full_path stringlengths 31 232 | filename stringlengths 4 167 | content stringlengths 0 48.3M |
|---|---|---|
combined_dataset/train/non-malicious/New-Eicar.ps1 | New-Eicar.ps1 | function New-Eicar {
<#
.SYNOPSIS
New-Eicar
Author: Chris Campbell (@obscuresec)
License: BSD 3-Clause
.DESCRIPTION
A function that generates the EICAR string to test ondemand scanning of antivirus products.
.PARAMETER $Path
Specifies the path to write the eicar file to.
.EXAMPLE
PS C:\\> New-Eicar -Path c:\\test
.NOTES
During testing, several AV products caused the script to hang, but it always completed after a few minutes.
.LINK
http://obscuresec.com/2013/01/New-Eicar.html
https://github.com/obscuresec/random/blob/master/New-Eicar
#>
[CmdletBinding()] Param(
[ValidateScript({Test-Path $_ -PathType 'Container'})]
[string]
$Path = "$env:temp\\"
)
[string] $FilePath = (Join-Path $Path eicar.com)
#Base64 of Eicar string
[string] $EncodedEicar = 'WDVPIVAlQEFQWzRcUFpYNTQoUF4pN0NDKTd9JEVJQ0FSLVNUQU5EQVJELUFOVElWSVJVUy1URVNULUZJTEUhJEgrSCo='
If (!(Test-Path -Path $FilePath)) {
Try {
[byte[]] $EicarBytes = [System.Convert]::FromBase64String($EncodedEicar)
[string] $Eicar = [System.Text.Encoding]::UTF8.GetString($EicarBytes)
Set-Content -Value $Eicar -Encoding ascii -Path $FilePath -Force
}
Catch {
Write-Warning "Eicar.com file couldn't be created. Either permissions or AV prevented file creation."
}
}
Else {
Write-Warning "Eicar.com already exists!"
}
}
|
combined_dataset/train/non-malicious/Get-Films (From Netflix).ps1 | Get-Films (From Netflix).ps1 | function Get-Films {
param($Name)
$proxy = New-ODataServiceProxy http://odata.netflix.com/Catalog/
if($Name -match "\\*") {
$sName = $Name -replace "\\*"
$Global:Films = $proxy.Titles.AddQueryOption('$filter',"substringof('$sName',Name)") | Where { $_.Name -like $Name }
} else {
$Global:Films = $proxy.Titles.AddQueryOption('$filter',"'$Name' eq Name")
}
$Films | Format-List Name, ReleaseYear, AverageRating, Url, Synopsis
Write-Host "NOTE: This data is cached in `$Films" -Fore Yellow
}
Get-Films Salt
Get-Films "The Matrix*"
Get-Films "Ernest*"
|
combined_dataset/train/non-malicious/427.ps1 | 427.ps1 | Register-PSFTeppScriptblock -Name 'PSFramework-tepp-scriptblockname' -ScriptBlock {
[PSFramework.TabExpansion.TabExpansionHost]::Scripts.Keys
}
Register-PSFTeppScriptblock -Name 'PSFramework-tepp-parametername' -ScriptBlock {
if ($fakeBoundParameter.Command)
{
$common = 'Verbose', 'Debug', 'ErrorAction', 'WarningAction', 'InformationAction', 'ErrorVariable', 'WarningVariable', 'InformationVariable', 'OutVariable', 'OutBuffer', 'PipelineVariable', 'WhatIf', 'Confirm'
try
{
$command = Get-Command $fakeBoundParameter.Command
if ($command -is [System.Management.Automation.AliasInfo]) { $command = $command.ResolvedCommand }
$command.Parameters.Keys | Where-Object { $_ -notin $common }
}
catch { }
}
} |
combined_dataset/train/non-malicious/Reverse filename sequenc_5.ps1 | Reverse filename sequenc_5.ps1 | # Reverse filename sequence v 0.9
# Author: Sean Wendt
#
# This script will rename a sequenced set of files in a directory.
# For example, you have foobar01.jpg, foobar02.jpg, foobar03.jpg
# -- it will reverse the order, so the last file is now 01, the second to last 02, etc..
#
# Limitations: -You cannot use the same filename prefix, i.e. foobar must change to foobars.
# -It's hardcoded to only support 5 digit numbers right now.
# -Similarly, it will only support a file sequence with up to 5 digits.
# This is the first script I've written, I know it's not great! ;)
# Help to make it better would be appreciated. Thanks.
#
$file_extension = Read-Host "Enter file extension, i.e. .jpg or .txt"
$file_prefix = Read-Host "Enter file prefix, i.e. entering foobar will rename files to foobar001.ext, foobar002.ext, etc.."
$files = Get-ChildItem | ?{ $_.PSIsContainer -ne "True"} # Creates array of files in current directory, ignores folders
$idx = 0 # Sets index value (0 = filenames start at foobar00000.jpg, modify to 1 to start at foobar00001.jpg)
for ($ctr=$files.count; $ctr -gt 0 ; --$ctr)
{
if (($idx -ge 0) -and ($idx -le 9))
{
Rename-Item -path $files[$ctr-1].name -newname ($file_prefix + '00000' + $idx++ + $file_extension)
}
elseif (($idx -ge 10) -and ($idx -le 99))
{
Rename-Item -path $files[$ctr-1].name -newname ($file_prefix + '0000' + $idx++ + $file_extension)
}
elseif (($idx -ge 100) -and ($idx -le 999))
{
Rename-Item -path $files[$ctr-1].name -newname ($file_prefix + '000' + $idx++ + $file_extension)
}
elseif (($idx -ge 1000) -and ($idx -le 9999))
{
Rename-Item -path $files[$ctr-1].name -newname ($file_prefix + '00' + $idx++ + $file_extension)
}
elseif (($idx -ge 10000) -and ($idx -le 99999))
{
Rename-Item -path $files[$ctr-1].name -newname ($file_prefix + '0' + $idx++ + $file_extension)
}
$idx #prints the index # it just completed
}
|
combined_dataset/train/non-malicious/464.ps1 | 464.ps1 |
Set-PSFConfig -Module PSFramework -Name 'System.Unattended' -Value $false -Initialize -Validation "bool" -Handler { [PSFramework.PSFCore.PSFCoreHost]::Unattended = $args[0] } -Description "Central setting, showing whether the current execution is unattended or not. This allows scripts/modules to react to whether there is a user at the controls or not."
Set-PSFConfig -Module PSFramework -Name 'SupportPackage.ContactMessage' -Value ' ' -Initialize -Validation 'string' -Description 'Message shown when using New-PSFSUpportPackage. This allows an organization to tie information on how to submit a support package into the command that generates it'
Set-PSFConfig -Module PSFramework -Name 'Text.Encoding.FullTabCompletion' -Value $false -Initialize -Validation 'bool' -Description 'Whether all encodings should be part of the tab completion for encodings. By default, only a manageable subset is shown.'
Set-PSFConfig -Module PSFramework -Name 'Text.Encoding.DefaultWrite' -Value 'utf-8' -Initialize -Validation 'string' -Description 'The default encoding to use when writing to file. Only applied by implementing commands.'
Set-PSFConfig -Module PSFramework -Name 'Text.Encoding.DefaultRead' -Value 'utf-8' -Initialize -Validation 'string' -Description 'The default encoding to use when reading from file. Only applied by implementing commands.'
Set-PSFConfig -Module PSFramework -Name 'Localization.Language' -Value ([System.Globalization.CultureInfo]::CurrentUICulture.Name) -Initialize -Handler { [PSFramework.Localization.LocalizationHost]::Language = $args[0] } -Validation 'languagecode' -Description 'The language the current PowerShell session is operating under'
Set-PSFConfig -Module PSFramework -Name 'Localization.LoggingLanguage' -Value 'en-US' -Initialize -Handler { [PSFramework.Localization.LocalizationHost]::LoggingLanguage = $args[0] } -Validation 'languagecode' -Description 'The language the current PowerShell session is operating under' |
combined_dataset/train/non-malicious/ISE-Lines_1.ps1 | ISE-Lines_1.ps1 | #requires -version 2.0
## ISE-Lines module v 1.1
## DEVELOPED FOR CTP3
## See comments for each function for changes ...
##############################################################################################################
## Provides Line cmdlets for working with ISE
## Duplicate-Line - Duplicates current line
## Conflate-Line - Conflates current and next line
## MoveUp-Line - Moves current line up
## MoveDown-Line - Moves current line down
## Delete-TrailingBlanks - Deletes trailing blanks in the whole script
##############################################################################################################
## Duplicate-Line
##############################################################################################################
## Duplicates current line
##############################################################################################################
function Duplicate-Line
{
$editor = $psISE.CurrentOpenedFile.Editor
$caretLine = $editor.CaretLine
$caretColumn = $editor.CaretColumn
$text = $editor.Text.Split("`n")
$line = $text[$caretLine -1]
$newText = $text[0..($caretLine -1)]
$newText += $line
$newText += $text[$caretLine..($text.Count -1)]
$editor.Text = [String]::Join("`n", $newText)
$editor.SetCaretPosition($caretLine, $caretColumn)
}
## Conflate-Line
##############################################################################################################
## Conflates current and next line
## v 1.1 fixed bug on last but one line and remove line continuation character while joining
##############################################################################################################
function Conflate-Line
{
$editor = $psISE.CurrentOpenedFile.Editor
$caretLine = $editor.CaretLine
$caretColumn = $editor.CaretColumn
$text = $editor.Text.Split("`n")
if ( $caretLine -ne $text.Count )
{
$line = $text[$caretLine -1] + $text[$caretLine] -replace ("(``)?`r", "")
$newText = @()
if ( $caretLine -gt 1 )
{
$newText = $text[0..($caretLine -2)]
}
$newText += $line
if ( $caretLine -ne $text.Count - 1)
{
$newText += $text[($caretLine +1)..($text.Count -1)]
}
$editor.Text = [String]::Join("`n", $newText)
$editor.SetCaretPosition($caretLine, $caretColumn)
}
}
## MoveUp-Line
##############################################################################################################
## Moves current line up
##############################################################################################################
function MoveUp-Line
{
$editor = $psISE.CurrentOpenedFile.Editor
$caretLine = $editor.CaretLine
if ( $caretLine -ne 1 )
{
$caretColumn = $editor.CaretColumn
$text = $editor.Text.Split("`n")
$line = $text[$caretLine -1]
$lineBefore = $text[$caretLine -2]
$newText = @()
if ( $caretLine -gt 2 )
{
$newText = $text[0..($caretLine -3)]
}
$newText += $line
$newText += $lineBefore
if ( $caretLine -ne $text.Count )
{
$newText += $text[$caretLine..($text.Count -1)]
}
$editor.Text = [String]::Join("`n", $newText)
$editor.SetCaretPosition($caretLine - 1, $caretColumn)
}
}
## MoveDown-Line
##############################################################################################################
## Moves current line down
##############################################################################################################
function MoveDown-Line
{
$editor = $psISE.CurrentOpenedFile.Editor
$caretLine = $editor.CaretLine
$caretColumn = $editor.CaretColumn
$text = $editor.Text.Split("`n")
if ( $caretLine -ne $text.Count )
{
$line = $text[$caretLine -1]
$lineAfter = $text[$caretLine]
$newText = @()
if ( $caretLine -ne 1 )
{
$newText = $text[0..($caretLine -2)]
}
$newText += $lineAfter
$newText += $line
if ( $caretLine -lt $text.Count -1 )
{
$newText += $text[($caretLine +1)..($text.Count -1)]
}
$editor.Text = [String]::Join("`n", $newText)
$editor.SetCaretPosition($caretLine +1, $caretColumn)
}
}
## Delete-TrailingBlanks
##############################################################################################################
## Deletes trailing blanks in the whole script
##############################################################################################################
function Delete-TrailingBlanks
{
$editor = $psISE.CurrentOpenedFile.Editor
$caretLine = $editor.CaretLine
$newText = @()
foreach ( $line in $editor.Text.Split("`n") )
{
$newText += $line -replace ("\\s+$", "")
}
$editor.Text = [String]::Join("`n", $newText)
$editor.SetCaretPosition($caretLine, 1)
}
##############################################################################################################
## Inserts a submenu Lines to ISE's Custum Menu
## Inserts command Duplicate Line to submenu Lines
## Inserts command Conflate Line Selected to submenu Lines
## Inserts command Move Up Line to submenu Lines
## Inserts command Move Down Line to submenu Lines
## Inserts command Delete Trailing Blanks to submenu Lines
##############################################################################################################
if (-not( $psISE.CustomMenu.Submenus | where { $_.DisplayName -eq "Line" } ) )
{
$lineMenu = $psISE.CustomMenu.Submenus.Add("_Lines", $null, $null)
$null = $lineMenu.Submenus.Add("Duplicate Line", {Duplicate-Line}, "Ctrl+Alt+D")
$null = $lineMenu.Submenus.Add("Conflate Line", {Conflate-Line}, "Ctrl+Alt+J")
$null = $lineMenu.Submenus.Add("Move Up Line", {MoveUp-Line}, "Ctrl+Shift+Up")
$null = $lineMenu.Submenus.Add("Move Down Line", {MoveDown-Line}, "Ctrl+Shift+Down")
$null = $lineMenu.Submenus.Add("Delete Trailing Blanks", {Delete-TrailingBlanks}, "Ctrl+Shift+Del")
}
|
combined_dataset/train/non-malicious/sample_67_75.ps1 | sample_67_75.ps1 | #
# Module manifest for module 'OCI.PSModules.Marketplace'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Marketplace.dll'
# Version number of this module.
ModuleVersion = '87.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'b7f90e90-3cc1-4fca-9773-f27b90f7945b'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Marketplace Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '87.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Marketplace.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Export-OCIMarketplaceListing',
'Get-OCIMarketplaceAcceptedAgreement',
'Get-OCIMarketplaceAcceptedAgreementsList',
'Get-OCIMarketplaceAgreement', 'Get-OCIMarketplaceAgreementsList',
'Get-OCIMarketplaceCategoriesList',
'Get-OCIMarketplaceLaunchEligibility', 'Get-OCIMarketplaceListing',
'Get-OCIMarketplaceListingsList', 'Get-OCIMarketplacePackage',
'Get-OCIMarketplacePackagesList', 'Get-OCIMarketplacePublication',
'Get-OCIMarketplacePublicationPackage',
'Get-OCIMarketplacePublicationPackagesList',
'Get-OCIMarketplacePublicationsList',
'Get-OCIMarketplacePublishersList', 'Get-OCIMarketplaceReportsList',
'Get-OCIMarketplaceReportTypesList', 'Get-OCIMarketplaceTaxesList',
'Get-OCIMarketplaceThirdPartyPaidListingEligibility',
'Get-OCIMarketplaceWorkRequest',
'Get-OCIMarketplaceWorkRequestErrorsList',
'Get-OCIMarketplaceWorkRequestLogsList',
'Get-OCIMarketplaceWorkRequestsList',
'Invoke-OCIMarketplaceSearchListings',
'Move-OCIMarketplacePublicationCompartment',
'New-OCIMarketplaceAcceptedAgreement',
'New-OCIMarketplacePublication',
'Remove-OCIMarketplaceAcceptedAgreement',
'Remove-OCIMarketplacePublication',
'Update-OCIMarketplaceAcceptedAgreement',
'Update-OCIMarketplacePublication'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Marketplace'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/3264.ps1 | 3264.ps1 |
enum AccessRight {
Allow
Deny
}
enum ConnectionStatus {
Connected
Disconnected
}
enum TriggerType {
Command
Event
Regex
}
enum Severity {
Success
Warning
Error
None
}
enum LogLevel {
Info = 1
Verbose = 2
Debug = 4
}
enum LogSeverity {
Normal
Warning
Error
}
enum ReactionType {
Success
Failure
Processing
Custom
Warning
ApprovalNeeded
Cancelled
Denied
}
enum TimeInterval {
Days
Hours
Minutes
Seconds
}
enum ApprovalState {
AutoApproved
Pending
Approved
Denied
}
enum MessageType {
CardClicked
ChannelRenamed
Message
PinAdded
PinRemoved
PresenceChange
ReactionAdded
ReactionRemoved
StarAdded
StarRemoved
}
enum MessageSubtype {
None
ChannelJoined
ChannelLeft
ChannelRenamed
ChannelPurposeChanged
ChannelTopicChanged
}
enum MiddlewareType {
PreReceive
PostReceive
PreExecute
PostExecute
PreResponse
PostResponse
}
|
combined_dataset/train/non-malicious/Custom Accelerators.ps1 | Custom Accelerators.ps1 | #requires -version 2.0
## Custom Accelerators for PowerShell 2
####################################################################################################
## A script module for PowerShell 2 which allows the user to create their own custom type accelerators.
## Thanks to "Oisin Grehan for the discovery":http://www.nivot.org/2008/12/25/ListOfTypeAcceleratorsForPowerShellCTP3.aspx.
####################################################################################################
## Revision History
## v1.0 - Modularization of Oisin's idea, by Joel 'Jaykul' Bennett
## v2.0 - Update for RTM (nothing significant)
####################################################################################################
# get a reference to the Type
$xlr8r = [type]::gettype("System.Management.Automation.TypeAccelerators")
function Add-Accelerator {
<#
.Synopsis
Add a type accelerator to the current session
.Description
The Add-Accelerator function allows you to add a simple type accelerator (like [regex]) for a longer type (like [System.Text.RegularExpressions.Regex]).
.Example
Add-Accelerator list System.Collections.Generic.List``1
$list = New-Object list[string]
Creates an accelerator for the generic List[T] collection type, and then creates a list of strings.
.Example
Add-Accelerator "List T", GList System.Collections.Generic.List``1
$list = New-Object "list t[string]"
Creates two accelerators for the Generic List[T] collection type.
.Parameter Accelerator
The short form accelerator should be just the name you want to use (without square brackets).
.Parameter Type
The type you want the accelerator to accelerate (without square brackets)
.Notes
When specifying multiple values for a parameter, use commas to separate the values.
For example, "-Accelerator string, regex".
PowerShell requires arguments that are "types" to NOT have the square bracket type notation, because of the way the parsing engine works. You can either just type in the type as System.Int64, or you can put parentheses around it to help the parser out: ([System.Int64])
Also see the help for Get-Accelerator and Remove-Accelerator
.Link
http://huddledmasses.org/powershell-2-ctp3-custom-accelerators-finally/
#>
[CmdletBinding()]
PARAM(
[Parameter(Position=0)]
[Alias("Key")]
[string[]]$Accelerator
,
[Parameter(Position=1)]
[Alias("Value")]
[type]$Type
)
PROCESS {
# add a user-defined accelerator
foreach($a in $Accelerator) {
$xlr8r::Add( $a, $Type)
trap [System.Management.Automation.MethodInvocationException] {
if($xlr8r::get.keys -contains $a) {
Write-Error "Cannot add accelerator [$a] for [$($Type.FullName)]`n [$a] is already defined as [$($xlr8r::get[$a].FullName)]"
Continue;
}
throw
}
}
}
}
function Get-Accelerator {
<#
.Synopsis
Get one or more type accelerator definitions
.Description
The Get-Accelerator function allows you to look up the type accelerators (like [regex]) defined on your system by their short form or by type
.Example
Get-Accelerator System.String
Returns the KeyValue pair for the [System.String] accelerator(s)
.Example
Get-Accelerator ps*,wmi*
Returns the KeyValue pairs for the matching accelerator definition(s)
.Parameter Accelerator
One or more short form accelerators to search for (Accept wildcard characters).
.Parameter Type
One or more types to search for.
.Notes
When specifying multiple values for a parameter, use commas to separate the values.
For example, "-Accelerator string, regex".
Also see the help for Add-Accelerator and Remove-Accelerator
.Link
http://huddledmasses.org/powershell-2-ctp3-custom-accelerators-finally/
#>
[CmdletBinding(DefaultParameterSetName="ByType")]
PARAM(
[Parameter(Position=0, ParameterSetName="ByAccelerator", ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)]
[Alias("Key")]
[string[]]$Accelerator
,
[Parameter(Position=0, ParameterSetName="ByType", ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)]
[Alias("Value")]
[type[]]$Type
)
PROCESS {
# add a user-defined accelerator
switch($PSCmdlet.ParameterSetName) {
"ByAccelerator" {
$xlr8r::get.GetEnumerator() | % {
foreach($a in $Accelerator) {
if($_.Key -like $a) { $_ }
}
}
break
}
"ByType" {
if($Type -and $Type.Count) {
$xlr8r::get.GetEnumerator() | ? { $Type -contains $_.Value }
}
else {
$xlr8r::get.GetEnumerator() | %{ $_ }
}
break
}
}
}
}
function Remove-Accelerator {
<#
.Synopsis
Remove a type accelerator from the current session
.Description
The Remove-Accelerator function allows you to remove a simple type accelerator (like [regex]) from the current session. You can pass one or more accelerators, and even wildcards, but you should be aware that you can remove even the built-in accelerators.
.Example
Remove-Accelerator int
Add-Accelerator int Int64
Removes the "int" accelerator for Int32 and adds a new one for Int64. I can't recommend doing this, but it's pretty cool that it works:
So now, "$(([int]3.4).GetType().FullName)" would return "System.Int64"
.Example
Get-Accelerator System.Single | Remove-Accelerator
Removes both of the default accelerators for System.Single: [float] and [single]
.Example
Get-Accelerator System.Single | Remove-Accelerator -WhatIf
Demonstrates that Remove-Accelerator supports -Confirm and -Whatif. Will Print:
What if: Removes the alias [float] for type [System.Single]
What if: Removes the alias [single] for type [System.Single]
.Parameter Accelerator
The short form accelerator that you want to remove (Accept wildcard characters).
.Notes
When specifying multiple values for a parameter, use commas to separate the values.
For example, "-Accel string, regex".
Also see the help for Add-Accelerator and Get-Accelerator
.Link
http://huddledmasses.org/powershell-2-ctp3-custom-accelerators-finally/
#>
[CmdletBinding(SupportsShouldProcess=$true)]
PARAM(
[Parameter(Position=0, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)]
[Alias("Key")]
[string[]]$Accelerator
)
PROCESS {
foreach($a in $Accelerator) {
foreach($key in $xlr8r::Get.Keys -like $a) {
if($PSCmdlet.ShouldProcess( "Removes the alias [$($Key)] for type [$($xlr8r::Get[$key].FullName)]",
"Remove the alias [$($Key)] for type [$($xlr8r::Get[$key].FullName)]?",
"Removing Type Accelerator" )) {
# remove a user-defined accelerator
$xlr8r::remove($key)
}
}
}
}
}
|
combined_dataset/train/non-malicious/2215.ps1 | 2215.ps1 |
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[parameter(Mandatory=$true,HelpMessage="Site server where the SMS Provider is installed")]
[ValidateScript({Test-Connection -ComputerName $_ -Count 1 -Quiet})]
[string]$SiteServer,
[parameter(Mandatory=$true,HelpMessage="Name of the Software Update Group")]
[string]$SUGName,
[parameter(Mandatory=$false,HelpMessage="Only remove expired Software Updates. This includes updates that are both expired and superseded. It does, however, exclude updates that are superseded but not expired")]
[switch]$ExpiredOnly,
[parameter(Mandatory=$false,HelpMessage="Remove the content for those Software Updates that will be removed from a Software Upgrade Group")]
[switch]$RemoveContent,
[parameter(Mandatory=$false,HelpMessage="Show a progressbar displaying the current operation")]
[switch]$ShowProgress
)
Begin {
try {
Write-Verbose "Determining SiteCode for Site Server: '$($SiteServer)'"
$SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer -ErrorAction Stop
foreach ($SiteCodeObject in $SiteCodeObjects) {
if ($SiteCodeObject.ProviderForLocalSite -eq $true) {
$SiteCode = $SiteCodeObject.SiteCode
Write-Debug "SiteCode: $($SiteCode)"
}
}
}
catch [Exception] {
Throw "Unable to determine SiteCode"
}
}
Process {
try {
if (($SUGName.StartsWith("*")) -and ($SUGName.EndsWith("*"))) {
Write-Verbose -Message "Query: SELECT * FROM SMS_AuthorizationList WHERE LocalizedDisplayName like '%$($SUGName.Replace('*',''))%'"
$WmiFilter = "LocalizedDisplayName like '%$($SUGName)%'"
}
elseif ($SUGName.StartsWith("*")) {
Write-Verbose -Message "Query: SELECT * FROM SMS_AuthorizationList WHERE LocalizedDisplayName like '%$($SUGName.Replace('*',''))'"
$WmiFilter = "LocalizedDisplayName like '%$($SUGName)'"
}
elseif ($SUGName.EndsWith("*")) {
Write-Verbose -Message "Query: SELECT * FROM SMS_AuthorizationList WHERE LocalizedDisplayName like '$($SUGName.Replace('*',''))%'"
$WmiFilter = "LocalizedDisplayName like '$($SUGName)%'"
}
else {
Write-Verbose -Message "Query: SELECT * FROM SMS_AuthorizationList WHERE LocalizedDisplayName like '$($SUGName)'"
$WmiFilter = "LocalizedDisplayName like '$($SUGName)'"
}
if ($SUGName -match "\*") {
$SUGName = $SUGName.Replace("*","")
$WmiFilter = $WmiFilter.Replace("*","")
}
$SUGResults = (Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_AuthorizationList -ComputerName $SiteServer -Filter "$($WmiFilter)" -ErrorAction SilentlyContinue | Measure-Object).Count
if ($SUGResults -eq 1) {
$AuthorizationList = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_AuthorizationList -ComputerName $SiteServer -Filter "$($WmiFilter)" -ErrorAction Stop
$AuthorizationList = [wmi]"$($AuthorizationList.__PATH)"
$UpdatesCount = $AuthorizationList.Updates.Count
$UpdatesList = New-Object -TypeName System.Collections.ArrayList
$RemovedUpdatesList = New-Object -TypeName System.Collections.ArrayList
if ($PSBoundParameters["ShowProgress"]) {
$ProgressCount = 0
}
foreach ($Update in ($AuthorizationList.Updates)) {
$CIID = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_SoftwareUpdate -ComputerName $SiteServer -Filter "CI_ID = '$($Update)'" -ErrorAction Stop
if ($PSBoundParameters["ShowProgress"]) {
$ProgressCount++
Write-Progress -Activity "Processing Software Updates in '$($SUGName)'" -Id 1 -Status "$($ProgressCount) / $($UpdatesCount)" -CurrentOperation "$($CIID.LocalizedDisplayName)" -PercentComplete (($ProgressCount / $UpdatesCount) * 100)
}
if ($CIID.IsExpired -eq $true) {
Write-Verbose -Message "Update '$($CIID.LocalizedDisplayName)' was expired and will be removed from '$($AuthorizationList.LocalizedDisplayName)'"
if ($CIID.CI_ID -notin $RemovedUpdatesList) {
$RemovedUpdatesList.Add($CIID.CI_ID) | Out-Null
}
}
elseif (($CIID.IsSuperseded -eq $true) -and (-not($PSBoundParameters["ExpiredOnly"]))) {
Write-Verbose -Message "Update '$($CIID.LocalizedDisplayName)' was superseded and will be removed from '$($AuthorizationList.LocalizedDisplayName)'"
if ($CIID.CI_ID -notin $RemovedUpdatesList) {
$RemovedUpdatesList.Add($CIID.CI_ID) | Out-Null
}
}
else {
if ($CIID.CI_ID -notin $UpdatesList) {
$UpdatesList.Add($CIID.CI_ID) | Out-Null
}
}
}
if ($UpdatesCount -gt $UpdatesList.Count) {
try {
if ($PSCmdlet.ShouldProcess("$($AuthorizationList.LocalizedDisplayName)","Clean '$($UpdatesCount - ($UpdatesList.Count))' updates")) {
if ($UpdatesList.Count -ge 1) {
$AuthorizationList.Updates = $UpdatesList
$AuthorizationList.Put() | Out-Null
Write-Verbose -Message "Successfully cleaned up $($UpdatesCount - ($UpdatesList.Count)) updates from '$($AuthorizationList.LocalizedDisplayName)'"
}
else {
$AuthorizationList.Updates = @()
$AuthorizationList.Put() | Out-Null
Write-Verbose -Message "Successfully cleaned up all updates from '$($AuthorizationList.LocalizedDisplayName)'"
}
}
if ($PSBoundParameters["RemoveContent"]) {
try {
$DeploymentPackageList = New-Object -TypeName System.Collections.ArrayList
foreach ($CI_ID in $RemovedUpdatesList) {
Write-Verbose -Message "Collecting content data for CI_ID: $($CI_ID)"
$ContentData = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Query "SELECT SMS_PackageToContent.ContentID,SMS_PackageToContent.PackageID from SMS_PackageToContent JOIN SMS_CIToContent on SMS_CIToContent.ContentID = SMS_PackageToContent.ContentID where SMS_CIToContent.CI_ID in ($($CI_ID))" -ComputerName $SiteServer -ErrorAction Stop
Write-Verbose -Message "Found '$(($ContentData | Measure-Object).Count)' objects"
foreach ($Content in $ContentData) {
$ContentID = $Content | Select-Object -ExpandProperty ContentID
$PackageID = $Content | Select-Object -ExpandProperty PackageID
$DeploymentPackage = [wmi]"\\$($SiteServer)\root\SMS\site_$($SiteCode):SMS_SoftwareUpdatesPackage.PackageID='$($PackageID)'"
if ($DeploymentPackage.PackageID -notin $DeploymentPackageList) {
$DeploymentPackageList.Add($DeploymentPackage.PackageID) | Out-Null
}
if ($PSCmdlet.ShouldProcess("$($PackageID)","Remove ContentID '$($ContentID)'")) {
Write-Verbose -Message "Attempting to remove ContentID '$($ContentID)' from PackageID '$($PackageID)'"
$ReturnValue = $DeploymentPackage.RemoveContent($ContentID, $false)
if ($ReturnValue.ReturnValue -eq 0) {
Write-Verbose -Message "Successfully removed ContentID '$($ContentID)' from PackageID '$($PackageID)'"
}
}
}
}
foreach ($DPackageID in $DeploymentPackageList) {
if ($PSCmdlet.ShouldProcess("$($DPackageID)","Refresh content source")) {
$DPackage = [wmi]"\\$($SiteServer)\root\SMS\site_$($SiteCode):SMS_SoftwareUpdatesPackage.PackageID='$($DPackageID)'"
Write-Verbose -Message "Attempting to refresh content source for Deployment Package '$($DPackage.Name)'"
$ReturnValue = $DPackage.RefreshPkgSource()
if ($ReturnValue.ReturnValue -eq 0) {
Write-Verbose -Message "Successfully refreshed content source for Deployment Package '$($DPackage.Name)'"
}
}
}
}
catch [Exception] {
Write-Warning -Message "An error occured when attempting to remove ContentID '$($ContentID)' from '$($PackageID)'"
}
}
}
catch [Exception] {
Write-Warning -Message "Unable to save changes to '$($AuthorizationList.LocalizedDisplayName)'" ; break
}
}
else {
Write-Verbose -Message "No changes detected, will not update '$($AuthorizationList.LocalizedDisplayName)'"
}
}
elseif ($SUGResults -ge 1) {
Write-Warning -Message "Specified Software Update Group name returned '$($SUGResults)' results, please be more specific"
}
else {
Write-Warning -Message "Unable to locate a Software Update Group named '$($SUGName)'"
}
}
catch [Exception] {
Throw $_.Exception.Message
}
}
End {
if ($PSBoundParameters["ShowProgress"]) {
Write-Progress -Activity "Enumerating Software Updates" -Completed -ErrorAction SilentlyContinue
}
} |
combined_dataset/train/non-malicious/84.ps1 | 84.ps1 |
function Get-AuthToken {
[cmdletbinding()]
param
(
[Parameter(Mandatory=$true)]
$User
)
$userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User
$tenant = $userUpn.Host
Write-Host "Checking for AzureAD module..."
$AadModule = Get-Module -Name "AzureAD" -ListAvailable
if ($AadModule -eq $null) {
Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview"
$AadModule = Get-Module -Name "AzureADPreview" -ListAvailable
}
if ($AadModule -eq $null) {
write-host
write-host "AzureAD Powershell module not installed..." -f Red
write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow
write-host "Script can't continue..." -f Red
write-host
exit
}
if($AadModule.count -gt 1){
$Latest_Version = ($AadModule | select version | Sort-Object)[-1]
$aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version }
if($AadModule.count -gt 1){
$aadModule = $AadModule | select -Unique
}
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
else {
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
[System.Reflection.Assembly]::LoadFrom($adal) | Out-Null
[System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null
$clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547"
$redirectUri = "urn:ietf:wg:oauth:2.0:oob"
$resourceAppIdURI = "https://graph.microsoft.com"
$authority = "https://login.microsoftonline.com/$Tenant"
try {
$authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority
$platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto"
$userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId")
$authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result
if($authResult.AccessToken){
$authHeader = @{
'Content-Type'='application/json'
'Authorization'="Bearer " + $authResult.AccessToken
'ExpiresOn'=$authResult.ExpiresOn
}
return $authHeader
}
else {
Write-Host
Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red
Write-Host
break
}
}
catch {
write-host $_.Exception.Message -f Red
write-host $_.Exception.ItemName -f Red
write-host
break
}
}
Function Get-DeviceCompliancePolicy(){
[cmdletbinding()]
param
(
$Name,
[switch]$Android,
[switch]$iOS,
[switch]$Win10,
$id
)
$graphApiVersion = "Beta"
$Resource = "deviceManagement/deviceCompliancePolicies"
try {
$Count_Params = 0
if($Android.IsPresent){ $Count_Params++ }
if($iOS.IsPresent){ $Count_Params++ }
if($Win10.IsPresent){ $Count_Params++ }
if($Name.IsPresent){ $Count_Params++ }
if($Count_Params -gt 1){
write-host "Multiple parameters set, specify a single parameter -Android -iOS or -Win10 against the function" -f Red
}
elseif($Android){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'@odata.type').contains("android") }
}
elseif($iOS){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'@odata.type').contains("ios") }
}
elseif($Win10){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'@odata.type').contains("windows10CompliancePolicy") }
}
elseif($Name){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'displayName').contains("$Name") }
}
elseif($id){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)/$id`?`$expand=assignments,scheduledActionsForRule(`$expand=scheduledActionConfigurations)"
Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get
}
else {
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
Function Get-DeviceConfigurationPolicy(){
[cmdletbinding()]
param
(
$name,
$id
)
$graphApiVersion = "Beta"
$DCP_resource = "deviceManagement/deviceConfigurations"
try {
if($Name){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($DCP_resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'displayName').contains("$Name") }
}
elseif($id){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($DCP_resource)/$id"
Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get
}
else {
$uri = "https://graph.microsoft.com/$graphApiVersion/$($DCP_resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
Function Update-DeviceCompliancePolicy(){
[cmdletbinding()]
param
(
[Parameter(Mandatory=$true)]
$id,
[Parameter(Mandatory=$true)]
$Type,
[Parameter(Mandatory=$true)]
$ScopeTags
)
$graphApiVersion = "beta"
$Resource = "deviceManagement/deviceCompliancePolicies/$id"
try {
if($ScopeTags -eq "" -or $ScopeTags -eq $null){
$JSON = @"
{
"@odata.type": "$Type",
"roleScopeTagIds": []
}
"@
}
else {
$object = New-Object –TypeName PSObject
$object | Add-Member -MemberType NoteProperty -Name '@odata.type' -Value "$Type"
$object | Add-Member -MemberType NoteProperty -Name 'roleScopeTagIds' -Value @($ScopeTags)
$JSON = $object | ConvertTo-Json
}
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
Invoke-RestMethod -Uri $uri -Headers $authToken -Method Patch -Body $JSON -ContentType "application/json"
Start-Sleep -Milliseconds 100
}
catch {
Write-Host
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
Function Update-DeviceConfigurationPolicy(){
[cmdletbinding()]
param
(
[Parameter(Mandatory=$true)]
$id,
[Parameter(Mandatory=$true)]
$Type,
[Parameter(Mandatory=$true)]
$ScopeTags
)
$graphApiVersion = "beta"
$Resource = "deviceManagement/deviceConfigurations/$id"
try {
if($ScopeTags -eq "" -or $ScopeTags -eq $null){
$JSON = @"
{
"@odata.type": "$Type",
"roleScopeTagIds": []
}
"@
}
else {
$object = New-Object –TypeName PSObject
$object | Add-Member -MemberType NoteProperty -Name '@odata.type' -Value "$Type"
$object | Add-Member -MemberType NoteProperty -Name 'roleScopeTagIds' -Value @($ScopeTags)
$JSON = $object | ConvertTo-Json
}
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
Invoke-RestMethod -Uri $uri -Headers $authToken -Method Patch -Body $JSON -ContentType "application/json"
Start-Sleep -Milliseconds 100
}
catch {
Write-Host
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
Function Get-RBACScopeTag(){
[cmdletbinding()]
param
(
[Parameter(Mandatory=$false)]
$DisplayName
)
$graphApiVersion = "beta"
$Resource = "deviceManagement/roleScopeTags"
try {
if($DisplayName){
$uri = "https://graph.microsoft.com/$graphApiVersion/$Resource`?`$filter=displayName eq '$DisplayName'"
$Result = (Invoke-RestMethod -Uri $uri -Method Get -Headers $authToken).Value
}
else {
$uri = "https://graph.microsoft.com/$graphApiVersion/$Resource"
$Result = (Invoke-RestMethod -Uri $uri -Method Get -Headers $authToken).Value
}
return $Result
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
throw
}
}
write-host
if($global:authToken){
$DateTime = (Get-Date).ToUniversalTime()
$TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes
if($TokenExpires -le 0){
write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow
write-host
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
}
else {
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
Write-Host "Are you sure you want to add Scope Tags to all Configuration and Compliance Policies? Y or N?"
$Confirm = read-host
if($Confirm -eq "y" -or $Confirm -eq "Y"){
Write-Host "Checking if any Scope Tags have been created..."
Write-Host
$ScopeTags = Get-RBACScopeTag
if($ScopeTags){
Write-Host "Scope Tags found..." -ForegroundColor Green
Write-Host
foreach($ScopeTag in $ScopeTags){
$ScopeTag_DN = $ScopeTag.displayName
$ScopeTagId = $ScopeTag.id
Write-Host "Checking Scope Tag '$ScopeTag_DN'..." -ForegroundColor Cyan
Write-Host "Testing if '$ScopeTag_DN' exists in Device Compliance Policy Display Name..."
$CPs = Get-DeviceCompliancePolicy | Where-Object { ($_.displayName).contains("$ScopeTag_DN") } | Sort-Object displayName
if($CPs){
foreach($Policy in $CPs){
$CP = Get-DeviceCompliancePolicy -id $Policy.id
$CP_DN = $CP.displayName
if($CP.roleScopeTagIds){
if(!($CP.roleScopeTagIds).contains("$ScopeTagId")){
$ST = @($CP.roleScopeTagIds) + @("$ScopeTagId")
$Result = Update-DeviceCompliancePolicy -id $Policy.id -Type $Policy.'@odata.type' -ScopeTags $ST
if($Result -eq ""){
Write-Host "Compliance Policy '$CP_DN' patched with '$ScopeTag_DN' ScopeTag..." -ForegroundColor Green
}
}
else {
Write-Host "Scope Tag '$ScopeTag_DN' already assigned to '$CP_DN'..." -ForegroundColor Red
}
}
else {
$ST = @("$ScopeTagId")
$Result = Update-DeviceCompliancePolicy -id $Policy.id -Type $Policy.'@odata.type' -ScopeTags $ST
if($Result -eq ""){
Write-Host "Compliance Policy '$CP_DN' patched with '$ScopeTag_DN' ScopeTag..." -ForegroundColor Green
}
}
}
}
Write-Host
Write-Host "Testing if '$ScopeTag_DN' exists in Device Configuration Policy Display Name..."
$DCPs = Get-DeviceConfigurationPolicy | Where-Object { ($_.displayName).contains("$ScopeTag_DN") } | Sort-Object displayName
if($DCPs){
foreach($Policy in $DCPs){
$DCP = Get-DeviceConfigurationPolicy -id $Policy.id
$DCP_DN = $DCP.displayName
if($DCP.roleScopeTagIds){
if(!($DCP.roleScopeTagIds).contains("$ScopeTagId")){
$ST = @($DCP.roleScopeTagIds) + @("$ScopeTagId")
$Result = Update-DeviceConfigurationPolicy -id $Policy.id -Type $Policy.'@odata.type' -ScopeTags $ST
if($Result -eq ""){
Write-Host "Configuration Policy '$DCP_DN' patched with '$ScopeTag_DN' ScopeTag..." -ForegroundColor Green
}
}
else {
Write-Host "Scope Tag '$ScopeTag_DN' already assigned to '$DCP_DN'..." -ForegroundColor Red
}
}
else {
$ST = @("$ScopeTagId")
$Result = Update-DeviceConfigurationPolicy -id $Policy.id -Type $Policy.'@odata.type' -ScopeTags $ST
if($Result -eq ""){
Write-Host "Configuration Policy '$DCP_DN' patched with '$ScopeTag_DN' ScopeTag..." -ForegroundColor Green
}
}
}
}
Write-Host
}
}
else {
Write-Host "No Scope Tags configured..." -ForegroundColor Red
}
}
else {
Write-Host "Addition of Scope Tags to all Configuration and Compliance Policies was cancelled..." -ForegroundColor Yellow
}
Write-Host |
combined_dataset/train/non-malicious/sample_4_95.ps1 | sample_4_95.ps1 | ConvertFrom-StringData @'
id_regsetupperfrecoverydebuginfo=Recovery/Debug related keys
id_regsetupperfistartupinfo=Startup information
id_regsetupperfilocalprintkey=Local Print Key
id_regsetupperfipolicies=Policies System
id_regsetupperfregtimezoneinfo=Time Zone keys
id_regsetupperfregts=Terminal Services
ID_RegSetupPerfRegCrashDump=Crash Dump related reg key
'@
# SIG # Begin signature block
# MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCY25jdD5h+momO
# 93daEvKYe2YiWQXnGBhiagpdaKpydKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIENP
# vzQIwaMnaAms7RsrgNhmcLIrFRVhvNEGljN6l9gPMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAR6lZxeMlt8n7DsHyMzs4ktDLGLwyG3bSuHP/
# bV/vv4bOLladPCYiq8vmPsc/LYBz50m9XEdrH9db9PiMLdZW2MRlxUo7vsv4ONql
# Io5cPzycYom8Sztswm2VWNU0/6v0U4f5gQEVEmijNou4dRGcPcdlID2ZSTk6pDEx
# xfHn9eCmcVllnyTT8FCG500dObhMWMwUzF7dF3f6HbClW7QCcYEHGON65m+KDN2S
# 5t5iCUwTT8d4aEEQPxBHYW/dPxiUEezPEbpByEY9NE//6vmfrEGW9kS+mmPTXfO6
# 54NzGpCjVltrecU5UWvOZx4aTv0e/+FzdDVmC7xoIxDcpPOEtKGCF60wghepBgor
# BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDMJJR6TH5RPtTEzJCgVwDHT6lEMoy7oUlA
# qIuHZA0NgwIGZut4BYxYGBMyMDI0MTAyODExNDA0MC4xMzFaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9ZkJ
# lLzxxlCMAAEAAAH1MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwMVoXDTI1MTAyMjE4MzEwMVowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjY1MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# zO90cFQTWd/WP84IT7JMIW1fQL61sdfgmhlfT0nvYEb2kvkNF073ZwjveuSWot38
# 7LjE0TCiG93e6I0HzIFQBnbxGP/WPBUirFq7WE5RAsuhNfYUL+PIb9jJq3CwWxIC
# fw5t/pTyIOHjKvo1lQOTWZypir/psZwEE7y2uWAPbZJTFrKen5R73x2Hbxy4eW1D
# cmXjym2wFWv10sBH40ajJfe+OkwcTdoYrY3KkpN/RQSjeycK0bhjo0CGYIYa+ZMA
# ao0SNR/R1J1Y6sLkiCJO3aQrbS1Sz7l+/qJgy8fyEZMND5Ms7C0sEaOvoBHiWSpT
# M4vc0xDLCmc6PGv03CtWu2KiyqrL8BAB1EYyOShI3IT79arDIDrL+de91FfjmSbB
# Y5j+HvS0l3dXkjP3Hon8b74lWwikF0rzErF0n3khVAusx7Sm1oGG+06hz9XAy3Wo
# u+T6Se6oa5LDiQgPTfWR/j9FNk8Ju06oSfTh6c03V0ulla0Iwy+HzUl+WmYxFLU0
# PiaXsmgudNwVqn51zr+Bi3XPJ85wWuy6GGT7nBDmXNzTNkzK98DBQjTOabQXUZ88
# 4Yb9DFNcigmeVTYkyUXZ6hscd8Nyq45A3D3bk+nXnsogK1Z7zZj6XbGft7xgOYvv
# eU6p0+frthbF7MXv+i5qcD9HfFmOq4VYHevVesYb6P0CAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBRV4Hxb9Uo0oHDwJZJe22ixe2B1ATAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAcwxmVPaA9xHffuom0TOSp2hspuf1G0cHW/KXHAuhnpW8/Svlq5j9aKI/
# 8/G6fGIQMr0zlpau8jy83I4zclGdJjl5S02SxDlUKawtWvgf7ida06PgjeQM1eX4
# Lut4bbPfT0FEp77G76hhysXxTJNHv5y+fwThUeiiclihZwqcZMpa46m+oV6igTU6
# I0EnneotMqFs0Q3zHgVVr4WXjnG2Bcnkip42edyg/9iXczqTBrEkvTz0UlltpFGa
# QnLzq+No8VEgq0UG7W1ELZGhmmxFmHABwTT6sPJFV68DfLoC0iB9Qbb9VZ8mvbTV
# 5JtISBklTuVAlEkzXi9LIjNmx+kndBfKP8dxG/xbRXptQDQDaCsS6ogLkwLgH6zS
# s+ul9WmzI0F8zImbhnZhUziIHheFo4H+ZoojPYcgTK6/3bkSbOabmQFf95B8B6e5
# WqXbS5s9OdMdUlW1gTI1r5u+WAwH2KG7dxneoTbf/jYl3TUtP7AHpyck2c0nun/Q
# 0Cycpa9QUH/Dy01k6tQomNXGjivg2/BGcgZJ0Hw8C6KVelEJ31xLoE21m9+NEgSK
# CRoFE1Lkma31SyIaynbdYEb8sOlZynMdm8yPldDwuF54vJiEArjrcDNXe6BobZUi
# TWSKvv1DJadR1SUCO/Od21GgU+hZqu+dKgjKAYdeTIvi9R2rtLYwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo2NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAJsAKu48NbR5Y
# Rg3WSBQCyjzdkvaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJXmQwIhgPMjAyNDEwMjgwMDUwNDRaGA8yMDI0
# MTAyOTAwNTA0NFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sleZAIBADAHAgEA
# AgIUjDAHAgEAAgIUCjAKAgUA6sqv5AIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA
# A4IBAQCjXPh2fTsMuBQC04YmahPTF/w7d8iDvw/A+ry0UWRA9ksIf/WmY8UAK7V3
# UQpZXoPQDP+vfvum15Jdooo9/XlK2HcGWEXCT8FTfU2Fjw1K1M6VrZrX8XlmM6gS
# TwUk7hZ060ozBQBEDelhGRatBQ4s+l2RX1TMP56yQoM4DWc4qYSVU89ILVamoXe3
# FyMaE9PqRohkoHLhl8vmIdOLSQqg1yhRQl59tcVM66AXscswX4jNeFoltuC9T9KO
# RL3KvFgrx7XzEQvr2WlEwaAi4c4KUdNGhyXkTV9PUnWRmmVDcbMll8tm5RCJWZIB
# NChydfZETThcPXRdrz53AeXHysfYMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAH1mQmUvPHGUIwAAQAAAfUwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgZMaBlnHTvfQRzFM9+geumVdVb7OPg93AtZPGztAcYbIwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCDB1vLSFwh09ISu4kdEv4/tg9eR1Yk8w5x7j5GT
# hqaPNTCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 9ZkJlLzxxlCMAAEAAAH1MCIEIKr5EH41eNtzA7HjeQBOfZB/TsSU/rMhC8quH1u1
# KYILMA0GCSqGSIb3DQEBCwUABIICADspnMRFh79KaZQfjz1nZ5r8VCRl2zEyw0t8
# lN9XOJC3dDc5Ym1tc2/X3LDvSOk5FsIY28S2kVWxvsWl/Ms4bzrIVF6SYRdjenPK
# T8wlB95BkgfU3e2qaVH964o7BDhqqZ9AdEm4bVsltrVe7pJWrwSbCTZslIUJEbzK
# 2SRSBS1/5VvrTu13z88V6l1dSVxPofqsYU3aFkDYPmAmkGKiBWmHjPuibJyeEuTy
# p+qTLircOT6rdWXJwsId56aoqHkQe1aQi9oy5AodhEC5pwRDYU38B1mMqkO+mEhZ
# EaAaZFFy9+WgO+VmUguodDFUtwU+YcJw/JfILGBjCOnxUlFp/AAqVO3hBniaiH3V
# KN1uTKOnH0k6meh6cy6k7oH+OROR1zZsuXtPZ0jhKdJRszyqjMd4Y7LD6ZhmVVN8
# 5vmFTkQyPFX91BiiAjoTzU6zugksUp8fiMD0uHLWJdVQMIv/jyuNhfmnrXuDV5sj
# BbVPrnRxWOf1Kaugf43yPimvzeXpcbajPq8Foi/wlq7VWvyJUk5VbeFfaF1db84o
# GVfoc8KmgPMRQyi3WpHv2TV8O6GTMcg2kjuGBHCruzQCDyW/Tu3n4F44juD6bdNM
# mVS0I1S+49lervwh2Y0IohZdxkt4ZCLzmNBNxvp1T5h5jnVfR6kYR5/5mmsY02sf
# tpBjK9Yp
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_53_92.ps1 | sample_53_92.ps1 | <# File tss_Perf-Collect.ps1 [Folderpath]
#>
param(
[string]$Folderpath = (Split-Path $MyInvocation.MyCommand.Path -Parent)
)
#region ::::: Configruation parameters ----------------------------------------------#
$VerDate = "2021.04.30.0"
#endregion ::::: Configruation parameters --------------------------------------------#
#region [Initialisations] -----------------------------------------------------------#
$version = "Perf-Collect (20180307) v" + $VerDate
# by Gianni Bragante - gbrag@microsoft.com
# mod by WalterE 2021-04-30
Function Write-Log {
param( [string] $msg )
$msg = (get-date).ToString("yyyyMMdd HH:mm:ss.fff") + " " + $msg
Write-Host $msg
$msg | Out-File -FilePath $outfile -Append
}
Function ExecQuery {
param(
[string] $NameSpace,
[string] $Query
)
Write-Log ("Executing query " + $Query)
if ($PSVersionTable.psversion.ToString() -ge "3.0") {
$ret = Get-CimInstance -Namespace $NameSpace -Query $Query -ErrorAction Continue 2>>$errfile
} else {
$ret = Get-CimInstance -Namespace $NameSpace -Query $Query -ErrorAction Continue 2>>$errfile
}
Write-Log (($ret | Measure-Object).count.ToString() + " results")
return $ret
}
$tbPerfV1 = New-Object system.Data.DataTable “Perf”
$col = New-Object system.Data.DataColumn Name,([string])
$tbPerfV1.Columns.Add($col)
$col = New-Object system.Data.DataColumn Open,([string])
$tbPerfV1.Columns.Add($col)
$col = New-Object system.Data.DataColumn Close,([string])
$tbPerfV1.Columns.Add($col)
$col = New-Object system.Data.DataColumn Collect,([string])
$tbPerfV1.Columns.Add($col)
$col = New-Object system.Data.DataColumn Library,([string])
$tbPerfV1.Columns.Add($col)
$col = New-Object system.Data.DataColumn InstallType,([string])
$tbPerfV1.Columns.Add($col)
$col = New-Object system.Data.DataColumn PerfIniFile,([string])
$tbPerfV1.Columns.Add($col)
$col = New-Object system.Data.DataColumn IniExists,([string])
$tbPerfV1.Columns.Add($col)
$col = New-Object system.Data.DataColumn Disabled,([string])
$tbPerfV1.Columns.Add($col)
$col = New-Object system.Data.DataColumn FirstCounter,([string])
$tbPerfV1.Columns.Add($col)
$col = New-Object system.Data.DataColumn FirstHelp,([string])
$tbPerfV1.Columns.Add($col)
$col = New-Object system.Data.DataColumn LastCounter,([string])
$tbPerfV1.Columns.Add($col)
$col = New-Object system.Data.DataColumn LastHelp,([string])
$tbPerfV1.Columns.Add($col)
$col = New-Object system.Data.DataColumn ObjectList,([string])
$tbPerfV1.Columns.Add($col)
$myWindowsID = [System.Security.Principal.WindowsIdentity]::GetCurrent()
$myWindowsPrincipal = new-object System.Security.Principal.WindowsPrincipal($myWindowsID)
$adminRole = [System.Security.Principal.WindowsBuiltInRole]::Administrator
if (-not $myWindowsPrincipal.IsInRole($adminRole)) {
Write-Output "This script needs to be run as Administrator"
#exit
}
if ($Folderpath) { $Root = $Folderpath }
else { $Root = Split-Path (Get-Variable MyInvocation).Value.MyCommand.Path }
$resName = "Perf-" + $env:computername +"-" + $(get-date -f yyyyMMdd_HHmmss)
$resDir = $Root + "\" + $resName
$outfile = $resDir + "\script-output.txt"
$errfile = $resDir + "\script-errors.txt"
$RdrOut = " >>""" + $outfile + """"
$RdrErr = " 2>>""" + $errfile + """"
$SysInfoFile = ($resDir + "\SystemInfo.txt")
New-Item -itemtype directory -path $resDir | Out-Null
Write-Log $version
$cult = Get-Culture
$cultHex = ('{0:X4}' -f $cult.LCID)
Copy-Item ($env:SystemRoot + "\system32\perfc*.dat") $resDir
Copy-Item ($env:SystemRoot + "\system32\perfd*.dat") $resDir
Copy-Item ($env:SystemRoot + "\system32\perfh*.dat") $resDir
Copy-Item ($env:SystemRoot + "\system32\perfi*.dat") $resDir
(get-itemproperty -ErrorAction SilentlyContinue -literalpath ("HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib\CurrentLanguage")).Counter | Out-File ($resDir + "\Counter.txt")
(get-itemproperty -ErrorAction SilentlyContinue -literalpath ("HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib\CurrentLanguage")).Help | Out-File ($resDir + "\Help.txt")
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services"
$cmd = "reg export ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services"" """ + $resDir + "\Services.reg.txt"" /y " + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib"
$cmd = "reg export ""HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib"" """ + $resDir + "\Perflib.reg.txt"" /y " + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Saving registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib"
$cmd = "reg save ""HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib"" """ + $resDir + "\Perflib.hiv"" /y " + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Exporting registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup"
$cmd = "reg export ""HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup"" """ + $resDir + "\FWSetup.reg.txt"" /y " + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
$svc = "HKLM:\SYSTEM\CurrentControlSet\Services"
New-PSDrive -PSProvider registry -Root HKEY_LOCAL_MACHINE -Name HKLM -ErrorAction SilentlyContinue | Out-Null
$Keys = Get-ChildItem $svc
ForEach ($Item in $Keys) {
$perf = ($svc + "\" + $item.PSChildName + "\Performance")
$reg = Get-ItemProperty $perf -ErrorAction SilentlyContinue
if ($reg) {
Write-Log $item.PSChildName
$row = $tbPerfV1.NewRow()
if ($reg.PerfIniFile) {
$inipath = ($env:windir + "\INF\" + $item.PSChildName + "\" + $cultHex + "\" + $reg.PerfIniFile).TrimEnd([char]0)
if (Test-Path $inipath) {
$row.IniExists = "Yes"
} else {
$row.IniExists = "No"
}
} else {
$row.IniExists = ""
}
$row.Name = $item.PSChildName
$row.Open = $reg.Open
$row.Close = $reg.Close
$row.Collect = $reg.Collect
$row.Library = $reg.Library
$row.InstallType = $reg.InstallType
$row.PerfIniFile = $reg.PerfIniFile
$row.Disabled = $reg.'Disable Performance Counters'
$row.FirstCounter = $reg.'First Counter'
$row.FirstHelp = $reg.'First Help'
$row.LastCounter = $reg.'Last Counter'
$row.LastHelp = $reg.'Last Help'
$row.ObjectList = $reg.'Object List'
$tbPerfV1.Rows.Add($row)
}
}
$tbPerfV1 | Export-Csv $resDir"\PerfV1.csv" -noType
Write-Log "Enumerating performance counters"
$cmd = "typeperf.exe -q > """ + $resDir + "\typeperf.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $outfile -Append
Write-Log "Enumerating performance counters with instances"
$cmd = "typeperf.exe -qx > """ + $resDir + "\typeperf-inst.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $outfile -Append
Write-Log "Enumerating 32bit performance counters"
$cmd = $env:windir + "\SysWOW64\typeperf.exe -q > """ + $resDir + "\typeperf32.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $outfile -Append
Write-Log "Enumerating 32bit performance counters"
$cmd = $env:windir + "\SysWOW64\typeperf.exe -qx > """ + $resDir + "\typeperf32-inst.txt""" + $RdrErr
Write-Log $cmd
Invoke-Expression ($cmd) | Out-File -FilePath $outfile -Append
Write-Log "Enumerating WMI performance classes"
Get-CimInstance -Query "select * from meta_class where __CLASS like '%Win32_Perf%'" | Select-Object -Property __CLASS | Sort-Object -Property __CLASS | Out-File ($resDir + "\WMIPerfClasses.txt")
<# #_# 2021-04-30
Write-Log "Exporting Application log"
$cmd = "wevtutil epl Application """+ $resDir + "\" + $env:computername + "-Application.evtx""" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
Write-Log "Exporting System log"
$cmd = "wevtutil epl System """+ $resDir + "\" + $env:computername + "-System.evtx""" + $RdrOut + $RdrErr
Write-Log $cmd
Invoke-Expression $cmd
#>
Write-Log "Collecting system information"
$pad = 27
$OS = ExecQuery -Namespace "root\cimv2" -Query "select Caption, CSName, OSArchitecture, BuildNumber, InstallDate, LastBootUpTime, LocalDateTime, TotalVisibleMemorySize, FreePhysicalMemory, SizeStoredInPagingFiles, FreeSpaceInPagingFiles from Win32_OperatingSystem"
$CS = ExecQuery -Namespace "root\cimv2" -Query "select Model, Manufacturer, SystemType, NumberOfProcessors, NumberOfLogicalProcessors, TotalPhysicalMemory, DNSHostName, Domain from Win32_ComputerSystem"
$BIOS = ExecQuery -Namespace "root\cimv2" -query "select BIOSVersion, Manufacturer, ReleaseDate, SMBIOSBIOSVersion from Win32_BIOS"
$TZ = ExecQuery -Namespace "root\cimv2" -Query "select Description from Win32_TimeZone"
$PR = ExecQuery -Namespace "root\cimv2" -Query "select Name, Caption from Win32_Processor"
"Computer name".PadRight($pad) + " : " + $OS.CSName | Out-File -FilePath $SysInfoFile -Append
"Model".PadRight($pad) + " : " + $CS.Model | Out-File -FilePath $SysInfoFile -Append
"Manufacturer".PadRight($pad) + " : " + $CS.Manufacturer | Out-File -FilePath $SysInfoFile -Append
"BIOS Version".PadRight($pad) + " : " + $BIOS.BIOSVersion | Out-File -FilePath $SysInfoFile -Append
"BIOS Manufacturer".PadRight($pad) + " : " + $BIOS.Manufacturer | Out-File -FilePath $SysInfoFile -Append
"BIOS Release date".PadRight($pad) + " : " + $BIOS.ReleaseDate | Out-File -FilePath $SysInfoFile -Append
"SMBIOS Version".PadRight($pad) + " : " + $BIOS.SMBIOSBIOSVersion | Out-File -FilePath $SysInfoFile -Append
"SystemType".PadRight($pad) + " : " + $CS.SystemType | Out-File -FilePath $SysInfoFile -Append
"Processor".PadRight($pad) + " : " + $PR.Name + " / " + $PR.Caption | Out-File -FilePath $SysInfoFile -Append
"Processors physical/logical".PadRight($pad) + " : " + $CS.NumberOfProcessors + " / " + $CS.NumberOfLogicalProcessors | Out-File -FilePath $SysInfoFile -Append
"Memory physical/visible".PadRight($pad) + " : " + ("{0:N0}" -f ($CS.TotalPhysicalMemory/1mb)) + " MB / " + ("{0:N0}" -f ($OS.TotalVisibleMemorySize/1kb)) + " MB" | Out-File -FilePath $SysInfoFile -Append
"Free physical memory".PadRight($pad) + " : " + ("{0:N0}" -f ($OS.FreePhysicalMemory/1kb)) + " MB" | Out-File -FilePath $SysInfoFile -Append
"Paging files size / free".PadRight($pad) + " : " + ("{0:N0}" -f ($OS.SizeStoredInPagingFiles/1kb)) + " MB / " + ("{0:N0}" -f ($OS.FreeSpaceInPagingFiles/1kb)) + " MB" | Out-File -FilePath $SysInfoFile -Append
"Operating System".PadRight($pad) + " : " + $OS.Caption + " " + $OS.OSArchitecture | Out-File -FilePath $SysInfoFile -Append
"Build Number".PadRight($pad) + " : " + $OS.BuildNumber | Out-File -FilePath $SysInfoFile -Append
"Time zone".PadRight($pad) + " : " + $TZ.Description | Out-File -FilePath $SysInfoFile -Append
"Install date".PadRight($pad) + " : " + $OS.InstallDate | Out-File -FilePath $SysInfoFile -Append
"Last boot time".PadRight($pad) + " : " + $OS.LastBootUpTime | Out-File -FilePath $SysInfoFile -Append
"Local time".PadRight($pad) + " : " + $OS.LocalDateTime | Out-File -FilePath $SysInfoFile -Append
"DNS Hostname".PadRight($pad) + " : " + $CS.DNSHostName | Out-File -FilePath $SysInfoFile -Append
"Domain".PadRight($pad) + " : " + $CS.Domain | Out-File -FilePath $SysInfoFile -Append
# SIG # Begin signature block
# MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA0cNPmmhStC95x
# YKdwoFt/XvVwVaxYdhBURvHmGXzP5KCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKSv
# 7Kn0dJWgF1vEqG3//k6psvxkb02BVkZ7BEcHc5EqMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEA6GpWRScNOfdgXRBpyrKSewyBucd+tsq/LYF9
# 5HQKO7bBJI+B71JNHdYATTVcxr9faAMkiVk/orQTxkipqqHhbBTiXko4D42VJyvn
# 7YthUd23s4laX9BOvae0Ia6YX5ACp0V2Ff6pKmVLnDfsaZ1wLkid/N5Wk7keOp0C
# WW6KiSgTJ7d8KpXUE+D1HO6/UTrHZnb/K59ntP6TYqM7ebZo6lKoy+2MRqSrN3+m
# qVBq4KQftpFtatNhy5QeSqyoa76jx597Q0iIYvZCufQ45bsYMLGWJq4m7FCnUMya
# yYLOfIDRMz4fPt+F+vIyZj0rzfbVc9MiPn6voTOAkaiHPycv5qGCFykwghclBgor
# BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCD1lCWOTr+JjFeLWpMS0aKgf43rVSWiQO2z
# WF6F4hvI2AIGZldTgNdfGBMyMDI0MDYxMjE1MDA0MC41NThaMASAAgH0oIHYpIHV
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHimZmV
# 8dzjIOsAAQAAAeIwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjpGQzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVj
# tZhV+kFmb8cKQpg2mzisDlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC
# 7jS03JkcrPsWi9WpVwsIckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJ
# bsE3wMmpmJasPWpgF05zZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmU
# Xs7ICxDJr5a39SSePAJRIyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwne
# tSePg88EmRezr2T3HTFElneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfF
# cS4XElf3GSERnlzJsK7s/ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4
# eQszYxq4c4HqPnUu4hT4aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdth
# FCBepxfb6nbsp3fcZaPBfTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCW
# ACoj78XUwYqy1HyYnStTme4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKv
# NNsTVm4QbqphCyknrwByqorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3u
# fASdPrgPhsQIRFkHZGuihL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNV
# HQ4EFgQURIQOEdq+7QdslptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D
# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l
# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD
# ggIBAORURDGrVRTbnulfsg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3
# ka76Yz0t/6lxuczI6w7tXq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwL
# hP1PGC5tvXK0xYomU1nU+lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrX
# a2daCOGnxuaD1IO+65E7qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0gan
# hFzzHAnWjtNWneU11WQ6Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVl
# UE3zIikoSed+8s61NDP+x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIo
# ycVTvBQpv/drRJD68eo401mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iO
# aKZ75vuQg7hCiBA5xIm5ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqv
# E8Aq38QmKgTiBnWSS/uVPcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhS
# gCIGJUZDA7336nQD8fn4y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv
# 1ug7dS/Dfrcd1sn2E4gk4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIB
# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1
# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O
# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn
# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t
# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq
# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP
# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW
# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv
# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb
# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc
# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a
# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB
# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw
# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E
# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB
# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/
# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ
# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v
# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h
# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x
# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p
# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A
# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC
# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB
# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt
# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3
# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV
# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw
# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB
# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjpGQzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhf
# iB1d8pTohm+ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAOoTm/4wIhgPMjAyNDA2MTIxMjAxMDJaGA8yMDI0MDYx
# MzEyMDEwMlowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6hOb/gIBADAHAgEAAgIU
# +DAHAgEAAgISGTAKAgUA6hTtfgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE
# AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB
# AJ/FJuetAVWJI9zIVgs/G6PJb2Htizs7thkptzHLKrRyIkqJv/q6dRq8CoHs3W9P
# BVpwGoeYDNFqHTXGjcScJjSLFlL8KdtZ2Xe1nwjxChR8Ta+kTgfbll+of7DjBs4h
# ou5X0dKwo0yyYMSYERBYeeIbZsDaI5CElxB95kDskp2pMYIEDTCCBAkCAQEwgZMw
# fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
# TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAA
# AeIwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB
# BDAvBgkqhkiG9w0BCQQxIgQgSN29J+YcN1Xf/y1lojGtDl/Uv5UXmxfYbQoDyR8c
# c1IwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4
# d5LU6I/bjucIZkOJCI9//zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
# QSAyMDEwAhMzAAAB4pmZlfHc4yDrAAEAAAHiMCIEIFXEVszJvDLGPe6VS+bkhFGz
# m96spv2wtK27KDsu4aKpMA0GCSqGSIb3DQEBCwUABIICAATANfOW6mY9bIN6MkQ4
# 8M3y3mXH8n2rimjMXO1i1CmUC7+qsL/LCkJo8RsRmbwVNK+XA/yjxb1UdLzWHPw2
# RRuiuZlD+ooKeZww0ECDnXW/IIoBrtm9cFKGJxwG+ycfJLZ/h/JLwUfeyKLw+UlC
# +K4P+jBaYEddKV4t9sSjoPy2u2iNhIzqXH6kGnaevW085mkF3AVYccQK4NaeYb5Y
# 7/iBVEu1Bto3v0NXPn9+BRyXf+hd4NWtIuK6wZKQfbxx2vdJxbh2L/I72vm0AxhP
# wdxXnlrqtylg3tUr9g8KPgHejN09QUoUL2nKhIwZiYh7LJJX+5qplY7j2V0WeayI
# CyB+NgmCEVCgG8qWjPxplniK3+PiUC/Bvmi8ZpGaboheApET6Sa+RGbjsjnSPqdV
# SVlvJzoeGqqcfDgbuMUpnnElFMrSzwZqQNPJoD6ZK8N5rRY4T4DMNA7p2IHqXdYs
# o/fE3d1+kPZo1FVGArTxBZE3ltzfLrR57r2PFmoGNZUQA8Fup1+VhZPdlAm48+C+
# ph+S1Yk4XdXnLB0pHO9/dzoWLig1oqlLGEIBV6ibuSjF5f45DU9wynAdmgmkSeOK
# QKqg93Vus9F+frwD6RYeh4LDWRUQNwEShWKkmnxJqBrVz7K+fhRMXuFXXGPLLmIq
# aWthX8Z/rnc3t4XGaYQFOv5Z
# SIG # End signature block
|
combined_dataset/train/non-malicious/197.ps1 | 197.ps1 | Function Add-SRComment
{
[CmdletBinding()]
PARAM (
[Alias("SRObject")]
[parameter(Mandatory = $true)]
[System.WorkItem.ServiceRequest]$ServiceRequestObject,
[parameter(Mandatory = $True)]
[String]$Comment,
[ValidateSet("User", "Analyst")]
[parameter(Mandatory = $True)]
[System.WorkItem.TroubleTicket]
[String]$CommentType,
[parameter(Mandatory = $True)]
[String]$EnteredBy,
[Switch]$IsPrivate
)
BEGIN
{
TRY
{
if (-not (Get-Module -Name Smlets))
{
Import-Module -Name Smlets -ErrorAction 'Stop'
}
}
CATCH
{
$Error[0]
}
}
PROCESS
{
TRY
{
If ($ServiceRequestObject.Id -ne $NULL)
{
Switch ($CommentType)
{
"Analyst" {
$CommentClass = "System.WorkItem.TroubleTicket.AnalystCommentLog"
$CommentClassName = "AnalystCommentLog"
}
"User" {
$CommentClass = "System.WorkItem.TroubleTicket.UserCommentLog"
$CommentClassName = "EndUserCommentLog"
}
}
$NewGUID = ([guid]::NewGuid()).ToString()
$Projection = @{
__CLASS = "System.WorkItem.ServiceRequest";
__SEED = $ServiceRequestObject;
EndUserCommentLog = @{
__CLASS = $CommentClass;
__OBJECT = @{
Id = $NewGUID;
DisplayName = $NewGUID;
Comment = $Comment;
EnteredBy = $EnteredBy;
EnteredDate = (Get-Date).ToUniversalTime();
IsPrivate = $IsPrivate.ToBool();
}
}
}
New-SCSMObjectProjection -Type "System.WorkItem.ServiceRequestProjection" -Projection $Projection
}
else
{
Throw "Invalid Service Request Object!"
}
}
CATCH
{
$Error[0]
}
}
} |
combined_dataset/train/non-malicious/Add _ Get-Help -Full.ps1 | Add _ Get-Help -Full.ps1 | $executionContext.SessionState.InvokeCommand.PreCommandLookupAction = {
param($CommandName, $CommandLookupEventArgs)
if($CommandName.StartsWith("?")) {
$RealCommandName = $CommandName.TrimStart("?")
$CommandLookupEventArgs.CommandScriptBlock = {
Get-Help $RealCommandName -Full
## Wrap it in a closure because we need $CommandName
}.GetNewClosure()
}
}
Write-Warning "DO NOT USE THIS POSTCOMMANDLOOKUPACTION EXCEPT FOR DEMONSTRATION"
$executionContext.SessionState.InvokeCommand.PostCommandLookupAction = {
param($CommandName, $CommandLookupEventArgs)
# Only for interactive commands (and that doesn't include "prompt")
# I should exclude out-default so we don't handle it on every pipeline, but ...
if($CommandLookupEventArgs.CommandOrigin -eq "Runspace" -and $CommandName -ne "prompt" ) {
## Create a new script block that checks for the "-??" argument
## And if -?? exists, calls Get-Help -Full instead
## Otherwise calls the expected command
$CommandLookupEventArgs.CommandScriptBlock = {
if($Args.Length -eq 1 -and $Args[0] -eq "-??") {
Get-Help $CommandName -Full
} else {
& $CommandName @args
}
## Wrap it in a closure because we need $CommandName
}.GetNewClosure()
}
}
|
combined_dataset/train/non-malicious/1106.ps1 | 1106.ps1 |
$siteName = 'Carbon-Set-IisWebsiteSslCertificate'
$cert = $null
$appID = '990ae75d-b1c3-4c4e-93f2-9b22dfbfe0ca'
$ipAddress = '43.27.98.0'
$port = '443'
$allPort = '8013'
function Start-TestFixture
{
& (Join-Path -Path $PSScriptRoot '..\Initialize-CarbonTest.ps1' -Resolve)
}
function Start-Test
{
Install-IisWebsite -Name $siteName -Path $TestDir -Bindings @( "https/$ipAddress`:$port`:", "https/*:$allPort`:" )
$cert = Install-Certificate -Path (Join-Path $TestDir ..\Certificates\CarbonTestCertificate.cer -Resolve) -StoreLocation LocalMachine -StoreName My
}
function Stop-Test
{
Uninstall-Certificate -Certificate $cert -StoreLocation LocalMachine -StoreName My
Uninstall-IisWebsite -Name $siteName
}
function Test-ShouldSetWebsiteSslCertificate
{
Set-IisWebsiteSslCertificate -SiteName $siteName -Thumbprint $cert.Thumbprint -ApplicationID $appID
try
{
$binding = Get-SslCertificateBinding -IPAddress $ipAddress -Port $port
Assert-NotNull $binding
Assert-Equal $cert.Thumbprint $binding.CertificateHash
Assert-Equal $appID $binding.ApplicationID
$binding = Get-SslCertificateBinding -Port $allPort
Assert-NotNull $binding
Assert-Equal $cert.Thumbprint $binding.CertificateHash
Assert-Equal $appID $binding.ApplicationID
}
finally
{
Remove-SslCertificateBinding -IPAddress $ipAddress -Port $port
Remove-SslCertificateBinding -Port $allPort
}
}
function Test-ShouldSupportWhatIf
{
$bindings = @( Get-SslCertificateBinding )
Set-IisWebsiteSslCertificate -SiteName $siteName -Thumbprint $cert.Thumbprint -ApplicationID $appID -WhatIf
$newBindings = @( Get-SslCertificateBinding )
Assert-Equal $bindings.Length $newBindings.Length
}
function Test-ShouldSupportWebsiteWithoutSslBindings
{
Install-IisWebsite -Name $siteName -Path $TestDir -Bindings @( 'http/*:80:' )
$bindings = @( Get-SslCertificateBinding )
Set-IisWebsiteSslCertificate -SiteName $siteName -Thumbprint $cert.Thumbprint -ApplicationID $appID
$newBindings = @( Get-SslCertificateBinding )
Assert-Equal $bindings.Length $newBindings.Length
}
|
combined_dataset/train/non-malicious/sample_34_13.ps1 | sample_34_13.ps1 | #
# Module manifest for module 'OCI.PSModules.Announcementsservice'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Announcementsservice.dll'
# Version number of this module.
ModuleVersion = '79.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '4260cf9c-0dfb-4f1c-ac46-7d08fcbebbf2'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Announcementsservice Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '79.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Announcementsservice.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIAnnouncementsserviceAnnouncement',
'Get-OCIAnnouncementsserviceAnnouncementsList',
'Get-OCIAnnouncementsserviceAnnouncementsPreference',
'Get-OCIAnnouncementsserviceAnnouncementsPreferencesList',
'Get-OCIAnnouncementsserviceAnnouncementSubscription',
'Get-OCIAnnouncementsserviceAnnouncementSubscriptionsList',
'Get-OCIAnnouncementsserviceAnnouncementUserStatus',
'Move-OCIAnnouncementsserviceAnnouncementSubscriptionCompartment',
'New-OCIAnnouncementsserviceAnnouncementsPreference',
'New-OCIAnnouncementsserviceAnnouncementSubscription',
'New-OCIAnnouncementsserviceFilterGroup',
'Remove-OCIAnnouncementsserviceAnnouncementSubscription',
'Remove-OCIAnnouncementsserviceFilterGroup',
'Update-OCIAnnouncementsserviceAnnouncementsPreference',
'Update-OCIAnnouncementsserviceAnnouncementSubscription',
'Update-OCIAnnouncementsserviceAnnouncementUserStatus',
'Update-OCIAnnouncementsserviceFilterGroup'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Announcementsservice'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/4059.ps1 | 4059.ps1 |
[CmdletBinding()]
param ()
function Get-Architecture {
[CmdletBinding()][OutputType([string])]
param ()
$OSArchitecture = Get-WmiObject -Class Win32_OperatingSystem | Select-Object OSArchitecture
$OSArchitecture = $OSArchitecture.OSArchitecture
Return $OSArchitecture
}
function Get-RelativePath {
[CmdletBinding()][OutputType([string])]
param ()
$Path = (split-path $SCRIPT:MyInvocation.MyCommand.Path -parent) + "\"
Return $Path
}
function Install-EXE {
[CmdletBinding()]
param
(
[ValidateNotNullOrEmpty()][string]$DisplayName,
[ValidateNotNullOrEmpty()][string]$Executable,
[ValidateNotNullOrEmpty()][string]$Switches
)
Write-Host "Install"$DisplayName.Trim()"....." -NoNewline
$ErrCode = (Start-Process -FilePath $Executable -ArgumentList $Switches -Wait -Passthru).ExitCode
If (($ErrCode -eq 0) -or ($ErrCode -eq 3010)) {
Write-Host "Success" -ForegroundColor Yellow
} else {
Write-Host "Failed with error code "$ErrCode -ForegroundColor Red
Exit $ErrCode
}
}
function New-AutoConfigFile {
[CmdletBinding()]
param
(
[ValidateNotNullOrEmpty()][string]$CFGFile
)
'//The first line must be a comment' | Out-File -FilePath $CFGFile -Encoding UTF8 -NoClobber -Force
'pref("general.config.filename", "mozilla.cfg");' | Out-File -FilePath $CFGFile -Encoding UTF8 -NoClobber -Append
'pref("general.config.obscure_value", 0);' | Out-File -FilePath $CFGFile -Encoding UTF8 -NoClobber -Append
}
function New-MozillaConfig {
[CmdletBinding()]
param
(
[ValidateNotNullOrEmpty()][string]$CFGFile
)
'//The first line must be a comment' | Out-File -FilePath $CFGFile -Encoding UTF8 -NoClobber -Force
'// This is placed in the %programfiles%\Mozilla Firefox\ folder' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append
'' | Out-File -FilePath $env:ProgramFiles"\Mozilla Firefox\\mozilla.cfg" -Encoding UTF8 -Append
'// Enable Automatic Updater' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append
'lockPref("app.update.enabled", true);' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append
'lockPref("app.update.auto", true);' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append
'lockPref("app.update.service.enabled", true);' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append
'lockPref("app.update.mode", 0);' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append
'lockPref("app.update.incompatible.mode", 0);' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append
'' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append
'// Do not show "know your rights" on first start' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append
'pref("browser.rights.3.shown", true);' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append
'' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append
'// Do not show What is New on first run' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append
'pref("browser.startup.homepage_override.mstone", "ignore");' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append
'' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append
'// Set default homepage' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append
'defaultPref("browser.startup.homepage","data:text/plain,browser.startup.homepage=http://wallerville.com");' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append
'' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append
'// Do not check if default browser' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append
'pref("browser.shell.checkDefaultBrowser", false);' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append
'' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append
'// Disable Browser Reset Prompt' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append
'pref("browser.disableResetPrompt", true);' | Out-File -FilePath $CFGFile -Encoding UTF8 -Append
}
function Remove-Directory {
param
(
[String]$Directory,
[switch]$Recurse
)
Write-Host "Delete"$Directory"....." -NoNewline
If (Test-Path $Directory) {
If ($Recurse.IsPresent) {
Remove-Item $Directory -Recurse -Force -ErrorAction SilentlyContinue
} else {
Remove-Item $Directory -Force -ErrorAction SilentlyContinue
}
If ((Test-Path $Directory) -eq $False) {
Write-Host "Success" -ForegroundColor Yellow
} else {
Write-Host "Failed" -ForegroundColor Red
}
} else {
Write-Host "Not Present" -ForegroundColor Green
}
}
function Stop-Processes {
[CmdletBinding()]
param
(
[ValidateNotNullOrEmpty()][String]$ProcessName
)
$Processes = Get-Process $ProcessName -ErrorAction SilentlyContinue
If ($Processes -ne $null) {
Do {
foreach ($Process in $Processes) {
If ($Process.Product -ne $null) {
Write-Host "Killing"(($Process.Product).ToString()).Trim()"Process ID"(($Process.Id).ToString()).Trim()"....." -NoNewline
Stop-Process -Id $Process.Id -Force -ErrorAction SilentlyContinue
Start-Sleep -Milliseconds 250
$Process = Get-Process -Id $Process.Id -ErrorAction SilentlyContinue
If ($Process -eq $null) {
Write-Host "Success" -ForegroundColor Yellow
} else {
Write-Host "Failed" -ForegroundColor Red
}
}
}
$Process = Get-Process $ProcessName -ErrorAction SilentlyContinue
} While ($Process -ne $null)
}
}
function Uninstall-EXE {
[CmdletBinding()]
param
(
[ValidateNotNullOrEmpty()][string]$DisplayName,
[ValidateNotNullOrEmpty()][string]$Executable,
[ValidateNotNullOrEmpty()][string]$Switches
)
Write-Host "Uninstall"$DisplayName.Trim()"....." -NoNewline
$ErrCode = (Start-Process -FilePath $Executable -ArgumentList $Switches -Wait -Passthru).ExitCode
If (($ErrCode -eq 0) -or ($ErrCode -eq 3010)) {
Write-Host "Success" -ForegroundColor Yellow
} else {
Write-Host "Failed with error code "$ErrCode -ForegroundColor Red
Exit $ErrCode
}
}
Stop-Processes -ProcessName Firefox
If (Test-Path $env:ProgramFiles"\Mozilla Firefox\uninstall\helper.exe") {
Uninstall-EXE -DisplayName "Mozilla Firefox" -Executable $env:ProgramFiles"\Mozilla Firefox\uninstall\helper.exe" -Switches "/S"
Remove-Directory -Directory $env:ProgramFiles"\Mozilla Firefox" -Recurse
} elseif (Test-Path ${env:ProgramFiles(x86)}"\Mozilla Firefox\uninstall\helper.exe") {
Uninstall-EXE -DisplayName "Mozilla Firefox" -Executable ${env:ProgramFiles(x86)}"\Mozilla Firefox\uninstall\helper.exe" -Switches "/S"
Remove-Directory -Directory ${env:ProgramFiles(x86)}"\Mozilla Firefox" -Recurse
}
If ((Test-Path $env:ProgramData"\Mozilla") -eq $true) {
Remove-Directory -Directory $env:ProgramData"\Mozilla" -Recurse
}
|
combined_dataset/train/non-malicious/3303.ps1 | 3303.ps1 |
function Get-PoshBotConfiguration {
[cmdletbinding(DefaultParameterSetName = 'Path')]
param(
[parameter(
Mandatory,
ParameterSetName = 'Path',
Position = 0,
ValueFromPipeline,
ValueFromPipelineByPropertyName
)]
[ValidateNotNullOrEmpty()]
[SupportsWildcards()]
[string[]]$Path,
[parameter(
Mandatory,
ParameterSetName = 'LiteralPath',
Position = 0,
ValueFromPipelineByPropertyName
)]
[ValidateNotNullOrEmpty()]
[Alias('PSPath')]
[string[]]$LiteralPath
)
process {
if ($PSCmdlet.ParameterSetName -eq 'Path') {
$paths = Resolve-Path -Path $Path | Select-Object -ExpandProperty Path
} elseif ($PSCmdlet.ParameterSetName -eq 'LiteralPath') {
$paths = Resolve-Path -LiteralPath $LiteralPath | Select-Object -ExpandProperty Path
}
foreach ($item in $paths) {
if (Test-Path $item) {
if ( (Get-Item -Path $item).Extension -eq '.psd1') {
Write-Verbose -Message "Loading bot configuration from [$item]"
$hash = Get-Content -Path $item -Raw | ConvertFrom-Metadata
$config = [BotConfiguration]::new()
foreach ($key in $hash.Keys) {
if ($config | Get-Member -MemberType Property -Name $key) {
switch ($key) {
'ChannelRules' {
$config.ChannelRules = @()
foreach ($item in $hash[$key]) {
$config.ChannelRules += [ChannelRule]::new($item.Channel, $item.IncludeCommands, $item.ExcludeCommands)
}
break
}
'ApprovalConfiguration' {
if ($hash[$key].ExpireMinutes -is [int]) {
$config.ApprovalConfiguration.ExpireMinutes = $hash[$key].ExpireMinutes
}
if ($hash[$key].Commands.Count -ge 1) {
foreach ($approvalConfig in $hash[$key].Commands) {
$acc = [ApprovalCommandConfiguration]::new()
$acc.Expression = $approvalConfig.Expression
$acc.ApprovalGroups = $approvalConfig.Groups
$acc.PeerApproval = $approvalConfig.PeerApproval
$config.ApprovalConfiguration.Commands.Add($acc) > $null
}
}
break
}
'MiddlewareConfiguration' {
foreach ($type in [enum]::GetNames([MiddlewareType])) {
foreach ($item in $hash[$key].$type) {
$config.MiddlewareConfiguration.Add([MiddlewareHook]::new($item.Name, $item.Path), $type)
}
}
break
}
Default {
$config.$Key = $hash[$key]
break
}
}
}
}
$config
} else {
Throw 'Path must be to a valid .psd1 file'
}
} else {
Write-Error -Message "Path [$item] is not valid."
