -Message ('{0} v{1} started.' -f `
$cmdLetName, $cmdletVersion) `
-ConsoleOut:(-not $PassThru)
Log-Info -Telemetry -Message ('{0} started version: {1} with parameters: {2}. Id:{3}' `
-f $cmdLetName, (Get-Module AzStackHci.EnvironmentChecker).Version.ToString(), $paramToString, $ENV:EnvChkrId)
Log-Info -Message ('OSVersion: {0} PSVersion: {1} PSEdition: {2} Security Protocol: {3} Lanaguage Mode: {4}' -f `
[environment]::OSVersion.Version.tostring(), $PSVersionTable.PSVersion.tostring(), $PSEdition, [Net.ServicePointManager]::SecurityProtocol, $ExecutionContext.SessionState.LanguageMode)
Write-PsSessionInfo -params $params
}
catch
{
if (-not $PassThru)
{
Log-Info ("Unable to write header to screen. Error: {0}" -f $_.exception.message)
}
}
}
function Write-AzStackHciFooter
{
<#
.SYNOPSIS
Writes report, log and cmdlet to screen.
#>
param (
[Parameter()]
[System.Management.Automation.InvocationInfo]
$invocation,
[switch]
$failed,
[switch]
$PassThru
)
Log-Info -Message ("`nLog location: $AzStackHciEnvironmentLogFile") -ConsoleOut:(-not $PassThru)
Log-Info -Message ("Report location: $AzStackHciEnvironmentReport") -ConsoleOut:(-not $PassThru)
Log-Info -Message ("Use -Passthru parameter to return results as a PSObject.") -ConsoleOut:(-not $PassThru)
if ($failed)
{
Log-Info -Message ("{0} failed" -f (Get-CmdletName)) -ConsoleOut:(-not $PassThru) -Type Error -Telemetry
}
else
{
Log-Info -Message ("{0} completed. Id:{1} " -f (Get-CmdletName),$ENV:EnvChkrId) -Telemetry
}
}
function Get-CmdletName
{
try
{
foreach ($c in (Get-PSCallStack).Command)
{
$functionCalled = Select-String -InputObject $c -Pattern "Invoke-AzStackHci(.*)Validation"
if ($functionCalled)
{
break
}
}
$functionCalled
}
catch
{
throw "Hci Validation"
}
}
function Write-AzStackHciResult
{
<#
.SYNOPSIS
Displays results to screen
.DESCRIPTION
Displays test results to screen, highlighting failed tests.
#>
param (
[Parameter()]
[string]
$Title,
[Parameter()]
[psobject]
$result,
$seperator = ' -> ',
[switch]
$Expand,
[switch]
$ShowFailedOnly
)
try
{
if (-not $result)
{
throw "Results missing. Ensure tests ran successfully."
}
Log-Info ("`n{0}:" -f $Title) -ConsoleOut
foreach ($r in ($result | Sort-Object Status, Title, Description))
{
if ($r.status -ne 'SUCCESS' -or $Expand)
{
Write-StatusSymbol -Status $r.Status -Severity $r.Severity
Write-Host " " -NoNewline
Write-Host @expandDownSymbol
Write-Host " " -NoNewline
if ($r.status -ne 'SUCCESS')
{
switch ($r.Severity)
{
Critical { Write-Host @needsRemediation }
Warning { Write-Host @needsAttention }
Informational { Write-Host @forInformation }
Default { Write-Host @Critical }
}
}
Write-Host " " -NoNewline
Write-Host ($r.TargetResourceType + " - " + $r.Title + " " + $r.Description)
foreach ($detail in ($r.AdditionalData | Sort-Object Status -Descending))
{
if ($ShowFailedOnly -and $detail.Status -eq 'SUCCESS')
{
continue
}
else
{
Write-Host " " -NoNewline
Write-StatusSymbol -Status $detail.Status -Severity $r.Severity
Write-Host " " -NoNewline
Write-Host " " -NoNewline
Write-Host ("{0}{1}{2}" -f $detail.Source, $seperator, $detail.Resource)
}
}
if ($detail.Status -ne 'SUCCESS')
{
Write-Host " " -NoNewline
Write-Host @helpSymbol
Write-Host (" Help URL: {0}" -f $r.Remediation)
Write-Host ""
}
}
else
{
if (-not $ShowFailedOnly)
{
Write-Host @expandOutSymbol
Write-Host " " -NoNewline
Write-Host @greenTickSymbol
Write-Host " " -NoNewline
Write-Host @isHealthy
Write-Host " " -NoNewline
Write-Host ($r.TargetResourceType + " " + $r.Title + " " + $r.Description)
}
}
}
}
catch
{
Log-Info "Unable to write results. Error: $($_.exception.message)" -Type Warning
}
}
function Write-ETWLog
{
[CmdletBinding()]
param (
[Parameter()]
[string]
$source = 'AzStackHciEnvironmentChecker/Diagnostic',
[Parameter()]
[string]
$logName = 'AzStackHciEnvironmentChecker',
[Parameter(Mandatory = $true)]
[string]
$Message,
[Parameter()]
[string]
$EventId = 0,
[Parameter()]
[string]
$EventType = 'Information'
)
try
{
Write-EventLog -LogName $LogName -Source $Source -EntryType $EventType -Message $Message -EventId $EventId
}
catch
{
throw "Creating event log failed. Error $($_.exception.message)"
}
}
function Assert-EventLog
{
param (
[Parameter()]
[string]
$source = 'AzStackHciEnvironmentChecker/Diagnostic'
)
try
{
$eventLog = Get-EventLog -LogName AzStackHciEnvironmentChecker -Source $Source -ErrorAction SilentlyContinue
}
catch {}
# Try to create the log
if (-not $eventLog)
{
New-AzStackHciEnvironmentCheckerLog
}
}
function Write-ETWResult
{
<#
.SYNOPSIS
Write result to telemetry channel
#>
[CmdletBinding()]
param (
[Parameter()]
[psobject]
$Result
)
try {
$source = 'AzStackHciEnvironmentChecker/Telemetry'
if (![string]::IsNullOrEmpty($ENV:EnvChkrId))
{
$Result | Add-Member -MemberType NoteProperty -Name 'HealthCheckSource' -Value $ENV:EnvChkrId -Force -ErrorAction SilentlyContinue
}
$Message = $Result | ConvertTo-Json -Depth 5
$EventId = 17205
$EventType = if ($Result.Status -ne 'SUCCESS') { 'WARNING' } else { 'Information' }
Write-ETWLog -Source $Source -EventType $EventType -Message $Message -EventId $EventId
}
catch {
Log-Info "Failed to write result to telemetry channel. Error: $($_.Exception.message)" -Type Warning
}
}
function Get-AzStackHciEnvironmentCheckerEvents
{
<#
.SYNOPSIS
Retrieve AzStackHCI Environment Checker events from event log
.EXAMPLE
Get-AzStackHciEnvironmentCheckerEvents -Verbose
Retrieve AzStackHCI Environment Checker events from event log
.EXAMPLE
$results = Get-AzStackHciEnvironmentCheckerEvents | ? EventId -eq 17205 | Select -last 1 | Select -expand Message | Convertfrom-Json
Write-AzStackHciResult -result $results
Get last result and write to screen
#>
[CmdletBinding()]
param (
[Parameter()]
[ValidateSet('Operational', 'Diagnostic', 'Telemetry')]
[string]
$Source
)
try
{
$sourceFilter = switch ($source)
{
Operational { "AzStackHciEnvironmentChecker/Operational" }
Diagnostic { "AzStackHciEnvironmentChecker/Diagnostic" }
Telemetry { "AzStackHciEnvironmentChecker/Telemetry" }
Default { "*" }
}
try
{
Get-EventLog -LogName AzStackHciEnvironmentChecker -Source $SourceFilter
}
catch {}
}
catch
{
throw "Failed to retrieve AzStackHCI environment checker logs. Error: $($_.exception.message)"
}
}
function New-AzStackHciEnvironmentCheckerLog
{
try
{
$scriptBlock = {
$logName = 'AzStackHciEnvironmentChecker'
$sources = @('AzStackHciEnvironmentChecker/Operational', 'AzStackHciEnvironmentChecker/Diagnostic', 'AzStackHciEnvironmentChecker/Telemetry', 'AzStackHciEnvironmentChecker/RemoteSupport', 'AzStackHciEnvironmentChecker/StandaloneObservability')
foreach ($source in $sources)
{
New-EventLog -LogName $logName -Source $Source -ErrorAction SilentlyContinue
Limit-EventLog -LogName $logName -MaximumSize 250MB
Write-EventLog -Message ('Initializing log provider {0}' -f $source) -EventId 0 -EntryType Information -Source $source -LogName $logName -ErrorAction Stop
}
}
if (Test-Elevation)
{
Invoke-Command -ScriptBlock $scriptBlock
}
else
{
$psProcess = if (Join-Path -Path $PSHOME -ChildPath powershell.exe -Resolve -ErrorAction SilentlyContinue)
{
Join-Path -Path $PSHOME -ChildPath powershell.exe
}
elseif (Join-Path -Path $PSHOME -ChildPath pwsh.exe -Resolve -ErrorAction SilentlyContinue)
{
Join-Path -Path $PSHOME -ChildPath pwsh.exe
}
else
{
throw "Cannot find powershell process. Please run powershell elevated and run the following command: 'New-EventLog -LogName $logName -Source $sourceName'"
}
Write-Warning "We need to run an elevated process to register our event log. `nPlease continue and accept the UAC prompt to continue. `nAlternatively, run: `nNew-EventLog -LogName $logName -Source $source `nmanually and restart this command."
if (Grant-UACConcent)
{
Start-Process $psProcess -Verb Runas -ArgumentList "-command (Invoke-Command -ScriptBlock {$scriptBlock})" -Wait
}
else
{
throw "Unable to elevate and register event log provider."
}
}
}
catch
{
throw "Failed to create Environment Checker log. Error: $($_.Exception.Message)"
}
}
function Remove-AzStackHciEnvironmentCheckerEventLog
{
<#
.SYNOPSIS
Remove AzStackHCI Environment Checker event log
.EXAMPLE
Remove-AzStackHciEnvironmentCheckerEventLog -Verbose
Remove AzStackHCI Environment Checker event log
#>
[cmdletbinding()]
param()
Remove-EventLog -LogName "AzStackHciEnvironmentChecker"
}
function Grant-UACConcent
{
$concentAnswered = $false
$concent = $false
while ($false -eq $concentAnswered)
{
$promptResponse = Read-Host -Prompt "Register the event log. (Y/N)"
if ($promptResponse -imatch '^y$|^yes$')
{
$concentAnswered = $true
$concent = $true
}
elseif ($promptResponse -imatch '^n$|^no$')
{
$concentAnswered = $true
$concent = $false
}
else
{
Write-Warning "Unexpected response"
}
}
return $concent
}
function Write-Summary
{
param ($result, $property1, $property2, $property3, $seperator = '->')
try
{
$summary = Get-Summary @PSBoundParameters
# Write percentage
Write-Host "`nSummary"
Write-Host $lTxt.Summary
if (-not ([string]::IsNullOrEmpty($summary.FailedResourceCritical)))
{
Write-Host " " -NoNewline
Write-StatusSymbol -status 'FAILURE' -Severity Critical
Write-Host (" {0} Critical Issue(s)" -f @($summary.FailedResourceCritical).Count)
}
if (-not ([string]::IsNullOrEmpty($summary.FailedResourceWarning)))
{
Write-Host " " -NoNewline
Write-StatusSymbol -status 'FAILURE' -Severity Warning
Write-Host (" {0} Warning Issue(s)" -f @($summary.FailedResourceWarning).Count)
}
if (-not ([string]::IsNullOrEmpty($summary.FailedResourceInformational)))
{
Write-Host " " -NoNewline
Write-StatusSymbol -status 'FAILURE' -Severity Informational
Write-Host (" {0} Informational Issue(s)" -f @($summary.FailedResourceInformational).Count)
}
if ($Summary.successCount -gt 0)
{
Write-Host " " -NoNewline
Write-StatusSymbol -status 'SUCCESS'
Write-Host (" {0} successes" -f ($Summary.successCount))
}
<#Write-Host @expandDownSymbol
Write-Host " " -NoNewline
switch ($Severity)
{
'CRITICAL' { Write-Host @redCrossSymbol }
'WARNING' { Write-Host @warningSymbol }
Default { Write-Host @redCrossSymbol }
}#>
#Write-Host (" {0} / {1} ({2}%)" -f $summary.SuccessCount, $Result.AdditionalData.Resource.Count, $summary.SuccessPercentage)
# Write issues by severity
foreach ($severity in 'CRITICAL', 'WARNING', 'INFORMATIONAL')
{
$SeverityProp = "FailedResource{0}" -f $severity
$failedResources = $summary.$SeverityProp | Sort-Object | Get-Unique
if ($failedResources -gt 0)
{
Write-Host ""
Write-Severity -severity $Severity
Write-Host ""
#Write-Host "`n$Severity Issues:"
$failedResources | Sort-Object | Get-Unique | ForEach-Object {
Write-Host " " -NoNewline
switch ($Severity)
{
'CRITICAL' { Write-Host @redCrossSymbol }
'WARNING' { Write-Host @warningSymbol }
Default { Write-Host @redCrossSymbol }
}
Write-Host " $PSITEM"
}
}
}
if ($Summary.HelpLinks)
{
Write-Host "`nRemediation: "
$Summary.HelpLinks | ForEach-Object {
Write-Host " " -NoNewline
Write-Host @helpSymbol
Write-Host " $PSITEM"
}
}
if (-not $summary.FailedResourceCritical -and -not $summary.FailedResourceWarning -and -not $summary.FailedResourceInformational)
{
Write-Host "`nSummary"
Write-Host @expandOutSymbol
Write-Host " " -NoNewline
Write-Host @greenTickSymbol
Write-Host (" {0} / {1} ({2}%) resources test successfully." -f $summary.SuccessCount, $Result.AdditionalData.Resource.Count, $summary.SuccessPercentage)
}
}
catch
{
Log-Info -Message "Summary failed. $($_.Exception.Message)" -ConsoleOut -Type Warning
}
}
function Get-Summary
{
param ($result, $property1, $property2, $property3, $seperator = '->')
try
{
if (-not $result)
{
throw "Unable to write summary. Check tests run successfully."
}
[array]$success = $result | Select-Object -ExpandProperty AdditionalData | Where-Object Status -EQ 'SUCCESS'
[array]$HelpLinks = $result | Where-Object Status -NE 'SUCCESS' | Select-Object -ExpandProperty Remediation | Sort-Object | Get-Unique
[array]$nonSuccess = $result | Select-Object -ExpandProperty AdditionalData | Where-Object Status -NE 'SUCCESS'
[array]$nonSuccessCritical = $result | Where-Object Severity -EQ Critical | Select-Object -ExpandProperty AdditionalData | Where-Object Status -NE 'SUCCESS'
[array]$nonSuccessWarning = $result | Where-Object Severity -EQ Warning | Select-Object -ExpandProperty AdditionalData | Where-Object Status -NE 'SUCCESS'
[array]$nonSuccessInformational = $result | Where-Object Severity -EQ Informational | Select-Object -ExpandProperty AdditionalData | Where-Object Status -NE 'SUCCESS'
$successPercentage = if ($success.count -gt 0)
{
[Math]::Round(($success.Count / $result.AdditionalData.Resource.count) * 100)
}
else
{
0
}
$sourceDestsb = {
if ([string]::IsNullOrEmpty($_.$property2) -and [string]::IsNullOrEmpty($_.$property3))
{
"{0}" -f $_.$property1
}
elseif ([string]::IsNullOrEmpty($_.$property3))
{
"{0}{1}{2}" -f $_.$property1, $seperator, $_.$property2
}
else
{
"{0}{1}{2}({3})" -f $_.$property1, $seperator, $_.$property2, $_.$property3
}
}
$FailedResourceCritical = $nonSuccessCritical |
Select-Object @{ label = 'SourceDest'; Expression = $sourceDestsb } -ErrorAction SilentlyContinue |
Select-Object -ExpandProperty SourceDest |
Sort-Object |
Get-Unique
$FailedResourceWarning = $nonSuccessWarning |
Select-Object @{ label = 'SourceDest'; Expression = $sourceDestsb } -ErrorAction SilentlyContinue |
Select-Object -ExpandProperty SourceDest |
Sort-Object |
Get-Unique
$FailedResourceInformational = $nonSuccessInformational |
Select-Object @{ label = 'SourceDest'; Expression = $sourceDestsb } -ErrorAction SilentlyContinue |
Select-Object -ExpandProperty SourceDest |
Sort-Object |
Get-Unique
$summary = New-Object -Type PsObject -Property @{
successCount = $success.Count
nonSuccessCount = $nonSuccess.Count
successPercentage = $successPercentage
HelpLinks = $HelpLinks
FailedResourceCritical = $FailedResourceCritical
FailedResourceWarning = $FailedResourceWarning
FailedResourceInformational = $FailedResourceInformational
}
return $summary
}
catch
{
throw "Unable to calculate summary. Error $($_.exception.message)"
}
}
# Symbols
$global:greenTickSymbol = @{
Object = [Char]0x2713 #8730
ForegroundColor = 'Green'
NoNewLine = $true
}
$global:redCrossSymbol = @{
Object = [Char]0x2622 #0x00D7
ForegroundColor = 'Red'
NoNewLine = $true
}
$global:WarningSymbol = @{
Object = [char]0x26A0
ForegroundColor = 'Yellow'
NoNewLine = $true
}
$global:bulletSymbol = @{
Object = [Char]0x25BA
NoNewLine = $true
}
# Text
$global:needsAttention = @{
object = $lTxt.NeedsAttention;
ForegroundColor = 'Yellow'
NoNewLine = $true
}
$global:needsRemediation = @{
object = $lTxt.NeedsRemediation;
ForegroundColor = 'Red'
NoNewLine = $true
}
$global:ForInformation = @{
object = $lTxt.ForInformation;
NoNewLine = $true
}
$global:expandDownSymbol = @{
object = [Char]0x25BC # expand down
NoNewLine = $true
}
$global:expandOutSymbol = @{
object = [Char]0x25BA # expand out
NoNewLine = $true
}
$global:helpSymbol = @{
object = [char]0x270E #0x263C # sunshine
NoNewLine = $true
#ForegroundColor = 'Yellow'
}
$global:Critical = @{
object = $lTxt.Critical;
ForegroundColor = 'Red'
NoNewLine = $true
}
$global:Warning = @{
object = $lTxt.Warning;
ForegroundColor = 'Yellow'
NoNewLine = $true
}
$global:Information = @{
object = $lTxt.Informational;
NoNewLine = $true
}
$global:isHealthy = @{
object = $lTxt.Healthy
NoNewLine = $true
}
function Write-StatusSymbol
{
param ($status, $severity)
switch ($status)
{
"SUCCESS" { Write-Host @greenTickSymbol }
"FAILURE"
{
switch ($Severity)
{
'CRITICAL' { Write-Host @redCrossSymbol }
'WARNING' { Write-Host @warningSymbol }
Default { Write-Host @redCrossSymbol }
}
}
Default { Write-Host @bulletSymbol }
}
}
function Write-Severity
{
param ($severity)
switch ($severity)
{
'CRITICAL' { Write-Host @needsRemediation }
'WARNING' { Write-Host @needsAttention }
'INFORMATIONAL' { Write-Host @ForInformation }
Default { Write-Host @Critical }
}
}
function Set-AzStackHciIdentifier
{
$ENV:EnvChkrId = $null
if ([string]::IsNullOrEmpty($ENV:EnvChkrOp))
{
$ENV:EnvChkrOp = 'Manual'
}
$validatorCmd = Get-CmdletName
if(-not [string]::IsNullOrWhiteSpace($validatorCmd))
{
$ENV:EnvChkrId = "{0}\{1}\{2}" -f $ENV:EnvChkrOp, $validatorCmd.matches.groups[1], (([system.guid]::newguid()) -split '-' | Select-Object -first 1)
}
}
function Write-PsSessionInfo
{
<#
.SYNOPSIS
Write some pertainent information to the log about any PsSessions passed
#>
[CmdletBinding()]
param (
$params
)
try {
if ($params['PsSession'])
{
foreach ($session in $params['PsSession'])
{
Log-Info -Message ("PsSession info: {0}, {1}, {2}, {3}, {4}, {5}" -f $session.ComputerName, $session.Name, $session.Id, $session.Runspace.ConnectionInfo.credential.username, $session.Runspace.SessionStateProxy.LanguageMode, $session.Runspace.ConnectionInfo.AuthenticationMechanism)
}
}
else
{
Log-Info -Message "No PsSession info to write"
}
}
catch
{
Log-Info -Message "Failed to write PsSession info: $($_.exception.message)"
}
}
function Log-CimData
{
[CmdletBinding()]
param (
$cimData,
[array]$properties
)
try {
# Use properties provided or all properties if none provided
$selectProperties = @()
$selectProperties += if ($null -eq $Properties)
{
"*"
}
else {
foreach ($property in $Properties)
{
if ($property -is [hashtable])
{
$property.Keys
}
else
{
$property
}
}
}
# For each server log the cimdata
foreach ($serverName in ($cimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique))
{
$sData = $cimData | Where-Object {$_.CimSystemProperties.ServerName -eq $ServerName }
[string]$className = $sData.CimClass.CimClassName | Sort-Object | Get-Unique
Log-Info ("{0} cim instance data for {1}" -f $className, $serverName)
$sData | Select-Object -Property $selectProperties | ConvertTo-Csv | Out-String -Stream | ForEach-Object {
if (![string]::IsNullOrEmpty($_))
{
Log-Info $_
}
}
}
}
catch
{
Log-Info "Failed to write cimdata to log file. Error: $($_.Exception.Message)" -Type Error
}
}
function New-AzStackHciResultObject
{
[CmdletBinding()]
param (
[Parameter()]
[String]
$Name,
[Parameter()]
[String]
$DisplayName,
[Parameter()]
[String]
$Title,
[Parameter()]
[Hashtable]
$Tags,
[Parameter()]
[String]
$Status,
[Parameter()]
[String]
$Severity,
[Parameter()]
[String]
$Description,
[Parameter()]
[String]
$Remediation,
[Parameter()]
[String]
$TargetResourceID,
[Parameter()]
[String]
$TargetResourceName,
[Parameter()]
[String]
$TargetResourceType,
[Parameter()]
[datetime]
$Timestamp,
[Parameter()]
[Hashtable]
$AdditionalData,
[Parameter()]
[string]
$HealthCheckSource
)
# load the assembly as an array of bytes to avoid locking the dll.
$bytes = [system.io.file]::ReadAllBytes("$PsScriptRoot\Schema\Microsoft.EnvironmentReadiness.Validator.Client.dll")
$assembly = [Reflection.Assembly]::Load($bytes)
$type = $assembly.GetType("Microsoft.EnvironmentReadiness.Client.Models.EnvironmentReadinessTestResult")
$resultObj = New-Object $type
# Set properties from PSBoundParameters
foreach ($param in $PSBoundParameters.Keys)
{
if ($PSBoundParameters[$param])
{
if ($PSBoundParameters[$param] -is [System.Collections.Hashtable])
{
$resultObj.$param = ConvertTo-Dictionary -hashTable $PSBoundParameters[$param]
}
else {
$resultObj.$param = $PSBoundParameters[$param]
}
}
}
return $resultObj
}
# Convert hashtable to dictionary
function ConvertTo-Dictionary {
[CmdletBinding()]
param (
[Parameter(Mandatory = $true, ValueFromPipeline = $true)]
[hashtable]$hashTable
)
begin {
$dictionary = New-Object 'system.collections.generic.dictionary[string,string]'
}
process {
foreach ($key in $hashTable.Keys) {
if ([string]::IsNullOrEmpty($hashTable[$key]))
{
$value = ""
}
else {
$value = $hashTable[$key]
}
$dictionary.Add($key, $value)
}
}
end {
return ,$dictionary
}
}
# function to get psobject from pipeline and redact sensitive property values
function Protect-SensitiveProperties
{
param (
[Parameter(ValueFromPipeline = $true)]
[psObject]
$params
)
BEGIN
{
$array = @()
}
PROCESS
{
try
{
$ret = @{}
foreach($key in $_.Keys)
{
# Redact sensitive parameters
if($Key -match "ArmAccessToken|Account|PsSession")
{
$ret += @{$Key = '[redacted]'}
}
else
{
$ret += @{$Key = $_[$Key]}
}
}
$array += $ret
}
catch
{
Log-Info "Error occurred trying to remove sensitive parameters. Error: $($_.Exception.Message)" -Type ERROR
}
}
END
{
return $array
}
}
Export-ModuleMember -function Add-AzStackHciEnvJob
Export-ModuleMember -function Close-AzStackHciEnvJob
Export-ModuleMember -function Get-AzStackHciEnvironmentCheckerEvents
Export-ModuleMember -function Get-AzStackHciEnvProgress
Export-ModuleMember -function Log-Info
Export-ModuleMember -function Set-AzStackHciOutputPath
Export-ModuleMember -function Write-AzStackHciEnvReport
Export-ModuleMember -function Write-AzStackHciFooter
Export-ModuleMember -function Write-AzStackHciHeader
Export-ModuleMember -function Write-AzStackHciResult
Export-ModuleMember -function Write-ETWLog
Export-ModuleMember -function Write-ETWResult
Export-ModuleMember -function Write-Summary
Export-ModuleMember -function Log-CimData
Export-ModuleMember -function New-AzStackHciResultObject
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAqtanRxe5lb7TG
# WAz4f7nbeoH+YyEk36154WRipzOtOaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIP5aSgyN8G+pDod75rx6ynBp
# ZzutjJ2209dClp6suBheMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAlqSZF2CzWtjlCK+0pfWX1Jp2ytx/OiOJnIXsuPi6RNc1vKLSIh0KpkZ0
# Djd9dQLWn24K3bkXpAN2lzNkrxwM/sIg6etCgP/h0u6PP1x0j4fQSED5zQLr4R0X
# x+g0XktfSr+OwfWRkqKs+aqdtKkABxCNg6CdHU9UshDu3IpjYAD8HiwdhKkrlaXn
# EMdnaeTa1G7XqsQgFvD9cKHfj4EC5yjwgRWgGdSQ6lOilDM1BB197xybtnlMig8a
# o2qA16MVlYPhZnteoHB2NGyOBfOoOCNnyvFAlF47arx8CoddgJ+g6Qx+fM3Lm9ll
# iM+4HSL9jtK6xPM702GRWT1ZQURanaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDbrDkTQ73fNHeWWO6u8e5+IfPzqoCbXpyUrgrrZWN3qgIGZbqk0STP
# GBMyMDI0MDIxMjE0MDkxMi41MjFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC
# RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis
# DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI
# ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z
# ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR
# IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE
# lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s
# /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4
# aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB
# fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT
# me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy
# qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui
# hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds
# lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf
# sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t
# Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU
# +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7
# qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6
# Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+
# x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4
# 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5
# ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV
# PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4
# y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk
# 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG
# QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOl0S1kwIhgPMjAyNDAyMTIxNTQ2MzNaGA8yMDI0MDIxMzE1NDYzM1owdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6XRLWQIBADAHAgEAAgIVwzAHAgEAAgIUTzAKAgUA
# 6XWc2QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKSvdq5/OwSqLipXDPR/
# fz5CiLbm0lCxv+PjDUqfK5ccPWEVkKsD9zmiB4N1ZQarjww5WUro+QdoUzSzV/Ly
# OaxhyB8c2JwDLLMQK8JyHWefD6cG4cvgYDg5iEzioerBrjSnrGxsb3qVV0n31Fhc
# Z9Hh71O9RocFcjpVHRSVEF7MMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgsZ26b2I7i7r5TBf/iIhFrlQM8VDqfVdISVRekZqMT5cwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJCI9/
# /zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4pmZ
# lfHc4yDrAAEAAAHiMCIEII1oQoIqDDF/dls2LazpjkRTP0GoZvbNELQJtb8XKdao
# MA0GCSqGSIb3DQEBCwUABIICAJRkMLSAXQnGXqilVa/lRnlnASu2qv2w+qdWk1uC
# D04tAB/qzC2wiTX/rHSy1aoCo6e/KgBN6jrYOT3JMupAcosVgtHENCBlHKSHTvLp
# BPZlG7beejyJRm8h2q/u1AIexQE/chF93NMARRDD9k2pxjFn+JHnwhmiFAEsp2so
# Z+zfccjONCvhyYbB8x4ceTtXN2WCJGNduAD0Hk8e8cHTQjMFEQ+VufRvsG6QBS+a
# Z3gIHdrtXlDactpIwi8eA5nG9CRooz00mePKiXOFqc0BBcn706VqrleX73xr0phN
# 28liKnjt4+n+Sycd4/tp51/0xySa4FOwk/euS7DqSt/rhWLNQGjhK8uAsZzse2IA
# 4b5H5YR6ZkeEAqC/C21X4ngz2cUTpLmVioN96DGVzC56OVUjyYRRB7S6vWnVRXp4
# GSLR8D4lTn0P5EoYE39suO/FAShorJvi1TstH9vlorh/RnOidZvmMl5l46ZRseAd
# xaVkzAMJnlJsUL4882kEubniov4BpLTydS3m5UDlyvG3TxkUwdWETGiVPQV6KBzL
# h6AeEeYnJ9j9kc/X9sXS7/tq0QpxP8r3Wxue1ei2FHlJruQkZrbAImlwnnBa7kK8
# QDfYsaqJoFMe77jJOe4n5oncRgi0bOKj7OHEMwi/go0b3ZNh2cYyKWY7JkGB/kSi
# DK3n
# SIG # End signature block
|
combined_dataset/train/non-malicious/3399.ps1 | 3399.ps1 |
function Test-VirtualMachine
{
param ($loc, [bool] $hasManagedDisks = $false)
$rgname = Get-ComputeTestResourceName
try
{
if ($loc -eq $null)
{
$loc = Get-ComputeVMLocation;
}
New-AzureRmResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$p = New-AzureRmVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzureRmVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzureRmVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzureRmVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzureRmPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzureRmPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzureRmNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzureRmNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId -Primary;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Primary $true;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname;
if($hasManagedDisks -eq $false)
{
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$dataDiskVhdUri3 = "https://$stoname.blob.core.windows.net/test/data3.vhd";
$p = Set-AzureRmVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk3' -Caching 'ReadOnly' -DiskSizeInGB 12 -Lun 3 -VhdUri $dataDiskVhdUri3 -CreateOption Empty;
$p = Remove-AzureRmVMDataDisk -VM $p -Name 'testDataDisk3';
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
Assert-AreEqual $p.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[1].DiskSizeGB 11;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Lun 2;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2;
}
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = Set-AzureRmVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred;
$imgRef = Get-DefaultCRPImage -loc $loc;
$p = ($imgRef | Set-AzureRmVMSourceImage -VM $p);
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
Assert-AreEqual $p.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $p.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $p.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $p.StorageProfile.ImageReference.Version $imgRef.Version;
New-AzureRmVM -ResourceGroupName $rgname -Location $loc -VM $p;
$vm1 = Get-AzureRmVM -Name $vmname -ResourceGroupName $rgname -DisplayHint Expand;
$a = $vm1 | Out-String;
Write-Verbose("Get-AzureRmVM output:");
Write-Verbose($a);
Assert-True {$a.Contains("Sku");}
$vm1.DisplayHint = "Compact";
$a = $vm1 | Out-String;
Assert-False {$a.Contains("Sku");}
$a = $vm1 | Format-Table | Out-String;
Write-Verbose("Get-AzureRmVM | Format-Table output:");
Write-Verbose($a);
Assert-NotNull $vm1.VmId;
Assert-AreEqual $vm1.Name $vmname;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Version $imgRef.Version;
Assert-AreEqual $vm1.OSProfile.AdminUsername $user;
Assert-AreEqual $vm1.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize;
Assert-AreEqual $true $vm1.DiagnosticsProfile.BootDiagnostics.Enabled;
Assert-AreEqual $stoaccount.PrimaryEndpoints.Blob $vm1.DiagnosticsProfile.BootDiagnostics.StorageUri;
Assert-AreEqual "BGInfo" $vm1.Extensions[0].VirtualMachineExtensionType
Assert-AreEqual "Microsoft.Compute" $vm1.Extensions[0].Publisher
Start-AzureRmVM -Name $vmname -ResourceGroupName $rgname;
Restart-AzureRmVM -Name $vmname -ResourceGroupName $rgname;
Stop-AzureRmVM -Name $vmname -ResourceGroupName $rgname -Force -StayProvisioned;
$p.Location = $vm1.Location;
Update-AzureRmVM -ResourceGroupName $rgname -VM $p;
$vm2 = Get-AzureRmVM -Name $vmname -ResourceGroupName $rgname;
Assert-AreEqual $vm2.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm2.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm2.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $vm2.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $vm2.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $vm2.StorageProfile.ImageReference.Version $imgRef.Version;
Assert-AreEqual $vm2.OSProfile.AdminUsername $user;
Assert-AreEqual $vm2.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm2.HardwareProfile.VmSize $vmsize;
Assert-NotNull $vm2.Location;
Assert-AreEqual $true $vm2.DiagnosticsProfile.BootDiagnostics.Enabled;
Assert-AreEqual $stoaccount.PrimaryEndpoints.Blob $vm2.DiagnosticsProfile.BootDiagnostics.StorageUri;
$vms = Get-AzureRmVM -ResourceGroupName $rgname;
$a = $vms | Out-String;
Write-Verbose("Get-AzureRmVM (List) output:");
Write-Verbose($a);
Assert-True{$a.Contains("NIC");}
Assert-AreNotEqual $vms $null;
$a = $vms[0] | Format-Custom | Out-String;
Assert-False {$a.Contains("Sku");}
$vms[0].DisplayHint = "Expand";
$a = $vms[0] | Format-Custom | Out-String;
Assert-True {$a.Contains("Sku");}
Get-AzureRmVM -ResourceGroupName $rgname | Remove-AzureRmVM -ResourceGroupName $rgname -Force;
$vms = Get-AzureRmVM -ResourceGroupName $rgname;
Assert-AreEqual $vms $null;
$asetName = 'aset' + $rgname;
$asetSkuName = 'Classic';
$UD = 3;
$FD = 3;
if($hasManagedDisks -eq $true)
{
$asetSkuName = 'Aligned';
$FD = 2;
}
New-AzureRmAvailabilitySet -ResourceGroupName $rgname -Name $asetName -Location $loc -PlatformUpdateDomainCount $UD -PlatformFaultDomainCount $FD -Sku $asetSkuName;
$asets = Get-AzureRmAvailabilitySet -ResourceGroupName $rgname;
Assert-NotNull $asets;
Assert-AreEqual $asetName $asets[0].Name;
$aset = Get-AzureRmAvailabilitySet -ResourceGroupName $rgname -Name $asetName;
Assert-NotNull $aset;
Assert-AreEqual $asetName $aset.Name;
Assert-AreEqual $UD $aset.PlatformUpdateDomainCount;
Assert-AreEqual $FD $aset.PlatformFaultDomainCount;
Assert-AreEqual $asetSkuName $aset.Sku;
Assert-NotNull $asets[0].RequestId;
Assert-NotNull $asets[0].StatusCode;
$subId = Get-SubscriptionIdFromResourceGroup $rgname;
$asetId = ('/subscriptions/' + $subId + '/resourceGroups/' + $rgname + '/providers/Microsoft.Compute/availabilitySets/' + $asetName);
$vmname2 = $vmname + '2';
$p2 = New-AzureRmVMConfig -VMName $vmname2 -VMSize $vmsize -AvailabilitySetId $asetId;
$p2.HardwareProfile = $p.HardwareProfile;
$p2.OSProfile = $p.OSProfile;
$p2.NetworkProfile = $p.NetworkProfile;
$p2.StorageProfile = $p.StorageProfile;
$p2.StorageProfile.DataDisks = $null;
if($hasManagedDisks -eq $false)
{
$p2.StorageProfile.OsDisk.Vhd.Uri = "https://$stoname.blob.core.windows.net/test/os2.vhd";
}
New-AzureRmVM -ResourceGroupName $rgname -Location $loc -VM $p2;
$vm2 = Get-AzureRmVM -Name $vmname2 -ResourceGroupName $rgname;
Assert-NotNull $vm2;
$vm2_out = $vm2 | Out-String
Assert-True {$vm2_out.Contains("AvailabilitySetReference")};
Assert-AreEqual $vm2.AvailabilitySetReference.Id $asetId;
Assert-True { $vm2.ResourceGroupName -eq $rgname }
Remove-AzureRmVM -Name $vmname2 -ResourceGroupName $rgname -Force;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachinePiping
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzureRmResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$subnet = New-AzureRmVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzureRmVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzureRmVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzureRmPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzureRmPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzureRmNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzureRmNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$dataDiskVhdUri3 = "https://$stoname.blob.core.windows.net/test/data3.vhd";
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = New-AzureRmVMConfig -VMName $vmname -VMSize $vmsize `
| Add-AzureRmVMNetworkInterface -Id $nicId -Primary `
| Set-AzureRmVMOSDisk -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage `
| Add-AzureRmVMDataDisk -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty `
| Add-AzureRmVMDataDisk -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty `
| Set-AzureRmVMOperatingSystem -Windows -ComputerName $computerName -Credential $cred;
$imgRef = Get-DefaultCRPImage -loc $loc;
$imgRef | Set-AzureRmVMSourceImage -VM $p | New-AzureRmVM -ResourceGroupName $rgname -Location $loc;
$vm1 = Get-AzureRmVM -Name $vmname -ResourceGroupName $rgname;
Assert-AreEqual $vm1.Name $vmname;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm1.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Version $imgRef.Version;
Assert-AreEqual $vm1.OSProfile.AdminUsername $user;
Assert-AreEqual $vm1.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize;
Assert-AreEqual $vm1.Extensions[0].AutoUpgradeMinorVersion $true;
Assert-AreEqual $vm1.Extensions[0].Publisher "Microsoft.Compute"
Assert-AreEqual $vm1.Extensions[0].VirtualMachineExtensionType "BGInfo";
Get-AzureRmVM -ResourceGroupName $rgname | Start-AzureRmVM;
Get-AzureRmVM -ResourceGroupName $rgname | Restart-AzureRmVM;
Get-AzureRmVM -ResourceGroupName $rgname | Stop-AzureRmVM -Force -StayProvisioned;
Get-AzureRmVM -ResourceGroupName $rgname -Name $vmname `
| Add-AzureRmVMDataDisk -Name 'testDataDisk3' -Caching 'ReadOnly' -DiskSizeInGB 12 -Lun 3 -VhdUri $dataDiskVhdUri3 -CreateOption Empty `
| Update-AzureRmVM;
$vm2 = Get-AzureRmVM -Name $vmname -ResourceGroupName $rgname;
Assert-AreEqual $vm2.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm2.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm2.StorageProfile.DataDisks.Count 3;
Assert-AreEqual $vm2.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $vm2.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $vm2.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $vm2.StorageProfile.ImageReference.Version $imgRef.Version;
Assert-AreEqual $vm2.OSProfile.AdminUsername $user;
Assert-AreEqual $vm2.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm2.HardwareProfile.VmSize $vmsize;
Assert-NotNull $vm2.Location;
Get-AzureRmVM -ResourceGroupName $rgname | Stop-AzureRmVM -Force;
Get-AzureRmVM -ResourceGroupName $rgname | Set-AzureRmVM -Generalize;
$dest = Get-ComputeTestResourceName;
$templatePath = "$TestOutputRoot\template.txt";
Get-AzureRmVM -ResourceGroupName $rgname | Save-AzureRmVMImage -DestinationContainerName $dest -VHDNamePrefix 'pslib' -Overwrite -Path $templatePath;
$template = Get-Content $templatePath;
Assert-True { $template[1].Contains("$schema"); }
Get-AzureRmVM -ResourceGroupName $rgname | Remove-AzureRmVM -Force;
$vms = Get-AzureRmVM -ResourceGroupName $rgname;
Assert-AreEqual $vms $null;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachineUpdateWithoutNic
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzureRmResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$subnet = New-AzureRmVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzureRmVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzureRmVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzureRmPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzureRmPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzureRmNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzureRmNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = New-AzureRmVMConfig -VMName $vmname -VMSize $vmsize `
| Add-AzureRmVMNetworkInterface -Id $nicId -Primary `
| Set-AzureRmVMOSDisk -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage `
| Add-AzureRmVMDataDisk -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty `
| Add-AzureRmVMDataDisk -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty `
| Set-AzureRmVMOperatingSystem -Windows -ComputerName $computerName -Credential $cred;
$imgRef = Get-DefaultCRPImage -loc $loc;
$imgRef | Set-AzureRmVMSourceImage -VM $p | New-AzureRmVM -ResourceGroupName $rgname -Location $loc;
$vm1 = Get-AzureRmVM -Name $vmname -ResourceGroupName $rgname;
Assert-AreEqual $vm1.Name $vmname;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm1.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Version $imgRef.Version;
Assert-AreEqual $vm1.OSProfile.AdminUsername $user;
Assert-AreEqual $vm1.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize;
Assert-AreEqual $vm1.Extensions[0].AutoUpgradeMinorVersion $true;
Assert-AreEqual $vm1.Extensions[0].Publisher "Microsoft.Compute";
Assert-AreEqual $vm1.Extensions[0].VirtualMachineExtensionType "BGInfo";
$vm = Get-AzureRmVM -ResourceGroupName $rgname -Name $vmname | Remove-AzureRmVMNetworkInterface;
Assert-ThrowsContains { Update-AzureRmVM -ResourceGroupName $rgname -VM $vm; } "must have at least one network interface"
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachineList
{
$passed = $false;
try
{
$s1 = Get-AzureRmVM;
$s2 = Get-AzureRmVM;
if ($s2 -ne $null)
{
Assert-NotNull $s2[0].Id;
}
Assert-ThrowsContains { $s3 = Get-AzureRmVM -NextLink "http://www.test.com/test"; } "Unable to deserialize the response"
$passed = $true;
}
finally
{
Assert-True { $passed };
}
}
function Test-VirtualMachineImageList
{
$passed = $false;
try
{
$locStr = Get-ComputeVMLocation;
$foundAnyImage = $false;
$pubNames = Get-AzureRmVMImagePublisher -Location $locStr | select -ExpandProperty PublisherName;
$maxPubCheck = 3;
$numPubCheck = 1;
$pubNameFilter = '*Windows*';
foreach ($pub in $pubNames)
{
if (-not ($pub -like $pubNameFilter)) { continue; }
$s2 = Get-AzureRmVMImageOffer -Location $locStr -PublisherName $pub;
if ($s2.Count -gt 0)
{
$numPubCheck = $numPubCheck + 1;
if ($numPubCheck -gt $maxPubCheck) { break; }
$offerNames = $s2 | select -ExpandProperty Offer;
foreach ($offer in $offerNames)
{
$s3 = Get-AzureRmVMImageSku -Location $locStr -PublisherName $pub -Offer $offer;
if ($s3.Count -gt 0)
{
$skus = $s3 | select -ExpandProperty Skus;
foreach ($sku in $skus)
{
$s4 = Get-AzureRmVMImage -Location $locStr -PublisherName $pub -Offer $offer -Sku $sku;
if ($s4.Count -gt 0)
{
$versions = $s4 | select -ExpandProperty Version;
foreach ($ver in $versions)
{
if ($ver -eq $null -or $ver -eq '') { continue; }
$s6 = Get-AzureRmVMImage -Location $locStr -PublisherName $pub -Offer $offer -Sku $sku -Version $ver;
Assert-NotNull $s6;
$s6;
Assert-True { $versions -contains $ver };
Assert-True { $versions -contains $s6.Name };
$s6.Id;
$foundAnyImage = $true;
}
}
}
}
}
}
}
Assert-True { $foundAnyImage };
$foundAnyExtensionImage = $false;
$pubNameFilter = '*Microsoft.Compute*';
foreach ($pub in $pubNames)
{
if (-not ($pub -like $pubNameFilter)) { continue; }
$s1 = Get-AzureRmVMExtensionImageType -Location $locStr -PublisherName $pub;
$types = $s1 | select -ExpandProperty Type;
if ($types.Count -gt 0)
{
foreach ($type in $types)
{
$s2 = Get-AzureRmVMExtensionImage -Location $locStr -PublisherName $pub -Type $type -FilterExpression "startswith(name,'1')";
$versions = $s2 | select -ExpandProperty Version;
foreach ($ver in $versions)
{
$s3 = Get-AzureRmVMExtensionImage -Location $locStr -PublisherName $pub -Type $type -Version $ver;
Assert-NotNull $s3;
Assert-True { $s3.Version -eq $ver; }
$s3.Id;
$foundAnyExtensionImage = $true;
}
}
}
}
Assert-True { $foundAnyExtensionImage };
$pubNameFilter = '*Microsoft*Windows*Server*';
$imgs = Get-AzureRmVMImagePublisher -Location $locStr | where { $_.PublisherName -like $pubNameFilter } | Get-AzureRmVMImageOffer | Get-AzureRmVMImageSku | Get-AzureRmVMImage | Get-AzureRmVMImage;
Assert-True { $imgs.Count -gt 0 };
$pubNameFilter = '*Microsoft.Compute*';
$extimgs = Get-AzureRmVMImagePublisher -Location $locStr | where { $_.PublisherName -like $pubNameFilter } | Get-AzureRmVMExtensionImageType | Get-AzureRmVMExtensionImage | Get-AzureRmVMExtensionImage;
Assert-True { $extimgs.Count -gt 0 };
$s1 = Get-AzureRmVMImagePublisher -Location $locStr;
Assert-NotNull $s1;
$publisherName = Get-ComputeTestResourceName;
Assert-ThrowsContains { $s2 = Get-AzureRmVMImageOffer -Location $locStr -PublisherName $publisherName; } "$publisherName was not found";
$offerName = Get-ComputeTestResourceName;
Assert-ThrowsContains { $s3 = Get-AzureRmVMImageSku -Location $locStr -PublisherName $publisherName -Offer $offerName; } "was not found";
$skusName = Get-ComputeTestResourceName;
Assert-ThrowsContains { $s4 = Get-AzureRmVMImage -Location $locStr -PublisherName $publisherName -Offer $offerName -Skus $skusName; } "was not found";
$filter = "name eq 'latest'";
Assert-ThrowsContains { $s5 = Get-AzureRmVMImage -Location $locStr -PublisherName $publisherName -Offer $offerName -Skus $skusName -FilterExpression $filter; } "was not found";
$version = '1.0.0';
Assert-ThrowsContains { $s6 = Get-AzureRmVMImage -Location $locStr -PublisherName $publisherName -Offer $offerName -Skus $skusName -Version $version; } "was not found";
$type = Get-ComputeTestResourceName;
Assert-ThrowsContains { $s7 = Get-AzureRmVMExtensionImage -Location $locStr -PublisherName $publisherName -Type $type -FilterExpression $filter -Version $version; } "was not found";
Assert-ThrowsContains { $s8 = Get-AzureRmVMExtensionImageType -Location $locStr -PublisherName $publisherName; } "was not found";
Assert-ThrowsContains { $s9 = Get-AzureRmVMExtensionImage -Location $locStr -PublisherName $publisherName -Type $type -FilterExpression $filter; } "was not found";
$passed = $true;
}
finally
{
}
}
function Test-VirtualMachineSizeAndUsage
{
$rgname = Get-ComputeTestResourceName
$passed = $false;
try
{
$loc = Get-ComputeVMLocation;
New-AzureRmResourceGroup -Name $rgname -Location $loc -Force;
$asetName = 'aset' + $rgname;
New-AzureRmAvailabilitySet -ResourceGroupName $rgname -Name $asetName -Location $loc;
$aset = Get-AzureRmAvailabilitySet -ResourceGroupName $rgname -Name $asetName;
$vmsize = 'Standard_A1';
$vmname = 'vm' + $rgname;
$p = New-AzureRmVMConfig -VMName $vmname -VMSize $vmsize -AvailabilitySetId $aset.Id;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzureRmVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzureRmVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzureRmVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzureRmPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzureRmPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzureRmNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzureRmNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$p = Set-AzureRmVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage -DiskSizeInGB 200;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty;
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
Assert-AreEqual $p.StorageProfile.OSDisk.DiskSizeGB 200;
Assert-AreEqual $p.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[1].DiskSizeGB 11;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Lun 2;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$p = Set-AzureRmVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred;
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
$imgRef = Get-DefaultCRPImage -loc $loc;
$p = Set-AzureRmVMSourceImage -VM $p -PublisherName $imgRef.PublisherName -Offer $imgRef.Offer -Skus $imgRef.Skus -Version $imgRef.Version;
Assert-NotNull $p.StorageProfile.ImageReference;
Assert-Null $p.StorageProfile.SourceImageId;
New-AzureRmVM -ResourceGroupName $rgname -Location $loc -VM $p;
$vm = Get-AzureRmVM -ResourceGroupName $rgname -Name $vmname;
Assert-AreEqual $vm.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $vm.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $vm.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
Assert-AreEqual $vm.StorageProfile.OSDisk.DiskSizeGB 200;
Assert-AreEqual $vm.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $vm.StorageProfile.DataDisks[0].Caching 'ReadOnly';
Assert-AreEqual $vm.StorageProfile.DataDisks[0].DiskSizeGB 10;
Assert-AreEqual $vm.StorageProfile.DataDisks[0].Lun 1;
Assert-AreEqual $vm.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1;
Assert-AreEqual $vm.StorageProfile.DataDisks[1].Caching 'ReadOnly';
Assert-AreEqual $vm.StorageProfile.DataDisks[1].DiskSizeGB 11;
Assert-AreEqual $vm.StorageProfile.DataDisks[1].Lun 2;
Assert-AreEqual $vm.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2;
$s1 = Get-AzureRmVMSize -Location ($loc -replace ' ');
Assert-NotNull $s1;
Assert-NotNull $s1.RequestId;
Assert-NotNull $s1.StatusCode;
Validate-VirtualMachineSize $vmsize $s1;
$s2 = Get-AzureRmVMSize -ResourceGroupName $rgname -VMName $vmname;
Assert-NotNull $s2;
Validate-VirtualMachineSize $vmsize $s2;
$asetName = $aset.Name;
$s3 = Get-AzureRmVMSize -ResourceGroupName $rgname -AvailabilitySetName $asetName;
Assert-NotNull $s3;
Validate-VirtualMachineSize $vmsize $s3;
$u1 = Get-AzureRmVMUsage -Location ($loc -replace ' ');
$usageOutput = $u1 | Out-String;
Write-Verbose("Get-AzureRmVMUsage: ");
Write-Verbose($usageOutput);
$usageOutput = $u1 | Out-String;
Write-Verbose("Get-AzureRmVMUsage | Format-Custom : ");
$usageOutput = $u1 | Format-Custom | Out-String;
Write-Verbose($usageOutput);
Validate-VirtualMachineUsage $u1;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Validate-VirtualMachineSize
{
param([string] $vmSize, $vmSizeList)
$count = 0;
foreach ($item in $vmSizeList)
{
if ($item.Name -eq $vmSize)
{
$count = $count + 1;
}
}
$valid = $count -eq 1;
return $valid;
}
function Validate-VirtualMachineUsage
{
param($vmUsageList)
$valid = $true;
foreach ($item in $vmUsageList)
{
Assert-NotNull $item;
Assert-NotNull $item.Name;
Assert-NotNull $item.Name.Value;
Assert-NotNull $item.Name.LocalizedValue;
Assert-True { $item.CurrentValue -le $item.Limit };
Assert-NotNull $item.RequestId;
Assert-NotNull $item.StatusCode;
}
return $valid;
}
function Test-VirtualMachinePIRv2
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzureRmResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$p = New-AzureRmVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzureRmVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzureRmVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzureRmVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzureRmPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzureRmPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzureRmNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzureRmNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$dataDiskVhdUri3 = "https://$stoname.blob.core.windows.net/test/data3.vhd";
$p = Set-AzureRmVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk3' -Caching 'ReadOnly' -DiskSizeInGB 12 -Lun 3 -VhdUri $dataDiskVhdUri3 -CreateOption Empty;
$p = Remove-AzureRmVMDataDisk -VM $p -Name 'testDataDisk3';
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
Assert-AreEqual $p.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[1].DiskSizeGB 11;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Lun 2;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$img = 'a699494373c04fc0bc8f2bb1389d6106__Windows-Server-2012-Datacenter-201503.01-en.us-127GB.vhd';
$p = Set-AzureRmVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred;
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
$imgRef = Get-DefaultCRPImage -loc $loc;
$p = ($imgRef | Set-AzureRmVMSourceImage -VM $p);
Assert-NotNull $p.StorageProfile.ImageReference;
Assert-Null $p.StorageProfile.SourceImageId;
$p.StorageProfile.DataDisks = $null;
New-AzureRmVM -ResourceGroupName $rgname -Location $loc -VM $p;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachineCapture
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzureRmResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$p = New-AzureRmVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzureRmVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzureRmVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzureRmVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzureRmPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzureRmPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzureRmNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzureRmNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$dataDiskVhdUri3 = "https://$stoname.blob.core.windows.net/test/data3.vhd";
$p = Set-AzureRmVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk3' -Caching 'ReadOnly' -DiskSizeInGB 12 -Lun 3 -VhdUri $dataDiskVhdUri3 -CreateOption Empty;
$p = Remove-AzureRmVMDataDisk -VM $p -Name 'testDataDisk3';
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
Assert-AreEqual $p.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[1].DiskSizeGB 11;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Lun 2;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$img = 'a699494373c04fc0bc8f2bb1389d6106__Windows-Server-2012-Datacenter-201503.01-en.us-127GB.vhd';
$p = Set-AzureRmVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred;
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
$imgRef = Get-DefaultCRPImage -loc $loc;
$p = ($imgRef | Set-AzureRmVMSourceImage -VM $p);
$p.StorageProfile.DataDisks = $null;
New-AzureRmVM -ResourceGroupName $rgname -Location $loc -VM $p;
Stop-AzureRmVM -ResourceGroupName $rgname -Name $vmname -Force;
Set-AzureRmVM -Generalize -ResourceGroupName $rgname -Name $vmname;
$dest = Get-ComputeTestResourceName;
$templatePath = "$TestOutputRoot\template.txt";
Save-AzureRmVMImage -ResourceGroupName $rgname -VMName $vmname -DestinationContainerName $dest -VHDNamePrefix 'pslib' -Overwrite -Path $templatePath;
$template = Get-Content $templatePath;
Assert-True { $template[1].Contains("$schema"); }
Remove-AzureRmVM -ResourceGroupName $rgname -Name $vmname -Force;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachineCaptureNegative
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzureRmResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$p = New-AzureRmVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzureRmVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzureRmVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzureRmVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzureRmPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzureRmPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzureRmNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzureRmNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$p = Set-AzureRmVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty;
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
Assert-AreEqual $p.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[1].DiskSizeGB 11;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Lun 2;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$img = 'a699494373c04fc0bc8f2bb1389d6106__Windows-Server-2012-Datacenter-201503.01-en.us-127GB.vhd';
$p = Set-AzureRmVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred;
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
$imgRef = Get-DefaultCRPImage -loc $loc;
$p = ($imgRef | Set-AzureRmVMSourceImage -VM $p);
New-AzureRmVM -ResourceGroupName $rgname -Location $loc -VM $p;
Assert-ThrowsContains `
{Set-AzureRmVM -Generalize -ResourceGroupName $rgname -Name $vmname;} `
"Please power off";
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachineDataDisk
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzureRmResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$p = New-AzureRmVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzureRmVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzureRmVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzureRmVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzureRmPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzureRmPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzureRmNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzureRmNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId -Primary;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Primary $true;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$dataDiskVhdUri3 = "https://$stoname.blob.core.windows.net/test/data3.vhd";
$dataDiskName1 = 'testDataDisk1';
$dataDiskName2 = 'testDataDisk2';
$dataDiskName3 = 'testDataDisk3';
$p = Set-AzureRmVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$p = Add-AzureRmVMDataDisk -VM $p -Name $dataDiskName1 -Caching 'ReadOnly' -DiskSizeInGB 5 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty;
$p = Add-AzureRmVMDataDisk -VM $p -Name $dataDiskName2 -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty;
$p = Add-AzureRmVMDataDisk -VM $p -Name $dataDiskName3 -Caching 'ReadOnly' -DiskSizeInGB 12 -Lun 3 -VhdUri $dataDiskVhdUri3 -CreateOption Empty;
$p = Remove-AzureRmVMDataDisk -VM $p -Name $dataDiskName3;
$p = Set-AzureRmVMDataDisk -VM $p -Name $dataDiskName1 -DiskSizeInGB 10;
Assert-ThrowsContains { Set-AzureRmVMDataDisk -VM $p -Name $dataDiskName3 -Caching 'ReadWrite'; } "not currently assigned for this VM";
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
Assert-AreEqual $p.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Name $dataDiskName1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].CreateOption 'Empty';
Assert-AreEqual $p.StorageProfile.DataDisks[1].Name $dataDiskName2;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[1].DiskSizeGB 11;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Lun 2;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2;
Assert-AreEqual $p.StorageProfile.DataDisks[1].CreateOption 'Empty';
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = Set-AzureRmVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred;
$imgRef = Get-DefaultCRPImage -loc $loc;
$p = ($imgRef | Set-AzureRmVMSourceImage -VM $p);
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
Assert-AreEqual $p.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $p.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $p.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $p.StorageProfile.ImageReference.Version $imgRef.Version;
New-AzureRmVM -ResourceGroupName $rgname -Location $loc -VM $p;
$vm1 = Get-AzureRmVM -Name $vmname -ResourceGroupName $rgname;
Assert-AreEqual $vm1.Name $vmname;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Version $imgRef.Version;
Assert-AreEqual $vm1.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $vm1.StorageProfile.DataDisks[0].Name $dataDiskName1;
Assert-AreEqual $vm1.StorageProfile.DataDisks[0].Caching 'ReadOnly';
Assert-AreEqual $vm1.StorageProfile.DataDisks[0].DiskSizeGB 10;
Assert-AreEqual $vm1.StorageProfile.DataDisks[0].Lun 1;
Assert-AreEqual $vm1.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1;
Assert-AreEqual $vm1.StorageProfile.DataDisks[0].CreateOption 'Empty';
Assert-AreEqual $vm1.StorageProfile.DataDisks[1].Name $dataDiskName2;
Assert-AreEqual $vm1.StorageProfile.DataDisks[1].Caching 'ReadOnly';
Assert-AreEqual $vm1.StorageProfile.DataDisks[1].DiskSizeGB 11;
Assert-AreEqual $vm1.StorageProfile.DataDisks[1].Lun 2;
Assert-AreEqual $vm1.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2;
Assert-AreEqual $vm1.StorageProfile.DataDisks[1].CreateOption 'Empty';
Assert-AreEqual $vm1.OSProfile.AdminUsername $user;
Assert-AreEqual $vm1.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize;
$vm1 = Set-AzureRmVMDataDisk -VM $vm1 -Caching 'ReadWrite' -Lun 1;
$vm1 = Set-AzureRmVMDataDisk -VM $vm1 -Name $dataDiskName2 -Caching 'ReadWrite';
$vm1 = Add-AzureRmVMDataDisk -VM $vm1 -Name $dataDiskName3 -Caching 'ReadOnly' -DiskSizeInGB 12 -Lun 3 -VhdUri $dataDiskVhdUri3 -CreateOption Empty;
Update-AzureRmVM -ResourceGroupName $rgname -VM $vm1;
$vm2 = Get-AzureRmVM -Name $vmname -ResourceGroupName $rgname;
Assert-AreEqual $vm2.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm2.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm2.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $vm2.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $vm2.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $vm2.StorageProfile.ImageReference.Version $imgRef.Version;
Assert-AreEqual $vm2.StorageProfile.DataDisks.Count 3;
Assert-AreEqual $vm2.StorageProfile.DataDisks[0].Name $dataDiskName1;
Assert-AreEqual $vm2.StorageProfile.DataDisks[0].Caching 'ReadWrite';
Assert-AreEqual $vm2.StorageProfile.DataDisks[0].DiskSizeGB 10;
Assert-AreEqual $vm2.StorageProfile.DataDisks[0].Lun 1;
Assert-AreEqual $vm2.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1;
Assert-AreEqual $vm2.StorageProfile.DataDisks[0].CreateOption 'Empty';
Assert-AreEqual $vm2.StorageProfile.DataDisks[1].Name $dataDiskName2;
Assert-AreEqual $vm2.StorageProfile.DataDisks[1].Caching 'ReadWrite';
Assert-AreEqual $vm2.StorageProfile.DataDisks[1].DiskSizeGB 11;
Assert-AreEqual $vm2.StorageProfile.DataDisks[1].Lun 2;
Assert-AreEqual $vm2.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2;
Assert-AreEqual $vm2.StorageProfile.DataDisks[1].CreateOption 'Empty';
Assert-AreEqual $vm2.StorageProfile.DataDisks[2].Name $dataDiskName3;
Assert-AreEqual $vm2.StorageProfile.DataDisks[2].Caching 'ReadOnly';
Assert-AreEqual $vm2.StorageProfile.DataDisks[2].DiskSizeGB 12;
Assert-AreEqual $vm2.StorageProfile.DataDisks[2].Lun 3;
Assert-AreEqual $vm2.StorageProfile.DataDisks[2].Vhd.Uri $dataDiskVhdUri3;
Assert-AreEqual $vm2.StorageProfile.DataDisks[2].CreateOption 'Empty';
Assert-AreEqual $vm2.OSProfile.AdminUsername $user;
Assert-AreEqual $vm2.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm2.HardwareProfile.VmSize $vmsize;
Assert-NotNull $vm2.Location;
$vms = Get-AzureRmVM -ResourceGroupName $rgname;
Assert-AreNotEqual $vms $null;
Get-AzureRmVM -ResourceGroupName $rgname | Remove-AzureRmVM -ResourceGroupName $rgname -Force;
$vms = Get-AzureRmVM -ResourceGroupName $rgname;
Assert-AreEqual $vms $null;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachineDataDiskNegative
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzureRmResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A0';
$vmname = 'vm' + $rgname;
$p = New-AzureRmVMConfig -VMName $vmname -VMSize $vmsize;
$subnet = New-AzureRmVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzureRmVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzureRmVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzureRmPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzureRmPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzureRmNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzureRmNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$dataDiskVhdUri3 = "https://$stoname.blob.core.windows.net/test/data3.vhd";
$p = Set-AzureRmVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk3' -Caching 'ReadOnly' -DiskSizeInGB 12 -Lun 3 -VhdUri $dataDiskVhdUri3 -CreateOption Empty;
$p = Remove-AzureRmVMDataDisk -VM $p -Name 'testDataDisk3';
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$img = 'a699494373c04fc0bc8f2bb1389d6106__Windows-Server-2012-Datacenter-201503.01-en.us-127GB.vhd';
$p = Set-AzureRmVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred;
$imgRef = Get-DefaultCRPImage -loc $loc;
$p = ($imgRef | Set-AzureRmVMSourceImage -VM $p);
Assert-ThrowsContains { New-AzureRmVM -ResourceGroupName $rgname -Location $loc -VM $p; } "The maximum number of data disks allowed to be attached to a VM is 1.";
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachinePlan
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzureRmResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A0';
$vmname = 'vm' + $rgname;
$p = New-AzureRmVMConfig -VMName $vmname -VMSize $vmsize;
$subnet = New-AzureRmVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzureRmVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzureRmVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzureRmPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzureRmPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzureRmNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzureRmNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$dataDiskVhdUri3 = "https://$stoname.blob.core.windows.net/test/data3.vhd";
$p = Set-AzureRmVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$img = 'a699494373c04fc0bc8f2bb1389d6106__Windows-Server-2012-Datacenter-201503.01-en.us-127GB.vhd';
$p = Set-AzureRmVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred;
$imgRef = Get-DefaultCRPImage -loc $loc;
$p = ($imgRef | Set-AzureRmVMSourceImage -VM $p);
$plan = Get-ComputeTestResourceName;
$p = Set-AzureRmVMPlan -VM $p -Name $plan -Publisher $plan -Product $plan -PromotionCode $plan;
Assert-ThrowsContains { New-AzureRmVM -ResourceGroupName $rgname -Location $loc -VM $p; } "User failed validation to purchase resources";
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachinePlan2
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzureRmResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = Get-DefaultVMSize;
$vmname = 'vm' + $rgname;
$p = New-AzureRmVMConfig -VMName $vmname -VMSize $vmsize;
$subnet = New-AzureRmVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzureRmVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzureRmVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzureRmPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzureRmPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzureRmNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzureRmNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId;
$stoname = 'sto' + $rgname;
$stotype = Get-DefaultStorageType;
New-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$p = Set-AzureRmVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = Set-AzureRmVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred;
$imgRef = (Get-MarketplaceImage)[0];
$plan = $imgRef.PurchasePlan;
$p = Set-AzureRmVMSourceImage -VM $p -PublisherName $imgRef.PublisherName -Offer $imgRef.Offer -Skus $imgRef.Skus -Version $imgRef.Version;
$p = Set-AzureRmVMPlan -VM $p -Name $plan.Name -Publisher $plan.Publisher -Product $plan.Product;
$p.OSProfile.WindowsConfiguration = $null;
Assert-ThrowsContains { New-AzureRmVM -ResourceGroupName $rgname -Location $loc -VM $p; } "Legal terms have not been accepted for this item on this subscription";
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachineTags
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzureRmResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A0';
$vmname = 'vm' + $rgname;
$p = New-AzureRmVMConfig -VMName $vmname -VMSize $vmsize;
$subnet = New-AzureRmVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzureRmVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzureRmVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzureRmPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzureRmPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzureRmNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzureRmNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$p = Set-AzureRmVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$p = Set-AzureRmVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred;
$imgRef = Get-DefaultCRPImage -loc $loc;
$p = ($imgRef | Set-AzureRmVMSourceImage -VM $p);
$tags = @{test1 = "testval1"; test2 = "testval2" };
$st = New-AzureRmVM -ResourceGroupName $rgname -Location $loc -VM $p -Tags $tags;
Assert-NotNull $st.StatusCode;
$vm = Get-AzureRmVM -ResourceGroupName $rgname -Name $vmname;
$a = $vm | Out-String;
Write-Verbose("Get-AzureRmVM output:");
Write-Verbose($a);
Assert-NotNull $vm.RequestId;
Assert-NotNull $vm.StatusCode;
Assert-AreEqual "testval1" $vm.Tags["test1"];
Assert-AreEqual "testval2" $vm.Tags["test2"];
$vm = $vm | Update-AzureRmVM;
$vm = Get-AzureRmVM -ResourceGroupName $rgname -Name $vmname;
Assert-NotNull $vm.RequestId;
Assert-NotNull $vm.StatusCode;
Assert-AreEqual "testval1" $vm.Tags["test1"];
Assert-AreEqual "testval2" $vm.Tags["test2"];
$new_tags = @{test1 = "testval3"; test2 = "testval4" };
$st = $vm | Update-AzureRmVM -Tags $new_tags;
$vm = Get-AzureRmVM -ResourceGroupName $rgname -Name $vmname;
Assert-NotNull $vm.RequestId;
Assert-NotNull $vm.StatusCode;
Assert-AreEqual "testval3" $vm.Tags["test1"];
Assert-AreEqual "testval4" $vm.Tags["test2"];
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachineWithVMAgentAutoUpdate
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzureRmResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$p = New-AzureRmVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzureRmVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzureRmVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzureRmVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzureRmPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzureRmPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzureRmNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzureRmNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$p = Set-AzureRmVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$imgRef = Get-DefaultCRPWindowsImageOffline;
$p = Set-AzureRmVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred -ProvisionVMAgent -EnableAutoUpdate;
$p = ($imgRef | Set-AzureRmVMSourceImage -VM $p);
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
Assert-AreEqual $p.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $p.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $p.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $p.StorageProfile.ImageReference.Version $imgRef.Version;
Assert-Null $p.OSProfile.WindowsConfiguration.AdditionalUnattendContent "NULL";
New-AzureRmVM -ResourceGroupName $rgname -Location $loc -VM $p;
$vm1 = Get-AzureRmVM -Name $vmname -ResourceGroupName $rgname;
Assert-AreEqual $vm1.Name $vmname;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Version $imgRef.Version;
Assert-AreEqual $vm1.OSProfile.AdminUsername $user;
Assert-AreEqual $vm1.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize;
Remove-AzureRmVM -Name $vmname -ResourceGroupName $rgname -Force;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-LinuxVirtualMachine
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzureRmResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$p = New-AzureRmVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzureRmVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzureRmVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzureRmVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzureRmPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzureRmPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzureRmNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzureRmNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$p = Set-AzureRmVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$imgRef = Get-DefaultCRPLinuxImageOffline;
$p = Set-AzureRmVMOperatingSystem -VM $p -Linux -ComputerName $computerName -Credential $cred
$p = ($imgRef | Set-AzureRmVMSourceImage -VM $p);
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
Assert-AreEqual $p.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $p.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $p.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $p.StorageProfile.ImageReference.Version $imgRef.Version;
New-AzureRmVM -ResourceGroupName $rgname -Location $loc -VM $p;
$vm1 = Get-AzureRmVM -Name $vmname -ResourceGroupName $rgname;
Assert-AreEqual $vm1.Name $vmname;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Version $imgRef.Version;
Assert-AreEqual $vm1.OSProfile.AdminUsername $user;
Assert-AreEqual $vm1.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize;
Remove-AzureRmVM -Name $vmname -ResourceGroupName $rgname -Force;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VMImageCmdletOutputFormat
{
$locStr = Get-ComputeVMLocation;
$imgRef = Get-DefaultCRPImage -loc $locStr;
$publisher = $imgRef.PublisherName;
$offer = $imgRef.Offer;
$sku = $imgRef.Skus;
$ver = $imgRef.Version;
Assert-OutputContains " Get-AzureRmVMImagePublisher -Location '$locStr'" @('Id', 'Location', 'PublisherName');
Assert-OutputContains " Get-AzureRmVMImagePublisher -Location '$locStr' | ? { `$_.PublisherName -eq `'$publisher`' } " @('Id', 'Location', 'PublisherName');
Assert-OutputContains " Get-AzureRmVMImagePublisher -Location '$locStr' | ? { `$_.PublisherName -eq `'$publisher`' } | Get-AzureRmVMImageOffer " @('Id', 'Location', 'PublisherName', 'Offer');
Assert-OutputContains " Get-AzureRmVMImagePublisher -Location '$locStr' | ? { `$_.PublisherName -eq `'$publisher`' } | Get-AzureRmVMImageOffer | Get-AzureRmVMImageSku " @('Id', 'Location', 'PublisherName', 'Offer', 'Sku');
Assert-OutputContains " Get-AzureRmVMImagePublisher -Location '$locStr' | ? { `$_.PublisherName -eq `'$publisher`' } | Get-AzureRmVMImageOffer | Get-AzureRmVMImageSku | Get-AzureRmVMImage " @('Id', 'Location', 'PublisherName', 'Offer', 'Sku', 'Version', 'FilterExpression');
Assert-OutputContains " Get-AzureRmVMImage -Location '$locStr' -PublisherName $publisher -Offer $offer -Skus $sku -Version $ver " @('Id', 'Location', 'PublisherName', 'Offer', 'Sku', 'Version', 'FilterExpression', 'Name', 'DataDiskImages', 'OSDiskImage', 'PurchasePlan');
Assert-OutputContains " Get-AzureRmVMImage -Location '$locStr' -PublisherName $publisher -Offer $offer -Skus $sku -Version $ver " @('Id', 'Location', 'PublisherName', 'Offer', 'Sku', 'Version', 'FilterExpression', 'Name', 'DataDiskImages', 'OSDiskImage', 'PurchasePlan');
}
function Test-GetVMSizeFromAllLocations
{
$locations = get_all_vm_locations;
foreach ($loc in $locations)
{
$vmsizes = Get-AzureRmVMSize -Location $loc;
Assert-True { $vmsizes.Count -gt 0 }
Assert-True { ($vmsizes | where { $_.Name -eq 'Standard_A3' }).Count -eq 1 }
Write-Output ('Found VM Size Standard_A3 in Location: ' + $loc);
}
}
function get_all_vm_locations
{
if ([Microsoft.Azure.Test.HttpRecorder.HttpMockServer]::Mode -ne [Microsoft.Azure.Test.HttpRecorder.HttpRecorderMode]::Playback)
{
$namespace = "Microsoft.Compute"
$type = "virtualMachines"
$location = Get-AzureRmResourceProvider -ProviderNamespace $namespace | where {$_.ResourceTypes[0].ResourceTypeName -eq $type}
if ($location -eq $null)
{
return @("West US", "East US")
} else
{
return $location.Locations
}
}
return @("West US", "East US")
}
function Test-VirtualMachineListWithPaging
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeDefaultLocation;
$st = New-AzureRmResourceGroup -Name $rgname -Location $loc -Force;
$numberOfInstances = 51;
$vmSize = 'Standard_A0';
$templateFile = ".\Templates\azuredeploy.json";
$paramFile = ".\Templates\azuredeploy-parameters-51vms.json";
$paramContent =
@"
{
"newStorageAccountName": {
"value": "${rgname}sto"
},
"adminUsername": {
"value": "Foo12"
},
"adminPassword": {
"value": "BaR@123${rgname}"
},
"numberOfInstances": {
"value": $numberOfInstances
},
"location": {
"value": "$loc"
},
"vmSize": {
"value": "$vmSize"
}
}
"@;
$st = Set-Content -Path $paramFile -Value $paramContent -Force;
$st = New-AzureRmResourceGroupDeployment -Name "${rgname}dp" -ResourceGroupName $rgname -TemplateFile $templateFile -TemplateParameterFile $paramFile;
$vms = Get-AzureRmVM -ResourceGroupName $rgname;
Assert-True { $vms.Count -eq $numberOfInstances };
$vms = Get-AzureRmVM;
Assert-True { $vms.Count -ge $numberOfInstances };
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachineWithDifferentStorageResource
{
$rgname = Get-ComputeTestResourceName
$rgname_storage = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzureRmResourceGroup -Name $rgname -Location $loc -Force;
New-AzureRmResourceGroup -Name $rgname_storage -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$p = New-AzureRmVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzureRmVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzureRmVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzureRmVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzureRmPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzureRmPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzureRmNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzureRmNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId -Primary;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Primary $true;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzureRmStorageAccount -ResourceGroupName $rgname_storage -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzureRmStorageAccount -ResourceGroupName $rgname_storage -Name $stoname;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$dataDiskVhdUri3 = "https://$stoname.blob.core.windows.net/test/data3.vhd";
$p = Set-AzureRmVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk3' -Caching 'ReadOnly' -DiskSizeInGB 12 -Lun 3 -VhdUri $dataDiskVhdUri3 -CreateOption Empty;
$p = Remove-AzureRmVMDataDisk -VM $p -Name 'testDataDisk3';
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
Assert-AreEqual $p.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[1].DiskSizeGB 11;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Lun 2;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = Set-AzureRmVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred;
$imgRef = Get-DefaultCRPImage -loc $loc;
$p = ($imgRef | Set-AzureRmVMSourceImage -VM $p);
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
Assert-AreEqual $p.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $p.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $p.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $p.StorageProfile.ImageReference.Version $imgRef.Version;
New-AzureRmVM -ResourceGroupName $rgname -Location $loc -VM $p;
$vm1 = Get-AzureRmVM -Name $vmname -ResourceGroupName $rgname;
Assert-AreEqual $vm1.Name $vmname;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Version $imgRef.Version;
Assert-AreEqual $vm1.OSProfile.AdminUsername $user;
Assert-AreEqual $vm1.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize;
Assert-AreEqual $true $vm1.DiagnosticsProfile.BootDiagnostics.Enabled;
Assert-AreEqual $stoaccount.PrimaryEndpoints.Blob $vm1.DiagnosticsProfile.BootDiagnostics.StorageUri;
}
finally
{
Clean-ResourceGroup $rgname
Clean-ResourceGroup $rgname_storage
}
}
function Test-VirtualMachineWithPremiumStorageAccount
{
$rgname = Get-ComputeTestResourceName
$rgname_storage = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzureRmResourceGroup -Name $rgname_storage -Location $loc -Force;
$stoname1 = 'sto' + $rgname_storage;
$stotype1 = 'Standard_GRS';
New-AzureRmStorageAccount -ResourceGroupName $rgname_storage -Name $stoname1 -Location $loc -Type $stotype1;
$stoaccount1 = Get-AzureRmStorageAccount -ResourceGroupName $rgname_storage -Name $stoname1;
New-AzureRmResourceGroup -Name $rgname -Location $loc -Force;
$stoname = 'sto' + $rgname;
$stotype = 'Premium_LRS';
New-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname;
$vmsize = 'Standard_DS1';
$vmname = 'vm' + $rgname;
$p = New-AzureRmVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzureRmVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzureRmVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzureRmVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzureRmPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzureRmPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzureRmNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzureRmNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId -Primary;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Primary $true;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$p = Set-AzureRmVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty;
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
Assert-AreEqual $p.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[1].DiskSizeGB 11;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Lun 2;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = Set-AzureRmVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred;
$imgRef = Get-DefaultCRPImage -loc $loc;
$p = ($imgRef | Set-AzureRmVMSourceImage -VM $p);
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
Assert-AreEqual $p.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $p.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $p.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $p.StorageProfile.ImageReference.Version $imgRef.Version;
New-AzureRmVM -ResourceGroupName $rgname -Location $loc -VM $p;
$vm1 = Get-AzureRmVM -Name $vmname -ResourceGroupName $rgname;
Assert-AreEqual $vm1.Name $vmname;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Version $imgRef.Version;
Assert-AreEqual $vm1.OSProfile.AdminUsername $user;
Assert-AreEqual $vm1.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize;
Assert-AreEqual $true $vm1.DiagnosticsProfile.BootDiagnostics.Enabled;
Assert-AreNotEqual $stoaccount.PrimaryEndpoints.Blob $vm1.DiagnosticsProfile.BootDiagnostics.StorageUri;
}
finally
{
Clean-ResourceGroup $rgname
Clean-ResourceGroup $rgname_storage
}
}
function Test-VirtualMachineWithEmptyAuc
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzureRmResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$p = New-AzureRmVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzureRmVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzureRmVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzureRmVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzureRmPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzureRmPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzureRmNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzureRmNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId -Primary;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Primary $true;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$p = Set-AzureRmVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty;
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
Assert-AreEqual $p.StorageProfile.DataDisks.Count 1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = Set-AzureRmVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred -ProvisionVMAgent -EnableAutoUpdate;
$imgRef = Get-DefaultCRPImage -loc $loc;
$p = ($imgRef | Set-AzureRmVMSourceImage -VM $p);
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
Assert-AreEqual $p.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $p.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $p.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $p.StorageProfile.ImageReference.Version $imgRef.Version;
New-AzureRmVM -ResourceGroupName $rgname -Location $loc -VM $p;
$vm1 = Get-AzureRmVM -Name $vmname -ResourceGroupName $rgname;
Assert-AreEqual $vm1.Name $vmname;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Version $imgRef.Version;
Assert-AreEqual $vm1.OSProfile.AdminUsername $user;
Assert-AreEqual $vm1.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize;
Assert-AreEqual $true $vm1.DiagnosticsProfile.BootDiagnostics.Enabled;
Assert-AreEqual $stoaccount.PrimaryEndpoints.Blob $vm1.DiagnosticsProfile.BootDiagnostics.StorageUri;
$vm1 = Set-AzureRmVMDataDisk -VM $vm1 -Name 'testDataDisk1' -Caching 'None'
$aucSetting = "AutoLogon";
$aucContent = "<UserAccounts><AdministratorPassword><Value>" + $password + "</Value><PlainText>true</PlainText></AdministratorPassword></UserAccounts>";
$vm1 = Add-AzureRmVMAdditionalUnattendContent -VM $vm1 -Content $aucContent -SettingName $aucSetting;
[System.Collections.Generic.List[Microsoft.Azure.Management.Compute.Models.AdditionalUnattendContent]]$emptyAUC=@();
$vm1.OSProfile.WindowsConfiguration.AdditionalUnattendContent.RemoveAt(0)
Assert-NotNull $vm1.OSProfile.WindowsConfiguration.AdditionalUnattendContent;
Assert-AreEqual 0 $vm1.OSProfile.WindowsConfiguration.AdditionalUnattendContent.Count;
Update-AzureRmVM -ResourceGroupName $rgname -VM $vm1;
$vm2 = Get-AzureRmVM -Name $vmname -ResourceGroupName $rgname;
Assert-AreEqual $vm2.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm2.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm2.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $vm2.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $vm2.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $vm2.StorageProfile.ImageReference.Version $imgRef.Version;
Assert-AreEqual $vm2.OSProfile.AdminUsername $user;
Assert-AreEqual $vm2.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm2.HardwareProfile.VmSize $vmsize;
Assert-NotNull $vm2.Location;
Assert-AreEqual $true $vm2.DiagnosticsProfile.BootDiagnostics.Enabled;
Assert-AreEqual $stoaccount.PrimaryEndpoints.Blob $vm2.DiagnosticsProfile.BootDiagnostics.StorageUri;
$vms = Get-AzureRmVM -ResourceGroupName $rgname;
Assert-AreNotEqual $vms $null;
Get-AzureRmVM -ResourceGroupName $rgname | Remove-AzureRmVM -ResourceGroupName $rgname -Force;
$vms = Get-AzureRmVM -ResourceGroupName $rgname;
Assert-AreEqual $vms $null;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachineWithBYOL
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = "Central US";
New-AzureRmResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$p = New-AzureRmVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzureRmVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzureRmVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzureRmVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzureRmPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzureRmPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzureRmNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzureRmNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId -Primary;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Primary $true;
$stoname = "mybyolosimagerdfe";
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$userImageUrl = "https://mybyolosimagerdfe.blob.core.windows.net/vhdsrc2/win2012-tag2.vhd";
$p = Set-AzureRmVMOSDisk -VM $p -Windows -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -SourceImage $userImageUrl -CreateOption FromImage;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty;
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
Assert-AreEqual $p.StorageProfile.DataDisks.Count 1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$licenseType = "Windows_Server";
$p = Set-AzureRmVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred -ProvisionVMAgent -EnableAutoUpdate;
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
New-AzureRmVM -ResourceGroupName $rgname -Location $loc -LicenseType $licenseType -VM $p;
$vm1 = Get-AzureRmVM -Name $vmname -ResourceGroupName $rgname;
$output = $vm1 | Out-String;
Write-Verbose ('Output String : ' + $output);
Assert-AreEqual $vm1.Name $vmname;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm1.OSProfile.AdminUsername $user;
Assert-AreEqual $vm1.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize;
Assert-AreEqual $vm1.LicenseType $licenseType;
Assert-AreEqual $true $vm1.DiagnosticsProfile.BootDiagnostics.Enabled;
Get-AzureRmVM -ResourceGroupName $rgname -Name $vmname `
| Add-AzureRmVMDataDisk -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 12 -Lun 3 -VhdUri $dataDiskVhdUri2 -CreateOption Empty `
| Update-AzureRmVM;
$vm2 = Get-AzureRmVM -Name $vmname -ResourceGroupName $rgname;
Assert-AreEqual $vm2.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm2.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm2.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $vm2.OSProfile.AdminUsername $user;
Assert-AreEqual $vm2.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm2.HardwareProfile.VmSize $vmsize;
Assert-AreEqual $vm2.LicenseType $licenseType;
Assert-NotNull $vm2.Location;
Get-AzureRmVM -ResourceGroupName $rgname | Remove-AzureRmVM -ResourceGroupName $rgname -Force;
$vms = Get-AzureRmVM -ResourceGroupName $rgname;
Assert-AreEqual $vms $null;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachineRedeploy
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
New-AzureRmResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$p = New-AzureRmVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzureRmVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzureRmVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzureRmVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzureRmPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzureRmPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzureRmNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzureRmNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$p = Set-AzureRmVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty;
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
Assert-AreEqual $p.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[1].DiskSizeGB 11;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Lun 2;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$img = 'a699494373c04fc0bc8f2bb1389d6106__Windows-Server-2012-Datacenter-201503.01-en.us-127GB.vhd';
$p = Set-AzureRmVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred;
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
$imgRef = Get-DefaultCRPImage -loc $loc;
$p = ($imgRef | Set-AzureRmVMSourceImage -VM $p);
New-AzureRmVM -ResourceGroupName $rgname -Location $loc -VM $p;
$vm2 = Get-AzureRmVM -Name $vmname -ResourceGroupName $rgname;
Assert-AreEqual $vm2.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm2.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm2.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $vm2.OSProfile.AdminUsername $user;
Assert-AreEqual $vm2.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm2.HardwareProfile.VmSize $vmsize;
Assert-NotNull $vm2.Location;
Set-AzureRmVM -ResourceGroupName $rgname -Name $vmname -Redeploy;
$vm2 = Get-AzureRmVM -Name $vmname -ResourceGroupName $rgname;
Assert-AreEqual $vm2.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm2.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm2.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $vm2.OSProfile.AdminUsername $user;
Assert-AreEqual $vm2.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm2.HardwareProfile.VmSize $vmsize;
Assert-NotNull $vm2.Location;
Remove-AzureRmVM -ResourceGroupName $rgname -Name $vmname -Force;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachineGetStatus
{
param ($loc)
$rgname = Get-ComputeTestResourceName
try
{
if ($loc -eq $null)
{
$loc = Get-ComputeVMLocation;
}
New-AzureRmResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$p = New-AzureRmVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzureRmVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzureRmVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzureRmVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzureRmPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzureRmPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzureRmNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzureRmNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$p = Set-AzureRmVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = Set-AzureRmVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred;
$imgRef = Get-DefaultCRPImage -loc $loc;
$p = ($imgRef | Set-AzureRmVMSourceImage -VM $p);
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
Assert-AreEqual $p.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $p.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $p.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $p.StorageProfile.ImageReference.Version $imgRef.Version;
New-AzureRmVM -ResourceGroupName $rgname -Location $loc -VM $p;
$vm1 = Get-AzureRmVM -Name $vmname -ResourceGroupName $rgname;
$a = $vm1 | Out-String;
Write-Verbose("Get-AzureRmVM output:");
Write-Verbose($a);
$a = $vm1 | Format-Table | Out-String;
Write-Verbose("Get-AzureRmVM | Format-Table output:");
Write-Verbose($a);
Assert-AreEqual $vm1.Name $vmname;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm1.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $vm1.StorageProfile.ImageReference.Version $imgRef.Version;
Assert-AreEqual $vm1.OSProfile.AdminUsername $user;
Assert-AreEqual $vm1.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm1.HardwareProfile.VmSize $vmsize;
$vm = Get-AzureRmVM -Name $vmname -ResourceGroupName $rgname -Status;
$a = $vm | Out-String;
Write-Verbose($a);
Assert-True {$a.Contains("Statuses");}
$vms = Get-AzureRmVM -ResourceGroupName $rgname -Status;
$a = $vms | Out-String;
Write-Verbose($a);
Assert-True {$a.Contains("PowerState");}
$vms = Get-AzureRmVM -Status;
$a = $vms | Out-String;
Write-Verbose($a);
Assert-True {$a.Contains("PowerState");}
$a = $vms[0] | Format-Custom | Out-String;
Assert-False{$a.Contains("Sku");};
$vms[0].DisplayHint = "Expand"
$a = $vms[0] | Format-Custom | Out-String;
Assert-True{$a.Contains("Sku");};
Remove-AzureRmVM -Name $vmname -ResourceGroupName $rgname -Force;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachineManagedDiskConversion
{
$rgname = Get-ComputeTestResourceName
try
{
if ($loc -eq $null)
{
$loc = Get-ComputeVMLocation;
}
New-AzureRmResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$p = New-AzureRmVMConfig -VMName $vmname -VMSize $vmsize;
Assert-AreEqual $p.HardwareProfile.VmSize $vmsize;
$subnet = New-AzureRmVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzureRmVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzureRmVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzureRmPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzureRmPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzureRmNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzureRmNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
$p = Add-AzureRmVMNetworkInterface -VM $p -Id $nicId -Primary;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $p.NetworkProfile.NetworkInterfaces[0].Primary $true;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzureRmStorageAccount -ResourceGroupName $rgname -Name $stoname;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$dataDiskVhdUri1 = "https://$stoname.blob.core.windows.net/test/data1.vhd";
$dataDiskVhdUri2 = "https://$stoname.blob.core.windows.net/test/data2.vhd";
$dataDiskVhdUri3 = "https://$stoname.blob.core.windows.net/test/data3.vhd";
$p = Set-AzureRmVMOSDisk -VM $p -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk1' -Caching 'ReadOnly' -DiskSizeInGB 10 -Lun 1 -VhdUri $dataDiskVhdUri1 -CreateOption Empty;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk2' -Caching 'ReadOnly' -DiskSizeInGB 11 -Lun 2 -VhdUri $dataDiskVhdUri2 -CreateOption Empty;
$p = Add-AzureRmVMDataDisk -VM $p -Name 'testDataDisk3' -Caching 'ReadOnly' -DiskSizeInGB 12 -Lun 3 -VhdUri $dataDiskVhdUri3 -CreateOption Empty;
$p = Remove-AzureRmVMDataDisk -VM $p -Name 'testDataDisk3';
Assert-AreEqual $p.StorageProfile.OSDisk.Caching $osDiskCaching;
Assert-AreEqual $p.StorageProfile.OSDisk.Name $osDiskName;
Assert-AreEqual $p.StorageProfile.OSDisk.Vhd.Uri $osDiskVhdUri;
Assert-AreEqual $p.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[0].DiskSizeGB 10;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Lun 1;
Assert-AreEqual $p.StorageProfile.DataDisks[0].Vhd.Uri $dataDiskVhdUri1;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Caching 'ReadOnly';
Assert-AreEqual $p.StorageProfile.DataDisks[1].DiskSizeGB 11;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Lun 2;
Assert-AreEqual $p.StorageProfile.DataDisks[1].Vhd.Uri $dataDiskVhdUri2;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = Set-AzureRmVMOperatingSystem -VM $p -Windows -ComputerName $computerName -Credential $cred;
$imgRef = Get-DefaultCRPImage -loc $loc;
$p = ($imgRef | Set-AzureRmVMSourceImage -VM $p);
Assert-AreEqual $p.OSProfile.AdminUsername $user;
Assert-AreEqual $p.OSProfile.ComputerName $computerName;
Assert-AreEqual $p.OSProfile.AdminPassword $password;
Assert-AreEqual $p.StorageProfile.ImageReference.Offer $imgRef.Offer;
Assert-AreEqual $p.StorageProfile.ImageReference.Publisher $imgRef.PublisherName;
Assert-AreEqual $p.StorageProfile.ImageReference.Sku $imgRef.Skus;
Assert-AreEqual $p.StorageProfile.ImageReference.Version $imgRef.Version;
New-AzureRmVM -ResourceGroupName $rgname -Location $loc -VM $p;
$vm2 = Get-AzureRmVM -Name $vmname -ResourceGroupName $rgname;
Assert-AreEqual $vm2.NetworkProfile.NetworkInterfaces.Count 1;
Assert-AreEqual $vm2.NetworkProfile.NetworkInterfaces[0].Id $nicId;
Assert-AreEqual $vm2.StorageProfile.DataDisks.Count 2;
Assert-AreEqual $vm2.OSProfile.AdminUsername $user;
Assert-AreEqual $vm2.OSProfile.ComputerName $computerName;
Assert-AreEqual $vm2.HardwareProfile.VmSize $vmsize;
Assert-NotNull $vm2.Location;
Assert-Null $vm2.StorageProfile.OSDisk.ManagedDisk
Assert-Null $vm2.StorageProfile.DataDisks[0].ManagedDisk
Assert-Null $vm2.StorageProfile.DataDisks[1].ManagedDisk
Stop-AzureRmVM -ResourceGroupName $rgname -Name $vmname -Force
ConvertTo-AzureRmVMManagedDisk -ResourceGroupName $rgname -VMName $vmname
$vm2 = Get-AzureRmVM -Name $vmname -ResourceGroupName $rgname;
Assert-NotNull $vm2.StorageProfile.OSDisk.ManagedDisk
Assert-NotNull $vm2.StorageProfile.DataDisks[0].ManagedDisk
Assert-NotNull $vm2.StorageProfile.DataDisks[1].ManagedDisk
Remove-AzureRmVM -ResourceGroupName $rgname -Name $vmname -Force;
}
finally
{
Clean-ResourceGroup $rgname
}
}
|
combined_dataset/train/non-malicious/sample_23_36.ps1 | sample_23_36.ps1 | #
# Module manifest for module 'OCI.PSModules.Datalabelingservice'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Datalabelingservice.dll'
# Version number of this module.
ModuleVersion = '75.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '600a044a-632a-42d0-b1ab-94f26e2f3791'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Datalabelingservice Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Datalabelingservice.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIDatalabelingserviceDatasetLabels',
'Get-OCIDatalabelingserviceAnnotationFormatsList',
'Get-OCIDatalabelingserviceDataset',
'Get-OCIDatalabelingserviceDatasetsList',
'Get-OCIDatalabelingserviceWorkRequest',
'Get-OCIDatalabelingserviceWorkRequestErrorsList',
'Get-OCIDatalabelingserviceWorkRequestLogsList',
'Get-OCIDatalabelingserviceWorkRequestsList',
'Import-OCIDatalabelingservicePreAnnotatedData',
'Invoke-OCIDatalabelingserviceSnapshotDataset',
'Move-OCIDatalabelingserviceDatasetCompartment',
'New-OCIDatalabelingserviceDataset',
'New-OCIDatalabelingserviceDatasetRecords',
'Remove-OCIDatalabelingserviceDataset',
'Remove-OCIDatalabelingserviceDatasetLabels',
'Rename-OCIDatalabelingserviceDatasetLabels',
'Update-OCIDatalabelingserviceDataset'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Datalabelingservice'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/3742.ps1 | 3742.ps1 |
param(
[Parameter(Mandatory=$true, Position=0)]
[string] $TestRunNameSpace,
[Parameter(Mandatory=$false, Position=1)]
[ValidateSet('ControlPlane','DataPlane', 'All')]
[string] $TestMode = 'All',
[Parameter(Mandatory=$false, Position=2)]
[string] $Location = 'eastus2',
[Parameter(Mandatory=$false, Position=3)]
[string] $Vault = "",
[Parameter(Mandatory=$false, Position=4)]
[string] $ResourceGroup = "",
[Parameter(Mandatory=$false, Position=5)]
[bool] $StandardVaultOnly = $false,
[Parameter(Mandatory=$false, Position=6)]
[bool] $SoftDeleteEnabled = $false,
[Parameter(Mandatory=$false, Position=7)]
[Guid] $UserObjectId,
[Parameter(Mandatory=$false, Position=8)]
[Nullable[bool]] $NoADCmdLetMode = $null,
[Parameter(Mandatory=$false, Position=9)]
[string] $StorageResourceId = $null
)
. (Join-Path $PSScriptRoot "..\..\..\..\Common\Commands.ScenarioTests.Common\Common.ps1")
. (Join-Path $PSScriptRoot "..\..\..\..\Common\Commands.ScenarioTests.Common\Assert.ps1")
. (Join-Path $PSScriptRoot "Common.ps1")
. (Join-Path $PSScriptRoot "VaultKeyTests.ps1")
. (Join-Path $PSScriptRoot "VaultSecretTests.ps1")
. (Join-Path $PSScriptRoot "VaultCertificateTests.ps1");
. (Join-Path $PSScriptRoot "VaultManagedStorageAccountTests.ps1");
. (Join-Path $PSScriptRoot "VaultManagementTests.ps1")
. (Join-Path $PSScriptRoot "ControlPlane\KeyVaultManagementTests.ps1")
. (Join-Path $PSScriptRoot "ControlPlane\Common.ps1")
$global:totalCount = 0
$global:passedCount = 0
$global:passedTests = @()
$global:failedTests = @()
$global:times = @{}
$global:testEnv = 'PROD'
$global:testns = $TestRunNameSpace
$global:location = $Location
$global:testVault = $Vault
$global:resourceGroupName = $ResourceGroup
$global:standardVaultOnly = $StandardVaultOnly
$global:softDeleteEnabled = $SoftDeleteEnabled
$global:objectId = $UserObjectId
$global:noADCmdLetMode = $NoADCmdLetMode
$global:storageResourceId = $StorageResourceId
if (-not $global:objectId)
{
$upn = (Get-AzContext).Account.Id
$user = Get-AzADUser -UserPrincipalName $upn
if ($user -eq $null)
{
$user = Get-AzADUser -Mail $upn
}
Assert-NotNull $user
$global:objectId = $user.Id
}
if ($global:noADCmdLetMode -eq $null)
{
if ((Get-AzContext).Environment.AzureKeyVaultDnsSuffix -eq 'vault.usgovcloudapi.net')
{
$global:noADCmdLetMode = $true
}
else
{
$global:noADCmdLetMode = $false
}
}
function Run-TestProtected
{
param(
[ScriptBlock] $script,
[string] $testName
)
$testStart = Get-Date
try
{
Write-Host -ForegroundColor Green "====================================="
Write-Host -ForegroundColor Green "Running test $testName"
Write-Host -ForegroundColor Green "====================================="
Write-Host
&$script
$global:passedCount = $global:passedCount + 1
Write-Host
Write-Host -ForegroundColor Green "====================================="
Write-Host -ForegroundColor Green "Test Passed"
Write-Host -ForegroundColor Green "====================================="
Write-Host
$global:passedTests += $testName
}
catch
{
Out-String -InputObject $_.Exception | Write-Host -ForegroundColor Red
Write-Host
Write-Host -ForegroundColor Red "====================================="
Write-Host -ForegroundColor Red "Test Failed"
Write-Host -ForegroundColor Red "====================================="
Write-Host
$global:failedTests += $testName
}
finally
{
$testEnd = Get-Date
$testElapsed = $testEnd - $testStart
$global:times[$testName] = $testElapsed
$global:totalCount = $global:totalCount + 1
}
}
function Run-AllControlPlaneTests
{
Write-Host "Starting the control plane tests..."
if ($global:standardVaultOnly -eq $false)
{
Run-TestProtected { Run-VaultTest { Test_CreateNewPremiumVaultEnabledForDeployment } "Test_CreateNewPremiumVaultEnabledForDeployment" } "Test_CreateNewPremiumVaultEnabledForDeployment"
}
Run-TestProtected { Run-VaultTest { Test_CreateNewVault } "Test_CreateNewVault" } "Test_CreateNewVault"
Run-TestProtected { Run-VaultTest { Test_RecreateVaultFails } "Test_RecreateVaultFails" } "Test_RecreateVaultFails"
Run-TestProtected { Run-VaultTest { Test_CreateVaultInUnknownResGrpFails } "Test_CreateVaultInUnknownResGrpFails" } "Test_CreateVaultInUnknownResGrpFails"
Run-TestProtected { Run-VaultTest { Test_CreateVaultPositionalParams } "Test_CreateVaultPositionalParams" } "Test_CreateVaultPositionalParams"
Run-TestProtected { Run-VaultTest { Test_CreateNewStandardVaultEnableSoftDelete } "Test_CreateNewStandardVaultEnableSoftDelete" } "Test_CreateNewStandardVaultEnableSoftDelete"
Run-TestProtected { Run-VaultTest { Test_RecoverDeletedVault } "Test_RecoverDeletedVault" } "Test_RecoverDeletedVault"
Run-TestProtected { Run-VaultTest { Test_GetNoneexistingDeletedVault } "Test_GetNoneexistingDeletedVault" } "Test_GetNoneexistingDeletedVault"
Run-TestProtected { Run-VaultTest { Test_PurgeDeletedVault } "Test_PurgeDeletedVault" } "Test_PurgeDeletedVault"
Run-TestProtected { Run-VaultTest { Test_GetVaultByNameAndResourceGroup } "Test_GetVaultByNameAndResourceGroup" } "Test_GetVaultByNameAndResourceGroup"
Run-TestProtected { Run-VaultTest { Test_GetVaultByNameAndResourceGroupPositionalParams } "Test_GetVaultByNameAndResourceGroupPositionalParams" } "Test_GetVaultByNameAndResourceGroupPositionalParams"
Run-TestProtected { Run-VaultTest { Test_GetVaultByName } "Test_GetVaultByName" } "Test_GetVaultByName"
Run-TestProtected { Run-VaultTest { Test_GetUnknownVaultFails } "Test_GetUnknownVaultFails" } "Test_GetUnknownVaultFails"
Run-TestProtected { Run-VaultTest { Test_GetVaultFromUnknownResourceGroupFails } "Test_GetVaultFromUnknownResourceGroupFails" } "Test_GetVaultFromUnknownResourceGroupFails"
Run-TestProtected { Run-VaultTest { Test_ListVaultsByResourceGroup } "Test_ListVaultsByResourceGroup" } "Test_ListVaultsByResourceGroup"
Run-TestProtected { Run-VaultTest { Test_ListAllVaultsInSubscription } "Test_ListAllVaultsInSubscription" } "Test_ListAllVaultsInSubscription"
Run-TestProtected { Run-VaultTest { Test_ListVaultsByTag } "Test_ListVaultsByTag" } "Test_ListVaultsByTag"
Run-TestProtected { Run-VaultTest { Test_ListVaultsByUnknownResourceGroupFails } "Test_ListVaultsByUnknownResourceGroupFails" } "Test_ListVaultsByUnknownResourceGroupFails"
Run-TestProtected { Run-VaultTest { Test_DeleteVaultByName } "Test_DeleteVaultByName" } "Test_DeleteVaultByName"
Run-TestProtected { Run-VaultTest { Test_DeleteUnknownVaultFails } "Test_DeleteUnknownVaultFails" } "Test_DeleteUnknownVaultFails"
Run-TestProtected { Run-VaultTest { Test_SetRemoveAccessPolicyByUPN } "Test_SetRemoveAccessPolicyByUPN" } "Test_SetRemoveAccessPolicyByUPN"
Run-TestProtected { Run-VaultTest { Test_SetRemoveAccessPolicyByEmailAddress } "Test_SetRemoveAccessPolicyByEmailAddress" } "Test_SetRemoveAccessPolicyByEmailAddress"
Run-TestProtected { Run-VaultTest { Test_SetRemoveAccessPolicyBySPN } "Test_SetRemoveAccessPolicyBySPN" } "Test_SetRemoveAccessPolicyBySPN"
Run-TestProtected { Run-VaultTest { Test_SetRemoveAccessPolicyByObjectId } "Test_SetRemoveAccessPolicyByObjectId" } "Test_SetRemoveAccessPolicyByObjectId"
Run-TestProtected { Run-VaultTest { Test_SetRemoveAccessPolicyByBypassObjectIdValidation } "Test_SetRemoveAccessPolicyByBypassObjectIdValidation" } "Test_SetRemoveAccessPolicyByBypassObjectIdValidation"
Run-TestProtected { Run-VaultTest { Test_SetRemoveAccessPolicyByCompoundId } "Test_SetRemoveAccessPolicyByCompoundId" } "Test_SetRemoveAccessPolicyByCompoundId"
Run-TestProtected { Run-VaultTest { Test_RemoveAccessPolicyWithCompoundIdPolicies } "Test_RemoveAccessPolicyWithCompoundIdPolicies" } "Test_RemoveAccessPolicyWithCompoundIdPolicies"
Run-TestProtected { Run-VaultTest { Test_SetCompoundIdAccessPolicy } "Test_SetCompoundIdAccessPolicy" } "Test_SetCompoundIdAccessPolicy"
Run-TestProtected { Run-VaultTest { Test_ModifyAccessPolicy } "Test_ModifyAccessPolicy" } "Test_ModifyAccessPolicy"
Run-TestProtected { Run-VaultTest { Test_ModifyAccessPolicyEnabledForDeployment } "Test_ModifyAccessPolicyEnabledForDeployment" } "Test_ModifyAccessPolicyEnabledForDeployment"
Run-TestProtected { Run-VaultTest { Test_ModifyAccessPolicyNegativeCases } "Test_ModifyAccessPolicyNegativeCases" } "Test_ModifyAccessPolicyNegativeCases"
Run-TestProtected { Run-VaultTest { Test_RemoveNonExistentAccessPolicyDoesNotThrow } "Test_RemoveNonExistentAccessPolicyDoesNotThrow" } "Test_RemoveNonExistentAccessPolicyDoesNotThrow"
Run-TestProtected { Run-VaultTest { Test_AllPermissionExpansion } "Test_AllPermissionExpansion" } "Test_AllPermissionExpansion"
Run-TestProtected { Run-VaultTest { Test_CreateDeleteVaultWithPiping } "Test_CreateDeleteVaultWithPiping" } "Test_CreateDeleteVaultWithPiping"
}
function Run-AllDataPlaneTests
{
Write-Host "Starting the data plane tests..."
if($global:softDeleteEnabled -eq $true)
{
Run-TestProtected { Run-KeyTest {Test_GetDeletedKey} "Test_GetDeletedKey" } "Test_GetDeletedKey"
Run-TestProtected { Run-KeyTest {Test_GetDeletedKeys} "Test_GetDeletedKeys" } "Test_GetDeletedKeys"
Run-TestProtected { Run-KeyTest {Test_UndoRemoveKey} "Test_UndoRemoveKey" } "Test_UndoRemoveKey"
Run-TestProtected { Run-KeyTest {Test_RemoveDeletedKey} "Test_RemoveDeletedKey" } "Test_RemoveDeletedKey"
Run-TestProtected { Run-KeyTest {Test_RemoveNonExistDeletedKey} "Test_RemoveNonExistDeletedKey" } "Test_RemoveNonExistDeletedKey"
Run-TestProtected { Run-KeyTest {Test_PipelineRemoveDeletedKeys} "Test_PipelineRemoveDeletedKeys" } "Test_PipelineRemoveDeletedKeys"
Run-TestProtected { Run-KeyTest {Test_GetDeletedKey} "Test_GetDeletedSecret" } "Test_GetDeletedSecret"
Run-TestProtected { Run-KeyTest {Test_GetDeletedKeys} "Test_GetDeletedSecrets" } "Test_GetDeletedSecrets"
Run-TestProtected { Run-KeyTest {Test_UndoRemoveSecret} "Test_UndoRemoveSecret" } "Test_UndoRemoveSecret"
Run-TestProtected { Run-KeyTest {Test_RemoveDeletedSecret} "Test_RemoveDeletedSecret" } "Test_RemoveDeletedSecret"
Run-TestProtected { Run-KeyTest {Test_RemoveNonExistDeletedSecret} "Test_RemoveNonExistDeletedSecret" } "Test_RemoveNonExistDeletedSecret"
Run-TestProtected { Run-KeyTest {Test_PipelineRemoveDeletedSecrets} "Test_PipelineRemoveDeletedSecrets" } "Test_PipelineRemoveDeletedSecrets"
Run-TestProtected { Run-KeyTest {Test_GetDeletedCertificate} "Test_GetDeletedCertificate" } "Test_GetDeletedCertificate"
Run-TestProtected { Run-KeyTest {Test_GetDeletedCertificates} "Test_GetDeletedCertificates" } "Test_GetDeletedCertificates"
Run-TestProtected { Run-KeyTest {Test_UndoRemoveCertificate} "Test_UndoRemoveCertificate" } "Test_UndoRemoveCertificate"
Run-TestProtected { Run-KeyTest {Test_RemoveDeletedCertificate} "Test_RemoveDeletedCertificate" } "Test_RemoveDeletedCertificate"
Run-TestProtected { Run-KeyTest {Test_RemoveNonExistDeletedCertificate} "Test_RemoveNonExistDeletedCertificate" } "Test_RemoveNonExistDeletedCertificate"
Run-TestProtected { Run-KeyTest {Test_PipelineRemoveDeletedCertificates} "Test_PipelineRemoveDeletedCertificate" } "Test_PipelineRemoveDeletedCertificates"
}
Run-TestProtected { Run-KeyTest {Test_CreateSoftwareKeyWithDefaultAttributes} "Test_CreateSoftwareKeyWithDefaultAttributes" } "Test_CreateSoftwareKeyWithDefaultAttributes"
Run-TestProtected { Run-KeyTest {Test_CreateSoftwareKeyWithCustomAttributes} "Test_CreateSoftwareKeyWithCustomAttributes" } "Test_CreateSoftwareKeyWithCustomAttributes"
if (-not $global:standardVaultOnly)
{
Run-TestProtected { Run-KeyTest {Test_CreateHsmKeyWithDefaultAttributes} "Test_CreateHsmKeyWithDefaultAttributes" } "Test_CreateHsmKeyWithDefaultAttributes"
Run-TestProtected { Run-KeyTest {Test_CreateHsmKeyWithCustomAttributes} "Test_CreateHsmKeyWithCustomAttributes" } "Test_CreateHsmKeyWithCustomAttributes"
Run-TestProtected { Run-KeyTest {Test_ImportPfxAsHsmWithDefaultAttributes} "Test_ImportPfxAsHsmWithDefaultAttributes" } "Test_ImportPfxAsHsmWithDefaultAttributes"
Run-TestProtected { Run-KeyTest {Test_ImportPfxAsHsmWithCustomAttributes} "Test_ImportPfxAsHsmWithCustomAttributes" } "Test_ImportPfxAsHsmWithCustomAttributes"
$byokSubscriptionId = "c2619f08-57f7-492b-a9c3-45dee233805b"
if ((Get-AzContext).Subscription.SubscriptionId -eq "c2619f08-57f7-492b-a9c3-45dee233805b")
{
Run-TestProtected { Run-KeyTest {Test_ImportByokWithDefaultAttributes} "Test_ImportByokWithDefaultAttributes" } "Test_ImportByokWithDefaultAttributes"
Run-TestProtected { Run-KeyTest {Test_ImportByokWith1024BitKey} "Test_ImportByokWith1024BitKey" } "Test_ImportByokWith1024BitKey"
Run-TestProtected { Run-KeyTest {Test_ImportByokWithCustomAttributes} "Test_ImportByokWithCustomAttributes" } "Test_ImportByokWithCustomAttributes"
}
}
Run-TestProtected { Run-KeyTest {Test_ImportPfxWithDefaultAttributes} "Test_ImportPfxWithDefaultAttributes" } "Test_ImportPfxWithDefaultAttributes"
Run-TestProtected { Run-KeyTest {Test_ImportPfxWith1024BitKey} "Test_ImportPfxWith1024BitKey" } "Test_ImportPfxWith1024BitKey"
Run-TestProtected { Run-KeyTest {Test_ImportPfxWithCustomAttributes} "Test_ImportPfxWithCustomAttributes" } "Test_ImportPfxWithCustomAttributes"
Run-TestProtected { Run-KeyTest {Test_AddKeyPositionalParameter} "Test_AddKeyPositionalParameter" } "Test_AddKeyPositionalParameter"
Run-TestProtected { Run-KeyTest {Test_AddKeyAliasParameter} "Test_AddKeyAliasParameter" } "Test_AddKeyAliasParameter"
Run-TestProtected { Run-KeyTest {Test_ImportNonExistPfxFile} "Test_ImportNonExistPfxFile" } "Test_ImportNonExistPfxFile"
Run-TestProtected { Run-KeyTest {Test_ImportPfxFileWithIncorrectPassword} "Test_ImportPfxFileWithIncorrectPassword" } "Test_ImportPfxFileWithIncorrectPassword"
Run-TestProtected { Run-KeyTest {Test_ImportNonExistByokFile} "Test_ImportNonExistByokFile" } "Test_ImportNonExistByokFile"
Run-TestProtected { Run-KeyTest {Test_CreateKeyInNonExistVault} "Test_CreateKeyInNonExistVault" } "Test_CreateKeyInNonExistVault"
Run-TestProtected { Run-KeyTest {Test_ImportByokAsSoftwareKey} "Test_ImportByokAsSoftwareKey" } "Test_ImportByokAsSoftwareKey"
Run-TestProtected { Run-KeyTest {Test_CreateKeyInNoPermissionVault} "Test_CreateKeyInNoPermissionVault" } "Test_CreateKeyInNoPermissionVault"
Run-TestProtected { Run-KeyTest {Test_UpdateIndividualKeyAttributes} "Test_UpdateIndividualKeyAttributes" } "Test_UpdateIndividualKeyAttributes"
Run-TestProtected { Run-KeyTest {Test_UpdateAllEditableKeyAttributes} "Test_UpdateAllEditableKeyAttributes" } "Test_UpdateAllEditableKeyAttributes"
Run-TestProtected { Run-KeyTest {Test_UpdateKeyWithNoChange} "Test_UpdateKeyWithNoChange" } "Test_UpdateKeyWithNoChange"
Run-TestProtected { Run-KeyTest {Test_SetKeyPositionalParameter} "Test_SetKeyPositionalParameter" } "Test_SetKeyPositionalParameter"
Run-TestProtected { Run-KeyTest {Test_SetKeyAliasParameter} "Test_SetKeyAliasParameter" } "Test_SetKeyAliasParameter"
Run-TestProtected { Run-KeyTest {Test_SetKeyVersion} "Test_SetKeyVersion" } "Test_SetKeyVersion"
Run-TestProtected { Run-KeyTest {Test_SetKeyInNonExistVault} "Test_SetKeyInNonExistVault" } "Test_SetKeyInNonExistVault"
Run-TestProtected { Run-KeyTest {Test_SetNonExistKey} "Test_SetNonExistKey" } "Test_SetNonExistKey"
Run-TestProtected { Run-KeyTest {Test_SetInvalidKeyAttributes} "Test_SetInvalidKeyAttributes" } "Test_SetInvalidKeyAttributes"
Run-TestProtected { Run-KeyTest {Test_SetKeyInNoPermissionVault} "Test_SetKeyInNoPermissionVault" } "Test_SetKeyInNoPermissionVault"
Run-TestProtected { Run-KeyTest {Test_GetOneKey} "Test_GetOneKey" } "Test_GetOneKey"
Run-TestProtected { Run-KeyTest {Test_GetPreviousVersionOfKey} "Test_GetPreviousVersionOfKey" } "Test_GetPreviousVersionOfKey"
Run-TestProtected { Run-KeyTest {Test_GetKeyPositionalParameter} "Test_GetKeyPositionalParameter" } "Test_GetKeyPositionalParameter"
Run-TestProtected { Run-KeyTest {Test_GetKeyAliasParameter} "Test_GetKeyAliasParameter" } "Test_GetKeyAliasParameter"
Run-TestProtected { Run-KeyTest {Test_GetKeysInNonExistVault} "Test_GetKeysInNonExistVault" } "Test_GetKeysInNonExistVault"
Run-TestProtected { Run-KeyTest {Test_GetNonExistKey} "Test_GetNonExistKey" } "Test_GetNonExistKey"
Run-TestProtected { Run-KeyTest {Test_GetKeyInNoPermissionVault} "Test_GetKeyInNoPermissionVault" } "Test_GetKeyInNoPermissionVault"
Run-TestProtected { Run-KeyTest {Test_GetAllKeys} "Test_GetAllKeys" } "Test_GetAllKeys"
Run-TestProtected { Run-KeyTest {Test_GetKeyVersions} "Test_GetKeyVersions" } "Test_GetKeyVersions"
Run-TestProtected { Run-KeyTest {Test_RemoveKeyWithoutPrompt} "Test_RemoveKeyWithoutPrompt" } "Test_RemoveKeyWithoutPrompt"
Run-TestProtected { Run-KeyTest {Test_RemoveKeyWhatIf} "Test_RemoveKeyWhatIf" } "Test_RemoveKeyWhatIf"
Run-TestProtected { Run-KeyTest {Test_RemoveKeyPositionalParameter} "Test_RemoveKeyPositionalParameter" } "Test_RemoveKeyPositionalParameter"
Run-TestProtected { Run-KeyTest {Test_RemoveKeyAliasParameter} "Test_RemoveKeyAliasParameter" } "Test_RemoveKeyAliasParameter"
Run-TestProtected { Run-KeyTest {Test_RemoveKeyInNonExistVault} "Test_RemoveKeyInNonExistVault" } "Test_RemoveKeyInNonExistVault"
Run-TestProtected { Run-KeyTest {Test_RemoveNonExistKey} "Test_RemoveNonExistKey" } "Test_RemoveNonExistKey"
Run-TestProtected { Run-KeyTest {Test_RemoveKeyInNoPermissionVault} "Test_RemoveKeyInNoPermissionVault" } "Test_RemoveKeyInNoPermissionVault"
Run-TestProtected { Run-KeyTest {Test_BackupRestoreKeyByName} "Test_BackupRestoreKeyByName" } "Test_BackupRestoreKeyByName"
Run-TestProtected { Run-KeyTest {Test_BackupRestoreKeyByRef} "Test_BackupRestoreKeyByRef" } "Test_BackupRestoreKeyByRef"
Run-TestProtected { Run-KeyTest {Test_BackupNonExistingKey} "Test_BackupNonExistingKey" } "Test_BackupNonExistingKey"
Run-TestProtected { Run-KeyTest {Test_BackupKeyToANamedFile} "Test_BackupKeyToANamedFile" } "Test_BackupKeyToANamedFile"
Run-TestProtected { Run-KeyTest {Test_BackupKeyToExistingFile} "Test_BackupKeyToExistingFile" } "Test_BackupKeyToExistingFile"
Run-TestProtected { Run-KeyTest {Test_RestoreKeyFromNonExistingFile} "Test_RestoreKeyFromNonExistingFile" } "Test_RestoreKeyFromNonExistingFile"
Run-TestProtected { Run-KeyTest {Test_PipelineUpdateKeys} "Test_PipelineUpdateKeys" } "Test_PipelineUpdateKeys"
Run-TestProtected { Run-KeyTest {Test_PipelineRemoveKeys} "Test_PipelineRemoveKeys" } "Test_PipelineRemoveKeys"
Run-TestProtected { Run-KeyTest {Test_PipelineUpdateKeyVersions} "Test_PipelineUpdateKeyVersions" } "Test_PipelineUpdateKeyVersions"
Run-TestProtected { Run-SecretTest {Test_CreateSecret} "Test_CreateSecret" } "Test_CreateSecret"
Run-TestProtected { Run-SecretTest {Test_CreateSecretWithCustomAttributes} "Test_CreateSecretWithCustomAttributes" } "Test_CreateSecretWithCustomAttributes"
Run-TestProtected { Run-SecretTest {Test_UpdateSecret} "Test_UpdateSecret" } "Test_UpdateSecret"
Run-TestProtected { Run-SecretTest {Test_SetSecretPositionalParameter} "Test_SetSecretPositionalParameter" } "Test_SetSecretPositionalParameter"
Run-TestProtected { Run-SecretTest {Test_SetSecretAliasParameter} "Test_SetSecretAliasParameter" } "Test_SetSecretAliasParameter"
Run-TestProtected { Run-SecretTest {Test_SetSecretInNonExistVault} "Test_SetSecretInNonExistVault" } "Test_SetSecretInNonExistVault"
Run-TestProtected { Run-SecretTest {Test_SetSecretInNoPermissionVault} "Test_SetSecretInNoPermissionVault" } "Test_SetSecretInNoPermissionVault"
Run-TestProtected { Run-SecretTest {Test_UpdateIndividualSecretAttributes} "Test_UpdateIndividualSecretAttributes" } "Test_UpdateIndividualSecretAttributes"
Run-TestProtected { Run-SecretTest {Test_UpdateSecretWithNoChange} "Test_UpdateSecretWithNoChange" } "Test_UpdateSecretWithNoChange"
Run-TestProtected { Run-SecretTest {Test_UpdateAllEditableSecretAttributes} "Test_UpdateAllEditableSecretAttributes" } "Test_UpdateAllEditableSecretAttributes"
Run-TestProtected { Run-SecretTest {Test_SetSecretAttributePositionalParameter} "Test_SetSecretAttributePositionalParameter" } "Test_SetSecretAttributePositionalParameter"
Run-TestProtected { Run-SecretTest {Test_SetSecretAttributeAliasParameter} "Test_SetSecretAttributeAliasParameter" } "Test_SetSecretAttributeAliasParameter"
Run-TestProtected { Run-SecretTest {Test_SetSecretVersion} "Test_SetSecretVersion" } "Test_SetSecretVersion"
Run-TestProtected { Run-SecretTest {Test_SetSecretInNonExistVault} "Test_SetSecretInNonExistVault" } "Test_SetSecretInNonExistVault"
Run-TestProtected { Run-SecretTest {Test_SetNonExistSecret} "Test_SetNonExistSecret" } "Test_SetNonExistSecret"
Run-TestProtected { Run-SecretTest {Test_SetInvalidSecretAttributes} "Test_SetInvalidSecretAttributes" } "Test_SetInvalidSecretAttributes"
Run-TestProtected { Run-SecretTest {Test_SetSecretAttrInNoPermissionVault} "Test_SetSecretAttrInNoPermissionVault" } "Test_SetSecretAttrInNoPermissionVault"
Run-TestProtected { Run-SecretTest {Test_GetOneSecret} "Test_GetOneSecret" } "Test_GetOneSecret"
Run-TestProtected { Run-SecretTest {Test_GetAllSecrets} "Test_GetAllSecrets" } "Test_GetAllSecrets"
Run-TestProtected { Run-SecretTest {Test_GetPreviousVersionOfSecret} "Test_GetPreviousVersionOfSecret" } "Test_GetPreviousVersionOfSecret"
Run-TestProtected { Run-SecretTest {Test_GetSecretVersions} "Test_GetSecretVersions" } "Test_GetSecretVersions"
Run-TestProtected { Run-SecretTest {Test_GetSecretPositionalParameter} "Test_GetSecretPositionalParameter" } "Test_GetSecretPositionalParameter"
Run-TestProtected { Run-SecretTest {Test_GetSecretAliasParameter} "Test_GetSecretAliasParameter" } "Test_GetSecretAliasParameter"
Run-TestProtected { Run-SecretTest {Test_GetSecretInNonExistVault} "Test_GetSecretInNonExistVault" } "Test_GetSecretInNonExistVault"
Run-TestProtected { Run-SecretTest {Test_GetNonExistSecret} "Test_GetNonExistSecret" } "Test_GetNonExistSecret"
Run-TestProtected { Run-SecretTest {Test_GetSecretInNoPermissionVault} "Test_GetSecretInNoPermissionVault" } "Test_GetSecretInNoPermissionVault"
Run-TestProtected { Run-SecretTest {Test_RemoveSecretWithoutPrompt} "Test_RemoveSecretWithoutPrompt" } "Test_RemoveSecretWithoutPrompt"
Run-TestProtected { Run-SecretTest {Test_RemoveSecretWhatIf} "Test_RemoveSecretWhatIf" } "Test_RemoveSecretWhatIf"
Run-TestProtected { Run-SecretTest {Test_RemoveSecretPositionalParameter} "Test_RemoveSecretPositionalParameter" } "Test_RemoveSecretPositionalParameter"
Run-TestProtected { Run-SecretTest {Test_RemoveSecretAliasParameter} "Test_RemoveSecretAliasParameter" } "Test_RemoveSecretAliasParameter"
Run-TestProtected { Run-SecretTest {Test_RemoveSecretInNonExistVault} "Test_RemoveSecretInNonExistVault" } "Test_RemoveSecretInNonExistVault"
Run-TestProtected { Run-SecretTest {Test_RemoveNonExistSecret} "Test_RemoveNonExistSecret" } "Test_RemoveNonExistSecret"
Run-TestProtected { Run-SecretTest {Test_RemoveSecretInNoPermissionVault} "Test_RemoveSecretInNoPermissionVault" } "Test_RemoveSecretInNoPermissionVault"
Run-TestProtected { Run-SecretTest {Test_BackupRestoreSecretByName} "Test_BackupRestoreSecretByName" } "Test_BackupRestoreSecretByName"
Run-TestProtected { Run-SecretTest {Test_BackupRestoreSecretByRef} "Test_BackupRestoreSecretByRef" } "Test_BackupRestoreSecretByRef"
Run-TestProtected { Run-SecretTest {Test_BackupNonExistingSecret} "Test_BackupNonExistingSecret" } "Test_BackupNonExistingSecret"
Run-TestProtected { Run-SecretTest {Test_BackupSecretToANamedFile} "Test_BackupSecretToANamedFile" } "Test_BackupSecretToANamedFile"
Run-TestProtected { Run-SecretTest {Test_BackupSecretToExistingFile} "Test_BackupSecretToExistingFile" } "Test_BackupSecretToExistingFile"
Run-TestProtected { Run-SecretTest {Test_RestoreSecretFromNonExistingFile} "Test_RestoreSecretFromNonExistingFile" } "Test_RestoreSecretFromNonExistingFile"
Run-TestProtected { Run-SecretTest {Test_PipelineUpdateSecrets} "Test_PipelineUpdateSecrets" } "Test_PipelineUpdateSecrets"
Run-TestProtected { Run-SecretTest {Test_PipelineUpdateSecretAttributes} "Test_PipelineUpdateSecretAttributes" } "Test_PipelineUpdateSecretAttributes"
Run-TestProtected { Run-SecretTest {Test_PipelineUpdateSecretVersions} "Test_PipelineUpdateSecretVersions" } "Test_PipelineUpdateSecretVersions"
Run-TestProtected { Run-SecretTest {Test_PipelineRemoveSecrets} "Test_PipelineRemoveSecrets" } "Test_PipelineRemoveSecrets"
Run-TestProtected { Run-CertificateTest {Test_ImportPfxAsCertificate} "Test_ImportPfxAsCertificate" } "Test_ImportPfxAsCertificate"
Run-TestProtected { Run-CertificateTest {Test_ImportPfxAsCertificateNonSecurePassword} "Test_ImportPfxAsCertificateNonSecurePassword" } "Test_ImportPfxAsCertificateNonSecurePassword"
Run-TestProtected { Run-CertificateTest {Test_ImportPfxAsCertificateWithoutPassword} "Test_ImportPfxAsCertificateWithoutPassword" } "Test_ImportPfxAsCertificateWithoutPassword"
Run-TestProtected { Run-CertificateTest {Test_ImportX509Certificate2CollectionAsCertificate} "Test_ImportX509Certificate2CollectionAsCertificate" } "Test_ImportX509Certificate2CollectionAsCertificate"
Run-TestProtected { Run-CertificateTest {Test_ImportX509Certificate2CollectionNotExportableAsCertificate} "Test_ImportX509Certificate2CollectionNotExportableAsCertificate" } "Test_ImportX509Certificate2CollectionNotExportableAsCertificate"
Run-TestProtected { Run-CertificateTest {Test_ImportBase64EncodedStringAsCertificate} "Test_ImportBase64EncodedStringAsCertificate" } "Test_ImportBase64EncodedStringAsCertificate"
Run-TestProtected { Run-CertificateTest {Test_ImportBase64EncodedStringWithoutPasswordAsCertificate} "Test_ImportBase64EncodedStringWithoutPasswordAsCertificate" } "Test_ImportBase64EncodedStringWithoutPasswordAsCertificate"
Run-TestProtected { Run-CertificateTest {Test_MergeCerWithNonExistantKeyPair} "Test_MergeCerWithNonExistantKeyPair" } "Test_MergeCerWithNonExistantKeyPair"
Run-TestProtected { Run-CertificateTest {Test_MergeCerWithMismatchKeyPair} "Test_MergeCerWithMismatchKeyPair" } "Test_MergeCerWithMismatchKeyPair"
Run-TestProtected { Run-CertificateTest {Test_GetCertificate} "Test_GetCertificate" } "Test_GetCertificate"
Run-TestProtected { Run-CertificateTest {Test_GetCertificateNonExistant} "Test_GetCertificateNonExistant" } "Test_GetCertificateNonExistant"
Run-TestProtected { Run-CertificateTest {Test_ListCertificates} "Test_ListCertificates" } "Test_ListCertificates"
Run-TestProtected { Run-CertificateTest {Test_AddAndGetCertificateContacts} "Test_AddAndGetCertificateContacts" } "Test_AddAndGetCertificateContacts"
Run-TestProtected { Run-CertificateTest {Test_GetNonExistingCertificatePolicy} "Test_GetNonExistingCertificatePolicy" } "Test_GetNonExistingCertificatePolicy"
Run-TestProtected { Run-CertificateTest {Test_NewCertificatePolicy} "Test_NewCertificatePolicy" } "Test_NewCertificatePolicy"
Run-TestProtected { Run-CertificateTest {Test_SetCertificatePolicy} "Test_SetCertificatePolicy" } "Test_SetCertificatePolicy"
Run-TestProtected { Run-CertificateTest {Test_NewOrganizationDetails} "Test_NewOrganizationDetails" } "Test_NewOrganizationDetails"
Run-TestProtected { Run-CertificateTest {Test_CreateAndGetTestIssuer} "Test_CreateAndGetTestIssuer" } "Test_CreateAndGetTestIssuer"
Run-TestProtected { Run-CertificateTest {Test_Add_AzureKeyVaultCertificate} "Test_Add_AzureKeyVaultCertificate" } "Test_Add_AzureKeyVaultCertificate"
Run-TestProtected { Run-CertificateTest {Test_CertificateTags} "Test_CertificateTags" } "Test_CertificateTags"
Run-TestProtected { Run-CertificateTest {Test_UpdateCertificateTags} "Test_UpdateCertificateTags" } "Test_UpdateCertificateTags"
Run-TestProtected { Run-ManagedStorageAccountTest {Test_SetAzureKeyVaultManagedStorageAccountAndRawSasDefinition} "Test_SetAzureKeyVaultManagedStorageAccountAndRawSasDefinition" } "Test_SetAzureKeyVaultManagedStorageAccountAndRawSasDefinition"
Run-TestProtected { Run-ManagedStorageAccountTest {Test_SetAzureKeyVaultManagedStorageAccountAndBlobSasDefinition} "Test_SetAzureKeyVaultManagedStorageAccountAndBlobSasDefinition" } "Test_SetAzureKeyVaultManagedStorageAccountAndBlobSasDefinition"
Run-TestProtected { Run-ManagedStorageAccountTest {Test_SetAzureKeyVaultManagedStorageAccountAndBlobStoredPolicySasDefinition} "Test_SetAzureKeyVaultManagedStorageAccountAndBlobStoredPolicySasDefinition" } "Test_SetAzureKeyVaultManagedStorageAccountAndBlobStoredPolicySasDefinition"
Run-TestProtected { Run-ManagedStorageAccountTest {Test_SetAzureKeyVaultManagedStorageAccountAndContainerSasDefinition} "Test_SetAzureKeyVaultManagedStorageAccountAndContainerSasDefinition" } "Test_SetAzureKeyVaultManagedStorageAccountAndContainerSasDefinition"
Run-TestProtected { Run-ManagedStorageAccountTest {Test_SetAzureKeyVaultManagedStorageAccountAndShareSasDefinition} "Test_SetAzureKeyVaultManagedStorageAccountAndShareSasDefinition" } "Test_SetAzureKeyVaultManagedStorageAccountAndShareSasDefinition"
Run-TestProtected { Run-ManagedStorageAccountTest {Test_SetAzureKeyVaultManagedStorageAccountAndFileSasDefinition} "Test_SetAzureKeyVaultManagedStorageAccountAndFileSasDefinition" } "Test_SetAzureKeyVaultManagedStorageAccountAndFileSasDefinition"
Run-TestProtected { Run-ManagedStorageAccountTest {Test_SetAzureKeyVaultManagedStorageAccountAndQueueSasDefinition} "Test_SetAzureKeyVaultManagedStorageAccountAndQueueSasDefinition" } "Test_SetAzureKeyVaultManagedStorageAccountAndQueueSasDefinition"
Run-TestProtected { Run-ManagedStorageAccountTest {Test_SetAzureKeyVaultManagedStorageAccountAndTableSasDefinition} "Test_SetAzureKeyVaultManagedStorageAccountAndTableSasDefinition" } "Test_SetAzureKeyVaultManagedStorageAccountAndTableSasDefinition"
Run-TestProtected { Run-ManagedStorageAccountTest {Test_SetAzureKeyVaultManagedStorageAccountAndAccountSasDefinition} "Test_SetAzureKeyVaultManagedStorageAccountAndAccountSasDefinition" } "Test_SetAzureKeyVaultManagedStorageAccountAndAccountSasDefinition"
Run-TestProtected { Run-ManagedStorageAccountTest {Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinitionPipeTest} "Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinitionPipeTest" } "Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinitionPipeTest"
Run-TestProtected { Run-ManagedStorageAccountTest {Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinitionAttribute} "Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinitionAttribute" } "Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinitionAttribute"
Run-TestProtected { Run-ManagedStorageAccountTest {Test_UpdateAzureKeyVaultManagedStorageAccount} "Test_UpdateAzureKeyVaultManagedStorageAccount" } "Test_UpdateAzureKeyVaultManagedStorageAccount"
Run-TestProtected { Run-ManagedStorageAccountTest {Test_RegenerateAzureKeyVaultManagedStorageAccountAndSasDefinition} "Test_RegenerateAzureKeyVaultManagedStorageAccountAndSasDefinition" } "Test_RegenerateAzureKeyVaultManagedStorageAccountAndSasDefinition"
Run-TestProtected { Run-ManagedStorageAccountTest {Test_ListKeyVaultAzureKeyVaultManagedStorageAccounts} "Test_ListKeyVaultAzureKeyVaultManagedStorageAccounts" } "Test_ListKeyVaultAzureKeyVaultManagedStorageAccounts"
}
Cleanup-LogFiles $PSScriptRoot
Initialize-TemporaryState
if (($Vault -ne "") -and (@('DataPlane', 'All') -contains $TestMode))
{
Cleanup-OldCertificates
Cleanup-OldManagedStorageAccounts
Cleanup-OldKeys
Cleanup-OldSecrets
}
Write-Host "Clean up and initialization completed."