}
}
}
}
Export-ModuleMember -Function 'Get-PoshBotConfiguration'
|
combined_dataset/train/non-malicious/Convert-PowerPack2Ps1.ps1 | Convert-PowerPack2Ps1.ps1 | #######################################################################
# Convert-PowerPack2Ps1
#
# Converts PowerGUI .PowerPack files to ps1 PowerShell script library
# v1 - raw conversion, no name changes, only script elements converted
######################################################################
# Example:
# & .\\Convert-PowerPack2Ps1 "ActiveDirectory.powerpack" "ActiveDirectory.ps1"
# . .\\ActiveDirectory.ps1
# Get-QADUser 'Dmitry Sotnikov' | MemberofRecursive
######################################################################
#
# (c) Dmitry Sotnikov
# http://dmitrysotnikov.wordpress.com
#
#####################################################################
param(
$PowerPackFile = (throw 'Please supply path to source powerpack file'),
$OutputFilePath = (throw 'Please supply path to output ps1 file')
)
#region Functions
function IterateTree {
# processes all script nodes
param($segment)
if ( $segment.Type -like 'Script*' ) {
$name = $segment.name -replace ' |\\(|\\)', ''
$code = $segment.script.PSBase.InnerText
@"
########################################################################
# Function: $name
# Return type: $($segment.returntype)
########################################################################
function $name {
$code
}
"@ | Out-File $OutputFilePath -Append
}
# recurse folders
if ($segment.items.container -ne $null) {
$segment.items.container | ForEach-Object { IterateTree $_ }
}
}
function Output-Link {
PROCESS {
if ( $_.script -ne $null ) {
$name = $_.name -replace ' |\\(|\\)', ''
$code = $_.script.PSBase.InnerText
@"
########################################################################
# Function: $name
# Input type: $($_.type)
# Return type: $($_.returntype)
########################################################################
function $name {
$code
}
"@ | Out-File $OutputFilePath -Append
}
}
}
#endregion
$sourcefile = Get-ChildItem $PowerPackFile
if ($sourcefile -eq $null) { throw 'File not found' }
@"
########################################################################
# Generated from: $PowerPackFile
# by Convert-PowerPack2Ps1 script
# on $(get-date)
########################################################################
"@ | Out-File $OutputFilePath
$pp = [XML] (Get-Content $sourcefile)
@"
# Scripts generated from script nodes
"@ | Out-File $OutputFilePath -Append
IterateTree $pp.configuration.items.container[0]
@"
# Scripts generated from script links
"@ | Out-File $OutputFilePath -Append
$pp.configuration.items.container[1].items.container |
where { $_.id -eq '481eccc0-43f8-47b8-9660-f100dff38e14' } | ForEach-Object {
$_.items.item, $_.items.container | Output-Link
}
@"
# Scripts generated from script actions
"@ | Out-File $OutputFilePath -Append
$pp.configuration.items.container[1].items.container |
where { $_.id -eq '7826b2ed-8ae4-4ad0-bf29-1ff0a25e0ece' } | ForEach-Object {
$_.items.item, $_.items.container | Output-Link
}
|
combined_dataset/train/non-malicious/sample_28_10.ps1 | sample_28_10.ps1 | @{
ModuleVersion = '7.0.1'
GUID = '3859ddf6-1713-4701-adf3-477aeaa06333'
Author="Microsoft Corporation"
CompanyName="Microsoft Corporation"
Copyright="Microsoft® Corporation. All rights reserved."
NestedModules="Newtonsoft.Json.dll"
}
# SIG # Begin signature block
# MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDDtjxCygMR5Ds3
# XJZNp8CUYLhionvXP5xBZQAcWMBszqCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIO3F
# P1UTetKJ3JiiXNiyZUZ47FLRXOi42kzV42KIrUbkMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEA6nwoPMeHU5X8QKD8HzvyzNbq9kbMRam0+CJf
# kN/ALtmkCCFrah1ymfLcEIW8FWPdl0/s7e/rRnG+/ESfXkElMrtCGSzB/MY8xjjn
# Q3mMYKb7PEUqiS5qTDCDoQxZ0MIU+FKdbO65mXtSiw3gDbkO7h+EfhnAnExC5t4F
# fnrZJG04moNpIfvz7xvgUlBnSJToXtKRyuncUIamLYq6XvQgkelYhzenbpmP0PDq
# ksdvLv/3y4Rxqp5xO3kNAskS6A1tUq4eqZ7u9KUh5HUGHps/D4A0HYAoWg3oatQ5
# 4gJRpel/2bOdP/obNVBeaoKtM/WsVt+JWOrQ6juupZPSS+a7EaGCFykwghclBgor
# BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDG8yW/qxcM4w/1seLi/6WkyO1W6Jr+wiWH
# G9rj4wVGAgIGZiAsubpLGBMyMDI0MDQyMzAyMjQxMC43OTdaMASAAgH0oIHYpIHV
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCM
# wl9YXo4AAQAAAdwwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvI
# syA1sjg9kSKJzelrUWF5ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0Ra
# GrU8EHydF8NxPMR2KVNiAtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYn
# iwKLPQLJ00EkXw5TSwfmJXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdF
# LKwo4BTlEgnvzeTfXukzX8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8Xl
# BQDVDX5JeMEsx7jgJDdEnK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7
# rSFvcLnwAqMdqcy/iqQPMlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg
# 8oWwXyiv3+bGB6dmdM61ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/Db
# USqW2RqTUa2O2KuvsyRGMEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+f
# dTw+geRn6Mo2S6+/bZEwS/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGV
# PRqkmz5UYz+R5ybMJWj+mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0ph
# jUTH2GChHIvE4SDSk2hwWP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNV
# HQ4EFgQU6HPSBd0OfEX3uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D
# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l
# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD
# ggIBANnrb8Ewr8eX/H1sKt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g
# 6Tf7tNx1q0NpKk1JTupUJfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXT
# MzxiewfErVLt8WefebncST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz
# /zEA1AbZL/viXtHmryA0CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+d
# h+UsFi0d4lkdcE+Zq5JNjIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YW
# zhP/5XQnYl03AfXErn+1Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1
# qy4y4vlVKaShtbdfgPyGeeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3h
# sHzG8n5u5CQajPwx9PzpsZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4Q
# wGf5B71x57OjaX53gxT4vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ06
# 2nyIZKnsXxzuKFb0TjXWw6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0
# bSrAlVeihcaG5F74SZT8FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIB
# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1
# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O
# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn
# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t
# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq
# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP
# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW
# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv
# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb
# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc
# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a
# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB
# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw
# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E
# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB
# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/
# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ
# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v
# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h
# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x
# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p
# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A
# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC
# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB
# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt
# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3
# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV
# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw
# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB
# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJf
# SbL3djnQEqaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAOnRQkowIhgPMjAyNDA0MjMwNDA4NDJaGA8yMDI0MDQy
# NDA0MDg0MlowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6dFCSgIBADAHAgEAAgIU
# TDAHAgEAAgISBDAKAgUA6dKTygIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE
# AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB
# AKdfQ6krn/9XKU8Iy031XFlG85OEXSoh4dBGaqeGlD943dkMdlPnjE+MNokMWYaQ
# 0JNKwtpMkAnPoDcyylCPCELlR54i9KaOR7WJp72VKtL04H/EbopdGU86A523FLhA
# dtVx7+UUaWwr/s7KcbHaSrCmgPUrOzaTxyDnHHkwJ3OWMYIEDTCCBAkCAQEwgZMw
# fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
# TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAA
# AdwwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB
# BDAvBgkqhkiG9w0BCQQxIgQgAXMgSPEGbfOG8PvR50fNmnvTPRaL/iqIDuGTa+wv
# Yu8wgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0
# Ou0IqxELDhX2TLylxIINNzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
# QSAyMDEwAhMzAAAB3MHgjMJfWF6OAAEAAAHcMCIEIMlj5Czdui1+yXOeEgNyO7aq
# td0QRMsB+0i74NsgRz7zMA0GCSqGSIb3DQEBCwUABIICAHPBDSuEPqmx1O0L6Qv/
# OVfSNVc8O5KtwvcgXtXC1FPWRuiZb3+SHTOseeTdxkjiZgSSZwP0u8zwdRP8bNiJ
# Fz8nu0tPwDJj4OLRhNVfIG0VHTl3gOcz9PK3dpNTn6KIgw9bDaOYZnXqHOW0u4h0
# LuF+72thq0EuzLB722caGiH/48xT/E+P1pcKLY7qMIZFuGRMhRUlPi1uhyAEKjTZ
# Dj1F6jX1z8Dh74cqT5SdeHPN/kjvZm2Xo6i47kXQEB+yL3QyFba4slUChh+InELz
# irsyQZSySrRqevMmrcoj1i9eqxj/pE4q/oEUCS4aQHmiRpejmyU2ZLe00ZIjpf/B
# 8yrAodhzSoJ18CfGosNmH2EIBnsaruVcPA5wn2pUPCSbH2BVNZ3Zz1iQYaCjahio
# zp/kjWintciaciBO3lDHTkHO563HcrzdzHycCJp3hH8uE5PylNmp8HbnxbO2zoO5
# AlahtD52ThLY03fFwy+MfnFJYXlkLH3Us5oYU6yQkjwdcmV1laJL+buihLTV1aRu
# To/GUWMf7DWhIpvLm5r3KCdqt40nBQ9BtUADt/um0x7evGHF6Ox6WPBfWvAzHMqo
# Af0fTR4o1meSZ8xuiONXR+ZBNmP9HB8s2xDbYBJgzpzIkSUjSxN9Uu2M0vOjpMCr
# PXWC8pEtKSdxPES/mbQVff5B
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_6_2.ps1 | sample_6_2.ps1 | #
# Module manifest for module 'OCI.PSModules.Networkloadbalancer'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Networkloadbalancer.dll'
# Version number of this module.
ModuleVersion = '92.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'd32e7ff0-9f4a-49d5-9f53-d22b8b4f9294'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Networkloadbalancer Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '92.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Networkloadbalancer.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCINetworkloadbalancer', 'Get-OCINetworkloadbalancerBackend',
'Get-OCINetworkloadbalancerBackendHealth',
'Get-OCINetworkloadbalancerBackendSet',
'Get-OCINetworkloadbalancerBackendSetHealth',
'Get-OCINetworkloadbalancerBackendSetsList',
'Get-OCINetworkloadbalancerBackendsList',
'Get-OCINetworkloadbalancerHealth',
'Get-OCINetworkloadbalancerHealthChecker',
'Get-OCINetworkloadbalancerHealthsList',
'Get-OCINetworkloadbalancerListener',
'Get-OCINetworkloadbalancerListenersList',
'Get-OCINetworkloadbalancersList',
'Get-OCINetworkloadbalancersPoliciesList',
'Get-OCINetworkloadbalancersProtocolsList',
'Get-OCINetworkloadbalancerWorkRequest',
'Get-OCINetworkloadbalancerWorkRequestErrorsList',
'Get-OCINetworkloadbalancerWorkRequestLogsList',
'Get-OCINetworkloadbalancerWorkRequestsList',
'Move-OCINetworkloadbalancerCompartment',
'New-OCINetworkloadbalancer', 'New-OCINetworkloadbalancerBackend',
'New-OCINetworkloadbalancerBackendSet',
'New-OCINetworkloadbalancerListener',
'Remove-OCINetworkloadbalancer',
'Remove-OCINetworkloadbalancerBackend',
'Remove-OCINetworkloadbalancerBackendSet',
'Remove-OCINetworkloadbalancerListener',
'Update-OCINetworkloadbalancer',
'Update-OCINetworkloadbalancerBackend',
'Update-OCINetworkloadbalancerBackendSet',
'Update-OCINetworkloadbalancerHealthChecker',
'Update-OCINetworkloadbalancerListener',
'Update-OCINetworkloadbalancerNetworkSecurityGroups'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Networkloadbalancer'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_41_43.ps1 | sample_41_43.ps1 | #
# Module manifest for module 'OCI.PSModules.Streaming'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Streaming.dll'
# Version number of this module.
ModuleVersion = '81.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'ff4a80d2-3354-4a6a-a142-89663068a2ac'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Streaming Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Streaming.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIStreamingConnectHarness',
'Get-OCIStreamingConnectHarnessesList', 'Get-OCIStreamingGroup',
'Get-OCIStreamingMessages', 'Get-OCIStreamingStream',
'Get-OCIStreamingStreamPool', 'Get-OCIStreamingStreamPoolsList',
'Get-OCIStreamingStreamsList', 'Invoke-OCIStreamingConsumerCommit',
'Invoke-OCIStreamingConsumerHeartbeat',
'Move-OCIStreamingConnectHarnessCompartment',
'Move-OCIStreamingStreamCompartment',
'Move-OCIStreamingStreamPoolCompartment',
'New-OCIStreamingConnectHarness', 'New-OCIStreamingCursor',
'New-OCIStreamingGroupCursor', 'New-OCIStreamingStream',
'New-OCIStreamingStreamPool', 'Remove-OCIStreamingConnectHarness',
'Remove-OCIStreamingStream', 'Remove-OCIStreamingStreamPool',
'Update-OCIStreamingConnectHarness', 'Update-OCIStreamingGroup',
'Update-OCIStreamingStream', 'Update-OCIStreamingStreamPool',
'Write-OCIStreamingMessages'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Streaming'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/1671.ps1 | 1671.ps1 |
function Create-Shortcut {
param (
[string]$Source,
[string]$DestinationLnk,
[string]$Arguments
)
begin {
$WshShell = New-Object -ComObject WScript.Shell
}
process {
if (!$Source) {Throw 'No Source'}
if (!$DestinationLnk) {Throw 'No DestinationLnk'}
$Shortcut = $WshShell.CreateShortcut($DestinationLnk)
$Shortcut.TargetPath = $Source
if ($Arguments) {
$Shortcut.Arguments = $Arguments
}
$Shortcut.Save()
}
end {
function Release-Ref ($ref) {
([System.Runtime.InteropServices.Marshal]::ReleaseComObject([System.__ComObject]$ref) -gt 0)
[System.GC]::Collect()
[System.GC]::WaitForPendingFinalizers()
}
$Shortcut, $WshShell | % {$null = Release-Ref $_}
}
}
|
combined_dataset/train/non-malicious/SQLParser.ps1 | SQLParser.ps1 | #requires -version 2
#Uses Visual Studio Database Edition classes Microsoft.Data.Schema.ScriptDom and Microsoft.Data.Schema.Script.Sql to parse T-SQL
#Chad Miller
#http://chadwickmiller.spaces.live.com/
$PSScriptRoot = (Split-Path $MyInvocation.MyCommand.Path -Parent)
Add-Type -Path "$PSScriptRoot\\Microsoft.Data.Schema.ScriptDom.dll"
Add-Type -Path "$PSScriptRoot\\Microsoft.Data.Schema.ScriptDom.Sql.dll"
$Source = @"
using System;
using System.Collections.Generic;
using System.Linq;
using System.Text;
using Microsoft.Data.Schema.ScriptDom;
using Microsoft.Data.Schema.ScriptDom.Sql;
using System.IO;
public class SQLParser
{
private IScriptFragment fragment;
public SQLParser(SqlVersion sqlVersion, bool quotedIdentifier, string inputScript)
{
switch (sqlVersion)
{
case SqlVersion.Sql80:
SQLParser80 (quotedIdentifier, inputScript);
break;
case SqlVersion.Sql90:
SQLParser90 (quotedIdentifier, inputScript);
break;
case SqlVersion.Sql100:
SQLParser100 (quotedIdentifier, inputScript);
break;
}
}
private void SQLParser100 (bool quotedIdentifier, string inputScript)
{
TSql100Parser parser = new TSql100Parser(quotedIdentifier);
Parse(parser, inputScript);
}
private void SQLParser90 (bool quotedIdentifier, string inputScript)
{
TSql90Parser parser90 = new TSql90Parser(quotedIdentifier);
Parse(parser90, inputScript);
}
private void SQLParser80 (bool quotedIdentifier, string inputScript)
{
TSql80Parser parser80 = new TSql80Parser(quotedIdentifier);
Parse(parser80, inputScript);
}
private void Parse(TSql100Parser parser, string inputScript)
{
IList<ParseError> errors;
using (StringReader sr = new StringReader(inputScript))
{
fragment = parser.Parse(sr, out errors);
}
if (errors != null && errors.Count > 0)
{
StringBuilder sb = new StringBuilder();
foreach (var error in errors)
{
sb.AppendLine(error.Message);
sb.AppendLine("offset " + error.Offset.ToString());
}
throw new ArgumentException("InvalidSQLScript", sb.ToString());
}
}
private void Parse(TSql90Parser parser, string inputScript)
{
IList<ParseError> errors;
using (StringReader sr = new StringReader(inputScript))
{
fragment = parser.Parse(sr, out errors);
}
if (errors != null && errors.Count > 0)
{
StringBuilder sb = new StringBuilder();
foreach (var error in errors)
{
sb.AppendLine(error.Message);
sb.AppendLine("offset " + error.Offset.ToString());
}
throw new ArgumentException("InvalidSQLScript", sb.ToString());
}
}
private void Parse(TSql80Parser parser, string inputScript)
{
IList<ParseError> errors;
using (StringReader sr = new StringReader(inputScript))
{
fragment = parser.Parse(sr, out errors);
}
if (errors != null && errors.Count > 0)
{
StringBuilder sb = new StringBuilder();
foreach (var error in errors)
{
sb.AppendLine(error.Message);
sb.AppendLine("offset " + error.Offset.ToString());
}
throw new ArgumentException("InvalidSQLScript", sb.ToString());
}
}
public IScriptFragment Fragment
{
get { return fragment; }
}
}
"@
$refs = @("$PSScriptRoot\\Microsoft.Data.Schema.ScriptDom.dll","$PSScriptRoot\\Microsoft.Data.Schema.ScriptDom.Sql.dll")
add-type -ReferencedAssemblies $refs -TypeDefinition $Source -Language CSharpVersion3 -passThru
|
combined_dataset/train/non-malicious/4277.ps1 | 4277.ps1 | function Out-Minidump
{
[CmdletBinding()]
Param (
[Parameter(Position = 0, Mandatory = $True, ValueFromPipeline = $True)]
[System.Diagnostics.Process]
$Process,
[Parameter(Position = 1)]
[ValidateScript({ Test-Path $_ })]
[String]
$DumpFilePath = $PWD
)
BEGIN
{
$WER = [PSObject].Assembly.GetType('System.Management.Automation.WindowsErrorReporting')
$WERNativeMethods = $WER.GetNestedType('NativeMethods', 'NonPublic')
$Flags = [Reflection.BindingFlags] 'NonPublic, Static'
$MiniDumpWriteDump = $WERNativeMethods.GetMethod('MiniDumpWriteDump', $Flags)
$MiniDumpWithFullMemory = [UInt32] 2
}
PROCESS
{
$ProcessId = $Process.Id
$ProcessName = $Process.Name
$ProcessHandle = $Process.Handle
$ProcessFileName = "$($ProcessName)_$($ProcessId).dmp"
$ProcessDumpPath = Join-Path $DumpFilePath $ProcessFileName
$FileStream = New-Object IO.FileStream($ProcessDumpPath, [IO.FileMode]::Create)
$Result = $MiniDumpWriteDump.Invoke($null, @($ProcessHandle,
$ProcessId,
$FileStream.SafeFileHandle,
$MiniDumpWithFullMemory,
[IntPtr]::Zero,
[IntPtr]::Zero,
[IntPtr]::Zero))
$FileStream.Close()
if (-not $Result)
{
$Exception = New-Object ComponentModel.Win32Exception
$ExceptionMessage = "$($Exception.Message) ($($ProcessName):$($ProcessId))"
Remove-Item $ProcessDumpPath -ErrorAction SilentlyContinue
throw $ExceptionMessage
}
else
{
Get-ChildItem $ProcessDumpPath
}
}
END {}
}
|
combined_dataset/train/non-malicious/sample_60_9.ps1 | sample_60_9.ps1 | #
# Module manifest for module 'OCI.PSModules.Objectstorage'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Objectstorage.dll'
# Version number of this module.
ModuleVersion = '90.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '2d17e379-676f-4800-9582-5814d9a8df00'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Objectstorage Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '90.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Objectstorage.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Copy-OCIObjectstorageObject', 'Get-OCIObjectstorageBucket',
'Get-OCIObjectstorageBucketsList',
'Get-OCIObjectstorageMultipartUploadPartsList',
'Get-OCIObjectstorageMultipartUploadsList',
'Get-OCIObjectstorageNamespace',
'Get-OCIObjectstorageNamespaceMetadata',
'Get-OCIObjectstorageObject',
'Get-OCIObjectstorageObjectLifecyclePolicy',
'Get-OCIObjectstorageObjectsList',
'Get-OCIObjectstorageObjectVersionsList',
'Get-OCIObjectstoragePreauthenticatedRequest',
'Get-OCIObjectstoragePreauthenticatedRequestsList',
'Get-OCIObjectstoragePrivateEndpoint',
'Get-OCIObjectstoragePrivateEndpointsList',
'Get-OCIObjectstorageReplicationPoliciesList',
'Get-OCIObjectstorageReplicationPolicy',
'Get-OCIObjectstorageReplicationSourcesList',
'Get-OCIObjectstorageRetentionRule',
'Get-OCIObjectstorageRetentionRulesList',
'Get-OCIObjectstorageWorkRequest',
'Get-OCIObjectstorageWorkRequestErrorsList',
'Get-OCIObjectstorageWorkRequestLogsList',
'Get-OCIObjectstorageWorkRequestsList',
'Invoke-OCIObjectstorageCommitMultipartUpload',
'Invoke-OCIObjectstorageHeadBucket',
'Invoke-OCIObjectstorageHeadObject',
'Invoke-OCIObjectstorageMakeBucketWritable',
'Invoke-OCIObjectstorageReencryptBucket',
'Invoke-OCIObjectstorageReencryptObject',
'New-OCIObjectstorageBucket', 'New-OCIObjectstorageMultipartUpload',
'New-OCIObjectstoragePreauthenticatedRequest',
'New-OCIObjectstoragePrivateEndpoint',
'New-OCIObjectstorageReplicationPolicy',
'New-OCIObjectstorageRetentionRule',
'Remove-OCIObjectstorageBucket', 'Remove-OCIObjectstorageObject',
'Remove-OCIObjectstorageObjectLifecyclePolicy',
'Remove-OCIObjectstoragePreauthenticatedRequest',
'Remove-OCIObjectstoragePrivateEndpoint',
'Remove-OCIObjectstorageReplicationPolicy',
'Remove-OCIObjectstorageRetentionRule',
'Rename-OCIObjectstorageObject', 'Restore-OCIObjectstorageObjects',
'Stop-OCIObjectstorageMultipartUpload',
'Stop-OCIObjectstorageWorkRequest', 'Update-OCIObjectstorageBucket',
'Update-OCIObjectstorageNamespaceMetadata',
'Update-OCIObjectstoragePrivateEndpoint',
'Update-OCIObjectstorageRetentionRule',
'Update-OCIObjectstorageTier', 'Write-OCIObjectstorageObject',
'Write-OCIObjectstorageObjectLifecyclePolicy',
'Write-OCIObjectstoragePart',
'Write-OCIObjectstorageuploadmanagerObject'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Objectstorage'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/174.ps1 | 174.ps1 |
Start-Job -Name "UpdateHelp" -ScriptBlock { Update-Help -Force } | Out-null
Write-Host "Updating Help in background (Get-Help to check)" -ForegroundColor Yellow
Write-host "PowerShell Version: $($psversiontable.psversion) - ExecutionPolicy: $(Get-ExecutionPolicy)" -ForegroundColor yellow
Set-Location $home\onedrive\scripts\github
Import-Module -Name PSReadline
if(Get-Module -name PSReadline)
{
Set-PSReadlineKeyHandler -Key UpArrow -Function HistorySearchBackward
Set-PSReadlineKeyHandler -Key DownArrow -Function HistorySearchForward
}
Set-Alias -Name npp -Value notepad++.exe
Set-Alias -Name np -Value notepad.exe
if (Test-Path $env:USERPROFILE\OneDrive){$OneDriveRoot = "$env:USERPROFILE\OneDrive"}
function prompt
{
Write-output "PS [LazyWinAdmin.com]> "
}
function Get-ScriptDirectory
{
if ($hostinvocation -ne $null)
{
Split-Path $hostinvocation.MyCommand.path
}
else
{
Split-Path $script:MyInvocation.MyCommand.Path
}
}
$MyInvocation.MyCommand
$currentpath = Get-ScriptDirectory
. (Join-Path -Path $currentpath -ChildPath "\functions\Show-Object.ps1")
. (Join-Path -Path $currentpath -ChildPath "\functions\Connect-Office365.ps1")
. (Join-Path -Path $currentpath -ChildPath "\functions\Test-Port.ps1")
. (Join-Path -Path $currentpath -ChildPath "\functions\Get-NetAccelerator.ps1")
. (Join-Path -Path $currentpath -ChildPath "\functions\Clx.ps1")
. (Join-Path -Path $currentpath -ChildPath "\functions\Test-DatePattern.ps1")
. (Join-Path -Path $currentpath -ChildPath "\functions\View-Cats.ps1")
. (Join-Path -Path $currentpath -ChildPath "\functions\Find-Apartment.ps1")
. (Join-Path -Path $currentpath -ChildPath "\functions\Launch-AzurePortal.ps1")
. (Join-Path -Path $currentpath -ChildPath "\functions\Launch-ExchangeOnline.ps1")
. (Join-Path -Path $currentpath -ChildPath "\functions\Launch-InternetExplorer.ps1")
. (Join-Path -Path $currentpath -ChildPath "\functions\Launch-Office365Admin.ps1")
Get-Command -Module Microsoft*,Cim*,PS*,ISE | Get-Random | Get-Help -ShowWindow
Get-Random -input (Get-Help about*) | Get-Help -ShowWindow
|
combined_dataset/train/non-malicious/3956.ps1 | 3956.ps1 |
function Check-CmdletReturnType
{
param($cmdletName, $cmdletReturn)
$cmdletData = Get-Command $cmdletName;
Assert-NotNull $cmdletData;
[array]$cmdletReturnTypes = $cmdletData.OutputType.Name | Foreach-Object { return ($_ -replace "Microsoft.Azure.Commands.Network.Models.","") };
[array]$cmdletReturnTypes = $cmdletReturnTypes | Foreach-Object { return ($_ -replace "System.","") };
$realReturnType = $cmdletReturn.GetType().Name -replace "Microsoft.Azure.Commands.Network.Models.","";
return $cmdletReturnTypes -contains $realReturnType;
}
function Test-RouteTableCRUDMinimalParameters
{
$rgname = Get-ResourceGroupName;
$rglocation = Get-ProviderLocation ResourceManagement;
$rname = Get-ResourceName;
$location = Get-ProviderLocation "Microsoft.Network/routeTables";
$RouteName = "RouteName";
$RouteAddressPrefix = "10.0.0.0/8";
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation;
$Route = New-AzRouteConfig -Name $RouteName -AddressPrefix $RouteAddressPrefix;
$vRouteTable = New-AzRouteTable -ResourceGroupName $rgname -Name $rname -Location $location -Route $Route;
Assert-NotNull $vRouteTable;
Assert-True { Check-CmdletReturnType "New-AzRouteTable" $vRouteTable };
Assert-NotNull $vRouteTable.Routes;
Assert-True { $vRouteTable.Routes.Length -gt 0 };
Assert-AreEqual $rname $vRouteTable.Name;
$vRouteTable = Get-AzRouteTable -ResourceGroupName $rgname -Name $rname;
Assert-NotNull $vRouteTable;
Assert-True { Check-CmdletReturnType "Get-AzRouteTable" $vRouteTable };
Assert-AreEqual $rname $vRouteTable.Name;
$listRouteTable = Get-AzRouteTable -ResourceGroupName $rgname;
Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$listRouteTable = Get-AzRouteTable;
Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$listRouteTable = Get-AzRouteTable -ResourceGroupName "*";
Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$listRouteTable = Get-AzRouteTable -Name "*";
Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$listRouteTable = Get-AzRouteTable -ResourceGroupName "*" -Name "*";
Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$job = Remove-AzRouteTable -ResourceGroupName $rgname -Name $rname -PassThru -Force -AsJob;
$job | Wait-Job;
$removeRouteTable = $job | Receive-Job;
Assert-AreEqual $true $removeRouteTable;
Assert-ThrowsContains { Get-AzRouteTable -ResourceGroupName $rgname -Name $rname } "not found";
}
finally
{
Clean-ResourceGroup $rgname;
}
}
function Test-RouteTableCRUDAllParameters
{
$rgname = Get-ResourceGroupName;
$rglocation = Get-ProviderLocation ResourceManagement;
$rname = Get-ResourceName;
$location = Get-ProviderLocation "Microsoft.Network/routeTables";
$Tag = @{tag1='test'};
$TagSet = @{tag2='testSet'};
$RouteName = "RouteName";
$RouteAddressPrefix = "10.0.0.0/8";
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation;
$Route = New-AzRouteConfig -Name $RouteName -AddressPrefix $RouteAddressPrefix;
$vRouteTable = New-AzRouteTable -ResourceGroupName $rgname -Name $rname -Location $location -Route $Route -Tag $Tag;
Assert-NotNull $vRouteTable;
Assert-True { Check-CmdletReturnType "New-AzRouteTable" $vRouteTable };
Assert-NotNull $vRouteTable.Routes;
Assert-True { $vRouteTable.Routes.Length -gt 0 };
Assert-AreEqual $rname $vRouteTable.Name;
Assert-AreEqualObjectProperties $Tag $vRouteTable.Tag;
$vRouteTable = Get-AzRouteTable -ResourceGroupName $rgname -Name $rname;
Assert-NotNull $vRouteTable;
Assert-True { Check-CmdletReturnType "Get-AzRouteTable" $vRouteTable };
Assert-AreEqual $rname $vRouteTable.Name;
Assert-AreEqualObjectProperties $Tag $vRouteTable.Tag;
$listRouteTable = Get-AzRouteTable -ResourceGroupName $rgname;
Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$listRouteTable = Get-AzRouteTable;
Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$listRouteTable = Get-AzRouteTable -ResourceGroupName "*";
Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$listRouteTable = Get-AzRouteTable -Name "*";
Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$listRouteTable = Get-AzRouteTable -ResourceGroupName "*" -Name "*";
Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$vRouteTable.Tag = $TagSet;
$vRouteTable = Set-AzRouteTable -RouteTable $vRouteTable;
Assert-NotNull $vRouteTable;
Assert-True { Check-CmdletReturnType "Set-AzRouteTable" $vRouteTable };
Assert-AreEqual $rname $vRouteTable.Name;
Assert-AreEqualObjectProperties $TagSet $vRouteTable.Tag;
$vRouteTable = Get-AzRouteTable -ResourceGroupName $rgname -Name $rname;
Assert-NotNull $vRouteTable;
Assert-True { Check-CmdletReturnType "Get-AzRouteTable" $vRouteTable };
Assert-AreEqual $rname $vRouteTable.Name;
Assert-AreEqualObjectProperties $TagSet $vRouteTable.Tag;
$listRouteTable = Get-AzRouteTable -ResourceGroupName $rgname;
Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$listRouteTable = Get-AzRouteTable;
Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$listRouteTable = Get-AzRouteTable -ResourceGroupName "*";
Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$listRouteTable = Get-AzRouteTable -Name "*";
Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$listRouteTable = Get-AzRouteTable -ResourceGroupName "*" -Name "*";
Assert-NotNull ($listRouteTable | Where-Object { $_.ResourceGroupName -eq $rgname -and $_.Name -eq $rname });
$job = Remove-AzRouteTable -ResourceGroupName $rgname -Name $rname -PassThru -Force -AsJob;
$job | Wait-Job;
$removeRouteTable = $job | Receive-Job;
Assert-AreEqual $true $removeRouteTable;
Assert-ThrowsContains { Get-AzRouteTable -ResourceGroupName $rgname -Name $rname } "not found";
Assert-ThrowsContains { Set-AzRouteTable -RouteTable $vRouteTable } "not found";
}
finally
{
Clean-ResourceGroup $rgname;
}
}
function Test-RouteCRUDMinimalParameters
{
$rgname = Get-ResourceGroupName;
$rglocation = Get-ProviderLocation ResourceManagement;
$rname = Get-ResourceName;
$rnameAdd = "${rname}Add";
$location = Get-ProviderLocation "Microsoft.Network/routeTables";
$AddressPrefix = "10.0.0.0/8";
$AddressPrefixSet = "11.0.0.0/8";
$AddressPrefixAdd = "12.0.0.0/8";
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation;
$vRoute = New-AzRouteConfig -Name $rname -AddressPrefix $AddressPrefix;
Assert-NotNull $vRoute;
Assert-True { Check-CmdletReturnType "New-AzRouteConfig" $vRoute };
$vRouteTable = New-AzRouteTable -ResourceGroupName $rgname -Name $rname -Route $vRoute -Location $location;
Assert-NotNull $vRouteTable;
Assert-AreEqual $rname $vRoute.Name;
Assert-AreEqual $AddressPrefix $vRoute.AddressPrefix;
$vRoute = Get-AzRouteConfig -RouteTable $vRouteTable -Name $rname;
Assert-NotNull $vRoute;
Assert-True { Check-CmdletReturnType "Get-AzRouteConfig" $vRoute };
Assert-AreEqual $rname $vRoute.Name;
Assert-AreEqual $AddressPrefix $vRoute.AddressPrefix;
$listRoute = Get-AzRouteConfig -RouteTable $vRouteTable;
Assert-NotNull ($listRoute | Where-Object { $_.Name -eq $rname });
$vRouteTable = Set-AzRouteConfig -Name $rname -RouteTable $vRouteTable -AddressPrefix $AddressPrefixSet;
Assert-NotNull $vRouteTable;
$vRouteTable = Set-AzRouteTable -RouteTable $vRouteTable;
Assert-NotNull $vRouteTable;
$vRoute = Get-AzRouteConfig -RouteTable $vRouteTable -Name $rname;
Assert-NotNull $vRoute;
Assert-True { Check-CmdletReturnType "Get-AzRouteConfig" $vRoute };
Assert-AreEqual $rname $vRoute.Name;
Assert-AreEqual $AddressPrefixSet $vRoute.AddressPrefix;
$listRoute = Get-AzRouteConfig -RouteTable $vRouteTable;
Assert-NotNull ($listRoute | Where-Object { $_.Name -eq $rname });
$vRouteTable = Add-AzRouteConfig -Name $rnameAdd -RouteTable $vRouteTable -AddressPrefix $AddressPrefixAdd;
Assert-NotNull $vRouteTable;
$vRouteTable = Set-AzRouteTable -RouteTable $vRouteTable;
Assert-NotNull $vRouteTable;
$vRoute = Get-AzRouteConfig -RouteTable $vRouteTable -Name $rnameAdd;
Assert-NotNull $vRoute;
Assert-True { Check-CmdletReturnType "Get-AzRouteConfig" $vRoute };
Assert-AreEqual $rnameAdd $vRoute.Name;
Assert-AreEqual $AddressPrefixAdd $vRoute.AddressPrefix;
$listRoute = Get-AzRouteConfig -RouteTable $vRouteTable;
Assert-NotNull ($listRoute | Where-Object { $_.Name -eq $rnameAdd });
Assert-ThrowsContains { Add-AzRouteConfig -Name $rnameAdd -RouteTable $vRouteTable -AddressPrefix $AddressPrefixAdd } "already exists";
$vRouteTable = Remove-AzRouteConfig -RouteTable $vRouteTable -Name $rnameAdd;
$vRouteTable = Remove-AzRouteConfig -RouteTable $vRouteTable -Name $rname;
$vRouteTable = Remove-AzRouteConfig -RouteTable $vRouteTable -Name $rname;
$vRouteTable = Set-AzRouteTable -RouteTable $vRouteTable;
Assert-NotNull $vRouteTable;
Assert-ThrowsContains { Get-AzRouteConfig -RouteTable $vRouteTable -Name $rname } "Sequence contains no matching element";
Assert-ThrowsContains { Set-AzRouteConfig -Name $rname -RouteTable $vRouteTable -AddressPrefix $AddressPrefixSet } "does not exist";
}
finally
{
Clean-ResourceGroup $rgname;
}
}
function Test-RouteCRUDAllParameters
{
$rgname = Get-ResourceGroupName;
$rglocation = Get-ProviderLocation ResourceManagement;
$rname = Get-ResourceName;
$rnameAdd = "${rname}Add";
$location = Get-ProviderLocation "Microsoft.Network/routeTables";
$AddressPrefix = "10.0.0.0/8";
$NextHopType = "VirtualNetworkGateway";
$AddressPrefixSet = "11.0.0.0/8";
$NextHopTypeSet = "VnetLocal";
$AddressPrefixAdd = "12.0.0.0/8";
$NextHopTypeAdd = "VnetLocal";
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation;
$vRoute = New-AzRouteConfig -Name $rname -AddressPrefix $AddressPrefix -NextHopType $NextHopType;
Assert-NotNull $vRoute;
Assert-True { Check-CmdletReturnType "New-AzRouteConfig" $vRoute };
$vRouteTable = New-AzRouteTable -ResourceGroupName $rgname -Name $rname -Route $vRoute -Location $location;
Assert-NotNull $vRouteTable;
Assert-AreEqual $rname $vRoute.Name;
Assert-AreEqual $AddressPrefix $vRoute.AddressPrefix;
Assert-AreEqual $NextHopType $vRoute.NextHopType;
$vRoute = Get-AzRouteConfig -RouteTable $vRouteTable -Name $rname;
Assert-NotNull $vRoute;
Assert-True { Check-CmdletReturnType "Get-AzRouteConfig" $vRoute };
Assert-AreEqual $rname $vRoute.Name;
Assert-AreEqual $AddressPrefix $vRoute.AddressPrefix;
Assert-AreEqual $NextHopType $vRoute.NextHopType;
$listRoute = Get-AzRouteConfig -RouteTable $vRouteTable;
Assert-NotNull ($listRoute | Where-Object { $_.Name -eq $rname });
$vRouteTable = Set-AzRouteConfig -Name $rname -RouteTable $vRouteTable -AddressPrefix $AddressPrefixSet -NextHopType $NextHopTypeSet;
Assert-NotNull $vRouteTable;
$vRouteTable = Set-AzRouteTable -RouteTable $vRouteTable;
Assert-NotNull $vRouteTable;
$vRoute = Get-AzRouteConfig -RouteTable $vRouteTable -Name $rname;
Assert-NotNull $vRoute;
Assert-True { Check-CmdletReturnType "Get-AzRouteConfig" $vRoute };
Assert-AreEqual $rname $vRoute.Name;
Assert-AreEqual $AddressPrefixSet $vRoute.AddressPrefix;
Assert-AreEqual $NextHopTypeSet $vRoute.NextHopType;
$listRoute = Get-AzRouteConfig -RouteTable $vRouteTable;
Assert-NotNull ($listRoute | Where-Object { $_.Name -eq $rname });
$vRouteTable = Add-AzRouteConfig -Name $rnameAdd -RouteTable $vRouteTable -AddressPrefix $AddressPrefixAdd -NextHopType $NextHopTypeAdd;
Assert-NotNull $vRouteTable;
$vRouteTable = Set-AzRouteTable -RouteTable $vRouteTable;
Assert-NotNull $vRouteTable;
$vRoute = Get-AzRouteConfig -RouteTable $vRouteTable -Name $rnameAdd;
Assert-NotNull $vRoute;
Assert-True { Check-CmdletReturnType "Get-AzRouteConfig" $vRoute };
Assert-AreEqual $rnameAdd $vRoute.Name;
Assert-AreEqual $AddressPrefixAdd $vRoute.AddressPrefix;
Assert-AreEqual $NextHopTypeAdd $vRoute.NextHopType;
$listRoute = Get-AzRouteConfig -RouteTable $vRouteTable;
Assert-NotNull ($listRoute | Where-Object { $_.Name -eq $rnameAdd });
Assert-ThrowsContains { Add-AzRouteConfig -Name $rnameAdd -RouteTable $vRouteTable -AddressPrefix $AddressPrefixAdd -NextHopType $NextHopTypeAdd } "already exists";
$vRouteTable = Remove-AzRouteConfig -RouteTable $vRouteTable -Name $rnameAdd;
$vRouteTable = Remove-AzRouteConfig -RouteTable $vRouteTable -Name $rname;
$vRouteTable = Remove-AzRouteConfig -RouteTable $vRouteTable -Name $rname;
$vRouteTable = Set-AzRouteTable -RouteTable $vRouteTable;
Assert-NotNull $vRouteTable;
Assert-ThrowsContains { Get-AzRouteConfig -RouteTable $vRouteTable -Name $rname } "Sequence contains no matching element";
Assert-ThrowsContains { Set-AzRouteConfig -Name $rname -RouteTable $vRouteTable -AddressPrefix $AddressPrefixSet -NextHopType $NextHopTypeSet } "does not exist";
}
finally
{
Clean-ResourceGroup $rgname;
}
}
|
combined_dataset/train/non-malicious/1904.ps1 | 1904.ps1 |
Describe "Debug-Runspace" -tag "CI" {
BeforeAll {
$rs1 = [runspacefactory]::CreateRunspace()
$rs1.Open()
$rs1.Name = "MyRunspace1"
$rs2 = [runspacefactory]::CreateRunspace()
$rs2.Open()
$rs2.Name = "MyRunspace2"
}
AfterAll {
if ( $rs1 ) { $rs1.Dispose() }
if ( $rs2 ) { $rs2.Dispose() }
}
It "Debugging a runspace should fail if the name is ambiguous" {
{ Debug-Runspace -Name "My*" -ErrorAction stop } | Should -Throw -ErrorId "DebugRunspaceTooManyRunspaceFound,Microsoft.PowerShell.Commands.DebugRunspaceCommand"
}
It "Debugging a runspace should fail if the name is not found" {
{ Debug-Runspace -Name "dflkjsdkfjldkjssldfj" -ErrorAction stop } | Should -Throw -ErrorId "DebugRunspaceNoRunspaceFound,Microsoft.PowerShell.Commands.DebugRunspaceCommand"
}
It "Debugging a runspace should fail if the runspace is not open" {
$rs2.Close()
{ Debug-Runspace -runspace $rs2 -ErrorAction stop } | Should -Throw -ErrorId "InvalidOperation,Microsoft.PowerShell.Commands.DebugRunspaceCommand"
}
It "Debugging a runspace should fail if the runspace has no debugger" {
$rs1.Debugger.SetDebugMode("None")
{ Debug-Runspace -runspace $rs1 -ErrorAction stop } | Should -Throw -ErrorId "InvalidOperation,Microsoft.PowerShell.Commands.DebugRunspaceCommand"
}
}
|
combined_dataset/train/non-malicious/sample_55_93.ps1 | sample_55_93.ps1 | #
# Module manifest for module 'OCI.PSModules.Cloudguard'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Cloudguard.dll'
# Version number of this module.
ModuleVersion = '85.2.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '416303ec-c9d6-4a65-8413-14973e520be8'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Cloudguard Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.2.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Cloudguard.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCICloudguardCompartment', 'Get-OCICloudguardAdhocQueriesList',
'Get-OCICloudguardAdhocQuery',
'Get-OCICloudguardAdhocQueryResultContent',
'Get-OCICloudguardAdhocQueryResultsList',
'Get-OCICloudguardConditionMetadataType',
'Get-OCICloudguardConditionMetadataTypesList',
'Get-OCICloudguardConfiguration', 'Get-OCICloudguardDataMaskRule',
'Get-OCICloudguardDataMaskRulesList', 'Get-OCICloudguardDataSource',
'Get-OCICloudguardDataSourceEventsList',
'Get-OCICloudguardDataSourcesList', 'Get-OCICloudguardDetector',
'Get-OCICloudguardDetectorRecipe',
'Get-OCICloudguardDetectorRecipeDetectorRule',
'Get-OCICloudguardDetectorRecipeDetectorRulesList',
'Get-OCICloudguardDetectorRecipesList',
'Get-OCICloudguardDetectorRule',
'Get-OCICloudguardDetectorRulesList',
'Get-OCICloudguardDetectorsList',
'Get-OCICloudguardImpactedResourcesList',
'Get-OCICloudguardManagedList', 'Get-OCICloudguardManagedListsList',
'Get-OCICloudguardManagedListTypesList',
'Get-OCICloudguardPoliciesList', 'Get-OCICloudguardProblem',
'Get-OCICloudguardProblemEndpointsList',
'Get-OCICloudguardProblemEntitiesList',
'Get-OCICloudguardProblemHistoriesList',
'Get-OCICloudguardProblemsList',
'Get-OCICloudguardRecommendationsList', 'Get-OCICloudguardResource',
'Get-OCICloudguardResourcePortsList',
'Get-OCICloudguardResourceProfile',
'Get-OCICloudguardResourceProfileEndpointsList',
'Get-OCICloudguardResourceProfileImpactedResourcesList',
'Get-OCICloudguardResourceProfilesList',
'Get-OCICloudguardResourcesList',
'Get-OCICloudguardResourceTypesList',
'Get-OCICloudguardResourceVulnerabilitiesList',
'Get-OCICloudguardResourceVulnerability',
'Get-OCICloudguardResponderActivitiesList',
'Get-OCICloudguardResponderExecution',
'Get-OCICloudguardResponderExecutionsList',
'Get-OCICloudguardResponderRecipe',
'Get-OCICloudguardResponderRecipeResponderRule',
'Get-OCICloudguardResponderRecipeResponderRulesList',
'Get-OCICloudguardResponderRecipesList',
'Get-OCICloudguardResponderRule',
'Get-OCICloudguardResponderRulesList',
'Get-OCICloudguardSavedQueriesList', 'Get-OCICloudguardSavedQuery',
'Get-OCICloudguardSecurityPoliciesList',
'Get-OCICloudguardSecurityPolicy',
'Get-OCICloudguardSecurityRecipe',
'Get-OCICloudguardSecurityRecipesList',
'Get-OCICloudguardSecurityZone',
'Get-OCICloudguardSecurityZonesList', 'Get-OCICloudguardSighting',
'Get-OCICloudguardSightingEndpointsList',
'Get-OCICloudguardSightingImpactedResourcesList',
'Get-OCICloudguardSightingsList', 'Get-OCICloudguardTacticsList',
'Get-OCICloudguardTarget', 'Get-OCICloudguardTargetDetectorRecipe',
'Get-OCICloudguardTargetDetectorRecipeDetectorRule',
'Get-OCICloudguardTargetDetectorRecipeDetectorRulesList',
'Get-OCICloudguardTargetDetectorRecipesList',
'Get-OCICloudguardTargetResponderRecipe',
'Get-OCICloudguardTargetResponderRecipeResponderRule',
'Get-OCICloudguardTargetResponderRecipeResponderRulesList',
'Get-OCICloudguardTargetResponderRecipesList',
'Get-OCICloudguardTargetsList', 'Get-OCICloudguardTechniquesList',
'Get-OCICloudguardWlpAgent', 'Get-OCICloudguardWlpAgentsList',
'Get-OCICloudguardWorkRequest',
'Get-OCICloudguardWorkRequestErrorsList',
'Get-OCICloudguardWorkRequestLogsList',
'Get-OCICloudguardWorkRequestsList',
'Invoke-OCICloudguardExecuteResponderExecution',
'Invoke-OCICloudguardRequestRiskScores',
'Invoke-OCICloudguardRequestSecurityScores',
'Invoke-OCICloudguardRequestSecurityScoreSummarizedTrend',
'Invoke-OCICloudguardRequestSummarizedActivityProblems',
'Invoke-OCICloudguardRequestSummarizedProblems',
'Invoke-OCICloudguardRequestSummarizedResponderExecutions',
'Invoke-OCICloudguardRequestSummarizedRiskScores',
'Invoke-OCICloudguardRequestSummarizedSecurityScores',
'Invoke-OCICloudguardRequestSummarizedTopTrendResourceProfileRiskScores',
'Invoke-OCICloudguardRequestSummarizedTrendProblems',
'Invoke-OCICloudguardRequestSummarizedTrendResourceRiskScores',
'Invoke-OCICloudguardRequestSummarizedTrendResponderExecutions',
'Invoke-OCICloudguardRequestSummarizedTrendSecurityScores',
'Invoke-OCICloudguardSkipBulkResponderExecution',
'Invoke-OCICloudguardSkipResponderExecution',
'Invoke-OCICloudguardTriggerResponder',
'Move-OCICloudguardDataSourceCompartment',
'Move-OCICloudguardDetectorRecipeCompartment',
'Move-OCICloudguardManagedListCompartment',
'Move-OCICloudguardResponderRecipeCompartment',
'Move-OCICloudguardSavedQueryCompartment',
'Move-OCICloudguardSecurityRecipeCompartment',
'Move-OCICloudguardSecurityZoneCompartment',
'New-OCICloudguardAdhocQuery', 'New-OCICloudguardDataMaskRule',
'New-OCICloudguardDataSource', 'New-OCICloudguardDetectorRecipe',
'New-OCICloudguardDetectorRecipeDetectorRule',
'New-OCICloudguardManagedList', 'New-OCICloudguardResponderRecipe',
'New-OCICloudguardSavedQuery', 'New-OCICloudguardSecurityRecipe',
'New-OCICloudguardSecurityZone', 'New-OCICloudguardTarget',
'New-OCICloudguardTargetDetectorRecipe',
'New-OCICloudguardTargetResponderRecipe',
'New-OCICloudguardWlpAgent', 'Remove-OCICloudguardAdhocQuery',
'Remove-OCICloudguardCompartment',
'Remove-OCICloudguardDataMaskRule',
'Remove-OCICloudguardDataSource',
'Remove-OCICloudguardDetectorRecipe',
'Remove-OCICloudguardDetectorRecipeDetectorRule',
'Remove-OCICloudguardDetectorRecipeDetectorRuleDataSource',
'Remove-OCICloudguardManagedList',
'Remove-OCICloudguardResponderRecipe',
'Remove-OCICloudguardSavedQuery',
'Remove-OCICloudguardSecurityRecipe',
'Remove-OCICloudguardSecurityZone', 'Remove-OCICloudguardTarget',
'Remove-OCICloudguardTargetDetectorRecipe',
'Remove-OCICloudguardTargetResponderRecipe',
'Remove-OCICloudguardWlpAgent', 'Stop-OCICloudguardWorkRequest',
'Update-OCICloudguardBulkProblemStatus',
'Update-OCICloudguardConfiguration',
'Update-OCICloudguardDataMaskRule',
'Update-OCICloudguardDataSource',
'Update-OCICloudguardDetectorRecipe',
'Update-OCICloudguardDetectorRecipeDetectorRule',
'Update-OCICloudguardManagedList',
'Update-OCICloudguardProblemStatus',
'Update-OCICloudguardResponderRecipe',
'Update-OCICloudguardResponderRecipeResponderRule',
'Update-OCICloudguardSavedQuery',
'Update-OCICloudguardSecurityRecipe',
'Update-OCICloudguardSecurityZone', 'Update-OCICloudguardTarget',
'Update-OCICloudguardTargetDetectorRecipe',
'Update-OCICloudguardTargetDetectorRecipeDetectorRule',
'Update-OCICloudguardTargetResponderRecipe',
'Update-OCICloudguardTargetResponderRecipeResponderRule',
'Update-OCICloudguardWlpAgent'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Cloudguard'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.rst'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/01fef1f2-03fd-4b4d-bed8-aa3c4999fedc.ps1 | 01fef1f2-03fd-4b4d-bed8-aa3c4999fedc.ps1 | Connect-VIServer <vCenter server>
# Uncomment the next line to test this script
# $WhatIfPreference = $true
if (-not (Get-PSSnapin VMware.VimAutomation.Core -ErrorAction SilentlyContinue)) {
Add-PSSnapin VMware.VimAutomation.Core
}
if (-not (Get-PSSnapin Quest.ActiveRoles.ADManagement -ErrorAction SilentlyContinue)) {
Add-PSSnapin Quest.ActiveRoles.ADManagement
}
$VMs = Get-Cluster -Name <Cluster name> | Get-VM | Sort Name
$VM = $VMs | Select -First 1
If (-not $vm.CustomFields.ContainsKey("CreatedBy")) {
Write-Host "Creating CreatedBy Custom field for all VM's"
New-CustomAttribute -TargetType VirtualMachine -Name CreatedBy | Out-Null
}
If (-not $vm.CustomFields.ContainsKey("CreatedOn")) {
Write-Host "Creating CreatedOn Custom field for all VM's"
New-CustomAttribute -TargetType VirtualMachine -Name CreatedOn | Out-Null
}
Foreach ($VM in $VMs){
If ($vm.CustomFields["CreatedBy"] -eq $null -or $vm.CustomFields["CreatedBy"] -eq ""){
Write-Host "Finding creator for $vm"
$Event = $VM | Get-VIEvent -Types Info | Where { $_.Gettype().Name -eq "VmBeingDeployedEvent" -or $_.Gettype().Name -eq "VmCreatedEvent" -or $_.Gettype().Name -eq "VmRegisteredEvent" -or $_.Gettype().Name -eq "VmClonedEvent"}
If (($Event | Measure-Object).Count -eq 0){
$User = "Unknown"
$Created = "Unknown"
} Else {
If ($Event.Username -eq "" -or $Event.Username -eq $null) {
$User = "Unknown"
} Else {
$User = (Get-QADUser -Identity $Event.Username).DisplayName
if ($User -eq $null -or $User -eq ""){
$User = $Event.Username
}
$Created = $Event.CreatedTime
}
}
Write "Adding info to $($VM.Name)"
Write-Host -ForegroundColor Yellow "CreatedBy $User"
$VM | Set-Annotation -CustomAttribute "CreatedBy" -Value $User | Out-Null
Write-Host -ForegroundColor Yellow "CreatedOn $Created"
$VM | Set-Annotation -CustomAttribute "CreatedOn" -Value $Created | Out-Null
}
}
|
combined_dataset/train/non-malicious/sample_10_87.ps1 | sample_10_87.ps1 | #************************************************
# TS_4KDriveInfo.ps1
# Version 1.0.2
# Date: 03-21-2011
# Author: Andre Teixeira - andret@microsoft.com
# Description: This script detects 4KB/ 512e drive informaiton
#************************************************
# 2023-02-20 WalterE mod Trap #we#
trap [Exception]{
WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue
Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_"
}
[string]$typeDefinition = @"
using System;
using System.Runtime.InteropServices;
using Microsoft.Win32.SafeHandles;
using System.ComponentModel;
namespace Microsoft.DeviceIoControl
{
internal static class NativeMethods
{
[DllImport("kernel32.dll", EntryPoint = "CreateFileW", SetLastError = true, CharSet = CharSet.Unicode,
ExactSpelling = true, CallingConvention = CallingConvention.StdCall)]
internal static extern IntPtr CreateFile(string fileName,
int desiredAccess,
int sharedMode,
IntPtr securityAttributes,
int creationDisposition,
int flagsandAttributes,
IntPtr templatFile);
[DllImport("kernel32.dll", ExactSpelling = true, EntryPoint = "DeviceIoControl", CallingConvention = CallingConvention.StdCall, SetLastError = true)]
internal static extern bool DeviceIoControl(IntPtr device,
int ioControlCode,
IntPtr inBuffer,
int inBufferSize,
IntPtr outBuffer,
int outputBufferSize,
out int bytesReturned,
IntPtr ignore);
internal static readonly IntPtr INVALID_HANDLE_VALUE = (IntPtr)(-1);
[DllImport("kernel32.dll")]
internal static extern void ZeroMemory(IntPtr destination, int size);
}
public class SectorSize
{
[StructLayout(LayoutKind.Sequential)]
public struct STORAGE_ACCESS_ALIGNMENT_DESCRIPTOR
{
public int Version;
public int Size;
public int BytesPerCacheLine;
public int BytesOffsetForCacheAlignment;
public int BytesPerLogicalSector;
public int BytesPerPhysicalSector;
public int BytesOffsetForSectorAlignment;
}
public enum STORAGE_PROPERTY_ID
{
StorageDeviceProperty = 0,
StorageAdapterProperty,
StorageDeviceIdProperty,
StorageDeviceUniqueIdProperty, // See storduid.h for details
StorageDeviceWriteCacheProperty,
StorageMiniportProperty,
StorageAccessAlignmentProperty = 6,
StorageDeviceSeekPenaltyProperty,
StorageDeviceTrimProperty,
StorageDeviceWriteAggregationProperty
}
public enum STORAGE_QUERY_TYPE {
PropertyStandardQuery = 0,
PropertyExistsQuery,
PropertyMaskQuery,
PropertyQueryMaxDefined
}
[StructLayout(LayoutKind.Sequential)]
public struct STORAGE_PROPERTY_QUERY
{
public STORAGE_PROPERTY_ID PropertyId;
public STORAGE_QUERY_TYPE QueryType;
public IntPtr AdditionalParameters;
}
private const int GENERIC_READ = -2147483648;
private const int FILE_SHARE_READ = 0x00000001;
private const int FILE_SHARE_WRITE = 0x00000002;
private const int OPEN_EXISTING = 3;
private const int FILE_ATTRIBUTE_NORMAL = 0x00000080;
private const int FSCTL_IS_VOLUME_DIRTY = 589944;
private const int VOLUME_IS_DIRTY = 1;
private const int PropertyStandardQuery = 0;
private const int StorageAccessAlignmentProperty = 6;
public static STORAGE_ACCESS_ALIGNMENT_DESCRIPTOR DetectSectorSize(string devName)
{
string FileName = @"\\.\" + devName;
int bytesReturned;
IntPtr outputBuffer = IntPtr.Zero;
STORAGE_ACCESS_ALIGNMENT_DESCRIPTOR pAlignmentDescriptor = new STORAGE_ACCESS_ALIGNMENT_DESCRIPTOR();
SectorSize.STORAGE_PROPERTY_QUERY StoragePropertQuery = new SectorSize.STORAGE_PROPERTY_QUERY();
StoragePropertQuery.QueryType = SectorSize.STORAGE_QUERY_TYPE.PropertyStandardQuery;
StoragePropertQuery.PropertyId = SectorSize.STORAGE_PROPERTY_ID.StorageAccessAlignmentProperty;
IntPtr hVolume = NativeMethods.CreateFile(FileName, 0, 0, IntPtr.Zero, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, IntPtr.Zero);
if (hVolume != NativeMethods.INVALID_HANDLE_VALUE)
{
outputBuffer = Marshal.AllocHGlobal(Marshal.SizeOf(pAlignmentDescriptor));
NativeMethods.ZeroMemory(outputBuffer, Marshal.SizeOf(pAlignmentDescriptor));
IntPtr outputBufferStoragePropertQuery = Marshal.AllocHGlobal(Marshal.SizeOf(StoragePropertQuery));
Marshal.StructureToPtr(StoragePropertQuery, outputBufferStoragePropertQuery,false);
int IOCTL_STORAGE_QUERY_PROPERTY = 2954240;
bool status = NativeMethods.DeviceIoControl(hVolume,
IOCTL_STORAGE_QUERY_PROPERTY,
outputBufferStoragePropertQuery,
Marshal.SizeOf(StoragePropertQuery),
outputBuffer,
Marshal.SizeOf(pAlignmentDescriptor),
out bytesReturned,
IntPtr.Zero);
if (!status)
{
throw new Win32Exception(Marshal.GetLastWin32Error());
}
pAlignmentDescriptor = (STORAGE_ACCESS_ALIGNMENT_DESCRIPTOR) Marshal.PtrToStructure(outputBuffer, typeof(STORAGE_ACCESS_ALIGNMENT_DESCRIPTOR));
}
return pAlignmentDescriptor;
}
}
}
"@
function FormatBytes{
param ($bytes,$precision='0')
foreach ($i in ("Bytes","KB","MB","GB","TB")) {
if (($bytes -lt 1000) -or ($i -eq "TB")){
$bytes = ($bytes).tostring("F0" + "$precision")
return $bytes + " $i"
}else{
$bytes /= 1KB
}
}
}
Function CheckMinimalFileVersionWithCTS([string] $Binary, $RequiredMajor, $RequiredMinor, $RequiredBuild, $RequiredFileBuild){
$newProductVersion = Get-FileVersionString($Binary)
if((CheckMinimalFileVersion -Binar $Binary -RequiredMajor $RequiredMajor -RequiredMinor $RequiredMinor -RequiredBuild $RequiredBuild -RequiredFileBuild $RequiredFileBuild -LDRGDR) -eq $true){
"[CheckMinimalFileVersion] $Binary version is " + $newProductVersion + " - OK" | WriteTo-StdOut -ShortFormat
return $true
}else{
"[CheckMinimalFileVersion] $Binary version is " + $newProductVersion | WriteTo-StdOut -ShortFormat
add-member -inputobject $KB982018Binaries_Summary -membertype noteproperty -name $Binary -value $newProductVersion
return $false
}
}
Function KB982018IsInstalled(){
if ($OSVersion.Build -le 7601){ #Win7 Service Pack 1 or RTM
#Pre-Win7 SP1 - Need to check if KB 982018 is actually installed
$System32Folder = $Env:windir + "\system32"
if (((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Amdsata.sys" 1 1 2 5) -eq $true) -and
((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Amdxata.sys" 1 1 2 5) -eq $true) -and
((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Nvraid.sys" 10 6 0 18) -eq $true) -and
((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Nvstor.sys" 10 6 0 18) -eq $true) -and
((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Ntfs.sys" 6 1 7600 16778) -eq $true) -and
((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Ntfs.sys" 6 1 7600 20921) -eq $true) -and
((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Ntfs.sys" 6 1 7601 17577) -eq $true) -and
((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Ntfs.sys" 6 1 7601 21680) -eq $true) -and
((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Usbstor.sys" 6 1 7600 16778) -eq $true) -and
((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Usbstor.sys" 6 1 7600 20921) -eq $true) -and
((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Usbstor.sys" 6 1 7601 17577) -eq $true) -and
((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Usbstor.sys" 6 1 7601 21680) -eq $true) -and
((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Storport.sys" 6 1 7601 17577) -eq $true) -and
((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Storport.sys" 6 1 7601 21680) -eq $true) -and
((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Storport.sys" 6 1 7600 16778) -eq $true) -and
((CheckMinimalFileVersionWithCTS "$System32Folder\Drivers\Storport.sys" 6 1 7600 20921) -eq $true)
)
{
#Everything is fine
return $true
}else{
return $false
}
}else{
#SP1 is already installed
return $true
}
}
$512eDrivesXML = Join-Path -Path $PWD.Path -ChildPath "512eDrives.xml"
# Windows 8 fully support 4KB drives: http://blogs.msdn.com/b/b8/archive/2011/11/29/enabling-large-disks-and-large-sectors-in-windows-8.aspx
if (($OSVersion.Build -gt 7000) -and ($OSVersion.Build -lt 9000)){
Import-LocalizedData -BindingVariable AdvDrivesString
$4KBDriveE = @()
$4KBDriveN = @()
if (Test-Path $512eDrivesXML){
$512eDrivesXML | Remove-Item -Force -ErrorAction Continue
}
Write-DiagProgress -Activity $AdvDrivesString.ID_CheckingDriveSize
$StorageType = Add-Type -TypeDefinition $typeDefinition -PassThru
$AlignmentDescriptor = $StorageType::STORAGE_ACCESS_ALIGNMENT_DESCRIPTOR
#$AlignmentDescriptor = $StorageType[1]::DetectSectorSize("C:")
#$devices = (Get-CimInstance -query "Select DeviceID from Win32_LogicalDisk WHERE ((MediaType=12) or (MediaType=11)) and ((DriveType=3) or (DriveType=2))")
$devices = (Get-CimInstance -query "Select DeviceID, Model, InterfaceType, Size, BytesPerSector, MediaType from Win32_DiskDrive where ConfigManagerErrorCode=0 and MediaLoaded = true and SectorsPerTrack > 0")
if($null -ne $devices){
$4KDriveDetected = $false
$SectorSize_Summary = new-object PSObject
$4KDrive_Summary = new-object PSObject
$KB982018Binaries_Summary = new-object PSObject
$4KNativeDetected = $false
foreach($device in $devices){
trap [Exception]{
$errorMessage = $_.Exception.Message
" Error: " + $errorMessage | WriteTo-StdOut
$_.InvocationInfo | Format-List | out-string | WriteTo-StdOut
WriteTo-ErrorDebugReport -ErrorRecord $_ -InvokeInfo $MyInvocation
$Error.Clear()
continue
}
Write-DiagProgress -Activity $AdvDrivesString.ID_CheckingDriveSize -Status ($AdvDrivesString.ID_4KDriveDetectedDesc -replace ("%Drive%", $device.DeviceID))
$Interface = Get-CimInstance -Query ("ASSOCIATORS OF {Win32_DiskDrive.DeviceID='" + $device.DeviceID + "'} Where ResultClass=Win32_PnPEntity") | ForEach-Object {Get-CimInstance -Query ("ASSOCIATORS OF {Win32_PnPEntity.DeviceID='" + $_.DeviceID + "'} Where ResultClass=CIM_Controller")}
$Partitions = Get-CimInstance -Query ("ASSOCIATORS OF {Win32_DiskDrive.DeviceID='" + $device.DeviceID + "'} Where ResultClass=Win32_DiskPartition")
$DriveLetters = @()
foreach ($Partition in $Partitions){
$Win32Logical = Get-CimInstance -Query ("ASSOCIATORS OF {Win32_DiskPartition.DeviceID='" + $Partition.DeviceID + "'} Where ResultClass=Win32_LogicalDisk")
if ($null -ne $Win32Logical){
$DriveLetters += $Win32Logical.DeviceID
}
}
if ($DriveLetters.Length -gt 0){
$DriveLetterString = "[" + [string]::Join(", ", $DriveLetters) + "]"
$DriveLetters | Export-Clixml -Path $512eDrivesXML
}else{
$DriveLetterString = ""
}
$BytesDisplay = ""
$4KDriveType = ""
"Checking drive: " + $device.DeviceID | WriteTo-StdOut -ShortFormat
"Storage Type: " + $StorageType[1].ToString() | WriteTo-StdOut -ShortFormat
$AlignmentDescriptor = $StorageType[1]::DetectSectorSize($device.DeviceID)
if ($null -ne $AlignmentDescriptor){
$BytesDisplay = ($AlignmentDescriptor.BytesPerPhysicalSector.ToString()) + " Bytes"
}else{
$BytesDisplay = "(Unknown)"
}
$DebugString = " Results for drive " + $device.DeviceID
$DebugString += "`r`n Drive Letter(s) : " + $DriveLetterString
$DebugString += "`r`n Model : " + $device.Model
$DebugString += "`r`n Interface Name : " + $Interface.Name
$DebugString += "`r`n Interface Type : " + $device.InterfaceType
$DebugString += "`r`n Bytes per sector (WMI): " + $device.BytesPerSector
$DebugString += "`r`n BytesPerPhysicalSector: " + $AlignmentDescriptor.BytesPerPhysicalSector
$DebugString += "`r`n BytesPerLogicalSector : " + $AlignmentDescriptor.BytesPerLogicalSector
$DebugString += "`r`n Version : " + $AlignmentDescriptor.Version
$DebugString | WriteTo-StdOut
if (($AlignmentDescriptor.BytesPerPhysicalSector -gt 512) -or ($device.BytesPerSector -ne 512)){
trap [Exception]{
$errorMessage = $_.Exception.Message
" Error: " + $errorMessage | WriteTo-StdOut
$_.InvocationInfo | Format-List | out-string | WriteTo-StdOut
WriteTo-ErrorDebugReport -ErrorRecord $_ -InvokeInfo $MyInvocation
$Error.Clear()
continue
}
#4K Drive
$4KDriveDetected = $true
$InformationCollected = @{"Drive Model"=$device.Model}
$InformationCollected += @{"Device ID"=$device.DeviceID}
$InformationCollected += @{"Drive Letter(s)"=$DriveLetterString}
$InformationCollected += @{"Drive Size"=($device.Size | FormatBytes -precision 2)}
$InformationCollected += @{"Media Type"=$device.MediaType}
$InformationCollected += @{"Drive Type"=$device.InterfaceType}
$InformationCollected += @{"Interface Name"=$Interface.Name}
$InformationCollected += @{"Bytes per sector (Physical)"=$AlignmentDescriptor.BytesPerPhysicalSector}
$InformationCollected += @{"Bytes per sector (Logical)"=$AlignmentDescriptor.BytesPerLogicalSector}
$InformationCollected += @{"Bytes per sector (WMI)"=$device.BytesPerSector}
if (($AlignmentDescriptor.BytesPerPhysicalSector -eq 3072) -or ($device.BytesPerSector -eq 4096)){
# known issue
$BytesDisplay = "Physical: 4KB"
}else{
$BytesDisplay = "Physical: " + ($AlignmentDescriptor.BytesPerPhysicalSector.ToString())
}
if (($AlignmentDescriptor.BytesPerLogicalSector -eq 512) -and ($device.BytesPerSector -eq 512)){
$512EDriveDetected = $true
$4KDriveType = " - Logical: " + $AlignmentDescriptor.BytesPerLogicalSector + " bytes<br/><b>[512e Drive]</b>"
$4KBDriveE += $device.DeviceID
}
elseif ($device.BytesPerSector -eq 4096){
$4KNativeDetected = $true
if ($AlignmentDescriptor.BytesPerPhysicalSector -eq 4096){
$4KDriveType = "Physical: " + ($AlignmentDescriptor.BytesPerPhysicalSector.ToString()) + "<b><font color=`"red`">[4KB Native]</font></b>"
}else{
$4KDriveType = "<b><font color=`"red`">[4KB Native]</font></b>"
}
}else{
$4KNativeDetected = $true
$4KDriveType = " - Logical: " + $AlignmentDescriptor.BytesPerLogicalSector + " bytes<br/><b><font color=`"red`">[4KB Native]</font></b>"
$4KBDriveN += $device.DeviceID
}
}
add-member -inputobject $SectorSize_Summary -membertype noteproperty -name ($device.DeviceID + " " + $DriveLetterString) -value ($BytesDisplay + $4KDriveType)
if ($512EDriveDetected){
Write-GenericMessage -RootCauseID "RC_4KDriveDetected" -PublicContentURL "http://support.microsoft.com/kb/2510009" -Verbosity "Informational" -InformationCollected $InformationCollected -Visibility 4 -MessageVersion 4 -SupportTopicsID 8122
$512EDriveDetected = $false
$RC_4KDriveDetected = $true
}
if ($4KNativeDetected){
Write-GenericMessage -RootCauseID "RC_4KNativeDriveDetected" -PublicContentURL "http://support.microsoft.com/kb/2510009" -Verbosity "Error" -InformationCollected $InformationCollected -MessageVersion 3 -Visibility 4 -MessageVersion 4 -SupportTopicsID 8122
$RC_4KNativeDriveDetected = $true
$4KNativeDetected = $false
}
}
$SectorSize_Summary | ConvertTo-Xml2 | update-diagreport -id 99_SectorSizeSummary -name "Drive Sector Size Information" -verbosity informational
if ($RC_4KDriveDetected){
Update-DiagRootCause -id "RC_4KDriveDetected" -Detected $true
if (-not (KB982018IsInstalled)){
$XMLFileName = "..\KB982018.XML"
($KB982018Binaries_Summary | ConvertTo-Xml2).Save($XMLFileName)
Update-DiagRootCause -id "RC_KB982018IsNotInstalled" -Detected $true
Write-GenericMessage -RootCauseID "RC_KB982018IsNotInstalled" -PublicContentURL "http://support.microsoft.com/kb/982018" -Verbosity "Error" -MessageVersion 3 -Visibility 4 -MessageVersion 3 -SupportTopicsID 8122
}else{
Update-DiagRootCause -Id "RC_KB982018IsNotInstalled" -Detected $false
}
}else{
Update-DiagRootCause -Id "RC_4KDriveDetected" -Detected $false
}
if ($RC_4KNativeDriveDetected){
Update-DiagRootCause -id "RC_4KNativeDriveDetected" -Detected $true
Write-GenericMessage -RootCauseID "RC_4KNativeDriveDetected" -Verbosity "Error" -PublicContentURL "http://support.microsoft.com/kb/2510009" -Visibility 4 -MessageVersion 3 -SupportTopicsID 8122
}else{
Update-DiagRootCause -Id "RC_4KNativeDriveDetected" -Detected $false
}
}
}
# SIG # Begin signature block
# MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAni0HuFySzTagv
# U6b1S+1L94JuKIWEDBmObErBpZGpMaCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEII7p8YyZx9TIdaLntt68JTmP
# P88VROQNjQiSF5g8NOBZMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAqmffHt4erzG336P89JU62dyzpDb7sHnXgch7ao3BHFn2O0NNSHgq1nLa
# 10qKmETkma+s8sZ41/I2hyEpGQV4+9eZoK7NXEq26SZq1SMPASIkKtlWevxs22we
# cmfT3K/cezVfRgoUloP4/oFHa2F3kHFo7aX7GA3tBWC9kwRQKnmZN+rPeQoqbpME
# uza7LgLbCP2qNT1cjdhz5eQrf8FPfMrsu1GdQ8mp8tPosm5JkxvlvoFg1nJaiQbD
# V5nu0MJo4UEce9gOVLwjhkXjYjFveRcQCq5x0TpYENw87QsL4121nHjlbGkOYjLr
# 0G/mpp6nQm9WXFDqckSo4azKtBtH3qGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC
# F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBHvI5Cgkf1pUmigW2Gu1CzL3X7nFdx/zklW5NVQdbyGQIGZv8ZfhGW
# GBMyMDI0MTAyODExNDA0MC4wMzJaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9oMvJmpUXSLBAAEAAAH2MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzEwNFoXDTI1MTAyMjE4MzEwNFowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjZCMDUt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA0UJeLMR/N9WPBZhuKVFF
# +eWJZ68Wujdj4X6JR05cxO5CepNXo17rVazwWLkm5AjaVh19ZVjDChHzimxsoaXx
# Nu8IDggKwpXvpAAItv4Ux50e9S2uVwfKv57p9JKG+Q7VONShujl1NCMkcgSrPdmd
# /8zcsmhzcNobLomrCAIORZ8IwhYy4siVQlf1NKhlyAzmkWJD0N+60IiogFBzg3yI
# SsvroOx0x1xSi2PiRIQlTXE74MggZDIDKqH/hb9FT2kK/nV/aXjuo9LMrrRmn44o
# YYADe/rO95F+SG3uuuhf+H4IriXr0h9ptA6SwHJPS2VmbNWCjQWq5G4YkrcqbPMa
# x7vNXUwu7T65E8fFPd1IuE9RsG4TMAV7XkXBopmPNfvL0hjxg44kpQn384V46o+z
# dQqy5K9dDlWm/J6vZtp5yA1PyD3w+HbGubS0niEQ1L6wGOrPfzIm0FdOn+xFo48E
# Rl+Fxw/3OvXM5CY1EqnzEznPjzJc7OJwhJVR3VQDHjBcEFTOvS9E0diNu1eocw+Z
# Ckz4Pu/oQv+gqU+bfxL8e7PFktfRDlM6FyOzjP4zuI25gD8tO9zJg6g6fRpaZc43
# 9mAbkl3zCVzTLDgchv6SxQajJtvvoQaZxQf0tRiPcbr2HWfMoqqd9uiQ0hTUEhG4
# 4FBSTeUPZeEenRCWadCW4G8CAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRIwZsJuOcJ
# fScPWcXZuBA4B89K8jAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA13kBirH1cHu1
# WYR1ysj125omGtQ0PaQkEzwGb70xtqSoI+svQihsgdTYxaPfp2IVFdgjaMaBi81w
# B8/nu866FfFKKdhdp3wnMZ91PpP4Ooe7Ncf6qICkgSuwgdIdQvqE0h8VQ5QW5sDV
# 4Q0Jnj4f7KHYx4NiM8C4jTw8SQtsuxWiTH2Hikf3QYB71a7dB9zgHOkW0hgUEeWO
# 9mh2wWqYS/Q48ASjOqYw/ha54oVOff22WaoH+/Hxd9NTEU/4vlvsRIMWT0jsnNI7
# 1jVArT4Q9Bt6VShWzyqraE6SKUoZrEwBpVsI0LMg2X3hOLblC1vxM3+wMyOh97aF
# Os7sFnuemtI2Mfj8qg16BZTJxXlpPurWrG+OBj4BoTDkC9AxXYB3yEtuwMs7pRWL
# yxIxw/wV9THKUGm+x+VE0POLwkrSMgjulSXkpfELHWWiCVslJbFIIB/4Alv+jQJS
# KAJuo9CErbm2qeDk/zjJYlYaVGMyKuYZ+uSRVKB2qkEPcEzG1dO9zIa1Mp32J+zz
# W3P7suJfjw62s3hDOLk+6lMQOR04x+2o17G3LceLkkxJm41ErdiTjAmdClen9yl6
# HgMpGS4okjFCJX+CpOFX7gBA3PVxQWubisAQbL5HgTFBtQNEzcCdh1GYw/6nzzNN
# t+0GQnnobBddfOAiqkzvItqXjvGyK1QwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFU9eSpdxs0a06JFIuGFHIj/I+36ggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJ4u8wIhgPMjAyNDEwMjgxMDE2MTVaGA8yMDI0MTAyOTEwMTYxNVowdDA6
# BgorBgEEAYRZCgQBMSwwKjAKAgUA6sni7wIBADAHAgEAAgIV+jAHAgEAAgISoDAK
# AgUA6ss0bwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQBpUFU4+vZJFyUm
# Vb+WZWIYm85wWkaqUQMIXDa89AJRdEINZBYYuKJZHwGXevIycaqI5McGg28UnXlT
# 85+VLHcRb2BqTBqlUDfyWMDDSi4/Ny1o+ihFohhs/ujQuxkh2lsfu3f8RO+rHyvy
# oc6aVYoXpbsYsPsvWhlP5VIY3yXO7ztB9TdvoXXfsSMIGgIOURNjC5+mH+r4R0gk
# grO/9ZkBSWax/DoAQGEOAQy9s6WfhPW9PTxIBkjbYnExw84j1PW/7aPVhavzoHfT
# 0fP7eh9eCNY9ax+AXoa/pOOruFzpjML3/3o9VRglqy6jvcBxO0h6Uf9FkqnHwg7B
# sMcIWiqvMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAH2gy8malRdIsEAAQAAAfYwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgYPTSCsD9E7OU
# lBTBL5TsY3eeAEDQM+Kk0vua1AWulIUwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCArYUzxlF6m5USLS4f8NXL/8aoNEVdsCZRmF+LlQjG2ojCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB9oMvJmpUXSLBAAEAAAH2
# MCIEIFraBgk4xXajMAI68rUQCySUOKGDReEAQUOAuvhIwwAlMA0GCSqGSIb3DQEB
# CwUABIICACndgsc7NqnXf65ZdJxRxeX2isPj9+tR6L80D3b34cuVZIGQRVNyS5Qf
# pRR9zJWEdmuNuH+3Natn72wF2Cz7HB2L0fbF5VledpkNBxs8rvi86OQmWnD3HhCn
# HjUIRyQXBSEgTCaN1bSks0EjeCNokencIh+c7JtmsjA3uolA1r4pSMPWvlx7A7K4
# ewt+Ys5/l+lDa6NhKjaW1LFpwVLT3Wy+zgiqsmUnOjo2HNP1YCTq2YKOSX95WkqY
# odyiWiZTqgIhiTX7ZZ9Ksab1Q6laNWafwY7o8A+NgLlDZILtgFUgWkBUxX3xgdFh
# P2VbCLoTG+Cm/+i95yfcPIy+HLNdAqJjmXiYYNRN251awuBFea5TR56B7DgiO3v0
# aDY9P4hDwNJ0PKrRyq3TgNEeHkTfDUHzwhOq78jzeeWv9XB+DEvAZGTzmur31jEe
# HqSCm7aAG1KTwR6bcX2S4J+DtvXGNRGW+g6tpNpikjP0Y5lh9XvqiNR7OBungnyj
# Fypl26eF9e3hMZYvgLPli9YGPJcQt7RG+WinIPBw0sl77syYJEG32j+Z2Ex0iOoR
# wMcEts2B+ZlK6D7GaOp3K7mgOD3lI7qzUTjJu0OmZMPmkrljKQweti26EBuaUqLR
# Twkc7ZbfN8Ti0waq9cNo3rRtxvumAK/mrgQtEO75NG/zX5ETeAEj
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_50_13.ps1 | sample_50_13.ps1 |
# ----------------------------------------------------------------------------------
#
# Copyright Microsoft Corporation
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Updates a database.
.Description
Updates a database.
.Example
$2ds = New-TimeSpan -Days 2
$4ds = New-TimeSpan -Days 4
Update-AzKustoDatabase -ResourceGroupName testrg -ClusterName testnewkustocluster -Name mykustodatabase -Kind ReadWrite -SoftDeletePeriod $4ds -HotCachePeriod $2ds -Location 'East US' -CallerRole Admin
Kind Location Name Type
---- -------- ---- ----
ReadWrite East US testnewkustocluster/mykustodatabase Microsoft.Kusto/Clusters/Databases
.Link
https://learn.microsoft.com/powershell/module/az.kusto/update-azkustodatabase
#>
function Update-AzKustoDatabase {
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.IDatabase])]
[CmdletBinding(DefaultParameterSetName = 'UpdateExpanded', PositionalBinding = $false, SupportsShouldProcess, ConfirmImpact = 'Medium')]
param(
[Parameter(ParameterSetName = 'UpdateExpanded', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')]
[System.String]
# The name of the Kusto cluster.
${ClusterName},
[Parameter(ParameterSetName = 'UpdateExpanded', Mandatory)]
[Alias('DatabaseName')]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')]
[System.String]
# The name of the database in the Kusto cluster.
${Name},
[Parameter(ParameterSetName = 'UpdateExpanded', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')]
[System.String]
# The name of the resource group containing the Kusto cluster.
${ResourceGroupName},
[Parameter(ParameterSetName = 'UpdateExpanded')]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.DefaultInfo(Script = '(Get-AzContext).Subscription.Id')]
[System.String]
# Gets subscription credentials which uniquely identify Microsoft Azure subscription.
# The subscription ID forms part of the URI for every service call.
${SubscriptionId},
[Parameter(ParameterSetName = 'UpdateViaIdentityExpanded', Mandatory, ValueFromPipeline)]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.IKustoIdentity]
# Identity Parameter
# To construct, see NOTES section for INPUTOBJECT properties and create a hash table.
${InputObject},
[Parameter(Mandatory)]
[ArgumentCompleter( { param ( $CommandName, $ParameterName, $WordToComplete, $CommandAst, $FakeBoundParameters ) return @('ReadWrite', 'ReadOnlyFollowing') })]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Support.Kind]
# Kind of the database
${Kind},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')]
[System.TimeSpan]
# The time the data should be kept in cache for fast queries in TimeSpan.
${HotCachePeriod},
[Parameter(ParameterSetName = 'UpdateExpanded')]
[Parameter(ParameterSetName = 'UpdateViaIdentityExpanded')]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')]
[System.TimeSpan]
# The time the data should be kept before it stops being accessible to queries in TimeSpan.
${SoftDeletePeriod},
[Parameter(ParameterSetName = 'UpdateExpanded')]
[Parameter(ParameterSetName = 'UpdateViaIdentityExpanded')]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')]
[System.String]
# The name of the key vault key.
${KeyVaultPropertyKeyName},
[Parameter(ParameterSetName = 'UpdateExpanded')]
[Parameter(ParameterSetName = 'UpdateViaIdentityExpanded')]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')]
[System.String]
# The Uri of the key vault.
${KeyVaultPropertyKeyVaultUri},
[Parameter(ParameterSetName = 'UpdateExpanded')]
[Parameter(ParameterSetName = 'UpdateViaIdentityExpanded')]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')]
[System.String]
# The version of the key vault key.
${KeyVaultPropertyKeyVersion},
[Parameter(ParameterSetName = 'UpdateExpanded')]
[Parameter(ParameterSetName = 'UpdateViaIdentityExpanded')]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')]
[System.String]
# The user assigned identity (ARM resource id) that has access to the key.
${KeyVaultPropertyUserIdentity},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Query')]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Support.CallerRole]
# By default, any user who run operation on a database become an Admin on it.
# This property allows the caller to exclude the caller from Admins list.
${CallerRole},
[Parameter(Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Body')]
[System.String]
# Resource location.
${Location},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Azure')]
[System.Management.Automation.PSObject]
# The credentials, account, tenant, and subscription used for communication with Azure.
${DefaultProfile},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command as a job
${AsJob},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command asynchronously
${NoWait},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Kusto.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process {
try
{
if ($PSBoundParameters['Kind'] -eq 'ReadWrite')
{
$Parameter = [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.ReadWriteDatabase]::new()
}
else
{
$Parameter = [Microsoft.Azure.PowerShell.Cmdlets.Kusto.Models.Api20230815.ReadOnlyFollowingDatabase]::new()
}
$Parameter.Kind = $PSBoundParameters['Kind']
$null = $PSBoundParameters.Remove('Kind')
if ( $PSBoundParameters.ContainsKey('SoftDeletePeriod'))
{
$Parameter.SoftDeletePeriod = $PSBoundParameters['SoftDeletePeriod']
$null = $PSBoundParameters.Remove('SoftDeletePeriod')
}
if ( $PSBoundParameters.ContainsKey('HotCachePeriod'))
{
$Parameter.HotCachePeriod = $PSBoundParameters['HotCachePeriod']
$null = $PSBoundParameters.Remove('HotCachePeriod')
}
if ( $PSBoundParameters.ContainsKey('KeyVaultPropertyKeyName'))
{
$Parameter.KeyVaultPropertyKeyName = $PSBoundParameters['KeyVaultPropertyKeyName']
$null = $PSBoundParameters.Remove('KeyVaultPropertyKeyName')
}
if ( $PSBoundParameters.ContainsKey('KeyVaultPropertyKeyVaultUri'))
{
$Parameter.KeyVaultPropertyKeyVaultUri = $PSBoundParameters['KeyVaultPropertyKeyVaultUri']
$null = $PSBoundParameters.Remove('KeyVaultPropertyKeyVaultUri')
}
if ( $PSBoundParameters.ContainsKey('KeyVaultPropertyKeyVersion'))
{
$Parameter.KeyVaultPropertyKeyVersion = $PSBoundParameters['KeyVaultPropertyKeyVersion']
$null = $PSBoundParameters.Remove('KeyVaultPropertyKeyVersion')
}
if ( $PSBoundParameters.ContainsKey('KeyVaultPropertyUserIdentity'))
{
$Parameter.KeyVaultPropertyUserIdentity = $PSBoundParameters['KeyVaultPropertyUserIdentity']
$null = $PSBoundParameters.Remove('KeyVaultPropertyUserIdentity')
}
$Parameter.Location = $PSBoundParameters['Location']
$null = $PSBoundParameters.Remove('Location')
$null = $PSBoundParameters.Add('Parameter', $Parameter)
Az.Kusto.internal\Update-AzKustoDatabase @PSBoundParameters
}
catch
{
throw
}
}
}
# SIG # Begin signature block
# MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBthN95BXrcVyYX
# O3idoJrKdyQMvhNtPWHzgXm79X0zL6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEeVU2CUgzAd+DOMyWbBqsTK
# eMClour1pLIBy2sfepb4MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAEJ+E7jUE0/LAoY/DrfQynr9LPw14akMyD4qTy5GYbAUUAv5Mq7X04tXQ
# VfO8qGW+gDkhc47br9Z3nVwYTHN5diuCOcxV6k/Vf0ayX8WfJRWA7YU9hnu/lK+g
# r7qTmN+8whuMwK/xnfhFNHhlZgF4KCjEVHQBmjYWDKINm8xi2mvB83j1ueq0wQuO
# wMnG0w5veBKS3Fax2v0k+9hSPr0dfMq4+u0E6PyPLBSBpfTmk+C1fMCAF5yExopn
# Kev1jLV7fe08124YaMk1HMk93ODMzK0FyYl92wBdrERAAlOc44Xj9Ru58SWY0Gno
# lI9E7XEh8P5Lk8zcroHQZhsetxEnBKGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC
# FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCB4gzMLKmDIF+JNxIKWuoI6K0uggy1XTMwy/vPss8dscgIGZiAgthSr
# GBMyMDI0MDQyMzEzMTUyMS4yMjRaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC
# RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis
# DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI
# ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z
# ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR
# IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE
# lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s
# /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4
# aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB
# fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT
# me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy
# qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui
# hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds
# lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf
# sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t
# Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU
# +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7
# qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6
# Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+
# x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4
# 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5
# ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV
# PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4
# y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk
# 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG
# QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnR3vgwIhgPMjAyNDA0MjMxNTE3MTJaGA8yMDI0MDQyNDE1MTcxMlowdzA9Bgor
# BgEEAYRZCgQBMS8wLTAKAgUA6dHe+AIBADAKAgEAAgIDFQIB/zAHAgEAAgITGDAK
# AgUA6dMweAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBANIiA17LpM6vqyo+
# h2Gy7jS/plK5btuepzPH69HaSSLQgmyHGJti3T4/40Qv/pD1kqx4aZmxSYhfghQx
# G6+5xQrMjXUGVkvkHlGDaCB5PkTFkhEadoG/M8OiSF2z6t1t+B5+UpZHn/ZqMCje
# 0hGMGpF+It3BhOadbdLMLmv1S+e5MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgvRyhSzLPEhx+NuMBWAT8qGEOafT+bSjKWJsxoq/gL5QwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJ
# CI9//zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 4pmZlfHc4yDrAAEAAAHiMCIEIFI9jHTsM+FSP6FMwP2O6Yu7/zJ0dHmtmWF4o2me
# BeYsMA0GCSqGSIb3DQEBCwUABIICAAtda469TveinbRT7QcsaTd8dRKVVILPpArL
# o3Q3BCrdaCM4me1PNboFjrQ6ixirq/3sdcOqxN5RVitRw09BdIWboXD5AWfKVoyF
# 9t4TReFXcC+pafH3LwBYvK8ZDuoIs3hVIJzqMyiElOqkSxszMEebI+XyGjNL2jTh
# 5I6u9LngYqA+y8UFvQYU0igjIltqg0MYIJ/xgwlZJlISbDCKwgwfzFAVDSqjTg40
# OQIfQJ0yXh7gTUvnOyJhvXa76A8jOrfgQv0RxbCFjcnzHyWZvJu8uIri4GkZ0Vpa
# YZMkep1ZghUakIvJAYCg3UTKckyu+ecqc1/Jym1IC/JIuzYPXsrK+pG0UhGTCL3c
# G3TP8UKadvqipRhMgLwtna5CDr/MX0VaWfrDumgyFtniu4P474vqAi727JMOu4xM
# A9xCyJ7Gja3/EyQObYKJmlYuwZDYonZJcx3bHuuvHelZ/1mROPxgihc5COxaS/88
# TnDFhARdJbnzLnZp2cZv6/7tjURmw+sTBNPABHDrni0T0XEVeMOGlyA28vkEjU9X
# e4HwgQ+HOWa3qc1tvd1LF4ymrtmiVZE0jQpmx0Nph/Xl6M5/HVoZvRKK7cmfjsl6
# idgsBqPfFOV+E19VkSd+P6C/dKLkGk/A7uYqhbYQ8Eqe5BEsh/5jmfvmOtbTlpKo
# Y++3ibF+
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_41_72.ps1 | sample_41_72.ps1 | <###################################################
# #
# Copyright (c) Microsoft. All rights reserved. #
# #
##################################################>
Import-Module $PSScriptRoot\Tracer.psm1
$BackupStartedEventLogPattern = "Action {0} started with session name <{1}>, session shell ID {2} and process ID {3}."
$BackupCompletedEventLogPattern = "Action {0} completed with session name <{1}>."
$BackupFailedEventLogPattern = "Action {0} failed with session name <{1}>. Exception: {2}"
$BCDRSessionNameBase = "AzsBCDRSession"
$BCDRLogName = "AzSBCDR"
$BCDRBackupEventSource = "AzSBackupAction"
# TODO: restore actions are not utilizing the action helper at the moment.
$BCDRRestoreEventSource = "AzSRestoreAction"
$BCDRRemoteActionStartedEventId = 1
$BCDRRemoteActionCompletededEventId = 2
$BCDRRemoteActionFailedEventId = 3
# 4 hour session idle timeout
$BCDRRemoteSessionIdleTimeoutInSec = 14400
<#
.Synopsis
Get the BCDR action plan constants
#>
function Get-BCDRActionPlanConsts
{
$consts = @{}
$consts.BackupStartedEventLogPattern = $BackupStartedEventLogPattern
$consts.BackupCompletedEventLogPattern = $BackupCompletedEventLogPattern
$consts.BackupFailedEventLogPattern = $BackupFailedEventLogPattern
$consts.BCDRSessionNameBase = $BCDRSessionNameBase
$consts.BCDRLogName = $BCDRLogName
$consts.BCDRBackupEventSource = $BCDRBackupEventSource
$consts.BCDRRestoreEventSource = $BCDRRestoreEventSource
$consts.BCDRRemoteActionStartedEventId = $BCDRRemoteActionStartedEventId
$consts.BCDRRemoteActionCompletededEventId = $BCDRRemoteActionCompletededEventId
$consts.BCDRRemoteActionFailedEventId = $BCDRRemoteActionFailedEventId
return $consts
}
<#
.Synopsis
Get the BCDR action plan constant
#>
function Get-BCDRActionPlanConst
{
[CmdletBinding()]
Param
(
[Parameter(Mandatory = $true)]
[ValidateSet('BackupStartedEventLogPattern', 'BackupCompletedEventLogPattern', 'BackupFailedEventLogPattern', `
'BCDRSessionNameBase', 'BCDRLogName', 'BCDRBackupEventSource', 'BCDRRestoreEventSource', `
'BCDRRemoteActionStartedEventId', 'BCDRRemoteActionCompletededEventId', 'BCDRRemoteActionFailedEventId')]
[string] $ConstName
)
$consts = Get-BCDRActionPlanConsts
return $consts[$ConstName]
}
<#
.Synopsis
Create event source and log on target VMs
#>
function Ensure-BCDREventLog
{
param
(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $ComputerName,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[PSCredential] $Credential,
[Parameter(Mandatory=$true)]
[string] $EventSource
)
Invoke-Command -ComputerName $ComputerName -Credential $Credential -ArgumentList @($BCDRLogName, $EventSource) `
-ScriptBlock {
param ($BCDRLogName, $EventSource)
if ([System.Diagnostics.EventLog]::SourceExists($EventSource) -eq $false)
{
Trace-Execution "Creating event source $EventSource on event log $BCDRLogName"
[System.Diagnostics.EventLog]::CreateEventSource($EventSource, $BCDRLogName)
Trace-Execution "Event source $EventSource created"
Limit-EventLog -LogName $BCDRLogName -RetentionDays 30
}
}
}
<#
.Synopsis
Get BCDR action event logs with a specific backup from the target VM
#>
function Get-BCDRActionEventLog
{
param
(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $ComputerName,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[PSCredential] $Credential,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $BackupId,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $SessionName
)
return Invoke-Command -ComputerName $ComputerName -Credential $Credential -ArgumentList @($BackupId, $BCDRLogName, $SessionName) -ScriptBlock {
param ($BackupId, $BCDRLogName, $SessionName)
try
{
$logs = Get-EventLog -LogName $BCDRLogName -ErrorAction Stop `
| ? { ($_.Message -like "*$BackupId*") -and ($_.Message -like "*<$SessionName>*") }
# Log the last 5 logs about this backup session for diagnostics
$numHistory = 5
foreach ($log in ($logs | select -First $numHistory))
{
Trace-Execution "Last $numHistory logs for backup $BackupId and session '$SessionName'"
Trace-Execution "$($log.TimeGenerated), EventId: $($log.EventID), Msg: $($log.Message)"
}
return $logs
}
catch
{}
}
}
<#
.Synopsis
Check if the BCDR remote session process still exists and kill the process if requested to
#>
function Check-BCDRSessionProcess
{
param
(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $ComputerName,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[PSCredential] $Credential,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $SessionPid,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[DateTime] $SessionCreationTime,
[switch] $Kill
)
$proc = $null
$retries = 10
while (!$proc)
{
try
{
# Use Invoke-Command instead of 'Get-Process -CompueterName' to make sure process StartTime properties can
# be returned
$proc = Invoke-Command -ComputerName $ComputerName -Credential $Credential -ScriptBlock {
Get-Process -ProcessName 'wsmprovhost' -ErrorAction Stop
}
}
catch
{
$retries--
if ($retries -gt 0)
{
Trace-Execution "Failed to get PowerShell remote host processes on $ComputerName. Exception: $_. Retrying..."
Start-Sleep -s 10
continue
}
throw
}
}
$sessionProc = $proc | ? { ($_.Id -eq $SessionPid)}
if ($sessionProc)
{
# Check the creation time to prevent accidental termination of other processes with the same Pid.
# Session process must be started earlier than session log time. Give it 1 extra second to the session creation
# time because ETL log time has seconds precision while the process start time has milliseconds precision.
$sessionProcStartTimeUTC = $sessionProc.StartTime.ToUniversalTime()
$sessionCreationTimeUTC = $SessionCreationTime.ToUniversalTime().AddSeconds(1)
if ($sessionProcStartTimeUTC -le $sessionCreationTimeUTC)
{
if ($Kill.IsPresent)
{
Invoke-Command -ComputerName $ComputerName -Credential $Credential -ArgumentList @($SessionPid) `
-ScriptBlock {
param ($SessionPid)
Stop-Process -Id $SessionPid -Force -ErrorAction SilentlyContinue
}
}
return $true
}
else
{
Trace-Execution "The process with Id $SessionPid isn't the remote PowerShell host process for this invocation."
Trace-Execution "Session process start time: $sessionProcStartTimeUTC, Session creation time: $sessionCreationTimeUTC"
}
}
else
{
$str = $null
$proc | select Id, ProcessName | % { $str += "($($_.Id), $($_.ProcessName))`n" }
Trace-Execution "All PowerShell remote host processes names on $ComputerName :`n$str"
Trace-Execution "Failed to find a remote PowerShell host process with process Id $SessionPid on $ComputerName."
}
return $false
}
<#
.Synopsis
Check previously started BCDR remote sessions.
The BCDR remote sessions for each role (and each invocation if a role has more than one) are named with this pattern:
'<BCDRSessionNameBase>-<FullRepositoryName>'
This method searches the remote session name on all nodes for the current role, try to get the action status to
determine next actions, and finally clean up the sessions.
#>
function Check-PreviousBCDRSession
{
param
(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string[]] $NodesForCurrentRole,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[PSCredential] $Credential,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $BackupId,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $SessionName,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $SessionInfoEventRegex,
[Parameter(Mandatory=$false)]
$ProvisionedPSSession = $null,
[Parameter(Mandatory=$false)]
[PSCredential] $ProvisionedPSSessionCredential = $null,
[Parameter(Mandatory=$true)]
[uint32] $ExpectedRuntimeInMin,
[Parameter(Mandatory=$true)]
[ref] $ShouldInvokeAction
)
$ShouldInvokeAction.Value = $true
# Test if the session already exists on all the nodes
$sessions = @()
Trace-Execution "Searching for existing PSSessions on $NodesForCurrentRole"
foreach ($Node in $NodesForCurrentRole)
{
if ($ProvisionedPSSessionCredential)
{
$sessions += Get-PSSession -ComputerName $Node -Credential $ProvisionedPSSessionCredential -Name $SessionName -ErrorAction SilentlyContinue
}
else
{
$sessions += Get-PSSession -ComputerName $Node -Credential $Credential -Name $SessionName -ErrorAction SilentlyContinue
}
}
# Make sure to filter out the provisioned PSSession if specified.
Trace-Execution "Found sessions: $sessions"
if ($ProvisionedPSSession)
{
$sessions = $sessions | ? {
if ($ProvisionedPSSession.InstanceId -ne $_.InstanceId)
{
return $true
}
else
{
Trace-Execution "Filter out the provisioned PSSession with ID $($ProvisionedPSSession.InstanceId) from the sessions."
return $false
}
}
}
foreach ($session in $sessions)
{
# Properly working BCDR remote sessions should be in the 'Disconnected' state and ready to be connected
try
{
Trace-Execution "The disconnected remote PSSession '$($session.Name)' exists on $($session.ComputerName)."
Trace-Execution "State: $($session.State), Availability: $($session.Availability), Instance ID: $($session.InstanceId)."
Trace-Execution "Check the previous backup status of BackupID $backupID."
# Get the latest log with this backup ID
$latestLog = Get-BCDRActionEventLog -ComputerName $session.ComputerName -Credential $Credential `
-BackupId $backupId -SessionName $SessionName | select -First 1
if ($latestLog)
{
switch ($latestLog.EventId)
{
# Started
$BCDRRemoteActionStartedEventId
{
$expectedCompletion = $latestLog.TimeGenerated.ToUniversalTime().AddMinutes($ExpectedRuntimeInMin)
Trace-Execution "Action started at UTC $($latestLog.TimeGenerated.ToUniversalTime().ToString())"
Trace-Execution "Expected to complete by UTC $($expectedCompletion.ToUniversalTime().ToString())"
$actionPlanDone = $false
do
{
# Check for completion
$now = Get-Date
Trace-Execution "Current time is UTC $($now.ToUniversalTime().ToString())"
$log = Get-BCDRActionEventLog -ComputerName $session.ComputerName -Credential $Credential `
-BackupId $backupId -SessionName $SessionName | select -First 1
if ($log.EventId -eq $BCDRRemoteActionCompletededEventId)
{
$ShouldInvokeAction.Value = $false
$actionPlanDone = $true
}
elseif ($log.EventId -eq $BCDRRemoteActionFailedEventId)
{
Trace-Execution "The previous action failed, invoking the action again"
$actionPlanDone = $true
}
if ($actionPlanDone)
{
break
}
# Keep waiting
Start-Sleep -Seconds 30
} while ($now -le $expectedCompletion)
if (!$actionPlanDone)
{
Trace-Execution "The previous action plan didn't finish in time, restarting another one."
}
}
# Completed
$BCDRRemoteActionCompletededEventId { $shouldInvokeAction.Value = $false }
# Failed
$BCDRRemoteActionFailedEventId { Trace-Execution "The previous action failed, invoking the action again" }
}
}
break
}
catch
{}
}
if ($sessions)
{
Trace-Execution "Removing the disconnected PSSessions."
$sessions | Remove-PSSession -ErrorAction SilentlyContinue
}
foreach ($Node in $NodesForCurrentRole)
{
try
{
Trace-Execution "Make sure the WSMan instance and the process are both gone on $Node"
$instances = Get-WSManInstance -ConnectionURI "http://$Node`:5985/wsman" shell -Enumerate `
-cred $Credential -ErrorAction SilentlyContinue | ? Name -eq $SessionName
if ($ProvisionedPSSession)
{
$instances = $instances | ? {
if ($ProvisionedPSSession.InstanceId -ne $_.ShellId)
{
return $true
}
else
{
Trace-Execution "Filter out the provisioned PSSession ID $($ProvisionedPSSession.InstanceId) from the instances"
return $false
}
}
}
foreach ($instance in $instances)
{
Trace-Execution "Try to remove the WSMan object with shell ID $($instance.ShellId)"
Remove-WSManInstance -ConnectionURI "http://$Node`:5985/wsman" shell @{ShellID="$($instance.ShellId)"} `
-cred $Credential -ErrorAction SilentlyContinue
}
$logs = Get-BCDRActionEventLog -ComputerName $Node -Credential $Credential -BackupId $backupId `
-SessionName $SessionName | ? EventID -eq $BCDRRemoteActionStartedEventId
if ($logs)
{
Trace-Execution "Check the previous session PID."
foreach ($log in $logs)
{
Trace-Execution "Log message: $($log.Message)"
if ($log.Message -Match $SessionInfoEventRegex)
{
$sessionNameFromLog = $Matches[2]
if ($sessionNameFromLog -ne $SessionName)
{
Trace-Execution "Not for the current session, skipped."
continue
}
$wsPid = $Matches[4]
$logTime = $log.TimeGenerated.ToUniversalTime()
if (![string]::IsNullOrEmpty($wsPid))
{
Trace-Execution "Make sure process '$wsPid' is gone."
$null = Check-BCDRSessionProcess -ComputerName $Node -Credential $Credential `
-SessionPid $wsPid -SessionCreationTime $logTime -Kill
}
}
}
}
}
catch
{
Trace-Execution "Failed to clean up the WSMan instance and/or the process on $Node. Proceeding anyway. Exception: $_"
}
}
}
<#
.Synopsis
A wrapper around actual execution on remote machines when the execution runs in a JEA session, in which case this
method must be whitelisted in the session configuration (.psrc) or imported manually as part of the initialization
#>
function Start-BCDRExecutionOnRemoteComputer
{
param
(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $BCDRRemoteExecutionScriptBlockAsStr,
[Parameter(Mandatory=$true)]
$ScriptBlockParameters
)
$BCDRRemoteExecutionScriptBlock = [scriptblock]::Create($BCDRRemoteExecutionScriptBlockAsStr)
# Start the script block execution async
Start-Job -ScriptBlock $BCDRRemoteExecutionScriptBlock -ArgumentList $ScriptBlockParameters
}
<#
.Synopsis
Execute backup operations idempotently.
BCDR ECE actions start remote PSSession on VMs for roles that implements backup/restore interfaces to perform
backup/restore actions. This method ensures that these sessions can be tracked or cleanly canceled when ECE fails
over and/or crashes by disconnecting the worker PSSessions and poll for completion.
.PARAMETER ComputerName
The targe computer name where the execution is run. If ProvisionedPSSession isn't specified, a disconnected session
will be created for the caller. Otherwise the computer name is used to poll action plan results.
.PARAMETER Credential
The credential to access the computer.
.PARAMETER BackupID
Backup ID
.PARAMETER FullRepositoryName
The full repository name is used to construct the PSSession name, which should be distinct for each repository so
that they can be tracked individually. The pattern is 'AzsBCDRSession-<FullRepostiroyName>'
.PARAMETER NodesForCurrentRole
List of Nodes for the role where the method should look for previously started BCDR remote PSSessions
.PARAMETER EmbeddedScriptBlockAsStr
The script block that contains the codes for the actual execution on the remote machine, passed in as a string.
The author of the script block must ensure that the codes runs in constrained language mode, otherwise the author
must manually set full language mode in this script block.
.PARAMETER ScriptBlockParameters
The parameter list of the embedded script block
.PARAMETER ProvisionedPSSession
The provisioned PSSession. The session name must follow this pattern: 'AzsBCDRSession-<FullRepositoryName>'.
Once the codes in the EmbeddedScriptBlockAsStr is executed as a job in the session, the session will be disconnected
and the caller should *NOT* try to reconnect to it if a reference is still held.
.PARAMETER ExpectedRuntimeInMin
The method first checks if there were any previously started PSSessions, and if there is any, it finds the start
time of the execution and poll for results until the run exceeds the expected run time.
.PARAMETER ConfigurationName
The configuration name to start the disconnected session with. If not specified, default to use CredSSP
.PARAMETER ActionType
Specifies whether the action is a backup or restore
#>
function Start-IdempotentBCDRRemoteExecution
{
param
(
[Parameter(ParameterSetName = "DefaultSet", Mandatory=$true)]
[Parameter(ParameterSetName = "ProvisionedPSSessionSet", Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $ComputerName,
[Parameter(ParameterSetName = "DefaultSet", Mandatory=$true)]
[Parameter(ParameterSetName = "ProvisionedPSSessionSet", Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[PSCredential] $Credential,
[Parameter(ParameterSetName = "DefaultSet", Mandatory=$true)]
[Parameter(ParameterSetName = "ProvisionedPSSessionSet", Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $BackupID,
[Parameter(ParameterSetName = "DefaultSet", Mandatory=$true)]
[Parameter(ParameterSetName = "ProvisionedPSSessionSet", Mandatory=$false)]
[ValidateNotNullOrEmpty()]
[string] $FullRepositoryName,
[Parameter(ParameterSetName = "DefaultSet", Mandatory=$true)]
[Parameter(ParameterSetName = "ProvisionedPSSessionSet", Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string[]] $NodesForCurrentRole,
[Parameter(ParameterSetName = "DefaultSet", Mandatory=$true)]
[Parameter(ParameterSetName = "ProvisionedPSSessionSet", Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $EmbeddedScriptBlockAsStr,
[Parameter(Mandatory=$false)]
[Array] $ScriptBlockParameters,
[Parameter(ParameterSetName = "ProvisionedPSSessionSet", Mandatory=$true)]
[ValidateNotNullOrEmpty()]
$ProvisionedPSSession = $null,
[Parameter(ParameterSetName = "ProvisionedPSSessionSet", Mandatory=$true)]
[ValidateNotNull()]
[PSCredential] $ProvisionedPSSessionCredential = $null,
[Parameter(Mandatory=$false)]
[uint32] $ExpectedRuntimeInMin = 60 * 4,
[Parameter(ParameterSetName = "DefaultSet", Mandatory=$false)]
[string] $ConfigurationName = $null,
[Parameter(Mandatory = $false)]
[ValidateSet('Backup', 'Restore')]
[string] $ActionType = 'Backup',
[Parameter(Mandatory = $false)]
[string] $BackupSnapshotFolder,
[Parameter(Mandatory = $false)]
[string[]] $BackupSnapshotFilters
)
try
{
$defaultSessionName = "$BCDRSessionNameBase-$FullRepositoryName"
if ($ProvisionedPSSession)
{
if ($ProvisionedPSSession.Name -notlike "$defaultSessionName*")
{
throw "Unexpected PSSession name '$($ProvisionedPSSession.Name)'. The session must start with '$defaultSessionName'."
}
$sessionName = $ProvisionedPSSession.Name
}
else
{
$sessionName = $defaultSessionName
}
if ($ActionType -eq 'Backup')
{
$EventSource = $BCDRBackupEventSource
}
else
{
$EventSource = $BCDRRestoreEventSource
}
$sessionInfoEventRegex = $BackupStartedEventLogPattern -f "([\d\w\-]+)", "(.+)", "([\d\w\-]+)", "(\d+)"
$shouldInvokeAction = $true
Check-PreviousBCDRSession -NodesForCurrentRole $NodesForCurrentRole -Credential $Credential -BackupID $BackupID `
-SessionName $sessionName -SessionInfoEventRegex $sessionInfoEventRegex `
-ProvisionedPSSession $ProvisionedPSSession -ProvisionedPSSessionCredential $ProvisionedPSSessionCredential `
-ExpectedRuntimeInMin $ExpectedRuntimeInMin -ShouldInvokeAction ([ref] $shouldInvokeAction)
if ($shouldInvokeAction -eq $false)
{
Trace-Execution "The previous action is done, skip invoking the action again"
return
}
Trace-Execution "Ensure the BCDR event source and log exists"
Ensure-BCDREventLog -ComputerName $ComputerName -Credential $Credential -EventSource $EventSource
$BCDREventParams = @{}
$BCDREventParams.BCDRLogName = $BCDRLogName
$BCDREventParams.EventSource = $EventSource
$BCDREventParams.BCDRRemoteActionStartedEventId = $BCDRRemoteActionStartedEventId
$BCDREventParams.BCDRRemoteActionCompletededEventId = $BCDRRemoteActionCompletededEventId
$BCDREventParams.BCDRRemoteActionFailedEventId = $BCDRRemoteActionFailedEventId
$BCDREventParams.BackupStartedEventLogPattern = $BackupStartedEventLogPattern
$BCDREventParams.BackupCompletedEventLogPattern = $BackupCompletedEventLogPattern
$BCDREventParams.BackupFailedEventLogPattern = $BackupFailedEventLogPattern
$BCDRRemoteExecutionScriptBlockParams = @($BCDREventParams, $sessionName, $BackupID, `
$EmbeddedScriptBlockAsStr, $ScriptBlockParameters, $BackupSnapshotFolder, $BackupSnapshotFilters)
$BCDRRemoteExecutionScriptBlock = {
param ($BCDREventParams, $sessionName, $BackupID, $EmbeddedScriptBlockAsStr, $ScriptBlockParameters, $BackupSnapshotFolder, $BackupSnapshotFilters)
try
{
Import-Module OpenUpSession
Set-FullLanguage
}
catch{}
# Log the shell ID and the PID of the disconnected session
$instance = Get-WSManInstance -ConnectionURI "http://localhost:5985/wsman" shell -Enumerate `
| Where-Object Name -eq $sessionName
$backupStartedEventLogMsg = $BCDREventParams.BackupStartedEventLogPattern -f $BackupID, $sessionName, `
$instance.ShellId, $instance.ProcessId
Write-EventLog -LogName $BCDREventParams.BCDRLogName -Source $BCDREventParams.EventSource `
-EntryType Information -EventId $BCDREventParams.BCDRRemoteActionStartedEventId -Message $backupStartedEventLogMsg
$sb = [scriptblock]::Create($EmbeddedScriptBlockAsStr)
$succeeded = $false
try
{
Invoke-Command -ArgumentList $ScriptBlockParameters -ScriptBlock $sb -ErrorAction Stop
$succeeded = $true
}
catch
{
$errorRecord = $_
}
finally
{
$errorMsg = $errorRecord | select * | Out-String
# Double check the snapshots to adjust the final result
if ($BackupSnapshotFolder -and ($BackupSnapshotFilters.Count -gt 0))
{
try
{
$logFileFullPath = Join-Path "$env:SystemDrive\MASLogs" -ChildPath "$($sessionName)_$($BackupID)_$(Get-Date -Format "yyyyMMdd-HHmmss").log"
Start-Transcript -Append -Path $logFileFullPath
Write-Verbose "Check snapshots under $BackupSnapshotFolder with $BackupSnapshotFilters finally to adjust result"
$snapshotNotFound = $false
foreach ($filter in $BackupSnapshotFilters)
{
$snapshots = Get-ChildItem $BackupSnapshotFolder -Filter $filter -Force
if (!$snapshots)
{
Write-Verbose "Failed to find snapshot with $filter"
$succeeded = $false
$snapshotNotFound = $true
$errorMsg += "`nNo snapshot found under $BackupSnapshotFolder with filter $filter."
}
}
if (!$snapshotNotFound)
{
Write-Verbose "Succeeded to find all snapshots, adjust result from $succeeded to true"
$succeeded = $true
}
}
catch
{
Write-Verbose "Ignore exception $($_.Exception.Message) when checking snapshots"
}
finally
{
Stop-Transcript -ErrorAction Ignore
}
}
if ($succeeded)
{
$backupCompletedEventLogMsg = $BCDREventParams.BackupCompletedEventLogPattern -f $BackupID, $sessionName
Write-EventLog -LogName $BCDREventParams.BCDRLogName -Source $BCDREventParams.EventSource `
-EntryType Information -EventId $BCDREventParams.BCDRRemoteActionCompletededEventId `
-Message $backupCompletedEventLogMsg
}
else
{
$backupFailedEventLogMsg = $BCDREventParams.BackupFailedEventLogPattern -f $BackupID, $sessionName, $errorMsg
Write-EventLog -LogName $BCDREventParams.BCDRLogName -Source $BCDREventParams.EventSource `
-EntryType Error -EventId $BCDREventParams.BCDRRemoteActionFailedEventId `
-Message $backupFailedEventLogMsg
throw $errorMsg, $errorRecord
}
}
}
if ($PsCmdlet.ParameterSetName -eq 'ProvisionedPSSessionSet')
{
Trace-Execution "Using the provisioned PSSession."
Trace-Execution "Name: $($ProvisionedPSSession.Name), State: $($ProvisionedPSSession.State)"
Trace-Execution "Availability: $($ProvisionedPSSession.Availability), ConfigName: $($ProvisionedPSSession.ConfigurationName)"
# Execute the script block in the provisioned session and disconnect
#
# Most cases where the caller passes in a provisioned PSSession is because the session was created with a
# JEA endpoint and specific language mode is enforced. Therefore, Start-BCDRExecutionOnRemoteComputer must
# be imported in the provisioned PSSession already and cannot be imported here to support this scenario.
Invoke-Command -Session $ProvisionedPSSession `
-ArgumentList @($BCDRRemoteExecutionScriptBlock.ToString(), $BCDRRemoteExecutionScriptBlockParams) `
-ScriptBlock {
param ($BCDRRemoteExecutionScriptBlockAsStr, $BCDRRemoteExecutionScriptBlockParams)
Start-BCDRExecutionOnRemoteComputer `
-BCDRRemoteExecutionScriptBlockAsStr $BCDRRemoteExecutionScriptBlockAsStr `
-ScriptBlockParameters $BCDRRemoteExecutionScriptBlockParams
}
Trace-Execution "Disconnecting the remote PSSession."
Disconnect-PSSession -Session $ProvisionedPSSession -IdleTimeoutSec $BCDRRemoteSessionIdleTimeoutInSec
Trace-Execution "Session disconnected."
}
else
{
Trace-Execution "Starting a new disconnected PSSession"
# Set the idle timeout to 4hrs, which is the same timeout as the entire backup action plan, so that the
# execution doesn't get killed too soon and the session dies after the timeout expires.
$BCDRRemoteSessionIdleTimeoutInMs = $BCDRRemoteSessionIdleTimeoutInSec * 1000
$option = New-PSSessionOption -OutputBufferingMode Drop -IdleTimeout $BCDRRemoteSessionIdleTimeoutInMs
$invokeParam = @{}
$invokeParam.ComputerName = $ComputerName
$invokeParam.Credential = $Credential
$invokeParam.InDisconnectedSession = $true
$invokeParam.SessionName = $sessionName
$invokeParam.SessionOption = $option
if (![string]::IsNullOrEmpty($ConfigurationName))
{
$invokeParam.ConfigurationName = $ConfigurationName
}
else
{
$invokeParam.Authentication = "Credssp"
}
$invokeParam.ArgumentList = $BCDRRemoteExecutionScriptBlockParams
Invoke-Command @invokeParam -ScriptBlock $BCDRRemoteExecutionScriptBlock
}
# Try to get session PID and creation time from the latest log
$wsPid = $null
for ($i = 0; $i -lt 3; $i++)
{
Trace-Execution "Wait for 10 seconds..."
Start-Sleep -s 10
$latestStartLog = Get-BCDRActionEventLog -ComputerName $ComputerName -Credential $Credential `
-BackupID $BackupID -SessionName $sessionName | ? EventID -eq $BCDRRemoteActionStartedEventId | select -First 1
Trace-Execution "Latest start event: $($latestStartLog.Message)"
if ($latestStartLog -and ($latestStartLog.Message -Match $sessionInfoEventRegex))
{
if ($ProvisionedPSSession -and ($Matches[3] -ne $ProvisionedPSSession.InstanceId))
{
Trace-Execution "Waiting for the start action plan event."
continue
}
$wsPid = $Matches[4]
$logTime = $latestStartLog.TimeGenerated.ToUniversalTime()
break
}
}
if ($i -eq 3)
{
Trace-Execution "Failed to get PSSession info. Wait for 5 min and try to determine if backup is completed."
$timeout = (Get-Date).AddMinutes(5)
}
while ($true)
{
# Check for completion
$log = Get-BCDRActionEventLog -ComputerName $ComputerName -Credential $Credential `
-BackupID $BackupID -SessionName $sessionName | select -First 1
if ($log)
{
if ($log.EventId -eq $BCDRRemoteActionCompletededEventId)
{
Trace-Execution "$ActionType succeeded."
break
}
elseif ($log.EventId -eq $BCDRRemoteActionFailedEventId)
{
throw "$ActionType $BackupId failed. Message: $($log.Message)"
}
}
# Make sure the process is still alive
if ($wsPid)
{
$sessionProcExists = Check-BCDRSessionProcess -ComputerName $ComputerName -Credential $Credential `
-SessionPid $wsPid -SessionCreationTime $logTime
if (!$sessionProcExists)
{
throw "The remote PSSession unexpectedly died. $ActionType failed."
}
}
if ($timeout -and ((Get-Date) -gt $timeout))
{
throw "Could not determine if the $ActionType is finished or not. Failing the $ActionType."
}
Start-Sleep -Seconds 30
}
}
finally
{
if ($ProvisionedPSSessionCredential)
{
$cleanupCredential = $ProvisionedPSSessionCredential
}
else
{
$cleanupCredential = $Credential
}
if (![string]::IsNullOrEmpty($sessionName))
{
$session = Get-PSSession -ComputerName $ComputerName -Credential $cleanupCredential `
-Name $sessionName -ErrorAction SilentlyContinue
$session | Remove-PSSession -ErrorAction SilentlyContinue
}
try
{
$instance = Get-WSManInstance -ConnectionURI "http://$ComputerName`:5985/wsman" shell -Enumerate `
-cred $cleanupCredential -ErrorAction SilentlyContinue | ? Name -eq $SessionName
foreach ($instance in $instances)
{
Trace-Execution "Removing WSMan objects with shell ID $($instance.ShellId)"
Remove-WSManInstance -ConnectionURI "http://$ComputerName`:5985/wsman" shell @{ShellID="$($instance.ShellId)"} `
-cred $cleanupCredential -ErrorAction SilentlyContinue
}
}
catch
{
Trace-Execution "Could not clean up the WSMan instance. Exception: $_"
}
}
}
<#
.Synopsis
Get the first machine in the list where a remote PSSession can be created.
#>
function Get-FirstAvailableMachine
{
param
(
[Parameter(Mandatory=$true)]
[string[]] $Machines,
[Parameter(Mandatory=$true)]
[PSCredential] $Credential,
[Parameter(Mandatory = $true, ParameterSetName = "JEA")]
[ValidateNotNullOrEmpty()]
[string] $ConfigurationName,
[Parameter(Mandatory = $true, ParameterSetName = "Authentication")]
[ValidateSet("Default","Basic","Credssp","Digest","Kerberos","Negotiate","NegotiateWithImplicitCredential")]
[string] $Authentication = "Credssp",
[Parameter(Mandatory = $false)]
[uint32] $Retries = 0,
[Parameter(Mandatory = $false)]
[uint32] $RetrySleepTimeInSeconds = 5
)
$RemoteSession = $null
$found = $null
foreach ($Machine in $Machines)
{
Trace-Execution "Testing remote PSSession connectivities to $Machine with user $($Credential.UserName)"
$attempt = 0;
try
{
while ($true)
{
$attempt++
try
{
if ($PSCmdlet.ParameterSetName -eq "JEA")
{
$session = New-PSSession -ComputerName $Machine -Credential $Credential `
-ConfigurationName $ConfigurationName -ErrorAction Stop
}
else
{
$session = New-PSSession -ComputerName $Machine -Credential $Credential `
-Authentication $Authentication -ErrorAction Stop
}
break
}
catch
{
Trace-Warning "Test connection failed. Exception: $_"
if ($attempt -lt $Retries)
{
Trace-Execution "Attempt $attempt of $Retries."
Start-Sleep -s $RetrySleepTimeInSeconds
continue
}
else
{
throw "Failed to connect to $Machine after $attempt attempts. Exception: $_"
}
}
}
$found = $Machine
break
}
catch
{
Trace-Warning "Failed to connect to $Machine with exception $($_ | Out-String)"
}
finally
{
$session | Remove-PSSession -ErrorAction SilentlyContinue
}
}
if ([string]::IsNullOrEmpty($found))
{
throw "Could not create a PSSession to any of the specified machines."
}
return $found
}
Export-ModuleMember -Function Ensure-BCDREventLog
Export-ModuleMember -Function Get-BCDRActionPlanConst
Export-ModuleMember -Function Get-BCDRActionPlanConsts
Export-ModuleMember -Function Get-FirstAvailableMachine
Export-ModuleMember -Function Start-BCDRExecutionOnRemoteComputer
Export-ModuleMember -Function Start-IdempotentBCDRRemoteExecution
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDUkI9CuCg+ewEj
# UjnWERSejhLSTok6F5j/AfKseK3mWKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIA/pehCkQwZn7fSFbhJC5ihv
# 1vSG/qMNCVDv0o8RlW2FMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAP5WXIramWKXzt1rxRAbufjbgfsY0l2P5dLQ6SSkMt+BJw2LMUs+tNZFU
# Na7nXSfYq0silQiu7p7FOStujjAD2+Z0dQJgeG6LCc1pFDlVET/sOR0+fcmm1jPR
# SIVy9BL61VWUjvixxzBFjbmQE66Eb15/RwkDUGtZQtLcPiEFCu1qPp+GUX/+9NGD
# JX8TMHiBYQPltmuTfmws4BkkPBxFI1QQk8T7e4qxK2nZLeBBGdZWRpbZ8T3mpE3F
# 43ZwkCiqut8PyxiFPkzUhknV0xx9UQyLeUBSsocQW/XeFXkERkkZjQYbNbkNvPvF
# TBgzvxzB6PynFQlStJBCHPO4zR3Ob6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBuqLzBhl3nsSGtLKOIH966A9AMcs58S+iKMiXp9rHmlgIGZbqk0R90
# GBMyMDI0MDIxMjE0MDgzNy4wMzdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC
# RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis
# DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI
# ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z
# ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR
# IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE
# lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s
# /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4
# aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB
# fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT
# me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy
# qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui
# hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds
# lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf
# sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t
# Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU
# +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7
# qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6
# Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+
# x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4
# 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5
# ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV
# PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4
# y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk
# 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG
# QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOl0S1kwIhgPMjAyNDAyMTIxNTQ2MzNaGA8yMDI0MDIxMzE1NDYzM1owdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6XRLWQIBADAHAgEAAgIVwzAHAgEAAgIUTzAKAgUA
# 6XWc2QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKSvdq5/OwSqLipXDPR/
# fz5CiLbm0lCxv+PjDUqfK5ccPWEVkKsD9zmiB4N1ZQarjww5WUro+QdoUzSzV/Ly
# OaxhyB8c2JwDLLMQK8JyHWefD6cG4cvgYDg5iEzioerBrjSnrGxsb3qVV0n31Fhc
# Z9Hh71O9RocFcjpVHRSVEF7MMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgG/gaQA83XbdjJX6LwoAs4jDPRvJCpQ8MFXb0IV8tgdkwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJCI9/
# /zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB4pmZ
# lfHc4yDrAAEAAAHiMCIEII1oQoIqDDF/dls2LazpjkRTP0GoZvbNELQJtb8XKdao
# MA0GCSqGSIb3DQEBCwUABIICAGx0QXlFPYRkc38TSskobXPwiWkrN3L96VNsbE/q
# Q9XabTqJpeUg4lvE4xcvX05Nqdks7F0e2zqiWugAfTU6lRj+D+EmxFugKzmABK4/
# 0ylPLARi+rKwz8QNWvAKhzdL6XcGYK0PtPcRjoUrG/l/H5kZt9KVYWopQpsE+jlR
# 6cl+z91e2O0UnwXnpggiYS/LLtEF4uFzScq2vzwO6/Y0qcJhGOQWodnnWC21vSZc
# fWH50wTNp1sUYTGL4X4vRl5b49rxRSY1bv0IB2mTGfLedafBB/sADSf4BvonAaZ+
# WC6S6KTpKX2o8KYojAlXXAjDGVwB+J8TLoWxyQ/i+MtPhqSCL9GluR0Vr4C3fGjd
# ntxua+sRVulupYycVr1USnB0RSsextvahtwxvay14aJP4NSsk7Xu7oy1KjfODmZm
# w8ZLf6rY6+coT14aSuNNQMXdmPMJDl7oPAArD1XMtqu4u5jmOgI0ffGweQj4YSIt
# 5nsPh8BlIOZcz2oke6r8j01pCPaYB9qp6a0En+FCK8U/cR4nF3qwsfeJwQnbUV/Y
# skHwjl5rR+NV7IShm1NL7bJoRdR0TI8WojLHtK9ZIwcXASUgat5lCSr1FCKKDsy1
# DcKDuSqsG0RCABnbd6h8DIHNfgSDDptPQIDtuWKwni61vDfiuyOTNOtvXivqHHG9
# vbWP
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_25_96.ps1 | sample_25_96.ps1 | #
# Module manifest for module 'OCI.PSModules.Adm'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Adm.dll'
# Version number of this module.
ModuleVersion = '77.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'a24e4d09-e598-41cc-b3e9-a1e3c5dce346'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Adm Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Adm.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Enable-OCIAdmRemediationRecipe',
'Get-OCIAdmApplicationDependencyRecommendationsList',
'Get-OCIAdmApplicationDependencyVulnerabilitiesList',
'Get-OCIAdmKnowledgeBase', 'Get-OCIAdmKnowledgeBasesList',
'Get-OCIAdmRemediationRecipe', 'Get-OCIAdmRemediationRecipesList',
'Get-OCIAdmRemediationRun', 'Get-OCIAdmRemediationRunsList',
'Get-OCIAdmStage', 'Get-OCIAdmStagesList',
'Get-OCIAdmVulnerabilityAudit', 'Get-OCIAdmVulnerabilityAuditsList',
'Get-OCIAdmWorkRequest', 'Get-OCIAdmWorkRequestErrorsList',
'Get-OCIAdmWorkRequestLogsList', 'Get-OCIAdmWorkRequestsList',
'Invoke-OCIAdmDeactivateRemediationRecipe',
'Move-OCIAdmKnowledgeBaseCompartment',
'Move-OCIAdmRemediationRecipeCompartment',
'Move-OCIAdmRemediationRunCompartment',
'Move-OCIAdmVulnerabilityAuditCompartment',
'New-OCIAdmKnowledgeBase', 'New-OCIAdmRemediationRecipe',
'New-OCIAdmRemediationRun', 'New-OCIAdmVulnerabilityAudit',
'Remove-OCIAdmKnowledgeBase', 'Remove-OCIAdmRemediationRecipe',
'Remove-OCIAdmRemediationRun', 'Remove-OCIAdmVulnerabilityAudit',
'Stop-OCIAdmRemediationRun', 'Stop-OCIAdmWorkRequest',
'Update-OCIAdmKnowledgeBase', 'Update-OCIAdmRemediationRecipe',
'Update-OCIAdmRemediationRun', 'Update-OCIAdmVulnerabilityAudit'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Adm'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/VM Performance Report_1.ps1 | VM Performance Report_1.ps1 | <#
.SYNOPSIS
The script creates an HTML report for given vSphere VM's, that contains VM performance data over a given period. The script then emails the report to a given address.
.DESCRIPTION
The script requires an input file, supplied as an argument to the script. The first line of this file contains an email address, subsequent lines contain VM names, one per line. The script connects to vCenter, queries for given performance stats (get-stat) and then generates a HTML report, which is then emailed to the recipient. The script can be scheduled via scheduled tasks (when supplied with a credential file for vCenter created with http://poshcode.org/3487) or run interactively.
.NOTES
File Name : Get-VMPeformanceReport.ps1
Author : Samuel Mulhearn
Version History:
Version 1.0
28 Jun 2012.
Release
.LINK
http://poshcode.org/3489
.EXAMPLE
Call the script with a single argument which should be the path to the input file .\\Get-VMPeformanceReport.ps1 <path\\datafile.txt>
#>
#Change These Values
$VC = "vm-trb-vc02.th.local" #VirtualCenter
$SMTPServer = "10.247.50.25" #SMTP Server
$SendersAddress = "noreply@tribalgroup.com" #The report comes from this address
$SavedCredentialsFile = "C:\\path\\file.txt" #Make this file using http://poshcode.org/3487
$CompanyLogo = "http://placehold.it/150x50"
function Out-LogFile {
#Log File Function http://poshcode.org/3232
[CmdletBinding(DefaultParameterSetName='Message')]
param(
[Parameter(ParameterSetName='Message',
Position=0,
ValueFromPipeline=$true)]
[object[]]$Message,
[Parameter(ParameterSetName='Message')]
[string]$LogFile = $global:DefaultLogPath,
[Parameter(ParameterSetName='Message')]
[int]$BlankLine = 0,
[switch]$WriteHost = $global:WriteHostPreference,
[string]$Severity = "I",
[Parameter(ParameterSetName='Message')]
[switch]$DontFormat,
[Parameter(ParameterSetName='Message')]
[string]$DateFormat = "dd-MM-yyyy HH:mm:ss",
#[Parameter(ParameterSetName='Title',Position=0,Mandatory=$true)]
[string]$Title,
[System.ConsoleColor]$ForegroundColor = $host.UI.RawUI.ForegroundColor,
[System.ConsoleColor]$BackgroundColor = $host.UI.RawUI.BackgroundColor,
[ValidateSet('unicode', 'utf7', 'utf8', 'utf32', 'ascii', 'bigendianunicode', 'default', 'oem')]
[string]$Encoding = 'Unicode',
[switch]$Force
)
begin {
Write-Verbose "Log File: $LogFile"
if ( -not $LogFile ) { Write-Error "The -LogFile parameter must be defined or $global:LogFile must be set."; break}
if ( -not (Test-Path $LogFile) ) { New-Item -Path $LogFile -ItemType File -Force | Out-Null }
if ( -not (Test-Path $LogFile) ) { Write-Error "Log file can not be found: $LogFile."; break}
if ( $Title ) {
$text = $Title
$Title = $null
Out-LogFile -BlankLine 1 -LogFile $LogFile -WriteHost:$WriteHost -Force:$Force -Encoding $Encoding
Out-LogFile -Message $text -BlankLine 1 -DontFormat -LogFile $LogFile -WriteHost:$WriteHost -Force:$Force -Encoding $Encoding
}
}
process {
if ( $Message ) {
$text = $Message
foreach ( $text in $Message ) {
if ( -not $DontFormat ) { $text = "$(($Severity).ToUpper()): $(Get-Date -Format `"$DateFormat`")" + ": $text" }
if ($WriteHost) { Write-Host $text -BackgroundColor $BackgroundColor -ForegroundColor $ForegroundColor}
$text | Out-File -FilePath $LogFile -Force:$Force -Encoding $Encoding -Append
}
}
if ( $BlankLine -gt 0 ){
for ($i = 0; $i -lt $BlankLine; $i++ ) {
"" | Out-File -FilePath $LogFile -Force:$Force -Encoding $Encoding -Append
if ($WriteHost) { Write-Host "" -BackgroundColor $BackgroundColor -ForegroundColor $ForegroundColor }
}
}
}
end {
}
}
#end of logfile function
#New Line Variable
$nl = [Environment]::NewLine
#INTERACTIVE: (Prompt for password) Replace code below with: $VCCred = (Get-Credential)
#NONE-INTERACTIVE: Store password in a file (using http://poshcode.org/3487), and retrive as below
$key = [byte]57,86,59,11,72,75,18,52,73,46,0,21,56,76,47,12 #Must match key used to save password (http://poshcode.org/3487)
$VCCred = Import-Csv $SavedCredentialsFile #Make this file using http://poshcode.org/3487
$VCCred.Password = ($VCCred.Password| ConvertTo-SecureString -Key $key)
$VCCred = (New-Object -typename System.Management.Automation.PSCredential -ArgumentList $VCCred.Username,$VCCred.Password)
#Get Datafile, this wil contain VM's to report on, and an email address to send the report to
#Datafile format: first line is email address, subsequent lines are VM's, one per line)
if ($args[0] -eq $null) #Test Datafile was supplied as argument to the script, if not error!
{ Throw "No datafile supplied, supply path to datafile as an argument to the script! e.g .\\SCRIPT.ps1 DATAFILE.txt $nl To create a datafile, the first line of the datafile should be an email address, each subseqenet line should be a VM (one per line)"
#$Datafile = "C:\\Path\\datain.txt" #If debugging uncomment this line and comment above to supply a fixed input file
}
else
{ $Datafile = $args[0] }
#From Datafile, get a log file, and a
$LogFile = (($DataFile).SubString(0,(($Datafile).length - 3))) + "log"
$Outfile = (($DataFile).SubString(0,(($Datafile).length - 3))) + "htm"
$global:WriteHostPreference = $true
$global:DefaultLogPath = $LogFile
Out-LogFile -Message "Starting script with $datafile"
#Load PowerCLI
if ( (Get-PSSnapin -Name VMware.VimAutomation.Core -ErrorAction SilentlyContinue) -eq $null )
{ Add-PsSnapin VMware.VimAutomation.Core }
If (!(Get-PSSnapin -Name VMware.VimAutomation.Core))
{Out-LogFile -Message "Failed to load PowerCLI Snap-in. Check PowerCLI is installed." -Severity "E"
Exit(1)
}
#Static HTML
$HTMLPreString=@"
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<link rel="stylesheet" href="http://current.bootstrapcdn.com/bootstrap-v204/css/bootstrap-combined.min.css">
<style type="text/css">
body {
padding: 20px;
}
h2 {
color: #3A87AD;
}
.mytable {
width: 776px;
margin: 12px;
}
.alert-info {
color: #3A87AD;
background-color: #D9EDF7;
border-color: #BCE8F1;
padding: 8px 8px 8px 14px;
margin-top: 12px;
margin-left: 12px;
margin-right: 12px;
margin-bottom: 12px;
border: 1px solid;
border-radius: 4px;
}
.chart_wrap {
width: 800px;
border-style:solid;
border-width:1px;
border-color: #DDDDDD;
margin: 0px 0px 10px 0px;
}
.chart {
text-align: center;
width: 800px;
height: 400px;
}
</style>
<title>
Virtual Machine Performance statistics
</title>
<script type="text/javascript" src="http://www.google.com/jsapi"></script>
<script type="text/javascript">
google.load('visualization', '1', {packages: ['corechart']});
</script>
"@
$HTMLPreString += "$nl"
$HTMLBodyBegin ="<body style=`"font-family: Arial;border: 0 none;`"> $nl"
$HTMLBodyBegin += "<img src=`"$CompanyLogo`" alt=`"Company Logo`" /> $nl"
$HTMLBodyBegin += "<h2>Performance Statistics</h2>$nl"
$HTMLPostString=@"
<script src= "https://ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.min.js"></script>
<script src="http://current.bootstrapcdn.com/bootstrap-v204/js/bootstrap.min.js"</script>
<script src="http://current.bootstrapcdn.com/bootstrap-v204/js/bootstrap-tab.js"</script>
</body>
</html>
"@
#Functions for dynamic HTML
Function Get-DataTable ($Statistics, $UID, $Summation = $false, $Title)
{
#https://developers.google.com/chart/interactive/docs/examples#custom_table_example
$mystring = "<script type=`"text/javascript`">$nl"
$mystring += "function drawVisualization$UID() {$nl"
$mystring += "// Create and populate the data table. $nl"
$mystring += "var " + "$UID" + "data = new google.visualization.DataTable();$nl"
$mystring += "$UID" + "data.addColumn('datetime', 'Time');$nl"
$VMs | % {$mystring += "$UID" + "data.addColumn('number', '$_');$nl"}
$mystring += "$UID" + "data.addRows(" + $Statistics.Count + ");$nl"
$ColumnCount = 0
$RowCount = 0
$Statistics | % {
$ColumnCount = 0
$formatteddate = [datetime]::ParseExact(([string]$_.Name),"dd/MM/yyyy H:mm:ss",$null)
$JSMonth = (($formatteddate.ToString("MM"))-1) #Javascript Months are base 0 (Jan = 0)
$formatteddate = $formatteddate.ToString("yyyy, $JSMonth, dd, HH, mm")
$formatteddate = "new Date($formatteddate)"
$mystring += "$UID" + "data.setCell($RowCount, $ColumnCount, $formatteddate);$nl"
$_.Group |
% {
$ColumnCount = 0
foreach ($VM in $VMs)
{
$ColumnCount += 1
If ($_.Entity.Name -eq $VM )
{ if ($Summation -eq $true)
{ $strPercent = (( $_.Value / ( $_.IntervalSecs * 1000)) * 100) #http://kb.vmware.com/kb/2002181
$strPercent = [system.math]::round($strPercent,2)
$mystring += "$UID" + "data.setCell($RowCount, $ColumnCount, " + $strPercent + ");$nl"
}
else
{ $mystring += "$UID" + "data.setCell($RowCount, $ColumnCount, " + $_.Value + ");$nl" }
}
}
}
$RowCount += 1
}
$mystring += "$nl new google.visualization.LineChart(document.getElementById('visualization" + "$UID" +"')).$nl"
$VisParam = "`
{ `
legend: {position: 'in',alignment:`"center`"}, `
lineWidth:`"2`", `
curveType: `"none`",`
chartArea:{left:60,top:40,width:`"90%`",height:`"75%`"},`
focusTarget:`"category`", `
hAxis: {slantedText:`"true`", format:`"E, d MMM`"},`
vAxis: {textPosition:`"out`"},`
width: 800, `
height: 400, `
title:`"$Title`"}"
$mystring += "draw(" + "$UID" + "data, $VisParam);$nl"
$mystring +="}$nl"
$mystring += "google.setOnLoadCallback(drawVisualization" + "$UID" + ");$nl</script>$nl"
return $mystring
}
function Get-DivHTML ($UID, $Notes)
{
$tempHTML = "<div class=`"tab-pane fade`" id=`"$UID`">$nl"
$tempHTML += " <div class=`"chart_wrap`">$nl"
$tempHTML += " <div id=`"visualization" + "$UID" + "`" class=`"chart`"></div>$nl"
$tempHTML += " <div class=`"alert alert-info`"><strong>Information: </strong>$Notes</div>$nl"
$tempHTML += " </div>$nl"
$tempHTML += "</div>$nl"
return $tempHTML
}
#Main Code
#Process datafile, get VM's to report on, and an email address to send the report to
$DataTable = @(Get-Content $Datafile)
$email = $DataTable[0]
$VMs = @($DataTable[1..($DataTable.Count)])
#Connect to VC
Set-PowerCLIConfiguration -InvalidCertificateAction:Ignore -DefaultVIServerMode:Single -Confirm:$false|Out-Null
if ((Connect-VIServer $VC -Credential $VCCred) -eq $null) #Connect to vCenter, exit if fails.
{ Out-LogFile -Message "Failed to connect to vCenter ($VC)" -Severity "E" -WriteHost
Exit (1)
}
else
{Out-LogFile -Message "Connected to vCenter ($VC)"}
#Validate VM's exist
$VCVMs = (get-vm -name $VMs -ErrorAction SilentlyContinue)
$VMs | % {
$tmpvm = $_
$Exists = $false
$VCVMs | % { if ($_.Name -eq $tmpvm) {$Exists = $true}}
If ($Exists){
Out-LogFile -Message "$_ found in vCenter inventory"
}
Else {
Out-LogFile -Message "$_ not found in vCenter inventory" -Severity "W"
$VMs = $VMs |? {$_ -ne $tmpvm}
}
}
#To add new Stat
#1. Add stat to $metrics (use Get-VM | GetStatType to find new metrics)
#2. Create a Variable To hold new stats, $MyVariabe = ($Stats | Where-Object {$_.MetricId -eq $metrics[X]} | Sort-Object TimeStamp |Group-Object -Property Timestamp)
#3. Invent a new UID - MyUID ?
#4. Build Datatable, add code: $HTMLOut += (Get-DataTable -Statistics $MyVariable -UID "MyUID" -Title "Graph Title")
#5. Edit static Tabs HTML below, within <ul class="nav nav-tabs"> add a new <li> - eg: <li><a href="#MyUID" data-toggle="tab">Tab Title</a></li>
#6. Add a new Get-DivHTML - eg. $HTMLOut += (Get-DivHTML -UID "MyUID" -Notes "Some notes below the chart")
#Start and Finish times
$todayMidnight = (Get-Date -Hour 0 -Minute 0 -Second 0).AddMinutes(-1)
$metrics = "cpu.usagemhz.average","mem.usage.average","disk.usage.average","net.usage.average","cpu.ready.summation","mem.vmmemctl.average"
$start = $todayMidnight.AddDays(-7) #If changed consider changing hAxis.format in $VisParam to include the time. https://developers.google.com/chart/interactive/docs/gallery/linechart
$finish = $todayMidnight
$startstring = $start.ToString("dddd, dd MMMM yyyy HH:mm")
$finishstring = $finish.ToString("dddd, dd MMMM yyyy HH:mm")
Out-LogFile -Message "Getting stats from vCenter"
#Variable for all stats combined
$Stats = Get-Stat -Entity $vms -Stat $metrics -Start $start -Instance "" -Finish $finish -IntervalSecs "1800" #Instance "" accounts for machines with multiple CPU's or NICS, gets machine average
Out-LogFile -Message "Got stats from vCenter"
Out-LogFile -Message "Sorting and filtering stats"
#Split stats out by each indivial metric into individual variable
$CPU = ($Stats | Where-Object {$_.MetricId -eq $metrics[0]} | Sort-Object TimeStamp |Group-Object -Property Timestamp)
$Memory = ($Stats | Where-Object {$_.MetricId -eq $metrics[1]} | Sort-Object TimeStamp |Group-Object -Property Timestamp)
$Disk = ($Stats | Where-Object {$_.MetricId -eq $metrics[2]} | Sort-Object TimeStamp |Group-Object -Property Timestamp)
$Net = ($Stats | Where-Object {$_.MetricId -eq $metrics[3]} | Sort-Object TimeStamp |Group-Object -Property Timestamp)
$Ready = ($Stats | Where-Object {$_.MetricId -eq $metrics[4]} | Sort-Object TimeStamp |Group-Object -Property Timestamp)
$Balloon = ($Stats | Where-Object {$_.MetricId -eq $metrics[5]} | Sort-Object TimeStamp |Group-Object -Property Timestamp)
#Creates HTML inside of <head> for javascript for the charts
Out-LogFile -Message "Creating HTML"
$HTMLOut = $HTMLPreString + (Get-DataTable -Statistics $CPU -UID "CPU" -Title "CPU (MHz)")
$HTMLOut += (Get-DataTable -Statistics $Memory -UID "Memory" -Title "Memory (%)")
$HTMLOut += (Get-DataTable -Statistics $Disk -UID "Disk" -Title "Disk Activity (KBps)")
$HTMLOut += (Get-DataTable -Statistics $Net -UID "Net" -Title "Network I/O (KBps)")
$HTMLOut += (Get-DataTable -Statistics $Ready -UID "Ready" -Summation $true -Title "CPU Wait Time (%)")
$HTMLOut += (Get-DataTable -Statistics $Balloon -UID "Balloon" -Summation $true -Title "Memory allocated to the balloon driver (KB)")
$HTMLOut += "</head>$nl"
$HTMLOut += $HTMLBodyBegin + $nl
#Navigation Tabs...
#Edit below to add a tab, when adding a new metric
$HTMLOut += @"
<div id="content">
<ul class="nav nav-tabs">
<li class="active"><a href="#Info" data-toggle="tab">Information</a></li>
<li class="dropdown">
<a href="#" class="dropdown-toggle" data-toggle="dropdown">CPU<b class="caret"></b></a>
<ul class="dropdown-menu">
<li><a href="#CPU" data-toggle="tab">CPU Usage</a></li>
<li><a href="#Ready" data-toggle="tab">CPU Wait Time</a></li>
</ul>
</li>
<li class="dropdown">
<a href="#" class="dropdown-toggle" data-toggle="dropdown">Memory<b class="caret"></b></a>
<ul class="dropdown-menu">
<li><a href="#Memory" data-toggle="tab">Memory Usage</a></li>
<li><a href="#Balloon" data-toggle="tab">Memory Balloon</a></li>
</ul>
<li>
<li><a href="#Disk" data-toggle="tab">Disk</a></li>
<li><a href="#Net" data-toggle="tab">Network</a></li>
</ul>
<div id="my-tab-content" class="tab-content">
<div class="tab-pane fade in active" id="Info">
<div class="chart_wrap">
<div class="alert alert-info">
<strong>Information: </strong>
"@
#Info for fist tab
$HTMLOut += "Each datapoint represents resource consumption since the last datapoint `
and its value is either an average, maximum, or summation of all usage in that interval. `
Any values that are zero may actually be zero, or may indicate statistics were not `
collected over that period (for example, if a virtual machine was powered off). $nl `
The statistics displayed are from $startstring to $finishstring</div>$nl"
#Table that contains VM resource config & limits.
$HTMLOut += "<table class=`"mytable table table-striped table-bordered`"><thead><tr><td>VM Name</td><td>Number of CPU's</td><td>Memory (MB)</td><td>CPU Limit</td><td>Memory Limit</td></tr></thead>$nl<tbody>$nl"
$VCVMs | % {
$tmpname =$_.Name
$tmpNumCpu = $_.NumCpu
$TmpMemoryMB = $_.MemoryMB
$tmpCPULimit = $_.VMResourceConfiguration.CPULimitMhz.ToString().Replace("-1","None")
$tmpMemLimit = $_.VMResourceConfiguration.MemLimitMB.ToString().Replace("-1","None")
$HTMLOut += " <tr><td>$tmpname</td><td>$tmpNumCpu</td><td>$TmpMemoryMB</td><td>$tmpMemLimit</td><td>$tmpCPULimit</td></tr>$nl"
}
$HTMLOut += "</tbody></table>$nl"
$HTMLOut +=@"
</div>
</div>
"@
#Div elements that contain each chart
$HTMLOut += (Get-DivHTML -UID "CPU" -Notes "Average CPU usage, as measured in megahertz, during the interval")
$HTMLOut += (Get-DivHTML -UID "Memory" -Notes "Average memory usage as percentage of total configured or available memory")
$HTMLOut += (Get-DivHTML -UID "Disk" -Notes "Average disk activity (combinded read & write) in KBps")
$HTMLOut += (Get-DivHTML -UID "Net" -Notes "Average network utilization (combined transmit and receive rates) during the interval")
$HTMLOut += (Get-DivHTML -UID "Ready" -Notes "The percentage of time that the virtual machine was ready, but could not get scheduled to run on the physical CPU. Values of less than 10% are considered normal")
$HTMLOut += (Get-DivHTML -UID "Balloon" -Notes "Amount of memory allocated by the virtual machine memory control driver (vmmemctl), which is installed with VMware Tools. This value should remain at 0 or close to 0")
$HTMLOut += @"
</div>
</div>
</div>
"@
$datenow = Get-Date -Format "F"
$HTMLOut += "<h6>Report generated at $datenow<h6>$nl"
$HTMLOut += $HTMLPostString
#Finished HTML
Out-LogFile -Message "Finished building HTML, writing to $Outfile"
$HTMLOut | Out-File -FilePath $Outfile -Encoding "UTF8"
#Build Email
$body =@"
<P>Performance statistics for the Virtual Machines listed below are attached</p>
"@
$body += "<p>Statistics are from $startstring to $finishstring<p>"
$VMs | % {$body+= "<li>$_</li>" }
Out-LogFile -Message "Sending email. Email:$email. SMTP Server:$SMTPServer"
#Send email
Send-MailMessage -Attachments $Outfile -Body "$body" -BodyAsHtml:$true -Subject "Performance Statistics" -To $email -From $SendersAddress -SmtpServer $SMTPServer
Disconnect-VIServer -Confirm:$false
Out-LogFile -Message "Disconnected from vCenter"
Out-LogFile -Message "Finished"
|
combined_dataset/train/non-malicious/sample_3_56.ps1 | sample_3_56.ps1 | ConvertFrom-StringData @'
id_surfacepro3detectfirmwareversions=Detect Surface Pro 3 Firmware Versions
id_surfacepro3detectfirmwareversionsdesc=Detected Surface Pro 3 Firmware Versions Update Needed
'@
# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA9u4k1RmE370TP
# A8Tm3un9Zb5c344H2aLd6iD+16euP6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIA/9
# Xmn3GE5/gqTySRt3cZsRr37cDkEqjh7E7ymUPctSMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAmHhVYimxObgNbvursXie7I1EvFmOY02xfZjC
# 9KBCaWuvPTyNAcTmr97hMezAst93fgHA4mthWSLyASoihfJwuB64ufIpmhb1/1cL
# NYUctmKiYMDT/U/b4d1ZUgv1hXTz81Bm6o+8e0qAAXSI4XRiUuZYxINoA2OgxSdZ
# ailjWZbAjiGvYgvs1zSXoIppkiZJtQEZoeaqW1MW3eqlzQpjisc9bv/2FlpFyKs1
# /MXnaiYohw3ybHqlYgl8mPKM+nuiw1wZxCoyzva2ikNJDwFO8PgeRBTgfI73/tMi
# 4/U7yCG5m/1mA+pHhc2AXBHEU8FiGFOj1zSfT4T6uHZ6jsDJr6GCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCBc7uBQJIGUm7Y8OM4sStahQ/MAuqitsFck
# O6lHiVfX/AIGZwgI5xF4GBMyMDI0MTAxNzAwMjMyMy44OTlaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAAB
# AAAB8jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYv
# QBtnYJTtKKj2FKxzHx0fgV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29ed
# zGdlWbCj1Qyx5HUHNY8yu9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv
# 29h1ttNWsSc/KPOeuhzSAXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRY
# cINfXDhURvUfD70jioE92rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycT
# EOBdGVmf1HCD7WOaz5EEcQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZ
# UzN+BzcLj96ixC7wJGQMBixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7
# b8M7vvwhEL0xCOvb7WFMsstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHD
# oYhgj9uqPLP7vnoXf7j6+LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoe
# h/r3fShL6CHgPoTB7oYU/d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69
# mL8BRtSZ6dG/GFEVE+fVmgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2
# t5DAoDkuKCbC+3VdPmlYVQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAx
# BM5cH8Bg0+Y64oZ5MB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00X
# pOgPabcN3QZeyipgilcQSDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/t
# aPnobF+8CkAdkcLQhLdkShfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5t
# uvirFaUWzUWVDFOpo/O5zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRM
# iJMzxpUlvdfWGUtCvnW3eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmw
# psCtUh7tR6whCrVYkb6FudBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xL
# zk0bNxsAj0uhd6QdWr6TT39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpUR
# J6YiDKQd5YVgxsuZCWv4Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB
# 8iQ5W8ZLM5PwT8vtsKEBwHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cX
# WOMJUJzyEH4WSKZHOx53qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gV
# PplqNPDIvQ8DkZ3lvbQsYqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspE
# K8hllq3IYcyX0v897+X9YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQBri943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6rpv2TAi
# GA8yMDI0MTAxNjE3MDExM1oYDzIwMjQxMDE3MTcwMTEzWjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDqum/ZAgEAMAcCAQACAghjMAcCAQACAhL6MAoCBQDqu8FZAgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAIuPeJEugjcfrJV0dIkhqUMSj6Jx
# 3iRgadzJiwuR/iEWUxhTU8gOGun9rcCFm3umYppbXgsuh7809igGr/ehDJvxaUiw
# AAtDWlR2j8tiMLDcOwNOBhlSKF5hvn5n35wEWDpegmb/PTBmPN3G8D/0TL45WRS5
# pYXHZ6/sNc8gZQxSlAtcqj7co05HXUB0JDuoomu3Pwp/sGo0KQaM1yTVPJHjv3Xm
# SQPREH90wbRGxGK++zSl/SSd1yRCEwbXBDzFutf+L5MUUX6mX2+snBPzwdknIr4W
# QHP1cUj3pQIa+XeamTHwm6GBWwXeWIE4oWfVRGiq1QxC5w7RCR3Em6z6V4ExggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+
# MtdkrHCRlAABAAAB8jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCXdb6A/Bieu8rdId3yZT+CJXf3
# n90zjMuUP5MtdR7YozCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPjaPh0u
# MVJc04+Y4Ru5BUUbHE4suZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQgWYHxiR74
# jMaMh+s9xXYccKg8Afskta3kon5CuLtJw2AwDQYJKoZIhvcNAQELBQAEggIAsxJY
# NLTHijwNPV8u4yKbEY9jECavfMHL+2YkN3CbkWQ7ueWNmokFHyWd7mLUFaRGIU7m
# q9/qj/igwb+cnQqENgTQ65g2MTSyl56dmaeB/1nBXLX5Xd+sjbgD4mEstqT7IACO
# gA+4KrTgCkLcTgf/1oMU8E/u0kSJWMtiCdjowexCBKPU+FFvXx1kWqXf0fTzVrtw
# lGa/7J1r8YmTzh3vViAyUAR2ZLrvcVefYHVf6Y/yFsti2+sBQmdSHSXL8D+bKnTw
# 5/uDGNbN3Z0y0vLnKFgD4a1ktyFePv0f0US97BDJCj83YVMUv50eUqJW4zrAzLoN
# nlfieqR3k+UWqE/BYCVJ8fMO9JVDdezqCnQSau/xZvDO1N/zb6N1E0bUWkDWjSdH
# b+1XhwR/nC21NtEMqbqoxMODIZ/DhBmIi83wv8dk7FhnBL5xt4IA82W01CBhyX83
# oU5cDOM9mYenWzAFw0IAzA4IdS5wmXB5749iO2LWdAaJj+PMuLybiARpkrfml5Fj
# AQtTBAoqdG0SLMaeV4x6KYG0TR3faa1R/wUmu8sVaxv93XWo8/NpEH4pViJe+59b
# IBo00DWUYEcWusKYUHJ19bH8MdgPwf4EsQ4eSS6LTdMcHY6Cq7l4hRH6NxR3KQpc
# HspsnALtHPangWeawEJfwu0ILy1osAkulTdgXZc=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_48_47.ps1 | sample_48_47.ps1 | /*---------------------------------------------------------
* Copyright (C) Microsoft Corporation. All rights reserved.