$global:startTime = Get-Date
try
{
if (@('ControlPlane', 'All') -contains $TestMode)
{
$oldVaultResource = Get-VaultResource
try
{
Run-AllControlPlaneTests
}
finally
{
Restore-VaultResource $oldVaultResource
}
}
if (@('DataPlane', 'All') -contains $TestMode)
{
$oldVaultResource = Get-VaultResource
try
{
Run-AllDataPlaneTests
}
finally
{
Restore-VaultResource $oldVaultResource
}
}
}
finally
{
Cleanup-TemporaryState ($ResourceGroup -eq "") ($Vault -eq "")
}
$global:endTime = Get-Date
Write-FileReport
Write-ConsoleReport
Move-Log $PSScriptRoot |
combined_dataset/train/non-malicious/sample_12_66.ps1 | sample_12_66.ps1 | #
# Module manifest for module 'OCI.PSModules.Genericartifactscontent'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Genericartifactscontent.dll'
# Version number of this module.
ModuleVersion = '73.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'ae94c03a-b1fd-4547-8536-fbadc98c3ab2'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Genericartifactscontent Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Genericartifactscontent.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIGenericartifactscontentGenericArtifactContent',
'Get-OCIGenericartifactscontentGenericArtifactContentByPath',
'Write-OCIGenericartifactscontentGenericArtifactContentByPath'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Genericartifactscontent'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_28_73.ps1 | sample_28_73.ps1 | # Localized 05/07/2022 03:57 AM (GMT) 303:7.0.30723 AssignedAccessMsg.psd1
# Localized resources for AssignedAccess.psm1
ConvertFrom-StringData @'
###PSLOC
AppliedSettings=User and Application set, log on as this user to start Assigned Access
ClearedSettings=Cleared Assigned Access, settings reset to factory defaults
NoInstanceFound=No instances found
ErrorUserNotFound=User was not found. Enter a valid local account UserName or UserSID
ErrorAppNotFound=Application was not found. Enter either a valid AppName or AUMID
ErrorProvisionedAppNameUsed=The app couldn't be set for assigned access by name at this time, run the cmdlet again using the -AppUserModelId option
DeletingInstance=Deleting {0}
ErrorUserDoesNotExist=The assigned access user does not exist: {0}. Run Clear-AssignedAccess to clear assigned access.
ErrorAppDoesNotExist=The assigned access application does not exist: {0}. Run Clear-AssignedAccess to clear assigned access.
ErrorCurrentUserNotAllowed=The assigned access user cannot be set to the current logged in account.
ErrorConnectedUserNotAllowed=You can only set up assigned access for a local standard user account that does not have a Microsoft account associated with it.
ConfirmSet=Set assigned access application to {0}
ConfirmClear=Clear assigned access
ErrorInsufficientPrivilege=This script must be run with Administrator privileges.
###PSLOC
'@
|
combined_dataset/train/non-malicious/1387.ps1 | 1387.ps1 |
function Test-CScheduledTask
{
[CmdletBinding()]
[OutputType([bool])]
param(
[Parameter()]
[Alias('TaskName')]
[string]
$Name
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
$Name = Join-Path -Path '\' -ChildPath $Name
$task = Get-CScheduledTask -Name $Name -AsComObject -ErrorAction Ignore
if( $task )
{
return $true
}
else
{
return $false
}
}
|
combined_dataset/train/non-malicious/sample_65_71.ps1 | sample_65_71.ps1 | @{
GUID="56D66100-99A0-4FFC-A12D-EEE9A6718AEF"
Author="PowerShell"
CompanyName="Microsoft Corporation"
Copyright="Copyright (c) Microsoft Corporation."
ModuleVersion="7.0.0.0"
CompatiblePSEditions = @("Core")
PowerShellVersion="3.0"
FunctionsToExport = @()
CmdletsToExport="Start-Transcript", "Stop-Transcript"
AliasesToExport = @()
NestedModules="Microsoft.PowerShell.ConsoleHost.dll"
HelpInfoURI = 'https://aka.ms/powershell72-help'
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD5K2gZTLsu2PRp
# shNrRiUE+ZVwgjMmKjg2hCyLOxkSHKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPRhDES0JvjkdEQU/Z+WxyVQ
# C10nsNYMkCbNNi7KG09pMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAsroLi5DQs/r7gBviDJd7QOn7qKB2tipziMbtSL8i6bz3lAuVwMWPt93d
# dnPPFjRO8XX11Ay9n2qUB9rvN2DRrMujdzeyLe+q/esGYL4iebCQp3ViaCevebNB
# kEm9Ab/HONoL8CrImgkhlgIp27ZDBUMDVcrxP1dKjLkwYK8IvFNSrHcp22RXAr66
# d3wxxomJqCMbBJxUlmzkvB1SPTfLiuzguOUw0cB7nb7+iZpFZyZMTNMVenVwejcu
# HyvJhB5EXtxxotwdZtYJGZOF1KE02y8Sllxh3UE+w2CxIsNye56lR8ZZ34DzFKjL
# 0i58n63XNeFdsWN0BZLdb8Kb9q1tsaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDCU1SWc5uFVH9nIq/+QGr5lLHCU8l36zoxsXhRogHZKgIGZlcn4DLx
# GBMyMDI0MDYxMzAzMjY0My40OTVaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRC
# QjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyHnPOhxbvRATnGjb/6fuBh
# h3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdKs+qIMUbvenlH+w53ssPa
# 6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+yi+uwQ2TnJuxczceG5FD
# HrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/YcM/bIMY/QYmd9F0B+ebF
# Yi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/
# 5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd
# 9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ
# 2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQM
# OmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknKXonHGQacSCaLZot2kyJV
# RsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/obipX6uxjEpyUA9mbVPl
# jlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKC
# EI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8S
# usoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAMATzg6R/A0ldO7M
# qGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64tD3+3NT1JkphWzaAWf2w
# KdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdf
# RcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQRbWEoQozY24hAqOcwuRc
# m6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfaVosmmPtsZsawgnpIjbBa
# 55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw
# 8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0
# SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsKi2AS1WaXvOhgZNmGw42S
# FB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyC
# qW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJXxFs6lwc8D86qlUeGjUy
# o7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35OW3X4Spk5SiNulnLFRPM5
# XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjox
# NzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOoUwsEwIhgPMjAyNDA2MTMwODU4NDFaGA8yMDI0MDYxNDA4NTg0MVowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6hTCwQIBADAHAgEAAgIURDAHAgEAAgIRajAKAgUA
# 6hYUQQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAD6VOaUE6glxv/2TVzJ5
# 3Y970QsIgmp0y8mmWTDEAA1ME5kGpJRHZx6aP3jfWotNfykHYxVdmrc/9JUC0oeN
# aUqaGSRZA5Kv/5J2CVWTSDkmPppw259GR6CSB1CQg937yUH6dNmezlw90AeXXqSF
# oIwPWH8f+5uAcsswEVpT2UyWMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgCOythCdYd9l9uH5vobU6nLZA32Z+yWiJ2JUGp2sVoUcwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCSb4TZApY9nJm5whsK/2kK
# wTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8
# HxMVH35dAAEAAAHgMCIEICW5XLQPbotomNsPch/qcAa+pyfE4TSIIWYydjJKWAG7
# MA0GCSqGSIb3DQEBCwUABIICAJNpGckrTlTveHqCTBYoOlMIPXy21Yl25Ialu25j
# Aeb0bj4hSgNvkYqU9vzIRiGDA/LcVM5MZJwMmVTNdQ4HrjKoFmRyyFQ2CRXjl/54
# +U5dw21xgHbn0Q3MKuPSD02XQqEfR05ju6DhreDjOesb0kq5wvICOD6PEHJmZD2D
# SVwqI24s5W7PQBnCqUnaqMuPf/gyoekOLkYWsn2vHjms0CcFgTvHzUTivLDt/wcZ
# ZkwvzyGutaMo0crAS84a7Dp6sipYdVGCxavZajB7b7Ti7VjOILnZPcYDRpiwBOZk
# eBYqbuOJY+qEUFq+FhZGs+uecW4X5pb9Di8Hzg/KxVkz2i+Q+JGxAhlSNpFgiczn
# 5Sh7fSOlVCUli24ZxvIlnUtSXRrVV0VbAkPst7MMaSgJbdIZlQTYkv+Z12US01TU
# 9dWPPeCT+MqVQkd9ordOPf9JAySr1oyziH+0EHdMYeqAx1Qu+qMbIyx9VtxDZLmq
# lWEveKQwYEZZKTasawwAlLZmUz2/Mhicg0INvBdpB1Iahx2Ru1f35oy7wQKdzRdM
# /1IqIJJhruCjVgNOEk0CxU2/ccbhmyGsQHZMGIZ5A6eG50V/eXHdcR56aR7W7A8l
# xzxxPC7lilpRRt+HsmhF2HmUTZUCSxy8Vz60z02vE1L6zBxAzPlorgSuO5kJDl1z
# SAZ2
# SIG # End signature block
|
combined_dataset/train/non-malicious/$env_PATH permanently.ps1 | $env_PATH permanently.ps1 | #requires -version 2
param(
[string] $AddedFolder,
[bool] $ApplyImmediately = $true
)
$environmentRegistryKey = 'Registry::HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\Session Manager\\Environment'
$oldPath = (Get-ItemProperty -Path $environmentRegistryKey -Name PATH).Path
# See if a new folder has been supplied.
if (!$AddedFolder)
{
Write-Warning 'No Folder Supplied. $ENV:PATH Unchanged'
return
}
if ($ENV:PATH | Select-String -SimpleMatch $AddedFolder)
{
Write-Warning 'Folder already within $ENV:PATH'
return
}
$newPath = $oldPath + ’;’ + $AddedFolder
Set-ItemProperty -Path $environmentRegistryKey -Name PATH -Value $newPath
if ($ApplyImmediately)
{
if (-not ("Win32.NativeMethods" -as [Type]))
{
# import sendmessagetimeout from win32
Add-Type -Namespace Win32 -Name NativeMethods -MemberDefinition @"
[DllImport("user32.dll", SetLastError = true, CharSet = CharSet.Auto)]
public static extern IntPtr SendMessageTimeout(
IntPtr hWnd, uint Msg, UIntPtr wParam, string lParam,
uint fuFlags, uint uTimeout, out UIntPtr lpdwResult);
"@
}
$HWND_BROADCAST = [IntPtr] 0xffff;
$WM_SETTINGCHANGE = 0x1a;
$result = [UIntPtr]::Zero
# notify all windows of environment block change
[Win32.Nativemethods]::SendMessageTimeout($HWND_BROADCAST, $WM_SETTINGCHANGE, [UIntPtr]::Zero, "Environment", 2, 5000, [ref] $result);
}
|
combined_dataset/train/non-malicious/2860.ps1 | 2860.ps1 | function Properties {
[CmdletBinding()]
param(
[Parameter(Mandatory = $true)]
[scriptblock]$properties
)
$psake.context.Peek().properties.Push($properties)
}
|
combined_dataset/train/non-malicious/sample_26_86.ps1 | sample_26_86.ps1 | #
# Module manifest for module 'OCI.PSModules.Budget'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Budget.dll'
# Version number of this module.
ModuleVersion = '74.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'f606310f-04b6-4c8e-bdd7-235e79ecc908'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Budget Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Budget.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIBudget', 'Get-OCIBudgetAlertRule',
'Get-OCIBudgetAlertRulesList', 'Get-OCIBudgetsList', 'New-OCIBudget',
'New-OCIBudgetAlertRule', 'Remove-OCIBudget',
'Remove-OCIBudgetAlertRule', 'Update-OCIBudget',
'Update-OCIBudgetAlertRule'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Budget'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_16_24.ps1 | sample_16_24.ps1 | # Copyright ?2009, Microsoft Corporation. All rights reserved.
# You may use this code and information and create derivative works of it,
# provided that the following conditions are met:
# 1. This code and information and any derivative works may only be used for
# troubleshooting a) Windows and b) products for Windows, in either case using
# the Windows Troubleshooting Platform
# 2. Any copies of this code and information
# and any derivative works must retain the above copyright notice, this list of
# conditions and the following disclaimer.
# 3. THIS CODE AND INFORMATION IS PROVIDED ``AS IS'' WITHOUT WARRANTY OF ANY KIND,
# WHETHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES
# OF MERCHANTABILITY AND/OR FITNESS FOR A PARTICULAR PURPOSE. IF THIS CODE AND
# INFORMATION IS USED OR MODIFIED, THE ENTIRE RISK OF USE OR RESULTS IN CONNECTION
# WITH THE USE OF THIS CODE AND INFORMATION REMAINS WITH THE USER.
$Error.Clear()
trap
{
"[SQL_Debug_Registry] : Trapped error ..." | WriteTo-Stdout
Show-ErrorDetails $error[0]
}
Import-LocalizedData -BindingVariable SQL_OS_Debug_Registry_Keys -FileName SQL_Debug_Registry -UICulture en-us
Write-DiagProgress -Activity $SQL_OS_Debug_Registry_Keys.ID_SQL_Setup_SQL_OS_Debug_Registry_Keys -Status $SQL_OS_Debug_Registry_Keys.ID_SQL_Setup_SQL_OS_Debug_Registry_Keys_Description
$OutputFile= $Computername + "_Recovery_Registry.TXT"
$CurrentDebugKeys = "HKLM\Software\Microsoft\Windows NT\CurrentVersion\AEDebug",
"HKLM\Software\Microsoft\DrWatson",
"HKLM\System\CurrentControlSet\Services\i8042prt\Parameters",
"HKLM\System\CurrentControlSet\Control",
"HKLM\System\CurrentControlSet\Control\Session Manager"
RegQuery -RegistryKeys $CurrentDebugKeys -OutputFile $OutputFile -fileDescription "CurrentOSDebugInformation"
# SIG # Begin signature block
# MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCJpK7zuQyvi79Q
# V6nbabYVW8FZnCabji+dds4/7vokqaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIH/j
# mLzZOt020lXFHoL27D5sW42BpFWyPs9q3vm+l+UxMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAAs44BBigclcUBqN4zvLOGdehM7qLYUDnLZp6
# EagoJdG8LRF6JRDNuGzHTu8xdXfA/gaj74ovOUaRxyED27yOoGHC1k/vl/Frk8Ib
# Xsalpda5J5rJarG0FDSRVWl7EVQu8qn4I6vZeb0XjIGWKx8dbs4Q0m8j2NItc6T/
# uaKAwbV87lFqvPRlHgP2TTgITu+U0NJKZ4hXKPPHGs/PtFg9PVnDCFSBj47Dx1Wr
# hAni4d60f33A2CUj3YacwIGP27sA0gzdcwAzlPJAiMq+Q9A7zeQISIJoZYXR7HvL
# BayjzrOUxWIICbvVg+ffc+lEC03SYD4i7GXYjDS//g6isBxDjKGCF60wghepBgor
# BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCBnWtDKF66z9cxKyPitH5UdIWZJkXhHOPzx
# Xq+QdseQ+gIGZv8ZfhHbGBMyMDI0MTAyODExNDA0Mi4yNDNaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9oMv
# JmpUXSLBAAEAAAH2MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwNFoXDTI1MTAyMjE4MzEwNFowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjZCMDUtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# 0UJeLMR/N9WPBZhuKVFF+eWJZ68Wujdj4X6JR05cxO5CepNXo17rVazwWLkm5Aja
# Vh19ZVjDChHzimxsoaXxNu8IDggKwpXvpAAItv4Ux50e9S2uVwfKv57p9JKG+Q7V
# ONShujl1NCMkcgSrPdmd/8zcsmhzcNobLomrCAIORZ8IwhYy4siVQlf1NKhlyAzm
# kWJD0N+60IiogFBzg3yISsvroOx0x1xSi2PiRIQlTXE74MggZDIDKqH/hb9FT2kK
# /nV/aXjuo9LMrrRmn44oYYADe/rO95F+SG3uuuhf+H4IriXr0h9ptA6SwHJPS2Vm
# bNWCjQWq5G4YkrcqbPMax7vNXUwu7T65E8fFPd1IuE9RsG4TMAV7XkXBopmPNfvL
# 0hjxg44kpQn384V46o+zdQqy5K9dDlWm/J6vZtp5yA1PyD3w+HbGubS0niEQ1L6w
# GOrPfzIm0FdOn+xFo48ERl+Fxw/3OvXM5CY1EqnzEznPjzJc7OJwhJVR3VQDHjBc
# EFTOvS9E0diNu1eocw+ZCkz4Pu/oQv+gqU+bfxL8e7PFktfRDlM6FyOzjP4zuI25
# gD8tO9zJg6g6fRpaZc439mAbkl3zCVzTLDgchv6SxQajJtvvoQaZxQf0tRiPcbr2
# HWfMoqqd9uiQ0hTUEhG44FBSTeUPZeEenRCWadCW4G8CAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBRIwZsJuOcJfScPWcXZuBA4B89K8jAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEA13kBirH1cHu1WYR1ysj125omGtQ0PaQkEzwGb70xtqSoI+svQihsgdTY
# xaPfp2IVFdgjaMaBi81wB8/nu866FfFKKdhdp3wnMZ91PpP4Ooe7Ncf6qICkgSuw
# gdIdQvqE0h8VQ5QW5sDV4Q0Jnj4f7KHYx4NiM8C4jTw8SQtsuxWiTH2Hikf3QYB7
# 1a7dB9zgHOkW0hgUEeWO9mh2wWqYS/Q48ASjOqYw/ha54oVOff22WaoH+/Hxd9NT
# EU/4vlvsRIMWT0jsnNI71jVArT4Q9Bt6VShWzyqraE6SKUoZrEwBpVsI0LMg2X3h
# OLblC1vxM3+wMyOh97aFOs7sFnuemtI2Mfj8qg16BZTJxXlpPurWrG+OBj4BoTDk
# C9AxXYB3yEtuwMs7pRWLyxIxw/wV9THKUGm+x+VE0POLwkrSMgjulSXkpfELHWWi
# CVslJbFIIB/4Alv+jQJSKAJuo9CErbm2qeDk/zjJYlYaVGMyKuYZ+uSRVKB2qkEP
# cEzG1dO9zIa1Mp32J+zzW3P7suJfjw62s3hDOLk+6lMQOR04x+2o17G3LceLkkxJ
# m41ErdiTjAmdClen9yl6HgMpGS4okjFCJX+CpOFX7gBA3PVxQWubisAQbL5HgTFB
# tQNEzcCdh1GYw/6nzzNNt+0GQnnobBddfOAiqkzvItqXjvGyK1QwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFU9eSpdxs0a0
# 6JFIuGFHIj/I+36ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJ4u8wIhgPMjAyNDEwMjgxMDE2MTVaGA8yMDI0
# MTAyOTEwMTYxNVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sni7wIBADAHAgEA
# AgIV+jAHAgEAAgISoDAKAgUA6ss0bwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA
# A4IBAQBpUFU4+vZJFyUmVb+WZWIYm85wWkaqUQMIXDa89AJRdEINZBYYuKJZHwGX
# evIycaqI5McGg28UnXlT85+VLHcRb2BqTBqlUDfyWMDDSi4/Ny1o+ihFohhs/ujQ
# uxkh2lsfu3f8RO+rHyvyoc6aVYoXpbsYsPsvWhlP5VIY3yXO7ztB9TdvoXXfsSMI
# GgIOURNjC5+mH+r4R0gkgrO/9ZkBSWax/DoAQGEOAQy9s6WfhPW9PTxIBkjbYnEx
# w84j1PW/7aPVhavzoHfT0fP7eh9eCNY9ax+AXoa/pOOruFzpjML3/3o9VRglqy6j
# vcBxO0h6Uf9FkqnHwg7BsMcIWiqvMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAH2gy8malRdIsEAAQAAAfYwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgN8XTn4GGuJaZYSH4VcOjtEllhp6JAELdGJe+ih5BJlEwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCArYUzxlF6m5USLS4f8NXL/8aoNEVdsCZRmF+Ll
# QjG2ojCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 9oMvJmpUXSLBAAEAAAH2MCIEIFraBgk4xXajMAI68rUQCySUOKGDReEAQUOAuvhI
# wwAlMA0GCSqGSIb3DQEBCwUABIICAE3lFlKEUYSOHplEspw9Yii4IDQ5I0Ej3on6
# rVJ/8l+lhwyrDLUNL8uTfhGSUwZAbMUfUjpCNJ2X82UTAERIAj2kKXdpdiJsE4G9
# AyESS0obmP980hQAqa54wcTjyMpluXiDjriDqma5I83ykV4aDDZrdn9eCop1N3Pj
# w0cBa/t/9PUii9BI9knsV3wl9Jizdu418zVcK/L6uJRWTH77sg5owF+KYvtRE+KH
# 1xuQlNhnX08R6o1CLbBYcLDK6NdNoC7IZeesHUciZfR75j3+8o0QIC3G3CXNL6SO
# ZFwycBnyLDGMNfW/CzyKBdpGxnjHVTq8O8Y4Lj4e6MqpFTvw4ZHweVEU+d3+DB8Y
# R4JyMzln0BnjkgRAstb9sVQjdQetif13zeOdrPzc9tU3TMZQkxHIOtNoZdeBjrgI
# cM2FzAFbo8i6bwEPR5zNlp79A811FEdTI+JYdfFRvIDHw2qFKOaNxSQD8BRVEmZM
# +Ju2EPF5w2H/srutMDrFDM+VRThEQPRRzW0phUJtiRocEEkD3+h7giSVtnDxl+HE
# Epdi1nah6R/tDOQ/p2rXvtS8Bps1cKaYt9nKXOVs6ahBynqUWUQfdRWoCdjs09te
# mB1qnM/hzsls7jA1ARLE4VLabHj+je7njluicSc+yUHTHZ/AL1+zllhkl7fVFqe0
# W9+j7Kvk
# SIG # End signature block
|
combined_dataset/train/non-malicious/a4d96102-d5a8-4437-b3e0-568a0936fcbf.ps1 | a4d96102-d5a8-4437-b3e0-568a0936fcbf.ps1 | # The $test variable can be pretty much whatever you want it to be, or with a little adjustment it isn't even necessary.
# I just wanted to set it up like this for the $match variable later on
$test=(get-folder testing|get-vm)
#$data and the csv is where all the information lies that this script/s pulls
$data=import-csv book1.csv
$hostcredential=Get-Credential "Host Credentials"
$guestcredential=Get-Credential "Guest Credentials"
#Line row, row line, same thing in a spreadsheet. I just wish I knew more of those basic understood variables such as $line.
# If anyone knows a good listing please let me know
foreach ($line in $data)
{
#For each of the VMs in $test it checks to see if there is a listing for that vm name in the excel spreadsheet.
$match=$test|?{$line.guestname -eq $_.name}
IF($match)
{
#Oh invoke-vmscript how I both love and hate you. This calls for the execution of the script works2.ps1 script locally on the remote computer
invoke-vmscript -vm $match.name -scripttext '&"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe" "C:\\Power\\works2.ps1"' -scripttype "powershell" -hostcredential $hostcredential -guestcredential $guestcredential -confirm
}
}
|
combined_dataset/train/non-malicious/sample_51_13.ps1 | sample_51_13.ps1 |
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Create an in-memory object for CspmMonitorGcpOffering.
.Description
Create an in-memory object for CspmMonitorGcpOffering.
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.Security.Models.CspmMonitorGcpOffering
.Link
https://learn.microsoft.com/powershell/module/Az.Security/new-azsecuritycspmmonitorgcpofferingobject
#>
function New-AzSecurityCspmMonitorGcpOfferingObject {
[OutputType('Microsoft.Azure.PowerShell.Cmdlets.Security.Models.CspmMonitorGcpOffering')]
[CmdletBinding(PositionalBinding=$false)]
Param(
[Parameter(HelpMessage="The service account email address in GCP for this offering.")]
[string]
$NativeCloudConnectionServiceAccountEmailAddress,
[Parameter(HelpMessage="The GCP workload identity provider id for the offering.")]
[string]
$NativeCloudConnectionWorkloadIdentityProviderId
)
process {
$Object = [Microsoft.Azure.PowerShell.Cmdlets.Security.Models.CspmMonitorGcpOffering]::New()
if ($PSBoundParameters.ContainsKey('NativeCloudConnectionServiceAccountEmailAddress')) {
$Object.NativeCloudConnectionServiceAccountEmailAddress = $NativeCloudConnectionServiceAccountEmailAddress
}
if ($PSBoundParameters.ContainsKey('NativeCloudConnectionWorkloadIdentityProviderId')) {
$Object.NativeCloudConnectionWorkloadIdentityProviderId = $NativeCloudConnectionWorkloadIdentityProviderId
}
return $Object
}
}
# SIG # Begin signature block
# MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBAxFhADwANxOnR
# 1UArWBiBw1mgfeF034+EWivmq3IKv6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOwdtEbCtsIvWAjjYN/rXiYB
# wDsn0pf+1JpOvAXNMPniMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAwJwoeQhH54wnsM+NgUElmn2EhZ/Y78SYU6wQgHqkFCrREkMbw2H+ubrk
# 25vwxLaGcCyG3OKlOVCD03zdAbgv5PWa9tdotCzfAAJOzrJBCJ72O9NCYFiwZvkc
# 1qclGc5dK5QEwiTMUHuRoA181mObMI/8uh6+pdl4JTuOMZcWJ4B0MAKPXoGOE1Jm
# P5miqZZBDsqDD8pxhp6knEP3nFTZ4sQf6NpzgRz6Wxs/jHcOJl2j3xfj3ew1+BU6
# MFnv5iuzIDaHTJl5YYpURqvDiS40jgnLid3F47otyNOpa+Xe3qSt4txuGtO7oKRz
# CFCsm0iYg6QZBR4NhDsfrRRfqLvcmKGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC
# FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCB1M6pbKCubMj3aafb/S9Zw7jeV7UMDUU37I0iIzjRNiwIGZiAgthO8
# GBMyMDI0MDQyMzEzMTUxNS45NTJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC
# RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis
# DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI
# ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z
# ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR
# IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE
# lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s
# /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4
# aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB
# fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT
# me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy
# qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui
# hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds
# lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf
# sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t
# Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU
# +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7
# qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6
# Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+
# x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4
# 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5
# ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV
# PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4
# y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk
# 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG
# QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnR3vgwIhgPMjAyNDA0MjMxNTE3MTJaGA8yMDI0MDQyNDE1MTcxMlowdzA9Bgor
# BgEEAYRZCgQBMS8wLTAKAgUA6dHe+AIBADAKAgEAAgIDFQIB/zAHAgEAAgITGDAK
# AgUA6dMweAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBANIiA17LpM6vqyo+
# h2Gy7jS/plK5btuepzPH69HaSSLQgmyHGJti3T4/40Qv/pD1kqx4aZmxSYhfghQx
# G6+5xQrMjXUGVkvkHlGDaCB5PkTFkhEadoG/M8OiSF2z6t1t+B5+UpZHn/ZqMCje
# 0hGMGpF+It3BhOadbdLMLmv1S+e5MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgdohAFdqA2MOkkxqole8EnxnnOwSr3dLpDiCFh3xHedIwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJ
# CI9//zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 4pmZlfHc4yDrAAEAAAHiMCIEIFI9jHTsM+FSP6FMwP2O6Yu7/zJ0dHmtmWF4o2me
# BeYsMA0GCSqGSIb3DQEBCwUABIICAJ6h4mlliDtMtfdo4azS6AL5Z5OUVQxph5Fs
# gj2gi9DXTUzeXXx6Xdmrm3HY1RBItL8Ewt7jlXzmKbnAz0IH27imy0cKZ+bqQHkX
# J0ISz7fq4yvDPs4gCVcYHhr4M+QR8DOQTDfDDJWghX5ElITIHn5zYjAtc1nap+ZC
# VQ+MDC37lzKMqvGpw912nNH6Gk/ADFGMV41/9v8gVzThk4JQnOOdFXqE17mvISVZ
# uk3thtq8jBUlWSvK3xdGPvmy+u1TaoaokVO/iDjO1uHEYQQiAVmtR9OoVSJTFHA2
# sbnf7ofBVcLn/mRmtXWtjlEGjCIuVZr0HGQUFAIbnS+VC9GDvDEgE9H5dm8jKLX4
# A1YVnn5Kxi4KLuDFb4TX8uSPCVlzMHkuIuNLUlQn3DG4suqqC1ExPkadxENDkhjq
# bGv9N5VuxWKs03CMJCj3pv9xJKM8lz8URQEhlD7Yfnv/SLxkZ1jmuLgN7Wmfr9z2
# zb1s1pTyhbntTrnajhQzq/xrkDW9DoI13DK1yIEnzm2hewO9fJsiBrqhAOKhQlSi
# xYzasoxytldOvGLvA5DYswL2sEUG1Ug2ljIt/9KifQnANTX+Ug/DWhRnQBFLJB9L
# //ElYd6l1TEXRiydettJuPOiCpn/0abHrjFzUne989wSg6VJOn2gNeW8QKfJ66lj
# CYxp2Aoa
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_9_23.ps1 | sample_9_23.ps1 | ConvertFrom-StringData @'
id_ctsaddons=Setup App Compat Component
id_ctsaddonsdescription=Collects Setup App Compat information.
'@
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAvYDOgxEYOqbKw
# WAD/+1X+5ZUtmA8WQr6+nWdwXIoDWaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKzlaqjBFqmft1yvwqkJAE4V
# n8+m1BYJ6dPQrnfUxKsRMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAR+8wAK0ygT4qkKseKeTUL93UjDVLN62GtIzuvkFsmNAP2ki+GpPcGGcN
# CowueZQEZfI1tr6lAbUE0EAmW17cm+zuLoC0W+B7gI75TWmaB3UrOd4FHt2Ug7wp
# ulZBfrcm7RKxBljhSGfnmkxRpvHER3bdHxZIp4RH6dLxulY3+KiFMH0tRBE2SBXL
# ARMsncaNvjk2mEZGUR57Tl00Kb1f8oa9U9wX2UJZNYa1Qm4ESgc6VYynacnF/ouc
# KRCviczP0Qy76sg27efo3ai8DnCD4V0bv4/iZc5ac/efIr6KLmAAVWtHobLlRsM8
# VjiIf8eCGCYAK85aji2/hfeC8W96O6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDoMZpTfZWAkv/7I3AIOLNJadwH/TlgzeWEnR9Yc2rq4wIGZxqItyMw
# GBMyMDI0MTAyODExNDA0Mi41MzhaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwABAAAB6jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rWb2ksqaF65QtJkbQpmsc6
# G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T0KfylTulrzKtgxnxZh7q
# 1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGon/4VDHnZhdas22svSC5G
# HywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB+KHCy08ds36an7IcOGfR
# mhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjAlsBBHD1TdGBucrGC3TQX
# STp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1fxYk2nY6SCKsV+VmtV5ai
# PzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEUTBPXME/ia+t8jrT2y3ug
# 15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM3HPVJJ19vOSvrCP9lsEc
# EwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp081X5RQ6HGVUz6ZdgQ0j
# cT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc9KHKTWfXpAVj1Syqt5X4
# nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8HUVMp+mAA4rXjOw42vkH
# fQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebpF0BU1MTIcosFblleMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxVbX3G37KgvyoNAnuu2w3H
# oWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI53kOWSaWCaV3xCznpRt3c
# 4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqekZb4ivMR6LoPb5HNlq0W
# bBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8CxiAg2KlbPyMwBOPcr9hJT
# 8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzEGafPUwLmoETihOGLqIQl
# Cpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3QdiNS8u9ujYh1B7NLr6t3I
# glfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2JG5BYu/XitRE8cdzaJmD
# VBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dixUxE4qlfUPMixGr0Ft4/S
# 0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi5auiqB6xQBADUf+F7hSK
# ZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Qbt45Cz/QMa7EmMGNn7a8
# MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5Dr5m3T4bDj9WTNLgP8SFe
# 3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCJ
# 2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smkOTAiGA8yMDI0MTAyODA1NDg0
# MVoYDzIwMjQxMDI5MDU0ODQxWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyaQ5
# AgEAMAcCAQACAgZUMAcCAQACAhPVMAoCBQDqyvW5AgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAFfF191Vr1N1sln3mHz61HMNMQEgEa636VH1IhLDsW3Fa0AD
# cc4HhLIGewlJNoGCXcZBml5HEec91aylUr95ZJqXwUeqPPb9X5bmbVFXObHp67Wi
# gFKCbNOFbIiG8ecu331cmM1GqdiZAhT6hW4gc/LC7F/nqvDz8msZXcAtE96/FvXd
# 43LKJVHk/kN5IP3SUKVHfZo6zUQvLAaoPylUdoYADAn6hMlUIcog3CD8TCcit1MW
# EuBxZZBPsBMJdzSNeM+RfcmNb6nEzgkv8hGAlRMFGEp/jpNVEuQ5uey+mvVyZ/Ka
# PkY+I4n2Y/SEuQKBMvP6FLyr9gfGyH8jpbHQG8gxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqaJHLVWT9hYwABAAAB6jAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCDCejI/dhc/ByqfhkgYNbottwIsnrmPKiPDbi6ExfwxhTCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXjZDR4iwg0ltLANXBh5G1u
# KqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQgLTk9jKlHi0Od4rfyi3FO/mCmLpu/
# ZxHUB/cVCTvgf/QwDQYJKoZIhvcNAQELBQAEggIALO4lbrKC4nY3SYURze1puLRW
# rcfxbGu0rYQaoJBL0vUL4qGB+Cn72v+2ureKErjoNxDqH4iarouroTaNftRWNTgR
# mYSKlZ0GooRkNQGC2tiHuGlQblRFn5yfpITqteFNwY6BWyoNRte73IWHSR0FOddy
# 5euwN1+X1v55+sSWeE4vXz9jICCyEhePeGI4wuywIH5eVZd5krSTyWnIHx+PoUMJ
# rTJsTM3oWx3IH4l8kkto2LunubD6zVBMfmROF0VgvDDu9Y6uJKfficBWjHHsZtSX
# yCUOoJnvCdsFXO9bPFodqpc6rr443aDrA8Q/hXivFQE2JaScIWy5Jg+jZvrcLax5
# 7vPdlUl6GLK2/XLeRjC4+VHt02xJvk441pnVmwBBu2566l1k1fwIam5/rTEFJeu8
# 3zIeNfQsvDdDV21kGK8maUZYreEce+ZzPUF9xl6d4TT0sH9Znq+11Rkurky6F8ea
# eBZjxAb730TyTmx6vvbAvWodZa+d8QqtzMfIN9DbmTJdeuXJPAzAmwWObi9Sp9+P
# aNq0PPYVUfoBnrZlbdt1IxamO+k3qVPWgXR7U4ui9eXX7f3Fq0BinpLjuL/kDEA8
# sjcb9l6ylWeZAiLqhGhGffasDHGGvCoN7R06FJqDuyqwh/rNf1h6cLvqtNNhOVWu
# eu7q9/w5guFrXJskaSs=
# SIG # End signature block
|
combined_dataset/train/non-malicious/4376.ps1 | 4376.ps1 | function Get-ValidModuleLocation
{
[CmdletBinding()]
Param
(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]
$LocationString,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]
$ParameterName,
[Parameter()]
$Credential,
[Parameter()]
$Proxy,
[Parameter()]
$ProxyCredential
)
if(-not (Microsoft.PowerShell.Management\Test-Path $LocationString))
{
if(($LocationString -notmatch 'LinkID') -and
-not ($LocationString.EndsWith('/nuget/v2', [System.StringComparison]::OrdinalIgnoreCase)) -and
-not ($LocationString.EndsWith('/nuget/v2/', [System.StringComparison]::OrdinalIgnoreCase)) -and
-not ($LocationString.EndsWith('/nuget', [System.StringComparison]::OrdinalIgnoreCase)) -and
-not ($LocationString.EndsWith('/nuget/', [System.StringComparison]::OrdinalIgnoreCase)) -and
-not ($LocationString.EndsWith('index.json', [System.StringComparison]::OrdinalIgnoreCase)) -and
-not ($LocationString.EndsWith('index.json/', [System.StringComparison]::OrdinalIgnoreCase)) -and
-not ($LocationString.EndsWith('/api/v2', [System.StringComparison]::OrdinalIgnoreCase)) -and
-not ($LocationString.EndsWith('/api/v2/', [System.StringComparison]::OrdinalIgnoreCase))
)
{
$tempLocation = $null
if($LocationString.EndsWith('/', [System.StringComparison]::OrdinalIgnoreCase))
{
$tempLocation = $LocationString + 'api/v2/'
}
else
{
$tempLocation = $LocationString + '/api/v2/'
}
if($tempLocation)
{
$tempLocation = Resolve-Location -Location $tempLocation `
-LocationParameterName $ParameterName `
-Credential $Credential `
-Proxy $Proxy `
-ProxyCredential $ProxyCredential `
-ErrorAction SilentlyContinue `
-WarningAction SilentlyContinue
if($tempLocation)
{
return $tempLocation
}
}
}
$LocationString = Resolve-Location -Location $LocationString `
-LocationParameterName $ParameterName `
-Credential $Credential `
-Proxy $Proxy `
-ProxyCredential $ProxyCredential `
-CallerPSCmdlet $PSCmdlet
}
return $LocationString
} |
combined_dataset/train/non-malicious/sample_34_93.ps1 | sample_34_93.ps1 | # escape=`
ARG base_image
FROM ${base_image}
# https://www.thomasmaurer.ch/2019/07/how-to-install-and-update-powershell-7/
# Wrapping the following command in cmd.exe
# iex "& { $(irm https://aka.ms/install-powershell.ps1) } -UseMSI -Quiet"
RUN powershell -ExecutionPolicy RemoteSigned -Command "$ErrorActionPreference = 'Stop'; iex ""& { $(irm https://aka.ms/install-powershell.ps1) } -UseMSI -Quiet"""
# Make sure any failure in PowerShell scripts is fatal
SHELL ["pwsh", "-ExecutionPolicy", "RemoteSigned", "-Command", "$ErrorActionPreference = 'Stop';"]
RUN Write-Output $PSVersionTable $ErrorActionPreference
COPY mesa_deps_msvc.ps1 C:\
RUN C:\mesa_deps_msvc.ps1
COPY mesa_deps_choco.ps1 C:\
RUN C:\mesa_deps_choco.ps1
# Example usage:
# `base_image` should use windows image that can be run with `--isolation=process` option,
# since the resulting container will want to be used that way be later containers in the build process.
# Only --isolation=hyperv can succeed building this container locally,
# --isolation=process have network issue when installing Visual Studio and choco will crash
# docker build --isolation=hyperv -f .\Dockerfile_msvc -t mesa_vs --build-arg base_image="mcr.microsoft.com/windows:10.0.19041.1415" .
|
combined_dataset/train/non-malicious/3223.ps1 | 3223.ps1 |
Describe 'New-PoshBotInstance' {
BeforeAll {
$VerbosePreference = 'SilentlyContinue'
$PSDefaultParameterValues = @{
'New-PoshBotInstance:Verbose' = $false
}
$script:backend = New-PoshBotSlackBackend -Configuration @{Token = (New-Guid).ToString(); Name = 'Test-Backend'}
}
Context 'Path' {
it 'Creates a bot instance from a configuration path' {
$psd1 = Get-Item -Path (Join-Path -Path $PSScriptRoot -ChildPath '..\..\Artifacts\Cherry2000.psd1')
$bot = New-PoshBotInstance -Path $psd1 -Backend $script:backend
$bot | should not benullorempty
$bot.PSObject.TypeNames[0] | should be 'Bot'
}
it 'Accepts paths from pipeline' {
$bot = (Join-Path -Path $PSScriptRoot -ChildPath '..\..\Artifacts\Cherry2000.psd1') | New-PoshBotInstance -Backend $script:backend
$bot | should not benullorempty
$bot.PSObject.TypeNames[0] | should be 'Bot'
}
it 'Validates path and file type' {
{New-PoshBotInstance -Path '.\nonexistentfile.asdf' -Backend $script:backend} | should throw
}
}
Context 'LiteralPath' {
it 'Accepts LiteralPath' {
$psd1 = Join-Path -Path $PSScriptRoot -ChildPath '..\..\Artifacts\Cherry2000.psd1'
$config = New-PoshBotInstance -LiteralPath $psd1 -Backend $script:backend
$config | should not benullorempty
}
}
Context 'Configuration' {
it 'Accepts configuration object' {
$psd1 = Join-Path -Path $PSScriptRoot -ChildPath '..\..\Artifacts\Cherry2000.psd1'
$config = $psd1 | Get-PoshBotConfiguration
$bot = New-PoshBotInstance -Configuration $config -Backend $script:backend
}
it 'Accepts configuration object from pipeline' {
$psd1 = Join-Path -Path $PSScriptRoot -ChildPath '..\..\Artifacts\Cherry2000.psd1'
$config = $psd1 | Get-PoshBotConfiguration
$bot = $config | New-PoshBotInstance -Backend $script:backend
}
}
}
|
combined_dataset/train/non-malicious/Get-SerialNumber.ps1 | Get-SerialNumber.ps1 | function Get-SerialNumber {
param([VMware.VimAutomation.Types.VMHost[]]$InputObject = $null)
process {
$hView = $_ | Get-View -Property Hardware
$serviceTag = $hView.Hardware.SystemInfo.OtherIdentifyingInfo | where {$_.IdentifierType.Key -eq "ServiceTag" }
$assetTag = $hView.Hardware.SystemInfo.OtherIdentifyingInfo | where {$_.IdentifierType.Key -eq "AssetTag" }
$obj = New-Object psobject
$obj | Add-Member -MemberType NoteProperty -Name VMHost -Value $_
$obj | Add-Member -MemberType NoteProperty -Name ServiceTag -Value $serviceTag.IdentifierValue
$obj | Add-Member -MemberType NoteProperty -Name AssetTag -Value $assetTag.IdentifierValue
Write-Output $obj
}
}
|
combined_dataset/train/non-malicious/sample_63_39.ps1 | sample_63_39.ps1 | #
# Module manifest for module 'OCI.PSModules.Sch'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Sch.dll'
# Version number of this module.
ModuleVersion = '89.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '0e74736a-d7dc-4743-afef-d79b95248dee'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Sch Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '89.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Sch.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Enable-OCISchServiceConnector', 'Get-OCISchConnectorPlugin',
'Get-OCISchConnectorPluginsList', 'Get-OCISchServiceConnector',
'Get-OCISchServiceConnectorsList', 'Get-OCISchWorkRequest',
'Get-OCISchWorkRequestErrorsList', 'Get-OCISchWorkRequestLogsList',
'Get-OCISchWorkRequestsList',
'Invoke-OCISchDeactivateServiceConnector',
'Move-OCISchServiceConnectorCompartment',
'New-OCISchServiceConnector', 'Remove-OCISchServiceConnector',
'Update-OCISchServiceConnector'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Sch'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_65_49.ps1 | sample_65_49.ps1 | @{
GUID="56D66100-99A0-4FFC-A12D-EEE9A6718AEF"
Author="PowerShell"
CompanyName="Microsoft Corporation"
Copyright="Copyright (c) Microsoft Corporation."
ModuleVersion="7.0.0.0"
CompatiblePSEditions = @("Core")
PowerShellVersion="3.0"
FunctionsToExport = @()
CmdletsToExport="Start-Transcript", "Stop-Transcript"
AliasesToExport = @()
NestedModules="Microsoft.PowerShell.ConsoleHost.dll"
HelpInfoURI = 'https://aka.ms/powershell72-help'
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCAN6qOMSgIZSKy
# niFjiV1FZGi6ofshkAXyBqiHSReb1aCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJMp0ngNMV4y2pAKpndFzJjn
# dF89kUNZ9R3rupDtcuTdMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEACZLzgO/0QNLJLFgQ96Z9pJ1vIRBvIgzFwY6c+slORrCzVvV6cUUw5cZ3
# OQsVSFFNL5v43dSzygX9uOss849ryKnwqCfwSD4WOJeJB1/BvWgwJQ5mR8WNYC8M
# 5zLTJtGuxj8EuvB56RDi3FyxrLEXDuFNHJrREcNCiSUjniGcnCiTLHcRU+Be+ez7
# +gLlFmZKrcH7bD6KmzLOq8iEPHAnwfdmwZ/PEvkuQmUsRb8OPRRLoDKA8Y1zvPAT
# zi+JtQK2wfnfCm0msu92brNAaCHDztiUdaMJZf72z52yqTxDXn/+eFU6N0h8Ovh7
# DdQ/M59M2DEnLt/EfJb5hDfec2iNSKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCn1sKQg0xH0glYU2HyZwwcpuMrhcWXvGlXQgUGYR4WtAIGZlcn4ARY
# GBMyMDI0MDYxMzAzMjAxNy4wNThaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjE3OUUtNEJCMC04MjQ2MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzE5WhcNMjUwMTEwMTkwNzE5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoxNzlFLTRC
# QjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKyHnPOhxbvRATnGjb/6fuBh
# h3ZLzotAxAgdLaZ/zkRFUdeSKzyNt3tqorMK7GDvcXdKs+qIMUbvenlH+w53ssPa
# 6rYP760ZuFrABrfserf0kFayNXVzwT7jarJOEjnFMBp+yi+uwQ2TnJuxczceG5FD
# HrII6sF6F879lP6ydY0BBZkZ9t39e/svNRieA5gUnv/YcM/bIMY/QYmd9F0B+ebF
# Yi+PH4AkXahNkFgK85OIaRrDGvhnxOa/5zGL7Oiii7+J9/QHkdJGlfnRfbQ3QXM/
# 5/umBOKG4JoFY1niZ5RVH5PT0+uCjwcqhTbnvUtfK+N+yB2b9rEZvp2Tv4ZwYzEd
# 9A9VsYMuZiCSbaFMk77LwVbklpnw4aHWJXJkEYmJvxRbcThE8FQyOoVkSuKc5OWZ
# 2+WM/j50oblA0tCU53AauvUOZRoQBh89nHK+m5pOXKXdYMJ+ceuLYF8h5y/cXLQM
# OmqLJz5l7MLqGwU0zHV+MEO8L1Fo2zEEQ4iL4BX8YknKXonHGQacSCaLZot2kyJV
# RsFSxn0PlPvHVp0YdsCMzdeiw9jAZ7K9s1WxsZGEBrK/obipX6uxjEpyUA9mbVPl
# jlb3R4MWI0E2xI/NM6F4Ac8Ceax3YWLT+aWCZeqiIMLxyyWZg+i1KY8ZEzMeNTKC
# EI5wF1wxqr6T1/MQo+8tAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUcF4XP26dV+8S
# usoA1XXQ2TDSmdIwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAMATzg6R/A0ldO7M
# qGxD1VJji5yVA1hHb0Hc0Yjtv7WkxQ8iwfflulX5Us64tD3+3NT1JkphWzaAWf2w
# KdAw35RxtQG1iON3HEZ0X23nde4Kg/Wfbx5rEHkZ9bzKnR/2N5A16+w/1pbwJzdf
# RcnJT3cLyawr/kYjMWd63OP0Glq70ua4WUE/Po5pU7rQRbWEoQozY24hAqOcwuRc
# m6Cb0JBeTOCeRBntEKgjKep4pRaQt7b9vusT97WeJcfaVosmmPtsZsawgnpIjbBa
# 55tHfuk0vDkZtbIXjU4mr5dns9dnanBdBS2PY3N3hIfCPEOszquwHLkfkFZ/9bxw
# 8/eRJldtoukHo16afE/AqP/smmGJh5ZR0pmgW6QcX+61rdi5kDJTzCFaoMyYzUS0
# SEbyrDZ/p2KOuKAYNngljiOlllct0uJVz2agfczGjjsKi2AS1WaXvOhgZNmGw42S
# FB1qaloa8Kaux9Q2HHLE8gee/5rgOnx9zSbfVUc7IcRNodq6R7v+Rz+P6XKtOgyC
# qW/+rhPmp/n7Fq2BGTRkcy//hmS32p6qyglr2K4OoJDJXxFs6lwc8D86qlUeGjUy
# o7hVy5VvyA+y0mGnEAuA85tsOcUPlzwWF5sv+B5fz35OW3X4Spk5SiNulnLFRPM5
# XCsSHqvcbC8R3qwj2w1evPhZxDuNMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjox
# NzlFLTRCQjAtODI0NjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAbfPR1fBX6HxYfyPx8zYzJU5fIQyggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOoUwsEwIhgPMjAyNDA2MTMwODU4NDFaGA8yMDI0MDYxNDA4NTg0MVowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6hTCwQIBADAHAgEAAgIURDAHAgEAAgIRajAKAgUA
# 6hYUQQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAD6VOaUE6glxv/2TVzJ5
# 3Y970QsIgmp0y8mmWTDEAA1ME5kGpJRHZx6aP3jfWotNfykHYxVdmrc/9JUC0oeN
# aUqaGSRZA5Kv/5J2CVWTSDkmPppw259GR6CSB1CQg937yUH6dNmezlw90AeXXqSF
# oIwPWH8f+5uAcsswEVpT2UyWMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHg1PwfExUffl0AAQAAAeAwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgCGGoogKk9An2iYjUT2pANRYRKzcb7xzmc6t5Afsy0TgwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCDj7lK/8jnlbTjPvc77DCCSb4TZApY9nJm5whsK/2kK
# wTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4NT8
# HxMVH35dAAEAAAHgMCIEICW5XLQPbotomNsPch/qcAa+pyfE4TSIIWYydjJKWAG7
# MA0GCSqGSIb3DQEBCwUABIICABlBHBHg91lJlWvZ1C2NYIdn3DGbvEaRAw6s8M6m
# pp4HzJwF+/hFq90xjgBS1TYjwQZYSZy3Zwk7tur/+nRKoQFLR1qMeYTSIzNbsXJ+
# L8eLY1iH2QE5mIeNMPhbtoFdYPybx75qG+G6qtZ1NVOLFPj1tiOvRuLMzqN0ech0
# JmHpZ/KaT3KfrHa+Nuc0lQQZN79gkJWI2WKqizl0IrMqPPWNS+AyMsdrqAun/hgn
# S7MtH9lyoVD33HQR2GkKwPf8zAbXkT+C++2U0TALjZU4AD8d6TM2G0AbbYSqZlBA
# UJpUY+vMp5TaK6ckS9dVwdKzpMEDLCX6eLINj9xuPrCqrwyKqYj7V6lxMGPK1qaG
# pUJ0eP1ktQdyNeYTL4+BKiZMnQSe9IjKz2/chDa41pn8YFBSeXUHby7Y4VTuLNDw
# EaHPMFrPY7Vmp/pVvuH66frCo/N3GGOfR9F2bxOo99rCiu+Hpm646nX7R5GcfDVK
# OXqFcSK2YbM7easlk9YC44yjoCD7fg0ttUiqahHq8YuP8rKPAYof2ydYgs+PIXwt
# cvHtR0Z65JagOy6G2cttuGF5ClZs2iodRqQX/wgsq+VLe5GSIBHOTErgeQ3MSR1z
# AAt3qNoMxcrQXivuDVpdaWhUgUwEHXj30FIeRGd3V6BdBPPWHnkkOy6VO37US1Bw
# RN7v
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_12_83.ps1 | sample_12_83.ps1 | #************************************************
# TS_ETLTraceCollector.ps1
# Version 1.2.2
# Date: 10-31-2010
# Author: Andre Teixeira - andret@microsoft.com
# Description: This script is a universal ETL Trace collector. Caller has to inform a Data Collector Set XML for the ETL and additional data.
# Script will collect ETL information after asking customer to reproduce the issue.
#************************************************
# invoked in DC_DirectAccessDiag.ps1
# Last Modified: 2023-02-23 by #we# - added trap in functions
PARAM( [string] $DataCollectorSetXMLName = "",
$OutputFileName,
[string] $ComponentName = "Component",
$FileDescription = "ETL trace file",
$SectionDescription = "ETL Traces",
[string] $ReproTitle = "",
[string] $ReproDescription = "",
[string] $StopTitle = "",
[string] $StopDescription = "",
[switch] $DoNotPromptUser,
[switch] $StartTrace,
[switch] $StopTrace,
$DataCollectorSetObject = $null,
[switch] $DisableRootCauseDetected,
[string] $DestinationFolder = ($PWD.Path + "\Perfmon")
)
Import-LocalizedData -BindingVariable EvtTraceStrings
Write-DiagProgress -Activity ($EvtTraceStrings.ID_ETLTraceEnable -replace "%Component%", $ComponentName) -Status ($EvtTraceStrings.ID_ETLTraceEnableDesc -replace "%Component%", $ComponentName)
if ($ReproTitle -eq ""){
$ReproTitle = $EvtTraceStrings.ID_ETLTraceReproTitle
}
if ($ReproDescription -eq ""){
$ReproDescription = $EvtTraceStrings.ID_ETLTraceReproDescription
}
if ($StopTitle -eq ""){
$StopTitle = $EvtTraceStrings.ID_ETLTraceStopTitle
}
if ($StopDescription -eq ""){
$StopDescription = $EvtTraceStrings.ID_ETLTraceStopDescription
}
Function StartDataCollectorSetFromXML{
param( [string] $PathToXML,
[string] $DestinationFolder)
if (Test-Path $PathToXML){
trap [Exception]{
WriteTo-ErrorDebugReport -ErrorRecord $_ -ScriptErrorText ("Starting Data Collector Set $PathToXML")
if ($null -ne $_.Exception) {"[Exception]: $($_.Exception.Message)"}
continue
}
$Error.Clear()
"Obtaining DSC XML Content..." | WriteTo-StdOut -ShortFormat
[xml] $DataCollectorXML = Get-Content $PathToXML
$DataCollectorXML.DataCollectorSet.RootPath = $DestinationFolder
"Root Path: $DestinationFolder" | WriteTo-StdOut -ShortFormat
if ($OutputFileName -is [array]){
$X = 0
foreach ($TraceCollectorSet in $DataCollectorXML.DataCollectorSet.TraceDataCollector){
if ($TraceCollectorSet.FileName -ne "NtKernel"){
if ($X -lt $OutputFileName.Length){
$FileName = $OutputFileName[$X]
$TraceCollectorSet.FileName = $FileName
$CollectionName = $TraceCollectorSet.Name
$SectionName = $TraceCollectorSet.Name
"Setting Output to TraceDataCollector [$CollectionName] to [$FileName]" | WriteTo-StdOut -ShortFormat
}else{
"Error: OutputFileName contains less members than TraceCollectorSet sections." | WriteTo-StdOut -ShortFormat
}
$X++
}
}
}else{
foreach ($TraceCollectorSet in $DataCollectorXML.DataCollectorSet.TraceDataCollector){
if ($TraceCollectorSet.FileName -ne "NtKernel"){
$TraceCollectorSet.FileName = $OutputFileName
"Setting Output to [$OutputFileName]" | WriteTo-StdOut -ShortFormat
}
}
}
$Name = $DataCollectorXML.DataCollectorSet.Name
"DSC Name: $Name" | WriteTo-StdOut -ShortFormat
"Creating PLA Object and Setting Up DataCollector" | WriteTo-StdOut -ShortFormat
$DataCollectorSet = New-Object -ComObject PLA.DatacollectorSet
$DataCollectorSet.SetXml($DataCollectorXML.get_InnerXml()) | WriteTo-StdOut -ShortFormat
$DataCollectorSet.Commit($Name, $null , 0x0003) | WriteTo-StdOut -ShortFormat
$DataCollectorSet.Query($Name,$null) | WriteTo-StdOut -ShortFormat
"Starting DCS" | WriteTo-StdOut -ShortFormat
$DataCollectorSet.start($false) | WriteTo-StdOut -ShortFormat
If (($null -ne $DataCollectorSet) -and ($null -ne $DataCollectorSet.status)){
if ($DataCollectorSet.Status -eq 0){
"DCS was not started. Trying again in 5 seconds" | WriteTo-StdOut -ShortFormat
#Timming issue. Wait 5 seconds and try again
Start-Sleep -Seconds 5
if ($DataCollectorSet.Status -eq 0){
$DataCollectorSet.start($false)
}
if ($DataCollectorSet.Status -ne 1){
"DCS Current Status is " + $DataCollectorSet.Status | WriteTo-StdOut -ShortFormat
}else{
"DCS is now started" | WriteTo-StdOut -ShortFormat
}
}
return $DataCollectorSet
}else{
"An error has ocurred to create the following Data Collector Set:" | WriteTo-StdOut -ShortFormat
"Name: $Name" | WriteTo-StdOut -ShortFormat
"XML: $PathToXML" | WriteTo-StdOut -ShortFormat
}
}else{
$PathToXML + " does not exist. Exiting..." | WriteTo-StdOut -ShortFormat
}
}
Function StopDataCollectorSet ($DataCollectorSet){
trap [Exception]{
WriteTo-ErrorDebugReport -ErrorRecord $_ -ScriptErrorText ("Stopping DataCollectorSet")
continue
}
"Stopping Data Collector Set. Current Status is: " + $DataCollectorSet.Status | writeto-stdout -ShortFormat
if ($null -ne $DataCollectorSet.Status){
trap [Exception]{
WriteTo-ErrorDebugReport -ErrorRecord $_ -ScriptErrorText ("Stopping DataCollectorSet")
continue
}
$retries = 0
do{
trap [Exception]{
continue
}
$retries++
Start-Sleep -Milliseconds 500
if ($DataCollectorSet.Status -ne 0){
$DataCollectorSet.Stop($false)
}
} while (($DataCollectorSet.Status -ne 0) -and ($retries -lt 900)) #Wait for up to 7.5 minutes for the report to finish
if ($retries -lt 900){
"Data Collector Set was stopped. Current Status is: " + $DataCollectorSet.Status | writeto-stdout -ShortFormat
}else{
"Current Status of Data Collector Set is: " + $DataCollectorSet.Status | writeto-stdout -ShortFormat
}
$OutputLocation = $DataCollectorSet.OutputLocation
"Deleting DataCollectorSet..." | writeto-stdout -ShortFormat
$DataCollectorSet.Delete()
return $OutputLocation
}
}
Function CleanDataCollectorSetTrace{
"Diagnostic package ends unexpectedly. Stopping DataCollectorSet [ToBeDetermined]" | WriteTo-StdOut -ShortFormat
trap [Exception]{
continue
}
$DataCollectorSet = New-Object -ComObject PLA.DatacollectorSet
$DCSName = "ToBeDetermined"
$DataCollectorSet.Query($DCSName,$null) | WriteTo-StdOut -ShortFormat
"Current Status is: " + $DataCollectorSet.Status | writeto-stdout -ShortFormat
if ($null -ne $DataCollectorSet.Status){
trap [Exception]{
continue
}
$retries = 0
do{
trap [Exception]{
continue
}
$retries++
Start-Sleep -Milliseconds 500
if ($DataCollectorSet.Status -ne 0){
$DataCollectorSet.Stop($false)
}
} while (($DataCollectorSet.Status -ne 0) -and ($retries -lt 900)) #Wait for up to 7.5 minutes for the report to finish
if ($retries -lt 900){
"Data Collector Set was stopped. Current Status is: " + $DataCollectorSet.Status | writeto-stdout -ShortFormat
}else{
"Current Status of Data Collector Set is: " + $DataCollectorSet.Status | writeto-stdout -ShortFormat
}
$OutputLocation = $DataCollectorSet.OutputLocation
if(Test-Path -Path $OutputLocation){
"Delete DataCollectorSet output folder [$OutputLocation]" | writeto-stdout -ShortFormat
Remove-Item -Path $OutputLocation -Recurse -Force -Confirm:$false
}
"Deleting DataCollectorSet..." | writeto-stdout -ShortFormat
$DataCollectorSet.Delete()
}
}
## Main ##
if ($DataCollectorSetXMLName.Length -gt 0){
if (Test-Path -Path $DataCollectorSetXMLName){
$DataCollectorSetXMLName = [System.IO.Path]::GetFullPath($DataCollectorSetXMLName)
}
if ((Test-Path ($DestinationFolder)) -ne $true){
$null = mkdir $DestinationFolder
}
if (-not ($DoNotPromptUser.IsPresent)){
$Results = Get-DiagInput -Id "ETLTraceCollectorStopper" -Parameter @{"Title"=$ReproTitle; "Description"=$ReproDescription}
}
if (-not ($StopTrace.IsPresent)){
$TraceTimeStarted = Get-Date
$DataCollectorSet = StartDataCollectorSetFromXML -DestinationFolder $DestinationFolder -PathToXML $DataCollectorSetXMLName
if (($null -ne $DataCollectorSet) -and (-not ($DataCollectorSet -is [System.__ComObject]))){
#Probably an array
$ArrayDCS = $DataCollectorSet
foreach ($Member in $ArrayDCS){
if ($Member -is [System.__ComObject]){
$DataCollectorSet = $Member
}
}
}
}
}
if ($null -ne $DataCollectorSetObject){
$DataCollectorSet = $DataCollectorSetObject
}
if ($DataCollectorSet -is [System.__ComObject]){
$DataCollectorSetName = $DataCollectorSet.Name
if ((-not ($StopTrace.IsPresent)) -and ($null -ne $DataCollectorSet)){
"Starting Monitoring Session for DCS $DataCollectorSetName" | WriteTo-StdOut -ShortFormat
.\TS_MonitorDiagExecution.ps1 -SessionName "PLACollector_$($DataCollectorSetName)" -ScriptBlockToExecute (($Function:CleanDataCollectorSetTrace) -Replace ("ToBeDetermined", $DataCollectorSetName))
}
elseif ($null -ne $DataCollectorSet){
"[Warning] DataCollectorSet [$DataCollectorSetName] is null" | WriteTo-StdOut -ShortFormat
}
if (-not ($DoNotPromptUser.IsPresent)){
$Results = Get-DiagInput -Id "ETLTraceCollectorStopper" -Parameter @{"Title"=$StopTitle; "Description"=$StopDescription}
$TraceTimeDisplay = (GetAgeDescription(New-TimeSpan $TraceTimeStarted))
}
Write-DiagProgress -Activity ($EvtTraceStrings.ID_ETLTraceStopping -replace "%Component%", $ComponentName) -Status ($EvtTraceStrings.ID_ETLTraceStoppingDesc -replace "%Component%", $ComponentName)
if (($StopTrace.IsPresent) -or (($StopTrace.IsPresent -eq $false) -and ($StartTrace.IsPresent -eq $false))){
$OutputFolder = StopDataCollectorSet $DataCollectorSet
#end the TS_MonitorDiagExecution
.\TS_MonitorDiagExecution.ps1 -EndMonitoring -SessionName "PLACollector_$($DataCollectorSetName)"
Write-DiagProgress -Activity ($EvtTraceStrings.ID_ETLTraceCollecting -replace "%Component%", $ComponentName) -Status ($EvtTraceStrings.ID_ETLTraceCollectingDesc -replace "%Component%", $ComponentName)
if ($OutputFileName -is [array]){
$X = 0
ForEach ($OutputFile in $OutputFileName){
if ($FileDescription -is [Array]){
$FDescription = $FileDescription[$x]
}else{
$FDescription = $FileDescription
}
if ($sectionDescription -is [Array]){
$SDescription = $sectionDescription[$x]
}else{
$SDescription = $sectionDescription
}
CollectFiles -filesToCollect ([System.IO.Path]::Combine($OutputFolder, $OutputFile)) -fileDescription $FDescription -sectionDescription $SDescription
$X++
}
}else{
CollectFiles -filesToCollect ([System.IO.Path]::Combine($OutputFolder, $OutputFileName)) -fileDescription $FileDescription -sectionDescription $sectionDescription
}
if (-not ($DisableRootCauseDetected.IsPresent)){
if (Test-Path -Path ([System.IO.Path]::Combine($OutputFolder, $OutputFileName))){
$XMLFileName = "..\ETLCollected.XML"
$MSG_Summary = new-object PSObject
add-member -inputobject $MSG_Summary -membertype noteproperty -name "More Information" -value ("A $TraceTimeDisplay $ComponentName ETL trace was collected for and saved to <a href= `"`#" + $OutputFileName + "`">$OutputFileName</a>.")
($MSG_Summary | ConvertTo-Xml2).Save($XMLFileName)
Update-DiagRootCause -Id RC_ETLCollected -Detected $true -Parameter @{"XMLFileName"=$XMLFileName; "Verbosity"="Informational"; "SectionTitle"="Additional Information"; "Component"=$ComponentName}
}
}
}
}else{
"An error has occurred when setting Data Collector Set. Aborting" | WriteTo-StdOut -ShortFormat
if ($null -ne $DataCollectorSet){
"DataCollectorSet Type Information: " | WriteTo-StdOut -ShortFormat
$DataCollectorSet | Get-Member | Out-String | WriteTo-StdOut -ShortFormat
"DataCollectorSet: " | WriteTo-StdOut -ShortFormat
$DataCollectorSet | WriteTo-StdOut -ShortFormat
}else{
"DataCollectorSet is Null" | WriteTo-StdOut -ShortFormat
}
}
if ($null -ne $DataCollectorSet.Status){
return $DataCollectorSet
}
# SIG # Begin signature block
# MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB5/MSEqRhM/998
# vuki6uZlf1a/4CjlQ29+LoZYZ1kseaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFFw
# bGqBBLIpaNuz0A8iJcBkFHo78TWRzZRsge00CteKMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAEF1U2gmBDF7/FA1GCNxnkVw2zMDN+CERMMS6
# UjX5YfttDmsy8Ky/DpvqLfg7qJDwUg+leuNiGez8DH0/sWJguiKDWkgSO4HeXtjs
# OaIU3nfl7o7qoO7c0Xw+533d4R2SbZW+5wffrTOMnbHju+oulRwrfWEz6rjQ0bmi
# hzTjKE2mrssYmbXkcTW8JL/xikn8sDa+Bc3uhYEbPb7NwzAmc8t6W+u5gKaWB0JM
# 0Yibu0NNmqN/vcpxHVL+UG8RKfpelRVa40P+TqAN5QVFgwUl7ffcHhP608MW71d9
# a82lktnO7/DjDToJOlFLtExaK4f6q8QQ+BB1FGSMC9jxJey6+aGCF7AwghesBgor
# BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDsjRZhAymuzSfFnqV0gd1i8lFp5oTQ/+md
# FUF0vG9ufwIGZutC6/SGGBMyMDI0MTAyODExNDA0MC41MjhaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo0MDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/tCo
# wns0IQsBAAEAAAH+MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzExOFoXDTI1MTAyMjE4MzExOFowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjQwMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# vLwhFxWlqA43olsE4PCegZ4mSfsH2YTSKEYv8Gn3362Bmaycdf5T3tQxpP3NWm62
# YHUieIQXw+0u4qlay4AN3IonI+47Npi9fo52xdAXMX0pGrc0eqW8RWN3bfzXPKv0
# 7O18i2HjDyLuywYyKA9FmWbePjahf9Mwd8QgygkPtwDrVQGLyOkyM3VTiHKqhGu9
# BCGVRdHW9lmPMrrUlPWiYV9LVCB5VYd+AEUtdfqAdqlzVxA53EgxSqhp6JbfEKnT
# dcfP6T8Mir0HrwTTtV2h2yDBtjXbQIaqycKOb633GfRkn216LODBg37P/xwhodXT
# 81ZC2aHN7exEDmmbiWssjGvFJkli2g6dt01eShOiGmhbonr0qXXcBeqNb6QoF8jX
# /uDVtY9pvL4j8aEWS49hKUH0mzsCucIrwUS+x8MuT0uf7VXCFNFbiCUNRTofxJ3B
# 454eGJhL0fwUTRbgyCbpLgKMKDiCRub65DhaeDvUAAJT93KSCoeFCoklPavbgQya
# hGZDL/vWAVjX5b8Jzhly9gGCdK/qi6i+cxZ0S8x6B2yjPbZfdBVfH/NBp/1Ln7xb
# eOETAOn7OT9D3UGt0q+KiWgY42HnLjyhl1bAu5HfgryAO3DCaIdV2tjvkJay2qOn
# F7Dgj8a60KQT9QgfJfwXnr3ZKibYMjaUbCNIDnxz2ykCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBRvznuJ9SU2g5l/5/b+5CBibbHF3TAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAiT4NUvO2lw+0dDMtsBuxmX2o3lVQqnQkuITAGIGCgI+sl7ZqZOTDd8Lq
# xsH4GWCPTztc3tr8AgBvsYIzWjFwioCjCQODq1oBMWNzEsKzckHxAzYo5Sze7OPk
# MA3DAxVq4SSR8y+TRC2GcOd0JReZ1lPlhlPl9XI+z8OgtOPmQnLLiP9qzpTHwFze
# +sbqSn8cekduMZdLyHJk3Niw3AnglU/WTzGsQAdch9SVV4LHifUnmwTf0i07iKtT
# lNkq3bx1iyWg7N7jGZABRWT2mX+YAVHlK27t9n+WtYbn6cOJNX6LsH8xPVBRYAIR
# VkWsMyEAdoP9dqfaZzwXGmjuVQ931NhzHjjG+Efw118DXjk3Vq3qUI1re34zMMTR
# zZZEw82FupF3viXNR3DVOlS9JH4x5emfINa1uuSac6F4CeJCD1GakfS7D5ayNsaZ
# 2e+sBUh62KVTlhEsQRHZRwCTxbix1Y4iJw+PDNLc0Hf19qX2XiX0u2SM9CWTTjsz
# 9SvCjIKSxCZFCNv/zpKIlsHx7hQNQHSMbKh0/wwn86uiIALEjazUszE0+X6rcObD
# fU4h/O/0vmbF3BMR+45rAZMAETJsRDPxHJCo/5XGhWdg/LoJ5XWBrODL44YNrN7F
# RnHEAAr06sflqZ8eeV3FuDKdP5h19WUnGWwO1H/ZjUzOoVGiV3gwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo0MDFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAhGNHD/a7Q0bQ
# LWVG9JuGxgLRXseggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJ0ggwIhgPMjAyNDEwMjgwOTA0MDhaGA8yMDI0
# MTAyOTA5MDQwOFowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6snSCAIBADAKAgEA
# AgIIsAIB/zAHAgEAAgISxjAKAgUA6ssjiAIBADA2BgorBgEEAYRZCgQCMSgwJjAM
# BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB
# CwUAA4IBAQAzScy1wBbpcAxuJLYnsTb2C1R/1ZXPRTrV+7w4izx+oXOHAUu9aHGG
# 0qSOBjk7VgyCvjFMirT11HILBBTHTiJcA1z5b5OIdys0RWWcnLCQGSKItm8KNNpe
# E+oE9viQRHMLsU/3b8huzWEHTDeOOyc8wNVIJCcPXDGQg42Yf1qMqoPpqyCmMTSj
# n3XQ0nllmNeGCeUkdIsNTpwD4mbbVXPVq+KbVt/jatJZw3YrTnjzg1j5AdrolA/a
# N3CjM0gf25XwDETanz7KLbHkfz5gxAN8qJTYbSOoyGTYr8cl5Rqrrp+0jwplK+S9
# FVUpwZNtKUwYSNiOSsA9S5bfDmOgcd8kMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH+0KjCezQhCwEAAQAAAf4wDQYJYIZI
# AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG
# 9w0BCQQxIgQg1w0nAgfRI0dH+uN7ODs3BmrMhi8lNvwOklFgLalGEhEwgfoGCyqG
# SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCARhczd/FPInxjR92m2hPWqc+vGOG1+/I0W
# tkCstyh0eTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz
# AAAB/tCowns0IQsBAAEAAAH+MCIEIBHab5Kt80GYeIFqPjdXAVG0HIgzkQ3JSwH6
# 5KUaSnvoMA0GCSqGSIb3DQEBCwUABIICAI50mkWuBi6EKcYQFbJkF89wIA8Gb9Zw
# MsHAvHEMtiBGJEisNQNro6OjJl1PgMB9HsKptEB1IT6adPW8yVZfQcp1iK6yN8++
# GGJ867HwUdK4EAj/Q4QHpDcmh9U9HTvtTqnHaV2z1JYpFV/4jsIjpffZwQwyOHbk
# QiFS55Y8P2xI2GrSvPRN7IcXIkZv6VpgddzSfdXauM3zV4WiWlIYG4V6bkCdS9dK
# eUsoe5YIaYXFRhCJAL3Qri10RnEWO/6zQd5uI1jJ9n/ablya7hkB45N0DppNkunq
# xxZjMzMgi7TqO1K5k4Qt57V2p3MaCrL746qouAyntkDcNUhmQWlinN5w3Xy0RxE/
# zADTjwL9jP6xxrw6HUujL23Hk8GITX7riRRv+theT4elxk85nGFdYckoLtqGc44s
# JyHyzCsLfHKY5H/cxBUQ0WLOCaCHnzNGJSYbLX4jJNr+4tByxI1LR9G8/Yomefie
# DuProzbuMOXYIq8/7fgFaJtpwOdZwtG2AGgEcKEDeH5A3trSUd5iTFJbM57O9eUz
# 4KZe1YYQowx1ykkPl164y8YvorQRX9BAt/9SCdfUHkf2JX1OBhNslZ2WpjMw88ta
# txKM5lamoVEeWJ5FFGIBmFhUvcUvPrSvK+7oycmibqyG2j6fGe6miURlpVdljMa7
# 0EqUG05P8Gry
# SIG # End signature block
|
combined_dataset/train/non-malicious/728.ps1 | 728.ps1 |
function New-RsFolder
{
[cmdletbinding()]
param
(
[Parameter(Mandatory = $True)]
[Alias('ItemPath','Path')]
[string]
$RsFolder,
[Parameter(Mandatory = $True)]
[Alias('Name')]
[string]
$FolderName,
[string]
$Description,
[switch]
$Hidden,
[string]
$ReportServerUri,
[Alias('ReportServerCredentials')]
[System.Management.Automation.PSCredential]
$Credential,
$Proxy
)
$Proxy = New-RsWebServiceProxyHelper -BoundParameters $PSBoundParameters
$namespace = $proxy.GetType().Namespace
$propertyDataType = "$namespace.Property"
$additionalProperties = New-Object System.Collections.Generic.List[$propertyDataType]
if ($Description)
{
$descriptionProperty = New-Object $propertyDataType
$descriptionProperty.Name = 'Description'
$descriptionProperty.Value = $Description
$additionalProperties.Add($descriptionProperty)
}
if ($Hidden)
{
$hiddenProperty = New-Object $propertyDataType
$hiddenProperty.Name = 'Hidden'
$hiddenProperty.Value = $Hidden
$additionalProperties.Add($hiddenProperty)
}
try
{
Write-Verbose "Creating folder $($FolderName)..."
$Proxy.CreateFolder($FolderName, $RsFolder, $additionalProperties) | Out-Null
Write-Verbose "Folder $($FolderName) created successfully!"
}
catch
{
throw (New-Object System.Exception("Exception occurred while creating folder! $($_.Exception.Message)", $_.Exception))
}
} |
combined_dataset/train/non-malicious/sample_60_48.ps1 | sample_60_48.ps1 | # ------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License (MIT). See License.txt in the repo root for license information.
# ------------------------------------------------------------
function Copy-ToTemp
{
<#
.SYNOPSIS
Copies files to a temp folder.
.PARAMETER From
Source location from which to copy files.
.PARAMETER Name
Folder name within temp location to store the files.
#>
[CmdletBinding()]
Param
(
[String]
$From,
[String]
$Name
)
if (!(Test-Path $From))
{
return $null
}
$To = $env:Temp + '\' + $Name
if (Test-Path $To)
{
Remove-Item -Path $To -Recurse -ErrorAction Stop | Out-Null
}
New-Item $To -ItemType directory | Out-Null
robocopy "$From" "$To" /E /MT | Out-Null
# robocopy has non-standard exit values that are documented here: https://support.microsoft.com/en-us/kb/954404
# Exit codes 0-8 are considered success, while all other exit codes indicate at least one failure.
# Some build systems treat all non-0 return values as failures, so we massage the exit code into
# something that they can understand.
if (($LASTEXITCODE -ge 0) -and ($LASTEXITCODE -le 8))
{
# Simply setting $LASTEXITCODE in this script will not override the script's exit code.
# We need to start a new process and let it exit.
PowerShell -NoProfile -Command "exit 0"
}
return $env:Temp + '\' + $Name
}
function Expand-ToFolder
{
<#
.SYNOPSIS
Unzips the zip file to the specified folder.
.PARAMETER From
Source location to unzip
.PARAMETER Name
Folder name to expand the files to.
#>
[CmdletBinding()]
Param
(
[String]
$File,
[String]
$Destination
)
if (!(Test-Path $File))
{
return
}
if (Test-Path $Destination)
{
Remove-Item -Path $Destination -Recurse -ErrorAction Stop | Out-Null
}
New-Item $Destination -ItemType directory | Out-Null
Write-Verbose -Message "Attempting to Unzip $File to location $Destination"
try
{
[System.Reflection.Assembly]::LoadWithPartialName("System.IO.Compression.FileSystem") | Out-Null
[System.IO.Compression.ZipFile]::ExtractToDirectory("$File", "$Destination")
}
catch
{
Write-Error -Message "Unexpected Error. Error details: $_.Exception.Message"
}
}
function Compress-ToFile
{
<#
.SYNOPSIS
Compress the Source Directory to a zip file.
.PARAMETER SourceDir
Path of the directory to zip
.PARAMETER FileName
Name of the zip file to generate.
#>
[CmdletBinding()]
Param
(
[String]
$SourceDir,
[String]
$FileName
)
if (!(Test-Path $SourceDir))
{
return
}
try
{
[System.Reflection.Assembly]::LoadWithPartialName("System.IO.Compression.FileSystem") | Out-Null
$compressionLevel = [System.IO.Compression.CompressionLevel]::Optimal
[System.IO.Compression.ZipFile]::CreateFromDirectory($SourceDir,$FileName, $compressionLevel, $false)
}
catch
{
Write-Error -Message "Unexpected Error. Error details: $_.Exception.Message"
}
}
function Get-NamesFromApplicationManifest
{
<#
.SYNOPSIS
Returns an object containing common information from the application manifest.
.PARAMETER ApplicationManifestPath
Path to the application manifest file.
#>
[CmdletBinding()]
Param
(
[String]
$ApplicationManifestPath
)
if (!(Test-Path $ApplicationManifestPath))
{
throw "$ApplicationManifestPath is not found."
}
$appXml = [xml] (Get-Content $ApplicationManifestPath -Encoding UTF8)
if (!$appXml)
{
return
}
$appMan = $appXml.ApplicationManifest
$FabricNamespace = 'fabric:'
$appTypeSuffix = 'Type'
$h = @{
FabricNamespace = $FabricNamespace;
ApplicationTypeName = $appMan.ApplicationTypeName;
ApplicationTypeVersion = $appMan.ApplicationTypeVersion;
}
Write-Output (New-Object psobject -Property $h)
}
function Get-ImageStoreConnectionStringFromClusterManifest
{
<#
.SYNOPSIS
Returns the value of the image store connection string from the cluster manifest.
.PARAMETER ClusterManifest
Contents of cluster manifest file.
#>
[CmdletBinding()]
Param
(
[xml]
$ClusterManifest
)
$managementSection = $ClusterManifest.ClusterManifest.FabricSettings.Section | ? { $_.Name -eq "Management" }
return $managementSection.ChildNodes | ? { $_.Name -eq "ImageStoreConnectionString" } | Select-Object -Expand Value
}
function Get-ApplicationNameFromApplicationParameterFile
{
<#
.SYNOPSIS
Returns Application Name from ApplicationParameter xml file.
.PARAMETER ApplicationParameterFilePath
Path to the application parameter file
#>
[CmdletBinding()]
Param
(
[String]
$ApplicationParameterFilePath
)
if (!(Test-Path $ApplicationParameterFilePath))
{
$errMsg = "$ApplicationParameterFilePath is not found."
throw $errMsg
}
return ([xml] (Get-Content $ApplicationParameterFilePath -Encoding UTF8)).Application.Name
}
function Get-ApplicationParametersFromApplicationParameterFile
{
<#
.SYNOPSIS
Reads ApplicationParameter xml file and returns HashTable containing ApplicationParameters.
.PARAMETER ApplicationParameterFilePath
Path to the application parameter file
#>
[CmdletBinding()]
Param
(
[String]
$ApplicationParameterFilePath
)
if (!(Test-Path $ApplicationParameterFilePath))
{
throw "$ApplicationParameterFilePath is not found."
}
$ParametersXml = ([xml] (Get-Content $ApplicationParameterFilePath -Encoding UTF8)).Application.Parameters
$hash = @{}
$ParametersXml.ChildNodes | foreach {
if ($_.LocalName -eq 'Parameter') {
$hash[$_.Name] = $_.Value
}
}
return $hash
}
function Get-ServiceParametersFromServiceParameterFile
{
<#
.SYNOPSIS
Reads ServiceParameter xml file and returns HashTable containing ServiceParameters.
.PARAMETER ServiceParameterFilePath
Path to the service parameter file
#>
[CmdletBinding()]
Param
(
[String]
$ServiceParameterFilePath
)
if (!(Test-Path $ServiceParameterFilePath))
{
throw "$ServiceParameterFilePath is not found."
}
$ParametersXml = ([xml] (Get-Content $ServiceParameterFilePath -Encoding UTF8)).StartupServices.Parameters
$hash = @{}
$ParametersXml.ChildNodes | foreach {
if ($_.LocalName -eq 'Parameter') {
$hash[$_.Name] = $_.Value
}
}
return $hash
}
function Get-ApplicationParametersFromApplicationManifestFile
{
<#
.SYNOPSIS
Reads ApplicationManifest xml file and returns HashTable containing ApplicationParameters.
.PARAMETER ApplicationManifestFilePath
Path to the application parameter file
#>
[CmdletBinding()]
Param
(
[String]
$ApplicationManifestFilePath
)
if (!(Test-Path $ApplicationManifestFilePath))
{
throw "$ApplicationManifestFilePath is not found."
}
$ParametersXml = ([xml] (Get-Content $ApplicationManifestFilePath -Encoding UTF8)).ApplicationManifest.Parameters
$hash = @{}
if($ParametersXml -and $ParametersXml.HasChildNodes)
{
$ParametersXml.ChildNodes | foreach {
if ($_.LocalName -eq 'Parameter') {
$hash[$_.Name] = $_.Value
}
}
}
return $hash
}
function Merge-HashTables
{
<#
.SYNOPSIS
Merges 2 hashtables. Key, value pairs form HashTableNew are preserved if any duplciates are found between HashTableOld & HashTableNew.
.PARAMETER HashTableOld
First Hashtable.
.PARAMETER HashTableNew
Second Hashtable
#>
[CmdletBinding()]
Param
(
[HashTable]
$HashTableOld,
[HashTable]
$HashTableNew
)
$keys = $HashTableOld.getenumerator() | foreach-object {$_.key}
$keys | foreach-object {
$key = $_
if ($HashTableNew.containskey($key))
{
$HashTableOld.remove($key)
}
}
$HashTableNew = $HashTableOld + $HashTableNew
return $HashTableNew
}
function Get-ServiceParameters
{
[cmdletbinding()]
Param
(
[Parameter(Mandatory=$true)]
[System.Xml.XmlLinkedNode]$Service,
[Parameter(Mandatory=$true)]
[System.Xml.XmlLinkedNode]$ServiceObject,
[Parameter(Mandatory=$true)]
[Hashtable]$Parameters
)
$ServiceParameters = @{}
# Get ServicePackageActivationMode
$ServicePackageActivationMode = $Service.ServicePackageActivationMode
if($ServicePackageActivationMode -AND $ServicePackageActivationMode.StartsWith("[") -AND $ServicePackageActivationMode.EndsWith("]"))
{
$ServicePackageActivationMode = GetValueFromHashTable -Parameters $Parameters -Key $ServicePackageActivationMode.Substring(1, $ServicePackageActivationMode.Length-2)
}
# Get ServiceDnsName
$ServiceDnsName = $Service.ServiceDnsName
if($ServiceDnsName -AND $ServiceDnsName.StartsWith("[") -AND $ServiceDnsName.EndsWith("]"))
{
$ServiceDnsName = GetValueFromHashTable -Parameters $Parameters -Key $ServiceDnsName.Substring(1, $ServiceDnsName.Length-2)
}
# Get ServiceTypeName
$ServiceTypeName = $ServiceObject.ServiceTypeName
if($ServiceTypeName -AND $ServiceTypeName.StartsWith("[") -AND $ServiceTypeName.EndsWith("]"))
{
$ServiceTypeName = GetValueFromHashTable -Parameters $Parameters -Key $ServiceTypeName.Substring(1, $ServiceTypeName.Length-2)
}
# Get Instance_Count
$InstanceCount = $ServiceObject.InstanceCount
if($InstanceCount -AND $InstanceCount.StartsWith("[") -AND $InstanceCount.EndsWith("]"))
{
$InstanceCount = GetValueFromHashTable -Parameters $Parameters -Key $InstanceCount.Substring(1, $InstanceCount.Length-2)
}
# Get MinInstanceCount
$MinInstanceCount = $ServiceObject.MinInstanceCount
if($MinInstanceCount -AND $MinInstanceCount.StartsWith("[") -AND $MinInstanceCount.EndsWith("]"))
{
$MinInstanceCount = GetValueFromHashTable -Parameters $Parameters -Key $MinInstanceCount.Substring(1, $MinInstanceCount.Length-2)
}
# Get MinInstancePercentage
$MinInstancePercentage = $ServiceObject.MinInstancePercentage
if($MinInstancePercentage -AND $MinInstancePercentage.StartsWith("[") -AND $MinInstancePercentage.EndsWith("]"))
{
$MinInstancePercentage = GetValueFromHashTable -Parameters $Parameters -Key $MinInstancePercentage.Substring(1, $MinInstancePercentage.Length-2)
}
# Get PlacementConstraint
$PlacementConstraint = $ServiceObject.PlacementConstraints
if($PlacementConstraint -AND $PlacementConstraint.StartsWith("[") -AND $PlacementConstraint.EndsWith("]"))
{
$PlacementConstraint = GetValueFromHashTable -Parameters $Parameters -Key $PlacementConstraint.Substring(1, $PlacementConstraint.Length-2)
}
# Get Metric
$Metric = $ServiceObject.Metric
if($Metric -AND $Metric.StartsWith("[") -AND $Metric.EndsWith("]"))
{
$Metric = GetValueFromHashTable -Parameters $Parameters -Key $Metric.Substring(1, $Metric.Length-2)
}
# Get Correlation
$Correlation = $ServiceObject.Correlation
if($Correlation -AND $Correlation.StartsWith("[") -AND $Correlation.EndsWith("]"))
{
$Correlation = GetValueFromHashTable -Parameters $Parameters -Key $Correlation.Substring(1, $Correlation.Length-2)
}
# Get PlacementPolicy
$PlacementPolicy = $ServiceObject.PlacementPolicy
if($PlacementPolicy -AND $PlacementPolicy.StartsWith("[") -AND $PlacementPolicy.EndsWith("]"))
{
$PlacementPolicy = GetValueFromHashTable -Parameters $Parameters -Key $PlacementPolicy.Substring(1, $PlacementPolicy.Length-2)
}
# Get DefaultMoveCost
$DefaultMoveCost = $ServiceObject.DefaultMoveCost
if($DefaultMoveCost -AND $DefaultMoveCost.StartsWith("[") -AND $DefaultMoveCost.EndsWith("]"))
{
$DefaultMoveCost = GetValueFromHashTable -Parameters $Parameters -Key $DefaultMoveCost.Substring(1, $DefaultMoveCost.Length-2)
}
# Get InstanceCloseDelayDuration
$InstanceCloseDelayDuration = $ServiceObject.InstanceCloseDelayDuration
if($InstanceCloseDelayDuration -AND $InstanceCloseDelayDuration.StartsWith("[") -AND $InstanceCloseDelayDuration.EndsWith("]"))
{
$InstanceCloseDelayDuration = GetValueFromHashTable -Parameters $Parameters -Key $InstanceCloseDelayDuration.Substring(1, $InstanceCloseDelayDuration.Length-2)
}
# Determine partition type and other partition related values
if($ServiceObject.Item("SingletonPartition"))
{
$PartitionItem = $ServiceObject.Item("SingletonPartition")
$ServiceParameters.add("PartitionScheme", "PartitionSchemeSingleton")
}
elseif($ServiceObject.Item("UniformInt64Partition"))
{
$PartitionItem = $ServiceObject.Item("UniformInt64Partition")
$PartitionCount = $PartitionItem.PartitionCount
if($PartitionCount -AND $PartitionCount.StartsWith("[") -AND $PartitionCount.EndsWith("]"))
{
$PartitionCount = GetValueFromHashTable -Parameters $Parameters -Key $PartitionCount.Substring(1, $PartitionCount.Length-2)
}
$LowKey = $PartitionItem.LowKey
if($LowKey -AND $LowKey.StartsWith("[") -AND $LowKey.EndsWith("]"))
{
$LowKey = GetValueFromHashTable -Parameters $Parameters -Key $LowKey.Substring(1, $LowKey.Length-2)
}
$Highkey = $PartitionItem.HighKey
if($Highkey -AND $Highkey.StartsWith("[") -AND $Highkey.EndsWith("]"))
{
$Highkey = GetValueFromHashTable -Parameters $Parameters -Key $Highkey.Substring(1, $Highkey.Length-2)
}
$ServiceParameters.add("PartitionScheme", "PartitionSchemeUniformInt64")
if($LowKey)
{
$ServiceParameters.add("LowKey", $LowKey)
}
if($Highkey)
{
$ServiceParameters.add("Highkey", $Highkey)
}
}
elseif($ServiceObject.Item("NamedPartition"))
{
$PartitionItem = $ServiceObject.Item("NamedPartition")
$NameList = [System.Collections.ArrayList]@()
foreach($Child in $PartitionItem.ChildNodes)
{
[void]$NameList.Add($Child.Name)
}
$ServiceParameters.add("PartitionScheme", "PartitionSchemeNamed")
if($NameList)
{
$ServiceParameters.add("PartitionNames", $NameList)
}
}
$TargetReplicaSetSize = $ServiceObject.TargetReplicaSetSize
if($TargetReplicaSetSize -AND $TargetReplicaSetSize.StartsWith("[") -AND $TargetReplicaSetSize.EndsWith("]"))
{
$TargetReplicaSetSize = GetValueFromHashTable -Parameters $Parameters -Key $TargetReplicaSetSize.Substring(1, $TargetReplicaSetSize.Length-2)
}
$MinReplicaSetSize = $ServiceObject.MinReplicaSetSize
if($MinReplicaSetSize -AND $MinReplicaSetSize.StartsWith("[") -AND $MinReplicaSetSize.EndsWith("]"))
{
$MinReplicaSetSize = GetValueFromHashTable -Parameters $Parameters -Key $MinReplicaSetSize.Substring(1, $MinReplicaSetSize.Length-2)
}
$ReplicaRestartWaitDuration = $ServiceObject.ReplicaRestartWaitDuration
if($ReplicaRestartWaitDuration -AND $ReplicaRestartWaitDuration.StartsWith("[") -AND $ReplicaRestartWaitDuration.EndsWith("]"))
{
$ReplicaRestartWaitDuration = GetValueFromHashTable -Parameters $Parameters -Key $ReplicaRestartWaitDuration.Substring(1, $ReplicaRestartWaitDuration.Length-2)
}
$QuorumLossWaitDuration = $ServiceObject.QuorumLossWaitDuration
if($QuorumLossWaitDuration -AND $QuorumLossWaitDuration.StartsWith("[") -AND $QuorumLossWaitDuration.EndsWith("]"))
{
$QuorumLossWaitDuration = GetValueFromHashTable -Parameters $Parameters -Key $QuorumLossWaitDuration.Substring(1, $QuorumLossWaitDuration.Length-2)
}
$StandByReplicaKeepDuration = $ServiceObject.StandByReplicaKeepDuration
if($StandByReplicaKeepDuration -AND $StandByReplicaKeepDuration.StartsWith("[") -AND $StandByReplicaKeepDuration.EndsWith("]"))
{
$StandByReplicaKeepDuration = GetValueFromHashTable -Parameters $Parameters -Key $StandByReplicaKeepDuration.Substring(1, $StandByReplicaKeepDuration.Length-2)
}
if($ServicePackageActivationMode)
{
$ServiceParameters.add("ServicePackageActivationMode", $ServicePackageActivationMode)
}
if($ServiceDnsName)
{
$ServiceParameters.add("ServiceDnsName", $ServiceDnsName)
}
if($ServiceTypeName)
{
$ServiceParameters.add("ServiceTypeName", $ServiceTypeName)
}
if($InstanceCount)
{
$ServiceParameters.add("InstanceCount", $InstanceCount)
}
if($MinInstanceCount)
{
$ServiceParameters.add("MinInstanceCount", $MinInstanceCount)
}
if($MinInstancePercentage)
{
$ServiceParameters.add("MinInstancePercentage", $MinInstancePercentage)
}
if($PlacementConstraint)
{
$ServiceParameters.add("PlacementConstraint", $PlacementConstraint)
}
if($Metric)
{
$ServiceParameters.add("Metric", $Metric)
}
if($Correlation)
{
$ServiceParameters.add("Correlation", $Correlation)
}
if($PlacementPolicy)
{
$ServiceParameters.add("PlacementPolicy", $PlacementPolicy)
}
if($DefaultMoveCost)
{
$ServiceParameters.add("DefaultMoveCost", $DefaultMoveCost)
}
if($InstanceCloseDelayDuration)
{
$ServiceParameters.add("InstanceCloseDelayDuration", $InstanceCloseDelayDuration)
}
if($PartitionCount)
{
$ServiceParameters.add("PartitionCount", $PartitionCount)
}
if($TargetReplicaSetSize)
{
$ServiceParameters.add("TargetReplicaSetSize", $TargetReplicaSetSize)
}
if($MinReplicaSetSize)
{
$ServiceParameters.add("MinReplicaSetSize", $MinReplicaSetSize)
}
if($ReplicaRestartWaitDuration)
{
$ServiceParameters.add("ReplicaRestartWaitDuration", $ReplicaRestartWaitDuration)
}
if($QuorumLossWaitDuration)
{
$ServiceParameters.add("QuorumLossWaitDuration", $QuorumLossWaitDuration)
}
if($StandByReplicaKeepDuration)
{
$ServiceParameters.add("StandByReplicaKeepDuration", $StandByReplicaKeepDuration)
}
return $ServiceParameters
}
function Create-StatelessService
{
[cmdletbinding()]
Param
(
[Parameter(Mandatory=$true)]
[String]$ApplicationName,
[Parameter(Mandatory=$true)]
[System.Xml.XmlLinkedNode]$Service,
[Parameter(Mandatory=$true)]
[Hashtable]$Parameters
)
$ServiceObject = $Service.StatelessService
$ServiceParameters = Get-ServiceParameters -Service $Service -ServiceObject $ServiceObject -Parameters $Parameters
# Get Service Name
$ServiceName = $ApplicationName + "/" + $Service.Name
if($ServiceName)
{
$ServiceParameters.add("ServiceName", $ServiceName)
}
if($ApplicationName)
{
$ServiceParameters.add("ApplicationName", $ApplicationName)
}
$PartitionScheme = $ServiceParameters.Item("PartitionScheme")
$ServiceParameters.Remove("PartitionScheme")
if($PartitionScheme -eq "PartitionSchemeSingleton")
{
New-ServiceFabricService -Stateless -PartitionSchemeSingleton @ServiceParameters
}
elseif($PartitionScheme -eq "PartitionSchemeUniformInt64")
{
New-ServiceFabricService -Stateless -PartitionSchemeUniformInt64 @ServiceParameters
}
elseif($PartitionScheme -eq "PartitionSchemeNamed")
{
New-ServiceFabricService -Stateless -PartitionSchemeNamed @ServiceParameters
}
else
{
$errMessage = "PartitionScheme not found, not able to create service"
throw $errMessage
}
if(!$?)
{
$errMessage = "Error while creating service : $ServiceName"
throw $errMessage
}
else
{
Write-Host "Service : $ServiceName created successfully."
}
}
function Create-StatefulService
{
[cmdletbinding()]
Param
(
[Parameter(Mandatory=$true)]
[String]$ApplicationName,
[Parameter(Mandatory=$true)]
[System.Xml.XmlLinkedNode]$Service,
[Parameter(Mandatory=$true)]
[Hashtable]$Parameters,
[Parameter(Mandatory=$true)]
[Hashtable]$PersistedStateTable
)
$ServiceObject = $Service.StatefulService
$ServiceParameters = Get-ServiceParameters -Service $Service -ServiceObject $ServiceObject -Parameters $Parameters
$HasPersistedState = $PersistedStateTable[$ServiceObject.ServiceTypeName]
# Get Service Name
$ServiceName = $ApplicationName + "/" + $Service.Name
if($ServiceName)
{
$ServiceParameters.add("ServiceName", $ServiceName)
}
if($ApplicationName)
{
$ServiceParameters.add("ApplicationName", $ApplicationName)
}
$PartitionScheme = $ServiceParameters.Item("PartitionScheme")
$ServiceParameters.Remove("PartitionScheme")
if($PartitionScheme -eq "PartitionSchemeSingleton")
{
if($HasPersistedState -eq "true")
{
New-ServiceFabricService -Stateful -HasPersistedState -PartitionSchemeSingleton @ServiceParameters
}
else
{
New-ServiceFabricService -Stateful -PartitionSchemeSingleton @ServiceParameters
}
}
elseif($PartitionScheme -eq "PartitionSchemeUniformInt64")
{
if($HasPersistedState -eq "true")
{
New-ServiceFabricService -Stateful -HasPersistedState -PartitionSchemeUniformInt64 @ServiceParameters
}
else
{
New-ServiceFabricService -Stateful -PartitionSchemeUniformInt64 @ServiceParameters
}
}
elseif($PartitionScheme -eq "PartitionSchemeNamed")
{
if($HasPersistedState -eq "true")
{
New-ServiceFabricService -Stateful -HasPersistedState -PartitionSchemeNamed @ServiceParameters
}
else
{
New-ServiceFabricService -Stateful -PartitionSchemeNamed @ServiceParameters
}
}
else
{
$errMessage = "PartitionScheme not found, not able to create service"
throw $errMessage
}
if(!$?)
{
$errMessage = "Error while creating service : $ServiceName"
throw $errMessage
}
else
{
Write-Host "Service : $ServiceName created successfully."
}
}
function Find-ServiceType
{
<#
.SYNOPSIS
Based on service variable, it finds out whether service is Stateful or Stateless
.PARAMETER Service
Service variable
#>
[CmdletBinding()]
Param
(
[System.Xml.XmlLinkedNode]
$Service
)
if($Service.StatelessService)
{
return "Stateless"
}
elseif($Service.StatefulService)
{
return "Stateful"
}
else
{
return $null
}
}
function ReadParametersAsHashTable
{
param
(
[Parameter(Mandatory=$true,ParameterSetName="Parameters")]
[System.Xml.XmlLinkedNode]$Parameters
)
$hash = @{}
foreach($child in $Parameters.ChildNodes)
{
$hash.add($child.Name, $child.DefaultValue)
}
return $hash
}
function GetValueFromHashTable
{
[cmdletbinding()]
Param
( [Parameter(Mandatory=$true)]
[Hashtable]$Parameters,
[Parameter(Mandatory=$true)]
[String]$Key
)
return $Parameters.Item($Key)
}
# SIG # Begin signature block
# MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD+aubrDU1EkDj+
# u+BfGy8yYouhOn4NoNOEX/prXuEo1KCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPyVFSUnRXibi+sIB8Tvp16H
# hqIAgsIe2vgs00LDlKAvMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEASv8rTEemsrP03TRU3APngTN7h943dp9LJeL2wjTjAg404r/1mSoDr20h
# NoMQQJ7Z+TN3HYnA2Te8g5ZfSLfwSsfbyAJXno3rvaGOHOltZ+oghA34jEOTzlDG
# 1nXpoSNeHAaed1HQ0tJnVQ7RLSVqKWDS2MJYQsVDpi5LEGxldCDYKDFuHW43AVxE
# Z4UQJGZ5JtNLbN8upSKP1SrkXyNY7a4nV3CUsMV81cpdqaUqGHLpZi9IEOdanHbr
# TDu/8CmlSx/opdhlpRLQAoYClSlNb97ehJG4/+2iCIlFKVEDnQLTkabiHIimjwc+
# eGcFaa/hNXEF70pALTPyLNdWpyNCfaGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC
# FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAJJInuqv3icaGvGl8j8XpmEd7mskdP+10FCls7Pmi6TwIGZbqfp57w
# GBMyMDI0MDIxNTE3NDk1My43MjhaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC
# RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b
# cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E
# 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2
# aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er
# bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf
# ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog
# 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy
# kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy
# 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv
# mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+
# yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt
# vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV
# izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4
# 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r
# cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W
# JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq
# bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt
# ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg
# ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ
# CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz
# FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn
# boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58
# 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv
# uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow
# ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOl4OVUwIhgPMjAyNDAyMTUxNTE4NDVaGA8yMDI0MDIxNjE1MTg0NVowdzA9Bgor
# BgEEAYRZCgQBMS8wLTAKAgUA6Xg5VQIBADAKAgEAAgIBcwIB/zAHAgEAAgIR0DAK
# AgUA6XmK1QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKCvblXsjSLTfd3P
# 2QAQZYrNwkQ+oIyY49nPcXdtze0vTtWfJp93KvNmW7EacU5+5PJvRdZwUMOgaWcg
# EEzMxyxYm8/DmXBrrpJhnYLohJO7QNl5GLxhMXF+RS/JBObcDi9W3g5gSeo8C+3x
# c2BhlJiOuQ3e9kXbp7yyoJsu+4rvMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgW3qMwU7uN0pJYFipetryKedz4tXzF76rjmi0vEIRutMwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndIC
# Oxg9xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 2o7VyVoA0RGxAAEAAAHaMCIEIB7rxM/LsedRyf1X20Ifl3wW+XS9YShocIhKX9T9
# BZOBMA0GCSqGSIb3DQEBCwUABIICADFd2zUE2UxmVy3j9seV6RqbDTg9kyJg+hDg
# Ok/VwPRYZUAu6BfoQX8ZnYPNHINGWdF3axogIZGRig71AZdpAJ6GNsIzFfwq3gJJ
# 5NOJbWrB2QpLLqyiG+s9Jgnot8fssn8YmpZFpYx0x1ojS8L6mI0FwHVkkEC6ZODG
# A9a+wxx9psW72+K95LTjIArYYJbrB/zGxUZHMWmqhNxFTutOPJUnY1JEd4Za4c5+
# rbKZI3kwhPEC6+i/yu12vf9ZnfvefJVFuW8dNrrJyFUjEbCuSQF+KKtJFz2ov6Cw
# 8GE7m2FiFkVyERfBH05zC86iMy945ewfC+O7PiAumWzponGvTgKZCsiPsk3dcJdy
# l/dF7EiGPpDbTRs3HPihejOESiIFyd3Ny0xYbrfjsPF/4py9v072IUALjZgWivf0
# qyVWh8U/iC0gwUqEb6VpIgTwif8wWTPh1GmdIpN6zUEfHOhh4CyklPqd2nlQt96p
# O1fOU8sB4yzV/c2nvB1okFT9AxfLHWNdaztU5+8SPXSiXD0c51oLUIVIV3QYeIW6
# Qu6cKEhWhTygsnIHqdSqGbMtH61pv23Wgty8eDru2OxWBIb7y+6fpIcLFaUX1Nqb
# iMxPzyDq0kClwlGmAmx86FKlWtx1iGzwI5Xw+PE2/DR9LUcrgvdPL0GtjrnoMShz
# OjO2zR2o
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_58_33.ps1 | sample_58_33.ps1 | #
# Module manifest for module 'DscInstall'
#
# Generated by: Zia Jalali
#
# Generated on: 07/31/2017
#
@{
# Script module or binary module file associated with this manifest.
ModuleToProcess = 'Heartbeat.psm1'
# Version number of this module.
ModuleVersion = '1.1'
# ID used to uniquely identify this module
GUID = '3740b029-0ed3-4ae6-bd82-883ab79c843b'
# Author of this module
Author = 'Microsoft Corporation'
# Company or vendor of this module
CompanyName = 'Microsoft Corporation'
# Copyright statement for this module
Copyright = '(c) 2017 Microsoft Corporation. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This module is used to sent GCAgent heartbeat.'
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '5.0'
# Name of the Windows PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the Windows PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module
# CLRVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
# RequiredModules = @('')
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module
FunctionsToExport = @('Send-Heartbeat','Test-AutomationDscRegistration','Test-ChangeTrackingEnabled')
# Cmdlets to export from this module
# CmdletsToExport = @('')
# Variables to export from this module
# VariablesToExport = '*'
# Aliases to export from this module
# AliasesToExport = @('')
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess
# PrivateData = ''
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
# SIG # Begin signature block
# MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBUINAHFnbW6Hcl
# JQEkuvQOXlkiQdLKkGiMcqRZFtayjKCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOH5
# R+AeS+5FX2Y0Vji3cfWGWrVlu/I1PL1DdMvYwOwqMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEABQQ3Qoiom4V7+k/KISwM9vn7rO7Lw5lgqdpL
# TUULtoeZOC1gp0g2YiBR7AlgAnSn4S3TcxYvjG6fCpAtxSFfCRptsTyfF5jA+FuZ
# bmWMRktCPFRwhojBjttjGc1ObFnEnq6UPPlwPTNuOIEO8ufUZKuoa4WTvxF2y+Kx
# rGuW6MwFZ0eeZzG2gn+fzgrEaoHamLsa96nqgy5ogXo4dcx2c/w4XbE30RdDSJBX
# zuMA0fS7V0z5/afeKb/RCfYxd68PdA7cj5FFThnYYAmA/XZmJMapDIw4DkojRURS
# /UfbRQ19JVpYcS4febL/U66iKLim/Wk6X1I0WCT83wHsr1djeKGCFykwghclBgor
# BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDUo7f6f6uY5fHWpNBSPDxPLd0xpcJhzrfE
# kb1+5q21IQIGZldUeSe4GBMyMDI0MDYxNzIyMTQzMy4yNTlaMASAAgH0oIHYpIHV
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHimZmV
# 8dzjIOsAAQAAAeIwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjpGQzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVj
# tZhV+kFmb8cKQpg2mzisDlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC
# 7jS03JkcrPsWi9WpVwsIckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJ
# bsE3wMmpmJasPWpgF05zZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmU
# Xs7ICxDJr5a39SSePAJRIyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwne
# tSePg88EmRezr2T3HTFElneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfF
# cS4XElf3GSERnlzJsK7s/ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4
# eQszYxq4c4HqPnUu4hT4aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdth
# FCBepxfb6nbsp3fcZaPBfTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCW
# ACoj78XUwYqy1HyYnStTme4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKv
# NNsTVm4QbqphCyknrwByqorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3u
# fASdPrgPhsQIRFkHZGuihL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNV
# HQ4EFgQURIQOEdq+7QdslptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D
# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l
# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD
# ggIBAORURDGrVRTbnulfsg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3
# ka76Yz0t/6lxuczI6w7tXq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwL
# hP1PGC5tvXK0xYomU1nU+lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrX
# a2daCOGnxuaD1IO+65E7qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0gan
# hFzzHAnWjtNWneU11WQ6Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVl
# UE3zIikoSed+8s61NDP+x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIo
# ycVTvBQpv/drRJD68eo401mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iO
# aKZ75vuQg7hCiBA5xIm5ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqv
# E8Aq38QmKgTiBnWSS/uVPcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhS
# gCIGJUZDA7336nQD8fn4y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv
# 1ug7dS/Dfrcd1sn2E4gk4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIB
# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1
# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O
# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn
# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t
# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq
# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP
# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW
# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv
# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb
# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc
# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a
# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB
# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw
# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E
# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB
# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/
# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ
# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v
# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h
# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x
# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p
# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A
# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC
# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB
# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt
# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3
# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV
# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw
# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB
# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjpGQzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhf
# iB1d8pTohm+ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAOoa3D0wIhgPMjAyNDA2MTgwMDAxMDFaGA8yMDI0MDYx
# OTAwMDEwMVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6hrcPQIBADAHAgEAAgIc
# pTAHAgEAAgIfhjAKAgUA6hwtvQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE
# AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB
# AA32MtNyryDNDrYWoRWSNxyHqAPVp6lzFUM8ZNF1Hx1W5OgnqNWT5x7TOP7Bk+Zh
# MkDC3cC8OSL71CWWNS5JFA5Tlu9gvpDcMPzlORZg5n6wInIpL/DqVB0F5Y2Zeyzh
# LtuX8D52Nn69sGzwHkREhcWvD77NgI6/UpM5XhHd/2bXMYIEDTCCBAkCAQEwgZMw
# fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
# TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAA
# AeIwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB
# BDAvBgkqhkiG9w0BCQQxIgQgemi/lQHqFyVgx6DB131zzhGrrrKjCCOxp58Z4CYK
# NKUwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4
# d5LU6I/bjucIZkOJCI9//zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
# QSAyMDEwAhMzAAAB4pmZlfHc4yDrAAEAAAHiMCIEIBLGc26YPCfAJemWXgOvpsFN
# V884G73fXEwbncimydNHMA0GCSqGSIb3DQEBCwUABIICAJ/TZX5Bd+n15NH300lN
# SJHjXhZ74vszZXUQc8K6CB/ENAiaxr8RtHedUjBztcrtAd+pG+rXg8Fvw7ErA7/C
# RN1smrf5mYDAweiNWRq6ZyIsM4+BCHSGe2ZQ2RNjklrpB0GU7wHuudZFJxtBS7N2
# 6aw4p4Ra4PZ2+lqRtQdu1Byp4WuRDnj9ZK6ZhuKUPL1Y3vgEbbrvd/UtXoSmxFo0
# ppgTsCIL3pb/SQwO6kjCT/XPsSW5Y836nqeJDqhetZwhrK5ZCBMwzbL3O4OhBTl4
# x1uX0gBsGPwFqCTay4TABMhaabV9xLrdGPEd9hmC5x9WLH7fR8b7D+RCOGuTGfTK
# Jn9eKqE6k2tcbCFNiB66AC5hECekgjs03iMCrqwSyhg8aiVzK26IsiLdfA/Uaexr
# 3/eDuwJk2dBMM1G9OlnOPdeALFEWuT6c0oX7CwaoCcJgkJeni9W0sqmW0h6qQw3O
# gnhur/uYW77z56+cLqsQp0F3LCuvj4PD0VmymVv2zRdnL436Teu8uvaiyAGwxTKl
# AHchtoIzwXbrXbsIYVu3mxUEBMeYMdYMhW/dJmJaXT0Z7Am2QinXlBV402nNfkE5
# Fyih2CF5ElbAs0JpMm5yCTpBeV/L5pGNzYmuZ8wtjBVXkFI6Z2rH245t/wsZL6Ju
# 1RHn/LYrJ4grKElTLYFOx1y2
# SIG # End signature block
|
combined_dataset/train/non-malicious/Start-RDP_2.ps1 | Start-RDP_2.ps1 | ########################################################################################################################
# NAME
# Start-RDP
#
# SYNOPSIS
# Opens a remote desktop connection to another computer.
#
# SYNTAX
# Start-RDP [[-Server] <string>] [[-Width] <int>] [[-Height] <int>]
# Start-RDP -Path <string> [[-Width] <int>] [[-Height] <int>]
#
# DETAILED DESCRIPTION
# The Start-RDP cmdlet opens a new Remote Desktop connection using the Microsoft Terminal Services Client.
# Connection settings can be specified by argument or read from a standard RDP file.
#
# PARAMETERS
# -Server <string>
# Specifies the name of the server to connect to. May also include an IP address, domain, and/or port.
#
# Required? false
# Position? 1
# Default value
# Accept pipeline input? true
# Accept wildcard characters? false
#
# -Width <int>
# Specifies the desired width of the resolution for the connection (for non-full screen connections).
#
# Required? false
# Position? 2
# Default value
# Accept pipeline input? false
# Accept wildcard characters? false
#
# -Height <int>
# Specifies the desired height of the resolution for the connection (for non-full screen connections).
#
# Required? false
# Position? 3
# Default value
# Accept pipeline input? false
# Accept wildcard characters? false
#
# -Path <string>
# Specifies the path to an RDP file to connect with (resolution settings can be overridden using the
# -Width and -Height parameters.
#
# Required? false
# Position? 4
# Default value
# Accept pipeline input? true
# Accept wildcard characters? false
#
# -Console <SwitchParameter>
# Connect to a Windows Server 2003 console session.
#
# Required? false
# Position? named
# Default value false
# Accept pipeline input? false
# Accept wildcard characters? false
#
# -Admin <SwitchParameter>
# Connect to a Windows Server 2008 administrator session.
#
# Required? false
# Position? named
# Default value false
# Accept pipeline input? false
# Accept wildcard characters? false
#
# -Fullscreen <SwitchParameter>
# Open connection in full screen mode.
#
# Required? false
# Position? named
# Default value false
# Accept pipeline input? false
# Accept wildcard characters? false
#
# -Public <SwitchParameter>
# Run Remote Desktop in public mode.
#
# Required? false
# Position? named
# Default value false
# Accept pipeline input? false
# Accept wildcard characters? false
#
# -Span <SwitchParameter>
# Span the Remote Desktop connection across multiple monitors. Each monitor must have the same height
# and be arranged vertically.
#
# Required? false
# Position? named
# Default value false
# Accept pipeline input? false
# Accept wildcard characters? false
#
# INPUT TYPE
# String,System.IO.FileInfo
#
# RETURN TYPE
#
#
# NOTES
#
# -------------------------- EXAMPLE 1 --------------------------
#
# C:\\PS>Start-RDP
#
#
# This command opens the Terminal Services Client connection dialog to specify a connection.
#
#
# -------------------------- EXAMPLE 2 --------------------------
#
# C:\\PS>Start-RDP -Server myserver -Width 1024 -Height 768
#
#
# This command opens a new Remote Desktop connection to the server named "myserver" in a window with 1024x768 resolution.
#
#
# -------------------------- EXAMPLE 3 --------------------------
#
# C:\\PS>Start-RDP -Server myserver -Fullscreen
#
#
# This command opens a new full screen Remote Desktop connection to the server named "myserver".
#
#
# -------------------------- EXAMPLE 4 --------------------------
#
# C:\\PS>Start-RDP -Path C:\\myserver.rdp
#
#
# This command opens a new Remote Desktop connection using the specified RDP file.
#
#
#Function global:Start-RDP {
param(
[string]$Server = "",
[int]$Width = "",
[int]$Height = "",
[string]$Path = "",
[switch]$Console,
[switch]$Admin,
[switch]$Fullscreen,
[switch]$Public,
[switch]$Span
)
begin {
$arguments = ""
$dimensions = ""
$processed = $false
if ($admin) {
$arguments += "/admin "
} elseif ($console) {
$arguments += "/console "
}
if ($fullscreen) {
$arguments += "/f "
}
if ($public) {
$arguments += "/public "
}
if ($span) {
$arguments += "/span "
}
if ($width -and $height) {
$dimensions = "/w:$width /h:$height"
}
}
process {
Function script:executePath([string]$path) {
Invoke-Expression "mstsc.exe '$path' $dimensions $arguments"
}
Function script:executeArguments([string]$Server) {
Invoke-Expression "mstsc.exe /v:$server $dimensions $arguments"
}
if ($_) {
if ($_ -is [string]) {
if ($_ -imatch '\\.rdp$') {
if (Test-Path $_) {
executePath $_
$processed = $true
} else {
throw "Path does not exist."
}
} else {
executeArguments $_
$processed = $true
}
} elseif ($_ -is [System.IO.FileInfo]) {
if (Test-Path $_.FullName) {
executePath $_.FullName
$processed = $true
} else {
throw "Path does not exist."
}
} elseif ($_.Path) {
if (Test-Path $_.Path) {
executePath $_.Path
$processed = $true
} else {
throw "Path does not exist."
}
} elseif ($_.DnsName) {
executeArguments $_.DnsName
$processed = $true
} elseif ($_.Server) {
executeArguments $_.Server
$processed = $true
} elseif ($_.ServerName) {
executeArguments $_.ServerName
$processed = $true
} elseif ($_.Name) {
executeArguments $_.Name
$processed = $true
}
}
}
end {
if ($path) {
if (Test-Path $path) {
Invoke-Expression "mstsc.exe '$path' $dimensions $arguments"
} else {
throw "Path does not exist."