*--------------------------------------------------------*/
define("vs/languages/typescript/project/projectResolver.nls.keys",[],{});
// SIG // Begin signature block
// SIG // MIIkXAYJKoZIhvcNAQcCoIIkTTCCJEkCAQExDzANBglg
// SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor
// SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC
// SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg
// SIG // nkQshafsrqW+R/3694nMqAos0U3qJwjnr+y8Xjpy8ymg
// SIG // gg2FMIIGAzCCA+ugAwIBAgITMwAAAVKbQJ9QVpl1iAAA
// SIG // AAABUjANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV
// SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
// SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
// SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT
// SIG // aWduaW5nIFBDQSAyMDExMB4XDTE5MDUwMjIxMzc0NloX
// SIG // DTIwMDUwMjIxMzc0NlowdDELMAkGA1UEBhMCVVMxEzAR
// SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
// SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
// SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
// SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
// SIG // saeJ0/an7vTtdIicnsGFx5TflhIe/TaKK/Z4TOnp1DWw
// SIG // m4V/b0vvHP93iFWs0mJ1QU6i81u8VjdWwnCLQ27BMyhB
// SIG // NgbMErp+yfcQmi8HBhyha/qllJc+4YfUXJo2EpDhjcmz
// SIG // n64I97JtA0raCvJY8BMlFXkXzB8fRP+wmvzhKtnFwU9y
// SIG // 9H1Z5RJH2pd9dBBQiw6NgaxN+TRkYxvv552YqiqhIeZV
// SIG // jZN9yVfPyNHyHFCqyxJlBq79AoAu8NnI5mwYQSCftCs0
// SIG // p0lop4F6Jf94lHQQcuEEDR++u5GBrpyXmNPEYxzCIIyQ
// SIG // nQKBDPtpl79aYWle4/jN3Tc2f3HbM96A3wIDAQABo4IB
// SIG // gjCCAX4wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB
// SIG // BQUHAwMwHQYDVR0OBBYEFN3/AMNbFu9lnCdm6P0EmBs1
// SIG // a0WHMFQGA1UdEQRNMEukSTBHMS0wKwYDVQQLEyRNaWNy
// SIG // b3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx
// SIG // FjAUBgNVBAUTDTIzMDAxMis0NTQxMzYwHwYDVR0jBBgw
// SIG // FoAUSG5k5VAF04KqFzc3IrVtqMp1ApUwVAYDVR0fBE0w
// SIG // SzBJoEegRYZDaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
// SIG // L3BraW9wcy9jcmwvTWljQ29kU2lnUENBMjAxMV8yMDEx
// SIG // LTA3LTA4LmNybDBhBggrBgEFBQcBAQRVMFMwUQYIKwYB
// SIG // BQUHMAKGRWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w
// SIG // a2lvcHMvY2VydHMvTWljQ29kU2lnUENBMjAxMV8yMDEx
// SIG // LTA3LTA4LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3
// SIG // DQEBCwUAA4ICAQCU8ETmh76IF4IsVo8o7y34kYKiNkCv
// SIG // BqBtt3qgIDY1+1f1nVFgW7NGiAt5OPXHdM3aviSSJosX
// SIG // F+lDk6c9i2TxUodt5dPzKN+cBuyV1MYDtFPuXa20Ibec
// SIG // aDJdZ+/00OIinJgGEgD8U6uZRZ6FdvnwHpY1QOzuN7M4
// SIG // 7Oy0dPQ9MBR8M2XKP4hPB5WpJdt2U+xZweQH1NocH7/O
// SIG // 8t6t2uahYroEspCC6StP76p5RFQdCgHUFc2FC0P1OHhR
// SIG // I54rNybPVKwL7SISLNuuOOUY91D+lOBoDo4EKJ5UQPpg
// SIG // 5bIe/MBUhmwEiLyvn5DjVIb4/AfGRzZ+ExX53LfmtGbn
// SIG // mOH+mkT8a/G3jUlCp+0FvxUJp+NtmxOyn56lp3LB+72z
// SIG // YRvdvaa1Rz7GmuydtovcMh4+5tKAE1yfmI38qBALXefz
// SIG // ciGGhOFLtI9RIbmFKOVWiSZzGkxEdKl/Pv2GUVqxTf4X
// SIG // qbONVzVY4gGsKWwGtH1Gt0fUTQYz4gZzNILzT6KzOHbF
// SIG // dlSfBpbiEDqyZTr7gqzmAxoqxp2nTpkNtcDwaBhQlqSu
// SIG // ej8c5YirMuTTZgF3BMe0G/b1I2NVpWLa3cDl06cTeLJc
// SIG // yIbevQWmZSyIy1VsKiH7ja4RyjQzPSvr+74KyG3+5ef+
// SIG // uuYNII0AgwjekObMbrbUwBCrSXkv6ZKSPg22fzCCB3ow
// SIG // ggVioAMCAQICCmEOkNIAAAAAAAMwDQYJKoZIhvcNAQEL
// SIG // BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
// SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
// SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT
// SIG // KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhv
// SIG // cml0eSAyMDExMB4XDTExMDcwODIwNTkwOVoXDTI2MDcw
// SIG // ODIxMDkwOVowfjELMAkGA1UEBhMCVVMxEzARBgNVBAgT
// SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
// SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYG
// SIG // A1UEAxMfTWljcm9zb2Z0IENvZGUgU2lnbmluZyBQQ0Eg
// SIG // MjAxMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
// SIG // ggIBAKvw+nIQHC6t2G6qghBNNLrytlghn0IbKmvpWlCq
// SIG // uAY4GgRJun/DDB7dN2vGEtgL8DjCmQawyDnVARQxQtOJ
// SIG // DXlkh36UYCRsr55JnOloXtLfm1OyCizDr9mpK656Ca/X
// SIG // llnKYBoF6WZ26DJSJhIv56sIUM+zRLdd2MQuA3WraPPL
// SIG // bfM6XKEW9Ea64DhkrG5kNXimoGMPLdNAk/jj3gcN1Vx5
// SIG // pUkp5w2+oBN3vpQ97/vjK1oQH01WKKJ6cuASOrdJXtjt
// SIG // 7UORg9l7snuGG9k+sYxd6IlPhBryoS9Z5JA7La4zWMW3
// SIG // Pv4y07MDPbGyr5I4ftKdgCz1TlaRITUlwzluZH9TupwP
// SIG // rRkjhMv0ugOGjfdf8NBSv4yUh7zAIXQlXxgotswnKDgl
// SIG // mDlKNs98sZKuHCOnqWbsYR9q4ShJnV+I4iVd0yFLPlLE
// SIG // tVc/JAPw0XpbL9Uj43BdD1FGd7P4AOG8rAKCX9vAFbO9
// SIG // G9RVS+c5oQ/pI0m8GLhEfEXkwcNyeuBy5yTfv0aZxe/C
// SIG // HFfbg43sTUkwp6uO3+xbn6/83bBm4sGXgXvt1u1L50kp
// SIG // pxMopqd9Z4DmimJ4X7IvhNdXnFy/dygo8e1twyiPLI9A
// SIG // N0/B4YVEicQJTMXUpUMvdJX3bvh4IFgsE11glZo+TzOE
// SIG // 2rCIF96eTvSWsLxGoGyY0uDWiIwLAgMBAAGjggHtMIIB
// SIG // 6TAQBgkrBgEEAYI3FQEEAwIBADAdBgNVHQ4EFgQUSG5k
// SIG // 5VAF04KqFzc3IrVtqMp1ApUwGQYJKwYBBAGCNxQCBAwe
// SIG // CgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB
// SIG // /wQFMAMBAf8wHwYDVR0jBBgwFoAUci06AjGQQ7kUBU7h
// SIG // 6qfHMdEjiTQwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDov
// SIG // L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj
// SIG // dHMvTWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNy
// SIG // bDBeBggrBgEFBQcBAQRSMFAwTgYIKwYBBQUHMAKGQmh0
// SIG // dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMv
// SIG // TWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNydDCB
// SIG // nwYDVR0gBIGXMIGUMIGRBgkrBgEEAYI3LgMwgYMwPwYI
// SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv
// SIG // bS9wa2lvcHMvZG9jcy9wcmltYXJ5Y3BzLmh0bTBABggr
// SIG // BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBwAG8AbABp
// SIG // AGMAeQBfAHMAdABhAHQAZQBtAGUAbgB0AC4gHTANBgkq
// SIG // hkiG9w0BAQsFAAOCAgEAZ/KGpZjgVHkaLtPYdGcimwuW
// SIG // EeFjkplCln3SeQyQwWVfLiw++MNy0W2D/r4/6ArKO79H
// SIG // qaPzadtjvyI1pZddZYSQfYtGUFXYDJJ80hpLHPM8QotS
// SIG // 0LD9a+M+By4pm+Y9G6XUtR13lDni6WTJRD14eiPzE32m
// SIG // kHSDjfTLJgJGKsKKELukqQUMm+1o+mgulaAqPyprWElj
// SIG // HwlpblqYluSD9MCP80Yr3vw70L01724lruWvJ+3Q3fMO
// SIG // r5kol5hNDj0L8giJ1h/DMhji8MUtzluetEk5CsYKwsat
// SIG // ruWy2dsViFFFWDgycScaf7H0J/jeLDogaZiyWYlobm+n
// SIG // t3TDQAUGpgEqKD6CPxNNZgvAs0314Y9/HG8VfUWnduVA
// SIG // KmWjw11SYobDHWM2l4bf2vP48hahmifhzaWX0O5dY0Hj
// SIG // Wwechz4GdwbRBrF1HxS+YWG18NzGGwS+30HHDiju3mUv
// SIG // 7Jf2oVyW2ADWoUa9WfOXpQlLSBCZgB/QACnFsZulP0V3
// SIG // HjXG0qKin3p6IvpIlR+r+0cjgPWe+L9rt0uX4ut1eBrs
// SIG // 6jeZeRhL/9azI2h15q/6/IvrC4DqaTuv/DDtBEyO3991
// SIG // bWORPdGdVk5Pv4BXIqF4ETIheu9BCrE/+6jMpF3BoYib
// SIG // V3FWTkhFwELJm3ZbCoBIa/15n8G9bW1qyVJzEw16UM0x
// SIG // ghYvMIIWKwIBATCBlTB+MQswCQYDVQQGEwJVUzETMBEG
// SIG // A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
// SIG // ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
// SIG // MSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5n
// SIG // IFBDQSAyMDExAhMzAAABUptAn1BWmXWIAAAAAAFSMA0G
// SIG // CWCGSAFlAwQCAQUAoIGuMBkGCSqGSIb3DQEJAzEMBgor
// SIG // BgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEE
// SIG // AYI3AgEVMC8GCSqGSIb3DQEJBDEiBCCs0ldtb0Q9JerG
// SIG // P2QeUCqcigno07yhJWN2GOdAV+rmGzBCBgorBgEEAYI3
// SIG // AgEMMTQwMqAUgBIATQBpAGMAcgBvAHMAbwBmAHShGoAY
// SIG // aHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3
// SIG // DQEBAQUABIIBAIbEdg95aVwG2UTHAABs53Lr9rntdSWW
// SIG // qMH19BJUoYFXgrk+TwA4urAmUqpsAypjsAgm41+fMnL2
// SIG // qPYmfry5KrDpKyuMnt4LQpidi+GDamcjHb7vDrRjI3qZ
// SIG // Kx/IDibgiCavcJQlnaHFvPKFjpzes8kDLrIYelrnYaXd
// SIG // U05+A+QAdX85voZwaKKBiXygiavWMpRzGMRs0WYbOLTy
// SIG // 0GQ2nsymEEtc3JdV24nogGpXFL1zVoX8N6Gpq160fDIQ
// SIG // Uzz2ip2WmXAw1cqC/IsLX3opQ09GEirT7XHLK+Z8lqc8
// SIG // 1s0yg/zLrJGVnrE7K4ptqi6uufSt84qWwSyLunovM/gb
// SIG // xoihghO5MIITtQYKKwYBBAGCNwMDATGCE6UwghOhBgkq
// SIG // hkiG9w0BBwKgghOSMIITjgIBAzEPMA0GCWCGSAFlAwQC
// SIG // AQUAMIIBWAYLKoZIhvcNAQkQAQSgggFHBIIBQzCCAT8C
// SIG // AQEGCisGAQQBhFkKAwEwMTANBglghkgBZQMEAgEFAAQg
// SIG // ifkSVsviK+kgyI0pdsvlBdrEMx63euevuXES2ky17m0C
// SIG // Bl4g8WA4HxgTMjAyMDAyMTMyMDAyNTUuNzY4WjAHAgEB
// SIG // gAIB9KCB1KSB0TCBzjELMAkGA1UEBhMCVVMxEzARBgNV
// SIG // BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
// SIG // HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEp
// SIG // MCcGA1UECxMgTWljcm9zb2Z0IE9wZXJhdGlvbnMgUHVl
// SIG // cnRvIFJpY28xJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
// SIG // OjU4NDctRjc2MS00RjcwMSUwIwYDVQQDExxNaWNyb3Nv
// SIG // ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIPITCCBPUwggPd
// SIG // oAMCAQICEzMAAAEFBznqWfNVvyoAAAAAAQUwDQYJKoZI
// SIG // hvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
// SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
// SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG
// SIG // A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
// SIG // MTAwHhcNMTkwOTA2MjA0MTE4WhcNMjAxMjA0MjA0MTE4
// SIG // WjCBzjELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
// SIG // bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
// SIG // FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMg
// SIG // TWljcm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28x
// SIG // JjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjU4NDctRjc2
// SIG // MS00RjcwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T
// SIG // dGFtcCBTZXJ2aWNlMIIBIjANBgkqhkiG9w0BAQEFAAOC
// SIG // AQ8AMIIBCgKCAQEAzCKWY1VIi1kBqgxSy2nhn4XPW8Qs
// SIG // IvB0MfoHGheWc9hqHYTO9aMo2perqp0TPEB8Y+PbihZm
// SIG // P0lhIZVfrKNyK5hB1S5rJHhEGoqOT8VYFFkZvrASCaUv
// SIG // Ro8Cqxj2drm+Ek9ifX7uRcW305icgdgC+lu1nElDjfLc
// SIG // rs9vzUQCCOmLqI3TGupo1V2pi9gEuzwaNRluD2uF2zYR
// SIG // EKAOP7IkuCRm3HwMFTBr/O24SmqQ6qVy2w6ui2xXSwL+
// SIG // 0O3lB4h0uHnHF0TRgJ6ZHYRziu7NTvRaqUWWLG8f1KZG
// SIG // qMqokHvyRUwPtZHmGbGYGkKoDzaRmA+dEgw8kGdr7Tce
// SIG // ylYF7QIDAQABo4IBGzCCARcwHQYDVR0OBBYEFD10G/66
// SIG // dyhMyug2DstxZ/0CMzciMB8GA1UdIwQYMBaAFNVjOlyK
// SIG // MZDzQ3t8RhvFM2hahW1VMFYGA1UdHwRPME0wS6BJoEeG
// SIG // RWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3Js
// SIG // L3Byb2R1Y3RzL01pY1RpbVN0YVBDQV8yMDEwLTA3LTAx
// SIG // LmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKG
// SIG // Pmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2Vy
// SIG // dHMvTWljVGltU3RhUENBXzIwMTAtMDctMDEuY3J0MAwG
// SIG // A1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYBBQUHAwgw
// SIG // DQYJKoZIhvcNAQELBQADggEBAKfOYXd7awFX5lQD5nDg
// SIG // KpzOO021gfUtMkhhv3jbyH4YGAtGIwixGYYokMjnkU8L
// SIG // NJSDlhr+7TOba+9ERszaNfwu0kGnakNnU+bFI+xmuixz
// SIG // tnsXHc0b1CMHXjmlbmo+FaYl54YzwUbtglTRlz3tXe2c
// SIG // 8O3YvMYdg+qKGQY4Ry4e8hn9mRYwYy3A1Y632i8HeGKn
// SIG // nyYIONrPBDFKF87E6T5UtCASlnl/kWwcnDlIV6Svapbx
// SIG // WwUBqeDfrixFeoWht96FTrVsK24buRdBOFA87BVGmfDg
// SIG // C8iq2kdXSKPmVPs46Z9zWuylJK0/9VBWHZ1mMKFA5vXv
// SIG // g5gYanYVJcSIUZ8wggZxMIIEWaADAgECAgphCYEqAAAA
// SIG // AAACMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJV
// SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
// SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
// SIG // cmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBD
// SIG // ZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0xMDA3
// SIG // MDEyMTM2NTVaFw0yNTA3MDEyMTQ2NTVaMHwxCzAJBgNV
// SIG // BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYD
// SIG // VQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg
// SIG // Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBU
// SIG // aW1lLVN0YW1wIFBDQSAyMDEwMIIBIjANBgkqhkiG9w0B
// SIG // AQEFAAOCAQ8AMIIBCgKCAQEAqR0NvHcRijog7PwTl/X6
// SIG // f2mUa3RUENWlCgCChfvtfGhLLF/Fw+Vhwna3PmYrW/AV
// SIG // UycEMR9BGxqVHc4JE458YTBZsTBED/FgiIRUQwzXTbg4
// SIG // CLNC3ZOs1nMwVyaCo0UN0Or1R4HNvyRgMlhgRvJYR4Yy
// SIG // hB50YWeRX4FUsc+TTJLBxKZd0WETbijGGvmGgLvfYfxG
// SIG // wScdJGcSchohiq9LZIlQYrFd/XcfPfBXday9ikJNQFHR
// SIG // D5wGPmd/9WbAA5ZEfu/QS/1u5ZrKsajyeioKMfDaTgaR
// SIG // togINeh4HLDpmc085y9Euqf03GS9pAHBIAmTeM38vMDJ
// SIG // RF1eFpwBBU8iTQIDAQABo4IB5jCCAeIwEAYJKwYBBAGC
// SIG // NxUBBAMCAQAwHQYDVR0OBBYEFNVjOlyKMZDzQ3t8RhvF
// SIG // M2hahW1VMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBB
// SIG // MAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8G
// SIG // A1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYG
// SIG // A1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9z
// SIG // b2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0Nl
// SIG // ckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQRO
// SIG // MEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9z
// SIG // b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIw
// SIG // MTAtMDYtMjMuY3J0MIGgBgNVHSABAf8EgZUwgZIwgY8G
// SIG // CSsGAQQBgjcuAzCBgTA9BggrBgEFBQcCARYxaHR0cDov
// SIG // L3d3dy5taWNyb3NvZnQuY29tL1BLSS9kb2NzL0NQUy9k
// SIG // ZWZhdWx0Lmh0bTBABggrBgEFBQcCAjA0HjIgHQBMAGUA
// SIG // ZwBhAGwAXwBQAG8AbABpAGMAeQBfAFMAdABhAHQAZQBt
// SIG // AGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEAB+aI
// SIG // UQ3ixuCYP4FxAz2do6Ehb7Prpsz1Mb7PBeKp/vpXbRkw
// SIG // s8LFZslq3/Xn8Hi9x6ieJeP5vO1rVFcIK1GCRBL7uVOM
// SIG // zPRgEop2zEBAQZvcXBf/XPleFzWYJFZLdO9CEMivv3/G
// SIG // f/I3fVo/HPKZeUqRUgCvOA8X9S95gWXZqbVr5MfO9sp6
// SIG // AG9LMEQkIjzP7QOllo9ZKby2/QThcJ8ySif9Va8v/rbl
// SIG // jjO7Yl+a21dA6fHOmWaQjP9qYn/dxUoLkSbiOewZSnFj
// SIG // nXshbcOco6I8+n99lmqQeKZt0uGc+R38ONiU9MalCpaG
// SIG // pL2eGq4EQoO4tYCbIjggtSXlZOz39L9+Y1klD3ouOVd2
// SIG // onGqBooPiRa6YacRy5rYDkeagMXQzafQ732D8OE7cQnf
// SIG // XXSYIghh2rBQHm+98eEA3+cxB6STOvdlR3jo+KhIq/fe
// SIG // cn5ha293qYHLpwmsObvsxsvYgrRyzR30uIUBHoD7G4kq
// SIG // VDmyW9rIDVWZeodzOwjmmC3qjeAzLhIp9cAvVCch98is
// SIG // TtoouLGp25ayp0Kiyc8ZQU3ghvkqmqMRZjDTu3QyS99j
// SIG // e/WZii8bxyGvWbWu3EQ8l1Bx16HSxVXjad5XwdHeMMD9
// SIG // zOZN+w2/XU/pnR4ZOC+8z1gFLu8NoFA12u8JJxzVs341
// SIG // Hgi62jbb01+P3nSISRKhggOvMIIClwIBATCB/qGB1KSB
// SIG // 0TCBzjELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
// SIG // bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
// SIG // FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEpMCcGA1UECxMg
// SIG // TWljcm9zb2Z0IE9wZXJhdGlvbnMgUHVlcnRvIFJpY28x
// SIG // JjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjU4NDctRjc2
// SIG // MS00RjcwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1T
// SIG // dGFtcCBTZXJ2aWNloiUKAQEwCQYFKw4DAhoFAAMVANJ5
// SIG // nOzIh9j69Md959d2YOEZVfaqoIHeMIHbpIHYMIHVMQsw
// SIG // CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
// SIG // MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
// SIG // b2Z0IENvcnBvcmF0aW9uMSkwJwYDVQQLEyBNaWNyb3Nv
// SIG // ZnQgT3BlcmF0aW9ucyBQdWVydG8gUmljbzEnMCUGA1UE
// SIG // CxMebkNpcGhlciBOVFMgRVNOOjRERTktMEM1RS0zRTA5
// SIG // MSswKQYDVQQDEyJNaWNyb3NvZnQgVGltZSBTb3VyY2Ug
// SIG // TWFzdGVyIENsb2NrMA0GCSqGSIb3DQEBBQUAAgUA4e/+
// SIG // ajAiGA8yMDIwMDIxNDAwNTcxNFoYDzIwMjAwMjE1MDA1
// SIG // NzE0WjB2MDwGCisGAQQBhFkKBAExLjAsMAoCBQDh7/5q
// SIG // AgEAMAkCAQACASMCAf8wBwIBAAICGDswCgIFAOHxT+oC
// SIG // AQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoD
// SIG // AaAKMAgCAQACAxbjYKEKMAgCAQACAwehIDANBgkqhkiG
// SIG // 9w0BAQUFAAOCAQEAK0SVgnt1ExNy97OLIhzsxeqZtm1g
// SIG // btiCy4Le1I2YGsLsAyRGr2uWt1pz0I20W95i2iyKQ2Ug
// SIG // N/TVpWJfyQ/JEjeznZSWuXDCazFaE84RJy1xXp0o5iou
// SIG // AwVRgfaXX2Jbegi7LY9HbOp8+RzU/aYOg0zXyZ9lcrOL
// SIG // IHClQ2dr+ZEPLHlzblhO2sNPaJgnYT6vpxT9KOCyf0QZ
// SIG // xOje35zPrL/BOkiQcqEoSFPRK+Qbzb1tIlY38vsOOgfG
// SIG // GpfbpUBqI3pkYbwQmv8KoCQCPp1tzjj2CrgiKWDV6YbG
// SIG // wrd0rvPWSpG5vo0kLVMdKWGLD25we1+Azj/pNWJ772Rv
// SIG // LAotbzGCAvUwggLxAgEBMIGTMHwxCzAJBgNVBAYTAlVT
// SIG // MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
// SIG // ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
// SIG // YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0
// SIG // YW1wIFBDQSAyMDEwAhMzAAABBQc56lnzVb8qAAAAAAEF
// SIG // MA0GCWCGSAFlAwQCAQUAoIIBMjAaBgkqhkiG9w0BCQMx
// SIG // DQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEIL1R
// SIG // BNqjTVm2Mq9hfa9OmTL7AMvc9ekq+GCtnK7+p4P9MIHi
// SIG // BgsqhkiG9w0BCRACDDGB0jCBzzCBzDCBsQQU0nmc7MiH
// SIG // 2Pr0x33n13Zg4RlV9qowgZgwgYCkfjB8MQswCQYDVQQG
// SIG // EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
// SIG // BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
// SIG // cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
// SIG // ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAQUHOepZ81W/KgAA
// SIG // AAABBTAWBBSyIOWTQzwdULy+NYafQEi7/SDhcTANBgkq
// SIG // hkiG9w0BAQsFAASCAQAWkjWf62EiJ2smhxoav7bLjmTC
// SIG // +OWti/pAMW3h7CIfkkI5p7eg8D/6GyoPpy4oCmWk1wpw
// SIG // 45pxqu2eSF7drkVAV7ofOMa/2J73dCUBD88XPZNR5c86
// SIG // g72Ifx5I5OwWWgnKB/GM51Qf64ulqtOSVxVYkGrhmki0
// SIG // LF8CT7KlfXSEQgfF9Ir2pCaC6EcWQWaRS5OgXX34qzdw
// SIG // 5GtX4ST7pq8OUE3rushpnZ/QZzSu3gF2zYGE/pxlU6jQ
// SIG // Kuoc8FFDiX9gTg2OrXjEacOfVKjuNvEyy9f5CMf0tzyA
// SIG // 16QPbKjpReozr+kVYtVgg7UjsMcJ6RDO87KRFWMnGQKI
// SIG // B5ePTxe9
// SIG // End signature block
|
combined_dataset/train/non-malicious/ISEFun_1.psm1.ps1 | ISEFun_1.psm1.ps1 | # Module version 0.2
# Author: Bartek Bielawski (@bielawb on twitter)
# Purpose: Add functionality to PowerShell ISE
# Description: Adds Add-ons menu 'ISEFun' with all functions included.
# User can add any action there using Add-MyMenuItem function
# One of functions (Copy item from history) was build using WPK - won't work if the latter is not loaded.
# There is also pretty large code for Windows Forms form (change token colors using ColorDialog)
# Edit-Function will allow you modify any function in ISE editor
# Expand-Alias will expand aliases in current file
# Edit-HelpExample will create new file $with all examples from a given command
# Show-Top will generate table of processes sorted by a given Property in separate ISE Tab, with new/ terminated processes marked
# Update-SnippetMenu and New-Snippet are designed to work with custom code snippets.
# Have ISE - Fun! ;)
# Changes:
# Version 0.2
# * Added function Edit-HelpExample
# * Added function Show-Top
# * Added custom snippets support (add/ use)
# Version 0.1
# * First public version
# * Cleaned code, added help
# * Contains functions: Edit-Function, Add-MenuItem, Set-TokenColor, Expand-Alias, Invoke-CurrentLine, Copy-HistoryItem
# * Simple menu with all functions included, together with helper function (Add-MenuItem) that should simplify adding new items if needed.
if (-not ($MyISEMenu = $psISE.CurrentPowerShellTab.AddOnsMenu.Submenus | Where-Object { $_.DisplayName -eq 'ISEFun'} ) ) {
$MyISEMenu = $psISE.CurrentPowerShellTab.AddOnsMenu.Submenus.Add('ISEFun',$null,$null)
}
# Helper function to add menu items, exported cause it can be used also for other stuff. :>
function Add-MyMenuItem {
<#
.Synopsis
Adds items to ISEFun Add-Ons sub-menu
.Description
Function can be used to add menu items to ISEFun menu. All you need is command, name and hotkey - we will take care of the rest for you. ;)
.Example
Add-MyMenuItem 'Write-Host fooo' 'Fooo!' 'CTRL+9'
Description
-----------
This command will add item 'Fooo!' to ISEFun menu. This item will write 'fooo' to the host and can be launched using shortcut CTRL + 9
#>
PARAM (
# Script that will be launched when menu item will be selected
[Parameter(Mandatory = $true, HelpMessage = 'Command that you want to add to menu')]
[string]$Command,
# Title for the command in the menu
[string]$DisplayName,
# Hot key to use given item
[string]$HotKey = $null,
# If specified - will create submenu to hold given command
[string]$SubMenu = $null
)
if (!$DisplayName) {
$DisplayName = $Command -replace '-',' '
}
if (!$SubMenu) {
$Menu = $Script:MyISEMenu
} elseif ($Menu = $MyISEMenu.Submenus | Where-Object { $_.DisplayName -eq $SubMenu }) {
if (!($Menu.submenus)) {
$Menu = $Script:MyISEMenu
}
} else {
$Menu = $MyISEMenu.Submenus.Add($SubMenu,$null,$null)
}
if ( -not ($Menu.Submenus | Where-Object { $_.DisplayName -eq $DisplayName} ) ) {
try {
[void]$Menu.Submenus.Add($DisplayName,[scriptblock]::Create($Command),$HotKey)
} catch {
# Probably hotkey already used, adding item without it
[void]$Menu.Submenus.Add($DisplayName,[scriptblock]::Create($Command),$null)
}
}
}
Add-MyMenuItem Add-MyMenuItem 'Add items'
function Update-SnippetMenu {
<#
.Synopsis
Updates/ creates custom snippet menu.
.Description
This function will take any snippets that you have in location (either default or selected one) and add those to ISEFun 'Code Snippets' menu.
It uses .ps1 file to make it easier to modify files in ISE (with syntax highlighting and stuff...)
.Example
Update-SnippetMenu
Checks for files in $PSScriptRoot\\ISESnippets folder and add them to 'Code Snippets' menu.
#>
param (
[string]$Path = "$PSScriptRoot\\ISESnippets"
)
foreach ($file in Get-ChildItem $Path -filter *.ps1) {
$command = @"
if (!(`$file = `$psISE.CurrentFile)) {
`$file = `$psISE.CurrentPowerShellTab.Files.Add()
}
`$file.Editor.InsertText(
`$( (Get-Content $($file.FullName)) | Out-String )
)
"@
$Name = $file.BaseName -replace '_', ' '
Add-MyMenuItem $command "Instert $Name" $null 'Code Snippets'
}
}
Add-MyMenuItem Update-SnippetMenu 'Adds/ updates code snippets menu'
function New-Snippet {
<#
.Synopsis
Creates new snippet from current file/ selection.
.Description
This function will create new snippets for you. To simplify usage in ISE it has mandatory parameter for snippet name (GUI prompt).
It will by default store snippets under modules root folder in 'ISESnippets'.
.Example
New-Snippet -SnippetName 'My funny name that will have underscore instead of **?? special \\ chars'
Will create new file (with rather odd name) with current selection (or file, if nothing was selected).
All special chars and spaces will be replace with underscore ( _ ).
#>
param(
[Parameter(Mandatory = $true, HelpMessage = 'Please specify name of the snippet')]
[Alias("SN","Name")]
[string]$SnippetName,
[string]$Path = "$PSScriptRoot\\ISESnippets"
)
if ($file = $psISE.CurrentFile) {
if (!($Value = $file.Editor.SelectedText)) {
$Value = $file.Editor.Text
}
} else {
Write-Error "No files opened in this tab!"
return
}
$Name = ($SnippetName -replace '[\\s+\\\\\\*\\?]', '_') + '.ps1'
New-Item -Force -ItemType file -Path (Join-Path $Path $Name) -Value $Value | Out-Null
}
Add-MyMenuItem New-Snippet 'Create new snippet from selection/ file'
function Show-Top {
PARAM (
[int]$Count = 20,
[int]$Sleep = 5,
[string]$Property = 'WS'
)
$TopTab = $psISE.PowerShellTabs.Add()
sleep 10
if ($TopTab.CanInvoke) {
$TopTab.DisplayName = "TOP$Count - $Property"
$psISE.PowerShellTabs.SetSelectedPowerShellTab($TopTab)
$TopTab.Invoke([scriptblock]::Create(@"
Register-WmiEvent -Query "SELECT * From Win32_ProcessStartTrace"
Register-WmiEvent -Query "SELECT * From Win32_ProcessStopTrace"
`$formaterS = "{0,10} {1,10} {2,10} {3,10} {4,10} {5,10} {6,10} {7,-30}"
`$formaterD = "{0,10} {1,10:N0} {2,10:N0} {3,10:N0} {4,10:N0} {5,10:N2} {6,10} {7,-30}"
while (`$true) {
function prompt {
`$psISE.PowerShellTabs.Remove(`$psISE.CurrentPowerShellTab)
}
Clear-Host
'TOP for PowerShell ISE - from ISEFun module'
'=' * 50
`$Processes = Get-Process
`$Started = @(Get-Event | where { `$_.SourceEventArgs.NewEvent.__Class -match 'Start' } | foreach { `$_.SourceEventArgs.NewEvent.ProcessID })
`$Stopped = @(Get-Event | where { `$_.SourceEventArgs.NewEvent.__Class -match 'Stop' } | foreach { `$_.SourceEventArgs.NewEvent.ProcessID })
`$Processes += `$DisplayedProcess | where { `$Stopped -contains `$_.Id }
`$Processes = `$Processes | sort -Descending $Property
`$DisplayedProcess = `$Processes | select -First $Count
`$formaterS -f `$('Handles NPM(K) PM(K) WS(K) VM(M) CPU(s) Id ProcessName'.Split())
`$formaterS -f `$(@('-' * 10) * 8)
foreach (`$process in `$DisplayedProcess) {
`$ProcessString = `$formaterD -f `$process.Handles, `$(`$process.NPM / 1KB), `$(`$process.PM/1KB), `$(`$process.WS / 1KB), `$(`$process.VM / 1MB), `$process.CPU, `$process.Id, `$(`$process.Name -replace '(^.{0,29}).*', '`$1')
if (`$Stopped -contains `$process.id) {
`$ProcessString + "==> PROCESS TERMINATED"
} elseif (`$Started -contains `$process.id) {
`$ProcessString + "<== NEW PROCESS ADDED"
} else {
`$ProcessString
}
}
Get-Event | Remove-Event
"Diplay $Count processes out of `$(`$Processes.Count)"
sleep $Sleep
}
"@))
}
}
Add-MyMenuItem Show-Top
function Edit-HelpExample {
<#
.Synopsis
Simple function to copy help examples (as useable code) and it's description (as comments) to empty file in ISE
.Description
If you want to see what examples are available for a given command - that function is for you.
It can easily get all examples in a way that you can just highlight them and get results back.
Only basic testing done, so probably something is still missing...
.Example
Get-HelpExample Get-ChildItem
Copies all 7 examples from Get-ChilItem cmdlet to empty file.
.Example
Get-HelpExample Get-HelpExample
If I did everything right you will probably see this command, text that I'm currently typing and anything above/ below in this section of function
#>
param (
# Name of the command that will be used to get examples
[Parameter(Mandatory = $true, HelpMessage = 'Name of the command that will be used to get examples')]
[ValidateScript( { (Get-Help $_).Examples.example })]
[string]$Name
)
if ($psISE) {
$Editor = $psISE.CurrentPowerShellTab.Files.Add().Editor
$Editor.InsertText("# Examples from help - $Name`n")
foreach ($example in (Get-Help $Name).Examples.example) {
$Editor.InsertText(@"
<# START :=> $(($example.title) -replace '-')
$(($example.remarks | select -ExpandProperty text | where { $_ }) -join "`n")
END :=> $(($example.title) -replace '-') #>
$(($example | select -ExpandProperty code) -replace '(?m:^C:(\\\\\\w*)+>)')
"@)
}
} else {
throw "You must use this function/ script in PowerShell ISE!"
}
}
Add-MyMenuItem Edit-HelpExample 'Edit Help Example'
# Next few lines are just garbage you get when you wanna be smart and create GUI in the script.
# Forgive me for adding this stuff here, I could probably compile it in some dll and skip this but...
# ... well - it gives impression that my module is bigger than it actually is. ;)
#
# Our form to change colours... :)
$handler_bClose_Click=
{
$Main.Hide()
}
$handler_bColor_Click=
{
$Dialog = New-Object Windows.Forms.ColorDialog -Property @{
Color = [drawing.color]::FromArgb($psISE.Options.TokenColors.Item($Combo.SelectedItem).ToString())
FullOpen = $true
}
if ($Dialog.ShowDialog() -eq 'OK') {
$psISE.Options.TokenColors.Item($Combo.SelectedItem) = [windows.media.color]::FromRgb($Dialog.Color.R, $Dialog.Color.G, $Dialog.Color.B)
$Combo.ForeColor = $Dialog.Color
}
}
$handler_selectedValue = {
$Combo.ForeColor = [drawing.color]::FromArgb($psISE.Options.TokenColors.Item($Combo.SelectedItem).ToString())
$bColor.Focus()
}
$OnLoadForm_StateCorrection = {
$Main.WindowState = $InitialFormWindowState
}
$Script:Main = New-Object Windows.Forms.Form -Property @{
Text = "Token colors selector"
MaximizeBox = $False
Name = "Main"
HelpButton = $True
MinimizeBox = $False
ClientSize = New-Object System.Drawing.Size 426, 36
}
$Main.DataBindings.DefaultDataSourceUpdateMode = 0
$Combo = New-Object Windows.Forms.ComboBox -Property @{
FormattingEnabled = $True
Size = New-Object System.Drawing.Size 239, 23
Name = "Combo"
Location = New-Object System.Drawing.Point 12, 7
Font = New-Object System.Drawing.Font("Lucida Console",11.25,0,3,238)
TabIndex = 4
DropDownStyle = 'DropDownList'
}
$Combo.DataBindings.DefaultDataSourceUpdateMode = 0
$Combo.Items.AddRange($psISE.Options.TokenColors.Keys)
$Combo.Add_SelectedValueChanged($handler_SelectedValue)
$InitialFormWindowState = New-Object Windows.Forms.FormWindowState
$bClose = New-Object Windows.Forms.Button -Property @{
TabIndex = 2
Name = "bClose"
Size = New-Object System.Drawing.Size 75, 23
UseVisualStyleBackColor = $True
Text = "Close"
Location = New-Object System.Drawing.Point 338, 7
}
$bClose.DataBindings.DefaultDataSourceUpdateMode = 0
$bClose.add_Click($handler_bClose_Click)
$bColor = New-Object Windows.Forms.Button -Property @{
TabIndex = 1
Name = "bColor"
Size = New-Object System.Drawing.Size 75, 23
UseVisualStyleBackColor = $True
Text = "Color"
Location = New-Object System.Drawing.Point 257, 7
}
$bColor.DataBindings.DefaultDataSourceUpdateMode = 0
$bColor.add_Click($handler_bColor_Click)
$Main.Controls.AddRange(@($bColor,$bClose,$Combo))
$InitialFormWindowState = $Main.WindowState
$Main.add_Load($OnLoadForm_StateCorrection)
$HelpMessage = @'
This GUI will help you change you token colors.
It's updating text color as you select tokens that you want to modify.
Button 'Color' opens up color dialog.
I won't describe actions performed by 'Close' button. I hope you are able to guess it... ;)
'@
$Main.add_HelpButtonClicked( { [void][windows.forms.MessageBox]::Show($HelpMessage,'Help','OK','Information')})
function Set-TokenColor {
<#
.Synopsis
GUI to add some Token Colors.
.Description
Really. It is just that. No more to it. Seriously!
OK. GUI is pretty smart. You can select tokens that are available, color will change and match the one you currently have. See for yourself. ;)
.Example
Can't show you click-click-click example :)
#>
$Script:Main.ShowDialog()| Out-Null
}
Add-MyMenuItem Set-TokenColor
function Expand-Alias {
<#
.Synopsis
Function to expand all command aliases in current script.
.Description
If you want to expand all aliases in a script/ module that you write in PowerShell ISE - this function will help you with that.
It's using Tokenizer to find all commands, Get-Alias to find aliases and their definition, and simply replace alias with command hidden by it.
.Example
Expand-Alias
#>
# Read in current file
if (!$psISE.CurrentFile) {
throw 'No files opened!'
}
if ( -not ($Script = $psISE.CurrentFile.Editor.Text) ) {
throw 'No code!'
}
$line = $psISE.CurrentFile.Editor.CaretLine
$column = $psISE.CurrentFile.Editor.CaretColumn
if ( -not ($commands = [System.Management.Automation.PsParser]::Tokenize($Script, [ref]$null) | Where-Object { $_.Type -eq 'Command' } | Sort-Object -Property Start -Descending) ) {
return
}
foreach ($command in $commands) {
if (Get-Alias $command.Content -ErrorAction SilentlyContinue) {
# $command
$psISE.CurrentFile.Editor.Select($command.StartLine, $command.StartColumn, $command.EndLine, $command.EndColumn)
$psISE.CurrentFile.Editor.InsertText($(Get-Alias $command.Content | Select-Object -ExpandProperty Definition))
}
}
$psISE.CurrentFile.Editor.SetCaretPosition($line, $column)
}
Add-MyMenuItem Expand-Alias
function Edit-Function {
<#
.Synopsis
Simpe function to edit functions in ISE.
.Description
Need to edit function on-the-fly? Want to see how a given function looks like to change it a bit and rename it?
Or maybe just preparing module and you want to change functions you define to make sure changes will work as expected?
Well, with Edit-Function, which is very simple (thank you PowerShell team!) you can do it. :)
.Example
Edit-Function Edit-Function
Description
-----------
You can open any function that exists in your current session, including the function that you reading help to now.
Be careful with that one though. If you change it in wrong direction you may not be able to open it again and fix it.
At least not in the way you could originaly, with Edit-Function. :)
#>
[CmdletBinding()]
param (
[Parameter(Mandatory=$true,HelpMessage='Function name is mandatory parameter.')]
[ValidateScript({Get-Command -CommandType function $_})]
[string]
$Name
)
if (!$psISE) {
Throw 'Implemented for PowerShell ISE only!'
}
$file = $psISE.CurrentPowerShellTab.Files.Add()
$file.Editor.InsertText("function $name {`n")
$file.Editor.InsertText($(Get-Command -CommandType function $name | Select-Object -ExpandProperty definition))
$file.Editor.InsertText("}")
}
Add-MyMenuItem Edit-Function
function Copy-HistoryItem {
<#
.Synopsis
Function build using WPK to give you functionality similar to one you already have in PowerShell.exe
.Description
Display you command history and let you choose from it. Copies selected command to you commandPane.
.Example
Copy-HistoryItem
GUI, so it's not easy to show examples...
#>
try {
New-Window -Width 800 -Height 100 {
New-ListBox -On_PreviewMouseDoubleClick {
$psISE.CurrentPowerShellTab.CommandPane.InsertText($this.SelectedValue)
$this.parent.close()
} -Items $(Get-History | Select-Object -ExpandProperty CommandLine)
} -Show
} catch {
throw 'Requires WPK to work, will be rewritten soon...'
}
}
Add-MyMenuItem Copy-HistoryItem 'Copy item from History' F7
function Invoke-CurrentLine {
$Editor = $psISE.CurrentFile.Editor
$row = $Editor.CaretLine
$col = $Editor.CaretColumn
$Editor.Select($row, 1, $col, $Editor.GetLineLength($row) + 1)
[scriptblock]::Create($Editor.SelectedText).Invoke()
$Editor.SetCaretPosition($row,$col)
}
Add-MyMenuItem Invoke-CurrentLine 'Invoke Current Line' F9
New-Alias -Name edfun -Value Edit-Function
New-Alias -Name expa -Value Expand-Alias
New-Alias -Name cphi -Value Copy-HistoryItem
Export-ModuleMember -Function * -Alias *
# Get rid off menu if module is going to be unloaded.
$MyInvocation.MyCommand.ScriptBlock.Module.OnRemove = {
[void]$psISE.CurrentPowerShellTab.AddOnsMenu.Submenus.Remove($MyISEMenu)
}
|
combined_dataset/train/non-malicious/sample_34_69.ps1 | sample_34_69.ps1 | export function scrollToPrevious(horizontalScrollElement) {
horizontalScrollElement.scrollToPrevious();
}
export function scrollToNext(horizontalScrollElement) {
horizontalScrollElement.scrollToNext();
}
export function scrollInView(horizontalScrollElement, viewIndex) {
horizontalScrollElement.scrollInView(viewIndex);
}
// SIG // Begin signature block
// SIG // MIIoKAYJKoZIhvcNAQcCoIIoGTCCKBUCAQExDzANBglg
// SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor
// SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC
// SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg
// SIG // lJNd3LLucubqalFWROYoH3gIZDgNKfF/0X2INnKmaDqg
// SIG // gg12MIIF9DCCA9ygAwIBAgITMwAAA68wQA5Mo00FQQAA
// SIG // AAADrzANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV
// SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
// SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
// SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT
// SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDkwMFoX
// SIG // DTI0MTExNDE5MDkwMFowdDELMAkGA1UEBhMCVVMxEzAR
// SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
// SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
// SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
// SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
// SIG // zkvLNa2un9GBrYNDoRGkGv7d0PqtTBB4ViYakFbjuWpm
// SIG // F0KcvDAzzaCWJPhVgIXjz+S8cHEoHuWnp/n+UOljT3eh
// SIG // A8Rs6Lb1aTYub3tB/e0txewv2sQ3yscjYdtTBtFvEm9L
// SIG // 8Yv76K3Cxzi/Yvrdg+sr7w8y5RHn1Am0Ff8xggY1xpWC
// SIG // XFI+kQM18njQDcUqSlwBnexYfqHBhzz6YXA/S0EziYBu
// SIG // 2O2mM7R6gSyYkEOHgIGTVOGnOvvC5xBgC4KNcnQuQSRL
// SIG // iUI2CmzU8vefR6ykruyzt1rNMPI8OqWHQtSDKXU5JNqb
// SIG // k4GNjwzcwbSzOHrxuxWHq91l/vLdVDGDUwIDAQABo4IB
// SIG // czCCAW8wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB
// SIG // BQUHAwMwHQYDVR0OBBYEFEcccTTyBDxkjvJKs/m4AgEF
// SIG // hl7BMEUGA1UdEQQ+MDykOjA4MR4wHAYDVQQLExVNaWNy
// SIG // b3NvZnQgQ29ycG9yYXRpb24xFjAUBgNVBAUTDTIzMDAx
// SIG // Mis1MDE4MjYwHwYDVR0jBBgwFoAUSG5k5VAF04KqFzc3
// SIG // IrVtqMp1ApUwVAYDVR0fBE0wSzBJoEegRYZDaHR0cDov
// SIG // L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWlj
// SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNybDBhBggr
// SIG // BgEFBQcBAQRVMFMwUQYIKwYBBQUHMAKGRWh0dHA6Ly93
// SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj
// SIG // Q29kU2lnUENBMjAxMV8yMDExLTA3LTA4LmNydDAMBgNV
// SIG // HRMBAf8EAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQCEsRbf
// SIG // 80dn60xTweOWHZoWaQdpzSaDqIvqpYHE5ZzuEMJWDdcP
// SIG // 72MGw8v6BSaJQ+a+hTCXdERnIBDPKvU4ENjgu4EBJocH
// SIG // lSe8riiZUAR+z+z4OUYqoFd3EqJyfjjOJBR2z94Dy4ss
// SIG // 7LEkHUbj2NZiFqBoPYu2OGQvEk+1oaUsnNKZ7Nl7FHtV
// SIG // 7CI2lHBru83e4IPe3glIi0XVZJT5qV6Gx/QhAFmpEVBj
// SIG // SAmDdgII4UUwuI9yiX6jJFNOEek6MoeP06LMJtbqA3Bq
// SIG // +ZWmJ033F97uVpyaiS4bj3vFI/ZBgDnMqNDtZjcA2vi4
// SIG // RRMweggd9vsHyTLpn6+nXoLy03vMeebq0C3k44pgUIEu
// SIG // PQUlJIRTe6IrN3GcjaZ6zHGuQGWgu6SyO9r7qkrEpS2p
// SIG // RjnGZjx2RmCamdAWnDdu+DmfNEPAddYjaJJ7PTnd+PGz
// SIG // G+WeH4ocWgVnm5fJFhItjj70CJjgHqt57e1FiQcyWCwB
// SIG // hKX2rGgN2UICHBF3Q/rsKOspjMw2OlGphTn2KmFl5J7c
// SIG // Qxru54A9roClLnHGCiSUYos/iwFHI/dAVXEh0S0KKfTf
// SIG // M6AC6/9bCbsD61QLcRzRIElvgCgaiMWFjOBL99pemoEl
// SIG // AHsyzG6uX93fMfas09N9YzA0/rFAKAsNDOcFbQlEHKiD
// SIG // T7mI20tVoCcmSIhJATCCB3owggVioAMCAQICCmEOkNIA
// SIG // AAAAAAMwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYT
// SIG // AlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
// SIG // EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
// SIG // cG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290
// SIG // IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDExMB4XDTEx
// SIG // MDcwODIwNTkwOVoXDTI2MDcwODIxMDkwOVowfjELMAkG
// SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
// SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
// SIG // dCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9zb2Z0
// SIG // IENvZGUgU2lnbmluZyBQQ0EgMjAxMTCCAiIwDQYJKoZI
// SIG // hvcNAQEBBQADggIPADCCAgoCggIBAKvw+nIQHC6t2G6q
// SIG // ghBNNLrytlghn0IbKmvpWlCquAY4GgRJun/DDB7dN2vG
// SIG // EtgL8DjCmQawyDnVARQxQtOJDXlkh36UYCRsr55JnOlo
// SIG // XtLfm1OyCizDr9mpK656Ca/XllnKYBoF6WZ26DJSJhIv
// SIG // 56sIUM+zRLdd2MQuA3WraPPLbfM6XKEW9Ea64DhkrG5k
// SIG // NXimoGMPLdNAk/jj3gcN1Vx5pUkp5w2+oBN3vpQ97/vj
// SIG // K1oQH01WKKJ6cuASOrdJXtjt7UORg9l7snuGG9k+sYxd
// SIG // 6IlPhBryoS9Z5JA7La4zWMW3Pv4y07MDPbGyr5I4ftKd
// SIG // gCz1TlaRITUlwzluZH9TupwPrRkjhMv0ugOGjfdf8NBS
// SIG // v4yUh7zAIXQlXxgotswnKDglmDlKNs98sZKuHCOnqWbs
// SIG // YR9q4ShJnV+I4iVd0yFLPlLEtVc/JAPw0XpbL9Uj43Bd
// SIG // D1FGd7P4AOG8rAKCX9vAFbO9G9RVS+c5oQ/pI0m8GLhE
// SIG // fEXkwcNyeuBy5yTfv0aZxe/CHFfbg43sTUkwp6uO3+xb
// SIG // n6/83bBm4sGXgXvt1u1L50kppxMopqd9Z4DmimJ4X7Iv
// SIG // hNdXnFy/dygo8e1twyiPLI9AN0/B4YVEicQJTMXUpUMv
// SIG // dJX3bvh4IFgsE11glZo+TzOE2rCIF96eTvSWsLxGoGyY
// SIG // 0uDWiIwLAgMBAAGjggHtMIIB6TAQBgkrBgEEAYI3FQEE
// SIG // AwIBADAdBgNVHQ4EFgQUSG5k5VAF04KqFzc3IrVtqMp1
// SIG // ApUwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD
// SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j
// SIG // BBgwFoAUci06AjGQQ7kUBU7h6qfHMdEjiTQwWgYDVR0f
// SIG // BFMwUTBPoE2gS4ZJaHR0cDovL2NybC5taWNyb3NvZnQu
// SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0
// SIG // MjAxMV8yMDExXzAzXzIyLmNybDBeBggrBgEFBQcBAQRS
// SIG // MFAwTgYIKwYBBQUHMAKGQmh0dHA6Ly93d3cubWljcm9z
// SIG // b2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0MjAx
// SIG // MV8yMDExXzAzXzIyLmNydDCBnwYDVR0gBIGXMIGUMIGR
// SIG // BgkrBgEEAYI3LgMwgYMwPwYIKwYBBQUHAgEWM2h0dHA6
// SIG // Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvZG9jcy9w
// SIG // cmltYXJ5Y3BzLmh0bTBABggrBgEFBQcCAjA0HjIgHQBM
// SIG // AGUAZwBhAGwAXwBwAG8AbABpAGMAeQBfAHMAdABhAHQA
// SIG // ZQBtAGUAbgB0AC4gHTANBgkqhkiG9w0BAQsFAAOCAgEA
// SIG // Z/KGpZjgVHkaLtPYdGcimwuWEeFjkplCln3SeQyQwWVf
// SIG // Liw++MNy0W2D/r4/6ArKO79HqaPzadtjvyI1pZddZYSQ
// SIG // fYtGUFXYDJJ80hpLHPM8QotS0LD9a+M+By4pm+Y9G6XU
// SIG // tR13lDni6WTJRD14eiPzE32mkHSDjfTLJgJGKsKKELuk
// SIG // qQUMm+1o+mgulaAqPyprWEljHwlpblqYluSD9MCP80Yr
// SIG // 3vw70L01724lruWvJ+3Q3fMOr5kol5hNDj0L8giJ1h/D
// SIG // Mhji8MUtzluetEk5CsYKwsatruWy2dsViFFFWDgycSca
// SIG // f7H0J/jeLDogaZiyWYlobm+nt3TDQAUGpgEqKD6CPxNN
// SIG // ZgvAs0314Y9/HG8VfUWnduVAKmWjw11SYobDHWM2l4bf
// SIG // 2vP48hahmifhzaWX0O5dY0HjWwechz4GdwbRBrF1HxS+
// SIG // YWG18NzGGwS+30HHDiju3mUv7Jf2oVyW2ADWoUa9WfOX
// SIG // pQlLSBCZgB/QACnFsZulP0V3HjXG0qKin3p6IvpIlR+r
// SIG // +0cjgPWe+L9rt0uX4ut1eBrs6jeZeRhL/9azI2h15q/6
// SIG // /IvrC4DqaTuv/DDtBEyO3991bWORPdGdVk5Pv4BXIqF4
// SIG // ETIheu9BCrE/+6jMpF3BoYibV3FWTkhFwELJm3ZbCoBI
// SIG // a/15n8G9bW1qyVJzEw16UM0xghoKMIIaBgIBATCBlTB+
// SIG // MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
// SIG // bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj
// SIG // cm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNy
// SIG // b3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExAhMzAAAD
// SIG // rzBADkyjTQVBAAAAAAOvMA0GCWCGSAFlAwQCAQUAoIGu
// SIG // MBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG
// SIG // AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3
// SIG // DQEJBDEiBCB21nuM4FNUOCIlyOe8Bf9ZJe7vZLkOW8T7
// SIG // YzNvP0i/wjBCBgorBgEEAYI3AgEMMTQwMqAUgBIATQBp
// SIG // AGMAcgBvAHMAbwBmAHShGoAYaHR0cDovL3d3dy5taWNy
// SIG // b3NvZnQuY29tMA0GCSqGSIb3DQEBAQUABIIBAL2Jg4zn
// SIG // WreYLrztEqlqz7SD2Bh2L/8oKT0QhHvkq0GvKDIdWGEZ
// SIG // d8BVbNVeEhWjCuA7Ls3Wb7mTMXzJTuWVqicbtG9tJ9L5
// SIG // VCbKPQREEu/HmnfavTQs8ryRyCkkdX1pL7ZE6mvqP0co
// SIG // bVbi/2rCFaDfDbUemRc+gZIhKnrvXZ752MO956W7IlbF
// SIG // +56KG/boNqR4YDXbzrNS3HhPi8MUNg+UPo6PtFcs4zmS
// SIG // ybiB3KGIXbBhyY83cNkxHDpZS1gI4dHjpoi/mo43X3Aj
// SIG // OnwNoyi46TGE1qH0aupTxx7ug8zejf+3spXUmRfTPuBi
// SIG // yFxrslx5o8T8mnpj/Ks51WLFUvahgheUMIIXkAYKKwYB
// SIG // BAGCNwMDATGCF4Awghd8BgkqhkiG9w0BBwKgghdtMIIX
// SIG // aQIBAzEPMA0GCWCGSAFlAwQCAQUAMIIBUgYLKoZIhvcN
// SIG // AQkQAQSgggFBBIIBPTCCATkCAQEGCisGAQQBhFkKAwEw
// SIG // MTANBglghkgBZQMEAgEFAAQgKR9EGCSp2swoLDHXPB7L
// SIG // gBB571LMYKiRoPMVj54pvxECBmYYBR59vhgTMjAyNDA0
// SIG // MTQyMTIwMDIuOTExWjAEgAIB9KCB0aSBzjCByzELMAkG
// SIG // A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
// SIG // BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
// SIG // dCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0
// SIG // IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNo
// SIG // aWVsZCBUU1MgRVNOOjg5MDAtMDVFMC1EOTQ3MSUwIwYD
// SIG // VQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
// SIG // oIIR6jCCByAwggUIoAMCAQICEzMAAAHt4V/L1felXXMA
// SIG // AQAAAe0wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMC
// SIG // VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
// SIG // B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
// SIG // b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
// SIG // U3RhbXAgUENBIDIwMTAwHhcNMjMxMjA2MTg0NTQxWhcN
// SIG // MjUwMzA1MTg0NTQxWjCByzELMAkGA1UEBhMCVVMxEzAR
// SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
// SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
// SIG // bjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3Bl
// SIG // cmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNO
// SIG // Ojg5MDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv
// SIG // ZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG
// SIG // 9w0BAQEFAAOCAg8AMIICCgKCAgEAqDDCbJK66mqcnC8T
// SIG // wtR+8w+4PPDaWxGkOko3EyEW8wlcmEDbM/E2i9aahUxA
// SIG // Dy9V+6Iy+PxGhFvlIzambP2sjMluGCKRT2T9seBQTFQn
// SIG // XbHhdovmjDIwx4tC3E0GcTNrN5hTKwmQFkny2F2AyIph
// SIG // Qc/I9KC1hst1YC5gUyjOMS6r+w2VM/AdkqAJmxLaetp4
// SIG // EpdITqDe90hcBPmNuErxkDFocpKRvr1w8HKVr8A3vk4J
// SIG // 6y0ewE0RVzeSUtunZtssukmBTEWJzBN3TBwkP1ECEEDQ
// SIG // vJy5iL3SpAKFhDF7SbBhKN0KzNktkgb+D6R0c0bpM07T
// SIG // /lAHHhsTPScq8FED+TghJlumHIRMkQ0sD+IVPX+wdAMo
// SIG // deD8PbyaO43sDY3jDyJJp3si0otK7r9qMf8URrXCfcgT
// SIG // QuQWkZLY8+7LT2qI0fjwwNn7gbQqPMSpZLed5lG+wGPg
// SIG // mRx6oS5u+qXTBegR79k78JVQXkETdtl42lVUcAoI4CZz
// SIG // XsLez3o3K6VJ9Khy4C6vtQTdQ82LpFpE6+8E9M5dIl6/
// SIG // jbalJFkjp1kX3vDdtbQerr91ZFvJxXQobW22Wc9uKXi7
// SIG // SRGbjazfF3/T0zzM2VwyQSNRHIkf/dUHBqGRZlWxVW9q
// SIG // 1CALNNfmZHsL24ZhlQ3n1/aGRuPyuIBlLE701vq9SWTM
// SIG // VE9jMKkCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTOG/Ds
// SIG // 994QKgRHypQGX9DSoeAiGTAfBgNVHSMEGDAWgBSfpxVd
// SIG // AF5iXYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQ
// SIG // hk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
// SIG // L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
// SIG // JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwG
// SIG // CCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
// SIG // b20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUt
// SIG // U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMB
// SIG // Af8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMIMA4G
// SIG // A1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA
// SIG // ndYCtkXfnhi9Hh4vohOv6g2PLG27DuHpmp3Keijzfsau
// SIG // WQGrYgUeI5kUYZvvVYpNBaNAy1ovzdvGxSO3V2MNPad7
// SIG // woqW48uBKIn5tDbne/+FN9Ivfu0b1u1zkN68d+/lO76v
// SIG // ZZOsmKRgjadI5SdfPPwrkT4KiZ36uRHXmnx9gKBuOoSl
// SIG // k3gew7l2rBrerKSTnpxnnUq3t+DFmankyENK2jiLWZxb
// SIG // hg8uPsaA9akc9kFvrtoAh2hvAEI4WFDOLk4vbepLbY+n
// SIG // O12pq9s61rnHg4c+7Ci7bS0ye8LOWKwNiPHE5WzAH9il
// SIG // tBlYym2Bnfi2RnbhCu/+37OBlJDKnOdRbDXRtZ/s4HO8
// SIG // x7tqBhnggYOLPGUdGRcse47IJvbEhQikOQrGwL5a/+tD
// SIG // XZOU3jEfCbNpDVInLtgqmdN/N907L04JO4g9Si4H0teh
// SIG // xL4zepuFSiSoIyeziSc2m7UuCUIFJyayGX8qLJOA9fK2
// SIG // Z4vaVMDdN1oE5nddFk8ImTruIPFJ+oinDzGP4hak7uJ7
// SIG // ZMxVMQQaWxRupNQiDWZqIqxFpgrRt5cmdiHXZo7SHn05
// SIG // CLxlm+Ccc8+5dpvxNpBjosQyR7GoWVZsLKDb4cuZLv4p
// SIG // 1PvnVx88PoZb6k0hU/PayBVYXJrFjwyTzUUkqTIaCd91
// SIG // dmWv5ZCnG5FDNEm0IEvarHcwggdxMIIFWaADAgECAhMz
// SIG // AAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUA
// SIG // MIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
// SIG // Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
// SIG // TWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylN
// SIG // aWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3Jp
// SIG // dHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAx
// SIG // ODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX
// SIG // YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYD
// SIG // VQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
// SIG // BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
// SIG // MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
// SIG // 5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1
// SIG // V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeF
// SIG // RiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDc
// SIG // wUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus
// SIG // 9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130
// SIG // /o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHI
// SIG // NSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTes
// SIG // y+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGp
// SIG // F1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+
// SIG // /NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fz
// SIG // pk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNO
// SIG // wTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLi
// SIG // Mxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5
// SIG // UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
// SIG // BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
// SIG // XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIG
// SIG // CSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYE
// SIG // FCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSf
// SIG // pxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEG
// SIG // DCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRw
// SIG // Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3Mv
// SIG // UmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUH
// SIG // AwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD
// SIG // VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0j
// SIG // BBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0f
// SIG // BE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQu
// SIG // Y29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0
// SIG // XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBK
// SIG // BggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQu
// SIG // Y29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
// SIG // Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
// SIG // reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1
// SIG // OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpT
// SIG // Td2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinL
// SIG // btg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l
// SIG // 9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJ
// SIG // w7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2Fz
// SIG // Lixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7
// SIG // hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY
// SIG // 3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFX
// SIG // SVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFU
// SIG // a2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz
// SIG // /gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/
// SIG // AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1
// SIG // ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328
// SIG // y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
// SIG // ahC0HVUzWLOhcGbyoYIDTTCCAjUCAQEwgfmhgdGkgc4w
// SIG // gcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
// SIG // dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
// SIG // aWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1p
// SIG // Y3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAlBgNV
// SIG // BAsTHm5TaGllbGQgVFNTIEVTTjo4OTAwLTA1RTAtRDk0
// SIG // NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
// SIG // U2VydmljZaIjCgEBMAcGBSsOAwIaAxUA7h2sikwmmLGM
// SIG // SYfqFk8erlTxcPmggYMwgYCkfjB8MQswCQYDVQQGEwJV
// SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
// SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
// SIG // cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T
// SIG // dGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsFAAIFAOnG
// SIG // d9QwIhgPMjAyNDA0MTQxNTQyMTJaGA8yMDI0MDQxNTE1
// SIG // NDIxMlowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6cZ3
// SIG // 1AIBADAHAgEAAgJCnjAHAgEAAgITZjAKAgUA6cfJVAIB
// SIG // ADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMC
// SIG // oAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3
// SIG // DQEBCwUAA4IBAQBiKapvEvmngT/1eXS0Jzy4cU3Y4vIZ
// SIG // FHVgoUli3cqpY7jHN+w44CQiKWDTtIuZKgl15c3nfKgN
// SIG // 9MZHhPDgYlaEt8q8I5536RZ9ws7YEBC5cEQ31qngPx/T
// SIG // 5KWzbtaYXyifKYJwHtqdR/mSgm0peDaVYX8USXRfgB+p
// SIG // KOx+EChFO9zeN+FRKBr31OchBAtGmvbu9SbK2UaOTgin
// SIG // vtNXfBqZYbNaW0auXzkYoFXBr0bnWCMiSGSSa+kIUsEb
// SIG // jBpVW1Mykm7kKrXHQt1UZEb0UQhlXRe0Y8ZxLYSJx9zV
// SIG // oO1wmMP3PywC02KLJmno6quCzbMGrZhow5MmesXnWAXQ
// SIG // RCCqMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
// SIG // EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
// SIG // ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh
// SIG // dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3Rh
// SIG // bXAgUENBIDIwMTACEzMAAAHt4V/L1felXXMAAQAAAe0w
// SIG // DQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzEN
// SIG // BgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgZj29
// SIG // xSr+xfCuzQHeEWlRBNMtcAsK+lfcn1K13sqcug4wgfoG
// SIG // CyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCNLg1oNAhb
// SIG // HisStwNepdcKyMK7Eg612esUn9BeMWzKOTCBmDCBgKR+
// SIG // MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
// SIG // dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
// SIG // aWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
// SIG // Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
// SIG // 7eFfy9X3pV1zAAEAAAHtMCIEIHNFkKmFH/jeQvR82/a0
// SIG // 5WN20XURvDybpH+Tl6Kma57vMA0GCSqGSIb3DQEBCwUA
// SIG // BIICAJ5MKG05mrvylT1SGq+rio1j5Zsgsu38RAFZJS27
// SIG // 9AWO1gvzSoeqeOGModyewSfUrvPK3/HFGMH8X8R5c2Kb
// SIG // BttBu/datZ1U16gbPev7tTfvFwzkhGxY7igA3ffIDNRG
// SIG // SEZmDjsjcHMHFgvkf2zUTeDNUEn3sHEAvu24fA1P/7Ff
// SIG // HZnWuFqcoDcgfOl1kqBaTbIINwoTrlNgk5CIsZpyhk/z
// SIG // k4jXYUXUXyqsa5Xi+P1SxYlaJDj6nrEH+fs2c2D6ivux
// SIG // qRdqsE8o+mXvFRs7bl6RphaEK43ssEoHra4gr/OPicfk
// SIG // nHrIIkBxIHM4yv8q/Ax85jbYWzt05IaOF5p3aboh9qwg
// SIG // DMJAI8xCUNZZ/fmsOG78j9WQprwLj1BXlMHETZCPKHVS
// SIG // scLQn+1cCpBS9Bjcx4chH9uPpF4AJf+32f9yh10YsNd0
// SIG // nXzYRksBxWkYkiDNfnW1wkfboZYLnE8CvC6sD5lvcZGr
// SIG // bdJ1MLwuW0+uHMRl2cwL6Wk0RMk3JfvV6M0637cutC8x
// SIG // 40aArtEHQ2fBCAyfTT2dTjm2q5jEhvVbDXtSd2OISjX8
// SIG // m7b91PHO8R0GBUWRNfWhkbr9Sfqk7A84TXjhU/ec71rf
// SIG // ArnEhspFBq9aLq/lB5ZFgMWxzb9dUvtic32KEE6oxJ9m
// SIG // ulZs2Tk5mqDYbBN3ksR1rBrZuJ0M
// SIG // End signature block
|
combined_dataset/train/non-malicious/Start-ComputerJobs_2.ps1 | Start-ComputerJobs_2.ps1 | #requires -version 2.0
function Start-ComputerJobs{
<#
.NOTES
Name: Start-ComputerJobs
Author: Tome Tanasovski
Created: 6/25/2010
Modified: 6/25/2010
Version: 1.2
Website: http://powertoe.wordpress.com
.SYNOPSIS
Multithreads a scriptblock with jobs
.DESCRIPTION
The Start-ComputerJobs cmdlet runs a specified scriptblock within a maximum number of simultaneously spawned Powershell jobs.
You must pass a list of ComputerNames to it. The names passed to the cmdlet will replace $computername within the scriptblock prior to starting each thread.
This can be thought of as a multithreaded approach to a foreach loop.
.PARAMETER ComputerName
Specifies a list of computers that you wish to inject into your scriptblock. The list of computer names will replace $computername in the script block. This does not actually need to be a list of computer names. It can be anything you wish to inject into your scriptblock.
.PARAMETER ScriptBlock
Specifies the commands to run in the background jobs. Enclose the commands in braces ({}) or use $ExecutionContext.InvokeCommand.NewScriptBlock to create a scriptblock.
The scriptblock must contain a $computername variable. $computername will be replaced by each entry into the pipeline or from the parameter ComputerName.
.PARAMETER Threads
Specifies the maximum number of jobs that can be simultaneously running at any given time.
This defaults to 10 if nothing is specified.
.PARAMETER Sleep
Specifies the amount of time in seconds to sleep before querying the active jobs. This defaults to 5 seconds. If your jobs are long running you will want to increase this number. If they are very quick to run you may want to decrease this number.
.EXAMPLE
$computers = "computer1","computer2","computer3","computer4","computer5"
Start-ComputerJobs -computername $computers -ScriptBlock {dir \\\\$computername\\c$}
Queries the share for each computer in the computer list. This will spawn the default 5 jobs at once with a 5 second pause between querying the jobs.
.EXAMPLE
Get-Content computerlist.txt |Start-ComputerJobs -ScriptBlock {Get-Service -ComputerName $computername} -Threads 3 -Sleep 10 -Verbose
Reads a list of computers from a file named computerlist.txt. For each computer listed it will return the results from get-service. It will do this with three simultaneous jobs and will sleep 10 seconds between querying the jobs. Verbose will tell you when each job has been launced.