}
} elseif ($server) {
Invoke-Expression "mstsc.exe /v:$server $dimensions $arguments"
} elseif (-not $processed) {
Invoke-Expression "mstsc.exe $dimensions $arguments"
}
}
#}
|
combined_dataset/train/non-malicious/1907.ps1 | 1907.ps1 |
Describe "TestData cmdlets" -Tags "CI" {
Context "Get-TypeData" {
It "System.DateTime" {
(Get-TypeData System.DateTime).TypeName | Should -Be System.DateTime
("System.DateTime" | Get-TypeData).TypeName | Should -Be System.DateTime
}
It "Type accelerators" {
(Get-TypeData DateTime).TypeName | Should -Be System.DateTime
(Get-TypeData psCredential).TypeName | Should -Be System.Management.Automation.PSCredential
}
It "Accept multiple types" {
$types = Get-TypeData System.DateTime, System.Management.Automation* | Sort-Object -Property TypeName
$types[0].TypeName | Should -Be System.DateTime
for($i = 1; $i -lt $types.Count; $i++)
{
$types[$i].TypeName.StartsWith("System.Management.Automation") | Should -BeTrue
}
}
It "System.Object" {
Get-TypeData System.Object | Should -Be $null
}
}
Context "Update-TypeData" {
BeforeAll {
$script:ps = [PowerShell]::Create()
}
BeforeEach {
$ps.Commands.Clear()
$ps.Streams.Error.Clear()
}
AfterAll {
$ps.Dispose()
$script:ps = $null
}
It "TypeAdapter parameter" {
$type = $ps.AddScript(@"
Update-TypeData -TypeName Void -TypeAdapter Microsoft.PowerShell.Cim.CimInstanceAdapter
Get-TypeData System.Void
"@).Invoke()
$type[0].TypeName | Should -Be System.Void
$type[0].TypeAdapter.FullName | Should -Be Microsoft.PowerShell.Cim.CimInstanceAdapter
}
}
Context "Remove-TypeData" {
BeforeAll {
$script:ps = [PowerShell]::Create()
Setup -F dummy1.types.ps1xml -Content "<Types><Type><Name>yyyDummy</Name><Members><ScriptProperty><Name>yyyDummy</Name><GetScriptBlock>'yyyDummy'</GetScriptBlock></ScriptProperty></Members></Type></Types>"
Setup -F dummy2.types.ps1xml -Content "<Types><Type><Name>zzzDummy</Name><Members><ScriptProperty><Name>zzzDummy</Name><GetScriptBlock>'zzzDummy'</GetScriptBlock></ScriptProperty></Members></Type></Types>"
}
BeforeEach {
$ps.Commands.Clear()
$ps.Streams.Error.Clear()
}
AfterAll {
$ps.Dispose()
$script:ps = $null
}
It "Remove type that doesn't exist" {
$typeName = "TypeThatDoesNotExistsAnywhere" + (Get-Random)
$ps.AddScript("Remove-TypeData -TypeName $typeName").Invoke()
$ps.Streams.Error[0].FullyQualifiedErrorId | Should -Be "TypesDynamicRemoveException,Microsoft.PowerShell.Commands.RemoveTypeDataCommand"
}
It "Add type file," {
$ps.AddScript("Update-TypeData -AppendPath $TestDrive\dummy1.types.ps1xml").Invoke()
$ps.Streams.Error.Count | Should -Be 0
}
It "Get type data from file just added," {
$type = $ps.AddScript("Get-TypeData -TypeName yyyDummy").Invoke()
$ps.Streams.Error.Count | Should -Be 0
$type[0].TypeName | Should -Be yyyDummy
}
It "Remove type file just added," {
$ps.AddScript("Remove-TypeData -Path $TestDrive\dummy1.types.ps1xml").Invoke()
$ps.Streams.Error.Count | Should -Be 0
}
It "Make sure type was removed" {
$type = $ps.AddScript("Get-TypeData -TypeName yyyDummy").Invoke()
$type.Count | Should -Be 0
}
It "Add another type file," {
$ps.AddScript("Update-TypeData -AppendPath $TestDrive\dummy2.types.ps1xml").Invoke()
$ps.Streams.Error.Count | Should -Be 0
}
It "Now add some type data to one of those newly added types" {
$ps.AddScript("Update-TypeData -TypeName zzzDummy -MemberType NoteProperty -MemberName DynamicDummyProperty -Value 10").Invoke()
$ps.Streams.Error.Count | Should -Be 0
}
It "Remove the newly type file," {
$ps.AddScript("Remove-TypeData -Path $TestDrive\dummy2.types.ps1xml").Invoke()
$ps.Streams.Error.Count | Should -Be 0
}
It "Remove the newly type file a second time, should error," {
$ps.AddScript("Remove-TypeData -Path $TestDrive\dummy2.types.ps1xml").Invoke()
$ps.Streams.Error.Count | Should -Be 1
$ps.Streams.Error[0].FullyQualifiedErrorId | Should -Be "TypeFileNotExistsInCurrentSession,Microsoft.PowerShell.Commands.RemoveTypeDataCommand"
}
It "Dynamic property added should still be there" {
$res = $ps.AddScript("Get-TypeData -TypeName zzzDummy").Invoke()
$res.Count | Should -Be 1
$res[0].Members.Keys[0] | Should -Be DynamicDummyProperty
}
}
}
|
combined_dataset/train/non-malicious/2837.ps1 | 2837.ps1 | function GetTasksFromContext($currentContext) {
$docs = $currentContext.tasks.Keys | foreach-object {
$task = $currentContext.tasks.$_
new-object PSObject -property @{
Name = $task.Name;
Alias = $task.Alias;
Description = $task.Description;
DependsOn = $task.DependsOn;
}
}
return $docs
}
|
combined_dataset/train/non-malicious/4402.ps1 | 4402.ps1 | function HttpClientApisAvailable
{
$HttpClientApisAvailable = $false
try
{
[System.Net.Http.HttpClient]
$HttpClientApisAvailable = $true
}
catch
{
}
return $HttpClientApisAvailable
}
|
combined_dataset/train/non-malicious/2121.ps1 | 2121.ps1 |
Describe "Breakpoints set on custom FileSystem provider files should work" -Tags "CI" {
try
{
$scriptPath = [io.path]::GetTempPath()
$scriptName = "DebuggerScriptTests-ExposeBug221362.ps1"
$scriptFullName = [io.path]::Combine($scriptPath, $scriptName)
write-output '"hello"' > $scriptFullName
new-psdrive -name tmpTestA1 -psprovider FileSystem -root $scriptPath > $null
Push-Location tmpTestA1:\
$breakpoint = set-psbreakpoint .\$scriptName 1 -action { continue }
& .\$scriptName
It "Breakpoint hit count" {
$breakpoint.HitCount | Should -Be 1
}
}
finally
{
Pop-Location
if ($null -ne $breakpoint) { $breakpoint | remove-psbreakpoint }
if (Test-Path $scriptFullName) { Remove-Item $scriptFullName -Force }
if ($null -ne (Get-PSDrive -Name tmpTestA1 2> $null)) { Remove-PSDrive -Name tmpTestA1 -Force }
}
}
Describe "Tests line breakpoints on dot-sourced files" -Tags "CI" {
try
{
$scriptFile = [io.path]::Combine([io.path]::GetTempPath(), "DebuggerScriptTests-ExposeBug245331.ps1")
write-output '
function fibonacci
{
param($number)
if ($number -eq 0) {
return 0
}
if ($number -eq 1) {
return 1
}
$f1 = fibonacci($number - 1)
$f2 = fibonacci($number - 2)
$f1 + $f2
}
fibonacci(3)
' > $scriptFile
$breakpoint = Set-PsBreakpoint $scriptFile 17 -action { continue; }
& $scriptFile
It "Breakpoint on recursive function hit count" {
$breakpoint.HitCount | Should -BeGreaterThan 0
}
}
finally
{
if ($null -ne $breakpoint) { $breakpoint | remove-psbreakpoint }
if (Test-Path $scriptFile) { Remove-Item -Path $scriptFile -Force }
}
}
Describe "Function calls clear debugger cache too early" -Tags "CI" {
try
{
$scriptFile = [io.path]::Combine([io.path]::GetTempPath(), "DebuggerScriptTests-ExposeBug248703.ps1")
write-output '
function Hello
{
write-output "hello"
}
write-output "begin"
Hello
write-output "end"
' > $scriptFile
$breakpoint1 = Set-PsBreakpoint $scriptFile 7 -action { continue; }
$breakpoint2 = Set-PsBreakpoint $scriptFile 9 -action { continue; }
& $scriptFile
It "Breakpoint before function call count" {
$breakpoint1.HitCount | Should -Be 1
}
It "Breakpoint after function call count" {
$breakpoint2.HitCount | Should -Be 1
}
}
finally
{
if ($null -ne $breakpoint1) { $breakpoint1 | remove-psbreakpoint }
if ($null -ne $breakpoint2) { $breakpoint2 | remove-psbreakpoint }
if (Test-Path $scriptFile) { Remove-Item $scriptFile -Force }
}
}
Describe "Line breakpoints on commands in multi-line pipelines" -Tags "CI" {
$script = Join-Path ${TestDrive} ExposeBug588887.DRT.tmp.ps1
try
{
Set-Content $script @'
1..3 |
ForEach-Object { $_ } | sort-object |
get-unique
'@
$breakpoints = Set-PsBreakpoint $script 1,2,3 -action { continue }
$null = & $script
It "Breakpoint on line 1 hit count" {
$breakpoints[0].HitCount | Should -Be 1
}
It "Breakpoint on line 2 hit count" {
$breakpoints[1].HitCount | Should -Be 3
}
It "Breakpoint on line 3 hit count" {
$breakpoints[2].HitCount | Should -Be 1
}
}
finally
{
if ($null -ne $breakpoints) { $breakpoints | remove-psbreakpoint }
if (Test-Path $script)
{
Remove-Item $script -Force
}
}
Context "COM TESTS" {
BeforeAll {
if ( $IsCoreCLR ) { return }
$scriptPath1 = Join-Path $TestDrive SBPShortPathBug133807.DRT.tmp.ps1
$scriptPath1 = setup -f SBPShortPathBug133807.DRT.tmp.ps1 -content '
1..3 |
ForEach-Object { $_ } | sort-object |
get-unique'
$a = New-Object -ComObject Scripting.FileSystemObject
$f = $a.GetFile($scriptPath1)
$scriptPath2 = $f.ShortPath
$breakpoints = Set-PsBreakpoint $scriptPath2 1,2,3 -action { continue }
$null = & $scriptPath2
}
AfterAll {
if ( $IsCoreCLR ) { return }
if ($null -ne $breakpoints) { $breakpoints | Remove-PSBreakpoint }
}
It "Short path Breakpoint on line 1 hit count" -skip:$IsCoreCLR {
$breakpoints[0].HitCount | Should -Be 1
}
It "Short path Breakpoint on line 2 hit count" -skip:$IsCoreCLR {
$breakpoints[1].HitCount | Should -Be 3
}
It "Short path Breakpoint on line 3 hit count" -skip:$IsCoreCLR {
$breakpoints[2].HitCount | Should -Be 1
}
}
}
Describe "Unit tests for various script breakpoints" -Tags "CI" {
param($path = $null)
if ($null -eq $path)
{
$path = split-path $MyInvocation.InvocationName
}
function Verify([ScriptBlock] $command, [System.Management.Automation.Breakpoint[]] $expected)
{
$actual = @(& $command)
It "Script breakpoint count '${command}'|${expected}" {
$actual.Count | Should -Be $expected.Count
}
foreach ($breakpoint in $actual)
{
It "Expected script breakpoints '${command}|${breakpoint}'" {
($expected -contains $breakpoint) | Should -BeTrue
}
}
}
function VerifyException([ScriptBlock] $command, [string] $exception)
{
$e = { & $command } | Should -Throw -PassThru
$e.Exception.GetType().Name | Should -Be $exception
}
try
{
Get-PsBreakpoint | Remove-PsBreakpoint
$scriptFile1 = [io.path]::Combine([io.path]::GetTempPath(), "DebuggerScriptTests-Get-PsBreakpoint1.ps1")
$scriptFile2 = [io.path]::Combine([io.path]::GetTempPath(), "DebuggerScriptTests-Get-PsBreakpoint2.ps1")
write-output '' > $scriptFile1
write-output '' > $scriptFile2
$line1 = Set-PsBreakpoint $scriptFile1 1
$line2 = Set-PsBreakpoint $scriptFile2 2
$cmd1 = Set-PsBreakpoint -c command1 -s $scriptFile1
$cmd2 = Set-PsBreakpoint -c command2 -s $scriptFile2
$cmd3 = Set-PsBreakpoint -c command3
$var1 = Set-PsBreakpoint -v variable1 -s $scriptFile1
$var2 = Set-PsBreakpoint -v variable2 -s $scriptFile2
$var3 = Set-PsBreakpoint -v variable3
Verify { get-psbreakpoint } $line1,$line2,$cmd1,$cmd2,$cmd3,$var1,$var2,$var3
Verify { get-psbreakpoint -id $line1.ID,$cmd1.ID,$var1.ID } $line1,$cmd1,$var1
Verify { get-psbreakpoint $line2.ID,$cmd2.ID,$var2.ID } $line2,$cmd2,$var2
Verify { $cmd3.ID,$var3.ID | get-psbreakpoint } $cmd3,$var3
VerifyException { get-psbreakpoint -id $null } "ParameterBindingValidationException"
VerifyException { get-psbreakpoint -id $line1.ID -script $scriptFile1 } "ParameterBindingException"
Verify { get-psbreakpoint -script $scriptFile1 } $line1,$cmd1,$var1
Verify { get-psbreakpoint $scriptFile2 } $line2,$cmd2,$var2
Verify { $scriptFile2 | get-psbreakpoint } $line2,$cmd2,$var2
VerifyException { get-psbreakpoint -script $null } "ParameterBindingValidationException"
VerifyException { get-psbreakpoint -script $scriptFile1,$null } "ParameterBindingValidationException"
$directoryName = [System.IO.Path]::GetDirectoryName($scriptFile1)
$fileName = [System.IO.Path]::GetFileName($scriptFile1)
Push-Location $directoryName
Verify { get-psbreakpoint -script $fileName } $line1,$cmd1,$var1
Pop-Location
$commandType = [Microsoft.PowerShell.Commands.BreakpointType]"command"
$variableType = [Microsoft.PowerShell.Commands.BreakpointType]"variable"
Verify { get-psbreakpoint -type "line" } $line1,$line2
Verify { get-psbreakpoint $commandType } $cmd1,$cmd2,$cmd3
Verify { $variableType | get-psbreakpoint } $var1,$var2,$var3
Verify { get-psbreakpoint -type "line" -script $scriptFile1 } @($line1)
VerifyException { get-psbreakpoint -type $null } "ParameterBindingValidationException"
Verify { get-psbreakpoint -command "command1","command2" } $cmd1,$cmd2
Verify { get-psbreakpoint -command "command1","command2" -script $scriptFile1 } @($cmd1)
VerifyException { get-psbreakpoint -command $null } "ParameterBindingValidationException"
Verify { get-psbreakpoint -variable "variable1","variable2" } $var1,$var2
Verify { get-psbreakpoint -variable "variable1","variable2" -script $scriptFile1 } @($var1)
VerifyException { get-psbreakpoint -variable $null } "ParameterBindingValidationException"
}
finally
{
if ($null -ne $line1) { $line1 | Remove-PSBreakpoint }
if ($null -ne $line2) { $line2 | Remove-PSBreakpoint }
if ($null -ne $cmd1) { $cmd1 | Remove-PSBreakpoint }
if ($null -ne $cmd2) { $cmd2 | Remove-PSBreakpoint }
if ($null -ne $cmd3) { $cmd3 | Remove-PSBreakpoint }
if ($null -ne $var1) { $var1 | Remove-PSBreakpoint }
if ($null -ne $var2) { $var2 | Remove-PSBreakpoint }
if ($null -ne $var3) { $var3 | Remove-PSBreakpoint }
if (Test-Path $scriptFile1) { Remove-Item $scriptFile1 -Force }
if (Test-Path $scriptFile2) { Remove-Item $scriptFile2 -Force }
}
}
Describe "Unit tests for line breakpoints on dot-sourced files" -Tags "CI" {
param($path = $null)
if ($null -eq $path)
{
$path = split-path $MyInvocation.InvocationName
}
try
{
$scriptFile = [io.path]::Combine([io.path]::GetTempPath(), "DebuggerScriptTests-InMemoryBreakpoints.ps1")
write-output '
function Function1
{
write-host "In Function1"
}
function Function2
{
write-host "In Function2"
}
function Get-TestCmdlet
{
[CmdletBinding()]
param()
begin
{
write-host "In Get-TestCmdlet (begin)"
}
process
{
write-host "In Get-TestCmdlet (process)"
}
end
{
write-host "In Get-TestCmdlet (end)"
}
}
' > $scriptFile
$breakpoint1 = Set-PsBreakpoint $scriptFile 4 -action { continue; }
$breakpoint2 = Set-PsBreakpoint $scriptFile 9 -action { continue; }
$breakpoint3 = Set-PsBreakpoint $scriptFile 24 -action { continue; }
. $scriptFile
Function1
Get-TestCmdlet
It "Breakpoint on function hit count" {
$breakpoint1.HitCount | Should -Be 1
}
It "Breakpoint on uncalled function hit count" {
$breakpoint2.HitCount | Should -Be 0
}
It "Breakpoint on cmdlet hit count" {
$breakpoint3.HitCount | Should -Be 1
}
}
finally
{
if ($null -ne $breakpoint1) { $breakpoint1 | Remove-PSBreakpoint }
if ($null -ne $breakpoint2) { $breakpoint2 | Remove-PSBreakpoint }
if ($null -ne $breakpoint3) { $breakpoint3 | Remove-PSBreakpoint }
if (Test-Path $scriptFile) { Remove-Item $scriptFile -Force }
}
}
Describe "Unit tests for line breakpoints on modules" -Tags "CI" {
$oldModulePath = $env:PSModulePath
try
{
$moduleName = "ModuleBreakpoints"
$moduleRoot = [io.path]::GetTempPath();
$moduleDirectory = [io.path]::Combine($moduleRoot, $moduleName)
$moduleFile = [io.path]::Combine($moduleDirectory, $moduleName + ".psm1")
New-Item -ItemType Directory $moduleDirectory 2> $null
write-output '
function ModuleFunction1
{
write-output "In ModuleFunction1"
}
function ModuleFunction2
{
write-output "In ModuleFunction2"
}
function Get-ModuleCmdlet
{
[CmdletBinding()]
param()
begin
{
write-output "In Get-ModuleCmdlet (begin)"
}
process
{
write-output "In Get-ModuleCmdlet (process)"
}
end
{
write-output "In Get-ModuleCmdlet (end)"
}
}
export-modulemember ModuleFunction1
export-modulemember ModuleFunction2
export-modulemember Get-ModuleCmdlet
' > $moduleFile
$ENV:PSModulePath = $moduleRoot
import-module $moduleName
$breakpoint1 = Set-PsBreakpoint $moduleFile 4 -action { continue }
$breakpoint2 = Set-PsBreakpoint $moduleFile 9 -action { continue }
$breakpoint3 = Set-PsBreakpoint $moduleFile 24 -Action { continue }
$breakpoint4 = Set-PsBreakpoint $moduleFile 25 -Action { continue }
ModuleFunction1
Get-ModuleCmdlet
It "Breakpoint1 on module function hit count" {
$breakpoint1.HitCount | Should -Be 1
}
It "Breakpoint2 on uncalled module function hit count" {
$breakpoint2.HitCount | Should -Be 0
}
It "Breakpoint3 on module cmdlet hit count" {
$breakpoint3.HitCount | Should -Be 1
}
It "Breakpoint4 on module cmdlet hit count" {
$breakpoint4.HitCount | Should -Be 1
}
}
finally
{
$env:PSModulePath = $oldModulePath
if ($null -ne $breakpoint1) { Remove-PSBreakpoint $breakpoint1 }
if ($null -ne $breakpoint2) { Remove-PSBreakpoint $breakpoint2 }
if ($null -ne $breakpoint3) { Remove-PSBreakpoint $breakpoint3 }
if ($null -ne $breakpoint4) { Remove-PSBreakpoint $breakpoint4 }
get-module $moduleName | remove-module
if (Test-Path $moduleDirectory) { Remove-Item $moduleDirectory -Recurse -force -ErrorAction silentlycontinue }
}
}
Describe "Sometimes line breakpoints are ignored" -Tags "CI" {
$path = [io.path]::GetTempPath();
$tempFileName1 = Join-Path -Path $path -ChildPath "TDBG47488F.ps1"
$tempFileName2 = Join-Path -Path $path -ChildPath "TDBG88473F.ps1"
try
{
@'
while ($count -lt 5)
{
$count += 1
"Hello $count"
}
'@ > $tempFileName1
@'
do
{
$count2 += 1
"Hello do $count2"
}
while ($count2 -lt 5)
'@ > $tempFileName2
$bp1 = Set-PSBreakpoint -Script $tempFileName1 -Line 3 -Action {continue}
& $tempFileName1
It "Breakpoint 1 hit count" {
$bp1.HitCount | Should -Be 6
}
$bp2 = Set-PSBreakpoint -Script $tempFileName2 -Line 3 -Action {continue}
& $tempFileName2
It "Breakpoint 2 hit count" {
$bp2.HitCount | Should -Be 6
}
}
finally
{
if ($null -ne $bp1) { Remove-PSBreakpoint $bp1 }
if ($null -ne $bp2) { Remove-PSBreakpoint $bp2 }
if (Test-Path -Path $tempFileName1) { Remove-Item $tempFileName1 -force }
if (Test-Path -Path $tempFileName2) { Remove-Item $tempFileName2 -force }
}
}
|
combined_dataset/train/non-malicious/sample_22_19.ps1 | sample_22_19.ps1 | function trySetDesignerProp(tname, ttype, val) {
var trait = document.designerProps.getOrCreateTrait(tname, ttype, 0);
trait.value = val;
}
if (command.getTrait("state").value == 0) {
command.getTrait("state").value = 2;
trySetDesignerProp("manipulationWorldMode", "bool", true);
}
else {
command.getTrait("state").value = 0;
trySetDesignerProp("manipulationWorldMode", "bool", false);
}
// SIG // Begin signature block
// SIG // MIIoOgYJKoZIhvcNAQcCoIIoKzCCKCcCAQExDzANBglg
// SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor
// SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC
// SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg
// SIG // KVtxCsw1n+s5JscNmtA4d1Sm7d5JwNXlqDOxhfR8P+Wg
// SIG // gg2FMIIGAzCCA+ugAwIBAgITMwAAA64tNVHIU49VHQAA
// SIG // AAADrjANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV
// SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
// SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
// SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT
// SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDg1OVoX
// SIG // DTI0MTExNDE5MDg1OVowdDELMAkGA1UEBhMCVVMxEzAR
// SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
// SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
// SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
// SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
// SIG // 9CD8pjY3wxCoPmMhOkow7ycCltfqYnqk4wGNApzh2dTY
// SIG // +YqxozWTzJUOB38VxsgFQmXBFhOMdrGYGpvO9kdbNPkw
// SIG // HpTrW6hZqFuLLiRwGKEx4ZM5zVSqbHJuX2fPfUJ0Xmb+
// SIG // VrVsGw/BwBV2zz0rVtiSgqj3GeeGOsG7llfWyrSjyJqm
// SIG // 5DHE3o04BAI/NuhkHOv04euiqJGvHFCL8+fXvyD9OAxq
// SIG // 4fcJKtoyBb0PBA3oMNQeCsiUyLO+voZqVTOUsAWY0bN5
// SIG // YjkK4nq5DVaNdVrrowd5AX9gmz6D/TJTssns6pDCG00Y
// SIG // +Dh3ipWpnVmkhYcByyUSEKX3PLC8DkiAQQIDAQABo4IB
// SIG // gjCCAX4wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB
// SIG // BQUHAwMwHQYDVR0OBBYEFIcf73Spl4cHOFoll27H9COd
// SIG // 4fE/MFQGA1UdEQRNMEukSTBHMS0wKwYDVQQLEyRNaWNy
// SIG // b3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx
// SIG // FjAUBgNVBAUTDTIzMDAxMis1MDE4MzYwHwYDVR0jBBgw
// SIG // FoAUSG5k5VAF04KqFzc3IrVtqMp1ApUwVAYDVR0fBE0w
// SIG // SzBJoEegRYZDaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
// SIG // L3BraW9wcy9jcmwvTWljQ29kU2lnUENBMjAxMV8yMDEx
// SIG // LTA3LTA4LmNybDBhBggrBgEFBQcBAQRVMFMwUQYIKwYB
// SIG // BQUHMAKGRWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w
// SIG // a2lvcHMvY2VydHMvTWljQ29kU2lnUENBMjAxMV8yMDEx
// SIG // LTA3LTA4LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3
// SIG // DQEBCwUAA4ICAQBqyWA1Eu7PKNMjaaxl0V7gJ0XBysUo
// SIG // xZluMHJXFE2LEGZIZ2zMLYVjOnAGG/4dluRjSrZZo/8v
// SIG // wk4Xt8v6NBB9ofo8H1P/XidHytWTv9lg9MYu++6lPmu5
// SIG // fCozD3cI2NLZPW2BBhGX2D0R8tQBj0FbmZRuIucpiQ7D
// SIG // K3CHKlfKcc7MP8pPzuMv55Tox8+KFQD1NG6+bfbYA/BN
// SIG // PBkg4tyOh+exbaHfcNuodDJUIjq9dF6oa+Yjy0u0pUMI
// SIG // /B1t+8m6rJo0KSoZlrpesYl0jRhpt+hmqx8uENXoGJcY
// SIG // ZVJ5N2Skq90LViKNRhi9N4U+e8c4y9uXyomUF/6viCPJ
// SIG // 7huTNEJo75ehIJba+IWd3txUEc0R3y6DT6txC6cW1nR/
// SIG // LTbo9I/8fQq538G5IvJ+e5iSiOSVVkVk0i5m03Awy5E2
// SIG // ZSS4PVdQSCcFxmN4tpEfYuR7AAy/GJVtIDFlUpSgdXok
// SIG // pSui5hYtK1R9enXXvo+U/xGkLRc+qp4De3dZbzu7pOq7
// SIG // V/jCyhuCw0bEIAU4urCGIip7TI6GBRzD7yPzjFIqeZY7
// SIG // S4rVW5BRn2oEqpm8Su6yTIQvMIk8x2pwYNUa2339Z4gW
// SIG // 5xW21eFA5mLpo7NRSKRQms5OgAA18aCgqOU7Ds0h6q/Y
// SIG // B4BmEAtoTMl/TBiyKaMGAlEcdy+5FIhmzojMGjCCB3ow
// SIG // ggVioAMCAQICCmEOkNIAAAAAAAMwDQYJKoZIhvcNAQEL
// SIG // BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
// SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
// SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT
// SIG // KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhv
// SIG // cml0eSAyMDExMB4XDTExMDcwODIwNTkwOVoXDTI2MDcw
// SIG // ODIxMDkwOVowfjELMAkGA1UEBhMCVVMxEzARBgNVBAgT
// SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
// SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYG
// SIG // A1UEAxMfTWljcm9zb2Z0IENvZGUgU2lnbmluZyBQQ0Eg
// SIG // MjAxMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
// SIG // ggIBAKvw+nIQHC6t2G6qghBNNLrytlghn0IbKmvpWlCq
// SIG // uAY4GgRJun/DDB7dN2vGEtgL8DjCmQawyDnVARQxQtOJ
// SIG // DXlkh36UYCRsr55JnOloXtLfm1OyCizDr9mpK656Ca/X
// SIG // llnKYBoF6WZ26DJSJhIv56sIUM+zRLdd2MQuA3WraPPL
// SIG // bfM6XKEW9Ea64DhkrG5kNXimoGMPLdNAk/jj3gcN1Vx5
// SIG // pUkp5w2+oBN3vpQ97/vjK1oQH01WKKJ6cuASOrdJXtjt
// SIG // 7UORg9l7snuGG9k+sYxd6IlPhBryoS9Z5JA7La4zWMW3
// SIG // Pv4y07MDPbGyr5I4ftKdgCz1TlaRITUlwzluZH9TupwP
// SIG // rRkjhMv0ugOGjfdf8NBSv4yUh7zAIXQlXxgotswnKDgl
// SIG // mDlKNs98sZKuHCOnqWbsYR9q4ShJnV+I4iVd0yFLPlLE
// SIG // tVc/JAPw0XpbL9Uj43BdD1FGd7P4AOG8rAKCX9vAFbO9
// SIG // G9RVS+c5oQ/pI0m8GLhEfEXkwcNyeuBy5yTfv0aZxe/C
// SIG // HFfbg43sTUkwp6uO3+xbn6/83bBm4sGXgXvt1u1L50kp
// SIG // pxMopqd9Z4DmimJ4X7IvhNdXnFy/dygo8e1twyiPLI9A
// SIG // N0/B4YVEicQJTMXUpUMvdJX3bvh4IFgsE11glZo+TzOE
// SIG // 2rCIF96eTvSWsLxGoGyY0uDWiIwLAgMBAAGjggHtMIIB
// SIG // 6TAQBgkrBgEEAYI3FQEEAwIBADAdBgNVHQ4EFgQUSG5k
// SIG // 5VAF04KqFzc3IrVtqMp1ApUwGQYJKwYBBAGCNxQCBAwe
// SIG // CgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB
// SIG // /wQFMAMBAf8wHwYDVR0jBBgwFoAUci06AjGQQ7kUBU7h
// SIG // 6qfHMdEjiTQwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDov
// SIG // L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj
// SIG // dHMvTWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNy
// SIG // bDBeBggrBgEFBQcBAQRSMFAwTgYIKwYBBQUHMAKGQmh0
// SIG // dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMv
// SIG // TWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNydDCB
// SIG // nwYDVR0gBIGXMIGUMIGRBgkrBgEEAYI3LgMwgYMwPwYI
// SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv
// SIG // bS9wa2lvcHMvZG9jcy9wcmltYXJ5Y3BzLmh0bTBABggr
// SIG // BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBwAG8AbABp
// SIG // AGMAeQBfAHMAdABhAHQAZQBtAGUAbgB0AC4gHTANBgkq
// SIG // hkiG9w0BAQsFAAOCAgEAZ/KGpZjgVHkaLtPYdGcimwuW
// SIG // EeFjkplCln3SeQyQwWVfLiw++MNy0W2D/r4/6ArKO79H
// SIG // qaPzadtjvyI1pZddZYSQfYtGUFXYDJJ80hpLHPM8QotS
// SIG // 0LD9a+M+By4pm+Y9G6XUtR13lDni6WTJRD14eiPzE32m
// SIG // kHSDjfTLJgJGKsKKELukqQUMm+1o+mgulaAqPyprWElj
// SIG // HwlpblqYluSD9MCP80Yr3vw70L01724lruWvJ+3Q3fMO
// SIG // r5kol5hNDj0L8giJ1h/DMhji8MUtzluetEk5CsYKwsat
// SIG // ruWy2dsViFFFWDgycScaf7H0J/jeLDogaZiyWYlobm+n
// SIG // t3TDQAUGpgEqKD6CPxNNZgvAs0314Y9/HG8VfUWnduVA
// SIG // KmWjw11SYobDHWM2l4bf2vP48hahmifhzaWX0O5dY0Hj
// SIG // Wwechz4GdwbRBrF1HxS+YWG18NzGGwS+30HHDiju3mUv
// SIG // 7Jf2oVyW2ADWoUa9WfOXpQlLSBCZgB/QACnFsZulP0V3
// SIG // HjXG0qKin3p6IvpIlR+r+0cjgPWe+L9rt0uX4ut1eBrs
// SIG // 6jeZeRhL/9azI2h15q/6/IvrC4DqaTuv/DDtBEyO3991
// SIG // bWORPdGdVk5Pv4BXIqF4ETIheu9BCrE/+6jMpF3BoYib
// SIG // V3FWTkhFwELJm3ZbCoBIa/15n8G9bW1qyVJzEw16UM0x
// SIG // ghoNMIIaCQIBATCBlTB+MQswCQYDVQQGEwJVUzETMBEG
// SIG // A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
// SIG // ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
// SIG // MSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5n
// SIG // IFBDQSAyMDExAhMzAAADri01UchTj1UdAAAAAAOuMA0G
// SIG // CWCGSAFlAwQCAQUAoIGuMBkGCSqGSIb3DQEJAzEMBgor
// SIG // BgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEE
// SIG // AYI3AgEVMC8GCSqGSIb3DQEJBDEiBCD86aRsmVHrtGPi
// SIG // t0hR9xk5xSNCAw/hx3uZ0Xl4JJpblzBCBgorBgEEAYI3
// SIG // AgEMMTQwMqAUgBIATQBpAGMAcgBvAHMAbwBmAHShGoAY
// SIG // aHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3
// SIG // DQEBAQUABIIBAC6RixSsFUj/3LSgd+9TC71Bev3rKAXH
// SIG // 6TtR1JfDRV9f/Hl7Uv3FyGeM6E/Ie7scYt9bmjtApaQW
// SIG // ZY0nwVU3JlMXd1zT5xLKEGZ8mZiKXG7R3l8rCfpc/Zs4
// SIG // OTeWoZ8o1nfALCxFmHqHFPWs6GO3TxMmrri5d/sY8uyW
// SIG // bhVIzklDLi7ziuUaByzBs9ZylXKDOM+n6NXvYOuJmBz2
// SIG // 0btOQCRxmCy5X+gC9dEezwnYo9euT2BCYxo6F3xgz/GG
// SIG // 1KEug0Z7zPsepS4RBg9s1fQ+tiXMGsRNF6dvpyqzlz2x
// SIG // +YfXRn3q7kUzsmtY1JhcmOqX7sbyH3RZqeeVaNNvKAkm
// SIG // OlChgheXMIIXkwYKKwYBBAGCNwMDATGCF4Mwghd/Bgkq
// SIG // hkiG9w0BBwKgghdwMIIXbAIBAzEPMA0GCWCGSAFlAwQC
// SIG // AQUAMIIBUgYLKoZIhvcNAQkQAQSgggFBBIIBPTCCATkC
// SIG // AQEGCisGAQQBhFkKAwEwMTANBglghkgBZQMEAgEFAAQg
// SIG // B7O4VIQ7erafLaWg4BQUjpqXssxRH2UYdy8BzaK9usIC
// SIG // BmXOBpFAZBgTMjAyNDAyMjkyMjI5NTEuNDE4WjAEgAIB
// SIG // 9KCB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgT
// SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
// SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMG
// SIG // A1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9u
// SIG // czEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkEwMDAt
// SIG // MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
// SIG // ZS1TdGFtcCBTZXJ2aWNloIIR7TCCByAwggUIoAMCAQIC
// SIG // EzMAAAHr4BhstbbvOO0AAQAAAeswDQYJKoZIhvcNAQEL
// SIG // BQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
// SIG // bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
// SIG // FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
// SIG // TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcN
// SIG // MjMxMjA2MTg0NTM0WhcNMjUwMzA1MTg0NTM0WjCByzEL
// SIG // MAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
// SIG // EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
// SIG // c29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9z
// SIG // b2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMe
// SIG // blNoaWVsZCBUU1MgRVNOOkEwMDAtMDVFMC1EOTQ3MSUw
// SIG // IwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2
// SIG // aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKC
// SIG // AgEAwRVoIdpW4Fd3iadNaKomhQbmGzXO4UippLbydeTa
// SIG // wfwwW6FKMPFjzkz8W5+4HJiDhpsCZHfk8hceyjp868Z6
// SIG // Ad4br7/dX2blLoCLCk5wL4NgVP53ze2c5/SpNZqbidu0
// SIG // usVAx+KHRYl+dSAnCpehBuHMSoHAwIp4oU/Ma6CVlQEy
// SIG // +6fG2358LHNaYoWZnLyLmBp29U2PbZ6XQoVq/RAEbgqN
// SIG // 04kRozNi6eKYk9pQ+YZ3d1Whk3qTasmpKZAhldPnCvFb
// SIG // vx5CGXb8vs+RC96I03RSy+byfSAKIFn91wLt3e0qRWmq
// SIG // HosdHtaueQA/eGcAz/os6i2nbAUd7c46tkX6wjS/k5ov
// SIG // 42pUbaPyem4eHz4RxE5wwu/E9cn11EHRrZif7rSPwDcY
// SIG // ux1fIAD84nfU2IzD22KhvMucc/oCP0hco/mirRx1pisx
// SIG // Fz7bV8wHHsSdRB+8G7olZN7BKzyvTC4NV2+oTORyFgNI
// SIG // xAGYShMneYR9lzIm82pG6drNhCUFmrEHOAzGhdRLENQs
// SIG // 4ApQ2CGBuq1IbnXyO5PC/SighLn0WyuZXUWDQKnXa/8k
// SIG // iX7mb9z0t/r7Q+l+qtR+FDpowynY6Ft6rOyUTGZh/X5B
// SIG // ZDM2+mEs6+nl9S6GJtz6ztSXmuN0mM5Qd08/ODr7lUle
// SIG // zXInVbTaomXllqVY32r0fiY/yTkCAwEAAaOCAUkwggFF
// SIG // MB0GA1UdDgQWBBR0ngWs1lXMbuKk/TuY09gfqgHq4TAf
// SIG // BgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
// SIG // BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
// SIG // c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBU
// SIG // aW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYI
// SIG // KwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8v
// SIG // d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01p
// SIG // Y3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEw
// SIG // KDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQM
// SIG // MAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkq
// SIG // hkiG9w0BAQsFAAOCAgEAg3TfL6D3fAvlVmT9/lvO3P0G
// SIG // 3W1itLDrfWeJBDlp4Oypoflg9i5zyUySiBGsZ4jnLfcD
// SIG // ICfMkMsEfFh4Azr28KnarC1GjODa3q7SOhSPa4Y4Xmis
// SIG // TTZwWcx2Sw8JZC/bwhA3vUXNHRklXeQYNwlpJ1d7r1Wr
// SIG // teBeeREk1iATWkEvQqaNjqc93EYAGFX2ixRmwKzXEb0l
// SIG // r0lG3iNiA6kcQuMQW0YjUPtah1wwj59IRrF3y/spw2Z3
// SIG // An7Mza5YGU9uF4Ib082DB3F4qC1WKP9h5MqMOnSO7lCy
// SIG // WysS1/MB4bIsK4lyAwp4y1bBtBOW0fNkIHLHhIcW1Nnd
// SIG // UVR3ELZFBO1vc8Wamev4z5mqI2YF0Dt9148Th2GFWvwV
// SIG // 3CLrvEjMz44wAG7o8E2sKWsywb/fey0QdGTmzXJCWMkE
// SIG // KRE0n5Td+o1vs+0f5xsiakWdx7WdZV1tX+sxAgHj/vXc
// SIG // up5nAq1XDqm0B1+2a/Fj3IIRyQAA5ZuRMT4ecYtbTUZP
// SIG // ouhdmvUqU3kJ2Vz+dMPiaE8SEkKu7wYo9p4rQLEi2lXj
// SIG // KqD4vjV5U1DWdjXbWxa+iIq/WSvbn2s9xcX7w2aN+uby
// SIG // zqM5kDnv2fqbuL2Ocz5rTYlSHEJxcuyWTomVQyOWyHcE
// SIG // EWotqrhyiepbVHbItx4zZ4nrhO9n0+HlocbZpzeR2Agw
// SIG // ggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZAAAAAAAV
// SIG // MA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzET
// SIG // MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
// SIG // bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0
// SIG // aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0
// SIG // aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAx
// SIG // ODIyMjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYT
// SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
// SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
// SIG // cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1l
// SIG // LVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEF
// SIG // AAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7V
// SIG // gtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/H
// SIG // ZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9alKD
// SIG // RLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gm
// SIG // U3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36M
// SIG // EBydUv626GIl3GoPz130/o5Tz9bshVZN7928jaTjkY+y
// SIG // OSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoF
// SIG // VZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJi
// SIG // ss254o2I5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGa
// SIG // RnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+Autuqfjbs
// SIG // Nkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afo
// SIG // mXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9
// SIG // ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
// SIG // i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
// SIG // 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV
// SIG // 2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0C
// SIG // AwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEw
// SIG // IwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/
// SIG // LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtTNRnp
// SIG // cjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8G
// SIG // CCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
// SIG // b20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5odG0wEwYD
// SIG // VR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAwe
// SIG // CgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB
// SIG // /wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9
// SIG // lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDov
// SIG // L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj
// SIG // dHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoG
// SIG // CCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
// SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
// SIG // b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcN
// SIG // AQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pc
// SIG // FLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHk
// SIG // wo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AF
// SIG // vonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0jVOR4
// SIG // U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2
// SIG // EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8Atq
// SIG // gcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmRsqlb30mj
// SIG // dAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZM
// SIG // cm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQE
// SIG // cb9k+SS+c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2f
// SIG // pCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBM
// SIG // drVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L
// SIG // +DvktxW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJ
// SIG // C4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
// SIG // 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
// SIG // 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDUDCC
// SIG // AjgCAQEwgfmhgdGkgc4wgcsxCzAJBgNVBAYTAlVTMRMw
// SIG // EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
// SIG // b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
// SIG // b24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9w
// SIG // ZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
// SIG // TjpBMDAwLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
// SIG // b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsO
// SIG // AwIaAxUAgAaJdbtcMMGIFLVKMDJ6mL27pd6ggYMwgYCk
// SIG // fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
// SIG // Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
// SIG // TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
// SIG // aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkq
// SIG // hkiG9w0BAQsFAAIFAOmK+OYwIhgPMjAyNDAyMjkxMjM2
// SIG // NTRaGA8yMDI0MDMwMTEyMzY1NFowdzA9BgorBgEEAYRZ
// SIG // CgQBMS8wLTAKAgUA6Yr45gIBADAKAgEAAgIH5AIB/zAH
// SIG // AgEAAgISvTAKAgUA6YxKZgIBADA2BgorBgEEAYRZCgQC
// SIG // MSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQow
// SIG // CAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQBTPZ+e
// SIG // JHEwxmThsNDV9U4lsMm196IIiOAkcgDy1li5ahcLN54c
// SIG // M7N2HdCXcl1yQLUsY8lm0UaK8i+FM9TdDkwiE/sTUsfo
// SIG // jtrMn1DKpjFxk+M8JXpOcRYrMJzgXz7r+0FH/Evl1z4g
// SIG // sN1N2jD3bHsvaf44GF6ak0pEpdQlBb0TD19V7+IGQKIJ
// SIG // omva6fChBD8+0WbgkswEK4iMFVnVTak0L+8wWPLYIbdO
// SIG // RjxIHn70x4RNHMcf9ZA3uPhHe4MFUq+4ydg1UGk0yGf8
// SIG // ORoXJmU48ck0n7isjGyR+SavT1fFKrN1q6o8toAFjTqQ
// SIG // di/PiYjPwzln9dofxe2RUrAFbCK2MYIEDTCCBAkCAQEw
// SIG // gZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
// SIG // bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
// SIG // FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
// SIG // TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMA
// SIG // AAHr4BhstbbvOO0AAQAAAeswDQYJYIZIAWUDBAIBBQCg
// SIG // ggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAv
// SIG // BgkqhkiG9w0BCQQxIgQgSSxxfPzcslScoAeU3ZkrMDh3
// SIG // SSfwgRV17hXVLKzGl2owgfoGCyqGSIb3DQEJEAIvMYHq
// SIG // MIHnMIHkMIG9BCDOt2u+X2kD4X/EgQ07ZNg0lICG3Ys1
// SIG // 7M++odSXYSws+DCBmDCBgKR+MHwxCzAJBgNVBAYTAlVT
// SIG // MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
// SIG // ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
// SIG // YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0
// SIG // YW1wIFBDQSAyMDEwAhMzAAAB6+AYbLW27zjtAAEAAAHr
// SIG // MCIEIF8ps9icW1SJxHt4VRpdbKfUpQ2DYOztn3rFl04T
// SIG // nK0TMA0GCSqGSIb3DQEBCwUABIICAFAaNZB8lTzNEX1W
// SIG // b2yZwuosGVH8QZ5PDkPLtzHpU6ZjMVeRqmBibZdfukpt
// SIG // EpXGepKiof1btP0N4gnUmuq++iwIrGgDYM1m8b3q0Wm8
// SIG // kTvFJxG09AYcwZXmO+xhbOggoKy/Mw+Gh5gRvub+KHxx
// SIG // lp6cidf8duAsjZhXmSFnMEy9hDf3oyYWU/dvGATM3KVK
// SIG // i+WBwVdBhg84t4IQI7JSS9jd94gs6FxX/HRiL3fpobj5
// SIG // +UkyIf02HYg/iT3tAlhS4F3+Iw6EeaRMPbrB92gYn0R2
// SIG // fw/FE4OcZxJZ7ijhIvxbGIOOYNRQrUIEJ1n6ezkXgrai
// SIG // mvdyj0tVQj73Lpr3KOSDR+GqHtwUKAwocYDacr4XJxvE
// SIG // wnyrlhXDwAxQDhwr+2SnFJt7EmOVLqz+o4QEkOg+Z6in
// SIG // aAUiGoT0LsFyzQBBPxqTU4kbJdTyEK2kIj9Z3quVOkx+
// SIG // kUWFkpi/UYoT8n0uwX4I8IK+93FQtdRiXiNjQL1CBeHl
// SIG // i0tsyPSOwoIXt/zrQLqgeQmjgaNpN3HKsTjL463XVSAu
// SIG // 8dWdHRP3QOHbokK0o/25W40BY18QcVcyDRRUodOxKMUN
// SIG // AwUeTAHasHClGfWhfHYsD4/aj7h2z3UhmLggCGHaBCh8
// SIG // zZgXgaB+ZIOAWDo2pJJVwN2ExeezNhTqoGHQOSTGOZnF
// SIG // vTD4qJT+
// SIG // End signature block
|
combined_dataset/train/non-malicious/1773.ps1 | 1773.ps1 |
Describe "SecureString conversion tests" -Tags "CI" {
BeforeAll {
$string = "ABCD"
$secureString = [System.Security.SecureString]::New()
$string.ToCharArray() | foreach-object { $securestring.AppendChar($_) }
}
It "using null arguments to ConvertFrom-SecureString produces an exception" {
{ ConvertFrom-SecureString -secureString $null -key $null } |
Should -Throw -ErrorId "ParameterArgumentValidationErrorNullNotAllowed,Microsoft.PowerShell.Commands.ConvertFromSecureStringCommand"
}
It "using a bad key produces an exception" {
$badkey = [byte[]]@(1,2)
{ ConvertFrom-SecureString -securestring $secureString -key $badkey } |
Should -Throw -ErrorId "Argument,Microsoft.PowerShell.Commands.ConvertFromSecureStringCommand"
}
It "Can convert to a secure string" {
$ss = ConvertTo-SecureString -AsPlainText -Force abcd
$ss | Should -BeOfType SecureString
}
It "can convert back from a secure string" {
$secret = "abcd"
$ss1 = ConvertTo-SecureString -AsPlainText -Force $secret
$ss2 = convertfrom-securestring $ss1 | convertto-securestring
[pscredential]::New("user",$ss2).GetNetworkCredential().Password | Should -Be $secret
}
}
|
combined_dataset/train/non-malicious/sample_11_11.ps1 | sample_11_11.ps1 | #
# Module manifest for module 'OCI.PSModules.Psql'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Psql.dll'
# Version number of this module.
ModuleVersion = '74.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '4e5ce5bb-7b1e-43a9-bd4b-3697eb32c070'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Psql Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Psql.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIPsqlBackup', 'Get-OCIPsqlBackupsList',
'Get-OCIPsqlConfiguration', 'Get-OCIPsqlConfigurationsList',
'Get-OCIPsqlConnectionDetails', 'Get-OCIPsqlDbSystem',
'Get-OCIPsqlDbSystemsList', 'Get-OCIPsqlDefaultConfiguration',
'Get-OCIPsqlDefaultConfigurationsList',
'Get-OCIPsqlPrimaryDbInstance', 'Get-OCIPsqlShapesList',
'Get-OCIPsqlWorkRequest', 'Get-OCIPsqlWorkRequestErrorsList',
'Get-OCIPsqlWorkRequestLogsList', 'Get-OCIPsqlWorkRequestsList',
'Invoke-OCIPsqlFailoverDbSystem', 'Invoke-OCIPsqlPatchDbSystem',
'Move-OCIPsqlBackupCompartment',
'Move-OCIPsqlConfigurationCompartment',
'Move-OCIPsqlDbSystemCompartment', 'New-OCIPsqlBackup',
'New-OCIPsqlConfiguration', 'New-OCIPsqlDbSystem',
'Remove-OCIPsqlBackup', 'Remove-OCIPsqlConfiguration',
'Remove-OCIPsqlDbSystem', 'Reset-OCIPsqlMasterUserPassword',
'Restart-OCIPsqlDbInstanceInDbSystem', 'Restore-OCIPsqlDbSystem',
'Update-OCIPsqlBackup', 'Update-OCIPsqlConfiguration',
'Update-OCIPsqlDbSystem', 'Update-OCIPsqlDbSystemDbInstance'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Psql'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/ESXiMgmt module.ps1 | ESXiMgmt module.ps1 | #######################################################################################################################
# File: ESXiMgmt.psm1 #
# Author: Alexander Petrovskiy #
# Publisher: Alexander Petrovskiy, SoftwareTestingUsingPowerShell.WordPress.Com #
# Copyright: © 2011 Alexander Petrovskiy, SoftwareTestingUsingPowerShell.WordPress.Com. All rights reserved. #
# Prerequisites: The module was tested with Vmware ESXi 4.1 U1 on the server side and #
# Vmware PowerCLI 4.1 U1 #
# plink.exe 0.60.0.0 #
# Usage: To load this module run the following instruction: #
# Import-Module -Name ESXiMgmt -Force #
# Please provide feedback in the SoftwareTestingUsingPowerShell.WordPress.Com blog. #
#######################################################################################################################
Set-StrictMode -Version Latest
#region initialization
# Initailize PowerCLI environment
if ((Get-PSSnapin VMware.VimAutomation.Core) -ne $null -and `
(Get-PSSnapin VMware.VimAutomation.Core).Name.Length -gt 0)
{
Remove-PSSnapin VMware.VimAutomation.Core;
}
Add-PSSnapin VMware.VimAutomation.Core;
# x86
if ($Env:PROCESSOR_ARCHITECTURE -eq 'x86'){
. "$env:ProgramFiles\\VMware\\Infrastructure\\vSphere PowerCLI\\Scripts\\Initialize-PowerCLIEnvironment.ps1"
}
# x64
if ($Env:PROCESSOR_ARCHITECTURE -eq 'AMD64'){
. "${env:ProgramFiles(x86)}\\VMware\\Infrastructure\\vSphere PowerCLI\\Scripts\\Initialize-PowerCLIEnvironment.ps1"
}
# It is recommended to put plink.exe in the directory this module resides
# plink.exe can be taken from this link
# http://the.earth.li/~sgtatham/putty/latest/x86/plink.exe
if (Test-Path -Path ($PSScriptRoot + '\\plink.exe')){
[string]$script:plinkPath = $PSScriptRoot + '\\plink.exe';
}
#endregion initialization
#region private functions
#region function Get-CurrentTime
function Get-CurrentTime
<#
.SYNOPSIS
The Get-CurrentTime function is used to write in the timestamp in the log file.
.DESCRIPTION
The Get-CurrentTime functions is used for getting the current time of operation.
As s time source used [System.DateTime]::Now.TimeOfDay property.
.EXAMPLE
PS C:\\> Get-CurrentTime
.OUTPUTS
System.String
#>
{ $timeOfDay = [System.DateTime]::Now.TimeOfDay;
$time = "$($timeOfDay.Hours):$($timeOfDay.Minutes):$($timeOfDay.Seconds)`t";
return $time;}
#endregion function Get-CurrentTime
#endregion private functions
#region public functions
#region function Connect-ESXi
function Connect-ESXi
<#
.SYNOPSIS
Connects to a single ESXi you are planning to work with.
.DESCRIPTION
The Connect-ESXi function is intended to be the first the user runs
while working with this module.
.PARAMETER Server
The name of IP address of the server you work with.
It's also used further as an user@server combination.
.PARAMETER Port
Default value is 443. See the Connect-VIServer description.
.PARAMETER Protocol
Default value is HTTPS. See the Connect-VIServer description.
.PARAMETER User
Username that is often root. It's also used further as an user@server combination.
.PARAMETER Password
Password to connect to a ESXi. It's also used as a parameter for plink.
.PARAMETER DatastoreName
The name of the datastore you work with.
.PARAMETER Drive
The name that will represents the content of the datastore.
.EXAMPLE
PS C:\\> Connect-ESXi -Server 192.168.1.1 -Port 443
-Protocol HTTPS -User root -Password 123
-DatastoreName datastore1
-Drive server1
.INPUTS
System.String, System.Int32
.OUTPUTS
None
#>
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$Server,
[Parameter(Mandatory=$false)]
[int]$Port = 443,
[Parameter(Mandatory=$false)]
[string]$Protocol = 'HTTPS',
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$User,
[AllowEmptyString()]
[string]$Password = '',
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$DatastoreName,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$Drive
)
[string]$script:pwd = $Password;
[VMware.VimAutomation.ViCore.Impl.V1.VIServerImpl]$script:esxiserver = `
Connect-VIServer -Server $Server `
-User $User -Password $Password `
-Protocol $Protocol -Port $Port;
[VMware.VimAutomation.ViCore.Impl.V1.Inventory.VMHostImpl]$script:vmhost = `
Get-VMHost -Server $script:esxiserver;
[VMware.VimAutomation.ViCore.Impl.V1.DatastoreManagement.DatastoreImpl]$script:datastore = `
Get-Datastore -Server $script:esxiserver -Name $DatastoreName;
try{New-DatastoreDrive -Datastore $script:datastore -Name $Drive;
[string]$script:dsdrive = $Drive;}catch{}
}
#endregion function Connect-ESXi
#region function Disconnect-ESXi
function Disconnect-ESXi
<#
.SYNOPSIS
Disconnects the latest connected ESXi server.
.DESCRIPTION
The function cleans up the variable that stores VIServer object of the server you connected.
.EXAMPLE
PS C:\\> Disconnect-ESXi
.INPUTS
None
.OUTPUTS
None
#>
{
Disconnect-VIServer -Server $script:esxiserver -Force:$true;
}
#endregion function Disconnect-ESXi
#region function Invoke-ESXiCommand
function Invoke-ESXiCommand
<#
.SYNOPSIS
Runs a command or a semicolon-separated sequence of commands on an ESXi server.
.DESCRIPTION
This function runs plink.exe with the command supplied and optionally
suppressses the console window.
.PARAMETER Server
The name of IP address of the server you work with.
It's also used further as an user@server combination.
.PARAMETER User
Username that is often root. It's also used further as an user@server combination.
.PARAMETER Password
Password to connect to a ESXi. It's also used as a parameter for plink.
.PARAMETER Command
The string that plink.exe runs on a server.
.PARAMETER PathToPlink
Used if for some reason you don't want to put plink.exe in the module folder.
.PARAMETER ShowWindow
Enables or disables appearance of the plink.exe console window.
.PARAMETER OperationTimeout
The time that the module sleeps before start next operation.
.EXAMPLE
PS C:\\> Invoke-ESXiCommand -Server 192.168.1.1 `
-User root -Password 123 `
-Command 'ls ~; sleep 10s; exit;' `
-PathToPlink 'C:\\plink.exe' `
-ShowWindow $true -OperationTimeout 10;
.INPUTS
System.String, System.Int32, System.Boolean
.OUTPUTS
None
#>
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$Server,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$User,
[AllowEmptyString()]
[string]$Password = '',
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$Command,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$PathToPlink,
[Parameter(Mandatory=$false)]
[bool]$ShowWindow = $true,
[Parameter(Mandatory=$false)]
[int]$OperationTimeout = 2
)
try{
[string[]]$private:connectArgs = `
@(
"-ssh $($User)@$($Server) -pw $($Password) $($Command) "
);
if ($ShowWindow){
Start-Process -FilePath $PathToPlink `
-ArgumentList $private:connectArgs;
}
else{
Start-Process -FilePath $PathToPlink `
-ArgumentList $private:connectArgs -NoNewWindow;
}
sleep -Seconds $OperationTimeout;
}catch{};
}
#endregion function Invoke-ESXiCommand
#region function New-ESXiFSDirectory
function New-ESXiFSDirectory
<#
.SYNOPSIS
Creates a directory on the datastore file system.
.DESCRIPTION
This function creates a directory and is a cane.
.PARAMETER Server
The name of IP address of the server you work with.
It's also used further as an user@server combination.
.PARAMETER User
Username that is often root. It's also used further as an user@server combination.
.PARAMETER Password
Password to connect to a ESXi. It's also used as a parameter for plink.
.PARAMETER Path
The absolute path to the folder which a new folder will be created within.
.PARAMETER Name
The name for a new folder.
.PARAMETER PathToPlink
Used if for some reason you don't want to put plink.exe in the module folder.
.PARAMETER OperationTimeout
The time that the module sleeps before start next operation.
.EXAMPLE
PS C:\\> New-ESXiFSDirectory -Server 192.168.1.1 `
-User root -Password 123 `
-Path "/vmfs/volumes/datastore3" -Name foldername `
-PathToPlink C:\\plink.exe -OperationTimeout 20;
.INPUTS
System.String, System.Int32
.OUTPUTS
None
#>
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$Server,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$User,
[AllowEmptyString()]
[string]$Password = '',
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$Path,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$Name,
[Parameter(Mandatory=$false)]
[AllowEmptyString()]
[string]$PathToPlink,
[int]$OperationTimeout = 2
)
if ($PathToPlink.Length -lt 1){$PathToPlink = $script:plinkPath;}
[string]$private:commandToRun = "`"cd $($Path);mkdir $($Name);exit;`"";
Invoke-ESXiCommand -Server $Server -User $User -Password $Password `
-Command $private:commandToRun -PathToPlink $PathToPlink `
-ShowWindow $false -OperationTimeout $OperationTimeout;
}
#endregion function New-ESXiFSDirectory
#region function Register-ESXiVM
function Register-ESXiVM
<#
.SYNOPSIS
Register an VMX file.
.DESCRIPTION
this function register a new virtual machine specified as a full path to its .vmx file.
.PARAMETER Server
The name of IP address of the server you work with.
It's also used further as an user@server combination.
.PARAMETER User
Username that is often root. It's also used further as an user@server combination.
.PARAMETER Password
Password to connect to a ESXi. It's also used as a parameter for plink.
.PARAMETER Path
The full path to a VMX file.
.PARAMETER PathToPlink
Used if for some reason you don't want to put plink.exe in the module folder.
.PARAMETER OperationTimeout
The time that the module sleeps before start next operation.
.EXAMPLE
PS C:\\> Register-ESXiVM -Server 192.168.1.1 `
-User root -Password 123 `
-Path "/vmfs/volumes/datastore3/vmname/vmname.vmx" `
-PathToPlink C:\\plink.exe;
.INPUTS
System.String, System.Int32
.OUTPUTS
System.String
#>
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$Server,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$User,
[AllowEmptyString()]
[string]$Password = '',
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$Path,
[Parameter(Mandatory=$false)]
[AllowEmptyString()]
[string]$PathToPlink,
[int]$OperationTimeout = 20
)
if ($PathToPlink.Length -lt 1){$PathToPlink = $script:plinkPath;}
[string]$private:commandToRun = "`"/bin/vim-cmd solo/registervm $($Path);exit;`"";
Invoke-ESXiCommand -Server $Server -User $User -Password $Password `
-Command $private:commandToRun -PathToPlink $PathToPlink `
-ShowWindow $false -OperationTimeout $OperationTimeout;
}
#endregion function Register-ESXiVM
#region function Start-ESXiVM
function Start-ESXiVM
<#
.SYNOPSIS
Starts a powered off orsuspended virtual machine.
.DESCRIPTION
This function is intended to start a new virtual machine as well as an existing one.
In case the machine is generated from an image, it also answer the question whether
the machine was copied or moved.
.PARAMETER Server
The name of IP address of the server you work with.
It's also used further as an user@server combination.
.PARAMETER User
Username that is often root. It's also used further as an user@server combination.
.PARAMETER Password
Password to connect to a ESXi. It's also used as a parameter for plink.
.PARAMETER Id
The Id of a virtual machine that is generated by the server that hosts it.
.PARAMETER PathToPlink
Used if for some reason you don't want to put plink.exe in the module folder.
.PARAMETER OperationTimeout
The time that the module sleeps before start next operation.
.EXAMPLE
PS C:\\> Start-ESXiVM -Server 192.168.1.1 `
-User root -Password 123 `
-Id 504 `
-PathToPlink C:\\plink.exe;
.INPUTS
System.String, System.Int32
.OUTPUTS
None
#>
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$Server,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$User,
[AllowEmptyString()]
[string]$Password = '',
[Parameter(Mandatory=$true)]
[int]$Id,
[Parameter(Mandatory=$false)]
[AllowEmptyString()]
[string]$PathToPlink,
[int]$OperationTimeout = 10
)
if ($PathToPlink.Length -lt 1){$PathToPlink = $script:plinkPath;}
[string]$private:commandToRun = "`"/bin/vim-cmd vmsvc/power.on $($Id.ToString());exit;`"";
Invoke-ESXiCommand -Server $Server -User $User -Password $Password `
-Command $private:commandToRun -PathToPlink $PathToPlink `
-ShowWindow $true -OperationTimeout $OperationTimeout;
try{Get-VM -Id $Id;
if ((Get-VM -Id $Id).PowerState -eq `
[VMware.VimAutomation.ViCore.Types.V1.Inventory.PowerState]::PoweredOff){
[string]$private:commandToRun = "`"/bin/vim-cmd vmsvc/message $($Id.ToString()) 0 2;exit;`"";
Invoke-ESXiCommand -Server $Server -User $User -Password $Password `
-Command $private:commandToRun -PathToPlink $PathToPlink `
-ShowWindow $true -OperationTimeout 2;}
}catch{
[string]$private:commandToRun = "`"/bin/vim-cmd vmsvc/message $($Id.ToString()) 0 2;exit;`"";
Invoke-ESXiCommand -Server $Server -User $User -Password $Password `
-Command $private:commandToRun -PathToPlink $PathToPlink `
-ShowWindow $true -OperationTimeout 2;
}
}
#endregion function Start-ESXiVM
#region function Stop-ESXiVM
function Stop-ESXiVM
<#
.SYNOPSIS
Powers off (or what is set for this option on your server) a virtual machine.
.DESCRIPTION
This funciton simply 'presses' the red button.
.PARAMETER Server
The name of IP address of the server you work with.
It's also used further as an user@server combination.
.PARAMETER User
Username that is often root. It's also used further as an user@server combination.
.PARAMETER Password
Password to connect to a ESXi. It's also used as a parameter for plink.
.PARAMETER Id
The Id of a virtual machine that is generated by the server that hosts it.
.PARAMETER PathToPlink
Used if for some reason you don't want to put plink.exe in the module folder.
.PARAMETER OperationTimeout
The time that the module sleeps before start next operation.
.EXAMPLE
PS C:\\> Stop-ESXiVM -Server 192.168.1.1 `
-User root -Password 123 `
-Id (Get-ESXiVMId $vm);
.INPUTS
System.String, System.Int32
.OUTPUTS
None
#>
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$Server,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$User,
[AllowEmptyString()]
[string]$Password = '',
[Parameter(Mandatory=$true)]
[int]$Id,
[Parameter(Mandatory=$false)]
[AllowEmptyString()]
[string]$PathToPlink,
[int]$OperationTimeout = 60
)
if ($PathToPlink.Length -lt 1){$PathToPlink = $script:plinkPath;}
[string]$private:commandToRun = "`"/bin/vim-cmd vmsvc/power.off $($Id.ToString());exit;`"";
Invoke-ESXiCommand -Server $Server -User $User -Password $Password `
-Command $private:commandToRun -PathToPlink $PathToPlink `
-ShowWindow $true -OperationTimeout $OperationTimeout;
}
#endregion function Stop-ESXiVM
#region function Suspend-ESXiVM
function Suspend-ESXiVM
<#
.SYNOPSIS
Puts a virtual machine into a suspended state.
.DESCRIPTION
This function 'presses' the yellow button.
.PARAMETER Server
The name of IP address of the server you work with.
It's also used further as an user@server combination.
.PARAMETER User
Username that is often root. It's also used further as an user@server combination.
.PARAMETER Password
Password to connect to a ESXi. It's also used as a parameter for plink.
.PARAMETER Id
The Id of a virtual machine that is generated by the server that hosts it.
.PARAMETER PathToPlink
Used if for some reason you don't want to put plink.exe in the module folder.
.PARAMETER OperationTimeout
The time that the module sleeps before start next operation.
.EXAMPLE
PS C:\\> Suspend-ESXiVM -Server 192.168.1.1 `
-User root -Password 123 `
-Id $private:vmId `
-PathToPlink C:\\plink.exe;
.INPUTS
System.String, System.Int32
.OUTPUTS
None
#>
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$Server,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$User,
[AllowEmptyString()]
[string]$Password = '',
[Parameter(Mandatory=$true)]
[int]$Id,
[Parameter(Mandatory=$false)]
[AllowEmptyString()]
[string]$PathToPlink,
[int]$OperationTimeout = 60
)
if ($PathToPlink.Length -lt 1){$PathToPlink = $script:plinkPath;}
[string]$private:commandToRun = "`"/bin/vim-cmd vmsvc/power.suspend $($Id.ToString());exit;`"";
Invoke-ESXiCommand -Server $Server -User $User -Password $Password `
-Command $private:commandToRun -PathToPlink $PathToPlink `
-ShowWindow $true -OperationTimeout $OperationTimeout;
}
#endregion function Suspend-ESXiVM
#region function Get-ESXiVMId
function Get-ESXiVMId
<#
.SYNOPSIS
Returns the Id of a virtual machine.
.DESCRIPTION
This function receives a virtual machine object and extract the Id property.
.PARAMETER VM
The VMware.VimAutomation.ViCore.Impl.V1.Inventory.VirtualMachineImpl object.
.EXAMPLE
PS C:\\> [int]$private:vmId = `
Get-ESXiVMId -VM (Get-VM -Name $VMName);
.INPUTS
VMware.VimAutomation.ViCore.Impl.V1.Inventory.VirtualMachineImpl
.OUTPUTS
System.Int32
#>
(
[CmdletBinding()]
[OutputType([System.Int32])]
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[VMware.VimAutomation.ViCore.Impl.V1.Inventory.VirtualMachineImpl]$VM
)
{
#[int]$private:vmId = [System.Text.RegularExpressions.Regex]::Match( `
# (Get-VM -Name $private:currentVMName).Id.ToString(), "(?<=[-]).*").Value
[int]$private:vmId = [System.Text.RegularExpressions.Regex]::Match( `
$VM.Id.ToString(), "(?<=[-]).*").Value;
return $private:vmId;
}
#endregion function Get-ESXiVMId
#region function Get-ESXiVMName
function Get-ESXiVMName
<#
.SYNOPSIS
Returns the name of a virtual machine that contains a guest with name given.
.DESCRIPTION
This function enumerates all the virtual machines hosted on a server
in order to get the name that has the corresponding virtual machine.
.PARAMETER VMHostname
Ths name(s) of the guest host(s).
.EXAMPLE
PS C:\\> $vmname = Get-ESXiVMName -VMHostname 'B45E19A64B5E418'
.INPUTS
System.String[]
.OUTPUTS
System.String
#>
(
[CmdletBinding()]
[OutputType([System.String])]
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string[]]$VMHostname
)
{
[System.Collections.ArrayList]$vmnames = `
New-Object System.Collections.ArrayList;
[VMware.VimAutomation.ViCore.Impl.V1.Inventory.VirtualMachineImpl[]]$vmss = `
Get-VM *;
for ([int]$private:i = 0; $private:i -lt $VMHostname.Length; $private:i++)
{
[bool]$addEmptyName = $true;
foreach($vm in $vmss)
{
if ($vm.Name -ne $null -and `
$vm.Guest -ne $null -and `
$vm.Guest.HostName -ne $null -and `
$vm.Guest.HostName.Length -gt 0){
if ($vm.Guest.HostName.toUpper() -eq `
$VMHostname[$private:i].toUpper() -or `
$vm.Guest.HostName.toUpper().Contains($VMHostname[$private:i].toUpper()))
{
$null = $vmnames.Add($vm.Name);
$addEmptyName = $false;
break;
}
}
}
# }
if ($addEmptyName){$vmnames.Add("");}
}
return $vmnames;
}
#endregion function Get-ESXiVMName
#region function New-ESXiVMs
function New-ESXiVMs
<#
.SYNOPSIS
Generates a bunch of virtual machines.
.DESCRIPTION
This function generates new virtual machine by copying the existing virtual machine files,
replacing the name of the original machine with the name that's provided and
copying the result to the server the module connected..
.PARAMETER TemplateVMName
The name of the virtual machine used as a template.
.PARAMETER Count
The number of virtual machines you need.
.PARAMETER Logname
The full path to the log file.
.PARAMETER NewVMName
The base name of new virtual machines. Virtual machines will be named in the follwing order:
newvm_1
newvm_2
...
newvm_20.
.PARAMETER BasePath
The path in the local file system where the template resides. the hardcoded values are
basepath\\hdd - the folder where the virtual disk(s)
<templatevm>-flat.vmdk,
<templatevm>-<number>delta.vmdk,
<templatevm>-Snapshot<number>.vmsn (snapshot of a machine that was turned on)
are stored. In short, the files of megabyte of gigabyte size.
basepath\\template - the folder where the rest of files
(namely,
<templatevm>.vmx,
<templatevm>.vmxf,
<templatevm>.vmsd,
<templatevm>.vmdk (the header),
<templatevm>-<number>.vmdk,
<templatevm>-Snapshot<number>.vmsn (snapshot of a machine that was turned off)
) reside, in other words, the files the size of which
are measured in kilobytes
.PARAMETER PathToPlink
Used if for some reason you don't want to put plink.exe in the module folder.
.PARAMETER OperationTimeout
The time that the module sleeps before start next operation.
.EXAMPLE
PS C:\\> New-ESXiVMs -TemplateVMName 'template XP SP2 Sv' -Count 20 `
-Logname "C:\\VMTests\\20VMs.txt" -NewVMName 'XPSP2a' `
-BasePath 'C:\\VMTests\\xpsp2';
.INPUTS
System.String, System.Int32
.OUTPUTS
None
#>
(
[CmdletBinding()]
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$TemplateVMName,
[Parameter(Mandatory=$true)]
[int]$Count = 1,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$Logname,
[Parameter(Mandatory=$true)]
[string]$NewVMName = 'newVM_',
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$BasePath,
[Parameter(Mandatory=$false)]
[AllowEmptyString()]
[string]$PathToPlink,
[int]$OperationTimeout = 600
)
{
if ($PathToPlink.Length -lt 1){$PathToPlink = $script:plinkPath;}
# the need in storaging a template VM on a host is deprecated
# if we used traditional PowerCLI cmdlets, it would be easy to read properties from a template
# or use a template and put the data to a new machine or even create one from template
#[VMware.VimAutomation.ViCore.Impl.V1.Inventory.VirtualMachineImpl]$script:templateVM = `
# Get-VM -Server $script:esxiserver -Name $TemplateVMName;
#if ($script:templateVM -eq $null)
#{
# Write-Error "Couldn`'t get the '$($TemplateVMName)' virtual machine on the $($script:esxiserver) host.";
# return;
#}
for ($private:i = 0; $private:i -lt $Count; $private:i++)
{
[string]$private:currentVMName = $NewVMName + ($private:i + 1).ToString();
"$(Get-CurrentTime)Start creating the virtual machine '$($private:currentVMName)'" >> $Logname;
#region #Unsupported for the ESXi host:
# $private:newvm = New-VM -VM $script:templateVM `
# -Name $private:currentVMName `
# -Datastore $script:datastore `
# -VMHost $script:vmhost;
#endregion #Unsupported for the ESXi host:
#region #Unsupported for the ESXi host:
# $private:newvm = New-VM `
# -Name $private:currentVMName `
# -Datastore $script:datastore `
# -VMHost $script:vmhost; # `
# #-MemoryMB $script:templateVM.MemoryMB `
# #-NumCpu $script:templateVM.NumCpu
#endregion #Unsupported for the ESXi host:
New-Item -Path "$($BasePath)\\$($private:currentVMName)" -type directory -Force;
[string]$templateStorage = $BasePath + "\\template";
[string]$hddStorage = $BasePath + "\\hdd";
Get-ChildItem -LiteralPath $templateStorage | `
%{[string]$currentFile = $_.FullName;
[string]$newFile = `
$currentFile.ToLower().Replace("$($templateStorage)\\$($TemplateVMname)".ToLower(), `
"$($BasePath)\\$($private:currentVMName)\\$($private:currentVMName)");
"Changing $($currentFile) to $($newFile)" >> $Logname;
Copy-Item -Path $currentFile -Destination $newFile;
(Get-Content $newFile) | %{ $_ -replace $TemplateVMname, $private:currentVMName; } | `
Set-Content -Path $newFile;}
New-ESXiFSDirectory -Server $script:esxiserver.Name -User $script:esxiserver.User -Password $script:pwd `
-Path "/vmfs/volumes/$($script:datastore.Name)" -Name $private:currentVMName `
-PathToPlink $PathToPlink -OperationTimeout 20;
"$(Get-CurrentTime)Copying the config files '$($private:currentVMName)'" >> $Logname;
Copy-DatastoreItem -Item "$($BasePath)\\$($private:currentVMName)\\$($private:currentVMName)*.*" `
-Destination "$($script:dsdrive):\\$($private:currentVMName)\\";
"$(Get-CurrentTime)Copying the virtual drive image(s) '$($private:currentVMName)'" >> $Logname;
Get-ChildItem -Path "$($hddStorage)" |
%{[string]$private:newFileName = $_.Name.Replace($TemplateVMname, $private:currentVMName);
Copy-DatastoreItem -Item $_.FullName `
-Destination "$($script:dsdrive):\\$($private:currentVMName)\\$($private:newFileName)";}
#region #Unsupported for the ESXi host:
# $private:newvm = `
# New-VM -VMHost $script:vmhost `
# -VMFilePath "$($script:dsdrive):\\$($private:currentVMName)\\$($private:currentVMName).vmx";
#endregion #Unsupported for the ESXi host:
#region #Unsupported for the ESXi host:
# Copy-HardDisk -HardDisk $vm.HardDisks[0] `
# -DestinationPath "[$($DatastoreName)] $($private:currentVMName)/"
# Copy-DatastoreItem -Item "$($script:dsdrive):\\templXPSP3\\templXPSP3.vmdk" -Destination "$($script:dsdrive):\\3\\1.vmdk"
#endregion #Unsupported for the ESXi host:
"$(Get-CurrentTime)Registering the VM '$($private:currentVMName)'" >> $Logname;
Register-ESXiVM -Server $script:esxiserver.Name -User $script:esxiserver.User -Password $script:pwd `
-Path "/vmfs/volumes/$($script:datastore.Name)/$($private:currentVMName)/$($private:currentVMName).vmx" `
-PathToPlink $PathToPlink;
[int]$private:vmId = Get-ESXiVMId -VM (Get-VM -Name $private:currentVMName);
#region #Unsupported for the ESXi host:
# Start-VM -VM (Get-VM -Name $private:currentVMName) -RunAsync;
#endregion #Unsupported for the ESXi host:
"$(Get-CurrentTime)Starting the VM '$($private:currentVMName)'" >> $Logname;
Start-ESXiVM -Server $script:esxiserver.Name -User $script:esxiserver.User -Password $script:pwd `
-Id $private:vmId `
-PathToPlink $PathToPlink;
#region #Unsupported for the ESXi host:
# Set-VMQuestion -VMQuestion (Get-VM XPSP3_2 | Get-VMQuestion) -Option 'I copied it' -Confirm:$false
#endregion #Unsupported for the ESXi host:
sleep -Seconds $OperationTimeout;
#region #Unsupported for the ESXi host:
# Get-VM $private:currentVMName | Suspend-VMGuest
#endregion #Unsupported for the ESXi host:
Suspend-ESXiVM -Server $script:esxiserver.Name -User $script:esxiserver.User -Password $script:pwd `
-Id $private:vmId `
-PathToPlink $PathToPlink;
}
}
#endregion function New-ESXiVMs
#endregion public functions
# Tested functions
Export-ModuleMember -Function Connect-ESXi, Invoke-ESXiCommand, New-ESXiFSDirectory;
Export-ModuleMember -Function Register-ESXiVM, Start-ESXiVM, Suspend-ESXiVM, New-ESXiVMs;
Export-ModuleMember -Function Get-ESXiVMId, Get-ESXiVMName, Disconnect-ESXi, Stop-ESXiVM;
|
combined_dataset/train/non-malicious/finddupe_3.ps1 | finddupe_3.ps1 | function Get-MD5([System.IO.FileInfo] $file = $(throw 'Usage: Get-MD5 [System.IO.FileInfo]'))
{
$stream = $null;
$cryptoServiceProvider = [System.Security.Cryptography.MD5CryptoServiceProvider];
$hashAlgorithm = new-object $cryptoServiceProvider
$stream = $file.OpenRead();
$hashByteArray = $hashAlgorithm.ComputeHash($stream);
$stream.Close();
## We have to be sure that we close the file stream if any exceptions are thrown.
trap
{
if ($stream -ne $null)
{
$stream.Close();
}
break;
}
foreach ($byte in $hashByteArray) { if ($byte -lt 16) {$result += “0{0:X}” -f $byte } else { $result += “{0:X}” -f $byte }}
return [string]$result;
}
write-host "Usage: finddupe.ps1 <directory1> <directory2> ... <directoryN>"
$matches = 0 # initialize number of matches for summary.
if ($args.count -eq 0) { $files = (dir -recurse | ? {$_.psiscontainer -ne $true})}
else {$files = (dir $args -recurse | ? {$_.psiscontainer -ne $true})}
for ($i=0;$i -ne $files.count; $i++) # Cycle thru all files
{
if ($files[$i] -eq $null) {continue}
$md5 = $null
$filecheck = $files[$i]
$files[$i] = $null
for ($c=0;$c -ne $files.count; $c++)
{
if ($files[$c] -eq $null) {continue}
# write-host "Comparing $filecheck and $($files[$c]) `r" -nonewline
if ($filecheck.length -eq $files[$c].length)
{
#write-host "Comparing MD5 of $($filecheck.fullname) and $($files[$c].fullname) `r" -nonewline
if ($md5 -eq $null) {$md5 = (get-md5 $filecheck)}
if ($md5 -eq (get-md5 $files[$c]))
{
write-host "Size and MD5 match: " -fore red -nonewline
"{0} and {1}" -f $filecheck.fullname, $files[$c].fullname
$matches++
$files[$c] = $null
}
}
}
}
write-host ""
write-host "Number of Files checked: $($files.count)." # Display useful info; files checked and matches found.
write-host "Number of matches found: $($matches)."
write-host ""
|
combined_dataset/train/non-malicious/Custom Speech Commands_1.ps1 | Custom Speech Commands_1.ps1 | #Filename commands.ps1
import-module "G:\\Documents\\Speech Macros\\custom.psm1"
import-module "G:\\Documents\\Speech Macros\\alice.psm1"
Add-SpeechCommands @{
"test command" = { Say $(Respond "3:2,4:0-2") }
" * the percentages * " = { Say $(Percentages) }
" * star date * " = { Say "Current, Star date, $("$((Get-Date).year).$([math]::round($((Get-Date).dayofyear)/365, 2)*100)" -replace "([A-Za-z0-9.]){1}","`$1 " -replace "\\.","point")" }
" * mail * " = { Start-Process "https://mail.google.com" }
"Google * please" = { $term = $_ -replace "$Computer(.+?)Google (.+?) please", '$2'; Start-Process "http://www.google.com/search?q=$term" }
"What * time * " = { Say "It is $(Get-Date -f "h:mm tt")" }
"What is * time * " = { Say "It is $(Get-Date -f "h:mm tt")" }
"What time * " = { Say "It is $(Get-Date -f "h:mm tt")" }
" * some music * " = { Start-Process "grooveshark.exe" }
"What * date today" = { Say $(Get-Date -f "dddd, MMMM dd") }
#list processes
"What's running?" = {
$proc = ps | sort ws -desc
Say $("$($proc.Count) processes, including $($proc[0].name), which is using " +
"$([int]($proc[0].ws/1mb)) megabytes of memory")
}
#Word Definition
" * the definition for * please" = {$define = $_ -replace "$Computer(.+?)the definition for (.+?) please", '$2' ;$outtext = Get-Definition("$define");Say "Definitions for $define, , , $outtext"}
} -Computer "alice" -Verbose
#eof
#Filename custom.psm1
function Get-Definition($word) {
#.Synopsis
# Polls wiktionary for top text definitons for a given $word input
#.Description
# This Function parses the top $lines definitions for a given
# $term into one string formatted for speech synthesis
#
#
Say "Sure"
if($word -match " "){Say "Fail, one word at a time please"; break}
$page = "http://simple.wiktionary.org/wiki/$word"
$ie = new-object -com "InternetExplorer.Application"
$ie.visible = $false
$ie.navigate($page)
while($ie.busy){Start-Sleep 1}
$output = " "
$lines = 0
for($d=0;$d -le $lines;$d++) { ## grab the definition strings from each table
$ol = @($ie.Document.getElementsByTagName("ol"))[0]
$li = @($ol.getElementsByTagName("li"))[$d]
$def = @($li.innerHTML)
$output += "$def"
if($d -lt $lines){ $output += ", or, " }
}
$ie.Quit()
$closeIE = [System.Runtime.Interopservices.Marshal]::FinalReleaseComObject($ie)
Remove-Variable ie
$Clean-String($output)
}
function Clean-String([string]$str){
#.Synopsis
# Cleans string from web (most concerned about x/html tags)
#.Description
# Cleans input string of xml tags
# returns $str
#
#
$str = $str -replace "\\<[^<]*\\>", " "
$str = $str.replace(" ", "")
$str
}
function Respond($in, [string]$del = ","){
#.Synopsis
# Recursive.
# Returns a random response from $responses via the three dimensional array of choices: $choices[<groups>][<dimensions>][<values>]
# This function takes in a string indicating which responses from the $responses array
# to to choose from. It supports ranges (-) and direct selections (/) in each seed separated by (,).
#.Description
# the idea here is to respond based on this format: $in = "3:2,4:1-2,0/2-4/6:1"
# where 3:2 is a direct seed, 4:1-2 is a range seed (from 4:1 to 4:2),
# and 0/2-4/6:1 combines the two (effectively adds 0:1, 2:1, 3:1, 4:1, 5:1, 6:1 to the choices)
# In heap, the above example would effectively add 3:2, 4:1, 4:2, 0:1, 2:1, 3:1, 4:1, 5:1, 6:1 to the
# available choices, and will appear as $choices(@($xs(3),$ys(2)),@($xs(4),$ys(1,2)),@($xs(0,2,3,4,6),$ys(1)))
#
switch -wildcard ($del){
"`,"{
if($in -match "`,"){ #if more than one coordset, handle each
$coordsets = $in -split "`," #split coordsets apart
foreach($coordset in $coordsets){
$choices += ,(Respond $coordset "`:")
}
}
else{ #else pass the string to the next step,
$choices = ,(Respond $in "`:")
}
$choice = $choices[(get-random -min 0 -max $choices.count)] #choose one of the groups randomly
$responses[$choice[0]][$choice[1]];#pass response out of the function
}
"`:"{
$coords = $in -split "`:" #split coordset apart
foreach ($coord in $coords){
if(($coord -match "`/")-or($coord -match "`-")){ #if there's an or operator or a range
$dimensions += ,(Respond $coord "`/") # handle them, and add all values (in array) to this dimension (split fails elegantly)
}
else{
$dimensions += ,$coord #else just add the coord value (in an array) via comma operator
}
}
$dimensions #pass dimensions out dimensions is two dimensional array
}
"`/"{
$ranges = $in -split "`/" #split ORs apart (if theres not OR, the string is still added to $ranges[0])
foreach($range in $ranges){
if($range -match "`-"){#if theres a range to handle, do so
foreach ($val in (Respond $range "`-")){
$orVals += ,$val #append all values in returned range array to new array
}
}
else{# else just append the value to teh new array
$orVals += ,$range
}
}
,($orVals | get-random) #pass out single element array of random value from vals array
}
"`-"{
$vals = $in -split "`-" #split ranges apart
$vals[0]..$vals[1] # pass out array containing all values in range
}
}
}
$responses = (#Response Array
(##0-correct
"Right",
"Correct"
),
(##1-incorrect
"Wrong",
"Incorrect"
),
(##2-positive
"Yes",
"Aye",
"I'll give it a shot"
),
(##3-negative
"No",
"Negative",
"Not going to happen"
),
(##4-affirmation
"Sure",
"OK",
"Lets See"
),
(##5-retort
"your mom",
"your face"
),
(##6-insult
"You\\'re dumb",
"you fail"
),
(##7-eager
"I'm ready",
"Lets check it out"
),
(##8-apprehensive
"I don't know",
"Just a seck"
),
(##9-neutral
"oh",
"Hum"
)
)
function Percentages {
#.Synopsis
# Specific speech command that reads back
# remaining percentages of year, month, week, and day
#.Description
# Pretty self explanitory, basic maths, elucidatory var names
#
#
$date = get-date #capture date object
$daysInYear = [int]$(if([datetime]::IsLeapYear($date.year)){366}else{365}) #if leap year, 366, else 365
$daysInMonth = [int]$([datetime]::DaysInMonth($date.year, $date.month)) #capture days in month
$dayOfYear = [int]$date.dayofyear #days past (including today)
$dayOfMonth = [int]$date.day #days past (including today)
$hoursOfDay = [int]$date.hour #hours past (including current)
$minutesOfHour = [int]$date.minute #minutes past (including current)
switch ($date.dayofweek.toString()){ #assumes start of week is sunday
Sunday { [int]$dayOfWeek="1"; break }
Monday { [int]$dayOfWeek="2"; break }
Tuesday { [int]$dayOfWeek="3"; break }
Wednesday { [int]$dayOfWeek="4"; break }
Thursday { [int]$dayOfWeek="5"; break }
Friday { [int]$dayOfWeek="6"; break }
Saturday { [int]$dayOfWeek="7"; break }
}
$percentYearGone = $dayOfYear/$daysInYear #days of this year (including today) divided by total days in this year
$percentMonthGone = ((($dayOfMonth*24)-24)+$hoursOfDay)/($daysInMonth*24) #hours of this month divided by total hours in this month
$percentWeekGone = ((($dayOfWeek*24)-24)+$hoursOfDay)/(7*24) #hours of this week divided by total hours in a week
$percentDayGone = ((($hoursOfDay*60)-60)+$minutesOfDay)/(24*60) #minutes of today divided by total minutes in a day
$percentYearLeft = [math]::round((1-$percentYearGone)*100,1) #opposite percentages rounded to one decimal place
$percentMonthLeft = [math]::round((1-$percentMonthGone)*100,1) #^
$percentWeekLeft = [math]::round((1-$percentWeekGone)*100,1) #^
$percentDayLeft = [math]::round((1-$percentDayGone)*100,1) #^
$str = ""
$str += "There's "
$str += $percentYearLeft
$str += "% of this year, "
$str += $percentMonthLeft
$str += "% of this month, "
$str += $percentWeekLeft
$str += "% of this week, and "
$str += $percentDayLeft
$str += "% of today remaining, what will you do with it?"
$str
}
#eof
|
combined_dataset/train/non-malicious/2579.ps1 | 2579.ps1 |
[CmdletBinding()]
param
(
[xml]$config = (Get-Content E:\Dexma\support\Sync-DBBackups-config.ps1)
)
cls
foreach ( $Client in $config.clients.client ) {
Write-Host "Begin $($Client.Name)." -ForegroundColor DarkGray
$BAKSourcePath = '\\' + $Client.SourceDBServer + '\e$\MSSQL10.MSSQLSERVER\MSSQL\BAK\'
$BAKDestPath = '\\' + $Client.DestDBServer + '\e$\MSSQL10.MSSQLSERVER\MSSQL\BAK\'
$ClientSrcPath = $BAKSourcePath + $Client.Name + '\'
if (!(Test-Path -Path $ClientSrcPath))
{
Write-Verbose -Message "$($ClientSrcPath) not found"
$CopyFrom = @();
}
ELSE
{
Write-Verbose -Message "Found source directory: $($ClientSrcPath)"
$CopyFrom = @(Get-ChildItem -path "$ClientSrcPath*.bak" )
$ClientDestPath = $BAKDestPath + $Client.Name + '\'
if (!(Test-Path -Path $ClientDestPath))
{
Write-Verbose -Message "Creating directory $($ClientDestPath)"
try {New-Item -ItemType directory -Path $ClientDestPath -ErrorAction Stop}
catch {$_; $CopyTo = @(); Write-Host "End $($Client.Name)." -ForegroundColor DarkGray; continue;}
}
Write-Verbose -Message "ClientDestPath: $($ClientDestPath)"
$CopyTo = @(Get-ChildItem -path "$ClientDestPath*.bak")
$Files2Copy = Compare-Object -ReferenceObject $CopyFrom -DifferenceObject $CopyTo -Property name, length -PassThru | Where-Object {$_.SideIndicator -eq "<="}
if ($Files2Copy -ne $NULL)
{
Write-Verbose -Message "Files2Copy: $($Files2Copy)"
try
{
foreach ($File in $Files2Copy)
{
Write-Verbose -Message "This will copy File $($File.FullName) to $($ClientDestPath)$($File.Name)"
Copy-Item -Path $($File.FullName) -Destination $ClientDestPath$($File.Name) -ErrorAction Stop
}
}
catch {$_.Exception;}
}
else
{
Write-Verbose -Message "No files to copy for $($Client.Name)"
}
$Files2Delete = Compare-Object -ReferenceObject $CopyFrom -DifferenceObject $CopyTo -IncludeEqual -Property name, length -PassThru | Where-Object {$_.SideIndicator -eq "=>"}
if ($Files2Delete -ne $NULL)
{
Write-Verbose -Message "Files2Delete: $($Files2Delete)"
try
{
foreach ($File in $Files2Delete)
{
Write-Verbose -Message "This will delete File $($File.FullName)"
Remove-Item -Path $($File.FullName)
}
}
catch {Write-Host "Failed deleting $($File.FullName)" -ForegroundColor DarkRed; $_.Exception;}
}
else
{
Write-Verbose -Message "No files to delete for $($Client.Name)"
}
}
Write-Host "End $($Client.Name)." -ForegroundColor DarkGray
} |
combined_dataset/train/non-malicious/4054.ps1 | 4054.ps1 | param(
[string]$refPath = 'Pscx1_0Commands.xml',
[string]$diffPath = 'Pscx1_1Commands.xml'
)
function Remove-Aliases($cmdal) {
$script:aliases = $($script:aliases |? {
$cmdal -notcontains $_.Name
})
}
function Get-CommandNoun($command) {
$command.Split('-', 2)[1]
}
function Get-AliasCommand($al) {
$diff |? { $_.Name -eq $al } |% { $_.ResolvedCommand.Name }
}
function Get-CommandAliasNames($command) {
$diff |? { $_.ResolvedCommand.Name -eq $command } |% { $_.Name }
}
function Format-CommandAliases($cmdal) {
$result = ''
$OFS = ', '
if ($cmdal) {
$result += ' ('
$result += "$cmdal"
$result += ')'
}
$result
}
$ref = Import-CliXml $refPath | Sort Name
$diff = Import-CliXml $diffPath | sort Name
$comparisonResult = Compare-Object $ref $diff -property Name,CommandType -sync 1000 | Sort-Object SideIndicator
$changes = $comparisonResult | Group-Object CommandType
$script:aliases = $null
$script:cmdlets = $null
$script:filters = $null
$script:functions = $null
$script:scripts = $null
$IsNew = { $_.SideIndicator -eq '=>' }
$IsRemoved = { $_.SideIndicator -eq '<=' }
$changes |% {
if ($_.Name -eq 'Alias') { $aliases = @($_.Group) }
if ($_.Name -eq 'Cmdlet') { $cmdlets = @($_.Group) }
if ($_.Name -eq 'Filter') { $filters = @($_.Group) }
if ($_.Name -eq 'Function') { $functions = @($_.Group) }
if ($_.Name -eq 'ExternalScript') { $scripts = @($_.Group) }
}
""
"NEW CMDLETS"
$cmdlets | ? $IsNew | Sort { Get-CommandNoun $_.Name } | %{
$cmdname = $_.Name
$result = " $cmdname"
$cmdal = @(Get-CommandAliasNames $cmdname)
$result += Format-CommandAliases $cmdal
Remove-Aliases $cmdal
$result
}
""
"NEW FUNCTIONS AND FILTERS"
@($functions + $filters) | ? $IsNew | Sort Name | %{
$name = $_.Name
$result = " $name"
$cmdal = @(Get-CommandAliasNames $name)
$result += Format-CommandAliases $cmdal
Remove-Aliases $cmdal
$result
}
""
"NEW SCRIPTS:"
$scripts | ? $IsNew | Sort Name | %{
$name = $_.Name
$result = " $name"
$cmdal = @(Get-CommandAliasNames $name)
$result += Format-CommandAliases $cmdal
Remove-Aliases $cmdal
$result
}
""
"NEW ALIASES"
$aliases | ? $IsNew | %{
" $($_.Name) ($(Get-AliasCommand $_.Name))"
}
""
"REMOVED STUFF"
$comparisonResult | ? $IsRemoved | Sort Name | %{
" $($_.Name)"
} |
combined_dataset/train/non-malicious/3458.ps1 | 3458.ps1 |
function Test-LinkedService
{
$dfname = Get-DataFactoryName
$rgname = Get-ResourceGroupName
$rglocation = Get-ProviderLocation ResourceManagement
$dflocation = Get-ProviderLocation DataFactoryManagement
New-AzResourceGroup -Name $rgname -Location $rglocation -Force
try
{
Set-AzDataFactoryV2 -ResourceGroupName $rgname -Name $dfname -Location $dflocation -Force
$lsname = "foo"
$expected = Set-AzDataFactoryV2LinkedService -ResourceGroupName $rgname -DataFactoryName $dfname -Name $lsname -File .\Resources\linkedService.json -Force
$actual = Get-AzDataFactoryV2LinkedService -ResourceGroupName $rgname -DataFactoryName $dfname -Name $lsname
Verify-AdfSubResource $expected $actual $rgname $dfname $lsname
Remove-AzDataFactoryV2LinkedService -ResourceGroupName $rgname -DataFactoryName $dfname -Name $lsname -Force
}
finally
{
CleanUp $rgname $dfname
}
}
function Test-LinkedServiceWithResourceId
{
$dfname = Get-DataFactoryName
$rgname = Get-ResourceGroupName
$rglocation = Get-ProviderLocation ResourceManagement
$dflocation = Get-ProviderLocation DataFactoryManagement
New-AzResourceGroup -Name $rgname -Location $rglocation -Force
try
{
$df = Set-AzDataFactoryV2 -ResourceGroupName $rgname -Name $dfname -Location $dflocation -Force
$linkedServicename = "foo1"
$expected = Set-AzDataFactoryV2LinkedService -ResourceGroupName $rgname -DataFactoryName $dfname -File .\Resources\linkedService.json -Name $linkedServicename -Force
$actual = Get-AzDataFactoryV2LinkedService -ResourceId $expected.Id
Verify-AdfSubResource $expected $actual $rgname $dfname $linkedServicename
Remove-AzDataFactoryV2LinkedService -ResourceId $expected.Id -Force
}
finally
{
CleanUp $rgname $dfname
}
}
function Test-LinkedServiceWithDataFactoryParameter
{
$dfname = Get-DataFactoryName
$rgname = Get-ResourceGroupName
$rglocation = Get-ProviderLocation ResourceManagement
$dflocation = Get-ProviderLocation DataFactoryManagement
New-AzResourceGroup -Name $rgname -Location $rglocation -Force
try
{
$df = Set-AzDataFactoryV2 -ResourceGroupName $rgname -Name $dfname -Location $dflocation -Force
$lsname = "foo"
$expected = Set-AzDataFactoryV2LinkedService -ResourceGroupName $rgname -DatafactoryName $dfname -Name $lsname -File .\Resources\linkedService.json -Force
$actual = Get-AzDataFactoryV2LinkedService -DataFactory $df -Name $lsname
Verify-AdfSubResource $expected $actual $rgname $dfname $lsname
Remove-AzDataFactoryV2LinkedService -ResourceGroupName $rgname -DatafactoryName $dfname -Name $lsname -Force
}
finally
{
CleanUp $rgname $dfname
}
}
function Test-LinkedServicePiping
{
$dfname = Get-DataFactoryName
$rgname = Get-ResourceGroupName
$rglocation = Get-ProviderLocation ResourceManagement
$dflocation = Get-ProviderLocation DataFactoryManagement
New-AzResourceGroup -Name $rgname -Location $rglocation -Force
try
{
Set-AzDataFactoryV2 -ResourceGroupName $rgname -Name $dfname -Location $dflocation -Force
$lsname = "foo"
Set-AzDataFactoryV2LinkedService -ResourceGroupName $rgname -DataFactoryName $dfname -Name $lsname -File .\Resources\linkedService.json -Force
Get-AzDataFactoryV2LinkedService -ResourceGroupName $rgname -DataFactoryName $dfname -Name $lsname | Remove-AzDataFactoryV2LinkedService -Force
Assert-ThrowsContains { Get-AzDataFactoryV2LinkedService -ResourceGroupName $rgname -DataFactoryName $dfname -Name $lsname } "NotFound"
}
finally
{
CleanUp $rgname $dfname
}
}
|
combined_dataset/train/non-malicious/sample_11_61.ps1 | sample_11_61.ps1 | <##############################################################
# #
# Copyright (C) Microsoft Corporation. All rights reserved. #
# #
##############################################################>
#
# Module manifest for module 'Microsoft.AzureStack.Diagnostics.SupportService'
#
@{
# Script module or binary module file associated with this manifest.
RootModule = '.\Microsoft.AzureStack.Diagnostics.SupportService.psm1'
# Version number of this module.
ModuleVersion = '1.2100.2531.331'
# ID used to uniquely identify this module
GUID = '4938D1C4-FD17-4D48-9EE4-6571914A5DE9'
# Author of this module
Author = 'Microsoft Corporation'
# Company or vendor of this module
CompanyName = 'Microsoft Corporation'
# Copyright statement for this module
Copyright = '(c) Microsoft. All rights reserved.'
# Description of the functionality provided by this module
# Description = 'Azure Stack Support Service Operation cmdlets.'
# Minimum version of the Windows PowerShell engine required by this module
# PowerShellVersion = ''
# Name of the Windows PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the Windows PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module
# CLRVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
# RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = @('Send-AzureStackDiagnosticLog','Send-DiagnosticData','Get-LogCollectionHistory','Enable-ProactiveLogCollection','Disable-ProactiveLogCollection','Get-ProactiveLogCollectionState','Get-AzureStackSupportConfiguration','Enable-AzsCloudConnection', 'Disable-AzsCloudConnection', 'Add-AzsCloudAction', 'Remove-AzsCloudAction', 'Get-AzsCloudAction', 'Enable-RemoteSupport', 'Disable-RemoteSupport', 'Get-RemoteSupportAccess', 'Get-RemoteSupportSessionHistory')
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = @()
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = @()
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
# Tags = @()
# A URL to the license for this module.
# LicenseUri = ''
# A URL to the main website for this project.
# ProjectUri = ''
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
# ReleaseNotes = ''
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDBPSLdum2TZHLM
# jmt/Uy6bshMr2gb1L9bZDgy+ZSXJGKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEII3nPsIyIK0C8XKzmCNaDL3H
# wrrQORaHGTEKfdfgvsoyMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAhLIlML5Ub+aq5OtbwN87wRszbxDcMizgUXhG0XzBSQg4Zv/D03YM19i1
# TuN0eemIS0z7p7eM5Hkk2wYrOcjUrdmfujIRKS5LiIpxn2DY1GggyA59gqESPU9k
# 5+odJmsEGUIq6CXGI99E2a0KQM7Ju67Z/yjqLZqyrUjA5N1bVwpapjeXMay3wPDP
# 7aL4IAfNhk+5MFm3heGX1j7KuxobTRTPM1r0dx/59T3i8UCLQdTVBnxD6Fv8k+ts
# glSJhDVoqF4+XVTJdnhaZrvHvnnxROB2N4pwtMVY/YG8L853URZ7hnqzQsKnEl59
# FSP8QBiKTilJz7vb/+dx9F5/AlH2naGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDuP8n70410354G0J3OEevDpMutWdGwExhcl3/sT+SC6QIGZbqjMyHz
# GBMyMDI0MDIxMjE0MDkzMy44NjdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC
# ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9
# aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2
# +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C
# cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH
# +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD
# K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5
# HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD
# kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN
# x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA
# ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS
# +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc
# v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi
# fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk
# EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi
# MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI
# yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU
# OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi
# xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH
# Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71
# RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq
# xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp
# O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR
# NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr
# xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz
# QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOl0SLowIhgPMjAyNDAyMTIxNTM1MjJaGA8yMDI0MDIxMzE1MzUyMlowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6XRIugIBADAHAgEAAgIMLTAHAgEAAgIT3zAKAgUA
# 6XWaOgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAJ4/sip+/qc1E5gdImJu
# jnRmqzGk04ZAlwN+eEO5ngxK/thUYULTdSxS+evVNLBNrvTausIyrC455QI209Vi
# y9VcMCYz5JMqq4O101HIfzBGX/WVsCS6sqAISzHRf/1uGkbaBAp9bfyOR7hjM6mD
# NnjSS1kYcQuu8CzPUcWIgr39MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgK0BUnWg0GOaD2rpC2z1p2pD2IjR+bIvh/HWbSbwE5jIwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69
# 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q
# wPM9tAujAAEAAAHlMCIEIE3+00phcYLWcmQs1jDY/ypqiHL25D9igsNlQ7ZB44/A
# MA0GCSqGSIb3DQEBCwUABIICAF9DQxC5BgNmKGlyPD+NQVmdi8HUCmixRbfiOR4b
# ls2W0Q7SH6pFi9gZPC4B3cQO58VQl1drCBeD0yL1uYPomNjSW1Oluig84PG361yH
# ZVCcPfy9faXPFqOL0sd5bH1cSvCG9sOj0R6S2DX4L2/AxygIG9IoH+L55sXqXC9B
# NRCs/PkfebMz6AHtC5HbCQa54qaoTA1GbqJ8soDlHJV6xY08lhcyXt+V16lwkxs8
# Z32P2lsSJyG/2Ndnrix4/13k/tVY1XB9xRk5Eqrs8bqz7LcidXH/Ug6p+Yw+15gr
# 3AmBWfxjKYAkXlRJwUMi+DcFIx52YBYIRE2FKSHVx3x5a0FVc3nC+tm9t9HXLraK
# SDCsidIl+Py5rqPihgk7r3Du0JxMZL7/1/Uq1RxcqyQk3+2TL3q6E6n6b2R29t4+
# OyA+qh5ttLbQOVt5NKui3bUs1R/McUSxxsUBf4rURyTyNtrH9ppH4EWBNNalt1MI
# JNk/3WIfzxyHJMbw53ZQB29JWBnZ9Q73Q4r80fno69apRCJ33s1AZGiqJg4FGnbZ
# aQIadhjGUUnPO0E6hG3h/t1VwvDWi2SVi4EujMtlEDG2vW0G/pcAkk27wJcHx9gp
# IQi9pb6/cLkgf7rWPix9TB776UZuBuIG509+pZIV44aXr+R42R9Nz9Ueq3nyc0+q
# qqBU
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_59_79.ps1 | sample_59_79.ps1 | @{
GUID="EEFCB906-B326-4E99-9F54-8B4BB6EF3C6D"
Author="PowerShell"
CompanyName="Microsoft Corporation"
Copyright="Copyright (c) Microsoft Corporation."
ModuleVersion="7.0.0.0"
CompatiblePSEditions = @("Core")
PowerShellVersion="3.0"
NestedModules="Microsoft.PowerShell.Commands.Management.dll"
HelpInfoURI = 'https://aka.ms/powershell73-help'
FunctionsToExport = @()
AliasesToExport = @("gcb", "gin", "gtz", "scb", "stz")
CmdletsToExport=@("Add-Content",
"Clear-Content",
"Get-Clipboard",
"Set-Clipboard",
"Clear-ItemProperty",
"Join-Path",
"Convert-Path",
"Copy-ItemProperty",
"Get-ChildItem",
"Get-Content",
"Get-ItemProperty",
"Get-ItemPropertyValue",
"Move-ItemProperty",
"Get-Location",
"Set-Location",
"Push-Location",
"Pop-Location",
"New-PSDrive",
"Remove-PSDrive",
"Get-PSDrive",
"Get-Item",
"New-Item",
"Set-Item",
"Remove-Item",
"Move-Item",
"Rename-Item",
"Copy-Item",
"Clear-Item",
"Invoke-Item",
"Get-PSProvider",
"New-ItemProperty",
"Split-Path",
"Test-Path",
"Test-Connection",
"Get-Process",
"Stop-Process",
"Wait-Process",
"Debug-Process",
"Start-Process",
"Remove-ItemProperty",
"Rename-ItemProperty",
"Resolve-Path",
"Get-Service",
"Stop-Service",
"Start-Service",
"Suspend-Service",
"Resume-Service",
"Restart-Service",
"Set-Service",
"New-Service",
"Remove-Service",
"Set-Content",
"Set-ItemProperty",
"Restart-Computer",
"Stop-Computer",
"Rename-Computer",
"Get-ComputerInfo",
"Get-TimeZone",
"Set-TimeZone",
"Get-HotFix",
"Clear-RecycleBin")
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB2hkTtaUoEPwgP
# 0uY2BNZvBEeBHi/ZnrovUng9j7clMqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIBmRrZ/JFDQDslXn7diaeI0d
# BAL5HEual88cj8T0uEgxMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAdZy6XrD+RBKUdOG9Skwg02hdliPRoX/ByoBAeUavAU8DutxE/t/8lRw/
# QqXbZbq5HBR6twDLwiWJjzyGpHAferJulQ51WkXGL1fkWyK138aylXyv6H7mgF3l
# kq8QFZ1zvlAeEf20RzwFdIq4A+LUP7CdEygnQgcwnBIn+g/2P220nMJnWYuCFXua
# TgNCNrozkfaWu+wuQvfAri9sBcrSHBA35LzMenYZ+MyQ0D0SKThfesv8t17xJ4yy
# vRd988ysU/LgXk/wdrFaLG6W9BH7g4skRw3+GZ2BEpULlEas8oGwwERfIcNDTRi1
# 1zQXknFYY9RLYqS1KE0C0/w31RTvBqGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCo6bqgIIkkxprm8f1rgDLXADIgAbJywxGUtmVnr3NfaAIGZkZX41x2
# GBMyMDI0MDYxMzAxMDkzNy45NTVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzMwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAebZQp7qAPh94QABAAAB5jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MTVaFw0yNTAzMDUxODQ1MTVaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzMwMy0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC9vph84tgluEzm/wpNKlAjcElGzflvKADZ1D+2d/ie
# YYEtF2HKMrKGFDOLpLWWG5DEyiKblYKrE2nt540OGu35Zx0gXJBE0zWanZEAjCjt
# 4eGBi+uakZsk70zHTQHHyfP+B3m2BSSNFPhgsVIPp6vo/9t6OeNezIwX5E5+VwEG
# 37nZgEexQF2fQZYbxQ1AauqDvRdXsSpK1dh1UBt9EaMszuucaR5nMwQN6sDjG99F
# zdK9Atzbn4SmlsoLUtRAh/768sKd0Y1hMmKVHwIX8/4JuURUBRZ0JWu0NYQBp8kh
# ku18Q8CAQ500tFB7VH3pD8zoA4lcA7JkxTGoPKrufm+lRZAA4iMgbcLZ2P/xSdnK
# FxU8vL31RoNlZJiGL5MqTXvvyBLz+MRP4En9Nye1N8x/lJD1stdNo5wJG+mgXsE/
# zfzg2GaVqQczFHg0Nl8bpIqnNFUReQRq3C1jVYMCScegNzHeYtw5OmZ/7eVnRmjX
# lCsLvdsxOzc1YVn6nZLkQD5y31HYrB9iIHuswhaMv2hJNNjVndkpWy934PIZuWTM
# k360kjXPFwl2Wv1Tzm9tOrCq8+l408KIL6J+efoGNkR8YB3M+u1tYeVDO/TcObGH
# xaGFB6QZxAUpnfB5N/MmBNxMOqzG1N8QiwW8gtjjMJiFBf6iYYrCjtRwF7IPdQLF
# tQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFOUEMXntN54+11ZM+Qu7Q5rg3Fc9MB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBhbuogTapRsuwSkaFMQ6dyu8ZCYUpWQ8iI
# rbi40tU2hK6pHgu0hj0z/9zFRRx5DfhukjvbjA/dS5VYfxz1EIbPlt897MJ2sBGO
# 2YLYwYelfJpDwbB0XS9Zkrqpzq6X/lmDQDn3G5vcYpYQCJ55LLvyFlJ195AVo4Wy
# 8UX5p7g9W3MgNHQMpM+EV64+cszj4Ho5aQmeKGtKy7w72eRY/vWDuptrvzruFNmK
# CIt12UcA5BOsXp1Ptkjx2yRsCj77DSml0zVYjqW/ISWkrGjyeVJ+khzctxaLkklV
# wCxigokD6fkWby0hCEKTOTPMzhugPIAcxcHsR2sx01YRa9pH2zvddsuBEfSFG6Cj
# 0QSvEZ/M9mJ+h4miaQSR7AEbVGDbyRKkYn80S+3AmRlh3ZOe+BFqJ57OXdeIDSHb
# vHzJ7oTqG896l3eUhPsZg69fNgxTxlvRNmRE/+61Yj7Z1uB0XYQP60rsMLdTlVYE
# yZUl5MLTL5LvqFozZlS2Xoji4BEP6ddVTzmHJ4odOZMWTTeQ0IwnWG98vWv/roPe
# gCr1G61FVrdXLE3AXIft4ZN4ZkDTnoAhPw7DZNPRlSW4TbVj/Lw0XvnLYNwMUA9o
# uY/wx9teTaJ8vTkbgYyaOYKFz6rNRXZ4af6e3IXwMCffCaspKUXC72YMu5W8L/zy
# TxsNUEgBbTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjMzMDMtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDi
# WNBeFJ9jvaErN64D1G86eL0mu6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6hRs5TAiGA8yMDI0MDYxMjE4NTIy
# MVoYDzIwMjQwNjEzMTg1MjIxWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqFGzl
# AgEAMAcCAQACAh7AMAcCAQACAhPMMAoCBQDqFb5lAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAIAQPRGB7Ox2uUYGNJM06irU0GZfvusSyjbItGadKl1KJf4B
# b78hFl5iVBkI0ioSZ/xTis5dSOUjHp9YuheDTNWioOyJLyD6zgoCfoojKXpn/bkz
# AxpVStZPah/UhU9AzNI1DQGaZIykuk2IGMO0oe/9rrBczudhSe6UxAchQyW3bMSl
# imD4l2e/BkAvIMBviW84fZyLG2vOYA7PJnF6Mfv76V16wq95T0/ES0a/aE7+4NvH
# TQCTz9kHkf8MURWR/IJX2k0bUJBkQWfpiawvibLsSzk3gEOIrRRXyjCAyyhIRWer
# sxajhw8PBMy13yxI0652mzl/oOjWvU/qbcWcYwkxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAebZQp7qAPh94QABAAAB5jAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCAuM+rznF9KdbsLxdUKkQNfjh3IFk3weUe0m3lTxPM7ZTCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM+7o4aoHrMJaG8gnLO1q16hIYcR
# noy6FnOCbnSD0sZZMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHm2UKe6gD4feEAAQAAAeYwIgQgFbqwGUVdjagHAbtT530IegR/ddlC
# LWzG7TEQZFRHyh0wDQYJKoZIhvcNAQELBQAEggIAi4UcwhZItFQ40YIufW0yUUoI
# bEyAFG65sUtCh8pnkTyzO0hN7Rt9081b/oYEvv7Cz/lkr/t1INhobbbwhHIsavvH
# kQjnczSyE4r7UTq7YwWIqbGA6ksbZZv+n1ArktfmuOaKOcH1yFQiNjiKvnReV8jt
# bOSmC1oxWl6wYBKyE8jCzydsN5yoryeiaYefgq4V5VFiBQ6udpCE9n8L1ghqdX3i
# Dl2cTKZ/DUAzhZmHUZWm7+T4CkEsEDTODVoaGyGHyZMLjlswVpvPNUwbwc110ey7
# jgvzW2e7lrigrMzWUDSJvzVX6wYi2xo/k7J4XXzoBwihPDAK1UcvmyUW2dEa2rkG
# y2iw6REUmNDjjh3BlbfHOw6FmiqS8nUKY53y+lrmcR+0BIutVq64+a+Jb0ySrZ6Q
# 197uk+FaPzHW0sVzXvLIJ8bkTsDDSIJ4C3o/Ec2ED+QqM3xuCuj/+S+B48tWUU/q
# XLoqQj9qRGwOxKJonE0eQ1dwW9eC/tk1FGc941OL2EbBHKYa7I+pnxvanARoXe8A
# k6E6Wpvmk4Iywz2ZvwoytNXE4zaw5vmGK4r/UK5wO2Q3Sn/lMnrwOAXR/jgxNV6J
# 3CsSYB5/tXMa/W6m5/TbkjzejIhfNcdsvwN0nHAV3D+5e+ZkIQBQfRUdx9PT08rK
# el11GFLU2ClrBMm6afQ=
# SIG # End signature block
|
combined_dataset/train/non-malicious/246.ps1 | 246.ps1 | function New-CimSmartSession
{
[CmdletBinding()]
PARAM (
[Parameter(ValueFromPipeline = $true)]
[string[]]$ComputerName = $env:COMPUTERNAME,
[System.Management.Automation.Credential()]
$Credential = [System.Management.Automation.PSCredential]::Empty
)
BEGIN
{
function Get-DefaultMessage
{
PARAM ($Message)
Write-Output "[$(Get-Date -Format 'yyyy/MM/dd-HH:mm:ss:ff')][$((Get-Variable -Scope 1 -Name MyInvocation -ValueOnly).MyCommand.Name)] $Message"
}
$CIMSessionSplatting = @{ }
IF ($PSBoundParameters['Credential']) { $CIMSessionSplatting.Credential = $Credential }
$CIMSessionOption = New-CimSessionOption -Protocol Dcom
}
PROCESS
{
FOREACH ($Computer in $ComputerName)
{
Write-Verbose -Message (Get-DefaultMessage -Message "$Computer - Test-Connection")
IF (Test-Connection -ComputerName $Computer -Count 1 -Quiet)
{
$CIMSessionSplatting.ComputerName = $Computer
IF ((Test-WSMan -ComputerName $Computer -ErrorAction SilentlyContinue).productversion -match 'Stack: ([3-9]|[1-9][0-9]+)\.[0-9]+')
{
TRY
{
Write-Verbose -Message (Get-DefaultMessage -Message "$Computer - Connecting using WSMAN protocol (Default, requires at least PowerShell v3.0)")
New-CimSession @CIMSessionSplatting -errorVariable ErrorProcessNewCimSessionWSMAN
}
CATCH
{
IF ($ErrorProcessNewCimSessionWSMAN) { Write-Warning -Message (Get-DefaultMessage -Message "$Computer - Can't Connect using WSMAN protocol") }
Write-Warning -Message (Get-DefaultMessage -Message $Error.Exception.Message)
}
}
ELSE
{
$CIMSessionSplatting.SessionOption = $CIMSessionOption
TRY
{
Write-Verbose -Message (Get-DefaultMessage -Message "$Computer - Connecting using DCOM protocol")
New-CimSession @SessionParams -errorVariable ErrorProcessNewCimSessionDCOM
}
CATCH
{
IF ($ErrorProcessNewCimSessionDCOM) { Write-Warning -Message (Get-DefaultMessage -Message "$Computer - Can't connect using DCOM protocol either") }
Write-Warning -Message (Get-DefaultMessage -Message $Error.Exception.Message)
}
FINALLY
{
$CIMSessionSplatting.Remove('CIMSessionOption')
}
}
}
}
}
} |
combined_dataset/train/non-malicious/sample_7_78.ps1 | sample_7_78.ps1 | // ===========================================================================================================================
// Class DCIM_LDAPService
// ===========================================================================================================================
[
Description ("Contains settings for parsing a generic LDAP service"),
Provider ("dcismprovider"),
Version ("1.0.0"),
Invisible
]
class DCIM_LDAPService
{
[
Description ("Contains settings for parsing a generic LDAP service."),
Write
]
DCIM_LDAPSearchSettings REF SearchSettings;
};
/* SIG # Begin signature block */
/* MIItDgYJKoZIhvcNAQcCoIIs/zCCLPsCAQExDzANBglghkgBZQMEAgEFADB5Bgor */
/* BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG */
/* KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBgobzgNHc3zr5M */
/* 4uscXgYCuPWQvexGbnhUJW5XvaLgrqCCEmMwggXfMIIEx6ADAgECAhBOQOQ3VO3m */
/* jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE */
/* ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s */
/* ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv */
/* ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy */
/* dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx */
/* MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu */
/* MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp */
/* b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK */
/* AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq */
/* gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l */
/* OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr */
/* +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d */
/* vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 */
/* HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn */
/* DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig */
/* nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z */
/* HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK */
/* Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u */
/* DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC */
/* AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw */
/* FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG */
/* AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn */
/* MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp */
/* MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O */
/* BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp */
/* UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 */
/* BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ */
/* LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv */
/* 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF */
/* VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX */
/* bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG */
/* CDCCA/CgAwIBAgIQBu9mzEaGqLK0hNoZKy1rYTANBgkqhkiG9w0BAQ0FADBPMQsw */
/* CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 */
/* cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yNDA0MTkwOTE2MDlaFw0y */
/* NTA1MTIwOTE2MDhaMIGEMQswCQYDVQQGEwJVUzEOMAwGA1UECBMFVGV4YXMxEzAR */
/* BgNVBAcTClJvdW5kIFJvY2sxEjAQBgNVBAoTCURlbGwgSW5jLjEoMCYGA1UECxMf */
/* U2VydmVyIFN5c3RlbXMgTWdtdCBFbmdpbmVlcmluZzESMBAGA1UEAxMJRGVsbCBJ */
/* bmMuMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAvFatHoJS1lbvBD4U */
/* x/jt6hrhOHlGpntV/TPJbKwAdvG6SCT6MfdFasEGShyzypfx8adv3v+sFWo84yYB */
/* GqnqH/Kkj48BTKNREXjN3x/jLZrv+rVRQJYG79us7u3vQVSBX0ds0Jcd9f7u2REE */
/* aLBKrd7ZwxmsHoiAaqKYBm8nMo4kmH4xOw6cOXxUW6mkYxNQxn60nxV5A2ZJvUKn */
/* YvanuULo5jGrl+t2A5jInOLyxSmNU62DdLbyhtE3B6cEhe5yQ54hi7d6c5IM2fNH */
/* FNrQkRavAWUyAxPPBpTSsR0g/IkNymbNPCTjgvDQOIJBcMp0C+q158RIBiE+IMwq */
/* QGi7aUvUUhzTQG9NcSDQan3hMmYfevU3RLQMw4OcoGIT/jOSYmgtcLHiB6lnOG/h */
/* iJ8EsQgW1s2yJ7vG2Fo/IHvQjbfFxefO+gluw4UjcLZgIqACIlFNYGaq4rzKtTeF */
/* 1NNy6DjjbJV2nt/JlD68YlFg0pU9rGDKglZFWvfWiLId8IJnAgMBAAGjggEoMIIB */
/* JDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRFrXrMchlvXUnwqKV0rQOPRSgzqzAf */
/* BgNVHSMEGDAWgBTvn7p5sHPyJR54nANSnBtThN6N7TBnBggrBgEFBQcBAQRbMFkw */
/* IwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAC */
/* hiZodHRwOi8vYWlhLmVudHJ1c3QubmV0L292Y3MyLWNoYWluLnA3YzAxBgNVHR8E */
/* KjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L292Y3MyLmNybDAOBgNV */
/* HQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwEwYDVR0gBAwwCjAIBgZn */
/* gQwBBAEwDQYJKoZIhvcNAQENBQADggIBACoeAWs2aV9gf+TF4AGOKc454/E55mVR */
/* Yz42M1ksqASl2j+ulObFIWcuy/paLjWhMSulehEA8Zb+YQ89fR6Y0TgJ0Eh09aK5 */
/* +GARB7q/+a+gRIw7nfrwmjMkXAwL+9lmbc1X64fEUuKY2NVdksjKC7xRKNMb5i50 */
/* NQyVN9neCJKIVSQDiBMXGgtDkAqPe1sH7/NGGQZKCXhIg3f3caq7dr/mZoiVAIOB */
/* XtHr++65DqG61aWyZV5tCfzSvXFvLpL0dbu14gH6gEo5Zvlp226Vk+HKr/cQ2Ynj */
/* /xXw/5UWHvmKwDOAkA/ld64jA4m466aoP2tKse8z1kSa/zw1wRSp0bwPn23gj2IO */
/* NmEG9dM9Lv3c5FH+oBKNuqJ2Vj5viCHVZEcw40UDQqdfboVK+Y1XSkNfa1CUjzCu */
/* Q2J3XMrfVK9ZCecopoCAXzYem7e/G/Md3rTQky2PTf7Z1hgYlqxisPoGEV3nguIg */
/* ooMbBkHbl/4iWAB237woZFlX0imdO5se7el67/nx58CSLYjNmj82Y4cthnFOrwP4 */
/* mUW7zVXlq9sZP9fCcrdrNMUF4KYS2x7/IIgHURKvOTjyT6f+ZRedEfwOlM1D12/l */
/* eL1OX+dPZq5BGGHal3r1xbLdLxHUlMg+IJJk0wmMwmSF3kzbqbMUTaM1FX9x0+E8 */
/* 4YVlsJB1ttLHMIIGcDCCBFigAwIBAgIQce9VdK81VMNaLGn2b0trzTANBgkqhkiG */
/* 9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFC */
/* MEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9u */
/* IEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjA0NVoXDTQwMTIyOTIzNTkw */
/* MFowTzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNV */
/* BAMTH0VudHJ1c3QgQ29kZSBTaWduaW5nIENBIC0gT1ZDUzIwggIiMA0GCSqGSIb3 */
/* DQEBAQUAA4ICDwAwggIKAoICAQCemXYXGp5WFwhjLJNNg2GEMzQCttlioN7CDrkg */
/* TMhXnQ/dVFsNDNYB3S9I4ZEJ4dvIFQSCtnvw2NYwOxlxcPuoppf2KV2kDKn0Uz5X */
/* 2wxObvx2218k6apfQ+OT5w7PyiW8xEwwC1oP5gb05W4MmWZYT4NhwnN8XCJvAUXF */
/* D/dAT2RL0BcKqQ4eAi+hj0zyZ1DbPuSfwk8/dOsxpNCU0Jm8MJIJasskzaLYdlLQ */
/* TnWYT2Ra0l6D9FjAXWp1xNg/ZDqLFA3YduHquWvnEXBJEThjE27xxvq9EEU1B+Z2 */
/* FdB1FqrCQ1f+q/5jc0YioLjz5MdwRgn5qTdBmrNLbB9wcqMH9jWSdBFkbvkC1cCS */
/* lfGXWX4N7qIl8nFVuJuNv83urt37DOeuMk5QjaHf0XO/wc5/ddqrv9CtgjjF54jt */
/* om06hhG317DhqIs7DEEXml/kW5jInQCf93PSw+mfBYd5IYPWC+3RzAif4PHFyVi6 */
/* U1/Uh7GLWajSXs1p0D76xDkJr7S17ec8+iKH1nP5F5Vqwxz1VXhf1PoLwFs/jHgV */
/* DlpMOm7lJpjQJ8wg38CGO3qNZUZ+2WFeqfSuPtT8r0XHOrOFBEqLyAlds3sCKFnj */
/* hn2AolhAZmLgOFWDq58pQSa6u+nYZPi2uyhzzRVK155z42ZMsVGdgSOLyIZ3srYs */
/* NyJwIQIDAQABo4IBLDCCASgwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU */
/* 75+6ebBz8iUeeJwDUpwbU4Teje0wHwYDVR0jBBgwFoAUgrrWPZfOn89x6JI3r/2z */
/* tWk1V88wMwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5l */
/* bnRydXN0Lm5ldDAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3Qu */
/* bmV0L2NzYnIxLmNybDAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUH */
/* AwMwRQYDVR0gBD4wPDAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cu */
/* ZW50cnVzdC5uZXQvcnBhMAgGBmeBDAEEATANBgkqhkiG9w0BAQ0FAAOCAgEAXvOG */
/* mTXBee7wEK/XkkPShdBb4Jig4HFRyRTLUJpgDrAEJkmxz+m6mwih2kNd1G8jorn4 */
/* QMdH/k0BC0iQP8jcarQ+UzUovkBKR4VqHndAzIB/YbQ8T3mo5qOmoH5EhnG/EhuV */
/* gXL3DaXQ3mefxqK48Wr5/P50ZsZk5nk9agNhTksfzCBiywIY7GPtfnE/lroLXmgi */
/* Z+wfwNIFFmaxsqTq/MWVo40SpfWN7xsgzZn35zLzWXEf3ZTmeeVSIxBWKvxZOL+/ */
/* eSWSasf9q2d3cbEEfTWtFME+qPwjF1YIGHzXeiJrkWrMNUVtTzudQ50FuJ3z/DQh */
/* XAQYMlc4NMHKgyNGpogjIcZ+FICrse+7C6wJP+5TkTGz4lREqrV9MDwsI5zoP6NY */
/* 6kAIF6MgX3rADNuq/wMWAw10ZCKalF4wNXYT9dPh4+AHytnqRYhGnFTVEOLzMglA */
/* tudcFzL+zK/rbc9gPHXz7lxgQFUbtVmvciNoTZx0BAwQya9QW6cNZg+W5ZqV4CCi */
/* GtCw7jhJnipnnpGWbJjbxBBtYHwebkjntn6vMwcSce+9lTu+qYPUQn23pzTXX4aR */
/* ta9WWNpVfRe927zNZEEVjTFRBk+0LrKLPZzzTeNYA1TMrIj4UjxOS0YJJRn/Feen */
/* mEYufbrq4+N8//m5GZW+drkNebICURpKyJ+IwkMxghoBMIIZ/QIBATBjME8xCzAJ */
/* BgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQDEx9FbnRy */
/* dXN0IENvZGUgU2lnbmluZyBDQSAtIE9WQ1MyAhAG72bMRoaosrSE2hkrLWthMA0G */
/* CWCGSAFlAwQCAQUAoIGsMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG */
/* AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCBA9OXLWcE4 */
/* vqXrHklPu7l9576E4ECM3lOL/n1qa8dlWzBABgorBgEEAYI3AgEMMTIwMKAWgBQA */
/* RABlAGwAbAAsACAASQBuAGMALqEWgBRodHRwOi8vd3d3LmRlbGwuY29tIDANBgkq */
/* hkiG9w0BAQEFAASCAYATrGVat0jLgh6ZqjyJHRj5fLsVmBnfVulTt7vVAQM5CXDg */
/* oqZLMPJ4KrDJRJfUzmK4ZXMEYZsQk1LOTyn9k7SpbaiFSKyndlEYA8F1OgFtdY7K */
/* JjUfkHjkolFZFYvzskMJ1FIvAHdjoNgN1+R+t4pxk8yz7x2H7SsG1Vj0RxokH08j */
/* Wd6Hhs2PUqe1TyHiGd9MKtAEnbLLmk8qp8EaDQ7cQ5pXyyx8oDwGSRW+Q6pXKPGs */
/* mzL04Doxj4F9rkZytTlvMGwC78yeV7T3w0wna2jh8AlPDDs8k9YjR7tKE4liHNXy */
/* S+5dsEVrWCSEcZAIaxwfsOfjG9guYvoygj6jopqVqNl/q6uLLo8jJK6iMI9pYAXL */
/* hGcoA1h7gFE89tw6a60DKvyHGaNGP24bZtkWH0+jlhOv43Ii0VlmT7vp4+VIAiA5 */
/* 9zJ7qvcJWLUcaf/LPXSHcV9Z2KDwwlAW0XSplhGkpeKWZaIvFB/2n9bmsqWUoPMy */
/* ye1rpdeme9UsOl66lTyhghdAMIIXPAYKKwYBBAGCNwMDATGCFywwghcoBgkqhkiG */
/* 9w0BBwKgghcZMIIXFQIBAzEPMA0GCWCGSAFlAwQCAQUAMHgGCyqGSIb3DQEJEAEE */
/* oGkEZzBlAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQg6BNnJbtZIAvR */
/* 7ZWZhOJflkZHswtIrjbVwpDaHywCXCACEQDqrQ3esMJ11fDHrz8sqkwSGA8yMDI0 */
/* MDkyMDA3MDEwOFqgghMJMIIGwjCCBKqgAwIBAgIQBUSv85SdCDmmv9s/X+VhFjAN */
/* BgkqhkiG9w0BAQsFADBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQs */
/* IEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEy */
/* NTYgVGltZVN0YW1waW5nIENBMB4XDTIzMDcxNDAwMDAwMFoXDTM0MTAxMzIzNTk1 */
/* OVowSDELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMSAwHgYD */
/* VQQDExdEaWdpQ2VydCBUaW1lc3RhbXAgMjAyMzCCAiIwDQYJKoZIhvcNAQEBBQAD */
/* ggIPADCCAgoCggIBAKNTRYcdg45brD5UsyPgz5/X5dLnXaEOCdwvSKOXejsqnGfc */
/* YhVYwamTEafNqrJq3RApih5iY2nTWJw1cb86l+uUUI8cIOrHmjsvlmbjaedp/lvD */
/* 1isgHMGXlLSlUIHyz8sHpjBoyoNC2vx/CSSUpIIa2mq62DvKXd4ZGIX7ReoNYWyd */
/* /nFexAaaPPDFLnkPG2ZS48jWPl/aQ9OE9dDH9kgtXkV1lnX+3RChG4PBuOZSlbVH */
/* 13gpOWvgeFmX40QrStWVzu8IF+qCZE3/I+PKhu60pCFkcOvV5aDaY7Mu6QXuqvYk */
/* 9R28mxyyt1/f8O52fTGZZUdVnUokL6wrl76f5P17cz4y7lI0+9S769SgLDSb495u */
/* ZBkHNwGRDxy1Uc2qTGaDiGhiu7xBG3gZbeTZD+BYQfvYsSzhUa+0rRUGFOpiCBPT */
/* aR58ZE2dD9/O0V6MqqtQFcmzyrzXxDtoRKOlO0L9c33u3Qr/eTQQfqZcClhMAD6F */
/* aXXHg2TWdc2PEnZWpST618RrIbroHzSYLzrqawGw9/sqhux7UjipmAmhcbJsca8+ */
/* uG+W1eEQE/5hRwqM/vC2x9XH3mwk8L9CgsqgcT2ckpMEtGlwJw1Pt7U20clfCKRw */
/* o+wK8REuZODLIivK8SgTIUlRfgZm0zu++uuRONhRB8qUt+JQofM604qDy0B7AgMB */
/* AAGjggGLMIIBhzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADAWBgNVHSUB */
/* Af8EDDAKBggrBgEFBQcDCDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s */
/* BwEwHwYDVR0jBBgwFoAUuhbZbU2FL3MpdpovdYxqII+eyG8wHQYDVR0OBBYEFKW2 */
/* 7xPn783QZKHVVqllMaPe1eNJMFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwz */
/* LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZUaW1l */
/* U3RhbXBpbmdDQS5jcmwwgZAGCCsGAQUFBwEBBIGDMIGAMCQGCCsGAQUFBzABhhho */
/* dHRwOi8vb2NzcC5kaWdpY2VydC5jb20wWAYIKwYBBQUHMAKGTGh0dHA6Ly9jYWNl */
/* cnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZU */
/* aW1lU3RhbXBpbmdDQS5jcnQwDQYJKoZIhvcNAQELBQADggIBAIEa1t6gqbWYF7xw */
/* jU+KPGic2CX/yyzkzepdIpLsjCICqbjPgKjZ5+PF7SaCinEvGN1Ott5s1+FgnCvt */
/* 7T1IjrhrunxdvcJhN2hJd6PrkKoS1yeF844ektrCQDifXcigLiV4JZ0qBXqEKZi2 */
/* V3mP2yZWK7Dzp703DNiYdk9WuVLCtp04qYHnbUFcjGnRuSvExnvPnPp44pMadqJp */
/* ddNQ5EQSviANnqlE0PjlSXcIWiHFtM+YlRpUurm8wWkZus8W8oM3NG6wQSbd3lqX */
/* TzON1I13fXVFoaVYJmoDRd7ZULVQjK9WvUzF4UbFKNOt50MAcN7MmJ4ZiQPq1JE3 */
/* 701S88lgIcRWR+3aEUuMMsOI5ljitts++V+wQtaP4xeR0arAVeOGv6wnLEHQmjNK */
/* qDbUuXKWfpd5OEhfysLcPTLfddY2Z1qJ+Panx+VPNTwAvb6cKmx5AdzaROY63jg7 */
/* B145WPR8czFVoIARyxQMfq68/qTreWWqaNYiyjvrmoI1VygWy2nyMpqy0tg6uLFG */
/* hmu6F/3Ed2wVbK6rr3M66ElGt9V/zLY4wNjsHPW2obhDLN9OTH0eaHDAdwrUAuBc */
/* YLso/zjlUlrWrBciI0707NMX+1Br/wd3H3GXREHJuEbTbDJ8WC9nR2XlG3O2mflr */
/* LAZG70Ee8PBf4NvZrZCARK+AEEGKMIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o */
/* ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln */
/* aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE */
/* aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy */
/* MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x */
/* OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt */
/* ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1 */
/* BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z */
/* nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ */
/* Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6 */
/* 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk */
/* psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn */
/* LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq */
/* x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd */
/* OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ */
/* TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR */
/* k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo */
/* AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud */
/* EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G */
/* A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT */
/* BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG */
/* GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh */
/* Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD */
/* VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0 */
/* VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9 */
/* bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T */
/* zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS */
/* lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq */
/* T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl */
/* 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y */
/* r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05 */
/* et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um */
/* AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe */
/* Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr */
/* 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC */
/* JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga */
/* oSv27dZ8/DCCBY0wggR1oAMCAQICEA6bGI750C3n79tQ4ghAGFowDQYJKoZIhvcN */
/* AQEMBQAwZTELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcG */
/* A1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEkMCIGA1UEAxMbRGlnaUNlcnQgQXNzdXJl */
/* ZCBJRCBSb290IENBMB4XDTIyMDgwMTAwMDAwMFoXDTMxMTEwOTIzNTk1OVowYjEL */
/* MAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3 */
/* LmRpZ2ljZXJ0LmNvbTEhMB8GA1UEAxMYRGlnaUNlcnQgVHJ1c3RlZCBSb290IEc0 */
/* MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAv+aQc2jeu+RdSjwwIjBp */
/* M+zCpyUuySE98orYWcLhKac9WKt2ms2uexuEDcQwH/MbpDgW61bGl20dq7J58soR */
/* 0uRf1gU8Ug9SH8aeFaV+vp+pVxZZVXKvaJNwwrK6dZlqczKU0RBEEC7fgvMHhOZ0 */
/* O21x4i0MG+4g1ckgHWMpLc7sXk7Ik/ghYZs06wXGXuxbGrzryc/NrDRAX7F6Zu53 */
/* yEioZldXn1RYjgwrt0+nMNlW7sp7XeOtyU9e5TXnMcvak17cjo+A2raRmECQecN4 */
/* x7axxLVqGDgDEI3Y1DekLgV9iPWCPhCRcKtVgkEy19sEcypukQF8IUzUvK4bA3Vd */
/* eGbZOjFEmjNAvwjXWkmkwuapoGfdpCe8oU85tRFYF/ckXEaPZPfBaYh2mHY9WV1C */
/* doeJl2l6SPDgohIbZpp0yt5LHucOY67m1O+SkjqePdwA5EUlibaaRBkrfsCUtNJh */
/* besz2cXfSwQAzH0clcOP9yGyshG3u3/y1YxwLEFgqrFjGESVGnZifvaAsPvoZKYz */
/* 0YkH4b235kOkGLimdwHhD5QMIR2yVCkliWzlDlJRR3S+Jqy2QXXeeqxfjT/JvNNB */
/* ERJb5RBQ6zHFynIWIgnffEx1P2PsIV/EIFFrb7GrhotPwtZFX50g/KEexcCPorF+ */
/* CiaZ9eRpL5gdLfXZqbId5RsCAwEAAaOCATowggE2MA8GA1UdEwEB/wQFMAMBAf8w */
/* HQYDVR0OBBYEFOzX44LScV1kTN8uZz/nupiuHA9PMB8GA1UdIwQYMBaAFEXroq/0 */
/* ksuCMS1Ri6enIZ3zbcgPMA4GA1UdDwEB/wQEAwIBhjB5BggrBgEFBQcBAQRtMGsw */
/* JAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBDBggrBgEFBQcw */
/* AoY3aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElE */
/* Um9vdENBLmNydDBFBgNVHR8EPjA8MDqgOKA2hjRodHRwOi8vY3JsMy5kaWdpY2Vy */
/* dC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3JsMBEGA1UdIAQKMAgwBgYE */
/* VR0gADANBgkqhkiG9w0BAQwFAAOCAQEAcKC/Q1xV5zhfoKN0Gz22Ftf3v1cHvZqs */
/* oYcs7IVeqRq7IviHGmlUIu2kiHdtvRoU9BNKei8ttzjv9P+Aufih9/Jy3iS8UgPI */
/* TtAq3votVs/59PesMHqai7Je1M/RQ0SbQyHrlnKhSLSZy51PpwYDE3cnRNTnf+hZ */
/* qPC/Lwum6fI0POz3A8eHqNJMQBk1RmppVLC4oVaO7KTVPeix3P0c2PR3WlxUjG/v */
/* oVA9/HYJaISfb8rbII01YBwCA8sgsKxYoA5AY8WYIsGyWfVVa88nq2x2zm8jLfR+ */
/* cWojayL/ErhULSd+2DrZ8LaHlv1b0VysGMNNn3O3AamfV6peKOK5lDGCA3YwggNy */
/* AgEBMHcwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw */
/* OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT */
/* dGFtcGluZyBDQQIQBUSv85SdCDmmv9s/X+VhFjANBglghkgBZQMEAgEFAKCB0TAa */
/* BgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkFMQ8XDTI0MDky */
/* MDA3MDEwOFowKwYLKoZIhvcNAQkQAgwxHDAaMBgwFgQUZvArMsLCyQ+CXc6qisnG */
/* Txmcz0AwLwYJKoZIhvcNAQkEMSIEIJ8/YlsCuuENm51+nMH9OlJjGpmMT5UYZf39 */
/* yFez1BwtMDcGCyqGSIb3DQEJEAIvMSgwJjAkMCIEINL25G3tdCLM0dRAV2hBNm+C */
/* itpVmq4zFq9NGprUDHgoMA0GCSqGSIb3DQEBAQUABIICAA4pWCPNExG5N5MkUAV0 */
/* AA5LuEIwAr7ZR835igaDJMvbaLBxKG7Tw4Q/Qo7XiPfzdnHdjDzdRni1IebTG/Fv */
/* KkGxvBzds0FA22lrtM49kdO4uOFEH3jhjJb67jCSfuvjg8LHQPAvXDsBdiuCBQJ1 */
/* WHbqQYaJGYgYqdZDiHpIwxQm82DIJGL7MGAxKeVqlRhiMQt9ay0g4Xw4LcYCyFGv */
/* MjE/fUJ2iAa6S+WneM71kZCxYG2yzQhYe5oH89Qov6L7P5MDsdGo+qbipj/v0F/k */
/* auz8At4SHKVB2z5gE5FPtoCNFRc7OBJeXEMkpuWTlkjr63GGJSl5JPjpYdJbtxVx */
/* JVzrkkpj6Hj4/1tzr5BEJXmed6OlCMVA1YSiDuJilC9D7WJ4jB9QL0frPh0aLE7S */
/* mOX3EfXRrZD5s7XbHjaD49HzFmbmIHB4N9482+2Brqjv/ozIvU5GGnm4OBD4DHgx */
/* ZmxJqWKu+Egsp1t/ngO1NXcgJsvMrXIrGplv8MH3eo9qiLoai355ApD4r2jrBVhA */
/* re8GFoKMbdQ4JKY3iUMm9S1jHjDH1Y+KzaSyBF7uL2ibXdBtQdviQ2J73CsdLumV */
/* xv7YGiLORIK/aJWGNROmPKBVbSDN2eQhIzrzlsTLsVDUQ4Dk5zcIzW28/eEtLCtL */
/* ECtdNeGPx7DEfIRw0HL0O/MN */
/* SIG # End signature block */
|
combined_dataset/train/non-malicious/sample_49_90.ps1 | sample_49_90.ps1 | # DO NOT COPY THIS MANIFEST VERBATIM. THIS IS JUST A SAMPLE.