.INPUTS
System.String
.OUTPUTS
PSObject
Returns the results of the commands in the job. It is the data returned from receive-job. If you're scriptblock contains write-host it will write that to the console as it is running. To avoid this you should just return objects within your scriptblock. i.e. Instead of write-host "text" just use "text"
#>
param(
[Parameter(Mandatory=$true, Position=0, ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)]
[string[]]$ComputerName,
[Parameter(Mandatory=$true)]
[ScriptBlock]$ScriptBlock,
[Parameter(Mandatory=$false)]
[ValidateScript({$_ -gt 0})]
[int32]$Threads = 10,
[Parameter(Mandatory=$false)]
[ValidateScript({$_ -gt 0})]
[int32]$Sleep = 5
)
BEGIN {
$firstrun = $true
$computers = @()
$curthreads = 0
$jobs = @()
$valid = $false
}
PROCESS {
if ($firstrun) {
$firstrun = $false
# Validate scriptblock - Making sure it has a $computername variable to use
if ($ScriptBlock -match '\\$computername') {
$valid = $true
} else {
Write-Error 'You must specify a scriptblock that contains a variable called $computername'
$valid = $false
}
}
if ($valid) {
foreach ($computer in $computername) {
while ($jobs.count -eq $Threads) {
$newjobs = @()
$jobs |foreach {
Receive-Job $_.id
if ($_.state -eq "Running" -or $_.HasMoreData) {
$newjobs += $_
}
else {
$_ |Remove-Job
}
}
$jobs = $newjobs
if ($jobs.count -eq $Threads) {
sleep $sleep
}
}
$runscript = $ExecutionContext.InvokeCommand.NewScriptBlock(($ScriptBlock -replace '\\$computername', "$computer"))
Write-Verbose "Starting Job for computer: $computer"
$jobs += Start-Job -ScriptBlock $runscript
$curthreads++
}
}
}
END {
while ($jobs.count -ne 0) {
$newjobs = @()
$jobs |foreach {
Receive-Job $_.id
if ($_.state -eq "Running" -or $_.HasMoreData) {
$newjobs += $_
}
else {
$_ |Remove-Job
}
}
$jobs = $newjobs
if ($jobs.count -gt 0) {
sleep $sleep
}
}
}
}
|
combined_dataset/train/non-malicious/sample_46_42.ps1 | sample_46_42.ps1 | #
# Module manifest for module 'OCI.PSModules.Identitydomains'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Identitydomains.dll'
# Version number of this module.
ModuleVersion = '77.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'a6c13cbd-d51d-4887-9285-9eb20c02e9cc'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Identitydomains Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Identitydomains.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIIdentitydomainsAccountMgmtInfo',
'Get-OCIIdentitydomainsAccountMgmtInfosList',
'Get-OCIIdentitydomainsAccountRecoverySetting',
'Get-OCIIdentitydomainsAccountRecoverySettingsList',
'Get-OCIIdentitydomainsApiKey', 'Get-OCIIdentitydomainsApiKeysList',
'Get-OCIIdentitydomainsApp', 'Get-OCIIdentitydomainsAppRole',
'Get-OCIIdentitydomainsAppRolesList',
'Get-OCIIdentitydomainsApprovalWorkflow',
'Get-OCIIdentitydomainsApprovalWorkflowAssignment',
'Get-OCIIdentitydomainsApprovalWorkflowAssignmentsList',
'Get-OCIIdentitydomainsApprovalWorkflowsList',
'Get-OCIIdentitydomainsApprovalWorkflowStep',
'Get-OCIIdentitydomainsApprovalWorkflowStepsList',
'Get-OCIIdentitydomainsAppsList',
'Get-OCIIdentitydomainsAuthenticationFactorSetting',
'Get-OCIIdentitydomainsAuthenticationFactorSettingsList',
'Get-OCIIdentitydomainsAuthToken',
'Get-OCIIdentitydomainsAuthTokensList',
'Get-OCIIdentitydomainsBrandingSetting',
'Get-OCIIdentitydomainsBrandingSettingsList',
'Get-OCIIdentitydomainsCloudGate',
'Get-OCIIdentitydomainsCloudGateMapping',
'Get-OCIIdentitydomainsCloudGateMappingsList',
'Get-OCIIdentitydomainsCloudGateServer',
'Get-OCIIdentitydomainsCloudGateServersList',
'Get-OCIIdentitydomainsCloudGatesList',
'Get-OCIIdentitydomainsCondition',
'Get-OCIIdentitydomainsConditionsList',
'Get-OCIIdentitydomainsCustomerSecretKey',
'Get-OCIIdentitydomainsCustomerSecretKeysList',
'Get-OCIIdentitydomainsDynamicResourceGroup',
'Get-OCIIdentitydomainsDynamicResourceGroupsList',
'Get-OCIIdentitydomainsGrant', 'Get-OCIIdentitydomainsGrantsList',
'Get-OCIIdentitydomainsGroup', 'Get-OCIIdentitydomainsGroupsList',
'Get-OCIIdentitydomainsIdentityPropagationTrust',
'Get-OCIIdentitydomainsIdentityPropagationTrustsList',
'Get-OCIIdentitydomainsIdentityProvider',
'Get-OCIIdentitydomainsIdentityProvidersList',
'Get-OCIIdentitydomainsIdentitySetting',
'Get-OCIIdentitydomainsIdentitySettingsList',
'Get-OCIIdentitydomainsKmsiSetting',
'Get-OCIIdentitydomainsKmsiSettingsList',
'Get-OCIIdentitydomainsMe', 'Get-OCIIdentitydomainsMyApiKey',
'Get-OCIIdentitydomainsMyApiKeysList',
'Get-OCIIdentitydomainsMyAppsList',
'Get-OCIIdentitydomainsMyAuthToken',
'Get-OCIIdentitydomainsMyAuthTokensList',
'Get-OCIIdentitydomainsMyCompletedApproval',
'Get-OCIIdentitydomainsMyCompletedApprovalsList',
'Get-OCIIdentitydomainsMyCustomerSecretKey',
'Get-OCIIdentitydomainsMyCustomerSecretKeysList',
'Get-OCIIdentitydomainsMyDevice',
'Get-OCIIdentitydomainsMyDevicesList',
'Get-OCIIdentitydomainsMyGroupsList',
'Get-OCIIdentitydomainsMyOAuth2ClientCredential',
'Get-OCIIdentitydomainsMyOAuth2ClientCredentialsList',
'Get-OCIIdentitydomainsMyPendingApproval',
'Get-OCIIdentitydomainsMyPendingApprovalsList',
'Get-OCIIdentitydomainsMyRequest',
'Get-OCIIdentitydomainsMyRequestableGroupsList',
'Get-OCIIdentitydomainsMyRequestsList',
'Get-OCIIdentitydomainsMySmtpCredential',
'Get-OCIIdentitydomainsMySmtpCredentialsList',
'Get-OCIIdentitydomainsMySupportAccount',
'Get-OCIIdentitydomainsMySupportAccountsList',
'Get-OCIIdentitydomainsMyTrustedUserAgent',
'Get-OCIIdentitydomainsMyTrustedUserAgentsList',
'Get-OCIIdentitydomainsMyUserDbCredential',
'Get-OCIIdentitydomainsMyUserDbCredentialsList',
'Get-OCIIdentitydomainsNetworkPerimeter',
'Get-OCIIdentitydomainsNetworkPerimetersList',
'Get-OCIIdentitydomainsNotificationSetting',
'Get-OCIIdentitydomainsNotificationSettingsList',
'Get-OCIIdentitydomainsOAuth2ClientCredential',
'Get-OCIIdentitydomainsOAuth2ClientCredentialsList',
'Get-OCIIdentitydomainsOAuthClientCertificate',
'Get-OCIIdentitydomainsOAuthClientCertificatesList',
'Get-OCIIdentitydomainsOAuthPartnerCertificate',
'Get-OCIIdentitydomainsOAuthPartnerCertificatesList',
'Get-OCIIdentitydomainsPasswordPoliciesList',
'Get-OCIIdentitydomainsPasswordPolicy',
'Get-OCIIdentitydomainsPoliciesList',
'Get-OCIIdentitydomainsPolicy',
'Get-OCIIdentitydomainsResourceTypeSchemaAttributesList',
'Get-OCIIdentitydomainsRule', 'Get-OCIIdentitydomainsRulesList',
'Get-OCIIdentitydomainsSchema', 'Get-OCIIdentitydomainsSchemasList',
'Get-OCIIdentitydomainsSecurityQuestion',
'Get-OCIIdentitydomainsSecurityQuestionSetting',
'Get-OCIIdentitydomainsSecurityQuestionSettingsList',
'Get-OCIIdentitydomainsSecurityQuestionsList',
'Get-OCIIdentitydomainsSelfRegistrationProfile',
'Get-OCIIdentitydomainsSelfRegistrationProfilesList',
'Get-OCIIdentitydomainsSetting',
'Get-OCIIdentitydomainsSettingsList',
'Get-OCIIdentitydomainsSmtpCredential',
'Get-OCIIdentitydomainsSmtpCredentialsList',
'Get-OCIIdentitydomainsUser',
'Get-OCIIdentitydomainsUserAttributesSetting',
'Get-OCIIdentitydomainsUserAttributesSettingsList',
'Get-OCIIdentitydomainsUserDbCredential',
'Get-OCIIdentitydomainsUserDbCredentialsList',
'Get-OCIIdentitydomainsUsersList',
'Invoke-OCIIdentitydomainsPatchAccountRecoverySetting',
'Invoke-OCIIdentitydomainsPatchApiKey',
'Invoke-OCIIdentitydomainsPatchApp',
'Invoke-OCIIdentitydomainsPatchAppRole',
'Invoke-OCIIdentitydomainsPatchApprovalWorkflow',
'Invoke-OCIIdentitydomainsPatchApprovalWorkflowStep',
'Invoke-OCIIdentitydomainsPatchAuthToken',
'Invoke-OCIIdentitydomainsPatchCloudGate',
'Invoke-OCIIdentitydomainsPatchCloudGateMapping',
'Invoke-OCIIdentitydomainsPatchCloudGateServer',
'Invoke-OCIIdentitydomainsPatchCondition',
'Invoke-OCIIdentitydomainsPatchCustomerSecretKey',
'Invoke-OCIIdentitydomainsPatchDynamicResourceGroup',
'Invoke-OCIIdentitydomainsPatchGrant',
'Invoke-OCIIdentitydomainsPatchGroup',
'Invoke-OCIIdentitydomainsPatchIdentityPropagationTrust',
'Invoke-OCIIdentitydomainsPatchIdentityProvider',
'Invoke-OCIIdentitydomainsPatchIdentitySetting',
'Invoke-OCIIdentitydomainsPatchKmsiSetting',
'Invoke-OCIIdentitydomainsPatchMe',
'Invoke-OCIIdentitydomainsPatchMyApiKey',
'Invoke-OCIIdentitydomainsPatchMyAuthToken',
'Invoke-OCIIdentitydomainsPatchMyCustomerSecretKey',
'Invoke-OCIIdentitydomainsPatchMyDevice',
'Invoke-OCIIdentitydomainsPatchMyOAuth2ClientCredential',
'Invoke-OCIIdentitydomainsPatchMyPendingApproval',
'Invoke-OCIIdentitydomainsPatchMyRequest',
'Invoke-OCIIdentitydomainsPatchMySmtpCredential',
'Invoke-OCIIdentitydomainsPatchNetworkPerimeter',
'Invoke-OCIIdentitydomainsPatchOAuth2ClientCredential',
'Invoke-OCIIdentitydomainsPatchPasswordPolicy',
'Invoke-OCIIdentitydomainsPatchPolicy',
'Invoke-OCIIdentitydomainsPatchRule',
'Invoke-OCIIdentitydomainsPatchSchema',
'Invoke-OCIIdentitydomainsPatchSecurityQuestion',
'Invoke-OCIIdentitydomainsPatchSecurityQuestionSetting',
'Invoke-OCIIdentitydomainsPatchSelfRegistrationProfile',
'Invoke-OCIIdentitydomainsPatchSetting',
'Invoke-OCIIdentitydomainsPatchSmtpCredential',
'Invoke-OCIIdentitydomainsPatchUser',
'Invoke-OCIIdentitydomainsPatchUserAttributesSetting',
'Invoke-OCIIdentitydomainsSearchAccountMgmtInfos',
'Invoke-OCIIdentitydomainsSearchApiKeys',
'Invoke-OCIIdentitydomainsSearchAppRoles',
'Invoke-OCIIdentitydomainsSearchApps',
'Invoke-OCIIdentitydomainsSearchAuthenticationFactorSettings',
'Invoke-OCIIdentitydomainsSearchAuthTokens',
'Invoke-OCIIdentitydomainsSearchCloudGateMappings',
'Invoke-OCIIdentitydomainsSearchCloudGates',
'Invoke-OCIIdentitydomainsSearchCloudGateServers',
'Invoke-OCIIdentitydomainsSearchConditions',
'Invoke-OCIIdentitydomainsSearchCustomerSecretKeys',
'Invoke-OCIIdentitydomainsSearchDynamicResourceGroups',
'Invoke-OCIIdentitydomainsSearchGrants',
'Invoke-OCIIdentitydomainsSearchGroups',
'Invoke-OCIIdentitydomainsSearchIdentityProviders',
'Invoke-OCIIdentitydomainsSearchIdentitySettings',
'Invoke-OCIIdentitydomainsSearchKmsiSettings',
'Invoke-OCIIdentitydomainsSearchMyApps',
'Invoke-OCIIdentitydomainsSearchMyGroups',
'Invoke-OCIIdentitydomainsSearchMyRequestableGroups',
'Invoke-OCIIdentitydomainsSearchMyRequests',
'Invoke-OCIIdentitydomainsSearchNetworkPerimeters',
'Invoke-OCIIdentitydomainsSearchNotificationSettings',
'Invoke-OCIIdentitydomainsSearchOAuth2ClientCredentials',
'Invoke-OCIIdentitydomainsSearchOAuthClientCertificates',
'Invoke-OCIIdentitydomainsSearchOAuthPartnerCertificates',
'Invoke-OCIIdentitydomainsSearchPasswordPolicies',
'Invoke-OCIIdentitydomainsSearchPolicies',
'Invoke-OCIIdentitydomainsSearchResourceTypeSchemaAttributes',
'Invoke-OCIIdentitydomainsSearchRules',
'Invoke-OCIIdentitydomainsSearchSchemas',
'Invoke-OCIIdentitydomainsSearchSecurityQuestions',
'Invoke-OCIIdentitydomainsSearchSecurityQuestionSettings',
'Invoke-OCIIdentitydomainsSearchSelfRegistrationProfiles',
'Invoke-OCIIdentitydomainsSearchSettings',
'Invoke-OCIIdentitydomainsSearchSmtpCredentials',
'Invoke-OCIIdentitydomainsSearchUserAttributesSettings',
'Invoke-OCIIdentitydomainsSearchUserDbCredentials',
'Invoke-OCIIdentitydomainsSearchUsers',
'New-OCIIdentitydomainsApiKey', 'New-OCIIdentitydomainsApp',
'New-OCIIdentitydomainsAppRole',
'New-OCIIdentitydomainsApprovalWorkflow',
'New-OCIIdentitydomainsApprovalWorkflowAssignment',
'New-OCIIdentitydomainsApprovalWorkflowStep',
'New-OCIIdentitydomainsAuthenticationFactorsRemover',
'New-OCIIdentitydomainsAuthToken',
'New-OCIIdentitydomainsCloudGate',
'New-OCIIdentitydomainsCloudGateMapping',
'New-OCIIdentitydomainsCloudGateServer',
'New-OCIIdentitydomainsCondition',
'New-OCIIdentitydomainsCustomerSecretKey',
'New-OCIIdentitydomainsDynamicResourceGroup',
'New-OCIIdentitydomainsGrant', 'New-OCIIdentitydomainsGroup',
'New-OCIIdentitydomainsIdentityPropagationTrust',
'New-OCIIdentitydomainsIdentityProvider',
'New-OCIIdentitydomainsMe', 'New-OCIIdentitydomainsMyApiKey',
'New-OCIIdentitydomainsMyAuthenticationFactorInitiator',
'New-OCIIdentitydomainsMyAuthenticationFactorsRemover',
'New-OCIIdentitydomainsMyAuthenticationFactorValidator',
'New-OCIIdentitydomainsMyAuthToken',
'New-OCIIdentitydomainsMyCustomerSecretKey',
'New-OCIIdentitydomainsMyOAuth2ClientCredential',
'New-OCIIdentitydomainsMyRequest',
'New-OCIIdentitydomainsMySmtpCredential',
'New-OCIIdentitydomainsMySupportAccount',
'New-OCIIdentitydomainsMyUserDbCredential',
'New-OCIIdentitydomainsNetworkPerimeter',
'New-OCIIdentitydomainsOAuth2ClientCredential',
'New-OCIIdentitydomainsOAuthClientCertificate',
'New-OCIIdentitydomainsOAuthPartnerCertificate',
'New-OCIIdentitydomainsPasswordPolicy',
'New-OCIIdentitydomainsPolicy', 'New-OCIIdentitydomainsRule',
'New-OCIIdentitydomainsSecurityQuestion',
'New-OCIIdentitydomainsSelfRegistrationProfile',
'New-OCIIdentitydomainsSmtpCredential',
'New-OCIIdentitydomainsUser',
'New-OCIIdentitydomainsUserDbCredential',
'Remove-OCIIdentitydomainsApiKey', 'Remove-OCIIdentitydomainsApp',
'Remove-OCIIdentitydomainsAppRole',
'Remove-OCIIdentitydomainsApprovalWorkflow',
'Remove-OCIIdentitydomainsApprovalWorkflowAssignment',
'Remove-OCIIdentitydomainsApprovalWorkflowStep',
'Remove-OCIIdentitydomainsAuthToken',
'Remove-OCIIdentitydomainsCloudGate',
'Remove-OCIIdentitydomainsCloudGateMapping',
'Remove-OCIIdentitydomainsCloudGateServer',
'Remove-OCIIdentitydomainsCondition',
'Remove-OCIIdentitydomainsCustomerSecretKey',
'Remove-OCIIdentitydomainsDynamicResourceGroup',
'Remove-OCIIdentitydomainsGrant', 'Remove-OCIIdentitydomainsGroup',
'Remove-OCIIdentitydomainsIdentityPropagationTrust',
'Remove-OCIIdentitydomainsIdentityProvider',
'Remove-OCIIdentitydomainsMyApiKey',
'Remove-OCIIdentitydomainsMyAuthToken',
'Remove-OCIIdentitydomainsMyCustomerSecretKey',
'Remove-OCIIdentitydomainsMyDevice',
'Remove-OCIIdentitydomainsMyOAuth2ClientCredential',
'Remove-OCIIdentitydomainsMySmtpCredential',
'Remove-OCIIdentitydomainsMySupportAccount',
'Remove-OCIIdentitydomainsMyTrustedUserAgent',
'Remove-OCIIdentitydomainsMyUserDbCredential',
'Remove-OCIIdentitydomainsNetworkPerimeter',
'Remove-OCIIdentitydomainsOAuth2ClientCredential',
'Remove-OCIIdentitydomainsOAuthClientCertificate',
'Remove-OCIIdentitydomainsOAuthPartnerCertificate',
'Remove-OCIIdentitydomainsPasswordPolicy',
'Remove-OCIIdentitydomainsPolicy', 'Remove-OCIIdentitydomainsRule',
'Remove-OCIIdentitydomainsSecurityQuestion',
'Remove-OCIIdentitydomainsSelfRegistrationProfile',
'Remove-OCIIdentitydomainsSmtpCredential',
'Remove-OCIIdentitydomainsUser',
'Remove-OCIIdentitydomainsUserDbCredential',
'Write-OCIIdentitydomainsAccountRecoverySetting',
'Write-OCIIdentitydomainsApp',
'Write-OCIIdentitydomainsApprovalWorkflow',
'Write-OCIIdentitydomainsAppStatusChanger',
'Write-OCIIdentitydomainsAuthenticationFactorSetting',
'Write-OCIIdentitydomainsCloudGate',
'Write-OCIIdentitydomainsCloudGateMapping',
'Write-OCIIdentitydomainsCloudGateServer',
'Write-OCIIdentitydomainsCondition',
'Write-OCIIdentitydomainsDynamicResourceGroup',
'Write-OCIIdentitydomainsGroup',
'Write-OCIIdentitydomainsIdentityPropagationTrust',
'Write-OCIIdentitydomainsIdentityProvider',
'Write-OCIIdentitydomainsIdentitySetting',
'Write-OCIIdentitydomainsKmsiSetting', 'Write-OCIIdentitydomainsMe',
'Write-OCIIdentitydomainsMePasswordChanger',
'Write-OCIIdentitydomainsNetworkPerimeter',
'Write-OCIIdentitydomainsNotificationSetting',
'Write-OCIIdentitydomainsPasswordPolicy',
'Write-OCIIdentitydomainsPolicy', 'Write-OCIIdentitydomainsRule',
'Write-OCIIdentitydomainsSchema',
'Write-OCIIdentitydomainsSecurityQuestionSetting',
'Write-OCIIdentitydomainsSelfRegistrationProfile',
'Write-OCIIdentitydomainsSetting', 'Write-OCIIdentitydomainsUser',
'Write-OCIIdentitydomainsUserCapabilitiesChanger',
'Write-OCIIdentitydomainsUserPasswordChanger',
'Write-OCIIdentitydomainsUserPasswordResetter',
'Write-OCIIdentitydomainsUserStatusChanger'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Identitydomains'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_67_47.ps1 | sample_67_47.ps1 | @{
GUID="56D66100-99A0-4FFC-A12D-EEE9A6718AEF"
Author="PowerShell"
CompanyName="Microsoft Corporation"
Copyright="Copyright (c) Microsoft Corporation."
ModuleVersion="7.0.0.0"
CompatiblePSEditions = @("Core")
PowerShellVersion="3.0"
FunctionsToExport = @()
CmdletsToExport="Start-Transcript", "Stop-Transcript"
AliasesToExport = @()
NestedModules="Microsoft.PowerShell.ConsoleHost.dll"
HelpInfoURI = 'https://aka.ms/powershell73-help'
}
# SIG # Begin signature block
# MIInvgYJKoZIhvcNAQcCoIInrzCCJ6sCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAafI9Gy/Jba/h5
# P4E+2b0zPlBjhQyHNjAYnPqkeCyjq6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILL0LNcTOl5fB4j3BOCsjqQo
# x/Jicg70oB7mLdT2Lf6QMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAbnRzo0A3sSZ/GIP3Z3xJ5C+BLn5jLp0jAWV4PuiDE+yc2EbDZNJQIT9z
# EvKZ458xy/tbRaZDNuBIKENgYHct+9dPb4z99rCBy0dhjtByBqc8FzGDtl20K7D+
# Gmol5XbgD8vAgRlZCbnwCOBHnyNaXhISQgdCz81gQ2re2NZr67SY5J7PsJ0u6/FT
# rbpnT9jGDmpUAtS1mGexnlXYX2D1TWDz+54LJruwqET291w6DaxAgXzS1MP6lD9i
# vA5+FvdPm9KVJj9QVGI3YP2hWG7w+0mbup5UQFkTct1q2H+VwMtoDrGy2oog8I0n
# lgp75aG3HDnyYNE5Vcuu1S1Uos4P9aGCFygwghckBgorBgEEAYI3AwMBMYIXFDCC
# FxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFYBgsq
# hkiG9w0BCRABBKCCAUcEggFDMIIBPwIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDaE5ukTalehAPfxlyt9eVrZ4EspeNPqtP/yMw8/qNbOQIGZlddpxbQ
# GBIyMDI0MDYxMzAxMTU1My4zMVowBIACAfSggdikgdUwgdIxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVs
# YW5kIE9wZXJhdGlvbnMgTGltaXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046
# RDA4Mi00QkZELUVFQkExJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNl
# cnZpY2WgghF4MIIHJzCCBQ+gAwIBAgITMwAAAdzB4IzCX1hejgABAAAB3DANBgkq
# hkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEw
# MTIxOTA3MDZaFw0yNTAxMTAxOTA3MDZaMIHSMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVy
# YXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOkQwODItNEJG
# RC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNlMIIC
# IjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAi8izIDWyOD2RIonN6WtRYXlK
# GphYvzdqafdITknIhU9QLsXqpNwumGEdn2J1/bV/RFoatTwQfJ0Xw3E8xHYpU2IC
# 0IY8lryRXUIa+fdt4YHabaW2aolqcbvWYDLCuQoBNieLAos9AsnTQSRfDlNLB+Yl
# dt2BAsWUfJ8DkqD6lSwlfOq6aQi8SvQNc++m0AaqR0UsrCjgFOUSCe/N5N9e6TNf
# y9C1MAt9Um5NSBFTvOg/9EVa3dZqBqFnpSWgjQULxeUFANUNfkl4wSzHuOAkN0Sc
# rjhjyAe4RZEOr5Ib1ejQYg6OK5NYPm6/e+USYgDJH/utIW9wufACox2pzL+KpA8y
# UM5x3QBueI/yJrUFARSd9lPdTHIr2ssH9JGIo/IcOWDyhbBfKK/f5sYHp2Z0zrW6
# vqdS18N/nWU9wqErhWjzek4TX+eJaVWcQdBX00nn8NtRKpbZGpNRrY7Yq6+zJEYw
# SCMYkDXb9KqtGqW8TZ+I3lmZlW2pI9ZohqzHtrQYH591PD6B5GfoyjZLr79tkTBL
# /QgnmBwoaKc1t/JDXGu9Zc+1fMo5+OSHvmJG5ei6sZU9GqSbPlRjP5HnJswlaP6Z
# 9warPaFdXyJmcJkMGuudmK+cSsIyHkWV+Dzj3qlPSmGNRMfYYKEci8ThINKTaHBY
# /+4cH2ASzyn/097+a30CAwEAAaOCAUkwggFFMB0GA1UdDgQWBBToc9IF3Q58Rfe4
# 1ax2RKtpQZ7d2zAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBfBgNV
# HR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2Ny
# bC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmwwbAYI
# KwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAy
# MDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUFBwMI
# MA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA2etvwTCvx5f8fWwq
# 3eufBMPHgCqAduQw1Cj6RQbAIg1dLfLUZRx2qwr9HWDpN/u03HWrQ2kqTUlO6lQl
# 8d0TEq2S6EcD7zaVPvIhKn9jvh2onTdEJPhD7yihBdMzPGJ7B8StUu3xZ595udxJ
# PSLrKkq/zukJiTEzbhtupsz9X4zlUGmkJSztH5wROLP/MQDUBtkv++Je0eavIDQI
# Z34+31z5p2xh+bup7lQydLR/9gmYQQyQSoZcLPIsr52H5SwWLR3iWR1wT5mrkk2M
# gd6xfXDO0ZUC29fQNgNl03ZZnWST6E4xuVRX8vyfVhbOE//ldCdiXTcB9cSuf7UR
# q3KWJ/N3cKEnXG4YbvphtaCJFecO8KLAOq9Ql69VFjWrLjLi+VUppKG1t1+A/IZ5
# 4n9hxIE405zQM1NZuMxsvnSp4gQLSUdKkvatFg1W7eGwfMbyfm7kJBqM/DH0/Omx
# kh4VM0fJUXqS6MjhWj0287/MXw63jggyPgztRf1lrhDAZ/kHvXHns6NpfneDFPi/
# Oge8QFcX2oKYdGBcEttGiYl8OfrRqXO/t2kJVAi5DTrafIhkqexfHO4oVvRONdbD
# o4WkbVuyNek6jkMweTKyuJvEeivhjPl1mNXIcA3IqjRtKsCVV6KFxobkXvhJlPwW
# 3IcBboiAtznD/cP5HWhsOEpnbVYwggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZ
# AAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0
# ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVa
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEF
# AAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1
# V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9
# alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmv
# Haus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928
# jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3t
# pK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEe
# HT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26o
# ElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4C
# vEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ug
# poMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXps
# xREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0C
# AwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYE
# FCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtT
# NRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNo
# dHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5o
# dG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBD
# AEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZW
# y4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5t
# aWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAt
# MDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0y
# My5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pc
# FLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpT
# Td2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0j
# VOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3
# +SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmR
# sqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSw
# ethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5b
# RAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmx
# aQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsX
# HRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0
# W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0
# HVUzWLOhcGbyoYIC1DCCAj0CAQEwggEAoYHYpIHVMIHSMQswCQYDVQQGEwJVUzET
# MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
# TWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFu
# ZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOkQw
# ODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2
# aWNloiMKAQEwBwYFKw4DAhoDFQAcOf9zP7fJGQhQIl9Jsvd2OdASpqCBgzCBgKR+
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA
# 6hRPzTAiGA8yMDI0MDYxMzAwNDgxM1oYDzIwMjQwNjE0MDA0ODEzWjB0MDoGCisG
# AQQBhFkKBAExLDAqMAoCBQDqFE/NAgEAMAcCAQACAgPFMAcCAQACAhNBMAoCBQDq
# FaFNAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMH
# oSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAiEjWaBcfXS6/aX0bMxA4
# uD7sZYYOZXA5c+lA8PngooiPuA1+8zPvOBQXChmQfDC+5GPK8JJPH/RVBc8kdZCT
# qiMd+KfV40272fkWTSej0wxFz/iO2ZmiEm0NjjjLInWG+wmg5Oil2DEBsJUxKuzG
# UTGbz0KFSb1uaNmLVeCdDaoxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzET
# MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
# TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T
# dGFtcCBQQ0EgMjAxMAITMwAAAdzB4IzCX1hejgABAAAB3DANBglghkgBZQMEAgEF
# AKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEi
# BCAItaf/aHHDZteOBUuVvF7JmrG0yjMXoLJQL+CqqkTO+DCB+gYLKoZIhvcNAQkQ
# Ai8xgeowgecwgeQwgb0EIFOnF4pq2UQ/jLypnOO5YvQ67QirEQsOFfZMvKXEgg03
# MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm
# MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHcweCM
# wl9YXo4AAQAAAdwwIgQgvHlH0wrfPJhvO5NwOZTRNO8Xd+CD3/kJd2X4B5QVTpow
# DQYJKoZIhvcNAQELBQAEggIAilgo8xlemN85IMU5ZadhKX9gVmqnPzLWp+CxZ0Gq
# UXgVxsswl01AZ5v5Oj7bW1LO4bQuEtH0uSh/sAwB+bGnqvQimWchRf9Z7bj6wJtV
# mmGl30bEWkhTO+lX0fClJsoe89+6HDsTaHJ5DiT0hj10vPo54R9jo/zKz9ictHbJ
# C62zqVbM02JSZH04vRG4qjv03i++cpohmphli+PM/1Tbtv1sdqGShypnrNseJx0x
# D+KrTEjnEjlrtsTzKRi/9UWtej79rVeSlnGyCAjogCbktA1k0tYQqgJASOACbZEg
# Sv9aKRWsyhwa/vh5vE7P/oHk89vcfc4R9qy+25pCrkGV+xovOgw4I+G8Xu19Uegy
# Rs/dc9pBmsucDxM7HGtZa3CbPSSljYxc3MiMCzlIVUZWJgjtAuIfo421jVmIv+eS
# G982t72540NxMIk+0sM7bo1yQcIAj2DK+7f/gAv0pa0sBxqELU3R52NjO/2+BYHi
# IkG3fItBCtNyqqn36pymHTMqSNfNbeNgDZ2JciwIRywcM1WoI6ND4CtRyMjnGOvO
# twX8AcPaFXJoEo8iAK8JhUUcPsSiFsbQewHg2KsqwfRlkomxxkCjaKZrxQrPVQdp
# wzliNGm6xmkDb4daAOXR8wpWB8gl53eOkftYdHEtbMe2Wlhxl8krpiP5qeZXu3jS
# JYo=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_12_13.ps1 | sample_12_13.ps1 | #************************************************
# DC_RDSRDWeb.ps1
# Version 1.0.1
# Date: 21-01-2012
# Author: Daniel Grund - dgrund@microsoft.com
# Description:
# This script gets the IIS config
# 1.0.0 Beta release
# 1.0.1 Release
# TODO get windows\web\rdweb dir
#************************************************
PARAM(
[string] $TargetHost = "localhost",
$OutputFileName
)
$IISConfig = (C:\WINDOWS\SYSTEM32\INETSRV\APPCMD list config)
if ($null -ne $IISConfig)
{
$savepath = $TargetHost + "_IISConfig.txt"
[array]$OutputFileName += $savepath
$IISConfig | Out-File $savepath
}
# SIG # Begin signature block
# MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCD9+PNMwhf5kMaz
# ON0qnIh8J95W070RF7L2itRGeWpnAKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHw6
# tntOk1lPhNQIhgUoYfH6CzKvo1vPCW2gQcBubJSKMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAeBiLxwUfwvm9xS4kx4c1B0IiHtuHX6zqKKTC
# tnAp3X5ysglB7HFXtG9XB8fnU1itkIPAADdgm5C81hWUFMl8Vsi6/KEuFAiUQlmO
# iCPCrkbybkuANtxs3R1oK2cgrTWPI7CbsnnYV2aSWBTjfLvJpN6uvHatvuzP9fHA
# cVI4O5fQXgfJLmZzhF3lGBiMRJU+/R3d/KPFkEGI18WWErUJ/gneNvNXqGZ61Ebm
# xWZ99UwT6jrCa0m0jCVVRDt54cK69GOnOpUrZ6fvU3yFVcGSgZpyxqpUMDiEEyMR
# t2D5ctAKg6vwgQ0d3bwMvFDF5XcurBrb7jBJJzikpYprhMUewKGCF60wghepBgor
# BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCAObf0SNhXvlcvDynyKAVha097GqFfnlzX3
# bChIO4FDMwIGZusiCs74GBMyMDI0MTAyODExNDA0NC41MjRaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB91gg
# dQTK+8L0AAEAAAH3MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwNloXDTI1MTAyMjE4MzEwNlowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjM2MDUtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# 0OdHTBNom6/uXKaEKP9rPITkT6QxF11tjzB0Nk1byDpPrFTHha3hxwSdTcr8Y0a3
# k6EQlwqy6ROz42e0R5eDW+dCoQapipDIFUOYp3oNuqwX/xepATEkY17MyXFx6rQW
# 2NcWUJW3Qo2AuJ0HOtblSpItQZPGmHnGqkt/DB45Fwxk6VoSvxNcQKhKETkuzrt8
# U6DRccQm1FdhmPKgDzgcfDPM5o+GnzbiMu6y069A4EHmLMmkecSkVvBmcZ8VnzFH
# TDkGLdpnDV5FXjVObAgbSM0cnqYSGfRp7VGHBRqyoscvR4bcQ+CV9pDjbJ6S5rZn
# 1uA8hRhj09Hs33HRevt4oWAVYGItgEsG+BrCYbpgWMDEIVnAgPZEiPAaI8wBGemE
# 4feEkuz7TAwgkRBcUzLgQ4uvPqRD1A+Jkt26+pDqWYSn0MA8j0zacQk9q/AvciPX
# D9It2ez+mqEzgFRRsJGLtcf9HksvK8Jsd6I5zFShlqi5bpzf1Y4NOiNOh5QwW1pI
# vA5irlal7qFhkAeeeZqmop8+uNxZXxFCQG3R3s5pXW89FiCh9rmXrVqOCwgcXFIJ
# QAQkllKsI+UJqGq9rmRABJz5lHKTFYmFwcM52KWWjNx3z6odwz2h+sxaxewToe9G
# qtDx3/aU+yqNRcB8w0tSXUf+ylN4uk5xHEpLpx+ZNNsCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBTfRqQzP3m9PZWuLf1p8/meFfkmmDAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAN0ajafILeL6SQIMIMAXM1Qd6xaoci2mOrpR8vKWyyTsL3b83A7XGLiAb
# QxTrqnXvVWWeNst5YQD8saO+UTgOLJdTdfUADhLXoK+RlwjfndimIJT9MH9tUYXL
# zJXKhZM09ouPwNsrn8YOLIpdAi5TPyN8Cl11OGZSlP9r8JnvomW00AoJ4Pl9rlg0
# G5lcQknAXqHa9nQdWp1ZxXqNd+0JsKmlR8tcANX33ClM9NnaClJExLQHiKeHUUWt
# qyLMl65TW6wRM7XlF7Y+PTnC8duNWn4uLng+ON/Z39GO6qBj7IEZxoq4o3avEh9b
# a43UU6TgzVZaBm8VaA0wSwUe/pqpTOYFWN62XL3gl/JC2pzfIPxP66XfRLIxafjB
# VXm8KVDn2cML9IvRK02s941Y5+RR4gSAOhLiQQ6A03VNRup+spMa0k+XTPAi+2aM
# H5xa1Zjb/K8u9f9M05U0/bUMJXJDP++ysWpJbVRDiHG7szaca+r3HiUPjQJyQl2N
# iOcYTGV/DcLrLCBK2zG503FGb04N5Kf10XgAwFaXlod5B9eKh95PnXKx2LNBgLwG
# 85anlhhGxxBQ5mFsJGkBn0PZPtAzZyfr96qxzpp2pH9DJJcjKCDrMmZziXazpa5V
# VN36CO1kDU4ABkSYTXOM8RmJXuQm7mUF3bWmj+hjAJb4pz6hT5UwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAb28KDG/xXbNB
# jmM7/nqw3bgrEOaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJsSYwIhgPMjAyNDEwMjgwNjQzNTBaGA8yMDI0
# MTAyOTA2NDM1MFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6smxJgIBADAHAgEA
# AgIPIDAHAgEAAgIT5zAKAgUA6ssCpgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA
# A4IBAQBaN24RfbEDYuiZzqm7A4pV5f2hpp1MXvQiKNCPCo6auhWTBxhWvoAFA2Yd
# uik5ad6IJA7n3eXZZvkfovjXUeUfclz34hSqlUveVGitbm3K9Awqnk2tZGgk9Li0
# GfRa6QSb/KpHS+RGIAeRp0zHfzfqy/SmE6GTQFacpa8KRg7boj/ktDUBq0kkQ578
# OFTecSrudpM+HrP9rwuxbsGhVUoCOEsKOp0WdtzSXBlryAdgyGP1izHSW9Tc92oI
# /x2UnsP+/eCeuyNqOYe6VBjwFFzrSlLoVp2/o4gAiafzJbJpD2LXbW7P8MOkaTRN
# ky50Lo7MnEMgN3LQB6Hb4jUX9rCAMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAH3WCB1BMr7wvQAAQAAAfcwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgPhnK8zlpV74QlpVhujWfRv9Vm/R8AkS8oLwnHxgw6lcwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCAh2pjaa3ca0ecYuhu60uYHP/IKnPbedbVQJ5So
# IH5Z4jCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 91ggdQTK+8L0AAEAAAH3MCIEIGH07306AH18MQdXDVR9dHZ+mbda9Lv03oh+XI/b
# gvEVMA0GCSqGSIb3DQEBCwUABIICAG4Wyjhtnzsyw4+eYkRaTI0tv8wgSZDboX6h
# GsoawSosl8e/kTZqfcYNgUeVByOAK6NZblCFGQ94cJLpJAvgtUs+3fQUlFaaleJI
# XrPrYarkjQSA/ZGfYZ/zK1KMYTDZH5L4Mg3biXAGPDJHUwzQ97n+fjmhS90A7E1m
# qj2s9+sdEGiqq5mckIEqvwLeZfEOYFuqxXoiFRxwBznbI3OGSfds4dM3C4izJGjB
# 8gRCCzHuJXoSxiUe4eGVtKy3n1en0UvIbFgua/hbwmYwlI/i6F0Wj8J+uI8geE7t
# kHC1PTUgpvTlLejsv7tZwCkVITKpe7PBhs2skUKYt1t3FZTCaZvBY+uWLuUNTe2B
# CCz5C7IgmAGr2wMbTIZqgM6KbZq/KO9RXV9PKdVUdmZMVYZle740OAQVCfIrHXbQ
# HIqbiq603btotoqvxdsR6zjclxxIAz6vmcFKtZBGzR3vdTmoP2kjpwc7pfQSk/mQ
# gm2tS6i8iluRdbbdFyT5ZD1nWOy0OBRwKvTXuuiYmjj3oF329mdXNqUcZ21HompX
# iGbb3f8/AUvShL/1PxQNmH9+Po1EyzwDOyW3aANQzsVQoRWamebwuhS/OywlbzAI
# etf3DMT8pdOnIgCG8BSdTOdfKeCBxHNUp52yPA06vQcDwbrq0slJH2OLVgEnHd6Z
# wCpoeHYz
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_58_18.ps1 | sample_58_18.ps1 | import{W as s}from"./index-BIaDS2NQ.js";/*!-----------------------------------------------------------------------------
* Copyright (c) Microsoft Corporation. All rights reserved.
* Version: 0.47.0(69991d66135e4a1fc1cf0b1ac4ad25d429866a0d)
* Released under the MIT license
* https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt
*-----------------------------------------------------------------------------*/var c=Object.defineProperty,l=Object.getOwnPropertyDescriptor,d=Object.getOwnPropertyNames,p=Object.prototype.hasOwnProperty,i=(t,e,o,n)=>{if(e&&typeof e=="object"||typeof e=="function")for(let r of d(e))!p.call(t,r)&&r!==o&&c(t,r,{get:()=>e[r],enumerable:!(n=l(e,r))||n.enumerable});return t},h=(t,e,o)=>(i(t,e,"default"),o&&i(o,e,"default")),a={};h(a,s);var m=["area","base","br","col","embed","hr","img","input","keygen","link","menuitem","meta","param","source","track","wbr"],b={wordPattern:/(-?\d*\.\d\w*)|([^\`\~\!\@\$\^\&\*\(\)\-\=\+\[\{\]\}\\\|\;\:\'\"\,\.\<\>\/\s]+)/g,comments:{blockComment:["<!--","-->"]},brackets:[["<!--","-->"],["<",">"],["{","}"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}],surroundingPairs:[{open:'"',close:'"'},{open:"'",close:"'"},{open:"<",close:">"}],onEnterRules:[{beforeText:new RegExp(`<(?!(?:${m.join("|")}))(\\w[\\w\\d]*)([^/>]*(?!/)>)[^<]*$`,"i"),afterText:/^<\/(\w[\w\d]*)\s*>$/i,action:{indentAction:a.languages.IndentAction.IndentOutdent}},{beforeText:new RegExp(`<(?!(?:${m.join("|")}))(\\w[\\w\\d]*)([^/>]*(?!/)>)[^<]*$`,"i"),action:{indentAction:a.languages.IndentAction.Indent}}]},y={defaultToken:"",tokenPostfix:"",tokenizer:{root:[[/@@@@/],[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.root"}],[/<!DOCTYPE/,"metatag.html","@doctype"],[/<!--/,"comment.html","@comment"],[/(<)([\w\-]+)(\/>)/,["delimiter.html","tag.html","delimiter.html"]],[/(<)(script)/,["delimiter.html",{token:"tag.html",next:"@script"}]],[/(<)(style)/,["delimiter.html",{token:"tag.html",next:"@style"}]],[/(<)([:\w\-]+)/,["delimiter.html",{token:"tag.html",next:"@otherTag"}]],[/(<\/)([\w\-]+)/,["delimiter.html",{token:"tag.html",next:"@otherTag"}]],[/</,"delimiter.html"],[/[ \t\r\n]+/],[/[^<@]+/]],doctype:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.comment"}],[/[^>]+/,"metatag.content.html"],[/>/,"metatag.html","@pop"]],comment:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.comment"}],[/-->/,"comment.html","@pop"],[/[^-]+/,"comment.content.html"],[/./,"comment.content.html"]],otherTag:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.otherTag"}],[/\/?>/,"delimiter.html","@pop"],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/[ \t\r\n]+/]],script:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.script"}],[/type/,"attribute.name","@scriptAfterType"],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.text/javascript",nextEmbedded:"text/javascript"}],[/[ \t\r\n]+/],[/(<\/)(script\s*)(>)/,["delimiter.html","tag.html",{token:"delimiter.html",next:"@pop"}]]],scriptAfterType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.scriptAfterType"}],[/=/,"delimiter","@scriptAfterTypeEquals"],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.text/javascript",nextEmbedded:"text/javascript"}],[/[ \t\r\n]+/],[/<\/script\s*>/,{token:"@rematch",next:"@pop"}]],scriptAfterTypeEquals:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.scriptAfterTypeEquals"}],[/"([^"]*)"/,{token:"attribute.value",switchTo:"@scriptWithCustomType.$1"}],[/'([^']*)'/,{token:"attribute.value",switchTo:"@scriptWithCustomType.$1"}],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.text/javascript",nextEmbedded:"text/javascript"}],[/[ \t\r\n]+/],[/<\/script\s*>/,{token:"@rematch",next:"@pop"}]],scriptWithCustomType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.scriptWithCustomType.$S2"}],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.$S2",nextEmbedded:"$S2"}],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/[ \t\r\n]+/],[/<\/script\s*>/,{token:"@rematch",next:"@pop"}]],scriptEmbedded:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInEmbeddedState.scriptEmbedded.$S2",nextEmbedded:"@pop"}],[/<\/script/,{token:"@rematch",next:"@pop",nextEmbedded:"@pop"}]],style:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.style"}],[/type/,"attribute.name","@styleAfterType"],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/>/,{token:"delimiter.html",next:"@styleEmbedded.text/css",nextEmbedded:"text/css"}],[/[ \t\r\n]+/],[/(<\/)(style\s*)(>)/,["delimiter.html","tag.html",{token:"delimiter.html",next:"@pop"}]]],styleAfterType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.styleAfterType"}],[/=/,"delimiter","@styleAfterTypeEquals"],[/>/,{token:"delimiter.html",next:"@styleEmbedded.text/css",nextEmbedded:"text/css"}],[/[ \t\r\n]+/],[/<\/style\s*>/,{token:"@rematch",next:"@pop"}]],styleAfterTypeEquals:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.styleAfterTypeEquals"}],[/"([^"]*)"/,{token:"attribute.value",switchTo:"@styleWithCustomType.$1"}],[/'([^']*)'/,{token:"attribute.value",switchTo:"@styleWithCustomType.$1"}],[/>/,{token:"delimiter.html",next:"@styleEmbedded.text/css",nextEmbedded:"text/css"}],[/[ \t\r\n]+/],[/<\/style\s*>/,{token:"@rematch",next:"@pop"}]],styleWithCustomType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.styleWithCustomType.$S2"}],[/>/,{token:"delimiter.html",next:"@styleEmbedded.$S2",nextEmbedded:"$S2"}],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/[ \t\r\n]+/],[/<\/style\s*>/,{token:"@rematch",next:"@pop"}]],styleEmbedded:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInEmbeddedState.styleEmbedded.$S2",nextEmbedded:"@pop"}],[/<\/style/,{token:"@rematch",next:"@pop",nextEmbedded:"@pop"}]],razorInSimpleState:[[/@\*/,"comment.cs","@razorBlockCommentTopLevel"],[/@[{(]/,"metatag.cs","@razorRootTopLevel"],[/(@)(\s*[\w]+)/,["metatag.cs",{token:"identifier.cs",switchTo:"@$S2.$S3"}]],[/[})]/,{token:"metatag.cs",switchTo:"@$S2.$S3"}],[/\*@/,{token:"comment.cs",switchTo:"@$S2.$S3"}]],razorInEmbeddedState:[[/@\*/,"comment.cs","@razorBlockCommentTopLevel"],[/@[{(]/,"metatag.cs","@razorRootTopLevel"],[/(@)(\s*[\w]+)/,["metatag.cs",{token:"identifier.cs",switchTo:"@$S2.$S3",nextEmbedded:"$S3"}]],[/[})]/,{token:"metatag.cs",switchTo:"@$S2.$S3",nextEmbedded:"$S3"}],[/\*@/,{token:"comment.cs",switchTo:"@$S2.$S3",nextEmbedded:"$S3"}]],razorBlockCommentTopLevel:[[/\*@/,"@rematch","@pop"],[/[^*]+/,"comment.cs"],[/./,"comment.cs"]],razorBlockComment:[[/\*@/,"comment.cs","@pop"],[/[^*]+/,"comment.cs"],[/./,"comment.cs"]],razorRootTopLevel:[[/\{/,"delimiter.bracket.cs","@razorRoot"],[/\(/,"delimiter.parenthesis.cs","@razorRoot"],[/[})]/,"@rematch","@pop"],{include:"razorCommon"}],razorRoot:[[/\{/,"delimiter.bracket.cs","@razorRoot"],[/\(/,"delimiter.parenthesis.cs","@razorRoot"],[/\}/,"delimiter.bracket.cs","@pop"],[/\)/,"delimiter.parenthesis.cs","@pop"],{include:"razorCommon"}],razorCommon:[[/[a-zA-Z_]\w*/,{cases:{"@razorKeywords":{token:"keyword.cs"},"@default":"identifier.cs"}}],[/[\[\]]/,"delimiter.array.cs"],[/[ \t\r\n]+/],[/\/\/.*$/,"comment.cs"],[/@\*/,"comment.cs","@razorBlockComment"],[/"([^"]*)"/,"string.cs"],[/'([^']*)'/,"string.cs"],[/(<)([\w\-]+)(\/>)/,["delimiter.html","tag.html","delimiter.html"]],[/(<)([\w\-]+)(>)/,["delimiter.html","tag.html","delimiter.html"]],[/(<\/)([\w\-]+)(>)/,["delimiter.html","tag.html","delimiter.html"]],[/[\+\-\*\%\&\|\^\~\!\=\<\>\/\?\;\:\.\,]/,"delimiter.cs"],[/\d*\d+[eE]([\-+]?\d+)?/,"number.float.cs"],[/\d*\.\d+([eE][\-+]?\d+)?/,"number.float.cs"],[/0[xX][0-9a-fA-F']*[0-9a-fA-F]/,"number.hex.cs"],[/0[0-7']*[0-7]/,"number.octal.cs"],[/0[bB][0-1']*[0-1]/,"number.binary.cs"],[/\d[\d']*/,"number.cs"],[/\d/,"number.cs"]]},razorKeywords:["abstract","as","async","await","base","bool","break","by","byte","case","catch","char","checked","class","const","continue","decimal","default","delegate","do","double","descending","explicit","event","extern","else","enum","false","finally","fixed","float","for","foreach","from","goto","group","if","implicit","in","int","interface","internal","into","is","lock","long","nameof","new","null","namespace","object","operator","out","override","orderby","params","private","protected","public","readonly","ref","return","switch","struct","sbyte","sealed","short","sizeof","stackalloc","static","string","select","this","throw","true","try","typeof","uint","ulong","unchecked","unsafe","ushort","using","var","virtual","volatile","void","when","while","where","yield","model","inject"],escapes:/\\(?:[abfnrtv\\"']|x[0-9A-Fa-f]{1,4}|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})/};export{b as conf,y as language};
|
combined_dataset/train/non-malicious/sample_30_58.ps1 | sample_30_58.ps1 | #
# Module manifest for module 'OCI.PSModules.Datasafe'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Datasafe.dll'
# Version number of this module.
ModuleVersion = '81.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'acae3050-5046-4f4b-812f-d87bfcb51ba7'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Datasafe Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Datasafe.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIDatasafeMaskingColumnsFromSdm',
'Edit-OCIDatasafeGlobalSettings', 'Enable-OCIDatasafeConfiguration',
'Enable-OCIDatasafeTargetDatabase', 'Get-OCIDatasafeAlert',
'Get-OCIDatasafeAlertAnalyticsList',
'Get-OCIDatasafeAlertPoliciesList', 'Get-OCIDatasafeAlertPolicy',
'Get-OCIDatasafeAlertPolicyRulesList', 'Get-OCIDatasafeAlertsList',
'Get-OCIDatasafeAuditArchiveRetrieval',
'Get-OCIDatasafeAuditArchiveRetrievalsList',
'Get-OCIDatasafeAuditEventAnalyticsList',
'Get-OCIDatasafeAuditEventsList',
'Get-OCIDatasafeAuditPoliciesList', 'Get-OCIDatasafeAuditPolicy',
'Get-OCIDatasafeAuditPolicyAnalyticsList',
'Get-OCIDatasafeAuditProfile',
'Get-OCIDatasafeAuditProfileAnalyticsList',
'Get-OCIDatasafeAuditProfilesList', 'Get-OCIDatasafeAuditTrail',
'Get-OCIDatasafeAuditTrailAnalyticsList',
'Get-OCIDatasafeAuditTrailsList',
'Get-OCIDatasafeAvailableAuditVolumesList',
'Get-OCIDatasafeCollectedAuditVolumesList',
'Get-OCIDatasafeColumnsList',
'Get-OCIDatasafeCompatibleFormatsForDataTypes',
'Get-OCIDatasafeCompatibleFormatsForSensitiveTypes',
'Get-OCIDatasafeConfiguration',
'Get-OCIDatasafeDatabaseSecurityConfig',
'Get-OCIDatasafeDatabaseSecurityConfigsList',
'Get-OCIDatasafeDatabaseTableAccessEntriesList',
'Get-OCIDatasafeDatabaseTableAccessEntry',
'Get-OCIDatasafeDatabaseViewAccessEntriesList',
'Get-OCIDatasafeDatabaseViewAccessEntry',
'Get-OCIDatasafeDifferenceColumn',
'Get-OCIDatasafeDifferenceColumnsList',
'Get-OCIDatasafeDiscoveryAnalyticsList',
'Get-OCIDatasafeDiscoveryJob', 'Get-OCIDatasafeDiscoveryJobResult',
'Get-OCIDatasafeDiscoveryJobResultsList',
'Get-OCIDatasafeDiscoveryJobsList',
'Get-OCIDatasafeFindingAnalyticsList',
'Get-OCIDatasafeFindingsChangeAuditLogsList',
'Get-OCIDatasafeFindingsList', 'Get-OCIDatasafeGrantsList',
'Get-OCIDatasafeLibraryMaskingFormat',
'Get-OCIDatasafeLibraryMaskingFormatsList',
'Get-OCIDatasafeMaskedColumnsList',
'Get-OCIDatasafeMaskingAnalyticsList',
'Get-OCIDatasafeMaskingColumn', 'Get-OCIDatasafeMaskingColumnsList',
'Get-OCIDatasafeMaskingObjectsList',
'Get-OCIDatasafeMaskingPoliciesList',
'Get-OCIDatasafeMaskingPolicy', 'Get-OCIDatasafeMaskingReport',
'Get-OCIDatasafeMaskingReportsList',
'Get-OCIDatasafeMaskingSchemasList',
'Get-OCIDatasafeOnPremConnector',
'Get-OCIDatasafeOnPremConnectorsList',
'Get-OCIDatasafePeerTargetDatabase',
'Get-OCIDatasafePeerTargetDatabasesList',
'Get-OCIDatasafePrivateEndpoint',
'Get-OCIDatasafePrivateEndpointsList', 'Get-OCIDatasafeProfile',
'Get-OCIDatasafeProfileAnalyticsList',
'Get-OCIDatasafeProfileSummariesList', 'Get-OCIDatasafeReport',
'Get-OCIDatasafeReportContent', 'Get-OCIDatasafeReportDefinition',
'Get-OCIDatasafeReportDefinitionsList',
'Get-OCIDatasafeReportsList', 'Get-OCIDatasafeRoleGrantPathsList',
'Get-OCIDatasafeRolesList', 'Get-OCIDatasafeSchemasList',
'Get-OCIDatasafeSdmMaskingPolicyDifference',
'Get-OCIDatasafeSdmMaskingPolicyDifferencesList',
'Get-OCIDatasafeSecurityAssessment',
'Get-OCIDatasafeSecurityAssessmentComparison',
'Get-OCIDatasafeSecurityAssessmentsList',
'Get-OCIDatasafeSecurityFeatureAnalyticsList',
'Get-OCIDatasafeSecurityFeaturesList',
'Get-OCIDatasafeSecurityPoliciesList',
'Get-OCIDatasafeSecurityPolicy',
'Get-OCIDatasafeSecurityPolicyDeployment',
'Get-OCIDatasafeSecurityPolicyDeploymentsList',
'Get-OCIDatasafeSecurityPolicyEntryState',
'Get-OCIDatasafeSecurityPolicyEntryStatesList',
'Get-OCIDatasafeSecurityPolicyReport',
'Get-OCIDatasafeSecurityPolicyReportsList',
'Get-OCIDatasafeSensitiveColumn',
'Get-OCIDatasafeSensitiveColumnsList',
'Get-OCIDatasafeSensitiveDataModel',
'Get-OCIDatasafeSensitiveDataModelsList',
'Get-OCIDatasafeSensitiveObjectsList',
'Get-OCIDatasafeSensitiveSchemasList',
'Get-OCIDatasafeSensitiveType', 'Get-OCIDatasafeSensitiveTypesList',
'Get-OCIDatasafeSqlCollection',
'Get-OCIDatasafeSqlCollectionAnalyticsList',
'Get-OCIDatasafeSqlCollectionLogInsightsList',
'Get-OCIDatasafeSqlCollectionsList',
'Get-OCIDatasafeSqlFirewallAllowedSqlAnalyticsList',
'Get-OCIDatasafeSqlFirewallAllowedSqlsList',
'Get-OCIDatasafeSqlFirewallPoliciesList',
'Get-OCIDatasafeSqlFirewallPolicy',
'Get-OCIDatasafeSqlFirewallPolicyAnalyticsList',
'Get-OCIDatasafeSqlFirewallViolationAnalyticsList',
'Get-OCIDatasafeSqlFirewallViolationsList',
'Get-OCIDatasafeTablesList',
'Get-OCIDatasafeTargetAlertPolicyAssociation',
'Get-OCIDatasafeTargetAlertPolicyAssociationsList',
'Get-OCIDatasafeTargetDatabase',
'Get-OCIDatasafeTargetDatabasesList',
'Get-OCIDatasafeUserAccessAnalyticsList',
'Get-OCIDatasafeUserAnalyticsList', 'Get-OCIDatasafeUserAssessment',
'Get-OCIDatasafeUserAssessmentComparison',
'Get-OCIDatasafeUserAssessmentsList', 'Get-OCIDatasafeUsersList',
'Get-OCIDatasafeWorkRequest',
'Get-OCIDatasafeWorkRequestErrorsList',
'Get-OCIDatasafeWorkRequestLogsList',
'Get-OCIDatasafeWorkRequestsList', 'Invoke-OCIDatasafeAlertsUpdate',
'Invoke-OCIDatasafeApplyDiscoveryJobResults',
'Invoke-OCIDatasafeApplySdmMaskingPolicyDifference',
'Invoke-OCIDatasafeCalculateAuditVolumeAvailable',
'Invoke-OCIDatasafeCalculateAuditVolumeCollected',
'Invoke-OCIDatasafeCompareSecurityAssessment',
'Invoke-OCIDatasafeCompareUserAssessment',
'Invoke-OCIDatasafeDeactivateTargetDatabase',
'Invoke-OCIDatasafeDiscoverAuditTrails',
'Invoke-OCIDatasafeDownloadDiscoveryReport',
'Invoke-OCIDatasafeDownloadMaskingLog',
'Invoke-OCIDatasafeDownloadMaskingPolicy',
'Invoke-OCIDatasafeDownloadMaskingReport',
'Invoke-OCIDatasafeDownloadPrivilegeScript',
'Invoke-OCIDatasafeDownloadSecurityAssessmentReport',
'Invoke-OCIDatasafeDownloadSensitiveDataModel',
'Invoke-OCIDatasafeDownloadUserAssessmentReport',
'Invoke-OCIDatasafeMaskData', 'Invoke-OCIDatasafePatchAlerts',
'Invoke-OCIDatasafePatchDiscoveryJobResults',
'Invoke-OCIDatasafePatchMaskingColumns',
'Invoke-OCIDatasafePatchSdmMaskingPolicyDifferenceColumns',
'Invoke-OCIDatasafePatchSensitiveColumns',
'Invoke-OCIDatasafePatchTargetAlertPolicyAssociation',
'Invoke-OCIDatasafeProvisionAuditPolicy',
'Invoke-OCIDatasafePurgeSqlCollectionLogs',
'Invoke-OCIDatasafeRefreshDatabaseSecurityConfiguration',
'Invoke-OCIDatasafeRefreshSecurityAssessment',
'Invoke-OCIDatasafeRefreshSqlCollectionLogInsights',
'Invoke-OCIDatasafeRefreshTargetDatabase',
'Invoke-OCIDatasafeRefreshUserAssessment',
'Invoke-OCIDatasafeResumeAuditTrail',
'Invoke-OCIDatasafeResumeWorkRequest',
'Invoke-OCIDatasafeRetrieveAuditPolicies',
'Invoke-OCIDatasafeScheduleReport',
'Invoke-OCIDatasafeSetSecurityAssessmentBaseline',
'Invoke-OCIDatasafeSetUserAssessmentBaseline',
'Invoke-OCIDatasafeSuspendWorkRequest',
'Invoke-OCIDatasafeUnsetSecurityAssessmentBaseline',
'Invoke-OCIDatasafeUnsetUserAssessmentBaseline',
'Move-OCIDatasafeAlertCompartment',
'Move-OCIDatasafeAuditArchiveRetrievalCompartment',
'Move-OCIDatasafeAuditPolicyCompartment',
'Move-OCIDatasafeAuditProfileCompartment',
'Move-OCIDatasafeDatabaseSecurityConfigCompartment',
'Move-OCIDatasafeDiscoveryJobCompartment',
'Move-OCIDatasafeLibraryMaskingFormatCompartment',
'Move-OCIDatasafeMaskingPolicyCompartment',
'Move-OCIDatasafeOnPremConnectorCompartment',
'Move-OCIDatasafePrivateEndpointCompartment',
'Move-OCIDatasafeReportCompartment',
'Move-OCIDatasafeReportDefinitionCompartment',
'Move-OCIDatasafeRetention',
'Move-OCIDatasafeSdmMaskingPolicyDifferenceCompartment',
'Move-OCIDatasafeSecurityAssessmentCompartment',
'Move-OCIDatasafeSecurityPolicyCompartment',
'Move-OCIDatasafeSecurityPolicyDeploymentCompartment',
'Move-OCIDatasafeSensitiveDataModelCompartment',
'Move-OCIDatasafeSensitiveTypeCompartment',
'Move-OCIDatasafeSqlCollectionCompartment',
'Move-OCIDatasafeSqlFirewallPolicyCompartment',
'Move-OCIDatasafeTargetAlertPolicyAssociationCompartment',
'Move-OCIDatasafeTargetDatabaseCompartment',
'Move-OCIDatasafeUserAssessmentCompartment',
'New-OCIDatasafeAuditArchiveRetrieval',
'New-OCIDatasafeDiscoveryJob',
'New-OCIDatasafeDiscoveryReportForDownload',
'New-OCIDatasafeLibraryMaskingFormat',
'New-OCIDatasafeMaskingColumn', 'New-OCIDatasafeMaskingPolicy',
'New-OCIDatasafeMaskingPolicyForDownload',
'New-OCIDatasafeMaskingReportForDownload',
'New-OCIDatasafeOnPremConnector',
'New-OCIDatasafeOnPremConnectorConfiguration',
'New-OCIDatasafePeerTargetDatabase',
'New-OCIDatasafePrivateEndpoint', 'New-OCIDatasafeReport',
'New-OCIDatasafeReportDefinition',
'New-OCIDatasafeSdmMaskingPolicyDifference',
'New-OCIDatasafeSecurityAssessment',
'New-OCIDatasafeSecurityAssessmentReport',
'New-OCIDatasafeSensitiveColumn',
'New-OCIDatasafeSensitiveDataModel',
'New-OCIDatasafeSensitiveDataModelForDownload',
'New-OCIDatasafeSensitiveType', 'New-OCIDatasafeSqlCollection',
'New-OCIDatasafeSqlFirewallPolicy',
'New-OCIDatasafeTargetAlertPolicyAssociation',
'New-OCIDatasafeTargetDatabase', 'New-OCIDatasafeUserAssessment',
'New-OCIDatasafeUserAssessmentReport',
'Remove-OCIDatasafeAuditArchiveRetrieval',
'Remove-OCIDatasafeAuditTrail', 'Remove-OCIDatasafeDiscoveryJob',
'Remove-OCIDatasafeDiscoveryJobResult',
'Remove-OCIDatasafeLibraryMaskingFormat',
'Remove-OCIDatasafeMaskingColumn',
'Remove-OCIDatasafeMaskingPolicy',
'Remove-OCIDatasafeOnPremConnector',
'Remove-OCIDatasafePeerTargetDatabase',
'Remove-OCIDatasafePrivateEndpoint',
'Remove-OCIDatasafeReportDefinition',
'Remove-OCIDatasafeScheduleReport',
'Remove-OCIDatasafeSdmMaskingPolicyDifference',
'Remove-OCIDatasafeSecurityAssessment',
'Remove-OCIDatasafeSensitiveColumn',
'Remove-OCIDatasafeSensitiveDataModel',
'Remove-OCIDatasafeSensitiveType',
'Remove-OCIDatasafeSqlCollection',
'Remove-OCIDatasafeSqlFirewallPolicy',
'Remove-OCIDatasafeTargetAlertPolicyAssociation',
'Remove-OCIDatasafeTargetDatabase',
'Remove-OCIDatasafeUserAssessment', 'Start-OCIDatasafeAuditTrail',
'Start-OCIDatasafeSqlCollection', 'Stop-OCIDatasafeAuditTrail',
'Stop-OCIDatasafeSqlCollection', 'Stop-OCIDatasafeWorkRequest',
'Update-OCIDatasafeAlert',
'Update-OCIDatasafeAuditArchiveRetrieval',
'Update-OCIDatasafeAuditPolicy', 'Update-OCIDatasafeAuditProfile',
'Update-OCIDatasafeAuditTrail',
'Update-OCIDatasafeDatabaseSecurityConfig',
'Update-OCIDatasafeFinding',
'Update-OCIDatasafeLibraryMaskingFormat',
'Update-OCIDatasafeMaskingColumn',
'Update-OCIDatasafeMaskingPolicy',
'Update-OCIDatasafeOnPremConnector',
'Update-OCIDatasafeOnPremConnectorWallet',
'Update-OCIDatasafePeerTargetDatabase',
'Update-OCIDatasafePrivateEndpoint', 'Update-OCIDatasafeReport',
'Update-OCIDatasafeReportDefinition',
'Update-OCIDatasafeSdmMaskingPolicyDifference',
'Update-OCIDatasafeSecurityAssessment',
'Update-OCIDatasafeSecurityPolicy',
'Update-OCIDatasafeSecurityPolicyDeployment',
'Update-OCIDatasafeSensitiveColumn',
'Update-OCIDatasafeSensitiveDataModel',
'Update-OCIDatasafeSensitiveType',
'Update-OCIDatasafeSqlCollection',
'Update-OCIDatasafeSqlFirewallPolicy',
'Update-OCIDatasafeTargetAlertPolicyAssociation',
'Update-OCIDatasafeTargetDatabase',
'Update-OCIDatasafeUserAssessment',
'Write-OCIDatasafeMaskingPolicy',
'Write-OCIDatasafeSensitiveDataModel'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Datasafe'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_54_10.ps1 | sample_54_10.ps1 | # region Generated
# Load the private module dll
$null = Import-Module -PassThru -Name (Join-Path $PSScriptRoot '..\bin\Az.PostgreSql.private.dll')
# Load the internal module
$internalModulePath = Join-Path $PSScriptRoot '..\internal\Az.PostgreSql.internal.psm1'
if(Test-Path $internalModulePath) {
$null = Import-Module -Name $internalModulePath
}
# Export nothing to clear implicit exports
Export-ModuleMember
# Export script cmdlets
Get-ChildItem -Path $PSScriptRoot -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName }
Export-ModuleMember -Function (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot) -Alias (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot -AsAlias)
# endregion
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCKC1HK3sZ5Ig5m
# CLTjRsMUI4jUekiVl569qkgi7uQ716CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICZaM0ItU6Mjim+f7sdzruQd
# k8/9mBwMYTDZKZBXiyLAMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAo6uOoSrI++00vzClWZZpB+oadBuvmXIhMf8EopZ3dpB6Y/czGxDmi7Cg
# gBvXpGztTgLWfObTeW3yyKRF78z4VZBTfPgJa31TnvgprSuf2uBHwQkDEagIokCM
# yPaRfH1IqRFFo39+xkyB82IHiuaD/ZPHjZPjAUg9nCpfNd7oaQOOHoqAZpKv90Vh
# vt2pHF6fXgBhKY86QyMnENdqGeV6qZz147FzVY1loCJXjFXw8mG7eGrYP9EUSf0J
# Vp1I6Rqmp4/uRV/kJhroe3OsfXKZT4+TIAa+px+GbrqDiGNDctfB78xwRsUnG7wM
# oTdtXiuMBr+Qf9xHCPpJV1mwswquW6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAabNBIhhOMhDbQZAjpg/JwQpDflnBMZqBmHuvjJxuVAAIGZhfNGBCn
# GBMyMDI0MDQyMzEzMTUxMC4xOThaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w
# M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgABAAAB6TANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yrAPJnV6A7aZYnTw/yx90u
# 1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZY5O8PCBu7Gq+x5Xe6plQ
# t4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7LMpKwIKQMwXDctYKvCyQy
# 6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5MxylRdTS7E1Jocl30NgcBi
# JfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9dxsyvng0lUVY+urq/G8QR
# FoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTpw2I6ZWaIhPwMu5DvdkEG
# zV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0VJBSGV+h66ZcaUJOxpbS
# IjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDCxHG4mW3mpNQopM/U1WJn
# jssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOamGfwvkIe7dkylzm8BeAU
# QC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKFI30u9YlxDTzAuLDK073c
# ndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022+yPwclmykssk30a4Rp3v
# 9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYjuIj0Wuv+jcjtB+xOMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe61AE90Ken2XPgQHJDiS4S
# bLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz/HciZooyeoAvkHQaHmLh
# wBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20QpHDEukwKR8kfaBEX83A
# yvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQgeEBr8E4K2wQ2WXI/ZJxZ
# S/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/JnjXMChnm9bLDD1waJ7TPp5
# wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6QjegHzndX/tZrY792dfR
# AXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWGXYJL5H6LNnKyXJVEw/1F
# bO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsHptAvREqCc+/YxzhIKkA8
# 8Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFvNRhh8ZBAenn1pW+5UBGY
# z2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMlPG3YjuqFxidiIsoAw2+M
# hI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2jJWgq7VlBuP1BuXjZ3qgy
# m9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCr
# aYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dIcTDAiGA8yMDI0MDQyMzExMzg1
# MloYDzIwMjQwNDI0MTEzODUyWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp0hxM
# AgEAMAoCAQACAghFAgH/MAcCAQACAhNpMAoCBQDp023MAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAK8eH3rZdn1zSVWz/62/4QXWc469a0821JsUCszUNQE7
# zofGTI2pXfcLRkid5HDMoyzHaxFyQd7BlB9RiWflQDCbmJDXi+gQvIkxjCTCRBlC
# ur00RnLzUEmS1uJPOLOL/bOqar9Ef8dldb6m5FXynuOMavaqfurd40q4GBqB6frP
# +NXQ2XPKm+yNQ9eFgWq4QfuetnD8+P6G4T+Mv6nxbUeZURvBPR5FA9fsJpjoKDc9
# w9ekBTznBDZfbQ5BcayMyUd+K0eOSstGOQ0kwrQkFJUjB+EDHoNJVO3T4Migd36w
# R6XnZTD4GG7mwxX0i8EYxg0lKounpH1hw7E6P5VgX74xggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAekPcTB+XfESNgABAAAB
# 6TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCCK+iRm/fPnSmNyWaEPF23th+5sZut2z2hrXPI/mwJ6
# CzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQkniXaTcmj1TKQWF+x2U4
# riVorGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQgfEHm2ExKtPF0slQuA53nCHBP
# mRCZtnL9CXNnAqBr+34wDQYJKoZIhvcNAQELBQAEggIAGNTfPY64Al6RT39LjSJN
# L2+l/TVNzh6QLGtDqMrcSbuc7eSsAwgFEW5sDnU0UaVS0vgUbapfv0kje4gu8meA
# JcdtMRYIhaD+jCv13YaeWUVoudJIuTWeChgbTfoDTxsddTCz38ev3kxsXY+B2szG
# itXyzMuHfHuMljebN1mxTvUf/1qC8UPT6QcaxXTYC22/LjrnYC1ZrJtmV82rzRXv
# KDOfnOVAWc9hhTU85GsZ2ABdfp2teyBThmwBpEfMFEp/9MLJ5PKN9d23b8q2neUy
# Cchp3odTCX8xPze8XnE5a0eIUd2Pch163EJREO2wDZagpLX7shGtiR2otaTTJJ6W
# iFX/tIb9UYhQQ51x2y7sgsQ1c5HPcXhCuijvm4ofWNirDUVCKKsigFCyqvrIcwdW
# pMOhEKwLc7wzAK3HCAIDt+TsuDu7osXoISMZn0QT73gBDS2C825+L8hOVh4auGSF
# ALb0Ctwk/JHL8AQAe5mjzKRWnYE5EGWBkQe/VIyHEapTMvKOzlt+dnctV0eevxba
# QTcgsGBoZTD5YqvYwTB8T1rd6q2yKEdUEE0xcpusQJT4vaAmgU1MVvS/dj+uWv5s
# 9Ijw5UsCipotgjXL5k2+N9N2iGVANK5W/Ybm7DB2xk9yoHvNG5LUr3ACZ3MEB/Gh
# xgb15bnamyDw85E29S2v8xc=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_37_87.ps1 | sample_37_87.ps1 | /*!-----------------------------------------------------------------------------
* Copyright (c) Microsoft Corporation. All rights reserved.
* Version: 0.47.0(69991d66135e4a1fc1cf0b1ac4ad25d429866a0d)
* Released under the MIT license
* https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt
*-----------------------------------------------------------------------------*/
define("vs/basic-languages/powerquery/powerquery", ["require"],(require)=>{
"use strict";
var moduleExports = (() => {
var __defProp = Object.defineProperty;
var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
var __getOwnPropNames = Object.getOwnPropertyNames;
var __hasOwnProp = Object.prototype.hasOwnProperty;
var __export = (target, all) => {
for (var name in all)
__defProp(target, name, { get: all[name], enumerable: true });
};
var __copyProps = (to, from, except, desc) => {
if (from && typeof from === "object" || typeof from === "function") {
for (let key of __getOwnPropNames(from))
if (!__hasOwnProp.call(to, key) && key !== except)
__defProp(to, key, { get: () => from[key], enumerable: !(desc = __getOwnPropDesc(from, key)) || desc.enumerable });
}
return to;
};
var __toCommonJS = (mod) => __copyProps(__defProp({}, "__esModule", { value: true }), mod);
// src/basic-languages/powerquery/powerquery.ts
var powerquery_exports = {};
__export(powerquery_exports, {
conf: () => conf,
language: () => language
});
var conf = {
comments: {
lineComment: "//",
blockComment: ["/*", "*/"]
},
brackets: [
["[", "]"],
["(", ")"],
["{", "}"]
],
autoClosingPairs: [
{ open: '"', close: '"', notIn: ["string", "comment", "identifier"] },
{ open: "[", close: "]", notIn: ["string", "comment", "identifier"] },
{ open: "(", close: ")", notIn: ["string", "comment", "identifier"] },
{ open: "{", close: "}", notIn: ["string", "comment", "identifier"] }
]
};
var language = {
defaultToken: "",
tokenPostfix: ".pq",
ignoreCase: false,
brackets: [
{ open: "[", close: "]", token: "delimiter.square" },
{ open: "{", close: "}", token: "delimiter.brackets" },
{ open: "(", close: ")", token: "delimiter.parenthesis" }
],
operatorKeywords: ["and", "not", "or"],
keywords: [
"as",
"each",
"else",
"error",
"false",
"if",
"in",
"is",
"let",
"meta",
"otherwise",
"section",
"shared",
"then",
"true",
"try",
"type"
],
constructors: ["#binary", "#date", "#datetime", "#datetimezone", "#duration", "#table", "#time"],
constants: ["#infinity", "#nan", "#sections", "#shared"],
typeKeywords: [
"action",
"any",
"anynonnull",
"none",
"null",
"logical",
"number",
"time",
"date",
"datetime",
"datetimezone",
"duration",
"text",
"binary",
"list",
"record",
"table",
"function"
],
builtinFunctions: [
"Access.Database",
"Action.Return",
"Action.Sequence",
"Action.Try",
"ActiveDirectory.Domains",
"AdoDotNet.DataSource",
"AdoDotNet.Query",
"AdobeAnalytics.Cubes",
"AnalysisServices.Database",
"AnalysisServices.Databases",
"AzureStorage.BlobContents",
"AzureStorage.Blobs",
"AzureStorage.Tables",
"Binary.Buffer",
"Binary.Combine",
"Binary.Compress",
"Binary.Decompress",
"Binary.End",
"Binary.From",
"Binary.FromList",
"Binary.FromText",
"Binary.InferContentType",
"Binary.Length",
"Binary.ToList",
"Binary.ToText",
"BinaryFormat.7BitEncodedSignedInteger",
"BinaryFormat.7BitEncodedUnsignedInteger",
"BinaryFormat.Binary",
"BinaryFormat.Byte",
"BinaryFormat.ByteOrder",
"BinaryFormat.Choice",
"BinaryFormat.Decimal",
"BinaryFormat.Double",
"BinaryFormat.Group",
"BinaryFormat.Length",
"BinaryFormat.List",
"BinaryFormat.Null",
"BinaryFormat.Record",
"BinaryFormat.SignedInteger16",
"BinaryFormat.SignedInteger32",
"BinaryFormat.SignedInteger64",
"BinaryFormat.Single",
"BinaryFormat.Text",
"BinaryFormat.Transform",
"BinaryFormat.UnsignedInteger16",
"BinaryFormat.UnsignedInteger32",
"BinaryFormat.UnsignedInteger64",
"Byte.From",
"Character.FromNumber",
"Character.ToNumber",
"Combiner.CombineTextByDelimiter",
"Combiner.CombineTextByEachDelimiter",
"Combiner.CombineTextByLengths",
"Combiner.CombineTextByPositions",
"Combiner.CombineTextByRanges",
"Comparer.Equals",
"Comparer.FromCulture",
"Comparer.Ordinal",
"Comparer.OrdinalIgnoreCase",
"Csv.Document",
"Cube.AddAndExpandDimensionColumn",
"Cube.AddMeasureColumn",
"Cube.ApplyParameter",
"Cube.AttributeMemberId",
"Cube.AttributeMemberProperty",
"Cube.CollapseAndRemoveColumns",
"Cube.Dimensions",
"Cube.DisplayFolders",
"Cube.Measures",
"Cube.Parameters",
"Cube.Properties",
"Cube.PropertyKey",
"Cube.ReplaceDimensions",
"Cube.Transform",
"Currency.From",
"DB2.Database",
"Date.AddDays",
"Date.AddMonths",
"Date.AddQuarters",
"Date.AddWeeks",
"Date.AddYears",
"Date.Day",
"Date.DayOfWeek",
"Date.DayOfWeekName",
"Date.DayOfYear",
"Date.DaysInMonth",
"Date.EndOfDay",
"Date.EndOfMonth",
"Date.EndOfQuarter",
"Date.EndOfWeek",
"Date.EndOfYear",
"Date.From",
"Date.FromText",
"Date.IsInCurrentDay",
"Date.IsInCurrentMonth",
"Date.IsInCurrentQuarter",
"Date.IsInCurrentWeek",
"Date.IsInCurrentYear",
"Date.IsInNextDay",
"Date.IsInNextMonth",
"Date.IsInNextNDays",
"Date.IsInNextNMonths",
"Date.IsInNextNQuarters",
"Date.IsInNextNWeeks",
"Date.IsInNextNYears",
"Date.IsInNextQuarter",
"Date.IsInNextWeek",
"Date.IsInNextYear",
"Date.IsInPreviousDay",
"Date.IsInPreviousMonth",
"Date.IsInPreviousNDays",
"Date.IsInPreviousNMonths",
"Date.IsInPreviousNQuarters",
"Date.IsInPreviousNWeeks",
"Date.IsInPreviousNYears",
"Date.IsInPreviousQuarter",
"Date.IsInPreviousWeek",
"Date.IsInPreviousYear",
"Date.IsInYearToDate",
"Date.IsLeapYear",
"Date.Month",
"Date.MonthName",
"Date.QuarterOfYear",
"Date.StartOfDay",
"Date.StartOfMonth",
"Date.StartOfQuarter",
"Date.StartOfWeek",
"Date.StartOfYear",
"Date.ToRecord",
"Date.ToText",
"Date.WeekOfMonth",
"Date.WeekOfYear",
"Date.Year",
"DateTime.AddZone",
"DateTime.Date",
"DateTime.FixedLocalNow",
"DateTime.From",
"DateTime.FromFileTime",
"DateTime.FromText",
"DateTime.IsInCurrentHour",
"DateTime.IsInCurrentMinute",
"DateTime.IsInCurrentSecond",
"DateTime.IsInNextHour",
"DateTime.IsInNextMinute",
"DateTime.IsInNextNHours",
"DateTime.IsInNextNMinutes",
"DateTime.IsInNextNSeconds",
"DateTime.IsInNextSecond",
"DateTime.IsInPreviousHour",
"DateTime.IsInPreviousMinute",
"DateTime.IsInPreviousNHours",
"DateTime.IsInPreviousNMinutes",
"DateTime.IsInPreviousNSeconds",
"DateTime.IsInPreviousSecond",
"DateTime.LocalNow",
"DateTime.Time",
"DateTime.ToRecord",
"DateTime.ToText",
"DateTimeZone.FixedLocalNow",
"DateTimeZone.FixedUtcNow",
"DateTimeZone.From",
"DateTimeZone.FromFileTime",
"DateTimeZone.FromText",
"DateTimeZone.LocalNow",
"DateTimeZone.RemoveZone",
"DateTimeZone.SwitchZone",
"DateTimeZone.ToLocal",
"DateTimeZone.ToRecord",
"DateTimeZone.ToText",
"DateTimeZone.ToUtc",
"DateTimeZone.UtcNow",
"DateTimeZone.ZoneHours",
"DateTimeZone.ZoneMinutes",
"Decimal.From",
"Diagnostics.ActivityId",
"Diagnostics.Trace",
"DirectQueryCapabilities.From",
"Double.From",
"Duration.Days",
"Duration.From",
"Duration.FromText",
"Duration.Hours",
"Duration.Minutes",
"Duration.Seconds",
"Duration.ToRecord",
"Duration.ToText",
"Duration.TotalDays",
"Duration.TotalHours",
"Duration.TotalMinutes",
"Duration.TotalSeconds",
"Embedded.Value",
"Error.Record",
"Excel.CurrentWorkbook",
"Excel.Workbook",
"Exchange.Contents",
"Expression.Constant",
"Expression.Evaluate",
"Expression.Identifier",
"Facebook.Graph",
"File.Contents",
"Folder.Contents",
"Folder.Files",
"Function.From",
"Function.Invoke",
"Function.InvokeAfter",
"Function.IsDataSource",
"GoogleAnalytics.Accounts",
"Guid.From",
"HdInsight.Containers",
"HdInsight.Contents",
"HdInsight.Files",
"Hdfs.Contents",
"Hdfs.Files",
"Informix.Database",
"Int16.From",
"Int32.From",
"Int64.From",
"Int8.From",
"ItemExpression.From",
"Json.Document",
"Json.FromValue",
"Lines.FromBinary",
"Lines.FromText",
"Lines.ToBinary",
"Lines.ToText",
"List.Accumulate",
"List.AllTrue",
"List.Alternate",
"List.AnyTrue",
"List.Average",
"List.Buffer",
"List.Combine",
"List.Contains",
"List.ContainsAll",
"List.ContainsAny",
"List.Count",
"List.Covariance",
"List.DateTimeZones",
"List.DateTimes",
"List.Dates",
"List.Difference",
"List.Distinct",
"List.Durations",
"List.FindText",
"List.First",
"List.FirstN",
"List.Generate",
"List.InsertRange",
"List.Intersect",
"List.IsDistinct",
"List.IsEmpty",
"List.Last",
"List.LastN",
"List.MatchesAll",
"List.MatchesAny",
"List.Max",
"List.MaxN",
"List.Median",
"List.Min",
"List.MinN",
"List.Mode",
"List.Modes",
"List.NonNullCount",
"List.Numbers",
"List.PositionOf",
"List.PositionOfAny",
"List.Positions",
"List.Product",
"List.Random",
"List.Range",
"List.RemoveFirstN",
"List.RemoveItems",
"List.RemoveLastN",
"List.RemoveMatchingItems",
"List.RemoveNulls",
"List.RemoveRange",
"List.Repeat",
"List.ReplaceMatchingItems",
"List.ReplaceRange",
"List.ReplaceValue",
"List.Reverse",
"List.Select",
"List.Single",
"List.SingleOrDefault",
"List.Skip",
"List.Sort",
"List.StandardDeviation",
"List.Sum",
"List.Times",
"List.Transform",
"List.TransformMany",
"List.Union",
"List.Zip",
"Logical.From",
"Logical.FromText",
"Logical.ToText",
"MQ.Queue",
"MySQL.Database",
"Number.Abs",
"Number.Acos",
"Number.Asin",
"Number.Atan",
"Number.Atan2",
"Number.BitwiseAnd",
"Number.BitwiseNot",
"Number.BitwiseOr",
"Number.BitwiseShiftLeft",
"Number.BitwiseShiftRight",
"Number.BitwiseXor",
"Number.Combinations",
"Number.Cos",
"Number.Cosh",
"Number.Exp",
"Number.Factorial",
"Number.From",
"Number.FromText",
"Number.IntegerDivide",
"Number.IsEven",
"Number.IsNaN",
"Number.IsOdd",
"Number.Ln",
"Number.Log",
"Number.Log10",
"Number.Mod",
"Number.Permutations",
"Number.Power",
"Number.Random",
"Number.RandomBetween",
"Number.Round",
"Number.RoundAwayFromZero",
"Number.RoundDown",
"Number.RoundTowardZero",
"Number.RoundUp",
"Number.Sign",
"Number.Sin",
"Number.Sinh",
"Number.Sqrt",
"Number.Tan",
"Number.Tanh",
"Number.ToText",
"OData.Feed",
"Odbc.DataSource",
"Odbc.Query",
"OleDb.DataSource",
"OleDb.Query",
"Oracle.Database",
"Percentage.From",
"PostgreSQL.Database",
"RData.FromBinary",
"Record.AddField",
"Record.Combine",
"Record.Field",
"Record.FieldCount",
"Record.FieldNames",
"Record.FieldOrDefault",
"Record.FieldValues",
"Record.FromList",
"Record.FromTable",
"Record.HasFields",
"Record.RemoveFields",
"Record.RenameFields",
"Record.ReorderFields",
"Record.SelectFields",
"Record.ToList",
"Record.ToTable",
"Record.TransformFields",
"Replacer.ReplaceText",
"Replacer.ReplaceValue",
"RowExpression.Column",
"RowExpression.From",
"Salesforce.Data",
"Salesforce.Reports",
"SapBusinessWarehouse.Cubes",
"SapHana.Database",
"SharePoint.Contents",
"SharePoint.Files",
"SharePoint.Tables",
"Single.From",
"Soda.Feed",
"Splitter.SplitByNothing",
"Splitter.SplitTextByAnyDelimiter",
"Splitter.SplitTextByDelimiter",
"Splitter.SplitTextByEachDelimiter",
"Splitter.SplitTextByLengths",
"Splitter.SplitTextByPositions",
"Splitter.SplitTextByRanges",
"Splitter.SplitTextByRepeatedLengths",
"Splitter.SplitTextByWhitespace",
"Sql.Database",
"Sql.Databases",
"SqlExpression.SchemaFrom",
"SqlExpression.ToExpression",
"Sybase.Database",
"Table.AddColumn",
"Table.AddIndexColumn",
"Table.AddJoinColumn",
"Table.AddKey",
"Table.AggregateTableColumn",
"Table.AlternateRows",
"Table.Buffer",
"Table.Column",
"Table.ColumnCount",
"Table.ColumnNames",
"Table.ColumnsOfType",
"Table.Combine",
"Table.CombineColumns",
"Table.Contains",
"Table.ContainsAll",
"Table.ContainsAny",
"Table.DemoteHeaders",
"Table.Distinct",
"Table.DuplicateColumn",
"Table.ExpandListColumn",
"Table.ExpandRecordColumn",
"Table.ExpandTableColumn",
"Table.FillDown",
"Table.FillUp",
"Table.FilterWithDataTable",
"Table.FindText",
"Table.First",
"Table.FirstN",
"Table.FirstValue",
"Table.FromColumns",
"Table.FromList",
"Table.FromPartitions",
"Table.FromRecords",
"Table.FromRows",
"Table.FromValue",
"Table.Group",
"Table.HasColumns",
"Table.InsertRows",
"Table.IsDistinct",
"Table.IsEmpty",
"Table.Join",
"Table.Keys",
"Table.Last",
"Table.LastN",
"Table.MatchesAllRows",
"Table.MatchesAnyRows",
"Table.Max",
"Table.MaxN",
"Table.Min",
"Table.MinN",
"Table.NestedJoin",
"Table.Partition",
"Table.PartitionValues",
"Table.Pivot",
"Table.PositionOf",
"Table.PositionOfAny",
"Table.PrefixColumns",
"Table.Profile",
"Table.PromoteHeaders",
"Table.Range",
"Table.RemoveColumns",
"Table.RemoveFirstN",
"Table.RemoveLastN",
"Table.RemoveMatchingRows",
"Table.RemoveRows",
"Table.RemoveRowsWithErrors",
"Table.RenameColumns",
"Table.ReorderColumns",
"Table.Repeat",
"Table.ReplaceErrorValues",
"Table.ReplaceKeys",
"Table.ReplaceMatchingRows",
"Table.ReplaceRelationshipIdentity",
"Table.ReplaceRows",
"Table.ReplaceValue",
"Table.ReverseRows",
"Table.RowCount",
"Table.Schema",
"Table.SelectColumns",
"Table.SelectRows",
"Table.SelectRowsWithErrors",
"Table.SingleRow",
"Table.Skip",
"Table.Sort",
"Table.SplitColumn",
"Table.ToColumns",
"Table.ToList",
"Table.ToRecords",
"Table.ToRows",
"Table.TransformColumnNames",
"Table.TransformColumnTypes",
"Table.TransformColumns",
"Table.TransformRows",
"Table.Transpose",
"Table.Unpivot",
"Table.UnpivotOtherColumns",
"Table.View",
"Table.ViewFunction",
"TableAction.DeleteRows",
"TableAction.InsertRows",
"TableAction.UpdateRows",
"Tables.GetRelationships",
"Teradata.Database",
"Text.AfterDelimiter",
"Text.At",
"Text.BeforeDelimiter",
"Text.BetweenDelimiters",
"Text.Clean",
"Text.Combine",
"Text.Contains",
"Text.End",
"Text.EndsWith",
"Text.Format",
"Text.From",
"Text.FromBinary",
"Text.Insert",
"Text.Length",
"Text.Lower",
"Text.Middle",
"Text.NewGuid",
"Text.PadEnd",
"Text.PadStart",
"Text.PositionOf",
"Text.PositionOfAny",
"Text.Proper",
"Text.Range",
"Text.Remove",
"Text.RemoveRange",
"Text.Repeat",
"Text.Replace",
"Text.ReplaceRange",
"Text.Select",
"Text.Split",
"Text.SplitAny",
"Text.Start",
"Text.StartsWith",
"Text.ToBinary",
"Text.ToList",
"Text.Trim",
"Text.TrimEnd",
"Text.TrimStart",
"Text.Upper",
"Time.EndOfHour",
"Time.From",
"Time.FromText",
"Time.Hour",
"Time.Minute",
"Time.Second",
"Time.StartOfHour",
"Time.ToRecord",
"Time.ToText",
"Type.AddTableKey",
"Type.ClosedRecord",
"Type.Facets",
"Type.ForFunction",
"Type.ForRecord",
"Type.FunctionParameters",
"Type.FunctionRequiredParameters",
"Type.FunctionReturn",
"Type.Is",
"Type.IsNullable",
"Type.IsOpenRecord",
"Type.ListItem",
"Type.NonNullable",
"Type.OpenRecord",
"Type.RecordFields",
"Type.ReplaceFacets",
"Type.ReplaceTableKeys",
"Type.TableColumn",
"Type.TableKeys",
"Type.TableRow",
"Type.TableSchema",
"Type.Union",
"Uri.BuildQueryString",
"Uri.Combine",
"Uri.EscapeDataString",
"Uri.Parts",
"Value.Add",
"Value.As",
"Value.Compare",
"Value.Divide",
"Value.Equals",
"Value.Firewall",
"Value.FromText",
"Value.Is",
"Value.Metadata",
"Value.Multiply",
"Value.NativeQuery",
"Value.NullableEquals",
"Value.RemoveMetadata",
"Value.ReplaceMetadata",
"Value.ReplaceType",
"Value.Subtract",
"Value.Type",
"ValueAction.NativeStatement",
"ValueAction.Replace",
"Variable.Value",
"Web.Contents",
"Web.Page",
"WebAction.Request",
"Xml.Document",
"Xml.Tables"
],
builtinConstants: [
"BinaryEncoding.Base64",
"BinaryEncoding.Hex",
"BinaryOccurrence.Optional",
"BinaryOccurrence.Repeating",
"BinaryOccurrence.Required",
"ByteOrder.BigEndian",
"ByteOrder.LittleEndian",
"Compression.Deflate",
"Compression.GZip",
"CsvStyle.QuoteAfterDelimiter",
"CsvStyle.QuoteAlways",
"Culture.Current",
"Day.Friday",
"Day.Monday",
"Day.Saturday",
"Day.Sunday",
"Day.Thursday",
"Day.Tuesday",
"Day.Wednesday",
"ExtraValues.Error",
"ExtraValues.Ignore",
"ExtraValues.List",
"GroupKind.Global",
"GroupKind.Local",
"JoinAlgorithm.Dynamic",
"JoinAlgorithm.LeftHash",
"JoinAlgorithm.LeftIndex",
"JoinAlgorithm.PairwiseHash",
"JoinAlgorithm.RightHash",
"JoinAlgorithm.RightIndex",
"JoinAlgorithm.SortMerge",
"JoinKind.FullOuter",
"JoinKind.Inner",
"JoinKind.LeftAnti",
"JoinKind.LeftOuter",
"JoinKind.RightAnti",
"JoinKind.RightOuter",
"JoinSide.Left",
"JoinSide.Right",
"MissingField.Error",
"MissingField.Ignore",
"MissingField.UseNull",
"Number.E",
"Number.Epsilon",
"Number.NaN",
"Number.NegativeInfinity",
"Number.PI",
"Number.PositiveInfinity",
"Occurrence.All",
"Occurrence.First",
"Occurrence.Last",
"Occurrence.Optional",
"Occurrence.Repeating",
"Occurrence.Required",
"Order.Ascending",
"Order.Descending",
"Precision.Decimal",
"Precision.Double",
"QuoteStyle.Csv",
"QuoteStyle.None",
"RelativePosition.FromEnd",
"RelativePosition.FromStart",
"RoundingMode.AwayFromZero",
"RoundingMode.Down",
"RoundingMode.ToEven",
"RoundingMode.TowardZero",
"RoundingMode.Up",
"SapHanaDistribution.All",
"SapHanaDistribution.Connection",
"SapHanaDistribution.Off",
"SapHanaDistribution.Statement",
"SapHanaRangeOperator.Equals",
"SapHanaRangeOperator.GreaterThan",
"SapHanaRangeOperator.GreaterThanOrEquals",
"SapHanaRangeOperator.LessThan",
"SapHanaRangeOperator.LessThanOrEquals",
"SapHanaRangeOperator.NotEquals",
"TextEncoding.Ascii",
"TextEncoding.BigEndianUnicode",
"TextEncoding.Unicode",
"TextEncoding.Utf16",
"TextEncoding.Utf8",
"TextEncoding.Windows",
"TraceLevel.Critical",
"TraceLevel.Error",
"TraceLevel.Information",
"TraceLevel.Verbose",
"TraceLevel.Warning",
"WebMethod.Delete",
"WebMethod.Get",
"WebMethod.Head",
"WebMethod.Patch",
"WebMethod.Post",
"WebMethod.Put"
],
builtinTypes: [
"Action.Type",
"Any.Type",
"Binary.Type",
"BinaryEncoding.Type",
"BinaryOccurrence.Type",
"Byte.Type",
"ByteOrder.Type",
"Character.Type",
"Compression.Type",
"CsvStyle.Type",
"Currency.Type",
"Date.Type",
"DateTime.Type",
"DateTimeZone.Type",
"Day.Type",
"Decimal.Type",
"Double.Type",
"Duration.Type",
"ExtraValues.Type",
"Function.Type",
"GroupKind.Type",
"Guid.Type",
"Int16.Type",
"Int32.Type",
"Int64.Type",
"Int8.Type",
"JoinAlgorithm.Type",
"JoinKind.Type",
"JoinSide.Type",
"List.Type",
"Logical.Type",
"MissingField.Type",
"None.Type",
"Null.Type",
"Number.Type",
"Occurrence.Type",
"Order.Type",
"Password.Type",
"Percentage.Type",
"Precision.Type",
"QuoteStyle.Type",
"Record.Type",
"RelativePosition.Type",
"RoundingMode.Type",
"SapHanaDistribution.Type",
"SapHanaRangeOperator.Type",
"Single.Type",
"Table.Type",
"Text.Type",
"TextEncoding.Type",
"Time.Type",
"TraceLevel.Type",
"Type.Type",
"Uri.Type",
"WebMethod.Type"
],
tokenizer: {
root: [
// quoted identifier
[/#"[\w \.]+"/, "identifier.quote"],
// numbers
[/\d*\.\d+([eE][\-+]?\d+)?/, "number.float"],
[/0[xX][0-9a-fA-F]+/, "number.hex"],
[/\d+([eE][\-+]?\d+)?/, "number"],
// keywords
[
/(#?[a-z]+)\b/,
{
cases: {
"@typeKeywords": "type",
"@keywords": "keyword",
"@constants": "constant",
"@constructors": "constructor",
"@operatorKeywords": "operators",
"@default": "identifier"
}
}
],
// built-in types
[
/\b([A-Z][a-zA-Z0-9]+\.Type)\b/,
{
cases: {
"@builtinTypes": "type",
"@default": "identifier"
}
}
],
// other built-ins
[
/\b([A-Z][a-zA-Z0-9]+\.[A-Z][a-zA-Z0-9]+)\b/,
{
cases: {
"@builtinFunctions": "keyword.function",
"@builtinConstants": "constant",
"@default": "identifier"
}
}
],
// other identifiers
[/\b([a-zA-Z_][\w\.]*)\b/, "identifier"],
{ include: "@whitespace" },
{ include: "@comments" },
{ include: "@strings" },
[/[{}()\[\]]/, "@brackets"],
[/([=\+<>\-\*&@\?\/!])|([<>]=)|(<>)|(=>)|(\.\.\.)|(\.\.)/, "operators"],
[/[,;]/, "delimiter"]
],
whitespace: [[/\s+/, "white"]],
comments: [
["\\/\\*", "comment", "@comment"],
["\\/\\/+.*", "comment"]
],
comment: [
["\\*\\/", "comment", "@pop"],
[".", "comment"]
],
strings: [['"', "string", "@string"]],
string: [
['""', "string.escape"],
['"', "string", "@pop"],
[".", "string"]
]
}
};
return __toCommonJS(powerquery_exports);
})();
return moduleExports;
});
|
combined_dataset/train/non-malicious/2654.ps1 | 2654.ps1 | Try {
If (([System.Diagnostics.Process]::GetCurrentProcess() | Select "SessionID" -ExpandProperty "SessionID") -eq 0) {
Exit 1
}
Else {
Exit 0
}
}
Catch {
Exit 2
} |
combined_dataset/train/non-malicious/archive.ps1 | archive.ps1 | $rootDir = 'C:\\Documents and Settings\\buddyl\\My Documents\\Powershell Scripts\\';
$temp = $rootDir + 'temp'
mkdir $temp
$tempDir = $temp + '\\'
$targetFolder1 = $rootDir + 'test'
$zip1 = $tempDir + 'test1.zip'
gi $targetFolder1 | out-zip $zip1 $_
$targetFolder2 = $rootDir + 'test2'
$zip2 = $tempDir + 'test2.zip'
gi $targetFolder2 | out-zip $zip2 $_
$day = (Get-Date).get_day();
$month = (Get-Date).get_Month();
$year = (Get-Date).get_Year();
$date = $month.ToString() + "-" + $day.ToString() + "-" + $year.ToString();
$file = $rootDir + 'backup' + $date + '.zip'
gi $temp | out-zip $file $_
rmdir $temp -r
|
combined_dataset/train/non-malicious/1146.ps1 | 1146.ps1 |
$cert = $null
function Start-TestFixture
{
& (Join-Path -Path $PSScriptRoot -ChildPath '..\Initialize-CarbonTest.ps1' -Resolve)
}
function Start-Test
{
$cert = Install-Certificate (Join-Path $TestDir CarbonTestCertificate.cer -Resolve) -StoreLocation LocalMachine -StoreName My
}
function Stop-Test
{
Uninstall-Certificate -Certificate $cert -StoreLocation LocalMachine -StoreName My
}
function Test-ShouldCreateNewSslCertificateBinding
{
$appID = '0e8a659e-8034-4ab1-ab82-dcb0f5e90bfd'
$ipAddress = '74.32.80.43'
$port = '3847'
$binding = Set-SslCertificateBinding -IPAddress $ipAddress -Port $port -ApplicationID $appID -Thumbprint $cert.Thumbprint
try
{
Assert-Null $binding
$binding = Get-SslCertificateBinding -IPAddress $ipAddress -Port $port
$ipPort = '{0}:{1}' -f $ipAddress,$port
Assert-Equal $ipPort $binding.IPPort
Assert-Equal $appID $binding.ApplicationID
Assert-Equal $cert.Thumbprint $binding.CertificateHash
}
finally
{
Remove-SslCertificateBinding -IPAddress $ipAddress -Port $port
}
}
function Test-ShouldReturnBinding
{
$appID = '0e8a659e-8034-4ab1-ab82-dcb0f5e90bfd'
$ipAddress = '74.32.80.43'
$port = '3847'
$binding = Set-SslCertificateBinding -IPAddress $ipAddress -Port $port -ApplicationID $appID -Thumbprint $cert.Thumbprint -PassThru
$expectedBinding = Get-SslCertificateBinding -IPAddress $ipAddress -Port $port
try
{
Assert-NotNull $binding
Assert-Equal $expectedBinding $binding
$ipPort = '{0}:{1}' -f $ipAddress,$port
Assert-Equal $ipPort $binding.IPPort
Assert-Equal $appID $binding.ApplicationID
Assert-Equal $cert.Thumbprint $binding.CertificateHash
}
finally
{
Remove-SslCertificateBinding -IPAddress $ipAddress -Port $port
}
}
function Test-ShouldUpdateExistingSslCertificateBinding
{
$appID = '40f5bb4b-569b-47a8-a0cb-39ed797ce8ea'
$newAppID = '353364bb-1ca8-4d6c-a596-be7608d57771'
$ipAddress = '74.38.209.47'
$port = '8823'
$binding = Set-SslCertificateBinding -IPAddress $ipAddress -Port $port -ApplicationID $appID -Thumbprint $cert.Thumbprint
Assert-Null $binding
$binding = Set-SslCertificateBinding -IPAddress $ipAddress -Port $port -ApplicationID $newAppID -Thumbprint $cert.Thumbprint
Assert-Null $binding
$binding = Get-SslCertificateBinding -IPAddress $ipAddress -Port $port
try
{
Assert-Equal $newAppID $binding.ApplicationID
}
finally
{
Remove-SslCertificateBinding -IPAddress $ipAddress -Port $port
}
}
function Test-ShouldSupportShouldProcess
{
$appID = '411b1023-be42-458e-8fe7-a7ab6c908566'
$ipAddress = '54.72.38.90'
$port = '4782'
$binding = Set-SslCertificateBinding -IPAddress $ipAddress -Port $port -ApplicationID $appID -Thumbprint $cert.Thumbprint -WhatIf
Assert-Null $binding
try
{
Assert-Null (Get-SslCertificateBinding -IPAddress $ipAddress -Port $port)
}
finally
{
Remove-SslCertificateBinding -IPAddress $ipAddress -Port $port
}
}
function Test-ShouldSupportShouldProcessOnBindingUpdate
{
$appID = '411b1023-be42-458e-8fe7-a7ab6c908566'
$newAppID = 'db48e0ec-6d8c-4b2c-9486-a2bb33c68b05'
$ipAddress = '54.237.80.94'
$port = '7821'
$binding = Set-SslCertificateBinding -IPAddress $ipAddress -Port $port -ApplicationID $appID -Thumbprint $cert.Thumbprint
Assert-Null $binding
$binding = Set-SslCertificateBinding -IPAddress $ipAddress -Port $port -ApplicationID $newAppID -Thumbprint $cert.Thumbprint -WhatIf
Assert-Null $binding
$binding = Get-SslCertificateBinding -IPAddress $ipAddress -Port $port
try
{
Assert-Equal $appID $binding.ApplicationID
}
finally
{
Remove-SslCertificateBinding -IPAddress $ipAddress -Port $port
}
}
function Test-ShouldSupportIPv6Address
{
$appID = '9aa262a9-dfb3-49db-b368-9f15bc12168c'
$ipAddress = '[::]'
$port = '7821'
$binding = Set-SslCertificateBinding -IPAddress $ipAddress -Port $port -ApplicationID $appID -Thumbprint $cert.Thumbprint
try
{
Assert-Null $binding
$binding = Get-SslCertificateBinding -IPAddress $ipAddress -Port $port
Assert-Equal $appID $binding.ApplicationID
}
finally
{
Remove-SslCertificateBinding -IPAddress $ipAddress -Port $port
}
}
|
combined_dataset/train/non-malicious/sample_48_12.ps1 | sample_48_12.ps1 | # ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Returns an Application Insights component.
.Description
Returns an Application Insights component.
.Link
https://learn.microsoft.com/powershell/module/az.applicationinsights/get-azapplicationinsights
#>
function Get-AzApplicationInsights {
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Models.Api202002.IApplicationInsightsComponent], [Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Models.PSApplicationInsightsComponentWithPricingPlan])]
[CmdletBinding(DefaultParameterSetName='ListBySubscription', PositionalBinding=$false)]
param(
[Parameter(ParameterSetName='Get', Mandatory)]
[Parameter(ParameterSetName='ListByResourceGroupName', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Path')]
[System.String]
# The name of the resource group.
# The name is case insensitive.
${ResourceGroupName},
[Parameter(ParameterSetName='Get', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Path')]
[System.String]
[Alias("ApplicationInsightsComponentName", "ComponentName")]
# The name of the Application Insights component resource.
${Name},
[Parameter(ParameterSetName='Get')]
[Parameter(ParameterSetName='ListByResourceGroupName')]
[Parameter(ParameterSetName='ListBySubscription')]
[Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String[]]
# The ID of the target subscription.
${SubscriptionId},
[Parameter(ParameterSetName='GetByResourceId', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Path')]
[System.String]
# The resource ID of applicationinsights component.
${ResourceId},
[Parameter(ParameterSetName='Get')]
[Parameter(ParameterSetName='GetByResourceId')]
[Alias("IncludeDailyCap", "IncludeDailyCapStatus", "IncludePricingPlan")]
[Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Body')]
[System.Management.Automation.SwitchParameter]
${Full},
[Parameter(ParameterSetName='GetByInputObject', Mandatory, ValueFromPipeline)]
[Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Models.IApplicationInsightsIdentity]
# Identity Parameter
# To construct, see NOTES section for INPUTOBJECT properties and create a hash table.
${InputObject},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Azure')]
[System.Management.Automation.PSObject]
# The credentials, account, tenant, and subscription used for communication with Azure.
${DefaultProfile},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process {
if ($PSBoundParameters.ContainsKey('Full')) {
$full = $PSBoundParameters['Full']
$null = $PSBoundParameters.Remove('Full')
}
switch ($PSCmdlet.ParameterSetName) {
'GetByResourceId' {
$resourceId = $PSBoundParameters['ResourceId']
$null = $PSBoundParameters.Remove('ResourceId')
$component = (. Az.ApplicationInsights.internal\Get-AzApplicationInsights -InputObject $resourceId @PSBoundParameters)
if ($full) {
$pricingPlan = . Az.ApplicationInsights.internal\Get-AzApplicationInsightsComponentCurrentBillingFeature -InputObject $resourceId @PSBoundParameters
$dailyCapStatus = . Az.ApplicationInsights.internal\Get-AzApplicationInsightsComponentQuotaStatus -InputObject $resourceId @PSBoundParameters
}
break
}
default {
if ($PSBoundParameters['Name']) {
if ($full) {
$pricingPlan = (. Az.ApplicationInsights.internal\Get-AzApplicationInsightsComponentCurrentBillingFeature @PSBoundParameters)
$dailyCapStatus = (. Az.ApplicationInsights.internal\Get-AzApplicationInsightsComponentQuotaStatus @PSBoundParameters)
}
}
$component = (. Az.ApplicationInsights.internal\Get-AzApplicationInsights @PSBoundParameters)
break
}
}
if ($full) {
$PSCmdlet.WriteObject([Microsoft.Azure.PowerShell.Cmdlets.ApplicationInsights.Models.PSApplicationInsightsComponentWithPricingPlan]::New($component, $pricingPlan, $dailyCapStatus), $true)
} else {
$PSCmdlet.WriteObject($component, $true)
}
}
}
# SIG # Begin signature block
# MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAyxuRE1EzRIZD9
# ZVtrFhUabmMihf/6S9SHorOQFlIOGaCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAV+
# 8xPOaGB2QcIGbXR4lRsC7FzgWMSh5mqo1/455yceMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAQ01OZ9H3AnZqcwo/JFcpCRv13cYIDTE3ZhBF
# tMPkU82FOQOcVzZB2UnN51jkswmp4Z4ZS8YypaU4pm9Wn9RGwhtzuYLoO96ofPCH
# +mbWlvk0iRTsSelMaJQRo8Fgrf2lGGw7YkZHJOSssXbxDcYzPSpTaIexsC+wWrn6
# p9Fb3G3M5AVEAPYvTUyYuSgaIXdVnW9/DOCWNq5PxF2NvhSoJUJTYDkcYNuRhDDU
# WIuBplTZKlFnj6XQiFgWvHz9M4hpyexqsGjO7Sd6IgDanXldHCILZWg+s9+4mg0I
# H7XLhi37xJeFCOy9O4zvqbYiIWOvrJbJni6SUYjECaW9ehukraGCFykwghclBgor
# BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCCvE1UgqgmQxNRK0IWWXvNLNDm3NEhNx+4c
# n+DLoS8QvQIGZh+2Ye+cGBMyMDI0MDQyMzEzMTYxNi40NDRaMASAAgH0oIHYpIHV
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHenkie
# lp8oRD0AAQAAAd4wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjoyQUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB
# 9ByF9UIDhA6xFrOniw/xsDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SU
# IBkVQS0Ml6kR+TagkUPbaEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWo
# KySY8/ROIKdpphgI7OJb4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3yn
# vwrS8/bcorANO6DjuysyS9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2
# RC4odQcEPnY12jypYPnS6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9
# OmGo0S94Bxg3N/3aE6fUbnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdS
# qf85FklCXIIkg4sm7nM9TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1
# G7nUD1pteuXvQp8fE1KpTjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++
# 5Hyg/L68pe+DrZoZPXJaGU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhy
# k/EebwuXVJY+rTyfbRfuh9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlK
# IX5d3aQLo9fDda1ZTOw+XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNV
# HQ4EFgQUazAmbxseaapgdxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D
# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l
# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD
# ggIBAOKUwHsXDacGOvUIgs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSu
# y+GsxiVHzkhMW+FqK8gruLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1X
# EUsXYOSJUPitY7E8bbldmmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDi
# D28gAVGrPA3NykiSChvdqS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+S
# QmI9VIayYsIGRjvelmNa0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMY
# huWfWRSHZCKyIANA0aJL4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx7
# 8GqBKfylp25aOWJ/qPhC+DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41Fjg
# Bg4m3OTFDGot5DSuVkQgjku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6r
# rZM/PCwRG6girYmnTRLLsicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg
# 82/FMqCk9wK3LvyLAyDHN+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqH
# doNwQYROVm+ZX10RX3n6bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIB
# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1
# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O
# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn
# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t
# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq
# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP
# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW
# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv
# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb
# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc
# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a
# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB
# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw
# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E
# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB
# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/
# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ
# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v
# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h
# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x
# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p
# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A
# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC
# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB
# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt
# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3
# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV
# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw
# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB
# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjoyQUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy
# 22CJZExE2vOggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAOnSHRowIhgPMjAyNDA0MjMxOTQyMThaGA8yMDI0MDQy
# NDE5NDIxOFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6dIdGgIBADAHAgEAAgIN
# KjAHAgEAAgIRtjAKAgUA6dNumgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE
# AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB
# AAPWsZdCCWsEmxg1OXos5EufWRbruuws3CJ+wEAhXiNDRMQ7tdOCBgZR4T/JVpjA
# dTjbpz0afi31snq11zCbJoH2p291ETykxGG5oDc9PUq7jhEVlu3lAa2u4xmVD6Tp
# ANJGZ4XBHaaFo4pYqZnf+r6LSbkNZ7j7/OiTe7k9FCvYMYIEDTCCBAkCAQEwgZMw
# fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
# TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHenkielp8oRD0AAQAA
# Ad4wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB
# BDAvBgkqhkiG9w0BCQQxIgQgJQGV1uqc1+5Lgmv0lr+a9rLZKTNH69OK9xFVVR8B
# slswgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCOPiOfDcFeEBBJAn/mC3Mg
# rT5w/U2z81LYD44Hc34dezCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
# QSAyMDEwAhMzAAAB3p5InpafKEQ9AAEAAAHeMCIEIJZsqRmMvFYOvtIgYbW9mvW3
# 4zSiELA9VMZ+e/k6ckSaMA0GCSqGSIb3DQEBCwUABIICAIj3mPfJlPfsdugw8x0D
# Nt4xPBlKL9+oGJjmQVI0szWMwLMMyveY33g5+2TECTJUslSBWRPTswHzW06c41Hc
# psYWIMSbEUxGNu2+hbIfYFQqZoGuTTNv+7ncl4m4MgCJTCOPZ2eEm05JDioHXii0
# F9HpQ6WRmhccSSi9kicO/BCcV2ogWbdR6KlYscRAX0j911GkaOClZFCXrs4yuPy5
# Eytv7Q8BcEwZcITX2Cp+Q9x3EAXHAaAmr9ClDWAIDp7PkvuH4TFLsXFQNtqla99f
# 369E+Y4t/LlyFC0epbWwKW88CkD5nn+3xwS8skzUaq0v5Gx/zqWyfMe973QzG51a
# NyP4pugqHWKxsCRr4efo/ZDwKtn/HdP9RdMrVkPV70pUTEPvLgGLeej3GFbEST2C
# ryZzRpnMUEegR2Z3YNt6EKQdWC5w6rD9Ywk/hsyKDguRLhZn5tNdy95uAO+oBwg1
# 8aYqcjgjGOdbMDcDtD04+fvnVFUOLfP4yRG9nZWLDIamVqCrhkcuG2hNgPZib5pG
# z6PIS3AW92LtNOSNdQJb2PbBdmP+KRQ8I0ndr0M4brw8Dh+RJFGPXjYoGgngq22q
# MWesfBuLuBo5ABtUG1cw+gpLkQuAqrnxqSKCzvHXK8geCq+8bhKaDzFuZJEZpief
# EPcciWfkq7yNkVROWJ/fd3sU
# SIG # End signature block
|
combined_dataset/train/non-malicious/Get-QADGroupNesting_1.ps1 | Get-QADGroupNesting_1.ps1 | Param (
[Parameter(Mandatory=$true,
Position=0,
ValueFromPipeline=$true,
HelpMessage="DN or ObjectGUID of the AD Group."
)]
[string]$groupIdentity,
[switch]$showTree
)
#Validate Quest PSSnapin is loaded
Add-PSSnapin -Name Quest.ActiveRoles.ADManagement -ErrorAction SilentlyContinue
$global:numberOfRecursiveGroupMemberships = 0
$lastGroupAtALevelFlags = @()
function Get-GroupNesting ([string] $identity, [int] $level, [hashtable] $groupsVisitedBeforeThisOne, [bool] $lastGroupOfTheLevel)
{
$group = $null
$group = Get-QADGroup -Identity $identity -SizeLimit 0
if($lastGroupAtALevelFlags.Count -le $level)
{
$lastGroupAtALevelFlags = $lastGroupAtALevelFlags + 0
}
if($group -ne $null)
{
if($showTree)
{
for($i = 0; $i -lt $level - 1; $i++)
{
if($lastGroupAtALevelFlags[$i] -ne 0)
{
Write-Host -ForegroundColor Blue -NoNewline " "
}
else
{
Write-Host -ForegroundColor Blue -NoNewline "│ "
}
}
if($level -ne 0)
{
if($lastGroupOfTheLevel)
{
Write-Host -ForegroundColor Blue -NoNewline "└─"
}
else
{
Write-Host -ForegroundColor Blue -NoNewline "├─"
}
}
Write-Host -ForegroundColor Blue $group.Name
}
$groupsVisitedBeforeThisOne.Add($group.DN,$null)
$global:numberOfRecursiveGroupMemberships ++
$groupMemberShipCount = $group.memberOf.Count
if ($groupMemberShipCount -gt 0)
{
$maxMemberGroupLevel = 0
$count = 0
foreach($groupDN in $group.memberOf)
{
$count++
$lastGroupOfThisLevel = $false
if($count -eq $groupMemberShipCount){$lastGroupOfThisLevel = $true; $lastGroupAtALevelFlags[$level] = 1}
if(-not $groupsVisitedBeforeThisOne.Contains($groupDN)) #prevent cyclic dependancies
{
$memberGroupLevel = Get-GroupNesting -Identity $groupDN -Level $($level+1) -GroupsVisitedBeforeThisOne $groupsVisitedBeforeThisOne -lastGroupOfTheLevel $lastGroupOfThisLevel
if ($memberGroupLevel -gt $maxMemberGroupLevel){$maxMemberGroupLevel = $memberGroupLevel}
}
}
$level = $maxMemberGroupLevel
}
else #we've reached the top level group, return it's height
{
return $level
}
return $level
}
}
$global:numberOfRecursiveGroupMemberships = 0
$groupObj = Get-QADGroup -Identity $groupIdentity -SizeLimit 0
if($groupObj)
{
[int]$maxNestingLevel = Get-GroupNesting -Identity $groupIdentity -Level 0 -GroupsVisitedBeforeThisOne @{} -lastGroupOfTheLevel $false
Add-Member -InputObject $groupObj -MemberType NoteProperty -Name MaxNestingLevel -Value $maxNestingLevel -Force
Add-Member -InputObject $groupObj -MemberType NoteProperty -Name NestedGroupMembershipCount -Value $($global:numberOfRecursiveGroupMemberships - 1) -Force
$groupObj | Select-Object Name,DN,MaxNestingLevel,NestedGroupMembershipCount | Format-List
}
|
combined_dataset/train/non-malicious/sample_58_64.ps1 | sample_58_64.ps1 | # Localized 06/27/2024 06:02 AM (GMT) 303:7.1.41104 Add-AppDevPackage.psd1
# Culture = "en-US"
ConvertFrom-StringData @'
###PSLOC
PromptYesString=&Ano
PromptNoString=&Ne
BundleFound=Nalezený svazek: {0}
PackageFound=Nalezený balíček: {0}
EncryptedBundleFound=Nalezena zašifrovaná sada prostředků: {0}
EncryptedPackageFound=Nalezen zašifrovaný balíček: {0}
CertificateFound=Nalezený certifikát: {0}
DependenciesFound=Nalezené balíčky závislostí:
GettingDeveloperLicense=Získává se vývojářská licence...
InstallingCertificate=Instaluje se certifikát...
InstallingPackage=\nInstaluje se aplikace...
AcquireLicenseSuccessful=Vývojářská licence se úspěšně získala.
InstallCertificateSuccessful=Certifikát se úspěšně nainstaloval.
Success=\nÚspěch: Aplikace se úspěšně nainstalovala.
WarningInstallCert=\nChystáte se do úložiště certifikátů od důvěryhodných osob ve vašem počítači nainstalovat digitální certifikát. Provedení této akce představuje vážné bezpečnostní riziko a měli byste ji provést jenom v případě, že původci tohoto digitálního certifikátu důvěřujete.\n\nAž tuto aplikaci přestanete používat, měli byste přidružený digitální certifikát ručně odebrat. Postup, jak to udělat, najdete tady: http://go.microsoft.com/fwlink/?LinkId=243053\n\nOpravdu chcete pokračovat?\n\n
ElevateActions=\nPřed instalací této aplikace musíte provést následující:
ElevateActionDevLicense=\t- získat vývojářskou licenci
ElevateActionCertificate=\t- nainstalovat podpisový certifikát
ElevateActionsContinue=Po zadání přihlašovacích údajů správce budete moct pokračovat. Přijměte prosím výzvu služby UAC a v případě, že budete vyzváni, zadejte heslo správce.
ErrorForceElevate=Po zadání přihlašovacích údajů správce budete moct pokračovat. Spusťte prosím tento skript bez parametru -Force, nebo z okna prostředí PowerShell se zvýšenými oprávněními.
ErrorForceDeveloperLicense=Získání vývojářské licence vyžaduje interakci s uživatelem. Spusťte prosím tento skript znovu bez parametru -Force.
ErrorLaunchAdminFailed=Chyba: Nový proces nemůžete zahájit jako správce.
ErrorNoScriptPath=Chyba: Tento skript je potřeba spustit ze souboru.
ErrorNoPackageFound=Chyba: V adresáři skriptů se nenašel žádný balíček ani svazek. Zkontrolujte prosím, jestli se balíček nebo svazek, který chcete nainstalovat, nachází ve stejném adresáři jako tento skript.
ErrorManyPackagesFound=Chyba: V adresáři skriptů se našlo víc balíčků nebo svazků. Zkontrolujte prosím, že se ve stejném adresáři jako skript nachází jenom ten balíček nebo svazek, který chcete nainstalovat.
ErrorPackageUnsigned=Chyba: Balíček nebo svazek není digitálně podepsaný nebo je jeho podpis poškozený.
ErrorNoCertificateFound=Chyba: V adresáři skriptů se nenašel žádný certifikát. Zkontrolujte prosím, že se certifikát použitý k podpisu balíčku nebo svazku, který chcete nainstalovat, nachází ve stejném adresáři jako tento skript.
ErrorManyCertificatesFound=Chyba: V adresáři skriptů se našlo víc certifikátů. Zkontrolujte prosím, že se ve stejném adresáři jako tento skript nachází jenom ten certifikát použitý k podpisu balíčku nebo svazku, který chcete nainstalovat.
ErrorBadCertificate=Chyba: Soubor {0} není platným digitálním certifikátem. Nástroj CertUtil se vrátil s kódem chyby {1}.
ErrorExpiredCertificate=Chyba: Platnost certifikátu vývojáře {0} vypršela. Jednou z možných příčin je skutečnost, že systémové hodiny nejsou nastavené na správné datum a čas. Pokud je nastavení systému správné, obraťte se na vlastníka aplikace s žádostí o opakované vytvoření balíčku nebo svazku s platným certifikátem.
ErrorCertificateMismatch=Chyba: Certifikát se neshoduje s tím, který je použitý k podpisu balíčku nebo svazku.
ErrorCertIsCA=Chyba: Jako certifikát se nedá použít certifikační autorita.
ErrorBannedKeyUsage=Chyba: Certifikát nemůže mít následující použití klíče: {0}. Použití klíče musí být neurčené nebo shodné s digitálním podpisem.
ErrorBannedEKU=Chyba: Certifikát nemůže mít následující rozšířené použití klíče: {0}. Povolené je jenom rozšířené použití klíče podpisu kódu a životnosti podepisování.
ErrorNoBasicConstraints=Chyba: U certifikátu chybí rozšíření základních omezení.
ErrorNoCodeSigningEku=Chyba: U certifikátu chybí rozšířené použití klíče pro podpis kódu.
ErrorInstallCertificateCancelled=Chyba: Instalace certifikátu byla zrušena.
ErrorCertUtilInstallFailed=Chyba: Certifikát se nepovedlo nainstalovat. Nástroj CertUtil se vrátil s kódem chyby {0}.
ErrorGetDeveloperLicenseFailed=Chyba: Nepovedlo se získat vývojářskou licenci. Další informace najdete na adrese http://go.microsoft.com/fwlink/?LinkID=252740.
ErrorInstallCertificateFailed=Chyba: Certifikát se nepovedlo nainstalovat. Stav: {0}. Další informace najdete na adrese http://go.microsoft.com/fwlink/?LinkID=252740.
ErrorAddPackageFailed=Chyba: Aplikace se nedala nainstalovat.
ErrorAddPackageFailedWithCert=Chyba: Aplikace se nedala nainstalovat. Abyste zajistili bezpečnost, zvažte prosím odinstalování podpisového certifikátu, dokud nebudete moct aplikaci nainstalovat. Postup, jak to udělat, najdete tady:\nhttp://go.microsoft.com/fwlink/?LinkId=243053
'@
|
combined_dataset/train/non-malicious/Remove local profiles.ps1 | Remove local profiles.ps1 | <#
.SYNOPSIS
This is a powershell script form to remove a users local profile from a workstation and
and gives the option to remove the users profile fromt he network.
.DESCRIPTION
This script askes for a machine name.
It displays all of the roaming profiles on that machine.
The administrator selects the profile to be removed from the machine.
The administrator selects whether the network profile is to be removed as well.
The administrator clicks the delete button and the script removes the local profile
and the network profile if the option was seleteced.
.NOTES
This script must be run as with adminstrator credentials.
Created: 08/03/13
#>
CLS
Import-Module ActiveDirectory
# Define Variables
$global:Workstation = ""
function CheckCredentials
{
# Check Credentials
$Credential = ([Security.Principal.WindowsIdentity]::GetCurrent()).Name
$CredentialTest = ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")
if($CredentialTest -eq $false)
{
[System.Windows.Forms.MessageBox]::Show("You are not an Administrator.`n`nPlease run the script with `nAdministrator credentials." , "Not an Administrator!" , 0)
$objForm.Close()
}
}
function TestWMIConnection
{
# Test WMI Connection and update label
if(!(Get-WmiObject -class "Win32_Process" -namespace "root\\cimv2" -ComputerName $Workstation -ErrorAction SilentlyContinue))
{
$WMIConnectionLabel.ForeColor = "Red"
$WMIConnectionLabel.Text = "WMI Connection to device is DOWN."
}
else
{
$WMIConnectionLabel.ForeColor = "Green"
$WMIConnectionLabel.Text = "WMI Connection to device is OK."
}
}
function GetLocalProfiles
{
$ProfilesFoundListBox.Items.Clear()
$ProfileDetailsRichTextBox.Text = ""
$Profiles = ""
$Profiles = @(Get-WmiObject -Class Win32_UserProfile -ComputerName $Workstation -ErrorAction SilentlyContinue | ?{$_.Status -eq "2"})
# Profile Status values are (0, 1, 2, 4, 8) where a value of zero denotes unset or default
# and 1 = Temporary, 2 = Roaming, 4 = Mandatory and 8 = Corrupted.
foreach($Profile in $Profiles)
{
$objSID = New-Object System.Security.Principal.SecurityIdentifier($Profile.sid)
$objUser = $objSID.Translate([System.Security.Principal.NTAccount])
$Profilename = $objUser.value.split("\\")[1]
$ProfilesFoundListBox.Items.Add($Profilename.ToUpper())
$objForm.Update()
}
}
function GetProfileDetails
{
# Get AD Account Info
$ADInfo = ""
$LocalProfile = ""
$ADUserID = Get-ADUser -Identity $ProfilesFoundListBox.SelectedItem -Properties *
$ProfileInfo = "Active Directory Details:"
$ProfileInfo = $ProfileInfo + "`nName : " + $ADUserID.displayNamePrintable
$ProfileInfo = $ProfileInfo + "`nOffice : " + $ADUserID.Office
$ProfileInfo = $ProfileInfo + "`nStaff ID: " + $ADUserID.EmployeeID
$ProfileInfo = $ProfileInfo + "`nProfile : " + $ADUserID.ProfilePath
# Get Local Profile Info
$LocalProfile = Get-WmiObject -Class Win32_UserProfile -ComputerName $Workstation -ErrorAction SilentlyContinue | ?{$_.LocalPath -like "*" + $ProfilesFoundListBox.SelectedItem}
try
{
$LastDownloadTime = $LocalProfile.ConvertToDateTime($LocalProfile.LastDownloadTime).ToShortDateString()
}
catch
{
$LastDownloadTime = "Never Downloaded"
}
$LastUsedTime = $LocalProfile.ConvertToDateTime($LocalProfile.LastUseTime).ToShortDateString()
$ProfileInfo = $ProfileInfo + "`n`nLocal Profile Details:"
$ProfileInfo = $ProfileInfo + "`nProfile Path : " + $LocalProfile.LocalPath
$ProfileInfo = $ProfileInfo + "`nLast Download : " + $LastDownloadTime
$ProfileInfo = $ProfileInfo + "`nLast Used : " + $LastUsedTime
$ProfileInfo = $ProfileInfo + "`nIs Loaded : " + $LocalProfile.Loaded
$ProfileDetailsRichTextBox.Text = $ProfileInfo
if($LocalProfile.Loaded -eq $true)
{
[System.Windows.Forms.MessageBox]::Show("The selected profile is currently loaded.`nThe profile will need to be logged off.", "Profile Loaded" , 0)
}
}
function DeleteLocalProfile
{
$ConfirmDelete = [System.Windows.Forms.MessageBox]::Show("CONFIRM`n`nDelete local profile : " + $ProfilesFoundListBox.SelectedItem + "`nFrom Workstation : " + $Workstation.ToUpper() , "Local Profile Delete" , 4)
if ($ConfirmDelete -eq "YES")
{
Get-WmiObject -Class Win32_UserProfile -ComputerName $Workstation -ErrorAction SilentlyContinue | ?{$_.LocalPath -like "*" + $ProfilesFoundListBox.SelectedItem} | Remove-WmiObject
[System.Windows.Forms.MessageBox]::Show("Profile "+ $ProfilesFoundListBox.SelectedItem + " has been deleted from " + $Workstation + ".", "Profile Deleted" , 0)
}
}
function DeleteNetworkProfile
{
$ADUserID = Get-ADUser -Identity $ProfilesFoundListBox.SelectedItem -Properties *
$ConfirmDelete = [System.Windows.Forms.MessageBox]::Show("CONFIRM`n`nDelete network profile : " + $ADUserID.displayNamePrintable + "`nPath : " + $ADUserID.ProfilePath , "Network Profile Delete" , 4)
if ($ConfirmDelete -eq "YES")
{
$NetProfile = $ADUserID.ProfilePath
$NetProfile = [string]::Join('\\', $NetProfile.Split('\\')[0..$($NetProfile.Split('\\').Length-2)])
Remove-Item $NetProfile -Recurse -Force
[System.Windows.Forms.MessageBox]::Show("Network profile has been deleted.`n" + "Path : " + $NetProfile , "Profile Deleted" , 0)
}
else
{
$objForm.Close()
}
}
Function BuildForm
{
[void] [System.Reflection.Assembly]::LoadWithPartialName("System.Drawing")
[void] [System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms")
[void] [System.Windows.Forms.Application]::EnableVisualStyles()
$objForm = New-Object System.Windows.Forms.Form
$objForm.Text = "Remove Profile Tool"
$objForm.Icon = [system.drawing.icon]::ExtractAssociatedIcon($PsHome + "\\powershell.exe")
$objForm.Size = New-Object System.Drawing.Size(550,500)
$objForm.StartPosition = "CenterScreen"
$objForm.AutoSize = $True
$objForm.AutoSizeMode = "GrowOnly" # GrowAndShrink or GrowOnly
$objForm.AutoScroll = $True
$objForm.MinimizeBox = $true
$objForm.MaximizeBox = $False
$objForm.WindowState = "Normal" # Maximized, Minimized, Normal
$objForm.SizeGripStyle = "Hide" # Auto, Hide, Show
$objForm.ShowInTaskbar = $true
$objForm.Topmost = $True
$objFormFont1 = New-Object System.Drawing.Font("Arial",24,[System.Drawing.FontStyle]::Regular) # Form title font
$objFormFont2 = New-Object System.Drawing.Font("Arial",10,[System.Drawing.FontStyle]::Regular) # Form font
$objFormFont3 = New-Object System.Drawing.Font("Consolas",10,[System.Drawing.FontStyle]::Regular) # Fixed width font
# $objFormFont3 = New-Object System.Drawing.Font("Lucida Console",10,[System.Drawing.FontStyle]::Regular) # Second fixed width font
# Font styles are: Regular, Bold, Italic, Underline, Strikeout
$objForm.Font = $objFormFont2 # Applies font to whole form
$objForm.KeyPreview = $True
# $objForm.Add_KeyDown({if ($_.KeyCode -eq "Enter"){$x=$objTextBox.Text;$objForm.Close()}})
$objForm.Add_KeyDown({if ($_.KeyCode -eq "Escape"){$objForm.Close()}})
# Form Objects
# Check Credentials
CheckCredentials
#Form Title
$FormTitleLabel = New-Object System.Windows.Forms.Label
$FormTitleLabel.Location = New-Object System.Drawing.Size(10,10)
$FormTitleLabel.Autosize = $true # = New-Object System.Drawing.Size(650,40)
$FormTitleLabel.Font = $objFormFont1
$FormTitleLabel.Text = "Profile Removal Tool"
$objForm.Controls.Add($FormTitleLabel)
#Get Workstation Name
$GetWorkstationNameLabel = New-Object System.Windows.Forms.Label
$GetWorkstationNameLabel.Location = New-Object System.Drawing.Size(10,70)
$GetWorkstationNameLabel.Size = New-Object System.Drawing.Size(140,20)
$GetWorkstationNameLabel.Text = "Enter Machine Name"
$objForm.Controls.Add($GetWorkstationNameLabel)
$GetWorkstationNameTextBox = New-Object System.Windows.Forms.TextBox
$GetWorkstationNameTextBox.Location = New-Object System.Drawing.Size(155,69) # Count as (160,70) -1 to align text box
$GetWorkstationNameTextBox.Size = New-Object System.Drawing.Size(140,20)
$objForm.Controls.Add($GetWorkstationNameTextBox)
$GetWorkstationNameButton = New-Object System.Windows.Forms.Button
$GetWorkstationNameButton.Location = New-Object System.Drawing.Size(305,69) # Count as (305,70) -1 to align button
$GetWorkstationNameButton.Size = New-Object System.Drawing.Size(75,23)
$GetWorkstationNameButton.Text = "OK"
$GetWorkstationNameButton.Add_Click(
{
$Workstation = $GetWorkstationNameTextBox.Text.ToUpper()
# Update profiles found label
$ProfilesFoundLabel.Text = "Profiles found on " + $Workstation
$objForm.Controls.Add($ProfilesFoundLabel)
# Test WMI Connection
TestWMIConnection
# Get local profiles
GetLocalProfiles
})
$objForm.Controls.Add($GetWorkstationNameButton)
#WMI Connection Status
$WMIConnectionLabel = New-Object System.Windows.Forms.Label
$WMIConnectionLabel.Location = New-Object System.Drawing.Size(10,115)
$WMIConnectionLabel.Size = New-Object System.Drawing.Size(280,20)
$WMIConnectionLabel.Text = "WMI Connection to device is..."
$objForm.Controls.Add($WMIConnectionLabel)
# Found Profiles
$ProfilesFoundLabel = New-Object System.Windows.Forms.Label
$ProfilesFoundLabel.Location = New-Object System.Drawing.Size(10,150)
$ProfilesFoundLabel.Size = New-Object System.Drawing.Size(280,20)
$ProfilesFoundLabel.Text = "Profiles found on..."
$objForm.Controls.Add($ProfilesFoundLabel)
$ProfilesFoundListBox = New-Object System.Windows.Forms.ListBox
$ProfilesFoundListBox.Location = New-Object System.Drawing.Size(10,180)
$ProfilesFoundListBox.Size = New-Object System.Drawing.Size(280,200)
$ProfilesFoundListBox.Text = "Found Profiles"
$ProfilesFoundListBox.Add_Click(
{
GetProfileDetails
})
$objForm.Controls.Add($ProfilesFoundListBox)
# Profile Details
$ProfileDetailsLabel = New-Object System.Windows.Forms.Label
$ProfileDetailsLabel.Location = New-Object System.Drawing.Size(305,150)
$ProfileDetailsLabel.Size = New-Object System.Drawing.Size(280,20)
$ProfileDetailsLabel.Text = "Profile Details"
$objForm.Controls.Add($ProfileDetailsLabel)
$ProfileDetailsRichTextBox = New-Object System.Windows.Forms.RichTextBox
$ProfileDetailsRichTextBox.Location = New-Object System.Drawing.Size(305,180)
$ProfileDetailsRichTextBox.Size = New-Object System.Drawing.Size(280,200)
$ProfileDetailsRichTextBox.Font = $objFormFont3
$ProfileDetailsRichTextBox.ForeColor = "DarkGreen"
$objForm.Controls.Add($ProfileDetailsRichTextBox)
# Delete network profile checkbox
$DeleteNetProfileCheckBox = New-Object System.Windows.Forms.CheckBox
$DeleteNetProfileCheckBox.Location = New-Object System.Drawing.Size(10,390)
$DeleteNetProfileCheckBox.Size = New-Object System.Drawing.Size(280,20)
$DeleteNetProfileCheckBox.Text = "Include Network Profile in Delete"
$DeleteNetProfileCheckBox.ForeColor = "Red"
$objForm.Controls.Add($DeleteNetProfileCheckBox)
# Delete button
$DeleteButton = New-Object System.Windows.Forms.Button
$DeleteButton.Location = New-Object System.Drawing.Size(10,430)
$DeleteButton.Size = New-Object System.Drawing.Size(135,23)
$DeleteButton.Text = "Delete"
$DeleteButton.BackColor = "Red"
$DeleteButton.Forecolor = "White"
$DeleteButton.Add_Click(
{
DeleteLocalProfile
if($DeleteNetProfileCheckBox.Checked)
{
DeleteNetworkProfile
}
# Update profile info
GetLocalProfiles
})
$objForm.Controls.Add($DeleteButton)
$ExitButton = New-Object System.Windows.Forms.Button
$ExitButton.Location = New-Object System.Drawing.Size(155,430)
$ExitButton.Size = New-Object System.Drawing.Size(135,23)
$ExitButton.Text = "Exit"
$ExitButton.Add_Click({$objForm.Close()})
$objForm.Controls.Add($ExitButton)
# Status Line
$StatusLineLabel = New-Object System.Windows.Forms.Label
$StatusLineLabel.Location = New-Object System.Drawing.Size(415,430)
$StatusLineLabel.Size = New-Object System.Drawing.Size(180,40)
$StatusLineLabel.Text = "Version : 2.02"
$objForm.Controls.Add($StatusLineLabel)
# Show Form
$objForm.Add_Shown({$objForm.Activate()})
[void] $objForm.ShowDialog()
} # End Function
# Application Start
BuildForm
|
combined_dataset/train/non-malicious/2681.ps1 | 2681.ps1 |
Param(
[string]$SourceEnvironment,
[string]$DestinationEnvironment
)
begin
{
Clear-Host
}
process
{
$path = Split-Path -parent $MyInvocation.MyCommand.Definition
if ($env:PSModulePath -notlike "*$path\Modules\TriadModules\Modules*")
{
"Adding ;$path\Modules\TriadModules\Modules to PSModulePath" | Write-Debug
$env:PSModulePath += ";$path\Modules\TriadModules\Modules"
}
$config = [xml](Get-Content $path/config.xml -ErrorAction Stop)
$defaultSourceEnvironment = "Dev"
$defaultDestinationEnvironment = "Uat"
if ($SourceEnvironment -eq $null -or $SourceEnvironment -eq "")
{
$SourceEnvironment = $defaultSourceEnvironment
}
if ($DestinationEnvironment -eq $null -or $DestinationEnvironment -eq "")
{
$DestinationEnvironment = $defaultDestinationEnvironment
}
Add-TMPnPTemplatesForSiteCollections -TemplatePath $path -Configuration $config.OuterXml -SourceEnvironment $SourceEnvironment -DestinationEnvironment $DestinationEnvironment
}
end
{
"Completed import!" | Write-Debug
}
|
combined_dataset/train/non-malicious/sample_22_4.ps1 | sample_22_4.ps1 | <#
.SYNOPSIS Launch Developer PowerShell
.DESCRIPTION
Locates and imports a Developer PowerShell module and calls the Enter-VsDevShell cmdlet. The Developer PowerShell module
is located in one of several ways:
1) From a path in a Visual Studio installation
2) From the latest installation of Visual Studio (higher versions first)
3) From the instance ID of a Visual Studio installation
4) By selecting a Visual Studio installation from a list
By default, with no parameters, the path to this script is used to locate the Developer PowerShell module. If that fails,
then the latest Visual Studio installation is used. If both methods fail, then the user can select a Visual Studio installation
from a list.
.PARAMETER VsInstallationPath
A path in a Visual Studio installation. The path is used to locate the Developer PowerShell module.
By default, this is the path to this script.
.PARAMETER Latest
Use the latest Visual Studio installation to locate the Developer PowerShell module.
.PARAMETER List
Display a list of Visual Studio installations to choose from. The choosen installation is used to locate the Developer PowerShell module.
.PARAMETER VsInstanceId
A Visual Studio installation instance ID. The matching installation is used to locate the Developer PowerShell module.
.PARAMETER ExcludePrerelease
Excludes Prerelease versions of Visual Studio from consideration. Applies only to Latest and List.
.PARAMETER VsWherePath
Path to the vswhere utility used to located and identify Visual Studio installations.
By default, the path is the well-known location shared by Visual Studio installations.
#>
[CmdletBinding(DefaultParameterSetName = "Default")]
param (
[ValidateScript({Test-Path $_})]
[Parameter(ParameterSetName = "VsInstallationPath")]
[string]
$VsInstallationPath = "$($MyInvocation.MyCommand.Definition)",
[Parameter(ParameterSetName = "Latest")]
[switch]
$Latest,
[Parameter(ParameterSetName = "List")]
[switch]
$List,
[Parameter(ParameterSetName = "List")]
[object[]]
$DisplayProperties = @("displayName", "instanceId", "installationVersion", "isPrerelease", "installationName", "installDate"),
[Parameter(ParameterSetName = "VsInstanceId", Mandatory = $true)]
[string]
$VsInstanceId,
[Parameter(ParameterSetName = "Latest")]
[Parameter(ParameterSetName = "List")]
[switch]
$ExcludePrerelease,
[Parameter(ParameterSetName = "Default")]
[Parameter(ParameterSetName = "VsInstallationPath")]
[Parameter(ParameterSetName = "Latest")]
[Parameter(ParameterSetName = "List")]
[Parameter(ParameterSetName = "VsInstanceId")]
[ValidateSet('x86','amd64','arm','arm64')]
[string]
$Arch,
[Parameter(ParameterSetName = "Default")]
[Parameter(ParameterSetName = "VsInstallationPath")]
[Parameter(ParameterSetName = "Latest")]
[Parameter(ParameterSetName = "List")]
[Parameter(ParameterSetName = "VsInstanceId")]
[ValidateSet('x86','amd64')]
[string]
$HostArch,
[Parameter(ParameterSetName = "Default")]
[Parameter(ParameterSetName = "VsInstallationPath")]
[Parameter(ParameterSetName = "Latest")]
[Parameter(ParameterSetName = "List")]
[Parameter(ParameterSetName = "VsInstanceId")]
[switch]
$SkipAutomaticLocation,
[ValidateScript({Test-Path $_ -PathType 'Leaf'})]
[Parameter(ParameterSetName = "Default")]
[Parameter(ParameterSetName = "VsInstallationPath")]
[Parameter(ParameterSetName = "Latest")]
[Parameter(ParameterSetName = "List")]
[Parameter(ParameterSetName = "VsInstanceId")]
[string]
$VsWherePath = "${env:ProgramFiles(x86)}\Microsoft Visual Studio\Installer\vswhere.exe"
)
function GetSetupConfigurations {
param (
$whereArgs
)
$expression = "& `"$VsWherePath`" $whereArgs -format json"
Invoke-Expression $expression | ConvertFrom-Json
}
function LaunchDevShell {
param (
$config
)
$basePath = $config.installationPath
$instanceId = $config.instanceId
$currModulePath = "$basePath\Common7\Tools\Microsoft.VisualStudio.DevShell.dll"
# Prior to 16.3 the DevShell module was in a different location
$prevModulePath = "$basePath\Common7\Tools\vsdevshell\Microsoft.VisualStudio.DevShell.dll"
$modulePath = if (Test-Path $prevModulePath) { $prevModulePath } else { $currModulePath }
if (Test-Path $modulePath) {
Write-Verbose "Found at $modulePath."
try {
Import-Module $modulePath
}
catch [System.IO.FileLoadException] {
Write-Verbose "The module has already been imported from a different installation of Visual Studio:"
(Get-Module Microsoft.VisualStudio.DevShell).Path | Write-Verbose
}
$params = @{
VsInstanceId = $instanceId
}
$command = Get-Command Enter-VsDevShell
if ($SkipAutomaticLocation)
{
$params.SkipAutomaticLocation = $true
}
# -Arch is only available from 17.1
if ($Arch -and $command.Parameters.ContainsKey("Arch"))
{
$params.Arch = $Arch
}
# -HostArch is only available from 17.1
if ($HostArch -and $command.Parameters.ContainsKey("HostArch"))
{
$params.HostArch = $HostArch
}
# -ReportNewInstanceType is only available from 16.5
if ($command.Parameters.ContainsKey("ReportNewInstanceType")) {
$params.ReportNewInstanceType = "LaunchScript"
}
$boundParams = $PSCmdlet.MyInvocation.BoundParameters
if ($boundParams.ContainsKey("Verbose") -and
$boundParams["Verbose"].IsPresent)
{
Write-Verbose "Enter-VsDevShell Parameters:"
$params.GetEnumerator() | ForEach-Object{
$message = '{0} = {1}' -f $_.key, $_.value
Write-Verbose $message
}
}
Enter-VsDevShell @params
exit
}
throw [System.Management.Automation.ErrorRecord]::new(
[System.Exception]::new("Required assembly could not be located. This most likely indicates an installation error. Try repairing your Visual Studio installation. Expected location: $modulePath"),
"DevShellModuleLoad",
[System.Management.Automation.ErrorCategory]::NotInstalled,
$config)
}
function VsInstallationPath {
$setupargs = "-path `"$VsInstallationPath`""
Write-Verbose "Using path: $VsInstallationPath"
$config = GetSetupConfigurations($setupargs)
LaunchDevShell($config)
}
function Latest {
$setupargs = "-latest"
if (-not $ExcludePrerelease) {
$setupargs += " -prerelease"
}
$config = GetSetupConfigurations($setupargs)
LaunchDevShell($config)
}
function VsInstanceId {
$configs = GetSetupConfigurations("-prerelease -all")
$config = $configs | Where-Object { $_.instanceId -eq $VsInstanceId }
if ($config) {
Write-Verbose "Found Visual Studio installation with InstanceId of '$($config.instanceId)' and InstallationPath '$($config.installationPath)'"
LaunchDevShell($config)
exit
}
throw [System.Management.Automation.ErrorRecord]::new(
[System.Exception]::new("Could not find an installation of Visual Studio with InstanceId '$VsInstanceId'."),
"VsSetupInstance",
[System.Management.Automation.ErrorCategory]::InvalidArgument,
$config)
}
function List {
$setupargs = "-sort"
if (-not $ExcludePrerelease) {
$setupargs = " -prerelease"
}
$configs = GetSetupConfigurations($setupargs)
$DisplayProperties = @("#") + $DisplayProperties
# Add an incrementing select column
$configs = $configs |
Sort-Object displayName, installationDate |
ForEach-Object {$i = 0}{ $i++; $_ | Add-Member -NotePropertyName "#" -NotePropertyValue $i -PassThru }
Write-Host "The following Visual Studio installations were found:"
$configs | Format-Table -Property $DisplayProperties
$selected = Read-Host "Enter '#' of the Visual Studio installation to launch DevShell. <Enter> to quit: "
if (-not $selected) { exit }
$config = $configs | Where-Object { $_."#" -eq $selected }
if ($config) {
LaunchDevShell($config)
}
else {
"Invalid selection: $selected"
}
}
function Default{
Write-Verbose "No parameters passed to script. Trying VsInstallationPath."
try {
VsInstallationPath
exit
}
catch {
Write-Verbose "VsInstallationPath failed. Trying Latest."
}
Write-Host "Could not start Developer PowerShell using the script path."
Write-Host "Attempting to launch from the latest Visual Studio installation."
try {
Latest
exit
}
catch {
Write-Verbose "Latest failed. Defaulting to List."
}
Write-Host "Could not start Developer PowerShell from the latest Visual Studio installation."
Write-Host
List
}
if ($PSCmdlet.ParameterSetName) {
& (Get-ChildItem "Function:$($PSCmdlet.ParameterSetName)")
exit
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB7cpavZzVzbDmR
# tFRSbdabKCMPm0+YAH01FA8nFbex/KCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHPsZ8DbaAp3m9TPusm7vlos
# rwBn+o+wW7H47SQLjRp5MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAmXCs4ZgS+rvQEUtSJv/Elw+38ybXUNObqUNv0wcfJ49WO6od60Lq+bAp
# DPi1Aala1hcwWEUTrlOW5kEzOVHUmFRZquJTlOWgqWYLqkXhUMGo5q8NrjNI1ES1
# XZhfD1obPP/xUKQlE54Tm5FBGSAcvn+Ps4fnjWVmhj345+VzsI/UeN0AXz6doSWB
# /HSSxt0ZnvIsuk7rD5pfcjlBMuveR+MszT1LCi/7YPOte2+SBiM+VWkKVTWSUltc
# O4RXqxeq3G/qHlIN0gSC7klXqyQFhXl5foY/tbPMYAHpQZZU/PwcflN42HF45/qE
# MFvryxK2+nEJCQ2Y8kHASUQ+ZH/B9aGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBqpgOVcunQE9lXURLjX+TDdTkM/Dj3budQ1a3aN9+FAwIGZfLhwHHg
# GBMyMDI0MDQwMzAyMzUyOS41NDZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAABAAAB7DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MzhaFw0yNTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22uwdEZm0IoAFs6oIr39VK
# /ItP80cn+8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4V
# yHEco/u1QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+
# H77gL4r01TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3
# SEZAq4XIjiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAinb0o+uQ9KtaKNLVVcNf5
# QpS4f6/MsXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5h
# PP6HVRoqBYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZa
# e77homzx6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDHEzGsQnMUQKstS3zjn6SU
# 0NLEFNCetluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQY
# A2Xaz1fK9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu
# 974e9mGW7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgMGJj73CQvr+jqoWwx6Xdy
# eQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1whYQsV8UgEf4TIWGMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0
# UY3FjvPhwGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbFTr+IAnDSeg8TB9zfG/4y
# bknuopklbeGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv
# +y1AXJ5QcLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhBNtu57wPKXZ1EoNToBk8b
# A6839w119b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0
# jeOv5dUGMCYgZjvoTmgd45bqAwundmPlGur7eleWYedLQf7s3L5+qfaY/xEh/9uo
# 17SnM/gHVSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe76iYtL+mhxXPEpzda3bJl
# hPTOQ3KOEZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd071bemnou8A3rUZrdgKIa
# utsH7SHOiOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla7Xad9qrTYdT45VlCYTtB
# SY4oVRsedSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRu
# a3K0xivdtnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJFeW7r29XX+k0e4DnG6iB
# HKQjec6VNzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCO
# HPtgVdz9EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6bcSfjAiGA8yMDI0MDQwMjIzMjU1
# MFoYDzIwMjQwNDAzMjMyNTUwWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDptxJ+
# AgEAMAcCAQACAgnEMAcCAQACAhMLMAoCBQDpuGP+AgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAHccoKnCN2a/axSG92ASOq8Ry6xg9lnSBNR0yb8bbGGOQx1t
# 65kQ43hszfAOLvCtm3HpmVrhzBErX0NZelferF4N7dGNFFnv77mMwuANoze8KqaB
# 22n/sSOqgPZClH5TRAOlDaZgjv//ZZesbDULeZ5wWo8HPLpc4mt5krhBbZKXb9G9
# IH9/zegWPS5Vw3ulAL5jkrkdbdHBAjvcRgV0y3fMGnJAHu5TQRuKjkFLbKhyujr+
# tggu5VTzwQEar/XjrJTNlULlbmv7GSKV5mfrLIHQefBSbl2ptx1LHuSglRlR8InP
# xC2q868N/J/KQtF/PoOa1eKSVnvAWIpcslKwDcIxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezgK6SC0JFSgAABAAAB7DAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCByWnMA9v1nfS9tVSRpVvcwKVoMu5fUUvg73Fbg+HNApzCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVqfTfIhx21QBBbKyo/xciQ
# IXaoMWULejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHs4CukgtCRUoAAAQAAAewwIgQgEmFw/DPRNjPvgOuKYf4wnhsPE0J5
# MBkt5oH1ehjHCBMwDQYJKoZIhvcNAQELBQAEggIAkBL7PzI5aH6sRMMpj78lP+/+
# 0qM9h7xYpHmVT+E3JZiewkuYZfkrh3342Op9MNoXYXqDcL8qzmDGj9ad4sRJ2m+C
# Sj2t3qRSjdwjhE+HPPjqhDeeXNyI1Ih8wk0bK3OIlRizyXx1OlBecy0IVJtOLlh8
# ylZ7fy2U8DvekCLroquN5y6BvnbeMOFonwji9Rf+76AQhsrvlHjQClRRDuTsd+bN
# ylunlpT70NFY+xgptaed6FI4Dkig67VNFvZRPhbDJKJoXinPrF6Zt4pRrMuubcMD
# AqIlFGSRuFL67+6J2ko910a0momC3l+mhnzhY6XEz3g7PC4gwqGI2HgkWyCzEKFz
# gBt3/J59ofGcw6CiuOgsaXfbe+pwf0wUqkwlBXQBeK9v/9pbA2TAOpVhgVy9T8ji
# YkEBLtYpscRA751Vg3F5Ok34TEv3Ixw+dWhyDVMIx6EErpYKsPaMYfeGAHlEsXXh
# Z8mj+f45bAyNWjmm0yhuQcxM5ytAR/kOZGsafX+CY6baSdaPmeATUJ7y9Hzlc1Fg
# 0qJlpH+tV3VlvUno0bsrjeXCsrLs84kixTzo1S7fWtAkm5wVy2LNp+nF5Ownwi8x
# xr83cQNWOlvgU6SS2ekzHo2p2OdDaVo9tiBSaAu0eKx6LINGbQQeJlYNqTylurBc
# 654J+EHdJx92VUjBOXg=
# SIG # End signature block
|
combined_dataset/train/non-malicious/Set-FileWriteable.ps1 | Set-FileWriteable.ps1 | function Set-FileWriteable {
#.Example
# $s = New-PSSession $ComputerName
# C:\\PS>$files = Invoke-Command $s { ls }
# ....
# C:\\PS>Set-FileWriteable $files
#
param(
[Parameter(Mandatory=$true,ValueFromPipeline=$true)]
$File
,
[switch]$Passthru
)
process {
foreach($path in @($file)) {
write-verbose "'$path' is on '$($path.PSComputerName)'"
if($path.PSComputerName) {
Invoke-Command $path.PSComputerName {
param([string[]]$path,[switch]$passthru)
$files = Get-Item $path
foreach($f in $files) {
if($f.Attributes -band [IO.FileAttributes]"ReadOnly") {
$f.Attributes = $f.Attributes -bxor [IO.FileAttributes]"ReadOnly"
}
}
write-output $files
} -Argument $path | Where { $Passthru }
} else {
$files = Get-Item $path
foreach($f in $files) {
if($f.Attributes -band [IO.FileAttributes]"ReadOnly") {
$f.Attributes = $f.Attributes -bxor [IO.FileAttributes]"ReadOnly"
}
}
if($Passthru) { write-output $files }
}
}
}
}
|
combined_dataset/train/non-malicious/2649.ps1 | 2649.ps1 |
param([parameter(Mandatory=$true)][string] $dir,
[parameter(Mandatory=$true)][string] $server)
Add-PSSnapin SqlServerCmdletSnapin100
Add-PSSnapin SqlServerProviderSnapin100
[System.Reflection.Assembly]::LoadWithPartialName('Microsoft.SqlServer.SMO') | out-null
[System.Reflection.Assembly]::LoadWithPartialName("Microsoft.SqlServer.SmoExtended") | Out-Null
$smosrv = new-object ('Microsoft.SqlServer.Management.Smo.Server') $server
$files = gci $dir | where {$_.name -like "*.bak"}
$output=([Environment]::GetFolderPath("MyDocuments")) + "\attachdbs.sql"
"/*****************************************" > $output
"Attach script based off of backup files" >> $output
"*****************************************/" >> $output
foreach($file in $files){
$rs=new-object("Microsoft.SqlServer.Management.Smo.Restore")
$rs.Devices.AddDevice($file.FullName, "File")
$hd=$rs.ReadBackupHeader($smosrv)
$dbname=$hd.Rows[0].DatabaseName
$dbfiles=$rs.ReadFileList($smosrv)
"CREATE DATABASE $dbname ON" >> $output
$filewrite=@()
foreach($dbfile in $dbfiles){
$filewrite+="(FILENAME='"+$dbfile.PhysicalName+"')"
}
$filewrite -join ",`n" >> $output
"FOR ATTACH; `n--------------------------" >> $output
}
|
combined_dataset/train/non-malicious/1616.ps1 | 1616.ps1 | function Get-ShaHash {
param (
[Parameter(ValueFromPipeline=$true)]
[string]$file,
[ValidateSet(1, 256, 384, 512)]
[int]$bit = 512
)
begin {
function Resolve-FullPath ([string]$Path) {
if ( -not ([IO.Path]::IsPathRooted($Path)) ) {
$Path = Join-Path $PWD $Path
}
[IO.Path]::GetFullPath($Path)
}
}
process {
$file = Resolve-FullPath $file
$sha = New-Object System.Security.Cryptography.SHA$bit`CryptoServiceProvider
$hash = [BitConverter]::ToString($sha.ComputeHash([IO.File]::ReadAllBytes([IO.FileInfo]$file)))
$hash
}
}
|
combined_dataset/train/non-malicious/sample_57_67.ps1 | sample_57_67.ps1 | #
# Module manifest for module 'OCI.PSModules.Rover'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Rover.dll'
# Version number of this module.
ModuleVersion = '85.2.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '6b3a22b9-6905-4ece-936d-982335059f13'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Rover Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.2.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Rover.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIRoverCluster', 'Get-OCIRoverClusterCertificate',
'Get-OCIRoverClusterRoverBundleRequestsList',
'Get-OCIRoverClustersList', 'Get-OCIRoverEntitlement',
'Get-OCIRoverEntitlementsList', 'Get-OCIRoverNode',
'Get-OCIRoverNodeCertificate', 'Get-OCIRoverNodeEncryptionKey',
'Get-OCIRoverNodeGetRpt', 'Get-OCIRoverNodeRoverBundleRequestsList',
'Get-OCIRoverNodesList', 'Get-OCIRoverShapesList',
'Get-OCIRoverWorkRequest', 'Get-OCIRoverWorkRequestErrorsList',
'Get-OCIRoverWorkRequestLogsList', 'Get-OCIRoverWorkRequestsList',
'Invoke-OCIRoverRequestAdditionalNodes',
'Invoke-OCIRoverRequestBundleRoverCluster',
'Invoke-OCIRoverRequestBundleRoverNode',
'Invoke-OCIRoverRetrieveAvailableBundleVersionsRoverCluster',
'Invoke-OCIRoverRetrieveAvailableBundleVersionsRoverNode',
'Invoke-OCIRoverRetrieveBundleStatusRoverCluster',
'Invoke-OCIRoverRetrieveBundleStatusRoverNode',
'Invoke-OCIRoverRoverNodeActionRetrieveCaBundle',
'Invoke-OCIRoverRoverNodeActionSetKey',
'Invoke-OCIRoverRoverNodeGenerateCertificate',
'Invoke-OCIRoverRoverNodeRenewCertificate',
'Invoke-OCIRoverRoverNodeReplaceCertificateAuthority',
'Invoke-OCIRoverRoverNodeRetrieveLeafCertificate',
'Move-OCIRoverClusterCompartment',
'Move-OCIRoverEntitlementCompartment',
'Move-OCIRoverNodeCompartment', 'New-OCIRoverCluster',
'New-OCIRoverEntitlement', 'New-OCIRoverNode',
'Remove-OCIRoverCluster', 'Remove-OCIRoverEntitlement',
'Remove-OCIRoverNode', 'Stop-OCIRoverWorkRequest',
'Update-OCIRoverCluster', 'Update-OCIRoverEntitlement',
'Update-OCIRoverNode'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Rover'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/3370.ps1 | 3370.ps1 |
param(
[Parameter(Mandatory = $false, Position = 0)]
[ValidateSet("Release", "Debug")]
[string] $BuildConfig,
[Parameter(Mandatory = $false, Position = 1)]
[ValidateSet("All", "Latest", "Stack", "NetCore", "ServiceManagement", "AzureStorage")]
[string] $Scope
)
function New-ModulePsm1 {
[CmdletBinding()]
param(
[string]$ModulePath,
[string]$TemplatePath,
[switch]$IsRMModule,
[switch]$IsNetcore
)
PROCESS {
$manifestDir = Get-Item -Path $ModulePath
$moduleName = $manifestDir.Name + ".psd1"
$manifestPath = Join-Path -Path $ModulePath -ChildPath $moduleName
$file = Get-Item $manifestPath
Import-LocalizedData -BindingVariable ModuleMetadata -BaseDirectory $file.DirectoryName -FileName $file.Name
if ($ModuleMetadata.RootModule) {
Write-Host "root modules exists, skipping..."
return
}
$templateOutputPath = $manifestPath -replace ".psd1", ".psm1"
[string]$importedModules
if ($ModuleMetadata.RequiredModules -ne $null) {
foreach ($mod in $ModuleMetadata.RequiredModules) {
if ($mod["ModuleVersion"]) {
$importedModules += New-MinimumVersionEntry -ModuleName $mod["ModuleName"] -MinimumVersion $mod["ModuleVersion"]
} elseif ($mod["RequiredVersion"]) {
$importedModules += "Import-Module " + $mod["ModuleName"] + " -RequiredVersion " + $mod["RequiredVersion"] + " -Global`r`n"
}
}
}
if ($ModuleMetadata.NestedModules -ne $null) {
foreach ($dll in $ModuleMetadata.NestedModules) {
$importedModules += "Import-Module (Join-Path -Path `$PSScriptRoot -ChildPath " + $dll.Substring(2) + ")`r`n"
}
}
$template = Get-Content -Path $TemplatePath
$template = $template -replace "%MODULE-NAME%", $file.BaseName
$template = $template -replace "%DATE%", [string](Get-Date)
$template = $template -replace "%IMPORTED-DEPENDENCIES%", $importedModules
if ($IsNetcore)
{
$template = $template -replace "%AZORAZURERM%", "AzureRM"
$template = $template -replace "%ISAZMODULE%", "`$true"
}
else
{
$template = $template -replace "%AZORAZURERM%", "`Az"
$template = $template -replace "%ISAZMODULE%", "`$false"
}
$contructedCommands = Find-DefaultResourceGroupCmdlets -IsRMModule:$IsRMModule -ModuleMetadata $ModuleMetadata -ModulePath $ModulePath
$template = $template -replace "%DEFAULTRGCOMMANDS%", $contructedCommands
Write-Host "Writing psm1 manifest to $templateOutputPath"
$template | Out-File -FilePath $templateOutputPath -Force
$file = Get-Item -Path $templateOutputPath
}
}
function Get-Cmdlets {
[CmdletBinding()]
param(
[Hashtable]$ModuleMetadata,
[string]$ModulePath
)
$nestedModules = $ModuleMetadata.NestedModules
$cmdlets = @()
foreach ($module in $nestedModules) {
$dllPath = Join-Path -Path $ModulePath -ChildPath $module
$Assembly = [Reflection.Assembly]::LoadFrom($dllPath)
$dllCmdlets = $Assembly.GetTypes() | Where-Object {$_.CustomAttributes.AttributeType.Name -contains "CmdletAttribute"}
$cmdlets += $dllCmdlets
}
return $cmdlets
}
function Find-DefaultResourceGroupCmdlets {
[CmdletBinding()]
param(
[Hashtable]$ModuleMetadata,
[string]$ModulePath,
[switch]$IsRMModule
)
PROCESS {
$contructedCommands = "@("
if ($IsRMModule) {
$AllCmdlets = Get-Cmdlets -ModuleMetadata $ModuleMetadata -ModulePath $ModulePath
$FilteredCommands = $AllCmdlets | Where-Object {Test-CmdletRequiredParameter -Cmdlet $_ -Parameter "ResourceGroupName"}
foreach ($command in $FilteredCommands) {
$contructedCommands += "'" + $command.GetCustomAttributes("System.Management.Automation.CmdletAttribute").VerbName + "-" + $command.GetCustomAttributes("System.Management.Automation.CmdletAttribute").NounName + ":ResourceGroupName" + "',"
}
$contructedCommands = $contructedCommands -replace ",$", ""
}
$contructedCommands += ")"
return $contructedCommands
}
}
function Test-CmdletRequiredParameter {
[CmdletBinding()]
param(
[Object]$Cmdlet,
[string]$Parameter
)
PROCESS {
$rgParameter = $Cmdlet.GetProperties() | Where-Object {$_.Name -eq $Parameter}
if ($rgParameter -ne $null) {
$parameterAttributes = $rgParameter.CustomAttributes | Where-Object {$_.AttributeType.Name -eq "ParameterAttribute"}
foreach ($attr in $parameterAttributes) {
$hasParameterSet = $attr.NamedArguments | Where-Object {$_.MemberName -eq "ParameterSetName"}
$MandatoryParam = $attr.NamedArguments | Where-Object {$_.MemberName -eq "Mandatory"}
if (($hasParameterSet -ne $null) -or (!$MandatoryParam.TypedValue.Value)) {
return $false
}
}
return $true
}
return $false
}
}
function New-MinimumVersionEntry {
[CmdletBinding()]
param(
[string]$ModuleName,
[string]$MinimumVersion
)
PROCESS {
return "`$module = Get-Module $ModuleName `
if (`$module -ne `$null -and `$module.Version.ToString().CompareTo(`"$MinimumVersion`") -lt 0) `
{ `
Write-Error `"This module requires $ModuleName version $MinimumVersion. An earlier version of $ModuleName is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information.`" -ErrorAction Stop `
} `
elseif (`$module -eq `$null) `
{ `
Import-Module $ModuleName -MinimumVersion $MinimumVersion -Scope Global `
}`r`n"
}
}
function Update-RMModule {
[CmdletBinding()]
param(
$Modules
)
$Ignore = @('AzureRM.Profile', 'Azure.Storage')
foreach ($module in $Modules) {
if ( -not ($module.Name -in $Ignore)) {
$modulePath = $module.FullName
Write-Host "Updating $module module from $modulePath"
New-ModulePsm1 -ModulePath $modulePath -TemplatePath $script:TemplateLocation -IsRMModule
Write-Host "Updated $module module`n"
}
}
}
function Update-Azure {
[CmdletBinding()]
param(
[ValidateNotNullOrEmpty()]
[String]$Scope,
[ValidateNotNullOrEmpty()]
[ValidateSet('Debug', 'Release')]
[String]$BuildConfig
)
if ($Scope -in $script:AzureRMScopes) {
Write-Host "Updating profile module"
New-ModulePsm1 -ModulePath "$script:AzureRMRoot\AzureRM.Profile" -TemplatePath $script:TemplateLocation -IsRMModule
Write-Host "Updated profile module"
Write-Host " "
}
if ($scope -in $script:StorageScopes) {
$modulePath = "$script:AzurePackages\$buildConfig\Storage\Azure.Storage"
Write-Host "Updating AzureStorage module from $modulePath"
New-ModulePsm1 -ModulePath $modulePath -TemplatePath $script:TemplateLocation -IsRMModule:$false
Write-Host " "
}
if ($scope -in $script:ServiceScopes) {
$modulePath = "$script:AzurePackages\$buildConfig\ServiceManagement\Azure"
Write-Host "Updating ServiceManagement(aka Azure) module from $modulePath"
New-ModulePsm1 -ModulePath $modulePath -TemplatePath $script:TemplateLocation
Write-Host " "
}
if ($Scope -in $script:AzureRMScopes) {
$resourceManagerModules = Get-ChildItem -Path $script:AzureRMRoot -Directory
Write-Host "Updating Azure modules"
Update-RMModule -Modules $resourceManagerModules
Write-Host " "
}
if ($Scope -in $script:AzureRMScopes) {
$modulePath = "$PSScriptRoot\AzureRM"
Write-Host "Updating AzureRM module from $modulePath"
New-ModulePsm1 -ModulePath $modulePath -TemplatePath $script:TemplateLocation
Write-Host " "
}
}
function Update-Stack {
[CmdletBinding()]
param(
[ValidateNotNullOrEmpty()]
[ValidateSet('Debug', 'Release')]
[String]$BuildConfig
)
Write-Host "Updating profile module for stack"
New-ModulePsm1 -ModulePath "$script:StackRMRoot\AzureRM.Profile" -TemplatePath $script:TemplateLocation -IsRMModule
Write-Host "Updated profile module"
Write-Host " "
$modulePath = "$script:StackPackages\$buildConfig\Storage\Azure.Storage"
Write-Host "Updating AzureStorage module from $modulePath"
New-ModulePsm1 -ModulePath $modulePath -TemplatePath $script:TemplateLocation -IsRMModule:$false
Write-Host " "
$StackRMModules = Get-ChildItem -Path $script:StackRMRoot -Directory
Write-Host "Updating stack modules"
Update-RMModule -Modules $StackRMModules
Write-Host " "
$modulePath = "$script:StackProjects\AzureRM"
Write-Host "Updating AzureRM module from $modulePath"
New-ModulePsm1 -ModulePath $modulePath -TemplatePath $script:TemplateLocation
Write-Host " "
$modulePath = "$script:StackProjects\AzureStack"
Write-Host "Updating AzureStack module from $modulePath"
New-ModulePsm1 -ModulePath $modulePath -TemplatePath $script:TemplateLocation
Write-Host " "
}
function Update-Netcore {
[CmdletBinding()]
param(
[ValidateNotNullOrEmpty()]
[ValidateSet('Debug', 'Release')]
[String]$BuildConfig
)
$AzureRMModules = Get-ChildItem -Path $script:AzureRMRoot -Directory
Write-Host "Updating Accounts module"
New-ModulePsm1 -ModulePath "$script:AzureRMRoot\Az.Accounts" -TemplatePath $script:TemplateLocation -IsRMModule -IsNetcore
Write-Host "Updated Accounts module"
$env:PSModulePath += "$([IO.Path]::PathSeparator)$script:AzureRMRoot\Az.Accounts";
foreach ($module in $AzureRMModules) {
if (($module.Name -ne "Az.Accounts")) {
$modulePath = $module.FullName
Write-Host "Updating $module module from $modulePath"
New-ModulePsm1 -ModulePath $modulePath -TemplatePath $script:TemplateLocation -IsRMModule -IsNetcore
Write-Host "Updated $module module"
}
}
$modulePath = "$PSScriptRoot\Az"
Write-Host "Updating Netcore module from $modulePath"
New-ModulePsm1 -ModulePath $modulePath -TemplatePath $script:TemplateLocation -IsNetcore
Write-Host "Updated Netcore module"
}
$script:TemplateLocation = "$PSScriptRoot\AzureRM.Example.psm1"
$script:NetCoreScopes = @('NetCore')
$script:AzureScopes = @('All', 'Latest', 'ServiceManagement', 'AzureStorage')
$script:StackScopes = @('All', 'Stack')
$script:AzureRMScopes = @('All', 'Latest')
$script:StorageScopes = @('All', 'Latest', 'AzureStorage')
$script:ServiceScopes = @('All', 'Latest', 'ServiceManagement')
$script:AzurePackages = "$PSScriptRoot\..\artifacts"
$script:StackPackages = "$PSScriptRoot\..\src\Stack"
$script:StackProjects = "$PSScriptRoot\..\src\StackAdmin"
$script:AzureRMRoot = "$script:AzurePackages\$buildConfig"
$script:StackRMRoot = "$script:StackPackages\$buildConfig"
Write-Host "Updating $Scope package (and its dependencies)"
if ($Scope -in $NetCoreScopes) {
Update-Netcore -BuildConfig $BuildConfig
}
if ($Scope -in $AzureScopes) {
Update-Azure -Scope $Scope -BuildConfig $BuildConfig
}
if ($Scope -in $StackScopes) {
Update-Stack -BuildConfig $BuildConfig
}
|
combined_dataset/train/non-malicious/2882.ps1 | 2882.ps1 | task default -depends Test
task Test -depends Compile, Clean -PreAction {"Pre-Test"} -Action {
"Test"
} -PostAction {"Post-Test"}
task Compile -depends Clean {
"Compile"
}
task Clean {
"Clean"
}
|
combined_dataset/train/non-malicious/sample_66_30.ps1 | sample_66_30.ps1 | <##############################################################
# #
# Copyright (C) Microsoft Corporation. All rights reserved. #
# #
##############################################################>
#
# Module manifest for module 'TestObservability'
#
@{
# Script module or binary module file associated with this manifest.
RootModule = '.\TestObservability.psm1'
# Version number of this module.
ModuleVersion = '1.2100.2671.410'
# ID used to uniquely identify this module
GUID = '0feb7cf1-76a5-460f-b12a-49e7c86d045f'
# Author of this module
Author = 'Microsoft Corporation'
# Company or vendor of this module
CompanyName = 'Microsoft Corporation'
# Copyright statement for this module
Copyright = '(c) Microsoft. All rights reserved.'