# GENERATE YOUR MANIFEST USING THE New-ModuleManifest COMMAND TO
# GUARANTEE YOU GET A UNIQUE GUID FOR YOUR MODULE.
@{
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = @('Import', 'File')
# A URL to the license for this module.
LicenseUri = 'https://github.com/___/license'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/___/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/___/icon.png'
# ReleaseNotes of this module - our ReleaseNotes are in
# the file ReleaseNotes.md
# ReleaseNotes = ''
} # End of PSData hashtable
} # End of PrivateData hashtable
# Script module or binary module file associated with this manifest.
RootModule = 'SampleModule.psm1'
# Version number of this module.
ModuleVersion = '1.0.0'
# ID used to uniquely identify this module
GUID = '3ff4d4b6-ade9-46f3-a4f2-2ad6f5508388'
# Author of this module
Author = '<name>'
# Company or vendor of this module
CompanyName = 'Unknown'
# Copyright statement for this module
Copyright = '(c) 2021 <name>.'
# Description of the functionality provided by this module
Description = 'Some description. This is required by the PowerShell Gallery'
# Minimum version of the Windows PowerShell engine required by this module
# PowerShellVersion = ''
# Name of the Windows PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the Windows PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module
# CLRVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
# RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module - explicitly list each function that should be
# exported. This improves performance of PowerShell when discovering the commands in
# module.
FunctionsToExport = @('New-File','Import-FileNoWildcard','Import-FileWildcard')
# Cmdlets to export from this module
# CmdletsToExport = '*'
# Variables to export from this module
# VariablesToExport = '*'
# Aliases to export from this module
# AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDUGuwxXFFu7zy5
# 5QNGL48Z0cbGhzIwxTSx+fYRvWIiz6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEFy945g/ACNoab5mGG05IkF
# zVwWllem3CFUnPHeoXsOMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAVZDD1bi3++dy3sVIc/ScfgzqA0S3vhNn4YIfwbDq+CJZmzLaHDy05fqS
# aRclQ7I+B2FCPtlwjg7q0PrP5HKDQOLR0DJd3T7s7l2ADkN66p+z13FvWgA0gQl4
# SEbb4YjuM39FRAH6d+QX7zFcjQlxaOvj01racqAYTw20UxDBSZbhCa5QFcBTlhyz
# qM4CRrEa5hJufOR7p6cAtj1QPqSxt50/M+ASamgVPiF1pTDLOBtGIaFGTc/ZqqGY
# y508gIjiZZjdMhJuvVjggRFLpI4jgZe5NbUp0WgAD+t+SwGCMFLLnLNx5RTWQMnl
# mnRRk40YjebSN5JzDg78sLxTPBta9KGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBi1IzozFQC4b2CkroERDvXagI2jXW45XtBWaiJ5zsF+QIGZfypa2Lr
# GBMyMDI0MDQxNjIzNDI1Mi41NzJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC
# RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5
# ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi
# AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm
# JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz
# X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE
# nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP
# MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61
# ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG
# MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw
# S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+
# mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw
# WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3
# uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s
# Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU
# JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc
# ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0
# CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN
# jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1
# Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG
# eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp
# sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4
# vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW
# w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8
# FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE
# MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnJbLMwIhgPMjAyNDA0MTcwNTMxMzFaGA8yMDI0MDQxODA1MzEzMVowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6clsswIBADAHAgEAAgIbrzAHAgEAAgIT+DAKAgUA
# 6cq+MwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAGXvshXLVyeZ3zTapN9b
# ZSbQ3FLxtJ5XSLEP6+fVkEK69ViWTuGLxcD3Y3lt382fkOHGX8BWuEIpVg/1rBSK
# /TRB61HXx8zUh1DPLXS4vP0bTtnVo/wJwxeq2CvNWnp5tj7VOQZKjxOvb7XvXT23
# UjopxpicJEL5Ml1UmDlfyrzVMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgmRwoXcwg7tZ8d47KtTyRrOV/tpXHicpRccYy1DVTIewwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIIN
# NzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3MHg
# jMJfWF6OAAEAAAHcMCIEIDwo6btMwRnJKSUuWdscYTC/YPbltu3mtJZ65R0OLQDJ
# MA0GCSqGSIb3DQEBCwUABIICAGQtMmHKedFsrWO19E/6ojuYHYQWyJV9iai0oB3U
# xwi/6FOw6niWVKcHtr56pOlFT9rJjA3z3GEtYcAdypSM5g9KnYBXhrFMz17HalK1
# lfPMgjmuy8b6+YYOfLfaWOzSD2Qhf5tSSsQTbFTVTlv9UIwqnnFnZ2wnrlakKToo
# Tufb0IHbdpZKETYtAlhKpp681v56A5sTrUhpRndU4/ntIlHGxoVM50HUcjF5iCkC
# r0obyQuN7pSuG/95DtBl8OP8B1fMv6tDRGUB9T3Bi5Izbp55wFJnPbWx2IbuZtDS
# 46Op81UssmdU7cZbb6CNMj6uuPuvy+9bvkX0n7oazmMSQS9MmF537hunwwo+D5Oc
# I8/BCbIG0q3tYyItTBBXe5Ek/FODa3SDRpITuvPQDMvgfhlxUKFDQHPXkRMngBKC
# n2s9bB+LbGVkC9QB9OwM/mdcj4jrfqGP+HW2TKME3KVLbd5oPEAZ2wr1ejmwoVQp
# M9IoUwLr7Ur+1sDJTffLb+gMWaCLQ96eWrIDpcSImJr3+xPsnC2pv/HLpiNDDSx+
# 8Klo+v5iTRzlzWcr/EKVuAlcQl2q8KEnZYDBK0lhKUxYZUPRi9OVB5mpDjMX3Kw7
# 0nade5Eu+Fp0lH/ISw8EKX+QDYLjKYYaV8JTOh3M8E8egPRxvSuzyyMft8CSdSJ5
# BFwy
# SIG # End signature block
|
combined_dataset/train/non-malicious/Set Single email .ps1 | Set Single email .ps1 | # Very simple script to use in Exchange 2007 with a dead simple task
# Create an email enabled user with the local Email Address Policy Disabled with a SINGLE email address
# Attached to it
#
# This can be used in an environment where you may have multiple email addresses but don't want an account picking
# up multiple email addresses or more explicitly where an email account should have only ONE address and it may not be the standard
# If you are hosting multiple domains on your server. IE ABCCORPORATION.COM may have a private address for their website called
# @hotwebsitestuff.com.
#
# What this script will do after creating the address is purge all email addresses in the Proxy list and
# Replace it with just the one
#
# Questions and details just email sean@energizeit.ca
#
#
# Obtain FirstName, Last Name and designed email address
#
#
$FirstName=READ-HOST 'Enter First Name '
$LastName=READ-HOST 'Enter Last Name'
#
# Email address is in the form of name@domain.xxx and does not need to contain quotes or 'SMTP:'
#
$EmailAddress=READ-HOST 'E-mail Address reqd '
#
# Password for the account
#
$Password=READ-HOST 'DefaultPassword' -assecurestring
#
# Script will generate the needed fields from provided data. Name is "FirstName Lastname"
# Alias is "Firstname.Lastname"
# Account will be created in a fictional OU in Active Directory "Contoso.Local"
# With a default UPN of "firstname.lastname@contoso.local"
#
$Name=$FirstName+' '+$LastName
$Alias=$Firstname+'.'+$LastName
$OU='Contoso.local/Offices/Seattle'
$UPN=$Alias+'@contoso.local'
#
# Information will echo to the screen
#
$FirstName
$LastName
$EmailAddress
$Password
$Name
$Alias
$OU
$UPN
#
# Create New Mailbox on Exchange 2007 server. This is the standard New-Mailbox commandlet automatically generated by Exchange 2007
# With Hardcoded fields replaced by variables
#
New-Mailbox -Name $Name -Alias $Alias -OrganizationalUnit $OU -UserPrincipalName $UPN -SamAccountName $Firstname -FirstName $FirstName -Initials '' -LastName $Lastname -Password $Password -ResetPasswordOnNextLogon $false -Database 'OUREXCHANGESERVER\\First Storage Group\\Mailbox Database'
#
# If you find the mailbox doesn't appear immediately, you may have to do a "start-sleep 2" in Powershell V2 to make the script pause
# for two seconds
#
# Read the information about the mailbox in Quest and disable EmailAddressPolicy
#
get-mailbox $Alias | Set-Mailbox -EmailAddressPolicyEnabled $False
#
# Assign Mailbox Object to a variable "$MailboxUser"
# Using the "Clear()" Method purge the Property "EmailAddresses" within
#
$mailboxuser=get-mailbox $Alias
$mailboxuser.EmailAddresses.Clear()
#
# Add back in the ONE address you want
#
$mailboxuser.EmailAddresses.Add($EmailAddress)
#
# and then Set those changes back to the mailbox
#
$mailboxuser | set-mailbox
|
combined_dataset/train/non-malicious/ProcuriosJSON.psm1.ps1 | ProcuriosJSON.psm1.ps1 | function ConvertFrom-Json {
param (
[Parameter( Mandatory = $true, ValueFromPipeline = $true, Position = 0)]
[Alias("Json")]
[string[]]
$InputObject,
[switch]$AsPSObject = $false
)
Process {
$output = [procurios.Public.JSON]::JsonDecode( $InputObject )
if ( $AsPSObject ) {
$output | ForEach-Object { New-Object PSObject -Property $_ }
}
else { Write-Output $output }
}
}
#REGION IMPORT CSHARP TYPES
# Source from: http://techblog.procurios.nl/k/618/news/view/14605/14863/How-do-I-write-my-own-parser-for-JSON.html
Add-Type @"
using System;
//using System.Data;
using System.Collections;
using System.Globalization;
using System.Text;
namespace Procurios.Public
{
/// <summary>
/// This class encodes and decodes JSON strings.
/// Spec. details, see http://www.json.org/
///
/// JSON uses Arrays and Objects. These correspond here to the datatypes ArrayList and Hashtable.
/// All numbers are parsed to doubles.
/// </summary>
public class JSON
{
public const int TOKEN_NONE = 0;
public const int TOKEN_CURLY_OPEN = 1;
public const int TOKEN_CURLY_CLOSE = 2;
public const int TOKEN_SQUARED_OPEN = 3;
public const int TOKEN_SQUARED_CLOSE = 4;
public const int TOKEN_COLON = 5;
public const int TOKEN_COMMA = 6;
public const int TOKEN_STRING = 7;
public const int TOKEN_NUMBER = 8;
public const int TOKEN_TRUE = 9;
public const int TOKEN_FALSE = 10;
public const int TOKEN_NULL = 11;
private const int BUILDER_CAPACITY = 2000;
protected static JSON instance = new JSON();
/// <summary>
/// On decoding, this value holds the position at which the parse failed (-1 = no error).
/// </summary>
protected int lastErrorIndex = -1;
protected string lastDecode = "";
/// <summary>
/// Parses the string json into a value
/// </summary>
/// <param name="json">A JSON string.</param>
/// <returns>An ArrayList, a Hashtable, a double, a string, null, true, or false</returns>
public static object JsonDecode(string json)
{
// save the string for debug information
JSON.instance.lastDecode = json;
if (json != null) {
char[] charArray = json.ToCharArray();
int index = 0;
bool success = true;
object value = JSON.instance.ParseValue(charArray, ref index, ref success);
if (success) {
JSON.instance.lastErrorIndex = -1;
} else {
JSON.instance.lastErrorIndex = index;
}
return value;
} else {
return null;
}
}
/// <summary>
/// Converts a Hashtable / ArrayList object into a JSON string
/// </summary>
/// <param name="json">A Hashtable / ArrayList</param>
/// <returns>A JSON encoded string, or null if object 'json' is not serializable</returns>
public static string JsonEncode(object json)
{
StringBuilder builder = new StringBuilder(BUILDER_CAPACITY);
bool success = JSON.instance.SerializeValue(json, builder);
return (success ? builder.ToString() : null);
}
/// <summary>
/// On decoding, this function returns the position at which the parse failed (-1 = no error).
/// </summary>
/// <returns></returns>
public static bool LastDecodeSuccessful()
{
return (JSON.instance.lastErrorIndex == -1);
}
/// <summary>
/// On decoding, this function returns the position at which the parse failed (-1 = no error).
/// </summary>
/// <returns></returns>
public static int GetLastErrorIndex()
{
return JSON.instance.lastErrorIndex;
}
/// <summary>
/// If a decoding error occurred, this function returns a piece of the JSON string
/// at which the error took place. To ease debugging.
/// </summary>
/// <returns></returns>
public static string GetLastErrorSnippet()
{
if (JSON.instance.lastErrorIndex == -1) {
return "";
} else {
int startIndex = JSON.instance.lastErrorIndex - 5;
int endIndex = JSON.instance.lastErrorIndex + 15;
if (startIndex < 0) {
startIndex = 0;
}
if (endIndex >= JSON.instance.lastDecode.Length) {
endIndex = JSON.instance.lastDecode.Length - 1;
}
return JSON.instance.lastDecode.Substring(startIndex, endIndex - startIndex + 1);
}
}
protected Hashtable ParseObject(char[] json, ref int index)
{
Hashtable table = new Hashtable();
int token;
// {
NextToken(json, ref index);
bool done = false;
while (!done) {
token = LookAhead(json, index);
if (token == JSON.TOKEN_NONE) {
return null;
} else if (token == JSON.TOKEN_COMMA) {
NextToken(json, ref index);
} else if (token == JSON.TOKEN_CURLY_CLOSE) {
NextToken(json, ref index);
return table;
} else {
// name
string name = ParseString(json, ref index);
if (name == null) {
return null;
}
// :
token = NextToken(json, ref index);
if (token != JSON.TOKEN_COLON) {
return null;
}
// value
bool success = true;
object value = ParseValue(json, ref index, ref success);
if (!success) {
return null;
}
table[name] = value;
}
}
return table;
}
protected ArrayList ParseArray(char[] json, ref int index)
{
ArrayList array = new ArrayList();
// [
NextToken(json, ref index);
bool done = false;
while (!done) {
int token = LookAhead(json, index);
if (token == JSON.TOKEN_NONE) {
return null;
} else if (token == JSON.TOKEN_COMMA) {
NextToken(json, ref index);
} else if (token == JSON.TOKEN_SQUARED_CLOSE) {
NextToken(json, ref index);
break;
} else {
bool success = true;
object value = ParseValue(json, ref index, ref success);
if (!success) {
return null;
}
array.Add(value);
}
}
return array;
}
protected object ParseValue(char[] json, ref int index, ref bool success)
{
switch (LookAhead(json, index)) {
case JSON.TOKEN_STRING:
return ParseString(json, ref index);
case JSON.TOKEN_NUMBER:
return ParseNumber(json, ref index);
case JSON.TOKEN_CURLY_OPEN:
return ParseObject(json, ref index);
case JSON.TOKEN_SQUARED_OPEN:
return ParseArray(json, ref index);
case JSON.TOKEN_TRUE:
NextToken(json, ref index);
return Boolean.Parse("TRUE");
case JSON.TOKEN_FALSE:
NextToken(json, ref index);
return Boolean.Parse("FALSE");
case JSON.TOKEN_NULL:
NextToken(json, ref index);
return null;
case JSON.TOKEN_NONE:
break;
}
success = false;
return null;
}
protected string ParseString(char[] json, ref int index)
{
string s = "";
char c;
EatWhitespace(json, ref index);
// "
c = json[index++];
bool complete = false;
while (!complete) {
if (index == json.Length) {
break;
}
c = json[index++];
if (c == '"') {
complete = true;
break;
} else if (c == '\\\\') {
if (index == json.Length) {
break;
}
c = json[index++];
if (c == '"') {
s += '"';
} else if (c == '\\\\') {
s += '\\\\';
} else if (c == '/') {
s += '/';
} else if (c == 'b') {
s += '\\b';
} else if (c == 'f') {
s += '\\f';
} else if (c == 'n') {
s += '\\n';
} else if (c == 'r') {
s += '\\r';
} else if (c == 't') {
s += '\\t';
} else if (c == 'u') {
int remainingLength = json.Length - index;
if (remainingLength >= 4) {
// fetch the next 4 chars
char[] unicodeCharArray = new char[4];
Array.Copy(json, index, unicodeCharArray, 0, 4);
// parse the 32 bit hex into an integer codepoint
uint codePoint = UInt32.Parse(new string(unicodeCharArray), NumberStyles.HexNumber);
// convert the integer codepoint to a unicode char and add to string
s += Char.ConvertFromUtf32((int)codePoint);
// skip 4 chars
index += 4;
} else {
break;
}
}
} else {
s += c;
}
}
if (!complete) {
return null;
}
return s;
}
protected double ParseNumber(char[] json, ref int index)
{
EatWhitespace(json, ref index);
int lastIndex = GetLastIndexOfNumber(json, index);
int charLength = (lastIndex - index) + 1;
char[] numberCharArray = new char[charLength];
Array.Copy(json, index, numberCharArray, 0, charLength);
index = lastIndex + 1;
return Double.Parse(new string(numberCharArray), CultureInfo.InvariantCulture);
}
protected int GetLastIndexOfNumber(char[] json, int index)
{
int lastIndex;
for (lastIndex = index; lastIndex < json.Length; lastIndex++) {
if ("0123456789+-.eE".IndexOf(json[lastIndex]) == -1) {
break;
}
}
return lastIndex - 1;
}
protected void EatWhitespace(char[] json, ref int index)
{
for (; index < json.Length; index++) {
if (" \\t\\n\\r".IndexOf(json[index]) == -1) {
break;
}
}
}
protected int LookAhead(char[] json, int index)
{
int saveIndex = index;
return NextToken(json, ref saveIndex);
}
protected int NextToken(char[] json, ref int index)
{
EatWhitespace(json, ref index);
if (index == json.Length) {
return JSON.TOKEN_NONE;
}
char c = json[index];
index++;
switch (c) {
case '{':
return JSON.TOKEN_CURLY_OPEN;
case '}':
return JSON.TOKEN_CURLY_CLOSE;
case '[':
return JSON.TOKEN_SQUARED_OPEN;
case ']':
return JSON.TOKEN_SQUARED_CLOSE;
case ',':
return JSON.TOKEN_COMMA;
case '"':
return JSON.TOKEN_STRING;
case '0': case '1': case '2': case '3': case '4':
case '5': case '6': case '7': case '8': case '9':
case '-':
return JSON.TOKEN_NUMBER;
case ':':
return JSON.TOKEN_COLON;
}
index--;
int remainingLength = json.Length - index;
// false
if (remainingLength >= 5) {
if (json[index] == 'f' &&
json[index + 1] == 'a' &&
json[index + 2] == 'l' &&
json[index + 3] == 's' &&
json[index + 4] == 'e') {
index += 5;
return JSON.TOKEN_FALSE;
}
}
// true
if (remainingLength >= 4) {
if (json[index] == 't' &&
json[index + 1] == 'r' &&
json[index + 2] == 'u' &&
json[index + 3] == 'e') {
index += 4;
return JSON.TOKEN_TRUE;
}
}
// null
if (remainingLength >= 4) {
if (json[index] == 'n' &&
json[index + 1] == 'u' &&
json[index + 2] == 'l' &&
json[index + 3] == 'l') {
index += 4;
return JSON.TOKEN_NULL;
}
}
return JSON.TOKEN_NONE;
}
protected bool SerializeObjectOrArray(object objectOrArray, StringBuilder builder)
{
if (objectOrArray is Hashtable) {
return SerializeObject((Hashtable)objectOrArray, builder);
} else if (objectOrArray is ArrayList) {
return SerializeArray((ArrayList)objectOrArray, builder);
} else {
return false;
}
}
protected bool SerializeObject(Hashtable anObject, StringBuilder builder)
{
builder.Append("{");
IDictionaryEnumerator e = anObject.GetEnumerator();
bool first = true;
while (e.MoveNext()) {
string key = e.Key.ToString();
object value = e.Value;
if (!first) {
builder.Append(", ");
}
SerializeString(key, builder);
builder.Append(":");
if (!SerializeValue(value, builder)) {
return false;
}
first = false;
}
builder.Append("}");
return true;
}
protected bool SerializeArray(ArrayList anArray, StringBuilder builder)
{
builder.Append("[");
bool first = true;
for (int i = 0; i < anArray.Count; i++) {
object value = anArray[i];
if (!first) {
builder.Append(", ");
}
if (!SerializeValue(value, builder)) {
return false;
}
first = false;
}
builder.Append("]");
return true;
}
protected bool SerializeValue(object value, StringBuilder builder)
{
if (value is string) {
SerializeString((string)value, builder);
} else if (value is Hashtable) {
SerializeObject((Hashtable)value, builder);
} else if (value is ArrayList) {
SerializeArray((ArrayList)value, builder);
} else if (IsNumeric(value)) {
SerializeNumber(Convert.ToDouble(value), builder);
} else if ((value is Boolean) && ((Boolean)value == true)) {
builder.Append("true");
} else if ((value is Boolean) && ((Boolean)value == false)) {
builder.Append("false");
} else if (value == null) {
builder.Append("null");
} else {
return false;
}
return true;
}
protected void SerializeString(string aString, StringBuilder builder)
{
builder.Append("\\"");
char[] charArray = aString.ToCharArray();
for (int i = 0; i < charArray.Length; i++) {
char c = charArray[i];
if (c == '"') {
builder.Append("\\\\\\"");
} else if (c == '\\\\') {
builder.Append("\\\\\\\\");
} else if (c == '\\b') {
builder.Append("\\\\b");
} else if (c == '\\f') {
builder.Append("\\\\f");
} else if (c == '\\n') {
builder.Append("\\\\n");
} else if (c == '\\r') {
builder.Append("\\\\r");
} else if (c == '\\t') {
builder.Append("\\\\t");
} else {
int codepoint = Convert.ToInt32(c);
if ((codepoint >= 32) && (codepoint <= 126)) {
builder.Append(c);
} else {
builder.Append("\\\\u" + Convert.ToString(codepoint, 16).PadLeft(4, '0'));
}
}
}
builder.Append("\\"");
}
protected void SerializeNumber(double number, StringBuilder builder)
{
builder.Append(Convert.ToString(number, CultureInfo.InvariantCulture));
}
/// <summary>
/// Determines if a given object is numeric in any way
/// (can be integer, double, etc). C# has no pretty way to do this.
/// </summary>
protected bool IsNumeric(object o)
{
try {
Double.Parse(o.ToString());
} catch (Exception) {
return false;
}
return true;
}
}
}
"@
#ENDREGION
Export-ModuleMember ConvertFrom-Json
|
combined_dataset/train/non-malicious/3744.ps1 | 3744.ps1 | Param(
[Parameter(Mandatory=$true, Position=0)]
[string] $TestRunNameSpace,
[Parameter(Mandatory=$false, Position=1)]
[string] $Vault = "",
[Parameter(Mandatory=$false, Position=2)]
[string] $StorageResourceId = $null
)
. (Join-Path $PSScriptRoot "..\..\..\..\Common\Commands.ScenarioTests.Common\Common.ps1")
. (Join-Path $PSScriptRoot "..\..\..\..\Common\Commands.ScenarioTests.Common\Assert.ps1")
. (Join-Path $PSScriptRoot "Common.ps1");
. (Join-Path $PSScriptRoot "VaultUITests.ps1");
$global:totalCount = 0;
$global:passedCount = 0;
$global:passedTests = @()
$global:failedTests = @()
$global:times = @{}
$global:testns = $TestRunNameSpace+"UI"
$global:testVault = $Vault
$global:storageResourceId = $StorageResourceId
function Run-TestProtected
{
param([ScriptBlock]$script, [string] $testName)
$testStart = Get-Date
try
{
Write-Host -ForegroundColor Green =====================================
Write-Host -ForegroundColor Green "Running test $testName"
Write-Host -ForegroundColor Green =====================================
Write-Host
&$script
$global:passedCount = $global:passedCount + 1
Write-Host
Write-Host -ForegroundColor Green =====================================
Write-Host -ForegroundColor Green "Test Passed"
Write-Host -ForegroundColor Green =====================================
Write-Host
$global:passedTests += $testName
}
catch
{
Out-String -InputObject $_.Exception | Write-Host -ForegroundColor Red
Write-Host
Write-Host -ForegroundColor Red =====================================
Write-Host -ForegroundColor Red "Test Failed"
Write-Host -ForegroundColor Red =====================================
Write-Host
$global:failedTests += $testName
}
finally
{
$testEnd = Get-Date
$testElapsed = $testEnd - $testStart
$global:times[$testName] = $testElapsed
$global:totalCount = $global:totalCount + 1
}
}
Write-Host Delete log files
Cleanup-LogFiles $invocationPath
$testkeyVault = Get-KeyVault
Write-Host Test key vault is $testKeyVault
Write-Host Initializing Certificate Tests
Cleanup-OldCertificates
Write-Host Initializing Managed Storage Account Tests
Cleanup-OldManagedStorageAccounts
Write-Host Initializing Key Tests
Cleanup-OldKeys
Write-Host Initializing Secret Tests
Cleanup-OldSecrets
Write-Host Initialization Completed
$global:startTime = Get-Date
Run-TestProtected { Run-KeyTest {Test_RemoveKeyWithTwoConfirmations} "Test_RemoveKeyWithTwoConfirmations" } "Test_RemoveKeyWithTwoConfirmations"
Run-TestProtected { Run-KeyTest {Test_RemoveKeyWithOneConfirmations} "Test_RemoveKeyWithOneConfirmations" } "Test_RemoveKeyWithOneConfirmations"
Run-TestProtected { Run-KeyTest {Test_CancelKeyRemovalOnce} "Test_CancelKeyRemovalOnce" } "Test_CancelKeyRemovalOnce"
Run-TestProtected { Run-KeyTest {Test_ConfirmThenCancelKeyRemoval} "Test_ConfirmThenCancelKeyRemoval" } "Test_ConfirmThenCancelKeyRemoval"
Run-TestProtected { Run-SecretTest {Test_RemoveSecretWithTwoConfirmations} "Test_RemoveSecretWithTwoConfirmations" } "Test_RemoveSecretWithTwoConfirmations"
Run-TestProtected { Run-SecretTest {Test_RemoveSecretWithOneConfirmations} "Test_RemoveSecretWithOneConfirmations" } "Test_RemoveSecretWithOneConfirmations"
Run-TestProtected { Run-SecretTest {Test_CancelSecretRemovalOnce} "Test_CancelSecretRemovalOnce" } "Test_CancelSecretRemovalOnce"
Run-TestProtected { Run-SecretTest {Test_ConfirmThenCancelSecretRemoval} "Test_ConfirmThenCancelSecretRemoval" } "Test_ConfirmThenCancelSecretRemoval"
Run-TestProtected { Run-CertificateTest {Test_RemoveCertificateWithTwoConfirmations} "Test_RemoveCertificateWithTwoConfirmations" } "Test_RemoveCertificateWithTwoConfirmations"
Run-TestProtected { Run-CertificateTest {Test_RemoveCertificateWithOneConfirmations} "Test_RemoveCertificateWithOneConfirmations" } "Test_RemoveCertificateWithOneConfirmations"
Run-TestProtected { Run-CertificateTest {Test_CancelCertificateRemovalOnce} "Test_CancelCertificateRemovalOnce" } "Test_CancelCertificateRemovalOnce"
Run-TestProtected { Run-CertificateTest {Test_ConfirmThenCancelCertificateRemoval} "Test_ConfirmThenCancelCertificateRemoval" } "Test_ConfirmThenCancelCertificateRemoval"
Run-TestProtected { Run-ManagedStorageAccountTest {Test_RemoveManagedStorageAccountWithTwoConfirmations} "Test_RemoveManagedStorageAccountWithTwoConfirmations" } "Test_RemoveManagedStorageAccountWithTwoConfirmations"
Run-TestProtected { Run-ManagedStorageAccountTest {Test_RemoveManagedStorageAccountWithOneConfirmations} "Test_RemoveManagedStorageAccountWithOneConfirmations" } "Test_RemoveManagedStorageAccountWithOneConfirmations"
Run-TestProtected { Run-ManagedStorageAccountTest {Test_CancelManagedStorageAccountRemovalOnce} "Test_CancelManagedStorageAccountRemovalOnce" } "Test_CancelManagedStorageAccountRemovalOnce"
Run-TestProtected { Run-ManagedStorageAccountTest {Test_ConfirmThenCancelManagedStorageAccountRemoval} "Test_ConfirmThenCancelManagedStorageAccountRemoval" } "Test_ConfirmThenCancelManagedStorageAccountRemoval"
Run-TestProtected { Run-ManagedStorageAccountTest {Test_RemoveManagedStorageSasDefinitionWithTwoConfirmations} "Test_RemoveManagedStorageSasDefinitionWithTwoConfirmations" } "Test_RemoveManagedStorageSasDefinitionWithTwoConfirmations"
Run-TestProtected { Run-ManagedStorageAccountTest {Test_RemoveManagedStorageSasDefinitionWithOneConfirmations} "Test_RemoveManagedStorageSasDefinitionWithOneConfirmations" } "Test_RemoveManagedStorageSasDefinitionWithOneConfirmations"
Run-TestProtected { Run-ManagedStorageAccountTest {Test_CancelManagedStorageSasDefinitionRemovalOnce} "Test_CancelManagedStorageSasDefinitionRemovalOnce" } "Test_CancelManagedStorageSasDefinitionRemovalOnce"
Run-TestProtected { Run-ManagedStorageAccountTest {Test_ConfirmThenCancelManagedStorageSasDefinitionRemoval} "Test_ConfirmThenCancelManagedStorageSasDefinitionRemoval" } "Test_ConfirmThenCancelManagedStorageSasDefinitionRemoval"
$global:endTime = Get-Date
Write-FileReport
Write-ConsoleReport
Move-Log $invocationPath
|
combined_dataset/train/non-malicious/Deny-PendingRequest.ps1 | Deny-PendingRequest.ps1 | #####################################################################
# Deny certificate request.ps1
# Version 1.0
#
# Denies certificate request from a pending request
#
# For this function to succeed, the certificate request must be pending
#
# Vadims Podans (c) 2010
# http://en-us.sysadmins.lv/
#####################################################################
#requires -Version 2.0
function Deny-PendingRequest {
[CmdletBinding()]
param(
[Parameter(Mandatory = $true, ValueFomPipeline = $true)]
[string]$CAConfig,
[Parameter(Mandatory = $true)]
[int]$RequestID
)
try {$CertAdmin = New-Object -ComObject CertificateAuthority.Admin}
catch {Write-Warning "Unable to instantiate ICertAdmin2 object!"; return}
try {$CertAdmin.DenyRequest($CAConfig,$RequestID)}
catch {$_; return}
Write-Host "Successfully denied request '$RequestID'"
}
|
combined_dataset/train/non-malicious/Explorer Style Script.ps1 | Explorer Style Script.ps1 | $nul = "<NULL>"
$type = "Directory", "File"
function Show-Error([string]$mes) {
[Windows.Forms.MessageBox]::Show($mes, "Error",
[Windows.Forms.MessageBoxButtons]::OK,
[Windows.Forms.MessageBoxIcon]::Exclamation
)
}
function Add-RootsTree {
[IO.Directory]::GetLogicalDrives() | % {
$nod = $tvRoots.Nodes.Add($_)
$nod.Nodes.Add($nul)
}
}
function Add-Folders {
$_.Node.Nodes.Clear()
try {
foreach ($i in [IO.Directory]::GetDirectories($_.Node.FullPath)) {
$node = $_.Node.Nodes.Add([IO.Path]::GetFileName($i))
$node.Tag = $type[0]
$node.Nodes.Add($nul)
}
}
catch {
Show-Error $_.Exception.Message
}
}
function Add-Files {
try {
foreach ($i in [IO.Directory]::GetFiles($_.Node.FullPath)) {
$node = $_.Node.Nodes.Add([IO.Path]::GetFileName($i))
$node.Tag = $type[1]
}
}
catch {}
}
$tvRoots_AfterSelect= {
switch ($_.Node.Tag) {
$type[0] { $sbPnl_2.Text = $type[0]; break }
$type[1] { $sbPnl_2.Text = $type[1]; break }
}
}
$tvRoots_BeforeExpand= {
Add-Folders
Add-Files
}
function frmMain_Show {
Add-Type -AssemblyName System.Windows.Forms
[Windows.Forms.Application]::EnableVisualStyles()
$ico = [Drawing.Icon]::ExtractAssociatedIcon(($PSHome + '\\powershell.exe'))
$frmMain = New-Object Windows.Forms.Form
$tvRoots = New-Object Windows.Forms.TreeView
$sbPanel = New-Object Windows.Forms.StatusBar
$sbPnl_1 = New-Object Windows.Forms.StatusBarPanel
$sbPnl_2 = New-Object Windows.Forms.StatusBarPanel
#
#tvRoots
#
$tvRoots.Dock = "Fill"
$tvRoots.Add_AfterSelect($tvRoots_AfterSelect)
$tvRoots.Add_BeforeExpand($tvRoots_BeforeExpand)
#
#sbPanel
#
$sbPanel.Panels.AddRange(@($sbPnl_1, $sbPnl_2))
$sbPanel.ShowPanels = $true
$sbPanel.SizingGrip = $false
#
#sbPnl_1
#
$sbPnl_1.AutoSize = "Spring"
$sbPnl_1.Text = "Follow me at @gregzakharov"
#
#sbPnl_2
#
$sbPnl_2.Alignment = "Center"
$sbPnl_2.AutoSize = "Contents"
$sbPnl_2.Text = "Not clicked item yet"
#
#frmMain
#
$frmMain.ClientSize = New-Object Drawing.Size(350, 350)
$frmMain.Controls.AddRange(@($tvRoots, $sbPanel))
$frmMain.FormBorderStyle = "FixedSingle"
$frmMain.Icon = $ico
$frmMain.StartPosition = "CenterScreen"
$frmMain.Text = "Explorer Style Script"
$frmMain.Add_Load({Add-RootsTree})
[void]$frmMain.ShowDialog()
}
frmMain_Show
|
combined_dataset/train/non-malicious/1950.ps1 | 1950.ps1 |
Describe "ConvertTo-Html Tests" -Tags "CI" {
BeforeAll {
$customObject = [pscustomobject]@{"Name" = "John Doe"; "Age" = 42; "Friends" = ("Jack", "Jill")}
$newLine = "`r`n"
}
function normalizeLineEnds([string]$text)
{
$text -replace "`r`n?|`n", "`r`n"
}
It "Test ConvertTo-Html with no parameters" {
$returnObject = $customObject | ConvertTo-Html
,$returnObject | Should -BeOfType System.Object[]
$returnString = $returnObject -join $newLine
$expectedValue = normalizeLineEnds @"
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>HTML TABLE</title>
</head><body>
<table>
<colgroup><col/><col/><col/></colgroup>
<tr><th>Name</th><th>Age</th><th>Friends</th></tr>
<tr><td>John Doe</td><td>42</td><td>System.Object[]</td></tr>
</table>
</body></html>
"@
$returnString | Should -Be $expectedValue
}
It "Test ConvertTo-Html Fragment parameter" {
$returnString = ($customObject | ConvertTo-Html -Fragment) -join $newLine
$expectedValue = normalizeLineEnds @"
<table>
<colgroup><col/><col/><col/></colgroup>
<tr><th>Name</th><th>Age</th><th>Friends</th></tr>
<tr><td>John Doe</td><td>42</td><td>System.Object[]</td></tr>
</table>
"@
$returnString | Should -Be $expectedValue
}
It "Test ConvertTo-Html as List" {
$returnString = ($customObject | ConvertTo-Html -As List) -join $newLine
$expectedValue = normalizeLineEnds @"
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>HTML TABLE</title>
</head><body>
<table>
<tr><td>Name:</td><td>John Doe</td></tr>
<tr><td>Age:</td><td>42</td></tr>
<tr><td>Friends:</td><td>System.Object[]</td></tr>
</table>
</body></html>
"@
$returnString | Should -Be $expectedValue
}
It "Test ConvertTo-Html specified properties" {
$returnString = ($customObject | ConvertTo-Html -Property Name, Friends -As List) -join $newLine
$expectedValue = normalizeLineEnds @"
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>HTML TABLE</title>
</head><body>
<table>
<tr><td>Name:</td><td>John Doe</td></tr>
<tr><td>Friends:</td><td>System.Object[]</td></tr>
</table>
</body></html>
"@
$returnString | Should -Be $expectedValue
}
It "Test ConvertTo-Html using page parameters" {
$returnString = ($customObject | ConvertTo-Html -Title "Custom Object" -Body "Body Text" -CssUri "page.css" -As List) -join $newLine
$expectedValue = normalizeLineEnds @"
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Custom Object</title>
<link rel="stylesheet" type="text/css" href="page.css" />
</head><body>
Body Text
<table>
<tr><td>Name:</td><td>John Doe</td></tr>
<tr><td>Age:</td><td>42</td></tr>
<tr><td>Friends:</td><td>System.Object[]</td></tr>
</table>
</body></html>
"@
$returnString | Should -Be $expectedValue
}
It "Test ConvertTo-Html pre and post" {
$returnString = ($customObject | ConvertTo-Html -PreContent "Before the object" -PostContent "After the object") -join $newLine
$expectedValue = normalizeLineEnds @"
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>HTML TABLE</title>
</head><body>
Before the object
<table>
<colgroup><col/><col/><col/></colgroup>
<tr><th>Name</th><th>Age</th><th>Friends</th></tr>
<tr><td>John Doe</td><td>42</td><td>System.Object[]</td></tr>
</table>
After the object
</body></html>
"@
$returnString | Should -Be $expectedValue
}
It "Test ConvertTo-HTML meta"{
$returnString = ($customObject | ConvertTo-HTML -Meta @{"author"="John Doe"}) -join $newLine
$expectedValue = normalizeLineEnds @"
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="author" content="John Doe">
<title>HTML TABLE</title>
</head><body>
<table>
<colgroup><col/><col/><col/></colgroup>
<tr><th>Name</th><th>Age</th><th>Friends</th></tr>
<tr><td>John Doe</td><td>42</td><td>System.Object[]</td></tr>
</table>
</body></html>
"@
$returnString | Should -Be $expectedValue
}
It "Test ConvertTo-HTML meta with invalid properties should throw warning" {
$parms = @{"authors"="John Doe";"keywords"="PowerShell,PSv6"}
[string]$observedProperties = $customObject | ConvertTo-HTML -Meta $parms 3>&1
$observedProperties | Should -Match $parms["authors"]
}
It "Test ConvertTo-HTML charset"{
$returnString = ($customObject | ConvertTo-HTML -Charset "utf-8") -join $newLine
$expectedValue = normalizeLineEnds @"
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta charset="UTF-8">
<title>HTML TABLE</title>
</head><body>
<table>
<colgroup><col/><col/><col/></colgroup>
<tr><th>Name</th><th>Age</th><th>Friends</th></tr>
<tr><td>John Doe</td><td>42</td><td>System.Object[]</td></tr>
</table>
</body></html>
"@
$returnString | Should -Be $expectedValue
}
It "Test ConvertTo-HTML transitional"{
$returnString = $customObject | ConvertTo-HTML -Transitional | Select-Object -First 1
$returnString | Should -Be '<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">'
}
It "Test ConvertTo-HTML supports scriptblock-based calculated properties: by hashtable" {
$returnString = ($customObject | ConvertTo-HTML @{ l = 'NewAge'; e = { $_.Age + 1 } }) -join $newLine
$returnString | Should -Match '\b43\b'
}
It "Test ConvertTo-HTML supports scriptblock-based calculated properties: directly" {
$returnString = ($customObject | ConvertTo-HTML { $_.Age + 1 }) -join $newLine
$returnString | Should -Match '\b43\b'
}
It "Test ConvertTo-HTML calculated property supports 'name' key as alias of 'label'" {
$returnString = ($customObject | ConvertTo-Html @{ name = 'AgeRenamed'; e = 'Age'}) -join $newLine
$returnString | Should -Match 'AgeRenamed'
}
It "Test ConvertTo-HTML calculated property supports integer 'width' entry" {
$returnString = ($customObject | ConvertTo-Html @{ e = 'Age'; width = 10 }) -join $newLine
$returnString | Should -Match '\swidth\s*=\s*(["''])10\1'
}
It "Test ConvertTo-HTML calculated property supports string 'width' entry" {
$returnString = ($customObject | ConvertTo-Html @{ e = 'Age'; width = '10' }) -join $newLine
$returnString | Should -Match '\swidth\s*=\s*(["''])10\1'
}
}
|
combined_dataset/train/non-malicious/2071.ps1 | 2071.ps1 |
Import-Module HelpersCommon
$script:cmdletsToSkip = @(
"Get-PSHostProcessInfo",
"Out-Default",
"Register-ArgumentCompleter",
"New-PSRoleCapabilityFile",
"Get-PSSessionCapability",
"Disable-PSRemoting",
"Enable-PSRemoting",
"Get-ExperimentalFeature",
"Enable-ExperimentalFeature",
"Disable-ExperimentalFeature"
)
function UpdateHelpFromLocalContentPath {
param ([string]$ModuleName, [string] $Scope = 'CurrentUser')
$helpContentPath = Join-Path $PSScriptRoot "assets"
$helpFiles = @(Get-ChildItem "$helpContentPath\*" -ErrorAction SilentlyContinue)
if ($helpFiles.Count -eq 0) {
throw "Unable to find help content at '$helpContentPath'"
}
Update-Help -Module $ModuleName -SourcePath $helpContentPath -Force -ErrorAction Stop -Scope $Scope
}
function GetCurrentUserHelpRoot {
if ([System.Management.Automation.Platform]::IsWindows) {
$userHelpRoot = Join-Path $HOME "Documents/PowerShell/Help/"
} else {
$userModulesRoot = [System.Management.Automation.Platform]::SelectProductNameForDirectory([System.Management.Automation.Platform+XDG_Type]::USER_MODULES)
$userHelpRoot = Join-Path $userModulesRoot -ChildPath ".." -AdditionalChildPath "Help"
}
return $userHelpRoot
}
Describe "Validate that <pshome>/<culture>/default.help.txt is present" -Tags @('CI') {
It "Get-Help returns information about the help system" {
$help = Get-Help
$help.Name | Should -Be "default"
$help.Category | Should -Be "HelpFile"
$help.Synopsis | Should -Match "SHORT DESCRIPTION"
}
}
Describe "Validate that the Help function can Run in strict mode" -Tags @('CI') {
It "Help doesn't fail when strict mode is on" {
$help = & {
Set-StrictMode -Version Latest
Help
}
$help | Should -Not -BeNullOrEmpty
}
}
Describe "Validate that get-help works for CurrentUserScope" -Tags @('CI') {
BeforeAll {
$SavedProgressPreference = $ProgressPreference
$ProgressPreference = "SilentlyContinue"
$moduleName = "Microsoft.PowerShell.Core"
}
AfterAll {
$ProgressPreference = $SavedProgressPreference
}
Context "for module : $moduleName" {
BeforeAll {
UpdateHelpFromLocalContentPath $moduleName -Scope 'CurrentUser'
$cmdlets = Get-Command -Module $moduleName
}
$testCases = @()
$cmdlets | Where-Object { $script:cmdletsToSkip -notcontains $_ } | Select-Object -First 3 | ForEach-Object { $testCases += @{ cmdletName = $_.Name }}
It "Validate -Description and -Examples sections in help content. Run 'Get-help -name <cmdletName>" -TestCases $testCases {
param($cmdletName)
$help = get-help -name $cmdletName
$help.Description | Out-String | Should Match $cmdletName
$help.Examples | Out-String | Should Match $cmdletName
}
}
}
Describe "Testing Get-Help Progress" -Tags @('Feature') {
It "Last ProgressRecord should be Completed" {
try {
$j = Start-Job { Get-Help DoesNotExist }
$j | Wait-Job
$j.ChildJobs[0].Progress[-1].RecordType | Should -Be ([System.Management.Automation.ProgressRecordType]::Completed)
}
finally {
$j | Remove-Job
}
}
}
Describe "Validate that get-help works for AllUsers Scope" -Tags @('Feature', 'RequireAdminOnWindows', 'RequireSudoOnUnix') {
BeforeAll {
$SavedProgressPreference = $ProgressPreference
$ProgressPreference = "SilentlyContinue"
$moduleName = "Microsoft.PowerShell.Core"
}
AfterAll {
$ProgressPreference = $SavedProgressPreference
}
Context "for module : $moduleName" {
BeforeAll {
if (Test-CanWriteToPsHome) {
UpdateHelpFromLocalContentPath $moduleName -Scope 'AllUsers'
}
$cmdlets = Get-Command -Module $moduleName
}
$testCases = @()
$cmdlets | Where-Object { $cmdletsToSkip -notcontains $_ } | ForEach-Object { $testCases += @{ cmdletName = $_.Name }}
It "Validate -Description and -Examples sections in help content. Run 'Get-help -name <cmdletName>" -TestCases $testCases -Skip:(!(Test-CanWriteToPsHome)) {
param($cmdletName)
$help = get-help -name $cmdletName
$help.Description | Out-String | Should Match $cmdletName
$help.Examples | Out-String | Should Match $cmdletName
}
}
}
Describe "Validate that get-help works for provider specific help" -Tags @('CI') {
BeforeAll {
$namespaces = @{
command = 'http://schemas.microsoft.com/maml/dev/command/2004/10'
dev = 'http://schemas.microsoft.com/maml/dev/2004/10'
maml = 'http://schemas.microsoft.com/maml/2004/10'
msh = 'http://msh'
}
$helpFileRoot = Join-Path (GetCurrentUserHelpRoot) ([Globalization.CultureInfo]::CurrentUICulture)
$testCases = @(
@{
helpFile = "$helpFileRoot\System.Management.Automation.dll-help.xml"
path = "$userHelpRoot"
helpContext = "[@id='FileSystem' or @ID='FileSystem']"
verb = 'Add'
noun = 'Content'
}
)
if ($IsWindows) {
$testCases += @(
@{
helpFile = "$helpFileRoot\Microsoft.WSMan.Management.dll-help.xml"
path = 'WSMan:\localhost\ClientCertificate'
helpContext = "[@id='ClientCertificate' or @ID='ClientCertificate']"
cmdlet = 'New-Item'
}
,
@{
helpFile = "$helpFileRoot\Microsoft.PowerShell.Security.dll-help.xml"
path = 'Cert:\'
helpContext = $null
verb = 'New'
noun = 'Item'
}
)
UpdateHelpFromLocalContentPath -ModuleName 'Microsoft.WSMan.Management' -Scope 'CurrentUser'
UpdateHelpFromLocalContentPath -ModuleName 'Microsoft.PowerShell.Security' -Scope 'CurrentUser'
}
UpdateHelpFromLocalContentPath -ModuleName 'Microsoft.PowerShell.Core' -Scope 'CurrentUser'
}
It "Shows contextual help when Get-Help is invoked for provider-specific path (Get-Help -Name <verb>-<noun> -Path <path>)" -TestCases $testCases -Pending {
param(
$helpFile,
$path,
$verb,
$noun
)
$path | Should -Exist
$xpath = "/msh:helpItems/msh:providerHelp/msh:CmdletHelpPaths/msh:CmdletHelpPath$helpContext/command:command/command:details[command:verb='$verb' and command:noun='$noun']"
$helpXmlNode = Select-Xml -Path $helpFile -XPath $xpath -Namespace $namespaces | Select-Object -ExpandProperty Node
$expected = Get-Help -Name "$verb-$noun" -Path $path | Select-Object -ExpandProperty Synopsis
$helpXmlNode.description.para -clike "$expected*" | Should -BeTrue
}
}
Describe "Validate about_help.txt under culture specific folder works" -Tags @('CI', 'RequireAdminOnWindows', 'RequireSudoOnUnix') {
BeforeAll {
$modulePath = "$pshome\Modules\Test"
if (Test-CanWriteToPsHome) {
$null = New-Item -Path $modulePath\en-US -ItemType Directory -Force
New-ModuleManifest -Path $modulePath\test.psd1 -RootModule test.psm1
Set-Content -Path $modulePath\test.psm1 -Value "function foo{}"
Set-Content -Path $modulePath\en-US\about_testhelp.help.txt -Value "Hello" -NoNewline
}
$aboutHelpPath = Join-Path (GetCurrentUserHelpRoot) (Get-Culture).Name
if (-not (Test-Path (Join-Path $aboutHelpPath "about_Variables.help.txt"))) {
UpdateHelpFromLocalContentPath -ModuleName 'Microsoft.PowerShell.Core' -Scope 'CurrentUser'
}
}
AfterAll {
if (Test-CanWriteToPsHome) {
Remove-Item $modulePath -Recurse -Force
}
Get-ChildItem -Path $aboutHelpPath -Include @('about_*.txt', "*help.xml") -Recurse | Remove-Item -Force -ErrorAction SilentlyContinue
}
It "Get-Help should return help text and not multiple HelpInfo objects when help is under `$pshome path" -Skip:(!(Test-CanWriteToPsHome)) {
$help = Get-Help about_testhelp
$help.count | Should -Be 1
$help | Should -BeExactly "Hello"
}
It "Get-Help for about_Variable should return only one help object" {
$help = Get-Help about_Variables
$help.count | Should -Be 1
}
}
Describe "About help files can be found in AllUsers scope" -Tags @('Feature', 'RequireAdminOnWindows', 'RequireSudoOnUnix') {
BeforeAll {
$aboutHelpPath = Join-Path $PSHOME (Get-Culture).Name
$userHelpRoot = GetCurrentUserHelpRoot
if (Test-Path $userHelpRoot) {
Remove-Item $userHelpRoot -Force -Recurse -ErrorAction Stop
}
if (Test-CanWriteToPsHome) {
UpdateHelpFromLocalContentPath -ModuleName 'Microsoft.PowerShell.Core' -Scope 'AllUsers'
}
}
It "Get-Help for about_Variable should return only one help object" -Skip:(!(Test-CanWriteToPsHome)) {
$help = Get-Help about_Variables
$help.count | Should Be 1
}
}
Describe "Get-Help should find help info within help files" -Tags @('CI') {
It "Get-Help should find help files under pshome" {
$helpFile = "about_testCase.help.txt"
$helpFolderPath = Join-Path (GetCurrentUserHelpRoot) (Get-Culture).Name
$helpFilePath = Join-Path $helpFolderPath $helpFile
if (!(Test-Path $helpFolderPath)) {
$null = New-Item -ItemType Directory -Path $helpFolderPath -ErrorAction SilentlyContinue
}
try {
$null = New-Item -ItemType File -Path $helpFilePath -Value "about_test" -ErrorAction SilentlyContinue
$helpContent = Get-Help about_testCase
$helpContent | Should -Match "about_test"
} finally {
Remove-Item $helpFilePath -Force -ErrorAction SilentlyContinue
}
}
}
Describe "Get-Help should find pattern help files" -Tags "CI" {
BeforeAll {
$helpFile1 = "about_testCase1.help.txt"
$helpFile2 = "about_testCase.2.help.txt"
$helpFolderPath = Join-Path (GetCurrentUserHelpRoot) (Get-Culture).Name
$helpFilePath1 = Join-Path $helpFolderPath $helpFile1
$helpFilePath2 = Join-Path $helpFolderPath $helpFile2
$null = New-Item -ItemType Directory -Path $helpFolderPath -ErrorAction SilentlyContinue -Force
$null = New-Item -ItemType File -Path $helpFilePath1 -Value "about_test1" -ErrorAction SilentlyContinue
$null = New-Item -ItemType File -Path $helpFilePath2 -Value "about_test2" -ErrorAction SilentlyContinue
}
AfterAll {
Remove-Item $helpFilePath1 -Force -ErrorAction SilentlyContinue
Remove-Item $helpFilePath2 -Force -ErrorAction SilentlyContinue
}
BeforeEach {
$currentPSModulePath = $env:PSModulePath
}
AfterEach {
$env:PSModulePath = $currentPSModulePath
}
$testcases = @(
@{command = {Get-Help about_testCas?1}; testname = "test ? pattern"; result = "about_test1"}
@{command = {Get-Help about_testCase.?}; testname = "test ? pattern with dot"; result = "about_test2"}
@{command = {(Get-Help about_testCase*).Count}; testname = "test * pattern"; result = "2"}
@{command = {Get-Help about_testCas?.2*}; testname = "test ?, * pattern with dot"; result = "about_test2"}
)
It "Get-Help should find pattern help files - <testname>" -TestCases $testcases -Pending: (-not $IsWindows) {
param (
$command,
$result
)
$command.Invoke() | Should -Be $result
}
It "Get-Help should fail expectedly searching for class help with hidden members" {
$testModule = @'
class foo
{
hidden static $monthNames = @('Jan', 'Feb', 'Mar', 'Apr', 'May', 'Jun','Jul', 'Aug', 'Sep', 'Oct', 'Nov', 'Dec')
}
'@
$modulesFolder = Join-Path $TestDrive "Modules"
$modulePath = Join-Path $modulesFolder "TestModule"
New-Item -ItemType Directory -Path $modulePath -Force > $null
Set-Content -Path (Join-Path $modulePath "TestModule.psm1") -Value $testModule
$env:PSModulePath += [System.IO.Path]::PathSeparator + $modulesFolder
{ Get-Help -Category Class -Name foo -ErrorAction Stop } | Should -Throw -ErrorId "HelpNotFound,Microsoft.PowerShell.Commands.GetHelpCommand"
}
}
Describe "Get-Help should find pattern alias" -Tags "CI" {
BeforeAll {
Set-Alias -Name testAlias1 -Value Where-Object
}
AfterAll {
Remove-Item alias:\testAlias1 -ErrorAction SilentlyContinue
}
It "Get-Help should find alias as command" {
(Get-Help where).Name | Should -BeExactly "Where-Object"
}
It "Get-Help should find alias with ? pattern" {
$help = Get-Help wher?
$help.Category | Should -BeExactly "Alias"
$help.Synopsis | Should -BeExactly "Where-Object"
}
It "Get-Help should find alias with * pattern" {
$help = Get-Help testAlias1*
$help.Category | Should -BeExactly "Alias"
$help.Synopsis | Should -BeExactly "Where-Object"
}
It "Help alias should be same as Get-Help alias" {
$help1 = Get-Help testAlias*
$help2 = help testAlias*
Compare-Object $help1 $help2 | Should -BeNullOrEmpty
}
}
Describe "help function uses full view by default" -Tags "CI" {
It "help should return full view without -Full switch" {
$gpsHelp = (help Microsoft.PowerShell.Management\Get-Process)
$gpsHelp | Where-Object {$_ -cmatch '^PARAMETERS'} | Should -Not -BeNullOrEmpty
}
It "help should return full view even with -Full switch" {
$gpsHelp = (help Microsoft.PowerShell.Management\Get-Process -Full)
$gpsHelp | Where-Object {$_ -cmatch '^PARAMETERS'} | Should -Not -BeNullOrEmpty
}
It "help should not append -Full when not using AllUsersView parameter set" {
$gpsHelp = (help Microsoft.PowerShell.Management\Get-Process -Parameter Name)
$gpsHelp | Where-Object {$_ -cmatch '^PARAMETERS'} | Should -BeNullOrEmpty
}
}
Describe 'help can be found for CurrentUser Scope' -Tags 'CI' {
BeforeAll {
$userHelpRoot = GetCurrentUserHelpRoot
Remove-Item $userHelpRoot -Force -ErrorAction SilentlyContinue -Recurse
UpdateHelpFromLocalContentPath -ModuleName 'Microsoft.PowerShell.Core' -Scope 'CurrentUser'
UpdateHelpFromLocalContentPath -ModuleName 'Microsoft.PowerShell.Management' -Scope 'CurrentUser'
UpdateHelpFromLocalContentPath -ModuleName 'Microsoft.PowerShell.Archive' -Scope 'CurrentUser' -Force
UpdateHelpFromLocalContentPath -ModuleName 'PackageManagement' -Scope CurrentUser -Force
$currentCulture = (Get-Culture).Name
$managementHelpFilePath = Join-Path $PSHOME -ChildPath $currentCulture -AdditionalChildPath 'Microsoft.PowerShell.Commands.Management.dll-Help.xml'
if (Test-Path $managementHelpFilePath) {
Remove-Item $managementHelpFilePath -Force -ErrorAction SilentlyContinue
}
$coreHelpFilePath = Join-Path $PSHOME -ChildPath $currentCulture -AdditionalChildPath 'System.Management.Automation.dll-Help.xml'
if (Test-Path $coreHelpFilePath) {
Remove-Item $coreHelpFilePath -Force -ErrorAction SilentlyContinue
}
$archiveHelpFilePath = Join-Path (Get-Module Microsoft.PowerShell.Archive -ListAvailable).ModuleBase -ChildPath $currentCulture -AdditionalChildPath 'Microsoft.PowerShell.Archive-help.xml'
if (Test-Path $archiveHelpFilePath) {
Remove-Item $archiveHelpFilePath -Force -ErrorAction SilentlyContinue
}
$TestCases = @(
@{TestName = 'module under $PSHOME'; CmdletName = 'Add-Content'}
@{TestName = 'module is a PSSnapin'; CmdletName = 'Get-Command' }
@{TestName = 'module is under $PSHOME\Modules'; CmdletName = 'Compress-Archive' }
@{TestName = 'module has a version folder'; CmdletName = 'Find-Package' }
)
}
It 'help in user scope be found for <TestName>' -TestCases $TestCases {
param($CmdletName)
$helpObj = Get-Help -Name $CmdletName -Full
$helpObj.description | Out-String | Should -Match $CmdletName
}
}
Describe 'help can be found for AllUsers Scope' -Tags @('Feature', 'RequireAdminOnWindows', 'RequireSudoOnUnix') {
BeforeAll {
$userHelpRoot = GetCurrentUserHelpRoot
Remove-Item $userHelpRoot -Force -ErrorAction SilentlyContinue -Recurse
$currentCulture = (Get-Culture).Name
if (Test-CanWriteToPsHome) {
$managementHelpFilePath = Join-Path $PSHOME -ChildPath $currentCulture -AdditionalChildPath 'Microsoft.PowerShell.Commands.Management.dll-Help.xml'
if (Test-Path $managementHelpFilePath) {
Remove-Item $managementHelpFilePath -Force -ErrorAction SilentlyContinue
}
$coreHelpFilePath = Join-Path $PSHOME -ChildPath $currentCulture -AdditionalChildPath 'System.Management.Automation.dll-Help.xml'
if (Test-Path $coreHelpFilePath) {
Remove-Item $coreHelpFilePath -Force -ErrorAction SilentlyContinue
}
$archiveHelpFilePath = Join-Path (Get-Module Microsoft.PowerShell.Archive -ListAvailable).ModuleBase -ChildPath $currentCulture -AdditionalChildPath 'Microsoft.PowerShell.Archive-help.xml'
if (Test-Path $archiveHelpFilePath) {
Remove-Item $archiveHelpFilePath -Force -ErrorAction SilentlyContinue
}
UpdateHelpFromLocalContentPath -ModuleName 'Microsoft.PowerShell.Core' -Scope 'AllUsers'
UpdateHelpFromLocalContentPath -ModuleName 'Microsoft.PowerShell.Management' -Scope 'AllUsers'
UpdateHelpFromLocalContentPath -ModuleName 'Microsoft.PowerShell.Archive' -Scope 'AllUsers' -Force
UpdateHelpFromLocalContentPath -ModuleName 'PackageManagement' -Scope 'AllUsers' -Force
}
$TestCases = @(
@{TestName = 'module under $PSHOME'; CmdletName = 'Add-Content'}
@{TestName = 'module is a PSSnapin'; CmdletName = 'Get-Command' }
@{TestName = 'module is under $PSHOME\Modules'; CmdletName = 'Compress-Archive' }
@{TestName = 'module has a version folder'; CmdletName = 'Find-Package' }
)
}
It 'help in user scope be found for <TestName>' -TestCases $TestCases -Skip:(!(Test-CanWriteToPsHome)) {
param($CmdletName)
$helpObj = Get-Help -Name $CmdletName -Full
$helpObj.description | Out-String | Should -Match $CmdletName
}
}
Describe "Get-Help should accept arrays as the -Parameter parameter value" -Tags @('CI') {
BeforeAll {
$userHelpRoot = GetCurrentUserHelpRoot
Remove-Item $userHelpRoot -Force -ErrorAction SilentlyContinue -Recurse
UpdateHelpFromLocalContentPath -ModuleName 'Microsoft.PowerShell.Core' -Scope 'CurrentUser'
$currentCulture = (Get-Culture).Name
$coreHelpFilePath = Join-Path $PSHOME -ChildPath $currentCulture -AdditionalChildPath 'System.Management.Automation.dll-Help.xml'
if (Test-Path $coreHelpFilePath) {
Remove-Item $coreHelpFilePath -Force -ErrorAction SilentlyContinue
}
}
It "Should return help objects for two parameters" {
$help = Get-Help -Name Get-Command -Parameter Verb, Noun
$help | Should -HaveCount 2
$help[0].Name | Should -BeExactly 'Verb'
$help[1].Name | Should -BeExactly 'Noun'
}
}
Describe "Get-Help for function parameter should be consistent" -Tags 'CI' {
BeforeAll {
$test1 = @'
function test1 {
param (
$First
)
}
'@
$test2 = @'
function test2 {
param (
$First,
$Second
)
}
'@
$test1Path = Join-Path $TestDrive "test1.ps1"
Set-Content -Path $test1Path -Value $test1
$test2Path = Join-Path $TestDrive "test2.ps1"
Set-Content -Path $test2Path -Value $test2
Import-Module $test1Path
Import-Module $test2Path
}
AfterAll {
Remove-Module -Name "test1"
Remove-Module -Name "test2"
}
It "Get-Help for function parameter should be consistent" {
$test1HelpPSType = (Get-Help test1 -Parameter First).PSTypeNames
$test2HelpPSType = (Get-Help test2 -Parameter First).PSTypeNames
$test1HelpPSType | Should -BeExactly $test2HelpPSType
}
}
Describe "Help failure cases" -Tags Feature {
It "An error is returned for a topic that doesn't exist: <command>" -TestCases @(
@{ command = "help" },
@{ command = "get-help" }
) {
param($command)
{ & $command foobar -ErrorAction Stop } | Should -Throw -ErrorId "HelpNotFound,Microsoft.PowerShell.Commands.GetHelpCommand"
}
}
Describe 'help renders when using a PAGER with a space in the path' -Tags 'CI' {
BeforeAll {
$fakePager = @'
param(
[Parameter]
$customCommandArgs,
[Parameter(ValueFromPipelineByPropertyName)]
$Name
)
$b = [System.Text.Encoding]::UTF8.GetBytes($Name)
return [System.Convert]::ToBase64String($b)
'@
$fakePagerFolder = Join-Path $TestDrive "path with space"
$fakePagerPath = Join-Path $fakePagerFolder "fakepager.ps1"
New-Item -ItemType File -Path $fakePagerPath -Force > $null
Set-Content -Path $fakePagerPath -Value $fakePager
$SavedEnvPager = $env:PAGER
$env:PAGER = $fakePagerPath
}
AfterAll {
$env:PAGER = $SavedEnvPager
}
It 'help renders when using a PAGER with a space in the path' {
help Get-Command | Should -Be "R2V0LUNvbW1hbmQ="
}
}
|
combined_dataset/train/non-malicious/sample_66_81.ps1 | sample_66_81.ps1 | #
# Module manifest for module 'OCI.PSModules.Vnmonitoring'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Vnmonitoring.dll'
# Version number of this module.
ModuleVersion = '84.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'ca53b640-70c1-4d8a-a7c2-5fbd89718e19'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Vnmonitoring Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '84.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Vnmonitoring.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIVnmonitoringPathAnalysis',
'Get-OCIVnmonitoringPathAnalyzerTest',
'Get-OCIVnmonitoringPathAnalyzerTestsList',
'Get-OCIVnmonitoringWorkRequest',
'Get-OCIVnmonitoringWorkRequestErrorsList',
'Get-OCIVnmonitoringWorkRequestLogsList',
'Get-OCIVnmonitoringWorkRequestResultsList',
'Get-OCIVnmonitoringWorkRequestsList',
'Move-OCIVnmonitoringPathAnalyzerTestCompartment',
'New-OCIVnmonitoringPathAnalyzerTest',
'Remove-OCIVnmonitoringPathAnalyzerTest',
'Update-OCIVnmonitoringPathAnalyzerTest'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Vnmonitoring'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_46_15.ps1 | sample_46_15.ps1 | #
# Module manifest for module 'OCI.PSModules.Managementdashboard'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Managementdashboard.dll'
# Version number of this module.
ModuleVersion = '83.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '75973f59-c3d0-4e5a-af34-7a8a94e15cfd'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Managementdashboard Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Managementdashboard.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Export-OCIManagementdashboardDashboard',
'Get-OCIManagementdashboard',
'Get-OCIManagementdashboardManagementSavedSearch',
'Get-OCIManagementdashboardManagementSavedSearchesList',
'Get-OCIManagementdashboardsList',
'Import-OCIManagementdashboardDashboard',
'Move-OCIManagementdashboardManagementSavedSearchesCompartment',
'Move-OCIManagementdashboardsCompartment',
'New-OCIManagementdashboard',
'New-OCIManagementdashboardManagementSavedSearch',
'Remove-OCIManagementdashboard',
'Remove-OCIManagementdashboardManagementSavedSearch',
'Update-OCIManagementdashboard',
'Update-OCIManagementdashboardManagementSavedSearch'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Managementdashboard'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Get-HexDump.ps1 | Get-HexDump.ps1 | <#
Required v2.0
Using examples:
PS C:\\> gi .\\foo | hex -b 150
Dumps first 150 bytes of foo.