# Description of the functionality provided by this module
# Description = 'Azure Stack Support Service Operation cmdlets.'
# Minimum version of the Windows PowerShell engine required by this module
# PowerShellVersion = ''
# Name of the Windows PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the Windows PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module
# CLRVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
# RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = @("Test-Observability")
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = @()
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = @()
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
# Tags = @()
# A URL to the license for this module.
# LicenseUri = ''
# A URL to the main website for this project.
# ProjectUri = ''
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
# ReleaseNotes = ''
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAaSZ54vkpgnc1k
# pgkXSKD9wJNoYz8UtWW8wEeV94S50aCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJDeAXAjxgGBnxHPfzbYjK1I
# J250agm6sD9s+UVT1h7fMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEANDWFxvCWnV3Q0u+mPbbK8TXceCFuINpfz1k3JiI2Iy8F4OcgOZnreRK9
# kLZJgs0qCXgeKtRenuNgpxOhWh2QwbQDgPd2RvcsDziQX3wKfe8Aur9tungF++VR
# d4e7vHBLxcucnX7IA0eupKgwl8rFHQ2h336ppGjzLOS0pOXclZmQn1yb10uYxJ6w
# Q+75u7DduhuUEzfNCZZt2XzdTEgcvUjms7j63yWb222T0WNzMAyjySjz6IQF4qVG
# gP2d/bzkew2kdf8FvEyk9b5aDxbtiJdCX43JFEA4TO8QpC47TNhg2Q2pB7l4iIll
# 04S/gii29ZXGmtZdF7d6AkiyTcKDAqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCyyYEX4Gei1hx6QDtIFcxKWbo91+p9P9ngkRdOGxE0zQIGZjOrzATu
# GBMyMDI0MDUxNjE4NDUzMC4wODdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# Ojg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4NkRGLTRC
# QkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKhOA5RE6i53nHURH4lnfKLp
# +9JvipuTtctairCxMUSrPSy5CWK2DtriQP+T52HXbN2g7AktQ1pQZbTDGFzK6d03
# vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzIHHLaiAaobE5vFJuoxZ0ZWdKMCs8acjhH
# UmfaY+79/CR7uN+B4+xjJqwvdpU/mp0mAq3earyH+AKmv6lkrQN8zgrcbCgHwsqv
# vqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5EW6NVnXMYOTRKuGPfyfBKdShualLo88k
# G7qa2mbA5l77+X06JAesMkoyYr4/9CgDFjHUpcHSODujlFBKMi168zRdLerdpW0b
# BX9EDux2zBMMaEK8NyxawCEuAq7++7ktFAbl3hUKtuzYC1FUZuUl2Bq6U17S4CKs
# qR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5gpv+YcvBM834bXFNwytd3ujDD24P9Dd8
# xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSvtFVi5Sa/ubGuYEpS8gF6GDWN5/KbveFk
# dsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zljEjKz5WW7BA4wpmFm24fhBmRjV4Nbp+n7
# 8cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnSeOXePT6hMF0Il598LMu0rw35ViUWcAQk
# UNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUbqL1toyPUdpF
# yyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAC5U2bINLgXIHWbM
# cqVuf9jkUT/K8zyLBvu5h8JrqYR2z/eaO2yo1Ooc9Shyvxbe9GZDu7kkUzxSyJ1I
# ZksZZw6FDq6yZNT3PEjAEnREpRBL8S+mbXg+O4VLS0LSmb8XIZiLsaqZ0fDEcv3H
# eA+/y/qKnCQWkXghpaEMwGMQzRkhGwcGdXr1zGpQ7HTxvfu57xFxZX1MkKnWFENJ
# 6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+zvGJNAF+5/5qBk7nr079zICbFXvxtidN
# N5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+OdAquBiDkYQ5kVfUMKS31yHQOGgmFxuCO
# zTpWHalrqpdIllsy8KNsj5U9sONiWAd9PNlyEHHbQZDmi9/BNlOYyTt0YehLbDov
# mZUNazk79Od/A917mqCdTqrExwBGUPbMP+/vdYUqaJspupBnUtjOf/76DAhVy8e/
# e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM9Rm6hUDBBkvYh+YjmGdcQ5HB6WT9Rec8
# +qDHmbhLhX4Zdaard5/OXeLbgx2f7L4QQQj3KgqjqDOWInVhNE1gYtTWLHe4882d
# /k7Lui0K1g8EZrKD7maOrsJLKPKlegceJ9FCqY1sDUKUhRa0EHUW+ZkKLlohKrS7
# FwjdrINWkPBgbQznCjdE2m47QjTbMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo4
# NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUANiNHGWXbNaDPxnyiDbEOciSjFhCggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnwnfEwIhgPMjAyNDA1MTYyMzAwMDFaGA8yMDI0MDUxNzIzMDAwMVowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6fCd8QIBADAHAgEAAgIEnjAHAgEAAgIRbDAKAgUA
# 6fHvcQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAHnT0LxSY/nWLIhldpba
# s+/PI5nwSlUEjVz2T8+za4oOWpPvEXFZubjQpKV+rZcSz8dC3W9E3H0XfRCVX8Hc
# nAUMQOUovNoxn0wyleMRSJKOdzhZ4nvVCpnfUVS08zkwMS06Gcqv4txhUWFZ3zEQ
# 8KQKBIpbgaxeKYGCxMYijGxrMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHdXVcdldStqhsAAQAAAd0wDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgRsQ33/98UhdfxrN5yt4uUt2vM2FTIDf3s3ZzgV721RUwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCBh/w4tmmWsT3iZnHtH0Vk37UCN02lRxY+RiON6wDFj
# ZjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3V1X
# HZXUraobAAEAAAHdMCIEIGw/GMnaHgOLTlJ1AOPfbuCj5wPO8mWTx5OYG0qVMVp+
# MA0GCSqGSIb3DQEBCwUABIICAAh5YG8j54r304PhhpBx244kjgpo0KRMdfVJdK5v
# JX0gDxaiwNkT0vnUdPUeHQ0tJVPiNcHV848d8frs/XRdHEjLBxy4ulGysr18Za4P
# Uutq2WEhE1KQHzj7qKIi2jU1Bcm89ipMiqlce/5wDAh79Or2dm3C/3Cf+nvGk+nh
# KlikqFgR7E7k2PEC5SeW/V5KAsZrLt7EwEjqsCiS8gTtRwHrQyXl4SPijOKVQdRM
# CyqvsShuHtkdKbpHn7nxA0vUBgOY+6BZJkWCVhnSsCOFGTAPvmeTZSIhWLIJV7l7
# aMykaGrPlFNO7sZLp2yBtDHMjJPoe8PEXzgmC2kNqrwoHgC+AkAycxFa8hLj9DGG
# sVqBjYz3mYt8bzw20SyaAkiD8gpMJLePO5VhxLXyX4GVG1r81t5oZW7spXba6BMA
# VP5hOGS9uCDE+DcDzFpHGVeFeSipJNUfm3k5H/b8sicpKN3k6mM298bODen/DR/S
# /RMdQAXH8HETPqFx9bLNAqGd/f/v0ncFzYM1CqHM1CDttq4Q3Un2Yf/mT9RwsY2u
# BtlN+o6uZR8s9othOgyEAItl23swgaYThzAjCcMoJ2J3OrIHo3wSI0BfF0NkeV11
# 0No7S4e68OFl25nnoPqtWmDuEJfWchJEQtDLWirJguok99MI7aZNZtViNSVLnSlA
# 0/th
# SIG # End signature block
|
combined_dataset/train/non-malicious/DirToday Extended.ps1 | DirToday Extended.ps1 | ## NAME: Get-Dirty.ps1
## AUTHOR: Barry Morrison
## LASTEDIT: 07/05/2011 16:18:33
<#
.Synopsis
Get's files from today's date. Will also return narrowed results based on keyword
.Description
Get's files from today's date. Will also return narrowed results based on keyword
.Parameter Path
Will run in current directory. Path argument will allow you to define a path not in current working directory
.Parameter Keyword
Keyword argument will allow you to define a keyword to search on to narrow results.
.Example
PS C:\\scripts> .\\dirtoday.ps1
Directory: C:\\scripts
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a--- 7/5/2011 3:25 PM 114 cat
-a--- 7/5/2011 4:11 PM 2252 dirtoday.ps1
-a--- 7/5/2011 3:46 PM 848 dirtoday2.ps1
-a--- 7/5/2011 2:55 PM 110 info.txt
-a--- 7/5/2011 1:52 PM 37 test.foo
.Example
PS C:\\scripts> .\\dirtoday.ps1 -path "c:\\Users\\John Doe\\Pictures"
Directory: C:\\Users\\John Doe\\Pictures
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a--- 7/5/2011 11:05 AM 49888 weinerdog.jpg
.Example
PS C:\\scripts> .\\dirtoday.ps1 -keyword foo
cat:2:test.foo:1:blah, blah, foo, ice cream,
test.foo:1:blah, blah, foo, ice cream,
#>
param(
[string]$Path = "",
[string]$keyword = ""
)
## Checking to see if the Keyword argument is passed -- If it is, search for $keyword
if ($keyword) {
$files = dir -Path $path | Where-Object { $_.lastwritetime -ge (get-date).date } | Select-String $keyword
## If there are not results returned, tell me!
if (!$files) {
Write-Output "Nothing Here"
}else{
## If Results exist, give them to me!
$files
}
} else {
## If not keyword argument is passed, do a simple search
$files = dir -Path $path | Where-Object { $_.lastwritetime -ge (get-date).date }
## Like above, checking to see if no results are found for the query
if (!$files) {
## Tell me if nothing exists
Write-Output "Nothing Here"
}else{
## Write results if something exists
$files
}
}
|
combined_dataset/train/non-malicious/Get-ADGroupMembers_5.ps1 | Get-ADGroupMembers_5.ps1 | Function Get-ADGroupMembers
{
<#
.SYNOPSIS
Return a collection of users in an ActiveDirectory group.
.DESCRIPTION
This function returns an object that contains all the properties of a user object. This function
works for small groups as well as groups in excess of 1000.
.PARAMETER UserGroup
The name of the group to get membership from.
.PARAMETER UserDomain
The LDAP URL of the domain that the group resides in.
.EXAMPLE
Get-ADGroupMembers -UserGroup Managers |Format-Table -Property name, distinguishedName, cn
name distinguishedName cn
---- ----------------- --
{Steve Roberts} {CN=Steve Roberts,CN=Users,DC... {Steve Roberts}
{S-1-5-21-57989841-1078081533... {CN=S-1-5-21-57989841-1078081... {S-1-5-21-57989841-1078081533...
{S-1-5-21-57989841-1078081533... {CN=S-1-5-21-57989841-1078081... {S-1-5-21-57989841-1078081533...
{Matt Temple} {CN=Matt Temple,CN=Users,DC=c... {Matt Temple}
...
Description
-----------
This example shows passing in a group name, but leaving the default domain name in place.
.NOTES
The context under which this script is run must have rights to pull infromation from ActiveDirectory.
.LINK
http://scripts.patton-tech.com/wiki/PowerShell/ActiveDirectoryManagement#Get-ADGroupMembers
#>
Param
(
$UserGroup = "Domain Users",
[ADSI]$UserDomain = ("LDAP://DC=company,DC=com")
)
Begin
{
$DirectoryEntry = New-Object System.DirectoryServices.DirectoryEntry($UserDomain.Path)
$DirectorySearcher = New-Object System.DirectoryServices.DirectorySearcher
$LDAPFilter = "(&(objectCategory=Group)(name=$($UserGroup)))"
$DirectorySearcher.SearchRoot = $DirectoryEntry
$DirectorySearcher.PageSize = 1000
$DirectorySearcher.Filter = $LDAPFilter
$DirectorySearcher.SearchScope = "Subtree"
$SearchResult = $DirectorySearcher.FindAll()
$UserAccounts = @()
}
Process
{
foreach ($Item in $SearchResult)
{
$Group = $Item.GetDirectoryEntry()
$Members = $Group.member
If ($Members -ne $Null)
{
foreach ($User in $Members)
{
$UserObject = New-Object System.DirectoryServices.DirectoryEntry("LDAP://$($User)")
If ($UserObject.objectCategory.Value.Contains("Group"))
{
}
Else
{
$ThisUser = New-Object -TypeName PSObject -Property @{
cn = $UserObject.cn
distinguishedName = $UserObject.distinguishedName
name = $UserObject.name
nTSecurityDescriptor = $UserObject.nTSecurityDescriptor
objectCategory = $UserObject.objectCategory
objectClass = $UserObject.objectClass
objectGUID = $UserObject.objectGUID
objectSID = $UserObject.objectSID
showInAdvancedViewOnly = $UserObject.showInAdvancedViewOnly
}
}
$UserAccounts += $ThisUser
}
}
}
}
End
{
Return $UserAccounts
}
}
|
combined_dataset/train/non-malicious/sample_8_73.ps1 | sample_8_73.ps1 | ConvertFrom-StringData @'
id_wsftpsiexplorercrashcheck_st=Wsftpsi.dll version 12.3.0.1 was detected in this machine. This version is known to cause consistent Explorer crashes
'@
# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBFagCkZEke2ius
# mYVa5fK1FLY3vFZM7RIq+787XSUxHaCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKOP
# RZo4i4CHdSPOULSZz0qJ4TU7v02UQtgRsGPrdSgbMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAksGdyEdwyyBlTYaFfmkqkZ7W9nDyMmnjPd7P
# s/oxSNuaa8+vqPN2alzDRUEcMuatrOpV27qp9RAfsKPE+h6WBTDW8VjvjErDrrNN
# 9q6G+XRJtIYk0WFWMc9QM3+mzre8VqYAtLd/enw/Qp2GdnHGT01EQF9jREHiZ4DM
# s3yHtjbJTg/i3NoxPEYOe3+iFfcmiqmCWp+zg7q6BaOrXNOE0lFCgfoJECHVgr8D
# je+PCCRtCkWmRnHwvcQZUlYNaa0M57mKHKdrvm53wXkqX3WlnVybiRwn68YCjC8a
# VCZc/bE8X4IRZJs4Nv1CL/KWuu4Y7MCU8hWy7hdWgFQ7UAtlwqGCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCBPPuR8DRZU6V/fGhtMP0vC0sx1eb9naMDL
# AvVn9S7YaQIGZxqPzfD8GBMyMDI0MTAyODExNDA0My4xMTJaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046MzMwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAebZQp7qAPh94QAB
# AAAB5jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1MTVaFw0yNTAzMDUxODQ1MTVaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzMwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC9vph84tgluEzm/wpNKlAj
# cElGzflvKADZ1D+2d/ieYYEtF2HKMrKGFDOLpLWWG5DEyiKblYKrE2nt540OGu35
# Zx0gXJBE0zWanZEAjCjt4eGBi+uakZsk70zHTQHHyfP+B3m2BSSNFPhgsVIPp6vo
# /9t6OeNezIwX5E5+VwEG37nZgEexQF2fQZYbxQ1AauqDvRdXsSpK1dh1UBt9EaMs
# zuucaR5nMwQN6sDjG99FzdK9Atzbn4SmlsoLUtRAh/768sKd0Y1hMmKVHwIX8/4J
# uURUBRZ0JWu0NYQBp8khku18Q8CAQ500tFB7VH3pD8zoA4lcA7JkxTGoPKrufm+l
# RZAA4iMgbcLZ2P/xSdnKFxU8vL31RoNlZJiGL5MqTXvvyBLz+MRP4En9Nye1N8x/
# lJD1stdNo5wJG+mgXsE/zfzg2GaVqQczFHg0Nl8bpIqnNFUReQRq3C1jVYMCSceg
# NzHeYtw5OmZ/7eVnRmjXlCsLvdsxOzc1YVn6nZLkQD5y31HYrB9iIHuswhaMv2hJ
# NNjVndkpWy934PIZuWTMk360kjXPFwl2Wv1Tzm9tOrCq8+l408KIL6J+efoGNkR8
# YB3M+u1tYeVDO/TcObGHxaGFB6QZxAUpnfB5N/MmBNxMOqzG1N8QiwW8gtjjMJiF
# Bf6iYYrCjtRwF7IPdQLFtQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFOUEMXntN54+
# 11ZM+Qu7Q5rg3Fc9MB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBhbuogTapRsuwS
# kaFMQ6dyu8ZCYUpWQ8iIrbi40tU2hK6pHgu0hj0z/9zFRRx5DfhukjvbjA/dS5VY
# fxz1EIbPlt897MJ2sBGO2YLYwYelfJpDwbB0XS9Zkrqpzq6X/lmDQDn3G5vcYpYQ
# CJ55LLvyFlJ195AVo4Wy8UX5p7g9W3MgNHQMpM+EV64+cszj4Ho5aQmeKGtKy7w7
# 2eRY/vWDuptrvzruFNmKCIt12UcA5BOsXp1Ptkjx2yRsCj77DSml0zVYjqW/ISWk
# rGjyeVJ+khzctxaLkklVwCxigokD6fkWby0hCEKTOTPMzhugPIAcxcHsR2sx01YR
# a9pH2zvddsuBEfSFG6Cj0QSvEZ/M9mJ+h4miaQSR7AEbVGDbyRKkYn80S+3AmRlh
# 3ZOe+BFqJ57OXdeIDSHbvHzJ7oTqG896l3eUhPsZg69fNgxTxlvRNmRE/+61Yj7Z
# 1uB0XYQP60rsMLdTlVYEyZUl5MLTL5LvqFozZlS2Xoji4BEP6ddVTzmHJ4odOZMW
# TTeQ0IwnWG98vWv/roPegCr1G61FVrdXLE3AXIft4ZN4ZkDTnoAhPw7DZNPRlSW4
# TbVj/Lw0XvnLYNwMUA9ouY/wx9teTaJ8vTkbgYyaOYKFz6rNRXZ4af6e3IXwMCff
# CaspKUXC72YMu5W8L/zyTxsNUEgBbTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjMzMDMtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQDiWNBeFJ9jvaErN64D1G86eL0mu6CBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smrUDAi
# GA8yMDI0MTAyODA2MTg1NloYDzIwMjQxMDI5MDYxODU2WjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDqyatQAgEAMAcCAQACAiZmMAcCAQACAhORMAoCBQDqyvzQAgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAEBxNUvMJ0O0UDu8Og9sWf208vhS
# kFloumMW1RvgFdb92+THK6H4x3VJwAos7fSTrcyd3rBsbPaWsDzEE8lSpQZRl1tT
# +xqJ9FN0+DhU7VbhQzFplSEQLO3ZUNQUMNltvLzXqrbJuEfQiXerQxhkutzT4Ceh
# f10MosdYIq9nQ6IhxL20siq9Nudp03+xjjbZmZjrxvnqZQ1GXhucuPUTYDKdOdHa
# +dU71t77KkdCeO70ybxR1x1yXXr+kaA0X/o61KSn3G2WSmzdwnX2nOuuBi5Wptv9
# NmwZTYfI/s4Qh0GVxQ1vRelr66myMkPQ75xHUd8APnZdEG/h251KOccn5yUxggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAebZ
# Qp7qAPh94QABAAAB5jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCN7qTUk+8bab42WuH0FbL8VEWI
# tpnEWfpT2CVR+z/+ZzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM+7o4ao
# HrMJaG8gnLO1q16hIYcRnoy6FnOCbnSD0sZZMIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHm2UKe6gD4feEAAQAAAeYwIgQgTB6qQcMd
# P6fMqtySduFITAgYbREF90zOkmEDwIb58bEwDQYJKoZIhvcNAQELBQAEggIAtZ3E
# lWGgiqplln04nGghOCqD8+kl2Tfxo/hHSYU8LsuY1+TJzNbPWK2v64pRADxLPYKg
# lbFMkoq1vwTS7sJGyUeaGFcdieVyJ3OYlkaGr0i+9c52R3v7mTQ6OVhU04AbHTiI
# MWK4PmDlvLc4ZhO4dZ+yUFWEmQR6V2l6L8RWbflZIb2bkf+lckxLiAm2hu2oW10E
# JxK0xmhJGbRxXskUkooYvFzfUi/eGw4wFLlok6mE0edw5PJzeAv49muy4Yc5lIsd
# p7N5xy6KK5lscIL5GPfg/+x/EjknS4YAQXK+/vONCUgFrgnkPJVar9H7Kv9KvSFS
# FCj/DEnuyrMqQA8w9okfyPgGyP8vgU5VQnHfYtB8515SXq3DGuvOoA9Wl0yNgCgp
# kIAJJEQEW4oR6EBGD4Q7qFGLaLw1z6KH+QgZMRtzwi/JStCEzj9eJWglpiFfIRE4
# MMwqT+Z/HddDei0S4WI3cXTcvdOM3wgBe1m9z8kz6Fr4h6Vpx5Z8psrS5u3KxBI0
# AbLe575jjzSklUOJmKy3vukbnavN+mBQnVZNMYySlNJ6YOla9Y6Xjy0JBhRanyz3
# d+H6cPTWISHNpEKC12Evt/jxXy/IeS9av84p+AXR1bnoiGq+CxgmTzEIKKUSYG3w
# RaoS3Hq83ziGQcf8MCqf7fN2xiSHWuB+F82CWPg=
# SIG # End signature block
|
combined_dataset/train/non-malicious/get-kbinfo.ps1 | get-kbinfo.ps1 | # -==-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
# Author: Kris Cieslak (defaultset.blogspot.com)
# Date: 2010-05-26
# Description: Identifying knowledge base article by id number taken from
# string or filename.
#
# Parameters: filename / knowledge base number
#
# Requirements: Internet connection
#
# Usage example:
# ./get-kbinfo.ps1 KB926139
# or
# ./get-kbinfo.ps1 WindowsXP-KB926139-x86-ENU.exe
# or
# ls Windows* | % { ./get-kbinfo.ps1 $_.Name }
#
# -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=--=-=-=-=-=-=-=-=-=-=
PARAM ($filename = $(throw "Specifiy the file name"))
$page = New-Object System.Net.WebClient;
$kb = [regex]::match($filename,'KB\\d*|kb\\d*').ToString();
$p = $page.DownloadString('http://support.microsoft.com/kb/'+$kb)
$p = [regex]::replace( [regex]::match($p,'<h1 class="title">.*</h1>').ToString(), '<h1 class="title">|</h1>', '' )
write-host -Fore Yellow `n'[*] Filename: '$filename
write-host `n' '$p `n' ( http://support.microsoft.com/kb/'$kb' )'`n
|
combined_dataset/train/non-malicious/ServicePWChgReset.ps1 | ServicePWChgReset.ps1 | # ==============================================================================================
#
# NAME: ServicePWChgReset.ps1
#
# AUTHOR: Saehrig, Steven
# DATE : 8/26/2008
#
@@# COMMENT: Please read comments on each section!
# 1st - Search Domain computers for matching name and import into array.
# 2nd - Export matching hosts from array to text file. (comment out after text file created)
# 3rd - Create CSV file of all Matching Critera with full service detail. ( so you have record of modified
# services)
# 4th - Create text file of all matching services with limited info
# 5th - Change password on matching services
# 6th - Restart services if running if not running skip restart. (with console feedback)
#
# I would like to Thank Halr9000 and glnsize from powershellcomunity.org for there guidance during this
# script creation. I would not have been able to complete this without them and i would have been spending
# alot of time manually updating every service. Granted if they actually wrote this it would be much nicer :).
# But hey everyone has to start somewhere.
# ==============================================================================================
#discover Servers for Host.txt file
function func_Forest()
{
[System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest().Domains | ForEach-Object {
Get-QADComputer -Service $_.Name -SizeLimit 0 -ErrorAction SilentlyContinue `
| Add-Member -Name 'DomainName' -MemberType NoteProperty -Value $_.Name -PassThru
}
}
#initialize Array for Output
$Array = @()
#This should be run once to fill the host file then commented out.
#Fill Array
func_forest | where { $_.Name -like 'jxr*' } | Sort-Object -property "Name" |? { $array += $_.name}
$file = $array | Out-File -FilePath c:\\txt\\host.txt -Append
#Variables
$StartName = "username"
$csvlocation = "c:\\txt\\service.csv"
$txtlocation = "c:\\txt\\service.txt"
$computer = gc c:\\txt\\host.txt
$password = "password"
$service = gwmi -Class Win32_Service -namespace root\\CIMV2 -ComputerName $computer | Where-Object {$_.StartName -match $startname}
#exports discovered services for documentation of modified services
$service | Export-Csv $csvlocation
#Function Declarations
function exporttxt { #This function exports the services to a text file in limited data fields.
foreach ($i in $service) {
($i | FT systemname, Displayname, State, Startname, Status | Out-File -Append -FilePath $txtlocation )
}
}
function changepw { #This function will change the password to the variable assigned above.
foreach ($i in $service) {
(Write-Host -ForegroundColor "Yellow" "Changing password on" $i.SystemName "Service Name"$i.Name)
($i.Change($Null,$Null,$Null,$Null,$Null,$Null,$Null,$password))
(Write-Host -ForegroundColor "green" "Password Successfully Changed on" $i.SystemName "Service Name"$i.Name)
}
}
function restartsvc { #This function will restart the service for the new password to take effect.
$s = gwmi -Class Win32_Service -namespace root\\CIMV2 -ComputerName $computer | Where-Object {$_.StartName -match $startname}
foreach ($i in $s) {
if ($i.State -eq "running") {
Write-Host -ForegroundColor "Yellow" "Service name" $i.SystemName "Service name"$i.Name "is" $i.state
$i.StopService()
Sleep -Seconds 20 #allow time for service to stop.
$b = gwmi -Class Win32_Service -namespace root\\CIMV2 -ComputerName $computer | Where-Object {$_.StartName -match $startname}
Write-Host -ForegroundColor "RED" "Service name" $b.SystemName "Service name" $b.Name "is" $b.state
$i.StartService()
$c = gwmi -Class Win32_Service -namespace root\\CIMV2 -ComputerName $computer | Where-Object {$_.StartName -match $startname}
Write-Host -ForegroundColor "Green" "Server name" $c.SystemName "Service name" $c.Name "is" $c.state }
elseif ($i.State -eq "Stopped") {
Write-Host -ForegroundColor "RED" "Service name" $i.SystemName "Service name" $i.Name $i.state "Service will not be Started" }
}
}
#Execute
exporttxt
changepw | out-null
restartsvc | out-null
|
combined_dataset/train/non-malicious/sample_50_43.ps1 | sample_50_43.ps1 | #
# Module manifest for module 'PowerShellProTools'
#
# Generated by: Ironman Software, LLC
#
# Generated on: 1/17/2024
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'PowerShellProTools.psm1'
# Version number of this module.
ModuleVersion = '2023.12.0'
# Supported PSEditions
# CompatiblePSEditions = @()
# ID used to uniquely identify this module
GUID = '6a03dcee-a249-4b5d-a464-279e8d0d71e8'
# Author of this module
Author = 'Ironman Software, LLC'
# Company or vendor of this module
CompanyName = 'Unknown'
# Copyright statement for this module
Copyright = 'Ironman Software, LLC'
# Description of the functionality provided by this module
Description = 'PowerShell script packaging, profiling, WPF and Windows Forms design, and desktop automation.'
# Minimum version of the PowerShell engine required by this module
# PowerShellVersion = ''
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
# RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
NestedModules = @('PowerShellToolsPro.Cmdlets.dll')
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Merge-Script', 'Install-PoshProToolsLicense',
'Get-PoshProToolsLicense', 'Measure-Block', 'Measure-Script',
'Show-WinFormDesigner', 'ConvertTo-WinForm', 'Show-PSScriptPad',
'Set-Hotkey', 'Get-Hotkey', 'Remove-Hotkey'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = 'pad'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
# Tags = @()
# A URL to the license for this module.
# LicenseUri = ''
# A URL to the main website for this project.
# ProjectUri = ''
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
ReleaseNotes = 'https://docs.poshtools.com/powershell-pro-tools-module'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_14_40.ps1 | sample_14_40.ps1 | #************************************************
# TS_HPZ12ServiceCheck.ps1
# Version 1.0
# Date: 1-11-2011
# Author: v-anecho
# Description: Checks if 'Net Driver HPZ12' or 'Pml Driver HPZ12' is one of the installed services and startup type is something different than Disabled
#************************************************
Import-LocalizedData -BindingVariable ScriptStrings
Write-DiagProgress -Activity $ScriptStrings.ID_HPZ12ServiceCheck -Status $ScriptStrings.ID_HPZ12ServiceCheckDesc
$RootCauseDetected = $false
$RootCauseName = "RC_HPZ12ServiceCheck"
#Rule ID 1970
#-----------
# http://sharepoint/sites/rules/Rule%20Submissions/Windows_digvijan_2011-11-23T00_14_06.xml
#
#Description
#-----------
# Check if 'Net Driver HPZ12' or 'Pml Driver HPZ12' is one of theinstalled services and startup type is something different than Disabled
#
#Related KB
#----------
# 2546364
#
#Script Author
#-------------
# anecho
#********************
#Data gathering
#********************
$InformationCollected = new-object PSObject
$HasIssue = $false
Function isNetPmlRunnig
{
$currentServices = Get-Service # grabs all services to prevent pulling running services multiple times
$NetDriver = $currentServices | Where-Object {($_.displayname -eq "Net Driver HPZ12") -and ($_.status -ne "Stopped")}
$PmlDriver = $currentServices | Where-Object {$_.displayname -eq "Pml Driver HPZ12" -and ($_.status -ne "Stopped")}
if(($NetDriver) -and ($PmlDriver)) #returns number to identify which process is running
{
return 3
}
elseif($NetDriver)
{
return 1
}
elseif($PmlDriver)
{
return 2
}
else
{
return 0
}
}
#********************
#Detection Logic
#********************
$isNetPml = isNetPmlRunnig
if ($isNetPml -gt 0)
{
$HasIssue = $true
}
#********************
#Alert Evaluation
#********************
if($HasIssue)
{
$runningServices = ""
switch ($isNetPml)
{
1{$runningServices = "Net Driver HPZ12"}
2{$runningServices = "Pml Driver HPZ12"}
3{$runningServices = "Net Driver HPZ12, Pml Driver HPZ12"}
}
add-member -inputobject $InformationCollected -membertype noteproperty -name "Service(s) Running" -value $runningServices
Update-DiagRootCause -id $RootCauseName -Detected $true
Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL "https://vkbexternal.partners.extranet.microsoft.com/VKBWebService/ViewContent.aspx?scid=B;EN-US;2546364" -Verbosity "Error" -InformationCollected $InformationCollected -Visibility 2 -SupportTopicsID 8066
}
else
{
Update-DiagRootCause -id $RootCauseName -Detected $false
}
# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDaTypf795A48Ct
# O16St+rnH28ZWd2ITdpcYxGC0SkpV6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKCz
# FrWw81mURdtlfbm+R5ANkfDbIXLhJScmcfcilmtWMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAg2ERqVqoACZrPLf64JvCKvFOE0RvRsDuU35G
# n6YMBE/kEmnk8gZpQofAIYMSf+oSEN6R84d20ZOWVdzmR3nF2Kx7TShOyipWPaS+
# 33fZEyHeH3tDu97FTu2Dxp8+O0GcC9Y2S2dqt3b1y084XaxUMLab7psR9MCFsET8
# JAEDfldQpeFhTV1C1Gi5BIW0K5I7bNOw5Sm6ZyNrtgsrtiVQB6miqIKcf2fRKtf9
# J7g7RFoTtUJJcSJjd3BZ8unvSBPij/tZZDH7xIJSZOEUZlnTvVtG+yPSzy2PFBya
# GtpQq7rIPTfk6OOVNFwcffCKG4YqwPr4iA9BFGnc50HNDuO886GCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCBVXvfKct9XIeCNYNQInL23hujGLZbGMZzc
# g2NdsRl7JwIGZxpym1wXGBMyMDI0MTAyODExNDA0My4wMzFaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAAB
# AAAB7DANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1MzhaFw0yNTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22
# uwdEZm0IoAFs6oIr39VK/ItP80cn+8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKR
# SOwrRNxVIKoPPeUF3f4VyHEco/u1QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7
# S3MCi2bk2nvtGKdeAIL+H77gL4r01TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWX
# t4zxvdIGcPjS4ZKyQEF3SEZAq4XIjiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAi
# nb0o+uQ9KtaKNLVVcNf5QpS4f6/MsXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQ
# HrWkfPzZp/X+bt9C7E5hPP6HVRoqBYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0H
# dOv6KWa+sAmJG7PDvTZae77homzx6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDH
# EzGsQnMUQKstS3zjn6SU0NLEFNCetluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wC
# bwe9SCJIoqtBexBrPyQYA2Xaz1fK9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgR
# o/bs/Xu8gua8LDe6KWyu974e9mGW7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgM
# GJj73CQvr+jqoWwx6XdyeQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1
# whYQsV8UgEf4TIWGMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDP
# ag8ARb0OFrAQtSLMDpN0UY3FjvPhwGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbF
# Tr+IAnDSeg8TB9zfG/4ybknuopklbeGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO
# 1n5xrrLOL8m0nmv5kBcv+y1AXJ5QcLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhB
# Ntu57wPKXZ1EoNToBk8bA6839w119b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJV
# vfIhm4Ap8zptC7xVAly0jeOv5dUGMCYgZjvoTmgd45bqAwundmPlGur7eleWYedL
# Qf7s3L5+qfaY/xEh/9uo17SnM/gHVSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe7
# 6iYtL+mhxXPEpzda3bJlhPTOQ3KOEZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd0
# 71bemnou8A3rUZrdgKIautsH7SHOiOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla
# 7Xad9qrTYdT45VlCYTtBSY4oVRsedSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQ
# CTVMXaDc25DTLcMGJrRua3K0xivdtnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJ
# FeW7r29XX+k0e4DnG6iBHKQjec6VNzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQCOHPtgVdz9EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smOGTAi
# GA8yMDI0MTAyODA0MTQxN1oYDzIwMjQxMDI5MDQxNDE3WjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDqyY4ZAgEAMAcCAQACAhoOMAcCAQACAhQzMAoCBQDqyt+ZAgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAILIYM82Dr6OQATDiRWNUyg2wRlm
# EUSqsB1JFEW74Yh1oAnUZKTsyjkj69LBZadyOOGYRONFXVrLg2UzYpOybudC6apW
# F7OLJj+IzfERluG9wFcnKZ9nQJX9wRpYQTjI+HOGDzbNDtv/AZsljeI3E8vdDX2J
# A5g0hP9oaR70WD/wOq0PR+x3mN5f1zd+9DKLNdoZln/PAUaAifsQHFa1V2SlrA1v
# NThkBK0cQg8uhyBgCm7AsGaKUPGTfqjRwamualhSXVVcTqzB0lgWaEJSYXahgaHS
# lmMTGuAFMVHbFFtVtBr3X8aXaLyVh40TpbLQLBYIg/b1tbXcNuF8uOw+/uIxggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezg
# K6SC0JFSgAABAAAB7DANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCBbvxIdC/+32Pqdc4zIu6pFE2Hv
# Utkn76raPWgKs7aRjTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVq
# fTfIhx21QBBbKyo/xciQIXaoMWULejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHs4CukgtCRUoAAAQAAAewwIgQgsLR3G5Tm
# SmMHedwiqAcbeNSpfnbye1U8J5bYVqFB6MwwDQYJKoZIhvcNAQELBQAEggIAnaHa
# s1QDrNzGMuHG4KXSeUDUxx9wnpe2pGIe0AOZgodBVv/tln0sdxuE/ktliSo1xHHM
# nmlMNsg7MgLcCNhZEVvpSexGYk8q2pqFEi+/hcMu1mDwCh2vyNg2pc5QeZ3+RXLr
# yogicIfk7CRiI9qK5rp1fWm9tVP+88d0bdG6eEf4r5N5kimMTIKTuUe7Lhi+sLF+
# TLn3FB7ZzOJCBMC1O6+PVUDK1amskIYxzbvk6LerRjdT193nRZ5ToW2oHrXQ9FTA
# BNZECwXp9uJXgs1OPdF04Aa56pr3viTqOid/05beTL5JxBKGVYM3Y7gxiemMdYcz
# NToIvzhoP1BPVTe2nqtLQQ0FV18AVG0tpJVp0gyFwnMeXHdgbsCL16MoCHMBhx9I
# FXtGLxgH6lIQ6r1sisOkF5gyQhyOALYGiZXkNcB2XQc7sPT/lsTzYJpLdnMwYBqp
# Jjsjo0+2ALs+We5A5FC/1+VYVio81PatLCg+dBmAGH4klmrmo5wB19EIlXBkrMBN
# 9HNnjzG5UHGBqU2xolHDRpEE0KYzNFTzrwSn5wF6tyoadbzSIsqQB27SXkhyfHtO
# Q5KjwpR+K3qoa8/AYUWvzy+ZG1FT5yQKjBKexzGyEfwiD80g/Jq0rQr9eEugIUDD
# 7JjePqkzxdFX8fCp2PiQTPfpCvYfNvPNJ0uo2io=
# SIG # End signature block
|
combined_dataset/train/non-malicious/3810.ps1 | 3810.ps1 |
function Test-VirtualMachineGetRunCommand
{
$loc = Get-ComputeVMLocation;
$loc = $loc.Replace(" ", "")
$commandId = "RunPowerShellScript"
$result = Get-AzVMRunCommandDocument -Location $loc -CommandId $commandId
Assert-AreEqual $commandId $result.Id
Assert-AreEqual "Windows" $result.OsType
$result_output = $result | Out-String
$result = Get-AzVMRunCommandDocument -Location $loc
Assert-True {$result.Count -gt 0}
$result_output = $result | Out-String
}
function Test-VirtualMachineSetRunCommand
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-ComputeVMLocation;
$loc = $loc.Replace(" ", "")
New-AzResourceGroup -Name $rgname -Location $loc -Force;
$vmsize = 'Standard_A4';
$vmname = 'vm' + $rgname;
$subnet = New-AzVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$pubip = New-AzPublicIpAddress -Force -Name ('pubip' + $rgname) -ResourceGroupName $rgname -Location $loc -AllocationMethod Dynamic -DomainNameLabel ('pubip' + $rgname);
$pubip = Get-AzPublicIpAddress -Name ('pubip' + $rgname) -ResourceGroupName $rgname;
$pubipId = $pubip.Id;
$nic = New-AzNetworkInterface -Force -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc -SubnetId $subnetId -PublicIpAddressId $pubip.Id;
$nic = Get-AzNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname;
$nicId = $nic.Id;
$stoname = 'sto' + $rgname;
$stotype = 'Standard_GRS';
New-AzStorageAccount -ResourceGroupName $rgname -Name $stoname -Location $loc -Type $stotype;
$stoaccount = Get-AzStorageAccount -ResourceGroupName $rgname -Name $stoname;
$osDiskName = 'osDisk';
$osDiskCaching = 'ReadWrite';
$osDiskVhdUri = "https://$stoname.blob.core.windows.net/test/os.vhd";
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$computerName = 'test';
$vhdContainer = "https://$stoname.blob.core.windows.net/test";
$p = New-AzVMConfig -VMName $vmname -VMSize $vmsize `
| Add-AzVMNetworkInterface -Id $nicId -Primary `
| Set-AzVMOSDisk -Name $osDiskName -VhdUri $osDiskVhdUri -Caching $osDiskCaching -CreateOption FromImage `
| Set-AzVMOperatingSystem -Windows -ComputerName $computerName -Credential $cred;
$imgRef = Get-DefaultCRPImage -loc $loc;
$imgRef | Set-AzVMSourceImage -VM $p | New-AzVM -ResourceGroupName $rgname -Location $loc;
$vm1 = Get-AzVM -Name $vmname -ResourceGroupName $rgname;
$vm = Get-AzVM -ResourceGroupName $rgname
$commandId = "RunPowerShellScript"
$param = @{"first" = "var1";"second" = "var2"};
$path = 'ScenarioTests\test.ps1';
$job = Invoke-AzVMRunCommand -ResourceGroupName $rgname -Name $vmname -CommandId $commandId -ScriptPath $path -Parameter $param -AsJob;
$result = $job | Wait-Job;
Assert-AreEqual "Completed" $result.State;
$st = $job | Receive-Job;
Assert-NotNull $st.Value;
$vm = Get-AzVM -ResourceGroupName $rgname -Name $vmname;
$result = Invoke-AzVMRunCommand -ResourceId $vm.Id -CommandId $commandId -ScriptPath $path -Parameter $param;
Assert-NotNull $result.Value;
$result = Get-AzVM -ResourceGroupName $rgname -Name $vmname | Invoke-AzVMRunCommand -CommandId $commandId -ScriptPath $path -Parameter $param;
Assert-NotNull $result.Value;
$vm = Get-AzVM -ResourceGroupName $rgname -Name $vmname;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-VirtualMachineScaleSetVMRunCommand
{
$rgname = Get-ComputeTestResourceName
try
{
$loc = Get-Location "Microsoft.Compute" "virtualMachines";
New-AzResourceGroup -Name $rgname -Location $loc -Force;
$subnet = New-AzVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix "10.0.0.0/24";
$vnet = New-AzVirtualNetwork -Force -Name ('vnet' + $rgname) -ResourceGroupName $rgname -Location $loc -AddressPrefix "10.0.0.0/16" -Subnet $subnet;
$vnet = Get-AzVirtualNetwork -Name ('vnet' + $rgname) -ResourceGroupName $rgname;
$subnetId = $vnet.Subnets[0].Id;
$vmssName = 'vmss' + $rgname;
$adminUsername = 'Foo12';
$adminPassword = Get-PasswordForVM;
$imgRef = Get-DefaultCRPImage -loc $loc;
$ipCfg = New-AzVmssIPConfig -Name 'test' -SubnetId $subnetId;
$vmss = New-AzVmssConfig -Location $loc -SkuCapacity 2 -SkuName 'Standard_A0' -UpgradePolicyMode 'Automatic' `
| Add-AzVmssNetworkInterfaceConfiguration -Name 'test' -Primary $true -IPConfiguration $ipCfg `
| Set-AzVmssOSProfile -ComputerNamePrefix 'test' -AdminUsername $adminUsername -AdminPassword $adminPassword `
| Set-AzVmssStorageProfile -OsDiskCreateOption 'FromImage' -OsDiskCaching 'None' `
-ImageReferenceOffer $imgRef.Offer -ImageReferenceSku $imgRef.Skus -ImageReferenceVersion $imgRef.Version `
-ImageReferencePublisher $imgRef.PublisherName;
$result = New-AzVmss -ResourceGroupName $rgname -Name $vmssName -VirtualMachineScaleSet $vmss;
$vmssVMs = Get-AzVmssVM -ResourceGroupName $rgname -VMScaleSetName $vmssName;
$vmssId = $vmssVMs[0].InstanceId;
$commandId = "RunPowerShellScript"
$param = @{"first" = "var1";"second" = "var2"};
$path = 'ScenarioTests\test.ps1';
$job = Invoke-AzVmssVMRunCommand -ResourceGroupName $rgname -Name $vmssName -InstanceId $vmssId -CommandId $commandId -ScriptPath $path -Parameter $param -AsJob;
$result = $job | Wait-Job;
Assert-AreEqual "Completed" $result.State;
$st = $job | Receive-Job;
Assert-NotNull $st.Value;
$vmssVM = Get-AzVmssVM -ResourceGroupName $rgname -Name $vmssName -InstanceId $vmssId;
$result = Invoke-AzVmssVMRunCommand -ResourceId $vmssVM.Id -CommandId $commandId -ScriptPath $path -Parameter $param;
Assert-NotNull $result.Value;
$result = Get-AzVmssVM -ResourceGroupName $rgname -Name $vmssName -InstanceId $vmssId | Invoke-AzVmssVMRunCommand -CommandId $commandId -ScriptPath $path -Parameter $param;
Assert-NotNull $result.Value;
$vmssVM = Get-AzVmssVM -ResourceGroupName $rgname -Name $vmssName -InstanceId $vmssId;
}
finally
{
Clean-ResourceGroup $rgname;
}
}
|
combined_dataset/train/non-malicious/776.ps1 | 776.ps1 | param([switch]$Serve, [switch]$Clean, [switch]$Publish)
$toolsPath = [System.IO.Path]::GetFullPath("$PSScriptRoot\..\tools")
$docfxZipPath = [System.IO.Path]::GetFullPath("$toolsPath\docfx.zip")
$docfxBinPath = [System.IO.Path]::GetFullPath("$toolsPath\docfx\")
$docfxExePath = [System.IO.Path]::GetFullPath("$docfxBinPath\docfx.exe")
$docfxJsonPath = [System.IO.Path]::GetFullPath("$PSScriptRoot\..\docs\docfx.json")
$sitePath = [System.IO.Path]::GetFullPath("$PSScriptRoot\..\docs\_site")
$docsRepoPath = [System.IO.Path]::GetFullPath("$PSScriptRoot\..\docs\_repo")
mkdir $toolsPath -Force | Out-Null
if (![System.IO.File]::Exists($docfxExePath)) {
Remove-Item -Path "$docfxBinPath" -Force -ErrorAction Stop | Out-Null
(new-object net.webclient).DownloadFile('https://github.com/dotnet/docfx/releases/download/v1.8/docfx.zip', "$docfxZipPath")
Expand-Archive $docfxZipPath -DestinationPath $docfxBinPath -Force -ErrorAction "Stop"
}
if ($Clean.IsPresent) {
Remove-Item -Path $sitePath -Force -Recurse | Out-Null
}
& $docfxExePath metadata $docfxJsonPath
if ($Serve.IsPresent) {
& $docfxExePath build $docfxJsonPath --serve
}
else {
& $docfxExePath build $docfxJsonPath
if ($Publish.IsPresent) {
if (Test-Path $docsRepoPath) {
Remove-Item -Path $docsRepoPath -Recurse -Force -ErrorAction Stop | Out-Null
}
git clone -b gh-pages https://github.com/PowerShell/PowerShellEditorServices.git $docsRepoPath
Write-Host -ForegroundColor Green "*** Copying documentation site files ***"
Copy-Item -Recurse -Force $sitePath\* $docsRepoPath
Write-Host -ForegroundColor Green "*** Committing changes ***"
Push-Location $docsRepoPath
git add -A
git commit -m "Updated documentation site"
$response =
$host.ui.PromptForChoice(
"Ready to push?",
"Are you ready to push the doc site changes?",
[System.Management.Automation.Host.ChoiceDescription[]](
(New-Object System.Management.Automation.Host.ChoiceDescription "&Yes","Yes"),
(New-Object System.Management.Automation.Host.ChoiceDescription "&No","No")
),
1);
if ($response -eq 0) {
Write-Host -ForegroundColor Green "*** Pushing changes ***"
git push origin gh-pages
}
else {
Write-Output "Did not push changes. Run 'git push origin gh-pages' manually when ready."
}
}
}
|
combined_dataset/train/non-malicious/sample_35_20.ps1 | sample_35_20.ps1 | # Copyright (C) 2024 Alejandro Santoyo <alejandro.santoyo@canonical.com>
#
# This file is part of the sos project: https://github.com/sosreport/sos
#
# This copyrighted material is made available to anyone wishing to use,
# modify, copy, or redistribute it subject to the terms and conditions of
# version 2 of the GNU General Public License.
#
# See the LICENSE file in the source distribution for further information.
from sos.report.plugins import Plugin, IndependentPlugin
class InfinidatStorage(Plugin, IndependentPlugin):
short_desc = 'Infinidat Storage plugin'
plugin_name = 'infinidat'
profiles = ('storage',)
packages = ('host-power-tools',)
def setup(self):
# Get infinidat logs
if not self.get_option("all_logs"):
self.add_copy_spec([
"/var/log/infinihost.latest*.log",
"/var/log/infinihost.usage*.log",
])
else:
self.add_copy_spec([
"/var/log/infinihost*.log",
"/var/log/buildout.*.log",
])
# Get info from the infinidat boxes, etc.
self.add_cmd_output([
"infinihost volume list",
"infinihost connectivity list",
"infinihost system list",
"infinihost pool list",
"infinihost snapshot list",
"infinihost --version"
])
# vim: set et ts=4 sw=4 :
|
combined_dataset/train/non-malicious/chkhash_30.ps1 | chkhash_30.ps1 | # calculate SHA512 of file.
function Get-SHA512([System.IO.FileInfo] $file = $(throw 'Usage: Get-MD5 [System.IO.FileInfo]'))
{
$stream = $null;
$cryptoServiceProvider = [System.Security.Cryptography.SHA512CryptoServiceProvider];
$hashAlgorithm = new-object $cryptoServiceProvider
$stream = $file.OpenRead();
$hashByteArray = $hashAlgorithm.ComputeHash($stream);
$stream.Close();
## We have to be sure that we close the file stream if any exceptions are thrown.
trap
{
if ($stream -ne $null)
{
$stream.Close();
}
break;
}
foreach ($byte in $hashByteArray) { if ($byte -lt 16) {$result += “0{0:X}” -f $byte } else { $result += “{0:X}” -f $byte }}
return [string]$result;
}
function noequal ( $first, $second)
{
if (!($second) -or $second -eq "") {return $true}
$first=join-path $first "\\"
foreach($s in $second)
{
if ($first.tolower().startswith($s.tolower())) {return $false}
}
return $true
}
function WriteFileName ( [string]$writestr ) # this function prints multiline messages on top of each other, good for iterating through filenames without filling
{ # the console with a huge wall of text. Call this function to print each of the filename messages, then call WriteFileNameEnd when done
# before printing anything else, so that you are not printing into a long file name with extra characters from it visible.
if ($Host.Name -match 'ise')
{ write-host $writestr; return }
if ($global:lastlen -eq $null) {$global:lastlen=0}
$ctop=[console]::cursortop
[console]::cursorleft=0
$oldwritestrlen=$writestr.length
$spaces = ""
if ($global:lastlen -gt $writestr.length)
{
$spaces = " " * ($global:lastlen-$writestr.length)
}
$writelines = [math]::divrem($writestr.length, [console]::bufferwidth, [ref]$null)
$cwe = ($writelines-([console]::bufferheight-$ctop))+1 # calculate where text has scroll back to.
if ($cwe -gt 0) {$ctop-=($cwe)}
write-host "$writestr" -nonewline
$global:oldctop=[console]::cursortop
if ([console]::cursorleft -ne 0) {$global:oldctop+=1}
write-host "$spaces" -nonewline
$global:lastlen = $oldwritestrlen
[console]::cursortop=$ctop
[console]::cursorleft=0
}
function WriteFileNameEnd ( ) # call this function when you are done overwriting messages on top of each other
{ # and before printing something else
if ($Host.Name -match 'ise')
{ return }
if ($global:oldctop -ne $null)
{
[console]::cursortop=$global:oldctop
[console]::cursorleft=0
}
$global:oldctop=$null
$global:lastlen=$null
}
# chkhash.ps1 [file(s)/dir #1] [file(s)/dir #2] ... [file(s)/dir #3] [-u] [-h [path of .xml database]]
# -u updates the XML file database and exits
# otherwise, all files are checked against the XML file database.
# -h specifies location of xml hash database
$hashespath=".\\hashes.xml"
del variable:\\args3 -ea 0
del variable:\\args2 -ea 0
del variable:\\xfiles -ea 0
del variable:\\files -ea 0
del variable:\\exclude -ea 0
$args3=@()
$args2=@($args)
$nu = 0
$errs = 0
$fc = 0
$fm = 0
$upd = $false
$create = $false
$n = $null
"ChkHash.ps1 - ChkHash.ps1 can create a .XML database of files and their SHA-512 hashes and check files against the database, "
"in order to detect corrupt or hacked files."
""
".\\chkhash.ps1 -h for usage."
""
for($i=0;$i -lt $args2.count; $i++)
{
if ($args2[$i] -like "-h*") # -help specified?
{
"Usage: .\\chkhash.ps1 [-h] [-u] [-c] [-x <file path of hashes .xml database>] [file(s)/dir #1] [file(s)/dir #2] ... [file(s)/dir #n] [-e <Dirs>]"
"Options: -h - Help display."
" -c - Create hash database. If .xml hash database does not exist, -c will be assumed."
" -u - Update changed files and add new files to existing database."
" -x - specifies .xml database file path to use. Default is .\\hashes.xml"
" -e - exclude dirs. Put this after the files/dirs you want to check with SHA512 and needs to be fullpath (e.g. c:\\users\\bob not ..\\bob)."
""
"Examples: PS>.\\chkhash.ps1 c:\\ d:\\ -c -x c:\\users\\bob\\hashes\\hashes.xml"
" [hash all files on c:\\ and d:\\ and subdirs, create and store hashes in c:\\users\\bob\\hashes\\hashes.xml]"
" PS>.\\chkhash.ps1 c:\\users\\alice\\pictures\\sunset.jpg -u -x c:\\users\\alice\\hashes\\pictureshashes.xml]"
" [hash c:\\users\\alice\\pictures\\sunset.jpg and add or update the hash to c:\\users\\alice\\hashes\\picturehashes.xml"
" PS>.\\chkhash.ps1 c:\\users\\eve\\documents d:\\media\\movies -x c:\\users\\eve\\hashes\\private.xml"
" [hash all files in c:\\users\\eve\\documents and d:\\media\\movies, check against hashes stored in c:\\users\\eve\\hashes\\private.xml"
" or create it and store hashes there if not present]"
" PS>.\\chkhash.ps1 c:\\users\\eve -x c:\\users\\eve\\hashes\\private.xml -e c:\\users\\eve\\hashes"
" [hash all files in c:\\users\\eve and subdirs, check hashes against c:\\users\\eve\\hashes\\private.xml or store if not present, exclude "
" c:\\users\\eve\\hashes directory and subdirs]"
" PS>.\\chkhash.p1s c:\\users\\ted\\documents\\f* d:\\data -x d:\\hashes.xml -e d:\\data\\test d:\\data\\favorites -u"
" [hash all files starting with 'f' in c:\\users\\ted\\documents, and all files in d:\\data, add or update hashes to"
" existing d:\\hashes.xml, exclude d:\\data\\test and d:\\data\\favorites and subdirs]"
" PS>.\\chkhash -x c:\\users\\alice\\hashes\\hashes.xml"
" [Load hashes.xml and check hashes of all files contained within.]"
""
"Note: files in subdirectories of any specified directory are automatically processed."
" if you specify only an -x option, or no option and .\\hash.xml exists, only files in the database will be checked."
exit
}
if ($args2[$i] -like "-u*") {$upd=$true;continue} # Update and Add new files to database?
if ($args2[$i] -like "-c*") {$create=$true;continue} # Create database specified?
if ($args2[$i] -like "-x*")
{
$i++ # Get hashes xml database path
if ($i -ge $args2.count)
{
write-host "-X specified but no file path of .xml database specified. Exiting."
exit
}
$hashespath=$args2[$i]
continue
}
if ($args2[$i] -like "-e*") # Exclude files, dirs
{
while (($i+1) -lt $args2.count)
{
$i++
if ($args2[$i] -like "-*") {break}
$exclude+=@(join-path $args2[$i] "\\") # collect array of excluded directories.
}
continue
}
$args3+=@($args2[$i]) # Add files/dirs
}
if ($args3.count -ne 0)
{
# Get list of files and SHA512 hash them.
"Enumerating files from specified locations..."
$files=@(dir $args3 -recurse -ea 0 | ?{$_.mode -notmatch "d"} | ?{noequal $_.directoryname $exclude}) # Get list of files, minus directories and minus files in excluded paths
if ($create -eq $true -or !(test-path $hashespath)) # Create database?
{
# Create SHA512 hashes of files and write to new database
if ($files.count -eq 0) {"No files found. Exiting."; exit}
$files = $files | %{WriteFileName "SHA-512 Hashing: `"$($_.fullname)`" ...";add-member -inputobject $_ -name SHA512 -membertype noteproperty -value $(get-SHA512 $_.fullname) -passthru}
WriteFileNameEnd
$files |export-clixml $hashespath
"Created $hashespath"
"$($files.count) file hash(es) saved. Exiting."
exit
}
write-host "Loading file hashes from $hashespath..." -nonewline
$xfiles=@(import-clixml $hashespath|?{noequal $_.directoryname $exclude}) # Load database
if (($xfiles.count -eq 0) -or ($files.count -eq 0)) {"No files in Database or no files specified. Exiting.";Exit}
}
else
{
if (!(test-path $hashespath)) {"No database found or specified, exiting."; exit}
write-host "Loading file hashes from $hashespath..." -nonewline
$xfiles=@(import-clixml $hashespath|?{noequal $_.directoryname $exclude}) # Load database and check it
if ($xfiles.count -eq 0) {"No files specified and no files in Database. Exiting.";Exit}
$files=$xfiles | %{get-item -ea 0 -literalpath $_.fullname}
}
"Loaded $($xfiles.count) file hash(es)."
$hash=@{}
for($x=0;$x -lt $xfiles.count; $x++) # Build dictionary (hash) of filenames and indexes into file array
{
if ($hash.contains($xfiles[$x].fullname)) {continue}
$hash.Add($xfiles[$x].fullname,$x)
}
foreach($f in $files)
{
if ((get-item -ea 0 -literalpath $f.fullname) -eq $null) {continue} # skip if file no longer exists.
$n=($hash.($f.fullname))
if ($n -eq $null)
{
$nu++ # increment needs/needed updating count
if ($upd -eq $false) {WriteFileName "Needs to be added: `"$($f.fullname)`"";WriteFileNameEnd;continue} # if not updating, then continue
WriteFileName "SHA-512 Hashing `"$($f.fullname)`" ..."
# Create SHA512 hash of file
$f=$f |%{add-member -inputobject $_ -name SHA512 -membertype noteproperty -value $(get-SHA512 $_.fullname) -passthru -force}
$xfiles+=@($f) # then add file + hash to list
continue
}
WriteFileName "SHA-512 Hashing and checking: `"$($f.fullname)`" ..."
$fc++ # File checked increment.
if (($upd -eq $false) -and ($f.length -ne $xfiles[$n].length))
{
$errs++
WriteFileName "Size mixmatch: `"$($f.fullname)`""; WriteFileNameEnd
continue
}
$f=$f |%{add-member -inputobject $_ -name SHA512 -membertype noteproperty -value $(get-SHA512 $_.fullname) -passthru -force}
# Check SHA512 and size for mixmatch.
if ($xfiles[$n].length -eq $f.length)
{
if ($xfiles[$n].SHA512 -eq $f.SHA512)
{
$fm++;continue # if matched, increment file matches and continue loop
}
}
$errs++ # increment mixmatches
if ($upd -eq $true) { $xfiles[$n]=$f; WriteFileName "Updated `"$($f.fullname)`""; WriteFileNameEnd;continue}
WriteFileName "SHA-512 and/or size mixmatch found: `"$($f.fullname)`""; WriteFileNameEnd
}
WriteFileNameEnd # restore cursor position after last write string
if ($upd -eq $true) # if database updated
{
$xfiles|export-clixml $hashespath # write xml database
"Updated Database: $hashespath"
"$nu file hash(es) added to Database."
"$errs file hash(es) updated in Database."
exit
}
"$errs SHA-512 or size mixmatch(es) found."
"$fm file(s) SHA512 and size matched."
"$fc file(s) checked total."
if ($nu -ne 0) {"$nu file(s) need to be added [run with -u option to Add file hashes to database]."}
|
combined_dataset/train/non-malicious/Test-Prompt_3.ps1 | Test-Prompt_3.ps1 | $choices = [System.Management.Automation.Host.ChoiceDescription[]](
(New-Object System.Management.Automation.Host.ChoiceDescription "&Yes","Choose me!"),
(New-Object System.Management.Automation.Host.ChoiceDescription "&No","Pick me!"))
$Answer = $host.ui.PromptForChoice('Caption',"Message",$choices,(1))
Write-Output $Answer
$fields = new-object System.Collections.ObjectModel.Collection``1[System.Management.Automation.Host.FieldDescription]
$f = New-Object System.Management.Automation.Host.FieldDescription "String Field"
$f.HelpMessage = "This is the help for the first field"
$f.DefaultValue = "Field1"
$f.Label = "&Any Text"
$fields.Add($f)
$f = New-Object System.Management.Automation.Host.FieldDescription "Secure String"
$f.SetparameterType( [System.Security.SecureString] )
$f.HelpMessage = "You will get a password input with **** instead of characters"
$f.DefaultValue = "Password"
$f.Label = "&Password"
$fields.Add($f)
$f = New-Object System.Management.Automation.Host.FieldDescription "Numeric Value"
$f.SetparameterType( [int] )
$f.DefaultValue = "42"
$f.HelpMessage = "You need to type a number, or it will re-prompt"
$f.Label = "&Number"
$fields.Add($f)
$results = $Host.UI.Prompt( "Caption", "Message", $fields )
Write-Output $results
|
combined_dataset/train/non-malicious/55.ps1 | 55.ps1 |
function Get-AuthToken {
[cmdletbinding()]
param
(
[Parameter(Mandatory=$true)]
$User
)
$userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User
$tenant = $userUpn.Host
Write-Host "Checking for AzureAD module..."
$AadModule = Get-Module -Name "AzureAD" -ListAvailable
if ($AadModule -eq $null) {
Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview"
$AadModule = Get-Module -Name "AzureADPreview" -ListAvailable
}
if ($AadModule -eq $null) {
write-host
write-host "AzureAD Powershell module not installed..." -f Red
write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow
write-host "Script can't continue..." -f Red
write-host
exit
}
if($AadModule.count -gt 1){
$Latest_Version = ($AadModule | select version | Sort-Object)[-1]
$aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version }
if($AadModule.count -gt 1){
$aadModule = $AadModule | select -Unique
}
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
else {
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
[System.Reflection.Assembly]::LoadFrom($adal) | Out-Null
[System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null
$clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547"
$redirectUri = "urn:ietf:wg:oauth:2.0:oob"
$resourceAppIdURI = "https://graph.microsoft.com"
$authority = "https://login.microsoftonline.com/$Tenant"
try {
$authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority
$platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto"
$userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId")
$authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result
if($authResult.AccessToken){
$authHeader = @{
'Content-Type'='application/json'
'Authorization'="Bearer " + $authResult.AccessToken
'ExpiresOn'=$authResult.ExpiresOn
}
return $authHeader
}
else {
Write-Host
Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red
Write-Host
break
}
}
catch {
write-host $_.Exception.Message -f Red
write-host $_.Exception.ItemName -f Red
write-host
break
}
}
Function Get-ApplicationCategory(){
[cmdletbinding()]
param
(
$Name
)
$graphApiVersion = "Beta"
$Resource = "deviceAppManagement/mobileAppCategories"
try {
if($Name){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value | Where-Object { ($_.'displayName').contains("$Name") }
}
else {
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
(Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get).Value
}
}
catch {
$ex = $_.Exception
Write-Host "Request to $Uri failed with HTTP Status $([int]$ex.Response.StatusCode) $($ex.Response.StatusDescription)" -f Red
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
write-host
if($global:authToken){
$DateTime = (Get-Date).ToUniversalTime()
$TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes
if($TokenExpires -le 0){
write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow
write-host
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
}
else {
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
Get-ApplicationCategory
|
combined_dataset/train/non-malicious/push-module function .ps1 | push-module function .ps1 | function Push-Module {
param(
[parameter(position=0, mandatory=$true)]
[validatenotnullorempty()]
[string]$ModuleName
)
# find out what this module exports (and therefore what it overwrites)
$metadata = new-module -ascustomobject {
param([string]$ModuleName)
# import targeted module
$inner = import-module $ModuleName -PassThru
function GetExportedFunctions() {
$inner.ExportedFunctions.values
}
# prevent export of inner module's exports
Export-ModuleMember -Cmdlet "" -Function GetExportedFunctions
} -args $ModuleName
$clobbered = @{}
# grab copies of functions that would get clobbered
$metadata.GetExportedFunctions() | ? {
Test-Path "function:$($_.name)"
} | % {
$clobbered[$_.name] = gc -path "function:$($_.name)"
}
# import module
$m = import-module $ModuleName -PassThru
# hook up function restore
$m.onremove = {
$clobbered.keys | % {
si -path function:global:$_ $clobbered[$_] -force
}
}.getnewclosure()
}
|
combined_dataset/train/non-malicious/2541.ps1 | 2541.ps1 |
Param
(
[parameter(Mandatory=$true, Position=0, HelpMessage="Define valdation type: All, Domain, Zone, ZoneAging, ZoneDelegation, Forwarder, RootHints")]
[Alias("Type")]
[String[]] $ValidationType,
[parameter(Mandatory=$false, Position=1, HelpMessage="Full path of cache files.")]
[String] $Path = $pwd.path + "\",
[parameter(Mandatory=$false, HelpMessage="Clean-Up old cache files.")]
[Switch] $CleanUpOldCacheFiles,
[parameter(Mandatory=$false, HelpMessage="Clean-Up old report files.")]
[Switch] $CleanUpOldReports,
[parameter(Mandatory=$false, HelpMessage="Applicable with CleanUpOldCacheFiles & CleanUpOldReports switches and deletes the files without user confirmation.")]
[Switch] $Force,
[parameter(Mandatory=$false, HelpMessage="List of name resolvers on which health check need to be performed.")]
[String[]] $DnsServerList = $null,
[parameter(Mandatory=$false, HelpMessage="List of all available root domains across the enterprise.")]
[String[]] $DomainList = $null,
[parameter(Mandatory=$false, HelpMessage="List of zones to be verified.")]
[String[]] $ZoneList = $null,
[parameter(Mandatory=$false, HelpMessage="List of zone hosting servers, which hosts one or more zones.")]
[String[]] $ZoneHostingServerList = $null,
[parameter(Mandatory=$false, HelpMessage="List of DHCP servers across the enterprise.")]