PS C:\\> hex .\\foo -b 150
It's equal first command.
#>
function Get-HexDump {
[CmdletBinding()]
param(
[Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true)]
[string]$FileName,
[Parameter(Position=1, Mandatory=$false)]
[int]$Bytes = -1
)
$ofs = ''
Get-Content -ea 0 -enc Byte $FileName -re 16 -to $Bytes | % {
$hex = ''; $hex += $_ | % {' ' + ('{0:x}' -f $_).PadLeft(2, "0")}
$chr = ''; $chr += $_ | % {if ([char]::IsLetterOrDigit($_)) {[char]$_} else {'.'}}
'{0, -49} {1}' -f $hex, $chr
}
}
Set-Alias hex Get-HexDump
|
combined_dataset/train/non-malicious/Mailbox User_Update.ps1 | Mailbox User_Update.ps1 | #Generated Form Function
function GenerateForm {
########################################################################
# Code Generated By: SAPIEN Technologies PrimalForms v1.0.1.0
# Generated On: 5/10/2010 9:28 AM
# Generated By: Bernard Chouinard berchouinard@gmail.com
# This script requires Powershell v2
# This powershell script creates a gui form that will search for a mailbox user in
# Active directory and display it's properties and allow for changes to be
# made. The script uses the Exchange cmdlet get-user, set-user,
# get-mailbox and set-mailbox. This script has been tested in Exchange 2010,
# it should also work for Exchange 2007.
# The iso_3166-1_list_en.xml file is needed to populate the country list
# it is available at this web site
# http://www.iso.org/iso/country_codes/iso_3166_code_lists.htm
# the script is hard coded to look for iso_3166-1_list_en.xml in the c:\\scripts directory.
# The countrycombobox can also be populated using the .Items.add instead of
# using the xml file.
########################################################################
#region Import the Assembles
[reflection.assembly]::loadwithpartialname("System.Windows.Forms") | Out-Null
[reflection.assembly]::loadwithpartialname("System.Drawing") | Out-Null
#endregion
#region Generated Form Objects
$UserUpdate = New-Object System.Windows.Forms.Form
$Pages = New-Object System.Windows.Forms.TabControl
$Search_User = New-Object System.Windows.Forms.TabPage
$statusBar = New-Object System.Windows.Forms.StatusBar
$lblTip = New-Object System.Windows.Forms.Label
$btnClose = New-Object System.Windows.Forms.Button
$btnProperties = New-Object System.Windows.Forms.Button
$btnReset = New-Object System.Windows.Forms.Button
$btnfind = New-Object System.Windows.Forms.Button
$ListUsers = New-Object System.Windows.Forms.ListBox
$NameSearch = New-Object System.Windows.Forms.TextBox
$lblselectuser = New-Object System.Windows.Forms.Label
$UserName = New-Object System.Windows.Forms.Label
$User_Properties = New-Object System.Windows.Forms.TabPage
$comboBoxCountry = New-Object System.Windows.Forms.ComboBox
$textBoxCustomAttribute5 = New-Object System.Windows.Forms.TextBox
$lblCustomAttribute5 = New-Object System.Windows.Forms.Label
$lblcountry = New-Object System.Windows.Forms.Label
$textBoxpostalcode = New-Object System.Windows.Forms.TextBox
$lblpostalcode = New-Object System.Windows.Forms.Label
$textBoxStorProv = New-Object System.Windows.Forms.TextBox
$lblStorProv = New-Object System.Windows.Forms.Label
$textBoxcity = New-Object System.Windows.Forms.TextBox
$lblcity = New-Object System.Windows.Forms.Label
$textBoxStreetAddress = New-Object System.Windows.Forms.TextBox
$lblStreetAddress = New-Object System.Windows.Forms.Label
$textBoxassistantphone = New-Object System.Windows.Forms.TextBox
$lblassistantphone = New-Object System.Windows.Forms.Label
$textBoxoffice = New-Object System.Windows.Forms.TextBox
$lbloffice = New-Object System.Windows.Forms.Label
$textBoxotherTelephone = New-Object System.Windows.Forms.TextBox
$lblotherTelephone = New-Object System.Windows.Forms.Label
$textBoxCustomAttribute10 = New-Object System.Windows.Forms.TextBox
$lblCustomAttribute10 = New-Object System.Windows.Forms.Label
$textBoxpager = New-Object System.Windows.Forms.TextBox
$lblpager = New-Object System.Windows.Forms.Label
$textBoxOtherHomePhone = New-Object System.Windows.Forms.TextBox
$lblOtherHomePhone = New-Object System.Windows.Forms.Label
$textBoxmobile = New-Object System.Windows.Forms.TextBox
$lblmobile = New-Object System.Windows.Forms.Label
$textBoxfax = New-Object System.Windows.Forms.TextBox
$lblFax = New-Object System.Windows.Forms.Label
$textBoxHomePhone = New-Object System.Windows.Forms.TextBox
$lblHomePhone = New-Object System.Windows.Forms.Label
$textboxPhone = New-Object System.Windows.Forms.TextBox
$lblPhone = New-Object System.Windows.Forms.Label
$textBoxCustomAttribute6 = New-Object System.Windows.Forms.TextBox
$lblCustomAttribute6 = New-Object System.Windows.Forms.Label
$textBoxCustomAttribute8 = New-Object System.Windows.Forms.TextBox
$lblCustomAttribute8 = New-Object System.Windows.Forms.Label
$textBoxCustomAttribute4 = New-Object System.Windows.Forms.TextBox
$lblCustomAttribute4 = New-Object System.Windows.Forms.Label
$textboxDepartment = New-Object System.Windows.Forms.TextBox
$lblDepartment = New-Object System.Windows.Forms.Label
$textBoxCustomAttribute3 = New-Object System.Windows.Forms.TextBox
$lblCustomAttribute3 = New-Object System.Windows.Forms.Label
$textBoxCustomAttribute7 = New-Object System.Windows.Forms.TextBox
$lblCustomAttribute7 = New-Object System.Windows.Forms.Label
$textBoxCompany = New-Object System.Windows.Forms.TextBox
$lblCompany = New-Object System.Windows.Forms.Label
$textBoxCustomAttribute1 = New-Object System.Windows.Forms.TextBox
$lblCustomAttribute1 = New-Object System.Windows.Forms.Label
$textBoxAlias = New-Object System.Windows.Forms.TextBox
$lblAlias = New-Object System.Windows.Forms.Label
$textBoxEmail = New-Object System.Windows.Forms.TextBox
$lblemail = New-Object System.Windows.Forms.Label
$textBoxCustomAttribute2 = New-Object System.Windows.Forms.TextBox
$lblCustomAttribute2 = New-Object System.Windows.Forms.Label
$textBoxUPN = New-Object System.Windows.Forms.TextBox
$lblUPN = New-Object System.Windows.Forms.Label
$btnclose1 = New-Object System.Windows.Forms.Button
$btnnamesearchagain = New-Object System.Windows.Forms.Button
$btnupdate = New-Object System.Windows.Forms.Button
$textBoxTitle = New-Object System.Windows.Forms.TextBox
$lblTitle = New-Object System.Windows.Forms.Label
$textBoxInitials = New-Object System.Windows.Forms.TextBox
$lblInitials = New-Object System.Windows.Forms.Label
$textBoxFirstName = New-Object System.Windows.Forms.TextBox
$lblFirstName = New-Object System.Windows.Forms.Label
$textBoxLastName = New-Object System.Windows.Forms.TextBox
$lblLastName = New-Object System.Windows.Forms.Label
$textBoxDisplayName = New-Object System.Windows.Forms.TextBox
$lbldisplayName = New-Object System.Windows.Forms.Label
#endregion Generated Form Objects
#----------------------------------------------
#Generated Event Script Blocks
#----------------------------------------------
#Provide Custom Code for events specified in PrimalForms.
#Clicking the find button will search for a mailbox user using the get-mailbox cmdlet
#search progress is shown the status bar
$btnFind_OnClick=
{
$StatusBar.text = "Search for " + $NameSearch.text + " in progress, please wait"
$user=get-mailbox -anr $NameSearch.text | Sort-Object | select Displayname
$ListUsers.Items.Clear()
if ($user -ne $Null){
foreach ($name in $user)
{
$listUsers.Items.add($name.displayname)
}
}
Else{
[Windows.Forms.MessageBox]::Show("User not found, please try another search")
}
$StatusBar.text = "Ready"
}
#clicking the reset button clears the namesearch box and the list of users
#from the previous search
$btnreset_OnClick=
{
$NameSearch.Clear()
$ListUsers.Items.Clear()
}
#Clicking on the properties button will get the properties for the mailbox user
#using the get-mailbox cmdlet, if no user is selected a pop-up message
#will be displayed.
$btnProperties_OnClick=
{
Try
{
$SelectedUser = $listUsers.SelectedItem.ToString()
If ($SelectedUser -ne $Null) {
$MailboxUser = Get-User $SelectedUser
$MailboxUser1 = Get-Mailbox $SelectedUser
$textBoxdisplayName.text = $MailboxUser.displayName
$textBoxlastName.text = $MailboxUser.lastName
$textBoxfirstName.text = $MailboxUser.firstName
$textBoxInitials.text = $MailboxUser.Initials
$textBoxTitle.text = $MailboxUser.Title
$textBoxUPN.text = $MailboxUser.UserPrincipalName
$textBoxUPN.ReadOnly = $True
$textBoxEmail.text = $MailboxUser1.PrimarySmtpAddress
$textBoxEmail.ReadOnly = $True
$textBoxCustomAttribute2.text = $MailboxUser1.CustomAttribute2
$textBoxAlias.text = $MailboxUser1.Alias
$textBoxCustomAttribute1.text = $MailboxUser1.CustomAttribute1
$textBoxCustomAttribute5.text = $MailboxUser1.CustomAttribute5
$textBoxCompany.text = $MailboxUser.Company
$textBoxCustomAttribute7.text = $MailboxUser1.CustomAttribute7
$textBoxCustomAttribute3.text = $MailboxUser1.CustomAttribute3
$textboxDepartment.text = $MailboxUser.Department
$textBoxCustomAttribute4.text = $MailboxUser1.CustomAttribute4
$textBoxCustomAttribute8.text = $MailboxUser1.CustomAttribute8
$textBoxCustomAttribute6.text = $MailboxUser1.CustomAttribute6
$textboxPhone.text = $MailboxUser.Phone
$textBoxHomePhone.text = $MailboxUser.HomePhone
$textBoxfax.text = $MailboxUser.Fax
$textBoxmobile.text = $MailboxUser.MobilePhone
$textBoxOtherHomePhone.text = $MailboxUser.OtherHomePhone
$textBoxpager.text = $MailboxUser.Pager
$textBoxCustomAttribute10.text = $MailboxUser1.CustomAttribute10
$textBoxotherTelephone.text = $MailboxUser.OtherTelephone
$textBoxoffice.text = $MailboxUser.Office
$textBoxassistantphone.text = $MailboxUser.TelephoneAssistant
$textBoxStreetAddress.text = $MailboxUser.StreetAddress
$textBoxcity.text = $MailboxUser.City
$textBoxStorProv.text = $MailboxUser.StateOrProvince
$textBoxpostalcode.text = $MailboxUser.Postalcode
$comboBoxcountry.text = $MailboxUser.CountryOrRegion
$Pages.SelectTab($User_Properties)
}
}
Catch {
[Windows.Forms.MessageBox]::Show("You have not selected a user in the list, please select a user and try again")
}
}
#Clicking the close button will close the form
$btnClose_OnClick=
{
$UserUpdate.Close()
}
$OnLoadForm_StateCorrection=
{#Correct the initial state of the form to prevent the .Net maximized form issue
$form1.WindowState = $InitialFormWindowState
}
#$handler_TabPage:_Click=
#{
#TODO: Place custom script here
#}
#Clicking the search another user button will perform a new search
$btnnamesearchagain_OnClick=
{
$Pages.SelectTab($Search_User)
$NameSearch.Clear()
$ListUsers.Items.Clear()
}
#Clicking the Update button will update all of the mailbox user attributes that were modified
#by using the set-user and the set-mailbox cmdlet
$btnupdate_OnClick=
{
$UPN = $textBoxUPN.text
$Array = @()
if ($textBoxdisplayName.modified -eq $true) {
$Array += "-DisplayName " + "`"" + $textBoxdisplayName.text + "`""
}
if ($textBoxlastName.modified -eq $True) {
$Array += "-LastName " + "`"" + $textBoxlastName.text + "`""
}
if ($textBoxfirstName.modified -eq $True) {
$Array += "-FirstName " + "`"" + $textBoxfirstName.text + "`""
}
if ($textBoxInitials.modified -eq $true) {
$Array += "-Initials " + "`"" + $textBoxInitials.text + "`""
}
if ($textBoxTitle.modified -eq $True) {
$Array += "-Title " + "`"" + $textBoxTitle.text + "`""
}
if ($textBoxCompany.modified -eq $true) {
$Array += "-Company " + "`"" + $textBoxCompany.text + "`""
}
if ($textboxDepartment.modified -eq $True) {
$Array += "-Department " + "`"" + $textboxDepartment.text + "`""
}
if ($textboxPhone.modified -eq $True) {
$Array += "-Phone " + "`"" + $textboxPhone.text + "`""
}
if ($textBoxHomePhone.modified -eq $true) {
$Array += "-HomePhone " + "`"" + $textBoxHomePhone.text + "`""
}
if ($textBoxfax.modified -eq $True) {
$Array += "-Fax " + "`"" + $textBoxfax.text + "`""
}
if ($textBoxmobile.modified -eq $true) {
$Array += "-MobilePhone " + "`"" + $textBoxmobile.text + "`""
}
if ($textBoxOtherHomePhone.modified -eq $True) {
if ($textBoxOtherHomePhone.text -eq ""){
$Array += "-OtherHomePhone " + '$Null'
}
else {
$Array += "-OtherHomePhone " + "`"" + $textBoxOtherHomePhone.text + "`""
}
}
if ($textBoxpager.modified -eq $True) {
$Array += "-Pager " + "`"" + $textBoxpager.text + "`""
}
if ($textBoxotherTelephone.modified -eq $true) {
if ($textBoxotherTelephone.text -eq ""){
$Array += "-OtherTelephone " + '$Null'
}
else {
$Array += "-OtherTelephone " + "`"" + $textBoxotherTelephone.text + "`""
}
}
if ($textBoxoffice.modified -eq $True) {
$Array += "-Office " + "`"" + $textBoxoffice.text + "`""
}
if ($textBoxassistantphone.modified -eq $true) {
$Array += "-TelephoneAssistant " + "`"" + $textBoxassistantphone.text + "`""
}
if ($textBoxStreetAddress.modified -eq $True) {
$Array += "-StreetAddress " + "`"" + $textBoxStreetAddress.text + "`""
}
if ($textBoxcity.modified -eq $True) {
$Array += "-City " + "`"" + $textBoxcity.text + "`""
}
if ($textBoxStorProv.modified -eq $true) {
$Array += "-StateOrProvince " + "`"" + $textBoxStorProv.text + "`""
}
if ($textBoxpostalcode.modified -eq $True) {
$Array += "-PostalCode " + "`"" + $textBoxpostalcode.text + "`""
}
If ($comboBoxcountry_SelectionChanged -eq "True") {
$Array += "-CountryOrRegion " + "`"" + $comboboxcountry.Text + "`""
}
$Array1 = @()
if ($textBoxCustomAttribute2.modified -eq $true) {
$Array1 += "-CustomAttribute2 " + "`"" + $textBoxCustomAttribute2.text + "`""
}
if ($textBoxAlias.modified -eq $True) {
$Array1 += "-Alias " + "`"" + $textBoxAlias.text + "`""
}
if ($textBoxCustomAttribute1.modified -eq $True) {
$Array1 += "-CustomAttribute1 " + "`"" + $textBoxCustomAttribute1.text + "`""
}
if ($textBoxCustomAttribute5.modified -eq $true) {
$Array1 += "-CustomAttribute5 " + "`"" + $textBoxCustomAttribute5.text + "`""
}
if ($textBoxCustomAttribute7.modified -eq $True) {
$Array1 += "-CustomAttribute7 " + "`"" + $textBoxCustomAttribute7.text + "`""
}
if ($textBoxCustomAttribute3.modified -eq $true) {
$Array1 += "-CustomAttribute3 " + "`"" + $textBoxCustomAttribute3.text + "`""
}
if ($textBoxCustomAttribute4.modified -eq $True) {
$Array1 += "-CustomAttribute4 " + "`"" + $textBoxCustomAttribute4.text + "`""
}
if ($textBoxCustomAttribute8.modified -eq $True) {
$Array1 += "-CustomAttribute8 " + "`"" + $textBoxCustomAttribute8.text + "`""
}
if ($textBoxCustomAttribute6.modified -eq $true) {
$Array1 += "-CustomAttribute6 " + "`"" + $textBoxCustomAttribute6.text + "`""
}
if ($textBoxCustomAttribute10.modified -eq $True) {
$Array1 += "-CustomAttribute10 " + "`"" + $textBoxCustomAttribute10.text + "`""
}
try
{
if ($Array -ne $null) {
$setuser = 'Set-user -identity ' + $upn + " " + $array + ' -EA Stop'
Invoke-expression $setuser
}
if ($Array1 -ne $null) {
$setmailbox = 'Set-Mailbox -Identity ' + $UPN + " " + $Array1 + ' -EA Stop'
Invoke-expression $setmailbox
}
[Windows.Forms.MessageBox]::Show("The mailbox user has been updated sucessfully")
}
catch {
[Windows.Forms.MessageBox]::Show("An error has occured while trying to update the user data, please ensure you have the proper rights to modify this specific mailbox user.")
}
}
$comboBoxcountry_SelectedValueChanged=
{
$comboBoxcountry_SelectionChanged = $True
}
#Clicking the close button closes the form
$btnclose1_OnClick=
{
$UserUpdate.Close()
}
#Makes the search tip visible on mouse over of the namesearch box
$NameSearch_ShowTip=
{
$lbltip.visible = $true
}
#Hides the seach tip
$NameSearch_HideTip=
{
$lbltip.visible = $false
}
#----------------------------------------------
#region Generated Form Code
$UserUpdate.BackColor = [System.Drawing.Color]::FromArgb(255,49,106,197)
$UserUpdate.Text = 'User Update Utility'
$UserUpdate.Name = 'UserUpdate'
$UserUpdate.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 539
$System_Drawing_Size.Height = 566
$UserUpdate.ClientSize = $System_Drawing_Size
$Pages.TabIndex = 0
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 538
$System_Drawing_Size.Height = 556
$Pages.Size = $System_Drawing_Size
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 0
$System_Drawing_Point.Y = -2
$Pages.Location = $System_Drawing_Point
$Pages.DataBindings.DefaultDataSourceUpdateMode = 0
$Pages.Name = 'Pages'
$Pages.SelectedIndex = 0
$UserUpdate.Controls.Add($Pages)
$Search_User.BackColor = [System.Drawing.Color]::FromArgb(255,135,206,250)
$Search_User.TabIndex = 0
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 530
$System_Drawing_Size.Height = 507
$Search_User.Size = $System_Drawing_Size
$Search_User.Text = 'Search_User'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 4
$System_Drawing_Point.Y = 22
$Search_User.Location = $System_Drawing_Point
$System_Windows_Forms_Padding = New-Object System.Windows.Forms.Padding
$System_Windows_Forms_Padding.All = 3
$System_Windows_Forms_Padding.Bottom = 3
$System_Windows_Forms_Padding.Left = 3
$System_Windows_Forms_Padding.Right = 3
$System_Windows_Forms_Padding.Top = 3
$Search_User.Padding = $System_Windows_Forms_Padding
$Search_User.Name = 'Search_User'
$Search_User.DataBindings.DefaultDataSourceUpdateMode = 0
$Search_User.add_Click($handler_TabPage:_Click)
$Pages.Controls.Add($Search_User)
$statusbar.Name = "statusbar"
$statusbar.Text = "Ready"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 539
$System_Drawing_Size.Height = 22
$statusbar.Size = $System_Drawing_Size
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 0
$System_Drawing_Point.Y = 544
$statusbar.Location = $System_Drawing_Point
$statusbar.DataBindings.DefaultDataSourceUpdateMode = 0
$statusbar.TabIndex = 10
$statusbar.Font = New-Object System.Drawing.Font("Microsoft Sans Serif",8.25,1,3,0)
$Search_User.Controls.Add($statusbar)
$lblTip.TabIndex = 9
$lblTip.BackColor = [System.Drawing.Color]::FromArgb(0,255,255,255)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 340
$System_Drawing_Size.Height = 76
$lblTip.Size = $System_Drawing_Size
$lblTip.Text = 'Please enter at least 3 characters for the search, the search will be performed on the following attributes: CN, Display Name, Alias, First Name, Last Name.'
$lblTip.Font = New-Object System.Drawing.Font("Microsoft Sans Serif",8.25,1,3,0)
$lblTip.ForeColor = [System.Drawing.Color]::FromArgb(255,0,0,0)
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 100
$System_Drawing_Point.Y = 283
$lblTip.Location = $System_Drawing_Point
$lblTip.DataBindings.DefaultDataSourceUpdateMode = 0
$lblTip.Name = 'lblTip'
$lbltip.visible = $False
$Search_User.Controls.Add($lblTip)
$btnClose.TabIndex = 7
$btnClose.Name = 'btnClose'
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 75
$System_Drawing_Size.Height = 23
$btnClose.Size = $System_Drawing_Size
$btnClose.UseVisualStyleBackColor = $True
$btnClose.Text = 'Close'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 450
$System_Drawing_Point.Y = 167
$btnClose.Location = $System_Drawing_Point
$btnClose.DataBindings.DefaultDataSourceUpdateMode = 0
$btnClose.add_Click($btnClose_OnClick)
$Search_User.Controls.Add($btnClose)
$btnProperties.TabIndex = 6
$btnProperties.Name = 'btnProperties'
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 75
$System_Drawing_Size.Height = 23
$btnProperties.Size = $System_Drawing_Size
$btnProperties.UseVisualStyleBackColor = $True
$btnProperties.Text = 'Properties'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 365
$System_Drawing_Point.Y = 167
$btnProperties.Location = $System_Drawing_Point
$btnProperties.DataBindings.DefaultDataSourceUpdateMode = 0
$btnProperties.add_Click($btnProperties_OnClick)
$Search_User.Controls.Add($btnProperties)
$btnReset.TabIndex = 5
$btnReset.Name = 'btnReset'
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 75
$System_Drawing_Size.Height = 23
$btnReset.Size = $System_Drawing_Size
$btnReset.UseVisualStyleBackColor = $True
$btnReset.Text = 'Reset'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 450
$System_Drawing_Point.Y = 31
$btnReset.Location = $System_Drawing_Point
$btnReset.DataBindings.DefaultDataSourceUpdateMode = 0
$btnReset.add_Click($btnReset_OnClick)
$Search_User.Controls.Add($btnReset)
$btnfind.TabIndex = 4
$btnfind.Name = 'btnfind'
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 75
$System_Drawing_Size.Height = 23
$btnfind.Size = $System_Drawing_Size
$btnfind.UseVisualStyleBackColor = $True
$btnfind.Text = 'Find'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 365
$System_Drawing_Point.Y = 31
$btnfind.Location = $System_Drawing_Point
$btnfind.DataBindings.DefaultDataSourceUpdateMode = 0
$btnfind.add_Click($btnfind_OnClick)
$Search_User.Controls.Add($btnfind)
$ListUsers.FormattingEnabled = $True
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 234
$System_Drawing_Size.Height = 95
$ListUsers.Size = $System_Drawing_Size
$ListUsers.DataBindings.DefaultDataSourceUpdateMode = 0
$ListUsers.Name = 'ListUsers'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 118
$System_Drawing_Point.Y = 95
$ListUsers.Location = $System_Drawing_Point
$ListUsers.TabIndex = 3
$UserUpdate.KeyPreview = $True
$ListUsers.Add_Keydown({if ($_.KeyCode -eq "Enter"){$btnProperties.performClick()}})
$Search_User.Controls.Add($ListUsers)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 234
$System_Drawing_Size.Height = 20
$NameSearch.Size = $System_Drawing_Size
$NameSearch.DataBindings.DefaultDataSourceUpdateMode = 0
$NameSearch.Name = 'NameSearch'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 118
$System_Drawing_Point.Y = 33
$NameSearch.Location = $System_Drawing_Point
$NameSearch.TabIndex = 2
$NameSearch.add_MouseLeave($NameSearch_HideTip)
$NameSearch.add_MouseEnter($NameSearch_ShowTip)
$UserUpdate.KeyPreview = $True
$NameSearch.Add_Keydown({if ($_.KeyCode -eq "Enter"){$btnfind.performClick()}})
$Search_User.Controls.Add($NameSearch)
$lblselectuser.TabIndex = 1
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 73
$System_Drawing_Size.Height = 23
$lblselectuser.Size = $System_Drawing_Size
$lblselectuser.Text = 'Select User'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 41
$System_Drawing_Point.Y = 129
$lblselectuser.Location = $System_Drawing_Point
$lblselectuser.DataBindings.DefaultDataSourceUpdateMode = 0
$lblselectuser.Name = 'label2'
$Search_User.Controls.Add($lblselectuser)
$UserName.TabIndex = 0
$UserName.TextAlign = 2
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 102
$System_Drawing_Size.Height = 28
$UserName.Size = $System_Drawing_Size
$UserName.Text = 'Enter Name to search'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 12
$System_Drawing_Point.Y = 31
$UserName.Location = $System_Drawing_Point
$UserName.DataBindings.DefaultDataSourceUpdateMode = 0
$UserName.Name = 'UserName'
$Search_User.Controls.Add($UserName)
$User_Properties.BackColor = [System.Drawing.Color]::FromArgb(255,135,206,250)
$User_Properties.TabIndex = 1
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 530
$System_Drawing_Size.Height = 530
$User_Properties.Size = $System_Drawing_Size
$User_Properties.Text = 'User_Properties'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 4
$System_Drawing_Point.Y = 22
$User_Properties.Location = $System_Drawing_Point
$System_Windows_Forms_Padding = New-Object System.Windows.Forms.Padding
$System_Windows_Forms_Padding.All = 3
$System_Windows_Forms_Padding.Bottom = 3
$System_Windows_Forms_Padding.Left = 3
$System_Windows_Forms_Padding.Right = 3
$System_Windows_Forms_Padding.Top = 3
$User_Properties.Padding = $System_Windows_Forms_Padding
$User_Properties.Name = 'User_Properties'
$User_Properties.DataBindings.DefaultDataSourceUpdateMode = 0
$Pages.Controls.Add($User_Properties)
$comboBoxCountry.FormattingEnabled = $True
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 320
$System_Drawing_Size.Height = 21
$comboBoxCountry.Size = $System_Drawing_Size
$comboBoxCountry.DataBindings.DefaultDataSourceUpdateMode = 0
#Uncomment the next 2 line if not using the xml file
#$comboBoxCountry.Items.Add('CANADA') | Out-null
#$comboBoxCountry.Items.Add('UNITED STATES') | Out-null
#Comment the next 4 lines if not using the xml file
[xml]$getcountrylist = Get-Content c:\\Scripts\\iso_3166-1_list_en.xml
$countries = $getcountrylist.'ISO_3166-1_List_en'.'ISO_3166-1_Entry' | %{$_.'ISO_3166-1_Country_name'} | Select-Object -unique
$comboBoxCountry.Name = 'comboBoxCountry'
$comboBoxcountry.Items.AddRange($countries) | Out-Null
$comboBoxcountry.add_SelectionChangeCommitted($comboBoxcountry_SelectedValueChanged)
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 114
$System_Drawing_Point.Y = 474
$comboBoxCountry.Location = $System_Drawing_Point
$comboBoxCountry.TabIndex = 65
$User_Properties.Controls.Add($comboBoxCountry)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 140
$System_Drawing_Size.Height = 20
$textBoxCustomAttribute5.Size = $System_Drawing_Size
$textBoxCustomAttribute5.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxCustomAttribute5.Name = 'textBoxCustomAttribute5'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 369
$System_Drawing_Point.Y = 162
$textBoxCustomAttribute5.Location = $System_Drawing_Point
$textBoxCustomAttribute5.TabIndex = 21
$User_Properties.Controls.Add($textBoxCustomAttribute5)
$lblCustomAttribute5.TabIndex = 20
$lblCustomAttribute5.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblCustomAttribute5.Size = $System_Drawing_Size
$lblCustomAttribute5.Text = 'CustomAttribute5:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 263
$System_Drawing_Point.Y = 158
$lblCustomAttribute5.Location = $System_Drawing_Point
$lblCustomAttribute5.DataBindings.DefaultDataSourceUpdateMode = 0
$lblCustomAttribute5.Name = 'lblCustomAttribute5'
$User_Properties.Controls.Add($lblCustomAttribute5)
$lblcountry.TabIndex = 62
$lblcountry.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblcountry.Size = $System_Drawing_Size
$lblcountry.Text = 'Country:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 8
$System_Drawing_Point.Y = 470
$lblcountry.Location = $System_Drawing_Point
$lblcountry.DataBindings.DefaultDataSourceUpdateMode = 0
$lblcountry.Name = 'lblcountry'
$User_Properties.Controls.Add($lblcountry)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 140
$System_Drawing_Size.Height = 20
$textBoxpostalcode.Size = $System_Drawing_Size
$textBoxpostalcode.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxpostalcode.Name = 'textBoxpostalcode'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 114
$System_Drawing_Point.Y = 448
$textBoxpostalcode.Location = $System_Drawing_Point
$textBoxpostalcode.TabIndex = 63
$User_Properties.Controls.Add($textBoxpostalcode)
$lblpostalcode.TabIndex = 62
$lblpostalcode.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblpostalcode.Size = $System_Drawing_Size
$lblpostalcode.Text = 'Postal Code:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 8
$System_Drawing_Point.Y = 444
$lblpostalcode.Location = $System_Drawing_Point
$lblpostalcode.DataBindings.DefaultDataSourceUpdateMode = 0
$lblpostalcode.Name = 'lblpostalcode'
$User_Properties.Controls.Add($lblpostalcode)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 139
$System_Drawing_Size.Height = 20
$textBoxStorProv.Size = $System_Drawing_Size
$textBoxStorProv.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxStorProv.Name = 'textBoxStorProv'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 114
$System_Drawing_Point.Y = 422
$textBoxStorProv.Location = $System_Drawing_Point
$textBoxStorProv.TabIndex = 59
$User_Properties.Controls.Add($textBoxStorProv)
$lblStorProv.TabIndex = 58
$lblStorProv.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblStorProv.Size = $System_Drawing_Size
$lblStorProv.Text = 'State or Province:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 8
$System_Drawing_Point.Y = 418
$lblStorProv.Location = $System_Drawing_Point
$lblStorProv.DataBindings.DefaultDataSourceUpdateMode = 0
$lblStorProv.Name = 'lblStorProv'
$User_Properties.Controls.Add($lblStorProv)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 140
$System_Drawing_Size.Height = 20
$textBoxcity.Size = $System_Drawing_Size
$textBoxcity.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxcity.Name = 'textBoxcity'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 369
$System_Drawing_Point.Y = 422
$textBoxcity.Location = $System_Drawing_Point
$textBoxcity.TabIndex = 61
$User_Properties.Controls.Add($textBoxcity)
$lblcity.TabIndex = 60
$lblcity.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblcity.Size = $System_Drawing_Size
$lblcity.Text = 'City:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 263
$System_Drawing_Point.Y = 418
$lblcity.Location = $System_Drawing_Point
$lblcity.DataBindings.DefaultDataSourceUpdateMode = 0
$lblcity.Name = 'lblcity'
$User_Properties.Controls.Add($lblcity)
$textBoxStreetAddress.Multiline = $True
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 139
$System_Drawing_Size.Height = 20
$textBoxStreetAddress.Size = $System_Drawing_Size
$textBoxStreetAddress.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxStreetAddress.ScrollBars = 2
$textBoxStreetAddress.Name = 'textBoxStreetAddress'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 114
$System_Drawing_Point.Y = 396
$textBoxStreetAddress.Location = $System_Drawing_Point
$textBoxStreetAddress.TabIndex = 55
$User_Properties.Controls.Add($textBoxStreetAddress)
$lblStreetAddress.TabIndex = 54
$lblStreetAddress.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblStreetAddress.Size = $System_Drawing_Size
$lblStreetAddress.Text = 'Street Address:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 8
$System_Drawing_Point.Y = 392
$lblStreetAddress.Location = $System_Drawing_Point
$lblStreetAddress.DataBindings.DefaultDataSourceUpdateMode = 0
$lblStreetAddress.Name = 'lblStreetAddress'
$User_Properties.Controls.Add($lblStreetAddress)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 140
$System_Drawing_Size.Height = 20
$textBoxassistantphone.Size = $System_Drawing_Size
$textBoxassistantphone.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxassistantphone.Name = 'textBoxassistantphone'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 369
$System_Drawing_Point.Y = 396
$textBoxassistantphone.Location = $System_Drawing_Point
$textBoxassistantphone.TabIndex = 57
$User_Properties.Controls.Add($textBoxassistantphone)
$lblassistantphone.TabIndex = 56
$lblassistantphone.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblassistantphone.Size = $System_Drawing_Size
$lblassistantphone.Text = 'Assistant Phone:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 263
$System_Drawing_Point.Y = 392
$lblassistantphone.Location = $System_Drawing_Point
$lblassistantphone.DataBindings.DefaultDataSourceUpdateMode = 0
$lblassistantphone.Name = 'lblassistantphone'
$User_Properties.Controls.Add($lblassistantphone)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 139
$System_Drawing_Size.Height = 20
$textBoxoffice.Size = $System_Drawing_Size
$textBoxoffice.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxoffice.Name = 'textBoxoffice'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 114
$System_Drawing_Point.Y = 370
$textBoxoffice.Location = $System_Drawing_Point
$textBoxoffice.TabIndex = 51
$User_Properties.Controls.Add($textBoxoffice)
$lbloffice.TabIndex = 50
$lbloffice.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lbloffice.Size = $System_Drawing_Size
$lbloffice.Text = 'Office:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 8
$System_Drawing_Point.Y = 366
$lbloffice.Location = $System_Drawing_Point
$lbloffice.DataBindings.DefaultDataSourceUpdateMode = 0
$lbloffice.Name = 'lbloffice'
$User_Properties.Controls.Add($lbloffice)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 140
$System_Drawing_Size.Height = 20
$textBoxotherTelephone.Size = $System_Drawing_Size
$textBoxotherTelephone.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxotherTelephone.Name = 'textBoxotherTelephone'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 369
$System_Drawing_Point.Y = 370
$textBoxotherTelephone.Location = $System_Drawing_Point
$textBoxotherTelephone.TabIndex = 53
$User_Properties.Controls.Add($textBoxotherTelephone)
$lblotherTelephone.TabIndex = 52
$lblotherTelephone.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblotherTelephone.Size = $System_Drawing_Size
$lblotherTelephone.Text = 'Other Telephone:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 263
$System_Drawing_Point.Y = 366
$lblotherTelephone.Location = $System_Drawing_Point
$lblotherTelephone.DataBindings.DefaultDataSourceUpdateMode = 0
$lblotherTelephone.Name = 'lblotherTelephone'
$User_Properties.Controls.Add($lblotherTelephone)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 139
$System_Drawing_Size.Height = 20
$textBoxCustomAttribute10.Size = $System_Drawing_Size
$textBoxCustomAttribute10.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxCustomAttribute10.Name = 'textBoxCustomAttribute10'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 114
$System_Drawing_Point.Y = 344
$textBoxCustomAttribute10.Location = $System_Drawing_Point
$textBoxCustomAttribute10.TabIndex = 47
$User_Properties.Controls.Add($textBoxCustomAttribute10)
$lblCustomAttribute10.TabIndex = 46
$lblCustomAttribute10.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 102
$System_Drawing_Size.Height = 23
$lblCustomAttribute10.Size = $System_Drawing_Size
$lblCustomAttribute10.Text = 'CustomAttribute10:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 6
$System_Drawing_Point.Y = 340
$lblCustomAttribute10.Location = $System_Drawing_Point
$lblCustomAttribute10.DataBindings.DefaultDataSourceUpdateMode = 0
$lblCustomAttribute10.Name = 'lblCustomAttribute10'
$User_Properties.Controls.Add($lblCustomAttribute10)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 140
$System_Drawing_Size.Height = 20
$textBoxpager.Size = $System_Drawing_Size
$textBoxpager.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxpager.Name = 'textBoxpager'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 369
$System_Drawing_Point.Y = 344
$textBoxpager.Location = $System_Drawing_Point
$textBoxpager.TabIndex = 49
$User_Properties.Controls.Add($textBoxpager)
$lblpager.TabIndex = 48
$lblpager.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblpager.Size = $System_Drawing_Size
$lblpager.Text = 'Pager:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 263
$System_Drawing_Point.Y = 340
$lblpager.Location = $System_Drawing_Point
$lblpager.DataBindings.DefaultDataSourceUpdateMode = 0
$lblpager.Name = 'lblpager'
$User_Properties.Controls.Add($lblpager)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 139
$System_Drawing_Size.Height = 20
$textBoxOtherHomePhone.Size = $System_Drawing_Size
$textBoxOtherHomePhone.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxOtherHomePhone.Name = 'textBoxOtherHomePhone'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 114
$System_Drawing_Point.Y = 318
$textBoxOtherHomePhone.Location = $System_Drawing_Point
$textBoxOtherHomePhone.TabIndex = 43
$User_Properties.Controls.Add($textBoxOtherHomePhone)
$lblOtherHomePhone.TabIndex = 42
$lblOtherHomePhone.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 106
$System_Drawing_Size.Height = 23
$lblOtherHomePhone.Size = $System_Drawing_Size
$lblOtherHomePhone.Text = 'Other Home Phone:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 4
$System_Drawing_Point.Y = 314
$lblOtherHomePhone.Location = $System_Drawing_Point
$lblOtherHomePhone.DataBindings.DefaultDataSourceUpdateMode = 0
$lblOtherHomePhone.Name = 'lblOtherHomePhone'
$User_Properties.Controls.Add($lblOtherHomePhone)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 140
$System_Drawing_Size.Height = 20
$textBoxmobile.Size = $System_Drawing_Size
$textBoxmobile.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxmobile.Name = 'textBoxmobile'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 369
$System_Drawing_Point.Y = 318
$textBoxmobile.Location = $System_Drawing_Point
$textBoxmobile.TabIndex = 45
$User_Properties.Controls.Add($textBoxmobile)
$lblmobile.TabIndex = 44
$lblmobile.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblmobile.Size = $System_Drawing_Size
$lblmobile.Text = 'Mobile:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 263
$System_Drawing_Point.Y = 314
$lblmobile.Location = $System_Drawing_Point
$lblmobile.DataBindings.DefaultDataSourceUpdateMode = 0
$lblmobile.Name = 'lblmobile'
$User_Properties.Controls.Add($lblmobile)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 139
$System_Drawing_Size.Height = 20
$textBoxfax.Size = $System_Drawing_Size
$textBoxfax.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxfax.Name = 'textBoxfax'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 114
$System_Drawing_Point.Y = 292
$textBoxfax.Location = $System_Drawing_Point
$textBoxfax.TabIndex = 39
$User_Properties.Controls.Add($textBoxfax)
$lblFax.TabIndex = 38
$lblFax.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblFax.Size = $System_Drawing_Size
$lblFax.Text = 'Fax:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 8
$System_Drawing_Point.Y = 288
$lblFax.Location = $System_Drawing_Point
$lblFax.DataBindings.DefaultDataSourceUpdateMode = 0
$lblFax.Name = 'lblFax'
$User_Properties.Controls.Add($lblFax)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 140
$System_Drawing_Size.Height = 20
$textBoxHomePhone.Size = $System_Drawing_Size
$textBoxHomePhone.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxHomePhone.Name = 'textBoxHomePhone'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 369
$System_Drawing_Point.Y = 292
$textBoxHomePhone.Location = $System_Drawing_Point
$textBoxHomePhone.TabIndex = 41
$User_Properties.Controls.Add($textBoxHomePhone)
$lblHomePhone.TabIndex = 40
$lblHomePhone.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblHomePhone.Size = $System_Drawing_Size
$lblHomePhone.Text = 'Home Phone:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 263
$System_Drawing_Point.Y = 288
$lblHomePhone.Location = $System_Drawing_Point
$lblHomePhone.DataBindings.DefaultDataSourceUpdateMode = 0
$lblHomePhone.Name = 'lblHomePhone'
$User_Properties.Controls.Add($lblHomePhone)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 140
$System_Drawing_Size.Height = 20
$textboxPhone.Size = $System_Drawing_Size
$textboxPhone.DataBindings.DefaultDataSourceUpdateMode = 0
$textboxPhone.Name = 'textboxPhone'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 114
$System_Drawing_Point.Y = 266
$textboxPhone.Location = $System_Drawing_Point
$textboxPhone.TabIndex = 35
$User_Properties.Controls.Add($textboxPhone)
$lblPhone.TabIndex = 34
$lblPhone.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblPhone.Size = $System_Drawing_Size
$lblPhone.Text = 'Business:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 8
$System_Drawing_Point.Y = 262
$lblPhone.Location = $System_Drawing_Point
$lblPhone.DataBindings.DefaultDataSourceUpdateMode = 0
$lblPhone.Name = 'lblPhone'
$User_Properties.Controls.Add($lblPhone)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 140
$System_Drawing_Size.Height = 20
$textBoxCustomAttribute6.Size = $System_Drawing_Size
$textBoxCustomAttribute6.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxCustomAttribute6.Name = 'textBoxCustomAttribute6'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 369
$System_Drawing_Point.Y = 266
$textBoxCustomAttribute6.Location = $System_Drawing_Point
$textBoxCustomAttribute6.TabIndex = 37
$User_Properties.Controls.Add($textBoxCustomAttribute6)
$lblCustomAttribute6.TabIndex = 36
$lblCustomAttribute6.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblCustomAttribute6.Size = $System_Drawing_Size
$lblCustomAttribute6.Text = 'CustomAttribute6:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 263
$System_Drawing_Point.Y = 262
$lblCustomAttribute6.Location = $System_Drawing_Point
$lblCustomAttribute6.DataBindings.DefaultDataSourceUpdateMode = 0
$lblCustomAttribute6.Name = 'lblCustomAttribute6'
$User_Properties.Controls.Add($lblCustomAttribute6)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 140
$System_Drawing_Size.Height = 20
$textBoxCustomAttribute8.Size = $System_Drawing_Size
$textBoxCustomAttribute8.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxCustomAttribute8.Name = 'textBoxCustomAttribute8'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 114
$System_Drawing_Point.Y = 240
$textBoxCustomAttribute8.Location = $System_Drawing_Point
$textBoxCustomAttribute8.TabIndex = 31
$User_Properties.Controls.Add($textBoxCustomAttribute8)
$lblCustomAttribute8.TabIndex = 30
$lblCustomAttribute8.TextAlign = 16
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 104
$System_Drawing_Size.Height = 23
$lblCustomAttribute8.Size = $System_Drawing_Size
$lblCustomAttribute8.Text = 'CustomAttribute8:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 8
$System_Drawing_Point.Y = 236
$lblCustomAttribute8.Location = $System_Drawing_Point
$lblCustomAttribute8.DataBindings.DefaultDataSourceUpdateMode = 0
$lblCustomAttribute8.Name = 'lblCustomAttribute8'
$User_Properties.Controls.Add($lblCustomAttribute8)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 140
$System_Drawing_Size.Height = 20
$textBoxCustomAttribute4.Size = $System_Drawing_Size
$textBoxCustomAttribute4.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxCustomAttribute4.Name = 'textBoxCustomAttribute4'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 369
$System_Drawing_Point.Y = 240
$textBoxCustomAttribute4.Location = $System_Drawing_Point
$textBoxCustomAttribute4.TabIndex = 33
$User_Properties.Controls.Add($textBoxCustomAttribute4)
$lblCustomAttribute4.TabIndex = 32
$lblCustomAttribute4.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblCustomAttribute4.Size = $System_Drawing_Size
$lblCustomAttribute4.Text = 'CustomAttribute4:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 263
$System_Drawing_Point.Y = 236
$lblCustomAttribute4.Location = $System_Drawing_Point
$lblCustomAttribute4.DataBindings.DefaultDataSourceUpdateMode = 0
$lblCustomAttribute4.Name = 'lblCustomAttribute4'
$User_Properties.Controls.Add($lblCustomAttribute4)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 140
$System_Drawing_Size.Height = 20
$textboxDepartment.Size = $System_Drawing_Size
$textboxDepartment.DataBindings.DefaultDataSourceUpdateMode = 0
$textboxDepartment.Name = 'textboxDepartment'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 114
$System_Drawing_Point.Y = 214
$textboxDepartment.Location = $System_Drawing_Point
$textboxDepartment.TabIndex = 27
$User_Properties.Controls.Add($textboxDepartment)
$lblDepartment.TabIndex = 26
$lblDepartment.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblDepartment.Size = $System_Drawing_Size
$lblDepartment.Text = 'Department:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 8
$System_Drawing_Point.Y = 210
$lblDepartment.Location = $System_Drawing_Point
$lblDepartment.DataBindings.DefaultDataSourceUpdateMode = 0
$lblDepartment.Name = 'lblDepartment'
$User_Properties.Controls.Add($lblDepartment)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 140
$System_Drawing_Size.Height = 20
$textBoxCustomAttribute3.Size = $System_Drawing_Size
$textBoxCustomAttribute3.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxCustomAttribute3.Name = 'textBoxCustomAttribute3'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 369
$System_Drawing_Point.Y = 214
$textBoxCustomAttribute3.Location = $System_Drawing_Point
$textBoxCustomAttribute3.TabIndex = 29
$User_Properties.Controls.Add($textBoxCustomAttribute3)
$lblCustomAttribute3.TabIndex = 28
$lblCustomAttribute3.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblCustomAttribute3.Size = $System_Drawing_Size
$lblCustomAttribute3.Text = 'CustomAttribute3:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 263
$System_Drawing_Point.Y = 210
$lblCustomAttribute3.Location = $System_Drawing_Point
$lblCustomAttribute3.DataBindings.DefaultDataSourceUpdateMode = 0
$lblCustomAttribute3.Name = 'lblCustomAttribute3'
$User_Properties.Controls.Add($lblCustomAttribute3)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 140
$System_Drawing_Size.Height = 20
$textBoxCustomAttribute7.Size = $System_Drawing_Size
$textBoxCustomAttribute7.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxCustomAttribute7.Name = 'textBoxCustomAttribute7'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 114
$System_Drawing_Point.Y = 188
$textBoxCustomAttribute7.Location = $System_Drawing_Point
$textBoxCustomAttribute7.TabIndex = 23
$User_Properties.Controls.Add($textBoxCustomAttribute7)
$lblCustomAttribute7.TabIndex = 22
$lblCustomAttribute7.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblCustomAttribute7.Size = $System_Drawing_Size
$lblCustomAttribute7.Text = 'CustomAttribute7:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 8
$System_Drawing_Point.Y = 184
$lblCustomAttribute7.Location = $System_Drawing_Point
$lblCustomAttribute7.DataBindings.DefaultDataSourceUpdateMode = 0
$lblCustomAttribute7.Name = 'lblCustomAttribute7'
$User_Properties.Controls.Add($lblCustomAttribute7)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 140
$System_Drawing_Size.Height = 20
$textBoxCompany.Size = $System_Drawing_Size
$textBoxCompany.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxCompany.Name = 'textBoxCompany'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 369
$System_Drawing_Point.Y = 188
$textBoxCompany.Location = $System_Drawing_Point
$textBoxCompany.TabIndex = 25
$User_Properties.Controls.Add($textBoxCompany)
$lblCompany.TabIndex = 24
$lblCompany.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblCompany.Size = $System_Drawing_Size
$lblCompany.Text = 'Company:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 263
$System_Drawing_Point.Y = 184
$lblCompany.Location = $System_Drawing_Point
$lblCompany.DataBindings.DefaultDataSourceUpdateMode = 0
$lblCompany.Name = 'lblCompany'
$User_Properties.Controls.Add($lblCompany)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 140
$System_Drawing_Size.Height = 20
$textBoxCustomAttribute1.Size = $System_Drawing_Size
$textBoxCustomAttribute1.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxCustomAttribute1.Name = 'textBoxCustomAttribute1'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 114
$System_Drawing_Point.Y = 162
$textBoxCustomAttribute1.Location = $System_Drawing_Point
$textBoxCustomAttribute1.TabIndex = 19
$User_Properties.Controls.Add($textBoxCustomAttribute1)
$lblCustomAttribute1.TabIndex = 18
$lblCustomAttribute1.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblCustomAttribute1.Size = $System_Drawing_Size
$lblCustomAttribute1.Text = 'CustomAttribute1:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 8
$System_Drawing_Point.Y = 158
$lblCustomAttribute1.Location = $System_Drawing_Point
$lblCustomAttribute1.DataBindings.DefaultDataSourceUpdateMode = 0
$lblCustomAttribute1.Name = 'lblCustomAttribute1'
$User_Properties.Controls.Add($lblCustomAttribute1)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 140
$System_Drawing_Size.Height = 20
$textBoxAlias.Size = $System_Drawing_Size
$textBoxAlias.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxAlias.Name = 'textBoxAlias'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 114
$System_Drawing_Point.Y = 136
$textBoxAlias.Location = $System_Drawing_Point
$textBoxAlias.TabIndex = 15
$User_Properties.Controls.Add($textBoxAlias)
$lblAlias.TabIndex = 14
$lblAlias.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblAlias.Size = $System_Drawing_Size
$lblAlias.Text = 'Email Alias:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 8
$System_Drawing_Point.Y = 132
$lblAlias.Location = $System_Drawing_Point
$lblAlias.DataBindings.DefaultDataSourceUpdateMode = 0
$lblAlias.Name = 'lblAlias'
$User_Properties.Controls.Add($lblAlias)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 254
$System_Drawing_Size.Height = 20
$textBoxEmail.Size = $System_Drawing_Size
$textBoxEmail.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxEmail.Name = 'textBoxEmail'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 114
$System_Drawing_Point.Y = 58
$textBoxEmail.Location = $System_Drawing_Point
$textBoxEmail.ForeColor = [System.Drawing.Color]::FromArgb(255,0,0,0)
$textBoxEmail.TabIndex = 5
$User_Properties.Controls.Add($textBoxEmail)
$lblemail.TabIndex = 4
$lblemail.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblemail.Size = $System_Drawing_Size
$lblemail.Text = 'E-Mail:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 8
$System_Drawing_Point.Y = 57
$lblemail.Location = $System_Drawing_Point
$lblemail.DataBindings.DefaultDataSourceUpdateMode = 0
$lblemail.Name = 'lblemail'
$User_Properties.Controls.Add($lblemail)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 140
$System_Drawing_Size.Height = 20
$textBoxCustomAttribute2.Size = $System_Drawing_Size
$textBoxCustomAttribute2.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxCustomAttribute2.Name = 'textBoxCustomAttribute2'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 369
$System_Drawing_Point.Y = 136
$textBoxCustomAttribute2.Location = $System_Drawing_Point
$textBoxCustomAttribute2.TabIndex = 17
$User_Properties.Controls.Add($textBoxCustomAttribute2)
$lblCustomAttribute2.TabIndex = 16
$lblCustomAttribute2.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblCustomAttribute2.Size = $System_Drawing_Size
$lblCustomAttribute2.Text = 'CustomAttribute2:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 263
$System_Drawing_Point.Y = 132
$lblCustomAttribute2.Location = $System_Drawing_Point
$lblCustomAttribute2.DataBindings.DefaultDataSourceUpdateMode = 0
$lblCustomAttribute2.Name = 'lblCustomAttribute2'
$User_Properties.Controls.Add($lblCustomAttribute2)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 254
$System_Drawing_Size.Height = 20
$textBoxUPN.Size = $System_Drawing_Size
$textBoxUPN.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxUPN.Name = 'textBoxUPN'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 114
$System_Drawing_Point.Y = 32
$textBoxUPN.Location = $System_Drawing_Point
$textBoxUPN.ForeColor = [System.Drawing.Color]::FromArgb(255,0,0,0)
$textBoxUPN.TabIndex = 3
$User_Properties.Controls.Add($textBoxUPN)
$lblUPN.TabIndex = 2
$lblUPN.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblUPN.Size = $System_Drawing_Size
$lblUPN.Text = 'UPN:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 8
$System_Drawing_Point.Y = 32
$lblUPN.Location = $System_Drawing_Point
$lblUPN.DataBindings.DefaultDataSourceUpdateMode = 0
$lblUPN.Name = 'lblUPN'
$User_Properties.Controls.Add($lblUPN)
$btnclose1.TabIndex = 68
$btnclose1.Name = 'btnclose1'
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 75
$System_Drawing_Size.Height = 23
$btnclose1.Size = $System_Drawing_Size
$btnclose1.UseVisualStyleBackColor = $True
$btnclose1.Text = 'Close'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 448
$System_Drawing_Point.Y = 501
$btnclose1.Location = $System_Drawing_Point
$btnclose1.DataBindings.DefaultDataSourceUpdateMode = 0
$btnclose1.add_Click($btnclose1_OnClick)
$User_Properties.Controls.Add($btnclose1)
$btnnamesearchagain.TabIndex = 67
$btnnamesearchagain.Name = 'btnnamesearchagain'
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 103
$System_Drawing_Size.Height = 23
$btnnamesearchagain.Size = $System_Drawing_Size
$btnnamesearchagain.UseVisualStyleBackColor = $True
$btnnamesearchagain.Text = 'Find Another user'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 326
$System_Drawing_Point.Y = 501
$btnnamesearchagain.Location = $System_Drawing_Point
$btnnamesearchagain.DataBindings.DefaultDataSourceUpdateMode = 0
$btnnamesearchagain.add_Click($btnnamesearchagain_OnClick)
$User_Properties.Controls.Add($btnnamesearchagain)
$btnupdate.TabIndex = 66
$btnupdate.Name = 'btnupdate'
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 75
$System_Drawing_Size.Height = 23
$btnupdate.Size = $System_Drawing_Size
$btnupdate.UseVisualStyleBackColor = $True
$btnupdate.Text = 'Update'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 235
$System_Drawing_Point.Y = 501
$btnupdate.Location = $System_Drawing_Point
$btnupdate.DataBindings.DefaultDataSourceUpdateMode = 0
$btnupdate.add_Click($btnupdate_OnClick)
$User_Properties.Controls.Add($btnupdate)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 140
$System_Drawing_Size.Height = 20
$textBoxTitle.Size = $System_Drawing_Size
$textBoxTitle.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxTitle.Name = 'textBoxTitle'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 369
$System_Drawing_Point.Y = 110
$textBoxTitle.Location = $System_Drawing_Point
$textBoxTitle.TabIndex = 13
$User_Properties.Controls.Add($textBoxTitle)
$lblTitle.TabIndex = 12
$lblTitle.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblTitle.Size = $System_Drawing_Size
$lblTitle.Text = 'Title:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 263
$System_Drawing_Point.Y = 106
$lblTitle.Location = $System_Drawing_Point
$lblTitle.DataBindings.DefaultDataSourceUpdateMode = 0
$lblTitle.Name = 'lblTitle'
$User_Properties.Controls.Add($lblTitle)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 140
$System_Drawing_Size.Height = 20
$textBoxInitials.Size = $System_Drawing_Size
$textBoxInitials.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxInitials.Name = 'textBoxInitials'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 114
$System_Drawing_Point.Y = 110
$textBoxInitials.Location = $System_Drawing_Point
$textBoxInitials.TabIndex = 11
$User_Properties.Controls.Add($textBoxInitials)
$lblInitials.TabIndex = 10
$lblInitials.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblInitials.Size = $System_Drawing_Size
$lblInitials.Text = 'Initials:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 8
$System_Drawing_Point.Y = 106
$lblInitials.Location = $System_Drawing_Point
$lblInitials.DataBindings.DefaultDataSourceUpdateMode = 0
$lblInitials.Name = 'lblInitials'
$User_Properties.Controls.Add($lblInitials)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 140
$System_Drawing_Size.Height = 20
$textBoxFirstName.Size = $System_Drawing_Size
$textBoxFirstName.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxFirstName.Name = 'textBoxFirstName'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 369
$System_Drawing_Point.Y = 84
$textBoxFirstName.Location = $System_Drawing_Point
$textBoxFirstName.TabIndex = 9
$User_Properties.Controls.Add($textBoxFirstName)
$lblFirstName.TabIndex = 8
$lblFirstName.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblFirstName.Size = $System_Drawing_Size
$lblFirstName.Text = 'First Name:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 263
$System_Drawing_Point.Y = 80
$lblFirstName.Location = $System_Drawing_Point
$lblFirstName.DataBindings.DefaultDataSourceUpdateMode = 0
$lblFirstName.Name = 'lblFirstName'
$User_Properties.Controls.Add($lblFirstName)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 140
$System_Drawing_Size.Height = 20
$textBoxLastName.Size = $System_Drawing_Size
$textBoxLastName.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxLastName.Name = 'textBoxLastName'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 114
$System_Drawing_Point.Y = 84
$textBoxLastName.Location = $System_Drawing_Point
$textBoxLastName.TabIndex = 7
$User_Properties.Controls.Add($textBoxLastName)
$lblLastName.TabIndex = 6
$lblLastName.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lblLastName.Size = $System_Drawing_Size
$lblLastName.Text = 'Last Name:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 8
$System_Drawing_Point.Y = 80
$lblLastName.Location = $System_Drawing_Point
$lblLastName.DataBindings.DefaultDataSourceUpdateMode = 0
$lblLastName.Name = 'lblLastName'
$User_Properties.Controls.Add($lblLastName)
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 409
$System_Drawing_Size.Height = 20
$textBoxDisplayName.Size = $System_Drawing_Size
$textBoxDisplayName.DataBindings.DefaultDataSourceUpdateMode = 0
$textBoxDisplayName.Name = 'textBoxDisplayName'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 114
$System_Drawing_Point.Y = 6
$textBoxDisplayName.Location = $System_Drawing_Point
$textBoxDisplayName.TabIndex = 1
$User_Properties.Controls.Add($textBoxDisplayName)
$lbldisplayName.TabIndex = 0
$lbldisplayName.TextAlign = 64
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Width = 100
$System_Drawing_Size.Height = 23
$lbldisplayName.Size = $System_Drawing_Size
$lbldisplayName.Text = 'DisplayName:'
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 8
$System_Drawing_Point.Y = 3
$lbldisplayName.Location = $System_Drawing_Point
$lbldisplayName.DataBindings.DefaultDataSourceUpdateMode = 0
$lbldisplayName.Name = 'lbldisplayName'
$User_Properties.Controls.Add($lbldisplayName)
#endregion Generated Form Code
$UserUpdate.TopMost = $True
#Show the Form
$UserUpdate.ShowDialog()| Out-Null
} #End Function
#Call the Function
GenerateForm
|
combined_dataset/train/non-malicious/1027025e-d46a-4d37-a5b0-b1c76068dc6b.ps1 | 1027025e-d46a-4d37-a5b0-b1c76068dc6b.ps1 | # Code to auto update the Address policy, GAL, OAB and storage groups and mailbox databases of an Exchange 2007 server by John McLear
# This code is good for hosting providers or people who wish to use lots of storage groups and mailbox databases.
#
# Thanks to Joel Bennett (Jaykul) for general scripting help and the friendly folks in #powershell - freenode
#
# I rewrote this and didnt test before publishing so there may be some syntax errors.
#
# Created 07/09/2008
#################################################################################################################################
param([string]$fullname, [string]$mail2, [string]$typeofcustomer)
# PRE REQ - Create a container in your address lists called "Generic Address Book" or something similar - this is where we will store address lists!
- Create a public folder database on your MB server - In $publicfolderDatabase our example is in storage group sg0 called Public Folder.
# We need to set some things manually too!
$yourinternaldomain = "domain.com" # ie contoso.com
$OABDistributionServer = "CASserver" # Your CAS server responsible for OAB distribution
$MailboxServer = "MBserver" # Shortname of your MailboxServer
$PublicFolderDatabase = $MailboxServer + '\\sg0\\Public Folder' # The Path to your public folder used for Address List distribution
$LogFilePath = "d:\\Program Files\\Microsoft\\Exchange Server\\Mailbox\\First Storage Group\\" # Where we will put the log files
$AdminName = "CN=Servers,CN=Exchange Administrative Group (TESTING23TESTY),CN=Administrative Groups,CN=Contoso,CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=contoso,DC=com" # This needs to be changed
echo "Fullname: $fullname" # full name of customer - this must be a unique value)
echo "Domain name: $mail2" # customers domain name ie fraggle.com
echo "Type of customer (1 is basic, 2 is standard, 3 is premium): $typeofcustomer" # Basically a premium customer will get their own mailboxdatabase - a basic or standard will share in one big database (know why before you use this!)
echo "Your internal domain: $yourinternaldomain" # The internal domain you set
# Lets go!
######################
Add-PSSnapin Microsoft.Exchange.Management.PowerShell.Admin
# Loads exchange snap ins
new-AcceptedDomain -Name $mail2 -DomainName $mail2 -DomainType 'Authoritative'
# Creates an accepted domain
new-EmailAddressPolicy -Name $fullname -IncludedRecipients 'AllRecipients' -ConditionalCompany $fullname -Priority 'Lowest' -EnabledEmailAddressTemplates SMTP:%m@$mail2,smtp:%g@$mail2,smtp:%1g.%s@$mail2,smtp:%m@$yourinternaldomain
# Creates a new address policy giving - you may wish to modify this to suit
set-EmailAddressPolicy -Identity $fullname -IncludedRecipients 'AllRecipients' -ConditionalCompany $fullname -Priority 'Lowest' -EnabledEmailAddressTemplates SMTP:%m@$mail2,smtp:%g@$mail2,smtp:%1g.%s@$mail2,smtp:%m@$yourinternaldomain
# Modifies the new address policy giving - you may wish to modify this to suit - Why modify? You may wish to update this at some point and its best practice to have a set command imho
new-GlobalAddressList -Name $fullname -IncludedRecipients 'AllRecipients' -ConditionalCompany $fullname
# Create a new GAL
new-AddressList -Name $fullname -IncludedRecipients 'AllRecipients' -ConditionalCompany $fullname -Container '\\Generic Address Book'
# Create a new address list in the Generic Address Book container - Modify your container to suit!
$fullname2 = '\\Generic Address book\\' + $fullname
# You may wish to modify the above to suit
$OABPoint = $OABdistributionServer + '\\OAB (Default Web Site)'
# You may wish to modify the above line to suit but I doubt it.
new-OfflineAddressBook -Name $fullname -Server $pinkyring -AddressLists $fullname2 -PublicFolderDistributionEnabled $false -VirtualDirectories $OABPoint
# Create a new Offline Address Book
Set-OfflineAddressBook -Identity $fullname -versions Version3, Version4 -PublicFolderDistributionEnabled $true -AddressLists $fullname2
# Set the OAB to V3, 4 and Public folder distribution.
Update-EmailAddressPolicy -Identity $fullname
# Update the Email Address Policy
Set-MailboxDatabase -Identity $fullname -OfflineAddressBook $fullname -PublicFolderDatabase $PublicFolderDatabase
# Set the Mailbox database of the customer to use the public folder database you created
$maildb = Get-MailboxDataBase | Select-String $fullname
echo $maildb
if ($maildb -match "sg")
# if there is a database for the fullname value then
{
echo "not making the DB"
}
else
{
if ($typeofcustomer -match "3")
# and if the type of customer is 3 (premium)
{
echo "making the DB" # this customer must be premium! good for them!!
$i = 1
for( $i=0; $i -lt 50; $i++ )
# for each count 1 to 50
{
$maildb = Get-MailboxDataBase | Select-String $fullname
echo $maildb
if ($maildb -match "sg")
# Check for a database
{ echo "database located" } # if database is found then do nothing
else
{
new-storagegroup sg$i
# creating 50 storage groups
new-mailboxdatabase -StorageGroup $MailboxServer\\sg$i -Name $fullname -EdbFilePath $LogFilePath + '\\' + $fullname.edb
# make a database on the server - we need to add incrementation on servername here..
mount-database -Identity "CN=$fullname,CN=sg$i,CN=InformationStore,CN=$MailboxServer,$AdminName"
# mount the database
$i++
# increase the storage group by 1
}
}
Set-MailboxDatabase -Identity $fullname -PublicFolderDatabase $PublicFolderDatabase
# set the public folder
}
else
{
echo "customer is a basic or standard customer so we are going to not create a DB"
Set-MailboxDatabase -Identity $fullname -OfflineAddressBook $fullname -PublicFolderDatabase $PublicFolderDatabase
}
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.