[String[]] $DhcpServerList = $null
)
Set-StrictMode -Version 2
Import-Module DNSServer -ErrorAction Ignore
Import-Module DHCPServer -ErrorAction Ignore
Import-Module ActiveDirectory -ErrorAction Ignore
if (-not (Get-Module DNSServer)) {
throw 'The Windows Feature "DNS Server Tools" is not installed. `
(On server SKU run "Install-WindowsFeature -Name RSAT-DNS-Server", on client SKU install RSAT client)'
}
$script:validValidationTypes = @("Domain", "Zone", "ZoneAging", "ZoneDelegation", "Forwarder", "RootHints");
$script:allValidationType = "All";
$script:switchParamVal = "__SWITCH__";
$script:cmdLetReturnedStatus = $null;
$script:dnsServerList = $DnsServerList;
$script:domainList = $DomainList;
$script:zoneList = $ZoneList;
$script:zoneHostingServerList = $ZoneHostingServerList;
$script:dhcpServerList = $DhcpServerList;
$script:dnsServerListFilePath = $Path + "DnsServerList.txt";
$script:domainListFilePath = $Path + "DomainList.txt";
$script:zoneListFilePath = $Path + "ZoneList.txt";
$script:zoneHostingServerListFilePath = $Path + "ZoneHostingServerList.txt";
$script:dhcpServerListFilePath = $Path + "DhcpServerList.txt";
$script:domainAndHostingServersList = $null;
$script:zoneAndHostingServersList = $null;
if ($CleanUpOldCacheFiles -and (Test-Path -Path ($Path + "*.txt") -PathType Leaf))
{
if ($Force) {
Remove-Item -Path ($Path + "*.txt") -Force;
} else {
Remove-Item -Path ($Path + "*.txt") -Confirm;
}
}
if ($CleanUpOldReports -and (Test-Path -Path ($Path + "*.html") -PathType Leaf))
{
if ($Force) {
Remove-Item -Path ($Path + "*.html") -Force;
} else {
Remove-Item -Path ($Path + "*.html") -Confirm;
}
}
$script:logLevel = @{
"Verbose" = [int]1
;"Host" = [int]2
;"Warning" = [int]3
;"Error" = [int]4
}
$script:resultView =@{
"List" = "List"
;"Table" = "Table"
}
Function LogComment
{
param (
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$message,
[int]$level = $script:logLevel.Verbose
)
$message = ([DateTime]::Now).ToString() + ": " + $message;
switch ($level)
{
$script:logLevel.Verbose {Write-Verbose $message};
$script:logLevel.Host {Write-Host -ForegroundColor Cyan $message};
$script:logLevel.Warning {Write-Warning $message};
$script:logLevel.Error {Write-Error $message};
default {throw "Not a valid log level: " + $level};
}
}
Function ExecuteCmdLet
{
param (
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]$cmdLetName,
[HashTable]$params = @{}
)
$cmdString=$cmdLetName;
$displayString=$cmdLetName;
$script:cmdLetReturnedStatus = [RetStatus]::Success;
if ($null -ne $params) {
foreach($key in $params.keys) {
if ($script:switchParamVal -eq $params[$key]) {
$cmdString +=" -$key ";
$displayString +=" -$key ";
} else {
$cmdString += " -$key `$params[`"$key`"]";
$displayString += " -$key $($params[$key])";
}
}
}
$cmdString += " -ErrorAction Stop 2> `$null";
$displayString += " -ErrorAction Stop 2> `$null";
LogComment $displayString $script:logLevel.Host;
$retObj = $null;
try {
$retObj = Invoke-Expression $cmdString;
} catch [Exception] {
if (Get-Member -InputObject $_.Exception -Name "Errordata")
{
if (5 -eq $_.Exception.Errordata.error_Code) {
LogComment $("Caught error: Access is denied, considering it as current login creds don't have server read access.") `
$script:logLevel.Warning;
$script:cmdLetReturnedStatus = [RetStatus]::AccessIsDenied;
} elseif (1722 -eq $_.Exception.Errordata.error_Code) {
LogComment $("Caught error: The RPC server is unavailable, considering it as server is down.") `
$script:logLevel.Warning;
$script:cmdLetReturnedStatus = [RetStatus]::RpcServerIsUnavailable;
} elseif (9601 -eq $_.Exception.Errordata.error_Code) {
LogComment $("Caught error: DNS zone does not exist, considering it as given server isn't hosting input zone.") `
$script:logLevel.Warning;
$script:cmdLetReturnedStatus = [RetStatus]::ZoneDoesNotExist;
} elseif (9611 -eq $_.Exception.Errordata.error_Code) {
LogComment $("Caught error: Invalid DNS zone type, considering it as we can't perform current operation on input zone.") `
$script:logLevel.Warning;
$script:cmdLetReturnedStatus = [RetStatus]::OperationIsNotSupported;
} elseif (9714 -eq $_.Exception.Errordata.error_Code) {
LogComment $("Caught error: DNS name does not exist, considering it as input record doesn't exist.") `
$script:logLevel.Warning;
$script:cmdLetReturnedStatus = [RetStatus]::RecordDoesNotExist;
} else {
LogComment $("Caught error while executing '" + $displayString + "' with errorcode: " + $_.Exception.Errordata.error_Code) `
$script:logLevel.Error;
$script:cmdLetReturnedStatus = $([String]$_.Exception.Errordata.error_Code + ":" + $_.Exception.Errordata.error_WindowsErrorMessage);
}
} elseif (Get-Member -InputObject $_ -Name "FullyQualifiedErrorId") {
if ($_.FullyQualifiedErrorId.Contains("DNS_ERROR_RCODE_NAME_ERROR")) {
LogComment $("Caught error: ResolveDnsNameResolutionFailed in Resolve-DnsName.") $script:logLevel.Warning;
$script:cmdLetReturnedStatus = [RetStatus]::ResolveDnsNameResolutionFailed;
} elseif ($_.FullyQualifiedErrorId.Contains("System.Net.Sockets.SocketException")) {
LogComment $("Caught error: ResolveDnsNameServerNotFound in Resolve-DnsName.") $script:logLevel.Warning;
$script:cmdLetReturnedStatus = [RetStatus]::ResolveDnsNameServerNotFound;
} elseif ($_.FullyQualifiedErrorId.Contains("ERROR_TIMEOUT")) {
LogComment $("Caught error: ResolveDnsNameTimeoutPeriodExpired in Resolve-DnsName.") $script:logLevel.Warning;
$script:cmdLetReturnedStatus = [RetStatus]::ResolveDnsNameServerNotFound;
} else {
LogComment $("Caught error while executing '" + $displayString + "' `n" + $_.Exception) $script:logLevel.Error;
$script:cmdLetReturnedStatus = $([String]$_.FullyQualifiedErrorId + ":" + $_.Exception);
throw;
}
} else {
LogComment $("Caught error while executing '" + $displayString + "' `n" + $_.Exception) $script:logLevel.Error;
$script:cmdLetReturnedStatus = $($_.Exception);
throw;
}
}
if ($null -eq $retObj) {
LogComment "CmdLet returned with NULL..." $script:logLevel.Host;
}
return $retObj
}
Function Get-EnterpriseDnsServerList
{
param (
$dnsServerListFilePath = $script:dnsServerListFilePath,
$dhcpServerListFilePath = $script:dhcpServerListFilePath,
$dnsServerListFromCmdLine = $script:dnsServerList
)
$dnsServerList = $null;
if ($null -eq $dnsServerListFromCmdLine) {
$dnsServerList = Get-FileContent $dnsServerListFilePath;
} else {
$dnsServerList = $dnsServerListFromCmdLine;
}
if ($null -eq $dnsServerList) {
LogComment "Unable to load DNS servers from the cache. So loading from DHCP servers."
if (-not(Get-Module DHCPServer)) {
LogComment $('The Windows Feature "DHCP Server Tools" is not installed. `
(On server SKU run "Install-WindowsFeature -Name RSAT-DHCP", on client SKU install RSAT client)') `
$script:logLevel.Warning;
LogComment $("Skipping this step and returning with NULL DNS List.") $script:logLevel.Warning;
return $null;
}
$dhcpServerList = Get-EnterpriseDhcpServerList $dhcpServerListFilePath;
if ($null -eq $dhcpServerList) {
LogComment $("No DHCP servers were found, returning with NULL DNS server list.") $script:logLevel.Warning;
return $null;
}
$optionList = @();
$v4Options = Get-EnterpriseDhcpv4OptionId $dhcpServerList $false;
$optionList += $v4Options;
$v4Options = Get-EnterpriseDhcpv4OptionId $dhcpServerList $true;
$optionList += $v4Options;
$v6Options = Get-EnterpriseDhcpv6OptionId $dhcpServerList $false;
$optionList += $v6Options;
$v6Options = Get-EnterpriseDhcpv6OptionId $dhcpServerList $true;
$optionList += $v6Options;
$optionList = $optionList | ?{-not([String]::IsNullOrEmpty($_))};
if ($null -eq $optionList) {
LogComment $("No DNS server found in configured DHCP options across all input DHCP servers, returning with NULL DNS server list.") $script:logLevel.Warning;
} else {
$servers = @();
$optionList | %{ $servers += $_.Value };
$dnsServerList = $servers | sort -Unique;
ExecuteCmdLet "Set-Content" @{"Path" = $dnsServerListFilePath; "Value" = $dnsServerList};
}
}
return $dnsServerList;
}
Function Get-EnterpriseDomainList
{
param (
$domainListFilePath = $script:domainListFilePath,
$domainListFromCmdLine = $script:domainList
)
$domainList = $null;
if ($null -eq $domainListFromCmdLine) {
$domainList = Get-FileContent $domainListFilePath;
} else {
$domainList = $domainListFromCmdLine;
}
if ($null -eq $domainList) {
LogComment "Failed to load domains from the file. So loading from AD.";
try {
if (Get-Module ActiveDirectory) {
$forestObj = ExecuteCmdLet "Get-ADForest";
if ($null -ne $forestObj) {
$domainList = $forestObj.Domains;
}
if ($null -ne $domainList) {
ExecuteCmdLet "Set-Content" @{"Path" = $domainListFilePath; "Value" = $domainList};
} else {
LogComment $("Unable to obtain domainList from Get-ADForest. Returning with NULL DomainList.") `
$script:logLevel.Warning;
}
} else {
LogComment $('The Windows Feature "Active Directory module for Windows PowerShell" is not installed. `
(On server SKU run "Install-WindowsFeature -Name RSAT-AD-PowerShell", on client SKU install RSAT client)') $script:logLevel.Warning;
LogComment $("Skipping this step and returning with NULL DomainList.") $script:logLevel.Warning;
}
} catch [Exception] {
LogComment $("Get-ADForest failed, Skipping this step and returning with NULL DomainList. `n" `
+ $_.Exception) $script:logLevel.Warning;
}
}
return $domainList;
}
Function Get-EnterpriseZoneList
{
param (
$zoneListFilePath = $script:zoneListFilePath,
$zoneListFromCmdLine = $script:zoneList
)
$zoneList = $null;
if ($null -eq $zoneListFromCmdLine) {
$zoneList = Get-FileContent $zoneListFilePath;
} else {
$zoneList = $zoneListFromCmdLine;
}
return $zoneList;
}
Function Get-EnterpriseZoneHostingServerList
{
param (
$zoneHostingServerListFilePath = $script:zoneHostingServerListFilePath,
$dnsServerList = $script:dnsServerList,
$zoneHostingServerListFromCmdLine = $script:zoneHostingServerList
)
$zoneHostingServerList = $null;
if ($null -eq $zoneHostingServerListFromCmdLine) {
LogComment $("Filling Zone Hosting Servers list from the file.");
$zoneHostingServerList = Get-FileContent $zoneHostingServerListFilePath;
} else {
$zoneHostingServerList = $zoneHostingServerListFromCmdLine;
}
if ($null -eq $zoneHostingServerList) {
LogComment $("Zone Hosting Servers list isn't available, returning with DNS Server list.");
$zoneHostingServerList = $dnsServerList;
}
return $zoneHostingServerList;
}
Function Get-EnterpriseDhcpServerList
{
param (
$dhcpServerListFilePath = $script:dhcpServerListFilePath,
$dhcpServerListFromCmdLine = $script:dhcpServerList
)
$dhcpServerList = $null;
if ($null -eq $dhcpServerListFromCmdLine) {
$dhcpServerList = Get-FileContent $dhcpServerListFilePath;
} else {
$dhcpServerList = $dhcpServerListFromCmdLine;
}
if ($null -eq $dhcpServerList) {
LogComment "Failed to load DHCP server list from the file. So loading from AD.";
$dhcpObjList = ExecuteCmdLet "Get-DhcpServerInDC";
foreach($dhcpObj in $dhcpObjList) {
if ($null -eq $dhcpServerList) {$dhcpServerList = @()};
$dhcpServerList += $dhcpObj.IPAddress;
}
}
return $dhcpServerList;
}
Function Get-EnterpriseDomainAndHostingServersHash
{
param (
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
$domainHostingServers,
$domainListFilePath = $script:domainListFilePath
)
$domainAndHostingServersHash = $null;
$domainList = Get-EnterpriseDomainList $domainListFilePath;
if ($null -ne $domainList) {
$domainAndHostingServersHash = @{};
foreach($domain in $domainList) {
$domainHostingServer = Get-ZoneHostingServerListFromNSRecords $domain;
$domainAndHostingServersHash.Add($domain, $domainHostingServer);
}
Write-HashTableInHtml $domainAndHostingServersHash "DomainAndHostingServersHash";
} else {
LogComment $("Failed to get domain list. So returning with NULL HashTable.") $script:logLevel.Warning;
}
return $domainAndHostingServersHash;
}
Function Get-EnterpriseZoneAndHostingServersHash
{
param (
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
$zoneHostingServerList,
$zoneListFilePath = $script:zoneListFilePath
)
$zoneAndHostingServersHash = $null;
$zoneList = Get-EnterpriseZoneList $zoneListFilePath;
if ($null -ne $zoneList) {
$zoneAndHostingServersHash = Get-ServersHostingTheZones $zoneList $zoneHostingServerList;
} else {
LogComment $("Failed to load zones from the file. So loading it from zoneHostingServerList.");
if ($null -ne $zoneHostingServerList) {
$zoneAndHostingServersHash = Get-ZonesHostingOnServers $zoneHostingServerList;
Write-HashTableInHtml $zoneAndHostingServersHash "ZoneAndHostingServersHash";
} else {
LogComment $("Failed to get Zone Hosting Servers list. Returning with NULL.") $script:logLevel.Warning;
}
}
return $zoneAndHostingServersHash;
}
Function Get-ServersHostingTheZones
{
param (
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
$zoneList,
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
$zoneHostingServerList
)
$zoneAndHostingServersHash = $null;
foreach($zone in $zoneList) {
if ($null -eq $zoneAndHostingServersHash) {$zoneAndHostingServersHash = @{}};
if ($zoneAndHostingServersHash.ContainsKey($zone)) {
LogComment $($zone + " is already there in ZoneAndHostingServersList.");
continue;
}
LogComment $("Searching for servers which are hosting Zone: " + $zone);
$serverList = $null;
foreach($server in $zoneHostingServerList) {
$tempZoneObj = ExecuteCmdLet "Get-DnsServerZone" @{"ComputerName" = $server; "ZoneName" = $zone};
if ($null -ne $tempZoneObj) {
if ($null -eq $serverList) {$serverList = @()};
LogComment $($server + " is hosting Zone: " + $zone);
$serverList += $server;
} else {
if ([RetStatus]::ZoneDoesNotExist -eq $script:cmdLetReturnedStatus) {
LogComment $($server + " doesn't host Zone: " + $zone);
} else {
LogComment $("Failed to get " + $zone + " info on " + $server + " with error " + $script:cmdLetReturnedStatus) `
$script:logLevel.Error;
}
}
}
if ($null -eq $serverList) {
LogComment $("Didn't find any server which is hosting Zone: " + $zone) `
$script:logLevel.Warning;
}
$zoneAndHostingServersHash.Add($zone, $serverList);
}
return $zoneAndHostingServersHash;
}
Function Get-ZonesHostingOnServers
{
param (
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
$zoneHostingServerList
)
$zoneAndHostingServersHash = $null;
foreach($zoneHostingServer in $zoneHostingServerList) {
$tempZoneObj = ExecuteCmdLet "Get-DnsServerZone" @{"ComputerName" = $zoneHostingServer};
if ($null -ne $tempZoneObj) {
foreach ($zone in $tempZoneObj) {
if (($false -eq $zone.IsAutoCreated) -and ("TrustAnchors" -ne $zone.ZoneName)) {
if ($null -eq $zoneAndHostingServersHash) {$zoneAndHostingServersHash = @{}};
LogComment $($zoneHostingServer + " is hosting Zone: " + $zone.ZoneName);
if ($zoneAndHostingServersHash.ContainsKey($zone.ZoneName)) {
$zoneAndHostingServersHash[$zone.ZoneName] += $zoneHostingServer;
} else {
$zoneAndHostingServersHash.Add($zone.ZoneName, @($zoneHostingServer));
}
}
}
} else {
if ([RetStatus]::Success -eq $script:cmdLetReturnedStatus) {
LogComment $($zoneHostingServer + " doesn't host any Zone");
} else {
LogComment $("Failed to get Zone info on " + $zoneHostingServer + " with error " + $script:cmdLetReturnedStatus) `
$script:logLevel.Error;
}
}
}
return $zoneAndHostingServersHash;
}
Function Get-EnterpriseDhcpv4OptionId
{
param (
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[Array]$dhcpServerList,
$scopeOption = $false,
$OptionId = 6
)
$optionList = @();
foreach ($dhcpServer in $dhcpServerList) {
try {
if ($true -eq $scopeOption) {
$scopeOptions = @();
$scopeList = ExecuteCmdLet "Get-DhcpServerv4Scope" @{"ComputerName" = $dhcpServer};
foreach ($scope in $scopeList) {
try {
$scopeOption = ExecuteCmdLet "Get-DhcpServerv4OptionValue" `
@{"ComputerName" = $dhcpServer; "OptionId" = $OptionId; "ScopeId" = $scope.ScopeId};
$scopeOptions += $scopeOption;
} catch {
LogComment "Failed to get options for the scope $($scope.ScopeId). Continuing...";
}
}
$optionList += $scopeOptions;
} else {
try {
$serverOptions = ExecuteCmdLet "Get-DhcpServerv4OptionValue" `
@{"ComputerName" = $dhcpServer; "OptionId" = $OptionId};
$optionList += $serverOptions;
} catch {
LogComment "Get-DhcpServerv4OptionValue -ComputerName $($dhcpServer) -OptionId $OptionId failed. Continuing...";
}
}
} catch {
LogComment "Get-DhcpServerv4Scope -ComputerName $($dhcpServer) failed" $script:logLevel.Error;
}
}
$optionList = $optionList | ?{-not([String]::IsNullOrEmpty($_))};
if ($null -eq $optionList) {
LogComment $("No DHCPv4 option found across the DHCP servers for ScopeOption = " + $scopeOption + ", returning with NULL option list.") $script:logLevel.Warning;
}
return $optionList;
}
Function Get-EnterpriseDhcpv6OptionId
{
param (
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[Array]$dhcpServerList,
$scopeOption = $false,
$OptionId = 23
)
$optionList = @();
foreach ($dhcpServer in $dhcpServerList) {
try {
if ($true -eq $scopeOption) {
$scopeOptions = @();
$scopeList = ExecuteCmdLet "Get-DhcpServerv6Scope" @{"ComputerName" = $dhcpServer};
foreach ($scope in $scopeList) {
try {
$scopeOption = ExecuteCmdLet "Get-DhcpServerv6OptionValue" `
@{"ComputerName" = $dhcpServer; "OptionId" = $OptionId; "Prefix" = $scope.Prefix};
$scopeOptions += $scopeOption;
} catch {
LogComment "Failed to get options for the scope $($scope.Prefix). Continuing...";
}
}
$optionList += $scopeOptions;
} else {
try {
$serverOptions = ExecuteCmdLet "Get-DhcpServerv6OptionValue" `
@{"ComputerName" = $dhcpServer; "OptionId" = $OptionId};
$optionList += $serverOptions;
} catch {
LogComment "Get-DhcpServerv6OptionValue -ComputerName $($dhcpServer) -OptionId $OptionId failed. Continuing...";
}
}
} catch {
LogComment $("Get-DhcpServerv6Scope -ComputerName $($dhcpServer) failed") $script:logLevel.Error;
}
}
$optionList = $optionList | ?{-not([String]::IsNullOrEmpty($_))};
if ($null -eq $optionList) {
LogComment $("No DHCPv6 option found across the DHCP servers for ScopeOption = " + $scopeOption + ", returning with NULL option list.") $script:logLevel.Warning;
}
return $optionList;
}
Function Test-ZoneHealthAcrossAllDnsServers
{
param (
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
$zoneList,
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
$dnsServerList,
[bool]$isRootZone = $false,
[String]$outputReportName = $MyInvocation.MyCommand
)
$statusArray = @();
foreach($zone in $zoneList) {
$status = New-Object PSObject;
$status | Add-Member -memberType NoteProperty -name "ZoneName" -value $zone;
foreach($dnsServer in $dnsServerList) {
try {
$result = [RetStatus]::Success;
$resultStream = $null;
$retVal1 = Test-DnsServerForInputDnsName $zone $dnsServer;
$resultStream = $resultStream + "ResolveDnsName:" + $retVal1 + "`n";
$retVal2 = Test-DnsServerForInputZone $zone $dnsServer $dnsServer;
$resultStream = $resultStream + "TestDnsServer:" + $retVal2 + "`n";
if (!(([RetStatus]::Success -eq $retVal1) -and ([RetStatus]::Success -eq $retVal2))) {
$result = [RetStatus]::Failure;
}
if ($isRootZone) {
$retVal3 = Test-DnsServerForInputDnsName ("_msdcs." + $zone) $dnsServer;
$resultStream = $resultStream + "MsdcsResolveDnsName:" + $retVal3 + "`n";
$retVal4 = Test-DnsServerForInputZone ("_msdcs." + $zone) $dnsServer $dnsServer;
$resultStream = $resultStream + "MsdcsTestDnsServer:" + $retVal4 + "`n";
$retVal5 = Test-DnsServerForInputDnsName ("_ldap._tcp.dc._msdcs." + $zone) $dnsServer "SRV";
$resultStream = $resultStream + "LdapTCPMsdcsResolveDnsName:" + $retVal5 + "`n";
if (!(([RetStatus]::Success -eq $retVal3) -and ([RetStatus]::Success -eq $retVal4) -and ([RetStatus]::Success -eq $retVal5))) {
$result = [RetStatus]::Failure;
}
}
if ([RetStatus]::Success -eq $result) {
LogComment $("Validation of " + $zone + " passed on DNS Server: " + $dnsServer);
LogComment $("Validation of " + $zone + " passed on DNS Server: " + $dnsServer)
$script:logLevel.Host;
} else {
LogComment $("Validation of " + $zone + " failed on DNS Server: " + $dnsServer)
$script:logLevel.Error;
LogComment $("Validation output:" + $resultStream) $script:logLevel.Error;
$result = $resultStream;
}
} catch {
LogComment $("Test-ZoneHealthAcrossAllDnsServers failed for Zone: " + $zone + " on DNSServer: " + $dnsServer + " `n " + $_.Exception) `
$script:logLevel.Error;
$result = [RetStatus]::Failure;
}
$status = Insert-ResultInObject $status $dnsServer $result;
}
$statusArray += $status;
}
Generate-Report $statusArray $outputReportName $script:resultView.Table;
return $statusArray;
}
Function Test-RootDomainHealthAcrossAllDnsServers
{
param (
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[HashTable]$domainAndHostingServerHash,
$dnsServerList
)
Test-ZoneHealthAcrossAllDnsServers $domainAndHostingServerHash.Keys $dnsServerList $true $MyInvocation.MyCommand
}
Function Test-ZoneAgingHealth
{
param (
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[HashTable]$zoneAndHostingServersHash
)
$status = New-Object PSObject;
foreach($zone in $zoneAndHostingServersHash.keys) {
$result = [RetStatus]::Success;
$agingStatus = $false;
$defaultRefreshInterval = [Timespan]::FromHours(168);
foreach($server in $zoneAndHostingServersHash[$zone]) {
try {
$retObj = ExecuteCmdLet "Get-DnsServerZoneAging" @{"ComputerName" = $server; "ZoneName" = $zone};
if ($null -ne $retObj) {
if ($retObj.AgingEnabled) {
LogComment $("Aging is enabled on Server: " + $server + " for Zone: " + $zone);
if ($defaultRefreshInterval -ne $retObj.RefreshInterval) {
LogComment $("RefreshInterval is set to non-default value: " + $retObj.RefreshInterval) `
$script:logLevel.Warning;
}
if ($defaultRefreshInterval -ne $retObj.NoRefreshInterval) {
LogComment $("NoRefreshInterval is set to non-default value: " + $retObj.NoRefreshInterval) `
$script:logLevel.Warning;
}
if ($null -eq $retObj.ScavengeServers) {
LogComment $("There's no ScavengeServers configured.") $script:logLevel.Warning;
}
if ($agingStatus) {
$result = [RetStatus]::Failure;
LogComment $("Aging is enabled on more than one server for Zone: " + $zone) `
$script:logLevel.Warning;
} else {
$agingStatus = $true;
}
} else {
LogComment $("Aging is disabled on Server: " + $server + " for Zone: " + $zone);
}
} else {
if ([RetStatus]::OperationIsNotSupported -eq $script:cmdLetReturnedStatus) {
LogComment $($zone + " is non-primary zone on " + $server);
} else {
LogComment $("Failed to get " + $zone + " aging info on " + $server + " with error " + $script:cmdLetReturnedStatus) `
$script:logLevel.Error;
$result = [RetStatus]::Failure;
}
}
} catch {
LogComment $("Test-ZoneAgingHealth failed for Zone: " + $zone + " on Server: " + $server + " `n " + $_.Exception) `
$script:logLevel.Error;
$result = [RetStatus]::Failure;
}
if (!$agingStatus) {
LogComment $("No server found with zone aging enabled for the Zone: " + $zone) `
$script:logLevel.Warning;
$result = [RetStatus]::Failure;
}
if ([RetStatus]::Success -eq $result) {
LogComment $("Zone Aging setting validation of " + $zone + " passed.");
LogComment $("Zone Aging setting validation of " + $zone + " passed.") `
$script:logLevel.Host;
} else {
LogComment $("Zone Aging setting validation of " + $zone + " failed.") `
$script:logLevel.Error;
}
$status = Insert-ResultInObject $status $zone $result;
}
}
Generate-Report $status $MyInvocation.MyCommand $script:resultView.List;
return $status;
}
Function Test-ZoneDelegationHealth
{
param (
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[HashTable]$zoneAndHostingServersHash
)
$statusArray = @();
foreach($zone in $zoneAndHostingServersHash.keys) {
foreach($server in $zoneAndHostingServersHash[$zone]) {
$rrObj = ExecuteCmdLet "Get-DnsServerResourceRecord" @{"ComputerName" = $server; "RRType" = "NS"; "ZoneName" = $zone};
$rrObj = $rrObj |? hostname -ne "@";
$zoneDelObj = $null;
if ($null -ne $rrObj) {
LogComment $("Performing delegation check for " + $zone + " on " + $server);
foreach($rr in $rrObj) {
$result = [RetStatus]::Success;
$resultStream = $null;
$status = New-Object PSObject;
$status | Add-Member -memberType NoteProperty -name "ZoneName :: Server" -value ($zone + " :: " + $server) -Force;
try {
$zoneDelObj = ExecuteCmdLet "Get-DnsServerZoneDelegation" @{"ComputerName" = $server; "ZoneName" = $zone; "ChildZoneName" = $rr.hostname};
if ($null -eq $zoneDelObj) {
LogComment $("Failed to get info for " + $rr.hostname + " on " + $server + " with error " + $script:cmdLetReturnedStatus) `
$script:logLevel.Error;
if ([RetStatus]::Success -eq $script:cmdLetReturnedStatus) {
$result = [RetStatus]::Failure;
} else {
$result = $script:cmdLetReturnedStatus;
}
} else {
foreach($zoneDel in $zoneDelObj) {
$zoneDelName = $zoneDel.ChildZoneName;
LogComment $("Validating ZoneDelegation: " + $zoneDelName + " at server: " + $server);
[Array]$rr_ip = $zoneDel.IPAddress
foreach ($ipRec in $rr_ip) {
if ($null -ne $ipRec){
$ipAddr = @();
if ($ipRec.RecordType -eq "A") {
$ipAddr = $ipRec.RecordData.IPv4Address
} else {
$ipAddr = $ipRec.RecordData.IPv6Address
}
foreach ($ip in $ipAddr) {
$retVal = Test-DnsServerForInputDnsName $zoneDelName $ip;
$resultStream = $resultStream + $ip.IPAddressToString + ":" + $retVal + "`n";
if ([RetStatus]::Success -eq $retVal) {
LogComment $("Validated NameServer IP: " + $ip + " for ZoneDelegation: " + $zoneDelName + " on Server: " + $server);
LogComment $("Validated NameServer IP: " + $ip + " for ZoneDelegation: " + $zoneDelName + " on Server: " + $server) `
$script:logLevel.Host;
} else {
$result = [RetStatus]::Failure;
LogComment $("Validation of NameServer IP: " + $ip + " for ZoneDelegation: " + $zoneDelName + " on Server: " + $server + " failed.") `
$script:logLevel.Error;
}
}
} else {
$result = [RetStatus]::Failure;
$resultStream = $resultStream + "NullIPAddressRecord;";
LogComment $("IPAddress record is null for ZoneDelegation: " + $zoneDelName + " on Server: " + $server) $script:logLevel.Error;
}
}
}
if ([RetStatus]::Success -ne $result) {
$result = $resultStream;
LogComment $("Validation output:" + $resultStream) $script:logLevel.Error;
}
}
} catch {
LogComment $("Test-ZoneDelegationHealth failed for Zone: " + $zone + " on Server: " + $server + " `n " + $_.Exception) `
$script:logLevel.Error;
$result = [RetStatus]::Failure;
}
$status = Insert-ResultInObject $status $rr.hostname $result;
$statusArray += $status;
}
} else {
if ([RetStatus]::Success -eq $script:cmdLetReturnedStatus) {
LogComment $("There's no non-root NS record in " + $zone + " on " + $server);
} elseif ([RetStatus]::OperationIsNotSupported -eq $script:cmdLetReturnedStatus) {
LogComment $($zone + " isn't a primary or secondary zone on " + $server);
} else {
LogComment $("Failed to get NS records under " + $zone + " on " + $server + " with error " + $script:cmdLetReturnedStatus) `
$script:logLevel.Error;
$status = New-Object PSObject;
$status | Add-Member -memberType NoteProperty -name "ZoneName :: Server" -value ($zone + " :: " + $server) -Force;
$status = Insert-ResultInObject $status "Get-DnsServerResourceRecord" $script:cmdLetReturnedStatus;
$statusArray += $status;
}
}
}
}
Generate-Report $statusArray $MyInvocation.MyCommand $script:resultView.List;
return $statusArray;
}
Function Test-ConfiguredForwarderHealth
{
param (
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
$dnsServerList
)
$statusArray = @();
foreach($dnsServer in $dnsServerList) {
$status = New-Object PSObject;
$status | Add-Member -memberType NoteProperty -name "DNSServer" -value $dnsServer;
try {
$retObj = ExecuteCmdLet "Get-DnsServerForwarder" @{"ComputerName" = $dnsServer};
if ($null -ne $retObj) {
LogComment $("Performing Forwarder health check for DnsServer: " + $dnsServer);
foreach($fwdIp in $retObj.IPAddress) {
$result = Test-DnsServerForInputContext $fwdIp.IPAddressToString "Forwarder" $dnsServer;
if ([RetStatus]::Success -eq $result) {
LogComment $("Validated Forwarder: " + $fwdIp.IPAddressToString + " of DNS Server: " + $dnsServer);
LogComment $("Validated Forwarder: " + $fwdIp.IPAddressToString + " of DNS Server: " + $dnsServer) `
$script:logLevel.Host;
} else {
LogComment $("Validation of Forwarder: " + $fwdIp.IPAddressToString + " of DNS Server: " + $dnsServer + " failed.") `
$script:logLevel.Error;
}
$status = Insert-ResultInObject $status $fwdIp $result;
}
} else {
if ([RetStatus]::Success -ne $script:cmdLetReturnedStatus) {
LogComment $("Unable to get Forwarder list for DnsServer: " + $dnsServer) `
$script:logLevel.Error;
$status = Insert-ResultInObject $status "Get-DnsServerForwarder" $script:cmdLetReturnedStatus;
} else {
LogComment $("There's no forwarder configured on DnsServer: " + $dnsServer);
$status = Insert-ResultInObject $status "NoForwarderConfigured" $script:cmdLetReturnedStatus;
}
}
} catch {
LogComment $("Test-ConfiguredForwarderHealth failed on DNSServer: " + $dnsServer + " `n " + $_.Exception) `
$script:logLevel.Error;
$status = Insert-ResultInObject $status "ForwarderHealthCheckFailed" [RetStatus]::Failure;
}
$statusArray += $status;
}
Generate-Report $statusArray $MyInvocation.MyCommand $script:resultView.List;
return $statusArray;
}
Function Test-ConfiguredRootHintsHealth
{
param (
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
$dnsServerList
)
$statusArray = @();
foreach($dnsServer in $dnsServerList) {
$status = New-Object PSObject;
$status | Add-Member -memberType NoteProperty -name "DNSServer" -value $dnsServer;
try {
$retObj = ExecuteCmdLet "Get-DnsServerRootHint" @{"ComputerName" = $dnsServer};
if ($null -ne $retObj) {
LogComment $("Performing RootHints health check for DnsServer: " + $dnsServer);
foreach($rH in $retObj) {
$result = [RetStatus]::Success;
$resultStream = $null;
$rHName = $rH.NameServer.RecordData.NameServer;
LogComment $("Validating RootHints: " + $rHName + " for DnsServer: " + $dnsServer);
[Array]$rr_ip = $rH.IPAddress
foreach ($ipRec in $rr_ip) {
$ipAddr = @();
if ($ipRec.RecordType -eq "A") {
$ipAddr = $ipRec.RecordData.IPv4Address
} else {
$ipAddr = $ipRec.RecordData.IPv6Address
}
foreach ($ip in $ipAddr) {
$retVal = Test-DnsServerForInputContext $ip "RootHints" $dnsServer;
$resultStream = $resultStream + $ip.IPAddressToString + ":" + $retVal + "`n";
if ([RetStatus]::Success -eq $retVal) {
LogComment $("Validated RootHints: " + $ip + " of DNS Server: " + $dnsServer);
LogComment $("Validated RootHints: " + $ip + " of DNS Server: " + $dnsServer) `
$script:logLevel.Host;
} else {
$result = [RetStatus]::Failure;
LogComment $("Validation of RootHints: " + $ip + " of DNS Server: " + $dnsServer + " failed.") `
$script:logLevel.Error;
}
}
}
if ([RetStatus]::Success -eq $result) {
$status = Insert-ResultInObject $status $rHName $result;
} else {
$status = Insert-ResultInObject $status $rHName $resultStream;
LogComment $("Validation output:" + $resultStream) $script:logLevel.Error;
}
}
} else {
if ([RetStatus]::Success -ne $script:cmdLetReturnedStatus) {
LogComment $("Unable to get RootHints list for DnsServer: " + $dnsServer) `
$script:logLevel.Error;
$status = Insert-ResultInObject $status "Get-DnsServerRootHint" $script:cmdLetReturnedStatus;
} else {
LogComment $("There's no RootHints configured on DnsServer: " + $dnsServer);
$status = Insert-ResultInObject $status "NoRootHintConfigured" $script:cmdLetReturnedStatus;
}
}
} catch {
LogComment $("Test-ConfiguredRootHintsHealth failed on DNSServer: " + $dnsServer + " `n " + $_.Exception) `
$script:logLevel.Error;
$result = [RetStatus]::Failure;
$status = Insert-ResultInObject $status "RootHintsHealthCheckFailed" $result;
}
$statusArray += $status;
}
Generate-Report $statusArray $MyInvocation.MyCommand $script:resultView.List;
return $statusArray;
}
Function Test-DnsServerForInputDnsName
{
param (
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
$dnsName,
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
$dnsServer,
$rrType = "All"
)
$result = [RetStatus]::Failure;
try {
$retObj = ExecuteCmdLet "Resolve-DnsName" @{"Name" = $dnsName; "Type" = $rrType; "Server" = $dnsServer};
if ($null -eq $retObj) {
LogComment $("Resolve-DnsName for " + $dnsName + " failed on server " + $dnsServer + " with " + $script:cmdLetReturnedStatus) `
$script:logLevel.Error;
$result = $script:cmdLetReturnedStatus;
} else {
LogComment $("Name resolution of " + $dnsName + " passed on server " + $dnsServer);
$result = [RetStatus]::Success;
}
} catch {
LogComment $("Test-DnsServerForInputDnsName failed " + $_.Exception) $script:logLevel.Error;
$result = [RetStatus]::Failure;
}
return $result;
}
Function Test-DnsServerForInputZone
{
param (
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
$zoneName,
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
$dnsServer,
$remoteServer = "."
)
$result = [RetStatus]::Failure;
try {
$dnsServerIP = $null;
if (![Net.IPaddress]::TryParse($dnsServer, [ref]$dnsServerIP)) {
try {
$dnsServerIP = [System.Net.Dns]::GetHostAddresses($dnsServer).IPAddressToString.Split(" ")[0];
} catch {
LogComment $("Exception while trying to get IP Address of " + $dnsServer + "`n" + $_.Exception) `
$script:logLevel.Error;
throw;
}
}
$retObj = ExecuteCmdLet "Test-DnsServer" @{"ComputerName" = $remoteServer; "ZoneName" = $zoneName; "IPAddress" = $dnsServerIP};
if ($null -eq $retObj) {
LogComment $("Test-DnsServer failed for " + $zoneName + " on server " + $dnsServer) $script:logLevel.Warning;
$result = $script:cmdLetReturnedStatus;
} else {
if (($retObj.Result -eq "Success") -or ($retObj.Result -eq "NotAuthoritativeForZone")) {
LogComment $("Test-DnsServer passed for " + $zoneName + " on server " + $dnsServer + " with Result: " + $retObj.Result);
$result = [RetStatus]::Success;
} else {
LogComment $("Test-DnsServer failed for " + $zoneName + " on server " + $dnsServer + " with Result: " + $retObj.Result) `
$script:logLevel.Warning;
$result = $retObj.Result;
}
}
} catch {
LogComment $("Test-DnsServerForInputDnsName failed " + $_.Exception) $script:logLevel.Error;
$result = [RetStatus]::Failure;
}
return $result;
}
Function Test-DnsServerForInputContext
{
param (
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
$dnsServer,
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
$context,
$remoteServer = "."
)
$result = [RetStatus]::Failure;
try {
$retObj = ExecuteCmdLet "Test-DnsServer" @{"ComputerName" = $remoteServer; "IPAddress" = $dnsServer; "Context" = $context};
if ($null -eq $retObj) {
LogComment $("Test-DnsServer failed for DnsServer: " + $dnsServer + " with context: " + $context) $script:logLevel.Warning;
$result = $script:cmdLetReturnedStatus;
} else {
if ($retObj.Result -eq "Success") {
LogComment $("Test-DnsServer Passed for DnsServer: " + $dnsServer + " with context: " + $context + " and Result: " + $retObj.Result);
$result = [RetStatus]::Success;
} else {
LogComment $("Test-DnsServer Failed for DnsServer: " + $dnsServer + " with context: " + $context + " and Result: " + $retObj.Result) `
$script:logLevel.Warning;
$result = $retObj.Result;
}
}
} catch {
LogComment $("Test-DnsServerForInputContext failed " + $_.Exception) $script:logLevel.Error;
$result = [RetStatus]::Failure;
}
return $result;
}
Function Get-ZoneHostingServerListFromNSRecords
{
param (
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
$dnsZone,
$dnsServer = $null
)
try {
$retObj = $null;
$zoneHostingServerList = $null;
if ($null -eq $dnsServer) {
$retObj = ExecuteCmdLet "Resolve-DnsName" @{"Name" = $dnsZone; "Type" = "NS"};
} else {
$retObj = ExecuteCmdLet "Resolve-DnsName" @{"Name" = $dnsZone; "Type" = "NS"; "Server" = $dnsServer};
}
if ($null -eq $retObj) {
if ([RetStatus]::Success -eq $script:cmdLetReturnedStatus) {
LogComment $("No NS records found for zone: " + $dnsZone + " on server: " + $dnsServer) `
$script:logLevel.Warning;
} else {
LogComment $("Resolve-DnsName for " + $dnsZone + " failed on server " + $dnsServer + " with " + $script:cmdLetReturnedStatus) `
$script:logLevel.Error;
}
} else {
LogComment $("NS records found for zone: " + $dnsZone + " on server: " + $dnsServer);
$retObj = $retObj | ? Type -eq "NS";
$zoneHostingServerList = @();
$retObj | % {$zoneHostingServerList += $_.NameHost};
}
} catch {
LogComment $("Get-ZoneHostingServerListFromNSRecords failed " + $_.Exception) $script:logLevel.Error;
}
return $zoneHostingServerList;
}
Function Get-FileContent
{
param (
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[String]$filePath
)
$fileContent = $null;
if (Test-Path $filePath) {
$fileContent = ExecuteCmdLet "Get-Content" @{"Path" = $filePath};
} else {
LogComment $($filePath + " not found.");
}
if ($null -ne $fileContent) {
$fileContent = $fileContent | ?{-not([String]::IsNullOrEmpty($_))};
} else {
LogComment $("Returning with Null content for " + $filePath);
}
return $fileContent;
}
Function Generate-Report
{
param (
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[Object]$inputObj,
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[String]$contextName,
[String]$viewAs = $script:resultView.Table
)
$head = @'
<!--mce:0-->
'@
$header = "<H1>DNS Health Report for " + $contextName + "</H1>";
$ouputFile = $contextName + ".html";
$inputObj = $inputObj | ? {$null -ne ($_ | gm -m properties)};
$inputObj |
ConvertTo-Html -Head $head -Body $header -As $viewAs |
Out-File $ouputFile | Out-Null;
$success2Search = "<td>" + [RetStatus]::Success + "</td>";
$success2Replace = "<td style=`"color:green;font-weight:bold;`">" + [RetStatus]::Success + "</td>";
$failure2Search = "<td>" + [RetStatus]::Failure + "</td>";
$failure2Replace = "<td style=`"color:red;font-weight:bold;`">" + [RetStatus]::Failure + "</td>";
$content = Get-Content -path $ouputFile;
$content = $content -creplace $success2Search, $success2Replace;
$content = $content -creplace $failure2Search, $failure2Replace;
$content | Set-Content $ouputFile -Encoding UTF8 | Out-Null;
}
Function Insert-ResultInObject
{
param (
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[Object]$inputObj,
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[String]$resultName,
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[String]$resultVal
)
if (Get-Member -InputObject $inputObj -Name $resultName) {
$inputObj.$resultName = $resultVal;
} else {
$inputObj | Add-Member -memberType NoteProperty -name $resultName -value $resultVal;
}
return $inputObj;
}
Function Write-HashTableInHtml
{
param (
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[HashTable]$inputHash,
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[String]$fileLabel
)
$tempHash = @{};
foreach($key in $inputHash.Keys){
$tempHash[$key] = $inputHash[$key] -join '; ';
}
$tempObj = New-Object PSObject -Property $tempHash;
Generate-Report $tempObj $fileLabel $script:resultView.List;
}
Function New-Enum
{
param (
[parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string] $enumName,
[Array] $enumVals = @()
)
$appdomain = [System.Threading.Thread]::GetDomain();
$assembly = new-object System.Reflection.AssemblyName;
$assembly.Name = "EmittedEnum";
$assemblyBuilder = $appdomain.DefineDynamicAssembly($assembly, `
[System.Reflection.Emit.AssemblyBuilderAccess]::Save -bor [System.Reflection.Emit.AssemblyBuilderAccess]::Run);
$moduleBuilder = $assemblyBuilder.DefineDynamicModule("DynamicModule", "DynamicModule.mod");
$enumBuilder = $moduleBuilder.DefineEnum($enumName, [System.Reflection.TypeAttributes]::Public, [System.Int32]);
for($i = 0; $i -lt $enumVals.Count; $i++) {
$null = $enumBuilder.DefineLiteral($enumVals[$i], $i);
}
$enumBuilder.CreateType() > $null | Out-Null;
}
New-Enum -EnumName RetStatus -EnumVals @("Success", "Failure", "RpcServerIsUnavailable", "AccessIsDenied",
"ZoneDoesNotExist", "OperationIsNotSupported", "RecordDoesNotExist",
"NotApplicable","ResolveDnsNameServerNotFound", "ResolveDnsNameResolutionFailed",
"ResolveDnsNameTimeoutPeriodExpired");
New-Enum -EnumName ValidationType -EnumVals $script:validValidationTypes;
try {
Start-Transcript Test-EnterpriseDnsHealth.txt | Out-Null;
if ($null -eq $script:dnsServerList) {$script:dnsServerList = Get-EnterpriseDnsServerList;}
if ($null -eq $script:dnsServerList) {
throw "Unable to get DNS server information. Exiting...";
}
if ($null -eq $script:zoneHostingServerList) {$script:zoneHostingServerList = Get-EnterpriseZoneHostingServerList};
if ($null -eq $script:zoneHostingServerList) {
throw "Unable to get Zone Hosting server information. Exiting...";
}
if($ValidationType -icontains $script:allValidationType) {
LogComment $("Validation type contains 'All'. Performing all available health checks.") $script:logLevel.Host;
$applicableValidationTypes = $script:validValidationTypes;
} else {
$applicableValidationTypes = $ValidationType;
}
foreach ($validationSubType in $applicableValidationTypes) {
LogComment $("Performing health check for Validation Type: " + $validationSubType) $script:logLevel.Host;
Switch ($validationSubType)
{
([ValidationType]::Domain) {
if($null -eq $script:domainAndHostingServersList) {
$script:domainAndHostingServersList = Get-EnterpriseDomainAndHostingServersHash $script:zoneHostingServerList;
}
if ($null -ne $script:domainAndHostingServersList) {
Test-RootDomainHealthAcrossAllDnsServers $script:domainAndHostingServersList $script:dnsServerList;
} else {
LogComment $("No domain found, Skipping RootDomainHealthCheckUp") $script:logLevel.Warning;
}
}
([ValidationType]::Zone) {
if($null -eq $script:zoneAndHostingServersList) {
$script:zoneAndHostingServersList = Get-EnterpriseZoneAndHostingServersHash $script:zoneHostingServerList;
}
if ($null -ne $script:zoneAndHostingServersList) {
Test-ZoneHealthAcrossAllDnsServers $script:zoneAndHostingServersList.Keys $script:dnsServerList;
} else {
LogComment $("No zone found, Skipping ZoneHealthCheckUp") $script:logLevel.Warning;
}
}
([ValidationType]::ZoneAging) {
if($null -eq $script:zoneAndHostingServersList) {
$script:zoneAndHostingServersList = Get-EnterpriseZoneAndHostingServersHash $script:zoneHostingServerList;
}
if ($null -ne $script:zoneAndHostingServersList) {
Test-ZoneAgingHealth $script:zoneAndHostingServersList;
} else {
LogComment $("No zone found, Skipping ZoneAgingHealthCheckUp") $script:logLevel.Warning;
}
}
([ValidationType]::ZoneDelegation) {
if($null -eq $script:zoneAndHostingServersList) {
$script:zoneAndHostingServersList = Get-EnterpriseZoneAndHostingServersHash $script:zoneHostingServerList;
}
if ($null -ne $script:zoneAndHostingServersList) {
Test-ZoneDelegationHealth $script:zoneAndHostingServersList;
} else {
LogComment $("No zone found, Skipping ZoneDelegationHealthCheckUp") $script:logLevel.Warning;
}
}
([ValidationType]::Forwarder) {
Test-ConfiguredForwarderHealth $script:dnsServerList;
}
([ValidationType]::RootHints) {
Test-ConfiguredRootHintsHealth $script:dnsServerList;
}
default {
LogComment $($validationSubType + " isn't a valid input ValidationType, skipping the validation.") $script:logLevel.Warning;
LogComment $("Choose '" + $script:allValidationType + "' or one or more validation types among below:`n" + $($script:validValidationTypes | Out-String)) `
$script:logLevel.Warning;
}
}
}
} catch {
LogComment $("Caught exception during Test-EnterpriseDnsHealth: `n" + $_.Exception) $script:logLevel.Error;
} Finally {
Stop-Transcript | Out-Null;
$logContent = Get-Content Test-EnterpriseDnsHealth.txt;
$logContent > Test-EnterpriseDnsHealth.txt | Out-Null;
} |
combined_dataset/train/non-malicious/Get-TranscriptFilePath.ps1 | Get-TranscriptFilePath.ps1 | #requires -version 2.0
function Get-TranscriptFilePath {
try {
$externalHost = $host.gettype().getproperty("ExternalHost",
[reflection.bindingflags]"nonpublic,instance").getvalue($host, @())
$externalhost.gettype().getfield("transcriptFileName", "nonpublic,instance").getvalue($externalhost)
} catch {
write-warning "This host does not support transcription."
}
}
|
combined_dataset/train/non-malicious/sample_22_98.ps1 | sample_22_98.ps1 | ConvertFrom-StringData @'
###PSLOC
DeployRole = Deploy '{0:RoleName}' role on '{1:MachineName}' machine.
DeployRoleFailed = Deployment of '{0:RoleName}' role failed on '{1:MachineName}' machine with Error: {2:ErrorMessage}.
CheckLogs = Check logs at '{0:FilePath}' on '{1:MachineName}' machine.
ConfigureRole = Configure '{0:RoleName}' role on '{1:MachineName}' machine.
ConfigureRoleFailed = Configuration of '{0:RoleName}' role failed on '{1:MachineName}' machine with Error: {2:ErrorMessage}.
WaitingForScheduleTask = Waiting for the scheduled tasks to finish.
ServiceDidNotStartup = Service {0:ServiceName} did not start on {1:ComputerName} computer after {2:ValueInSeconds} seconds.
ValidationTestStarting = Starting validation test for Role '{0:ServerRoleName}' on machine '{1:ComputerName}'
ValidationTestFailed = One or more validation test failed for Role '{0:ServerRoleName}' on machine '{1:ComputerName}'
ValidationTestNotAvailable = Validation test result is empty for Role '{0:ServerRoleName}' on machine '{1:ComputerName}'. Investigate whether test cases were not run.
ValidationTestFinished = Validation test for Role '{0:ServerRoleName}' finished on machine '{1:ComputerName}'
TestConnection = Test Connection on machine '{0:ComputerName}'
KeyValueNotProvided = The parameter '{0:ParameterName}' does not contain a value for the key '{1:KeyName}'
TestResultsLocation = For detailed test results look at file '{0:FullFilePath}'
TestParameterShouldBeProvided = Test parameter '{0:TestParameterName}' should not be null or empty.
CouldNotConnectToServerWarning = Could not connect to server '{0:ServerName}' using Test-WSMAN. Server may already be shutdown.
GettingCluster = Getting cluster '{0:ClusterName}'.
StoppingCluster = Stopping the cluster '{0:ClusterName}'.
CheckingClusterResources = Checking cluster: '{0:ClusterName}' resources: '{1:ResourceNames}' for online state.
ClusterStartedSuccessfully = Successfully started cluster: '{0:ClusterName}'.
ClusterNotReadyRestartingService = Cluster: '{0:ClusterName}' is not yet ready. Restarting the service on servers: '{1:ServerNames}'.
VerifyingCluster = Verifying cluster: '{0:ClusterName}' and its resources: '{1:ResourceNames}' are online.
ClusterAlreadyStarted = Cluster: '{0:ClusterName}' is already started and ready to receive requests.
SetClusterServiceToAutomatic = Setting Cluster: '{0:ClusterName}' service to automatic on servers: '{1:ServerNames}'.
UnableToGetCluster = Unable to get the sql cluster: '{0:ClusterName}'. Cluster may already be shutdown.
ClusterResourcesTimeout = The following cluster resources: '{0:ClusterResourceNames}' did not come online before timeout of '{1:ClusterTimeoutTime}' seconds.
UnableToGetClusterTimeout = Unable to get cluster: '{0:ClusterName}' before timeout of '{1:ClusterTimeoutTime}' seconds.
ParameterCannotBeEmptyOrNull = Parameter '{0:ParameterName}' cannot be empty or null.
TimeoutOccurred = A timeout has occurred after {0:NumberOfMinutes} minutes.
NodeToUpdateNotProvided = A machine name has not been provided to run update. Verify that the running action plan has a RoleName defined in the ExecutionContext node in the CustomerConfig.xml file.
ServiceShouldBeRunningOnMachine = Service '{0:ServiceName}' should be running on machine '{1:MachineName}'.
QueryingScalableNode = Querying Nodelist in '{0:machineRole}' for any node in '{1:ProvisioningStatus}' state and from '{2:Role}' role.
FoundNoScalableNode = No nodes in '{0:ProvisioningStatus}' state from '{1:Role}' role found in {2:machineRole} Nodelist."
FoundSomeScalableNodes = Found {0} Nodes in '{1:ProvisioningStatus}' state from '{2:Role}' role found in {3:machineRole} Nodelist."
'@
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBy2vpvlsrNHYuS
# qnc71e8aGy07FZ3F3l91RMYllA0DLaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFt3RQxzr5yjYcYUmgfb0Zw5
# W5GDNZdK4jnc+fOy4+kcMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAdDLlgx1bi6pMEQ5ECaMTO8zcmEN8sbGJPxEE12Dqc9pJ4vu7KT+a6NY4
# Xz3ulTgZjRDdIwAeHMYWEKU69h++FXKMSMqdPPgg8IxLS1OwFlBnZpZhm028+I1m
# Vsy6Kmo6Z4abDcn4k92OgUC/FuyLmgE1gcOCzqSY0X3YiGoCD4tMIJr9hQze/Omm
# MPJ+uGaA5zLQP9O07BaA69pO51K7y3LWBBapDJaiTxTfDQxPoEI/MhwhhvSoznuv
# uZYzksUFXgxYW/3zJGFmMqpE/VceH5NKQ3hBgHGMNjL2CVLcvkqYtrx1F8WAYBzf
# 7AuyxzaL/7Z/WEoMEwYL5NfqoHGTEqGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCB5IKL5Jy1DhCEo5INMu2pgrxy7L0VXfzxhIOR+iLUfBwIGZbwTIW8b
# GBMyMDI0MDIxMjE0MDkzMS43ODZaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAABAAAB8jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYvQBtnYJTtKKj2FKxzHx0f
# gV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29edzGdlWbCj1Qyx5HUHNY8y
# u9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv29h1ttNWsSc/KPOeuhzS
# AXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRYcINfXDhURvUfD70jioE9
# 2rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycTEOBdGVmf1HCD7WOaz5EE
# cQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZUzN+BzcLj96ixC7wJGQM
# BixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7b8M7vvwhEL0xCOvb7WFM
# sstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHDoYhgj9uqPLP7vnoXf7j6
# +LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoeh/r3fShL6CHgPoTB7oYU
# /d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69mL8BRtSZ6dG/GFEVE+fV
# mgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2t5DAoDkuKCbC+3VdPmlY
# VQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAxBM5cH8Bg0+Y64oZ5MB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00XpOgPabcN3QZeyipgilcQ
# SDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/taPnobF+8CkAdkcLQhLdk
# Shfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5tuvirFaUWzUWVDFOpo/O5
# zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRMiJMzxpUlvdfWGUtCvnW3
# eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmwpsCtUh7tR6whCrVYkb6F
# udBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xLzk0bNxsAj0uhd6QdWr6T
# T39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpURJ6YiDKQd5YVgxsuZCWv4
# Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB8iQ5W8ZLM5PwT8vtsKEB
# wHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cXWOMJUJzyEH4WSKZHOx53
# qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gVPplqNPDIvQ8DkZ3lvbQs
# Yqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspEK8hllq3IYcyX0v897+X9
# YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBr
# i943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XRomjAiGA8yMDI0MDIxMjA5NTEy
# MloYDzIwMjQwMjEzMDk1MTIyWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpdGia
# AgEAMAcCAQACAhIoMAcCAQACAhRTMAoCBQDpdboaAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBABW+tYgbAPR+oZCQHOd+wSgK8zCkDMJdxQjRkijYy18aYkva
# C9bgueZug2D3MkqyuStHRfU/gl1yxM5Siw8Civeo8cvRd0+QBWaOwJEhVoQRWSl/
# HAhpPqkB6t2GdrnOGnQfBbGaee1JvvZ/2qpMd3iaaOt6Ccw2n+3K6G39dt/d4EPI
# U4y4mjzRD59H47Stg/8g8oxN0MuNMsIqpG8raHlbZ6slT6S+2rufioM1eBAgKb/P
# piIYBzlqckFhaUQ1SbnS2+plre/hnmG9Eg3Wf6YevhqnC1JxFfhX+s3QeI2NlwFd
# uU8u+kirxzndHmgWnBszIN/ERMnYMyveR9RU1S8xggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+MtdkrHCRlAABAAAB8jAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCCeWjJN7ZOp8aGCfR2b65IUtREdIJy9bccIAjOaDUzKbzCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPjaPh0uMVJc04+Y4Ru5BUUbHE4s
# uZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQg+AA24QkUUyOE+ron3tucOKViVGjQ
# FIfFQSs5Iud3JxIwDQYJKoZIhvcNAQELBQAEggIAa68vEIjAy/TpCKFTE1sYAch5
# xUfE+3LLC/THozzf9jkVkXpD5T73/pAxzCYX/HnFQyAy7UutFGgHXBocmXndUD/k
# fyv+qde2YQTPFaGmqvhojYMioTW0wcKUflg/Zk2ZY7Ze2ysjFMrDPEB2n4c1m7ZS
# PWFrZJHTSCtBdL35NIVzJ0AC6XE3zBks4GvLZ3AYprNdk09dxkUUiN+nj57ccwmj
# nc510RJeFnuvSf4/GsCidDgT1LkRPGlQ6huvcYXQKN4ViIDlWEKvDlrDMEDnmcf6
# wmzvVvoUlfjpvLkIjLY7UnD6NqoGWCcZvRWuzqfa3ByeDzjKMpOrJIwBHsxV1E6P
# ESnGM1q13ZI8/pT4nrgjJmyZsSAY+pfWs3ptCEnm955cbW1I5XnJVSjvHNQEEn8v
# t0/ZOiM8DTPcahkpUtdRIiEu8LuMCFJzdxPyXbQ5Tu9wlRg9Hr4zwAwYfNlrf3pC
# FfxTrStmNRGjWEfRPcE1rClqjm3Edt3808YdLgGF6x4SZDDXGSDTDCg5Wb5ifFm7
# h8GzZHiZgsoOcBPSwoAzfpAT0QSd2nTdC9+NPZcHfvKVHi/2LgqYKQcmGVw4bvQl
# DlftHL9RguV2wQFm+rAAlmQ0jzP3xy3CjcKaPvgIFZuM2fDc1KgS3ycJWZIoZApY
# POVTrpf6DsWcVy+doNk=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_17_60.ps1 | sample_17_60.ps1 | #
# Module manifest for module 'OCI.PSModules.Loganalytics'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Loganalytics.dll'
# Version number of this module.
ModuleVersion = '73.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'a190d2eb-8d34-45b0-836a-ba4f1b2e1914'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Loganalytics Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Loganalytics.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCILoganalyticsEntityAssociation',
'Add-OCILoganalyticsSourceEventTypes',
'Confirm-OCILoganalyticsAssociationParameters',
'Confirm-OCILoganalyticsEndpoint', 'Confirm-OCILoganalyticsFile',
'Confirm-OCILoganalyticsLabelCondition',
'Confirm-OCILoganalyticsSource',
'Confirm-OCILoganalyticsSourceExtendedFieldDetails',
'Confirm-OCILoganalyticsSourceMapping',
'Disable-OCILoganalyticsArchiving',
'Disable-OCILoganalyticsAutoAssociation',
'Disable-OCILoganalyticsIngestTimeRule',
'Disable-OCILoganalyticsSourceEventTypes',
'Enable-OCILoganalyticsArchiving',
'Enable-OCILoganalyticsAutoAssociation',
'Enable-OCILoganalyticsIngestTimeRule',
'Enable-OCILoganalyticsSourceEventTypes',
'Export-OCILoganalyticsCustomContent',
'Export-OCILoganalyticsQueryResult',
'Get-OCILoganalyticsAssociableEntitiesList',
'Get-OCILoganalyticsAssociatedEntitiesList',
'Get-OCILoganalyticsAssociationSummary',
'Get-OCILoganalyticsAutoAssociationsList',
'Get-OCILoganalyticsCategoriesList', 'Get-OCILoganalyticsCategory',
'Get-OCILoganalyticsColumnNames',
'Get-OCILoganalyticsConfigWorkRequest',
'Get-OCILoganalyticsConfigWorkRequestsList',
'Get-OCILoganalyticsEffectivePropertiesList',
'Get-OCILoganalyticsEmBridge', 'Get-OCILoganalyticsEmBridgesList',
'Get-OCILoganalyticsEmBridgeSummary',
'Get-OCILoganalyticsEncryptionKeyInfoList',
'Get-OCILoganalyticsEntitiesList',
'Get-OCILoganalyticsEntitiesSummary', 'Get-OCILoganalyticsEntity',
'Get-OCILoganalyticsEntityAssociationsList',
'Get-OCILoganalyticsEntitySourceAssociationsList',
'Get-OCILoganalyticsEntityTopologyList',
'Get-OCILoganalyticsEntityType',
'Get-OCILoganalyticsEntityTypesList', 'Get-OCILoganalyticsField',
'Get-OCILoganalyticsFieldsList', 'Get-OCILoganalyticsFieldsSummary',
'Get-OCILoganalyticsIngestTimeRule',
'Get-OCILoganalyticsIngestTimeRulesList',
'Get-OCILoganalyticsLabel',
'Get-OCILoganalyticsLabelPrioritiesList',
'Get-OCILoganalyticsLabelsList',
'Get-OCILoganalyticsLabelSourceDetailsList',
'Get-OCILoganalyticsLabelSummary', 'Get-OCILoganalyticsLogGroup',
'Get-OCILoganalyticsLogGroupsList',
'Get-OCILoganalyticsLogGroupsSummary',
'Get-OCILoganalyticsLogSetsCount', 'Get-OCILoganalyticsLogSetsList',
'Get-OCILoganalyticsLookup', 'Get-OCILoganalyticsLookupsList',
'Get-OCILoganalyticsLookupSummary',
'Get-OCILoganalyticsMetaSourceTypesList',
'Get-OCILoganalyticsNamespace', 'Get-OCILoganalyticsNamespacesList',
'Get-OCILoganalyticsObjectCollectionRule',
'Get-OCILoganalyticsObjectCollectionRulesList',
'Get-OCILoganalyticsOverlappingRecallsList',
'Get-OCILoganalyticsParser',
'Get-OCILoganalyticsParserFunctionsList',
'Get-OCILoganalyticsParserMetaPluginsList',
'Get-OCILoganalyticsParsersList',
'Get-OCILoganalyticsParserSummary',
'Get-OCILoganalyticsPreferences',
'Get-OCILoganalyticsPropertiesMetadataList',
'Get-OCILoganalyticsQueryResult',
'Get-OCILoganalyticsQueryWorkRequest',
'Get-OCILoganalyticsQueryWorkRequestsList',
'Get-OCILoganalyticsRecallCount',
'Get-OCILoganalyticsRecalledDataList',
'Get-OCILoganalyticsRecalledDataSize',
'Get-OCILoganalyticsResourceCategoriesList',
'Get-OCILoganalyticsRulesList', 'Get-OCILoganalyticsRulesSummary',
'Get-OCILoganalyticsScheduledTask',
'Get-OCILoganalyticsScheduledTasksList',
'Get-OCILoganalyticsSource',
'Get-OCILoganalyticsSourceAssociationsList',
'Get-OCILoganalyticsSourceEventTypesList',
'Get-OCILoganalyticsSourceExtendedFieldDefinitionsList',
'Get-OCILoganalyticsSourceLabelOperatorsList',
'Get-OCILoganalyticsSourceMetaFunctionsList',
'Get-OCILoganalyticsSourcePatternsList',
'Get-OCILoganalyticsSourcesList',
'Get-OCILoganalyticsSourceSummary', 'Get-OCILoganalyticsStorage',
'Get-OCILoganalyticsStorageUsage',
'Get-OCILoganalyticsStorageWorkRequest',
'Get-OCILoganalyticsStorageWorkRequestErrorsList',
'Get-OCILoganalyticsStorageWorkRequestsList',
'Get-OCILoganalyticsSupportedCharEncodingsList',
'Get-OCILoganalyticsSupportedTimezonesList',
'Get-OCILoganalyticsUnprocessedDataBucket',
'Get-OCILoganalyticsUpload', 'Get-OCILoganalyticsUploadFilesList',
'Get-OCILoganalyticsUploadsList',
'Get-OCILoganalyticsUploadWarningsList',
'Get-OCILoganalyticsWarningsList', 'Get-OCILoganalyticsWorkRequest',
'Get-OCILoganalyticsWorkRequestErrorsList',
'Get-OCILoganalyticsWorkRequestLogsList',
'Get-OCILoganalyticsWorkRequestsList',
'Import-OCILoganalyticsCustomContent',
'Invoke-OCILoganalyticsAppendLookupData',
'Invoke-OCILoganalyticsAssignEncryptionKey',
'Invoke-OCILoganalyticsBatchGetBasicInfo',
'Invoke-OCILoganalyticsClean',
'Invoke-OCILoganalyticsCompareContent',
'Invoke-OCILoganalyticsEstimatePurgeDataSize',
'Invoke-OCILoganalyticsEstimateRecallDataSize',
'Invoke-OCILoganalyticsEstimateReleaseDataSize',
'Invoke-OCILoganalyticsExtractStructuredLogFieldPaths',
'Invoke-OCILoganalyticsExtractStructuredLogHeaderPaths',
'Invoke-OCILoganalyticsFilter',
'Invoke-OCILoganalyticsOffboardNamespace',
'Invoke-OCILoganalyticsOnboardNamespace',
'Invoke-OCILoganalyticsParseQuery',
'Invoke-OCILoganalyticsPauseScheduledTask',
'Invoke-OCILoganalyticsPurgeStorageData',
'Invoke-OCILoganalyticsQuery',
'Invoke-OCILoganalyticsRecallArchivedData',
'Invoke-OCILoganalyticsReleaseRecalledData',
'Invoke-OCILoganalyticsResumeScheduledTask',
'Invoke-OCILoganalyticsRun',
'Invoke-OCILoganalyticsSetUnprocessedDataBucket',
'Invoke-OCILoganalyticsSuggest',
'Invoke-OCILoganalyticsSuppressWarning',
'Invoke-OCILoganalyticsTestParser',
'Invoke-OCILoganalyticsUnsuppressWarning',
'Invoke-OCILoganalyticsUpsertAssociations',
'Invoke-OCILoganalyticsUpsertField',
'Invoke-OCILoganalyticsUpsertLabel',
'Invoke-OCILoganalyticsUpsertParser',
'Invoke-OCILoganalyticsUpsertSource',
'Invoke-OCILoganalyticsVerify',
'Move-OCILoganalyticsEmBridgeCompartment',
'Move-OCILoganalyticsEntityCompartment',
'Move-OCILoganalyticsIngestTimeRuleCompartment',
'Move-OCILoganalyticsLogGroupCompartment',
'Move-OCILoganalyticsObjectCollectionRuleCompartment',
'Move-OCILoganalyticsScheduledTaskCompartment',
'New-OCILoganalyticsEmBridge', 'New-OCILoganalyticsEntity',
'New-OCILoganalyticsEntityType',
'New-OCILoganalyticsIngestTimeRule', 'New-OCILoganalyticsLogGroup',
'New-OCILoganalyticsObjectCollectionRule',
'New-OCILoganalyticsScheduledTask',
'Register-OCILoganalyticsLookup',
'Remove-OCILoganalyticsAssociations',
'Remove-OCILoganalyticsEmBridge', 'Remove-OCILoganalyticsEntity',
'Remove-OCILoganalyticsEntityAssociations',
'Remove-OCILoganalyticsEntityType', 'Remove-OCILoganalyticsField',
'Remove-OCILoganalyticsIngestTimeRule',
'Remove-OCILoganalyticsLabel', 'Remove-OCILoganalyticsLogGroup',
'Remove-OCILoganalyticsLookup',
'Remove-OCILoganalyticsObjectCollectionRule',
'Remove-OCILoganalyticsParser', 'Remove-OCILoganalyticsPreferences',
'Remove-OCILoganalyticsResourceCategories',
'Remove-OCILoganalyticsScheduledTask',
'Remove-OCILoganalyticsSource',
'Remove-OCILoganalyticsSourceEventTypes',
'Remove-OCILoganalyticsUpload', 'Remove-OCILoganalyticsUploadFile',
'Remove-OCILoganalyticsUploadWarning',
'Stop-OCILoganalyticsQueryWorkRequest',
'Update-OCILoganalyticsEmBridge', 'Update-OCILoganalyticsEntity',
'Update-OCILoganalyticsEntityType',
'Update-OCILoganalyticsIngestTimeRule',
'Update-OCILoganalyticsLogGroup', 'Update-OCILoganalyticsLookup',
'Update-OCILoganalyticsLookupData',
'Update-OCILoganalyticsObjectCollectionRule',
'Update-OCILoganalyticsPreferences',
'Update-OCILoganalyticsResourceCategories',
'Update-OCILoganalyticsScheduledTask',
'Update-OCILoganalyticsStorage',
'Write-OCILoganalyticsDiscoveryData',
'Write-OCILoganalyticsLogEventsFile',
'Write-OCILoganalyticsLogFile',
'Write-OCILoganalyticsQueryWorkRequestBackground'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Loganalytics'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/1965.ps1 | 1965.ps1 |
Describe "Update-FormatData" -Tags "CI" {
BeforeEach {
$ps = [PowerShell]::Create()
}
Context "Validate Update-FormatData update correctly" {
It "Should not throw upon reloading previous formatting file" {
{ Update-FormatData } | Should -Not -throw
}
It "Should validly load formatting data" {
$path = Join-Path -Path $TestDrive -ChildPath "outputfile.ps1xml"
Get-FormatData -typename System.Diagnostics.Process | Export-FormatData -Path $path
$null = $ps.AddScript("Update-FormatData -prependPath $path")
$ps.Invoke()
$ps.HadErrors | Should -BeFalse
}
It "Update with atributes on Configuration node should be ignored" {
$xmlContent = @"
<Configuration xmlns:foo="bar">
<ViewDefinitions>
<View>
<Name>Test</Name>
<ViewSelectedBy>
<TypeName>Test</TypeName>
</ViewSelectedBy>
<ListControl>
<ListEntries>
<ListEntry>
<ListItems>
<ListItem>
<PropertyName>Test</PropertyName>
</ListItem>
</ListItems>
</ListEntry>
</ListEntries>
</ListControl>
</View>
</ViewDefinitions>
</Configuration>
"@
$path = "$testdrive\rootattribute.format.ps1xml"
Set-Content -Path $path -Value $xmlContent
$null = $ps.AddScript("Update-FormatData -prependPath $path")
$ps.Invoke()
$ps.HadErrors | Should -BeFalse
$ps.Commands.Clear()
$null = $ps.AddScript("Get-FormatData test")
$formatData = $ps.Invoke()
$formatData | Should -HaveCount 1
$formatData.TypeNames | Should -BeExactly "Test"
$formatData.FormatViewDefinition.Name | Should -BeExactly "Test"
}
}
}
Describe "Update-FormatData basic functionality" -Tags "CI" {
BeforeAll {
$testfilename = "testfile.ps1xml"
$testfile = Join-Path -Path $TestDrive -ChildPath $testfilename
$xmlContent=@"
<Types>
<Type>
<Name>AnyName</Name>
<Members>
<PropertySet>
<Name>PropertySetName</Name>
<ReferencedProperties>
<Name>FirstName</Name>
<Name>LastName</Name>
</ReferencedProperties>
</PropertySet>
</Members>
</Type>
</Types>
"@
$xmlContent > $testfile
}
It "Update-FormatData with WhatIf should work"{
{ Update-FormatData -Append $testfile -WhatIf } | Should -Not -Throw
{ Update-FormatData -Prepend $testfile -WhatIf } | Should -Not -Throw
}
It "Update with invalid format xml should fail" {
$xmlContent = @"
<Configuration>
<ViewDefinitions>
<View>
<Name>T2</Name>
</View>
</ViewDefinitions>
</Configuration>
"@
$xmlContent | Out-File -FilePath "$testdrive\invalid.format.ps1xml" -Encoding ascii
{ Update-FormatData -Path "$testdrive\invalid.format.ps1xml" -ErrorAction Stop } | Should -Throw -ErrorId "FormatXmlUpdateException,Microsoft.PowerShell.Commands.UpdateFormatDataCommand"
}
}
Describe "Update-FormatData with resources in CustomControls" -Tags "CI" {
BeforeAll {
$templatePath = Join-Path $PSScriptRoot (Join-Path 'assets' 'UpdateFormatDataTests.format.ps1xml')
$formatFilePath = Join-Path $TestDrive 'UpdateFormatDataTests.format.ps1xml'
$ps = [powershell]::Create()
$iss = [system.management.automation.runspaces.initialsessionstate]::CreateDefault2()
$rs = [system.management.automation.runspaces.runspacefactory]::CreateRunspace($iss)
$rs.Open()
$ps.Runspace = $rs
}
AfterAll {
$rs.Close()
$ps.Dispose()
}
Context "Validate Update-FormatData" {
It "Resources in WindowsPS syntax should be loaded successfully" {
$format = Get-Content -Path $templatePath -Raw
$format.Replace("%BaseName%","FileSystemProviderStrings") | Set-Content -Path $formatFilePath -Force
$null = $ps.AddScript("Update-FormatData -PrependPath $formatFilePath")
$ps.Streams.Error.Clear()
$ps.Invoke()
$ps.Streams.Error | Should -BeNullOrEmpty
}
It "Resources in CorePS syntax should be loaded successfully" {
$format = Get-Content -Path $templatePath -Raw
$format.Replace("%BaseName%","System.Management.Automation.resources.FileSystemProviderStrings") | Set-Content -Path $formatFilePath -Force
$null = $ps.AddScript("Update-FormatData -PrependPath $formatFilePath")
$ps.Streams.Error.Clear()
$ps.Invoke()
$ps.Streams.Error | Should -BeNullOrEmpty
}
It "Verify assembly path in error message when resource is Not found" {
$format = Get-Content -Path $templatePath -Raw
$format.Replace("%BaseName%","NonExistingResource") | Set-Content -Path $formatFilePath -Force
$null = $ps.AddScript("Update-FormatData -PrependPath $formatFilePath")
$ps.Streams.Error.Clear()
$ps.Invoke()
$sma = [appdomain]::CurrentDomain.GetAssemblies() | Where-Object { if ($_.Location) {$_.Location.EndsWith("System.Management.Automation.dll")}}
$smaLocation = $sma.Location
$ps.Streams.Error | ForEach-Object { $_.Exception.Message.Contains($smaLocation) | Should -BeTrue }
$ps.Streams.Error | ForEach-Object { $_.FullyQualifiedErrorId | Should -Match 'FormatXmlUpdateException' }
}
}
}
|
combined_dataset/train/non-malicious/156.ps1 | 156.ps1 |
function Get-DistributionGroupMemberRecursive
{
[CmdletBinding()]
PARAM ($Group)
BEGIN
{
TRY
{
Write-Verbose -Message "[BEGIN] Retrieving members of $Group"
$GroupMembers = Get-DistributionGroupMember -Identity $Group -ErrorAction Stop -ErrorVariable ErrorBeginGetDistribMembers |
Select-object -Property Name, PrimarySMTPAddress, @{ Label = "Group"; Expression = { $Group } }, RecipientType
}
CATCH
{
Write-Warning -Message "[BEGIN] Something wrong happened"
if ($ErrorBeginGetDistribMembers) { Write-Warning -Message "[BEGIN] Issue while retrieving members of $Group" }
Write-Warning -Message $Error[0].Exception.Message
}
}
PROCESS
{
FOREACH ($Member in $GroupMembers)
{
TRY
{
Write-verbose "[PROCESS] Member: $($member.name)"
SWITCH ($Member.RecipientType)
{
"MailUniversalDistributionGroup" {
Get-DistributionGroupMemberRecursive -Group $($Member.name) |
Select-Object -Property Name, PrimarySMTPAddress, @{ Label = "Group"; Expression = { $($Member.name) } }, RecipientType
Write-Verbose -Message "[PROCESS] $($Member.name)"
}
"UserMailbox" {
$Member | Select-object -Property Name, PrimarySMTPAddress, @{ Label = "Group"; Expression = { $Group } }
}
}
}
CATCH
{
Write-Warning -Message "[PROCESS] Something wrong happened"
Write-Warning -Message $Error[0].Exception.Message
}
}
}
END
{
Write-Verbose -message "[END] Done"
}
}
|
combined_dataset/train/non-malicious/sample_32_22.ps1 | sample_32_22.ps1 | @{
RootModule = 'PSReadLine.psm1'
NestedModules = @("Microsoft.PowerShell.PSReadLine2.dll")
ModuleVersion = '2.1.0'
GUID = '5714753b-2afd-4492-a5fd-01d9e2cff8b5'
Author = 'Microsoft Corporation'
CompanyName = 'Microsoft Corporation'
Copyright = '(c) Microsoft Corporation. All rights reserved.'
Description = 'Great command line editing in the PowerShell console host'
PowerShellVersion = '5.0'
DotNetFrameworkVersion = '4.6.1'
CLRVersion = '4.0.0'
FormatsToProcess = 'PSReadLine.format.ps1xml'
AliasesToExport = @()
FunctionsToExport = 'PSConsoleHostReadLine'
CmdletsToExport = 'Get-PSReadLineKeyHandler','Set-PSReadLineKeyHandler','Remove-PSReadLineKeyHandler',
'Get-PSReadLineOption','Set-PSReadLineOption'
HelpInfoURI = 'https://aka.ms/powershell71-help'
}
# SIG # Begin signature block
# MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDmogoFH4ntis+T
# 6gP1N8mtfHlIGRThbw/NPLqG1dcX2KCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINdd
# SWYuY7JlxXf6lBHSiWYiHbWgRD/EKwJ7FzEQBlVHMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAfYW1XYKIbj6BdDZBbE6vVQeALVJPuDHVKhIS
# NJndFlG/fZOucgp/jvS4Muvz/EQChx1VxjawkaSKahGtWYmmDy8UZ28jhmgjrsCy
# CLL0hNhza8YBehgryfqopNXYfU9ukIFDZ3918tevPFfmK82HZhvCxIrUMHHWDLtj
# Ewm8WaHkHXF2peINY+zJc1Q4/Vc8vARt+t8U/cndrPoj1CPcytD4f5QnioghgMyr
# yqHGw9JunE4jcJCEE2qR1mvw4GWMQXjga6a/15BPklFOpzQ0SzNY/mEou3bGfwlB
# mWgcocTM70m/2UmU8GTTxYfQud/zLGAEoi0LWJ2R4ESKbwcV/qGCF5cwgheTBgor
# BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDfHNYPiF74QM8j2SKeWptHZkyEtj5QT6aD
# AYcYTov2XQIGZc4N4zkcGBMyMDI0MDIyMDE4MTgzOS45NjVaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQAB
# AAAB8zANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ2MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngq
# YAb+z3IfzNpZIWS/sgfXhlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz
# 8zcn1aUD5D2r2PhzVKjHtivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVo
# mOybQ7+2jc4afzj2XJQQSmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiI
# YlGf+XV2u6oQHAkMG56xYPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxc
# QGXjnAgeeVbbPbAoELhbw+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3x
# uw3R7fJsqe7pqsnjwvniP7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE
# 71EYrcSNrOGlTm5uqq+syO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxL
# CSzqXOVOzdqA8O5Xa3E41j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJ
# wBj2FQgTiVHacvMQDgSA7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wF
# kBrf2Sjn+ieNq6Fx0tWj8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+
# cwdJ39REU43aWCwn0C+XxwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEM
# jA3ApoUx9qDrDQokMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc
# 3liO4c7nXM/UKFcAm5w61FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15
# j7q8e6elg8/cD3bv0sW4Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2s
# gAUh7+OZnb9TwJE7pbEBPJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaA
# GooT4A15/7oNj9zyzRABTUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0
# SZ8Zq65iK2hQ8IMAOVxewCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B
# 7E2odVfs6H2EYCZxUS1rgReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQ
# n5IzhfCkraT1KnZF8TI3ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9v
# ErDVBDRMjGsE/HqqY7QTSTtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5
# aOa31FyCM17/pPTIKTRiKsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJ
# IcqopVAwdbNdroZi2HN8nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc0
# 5DW8JNvZ328Jps3LJCALt0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQBu+gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6X8jhzAi
# GA8yMDI0MDIyMDEzMTEzNVoYDzIwMjQwMjIxMTMxMTM1WjB3MD0GCisGAQQBhFkK
# BAExLzAtMAoCBQDpfyOHAgEAMAoCAQACAgrFAgH/MAcCAQACAhWzMAoCBQDpgHUH
# AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh
# CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAJlwQPHTlhzgOweThT2RDkwy
# So7JUzoEEosawP9we2bTQNlvhX4I43E7uS7zdfTqekvQjw490TQJyByljXgKErPz
# 43tW7d/zya9K0oqLJXp/HyKzsnsZTjzeXvQHzO8dpEAT6rqZIZEaUC5iufZP2Q2m
# 3SfEWcQkQ7yGXxI1KqJGHYvf1RTNIulMvzDDqi4qKQTPPhGBd7xIK70/kQpLsb7I
# CCONj9kW74FyxDrUWVHdyLs6uAz9FDU/Dbfw1Zx8qz07VoC42IlA8t2qUkQEpLwW
# dtZETELFFPcZ5e5LhU7zogcv78ITSbrkU+y/jNBVRroTgAExthmHrotYaqx29bIx
# ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
# bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0
# aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA
# AfPFCkOuA8wdMQABAAAB8zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD
# MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDYl1zzrrzCjpuQoHqeAtM6
# MArE4hoCCodsuIus4pcf3zCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi8
# 2TSLtuG4Vkp8wBmJk/T+RAh841sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQg45QO
# +h3Q3x/fdifPtogmNTfDo+rA0YFwdxQXJqT1TM4wDQYJKoZIhvcNAQELBQAEggIA
# CQQsRC2WzRt/hspBpSKNTfofPLMQrZPk/jyLIaeC/NRgG7mMYz4s7IL8iVtLnRx0
# f3exVExHADuWYJLtzTGXdOQSOXg5jiotG88kSnN5aznzbVHwN0cf5n7f0D3JZkTx
# gkPteC/fAsKUa/r+vcEN5zf3/KdGJxy6oCnWMbXZUCAl+bxY+3k3pu/UvRW6eXsN
# MlHmeDEHp7HQiPgPDNnI+OdJRpFWygc3PDcGPWRPdbwsHUiSC4hWA+HfNxfW3XeB
# d8dL8T2vWOhQTjKNE2b9JrNxczE/Smud161uq+NHk/KmV1KEiLhz4hcjJYPfAOiH
# ojJw9eHHSCGg6s2Qa+Ef6cesvzDjKd7MWZJ8sdR/uTXpvpVPkvd47vdFK40YCjd+
# GeKY9qZMWT3Vgv9MB+CpW4SX93N3fqCuKsnm7b8tFOTfmQAsZSQGcNFT+UWk29Vi
# X3UoLdulatmMmTos3xOWsGfbkpVRqHUnGrw+JU30YFHfhmGlY/tXmdeIsj/1hYwA
# 6X05PJSqQYhYGFM69929c9953Qry+kZ+DMPYsu/p7aEvNsrleGGd01C0aa9TJgWi
# f6ZitzBZHFfCfU6ufYFcGImLO5VzLGNQN0ewnYVYpfQ8x0Uns4mFaUVqoFlLLK/e
# RGZzrURxMbE/eU8dFT3rBxDKa42YFoR0VN1XaBWAGvA=
# SIG # End signature block
|
combined_dataset/train/non-malicious/3007.ps1 | 3007.ps1 | $Script:ReportStrings = DATA {
@{
HeaderMessage = @'
____ __
/ __ \___ _____/ /____ _____
/ /_/ / _ \/ ___/ __/ _ \/ ___/
/ ____/ __(__ ) /_/ __/ /
/_/ \___/____/\__/\___/_/
Pester v{0}
'@
StartMessage = "Executing all tests in '{0}'"
FilterMessage = ' matching test name {0}'
TagMessage = ' with Tags {0}'
MessageOfs = "', '"
CoverageTitle = 'Code coverage report:'
CoverageMessage = 'Covered {2:P2} of {3:N0} analyzed {0} in {4:N0} {1}.'
MissedSingular = 'Missed command:'
MissedPlural = 'Missed commands:'
CommandSingular = 'Command'
CommandPlural = 'Commands'
FileSingular = 'File'
FilePlural = 'Files'
Describe = 'Describing {0}'
Script = 'Executing script {0}'
Context = 'Context {0}'
Margin = ' '
Timing = 'Tests completed in {0}'
ContextsPassed = ''
ContextsFailed = ''
TestsPassed = 'Tests Passed: {0}, '
TestsFailed = 'Failed: {0}, '
TestsSkipped = 'Skipped: {0}, '
TestsPending = 'Pending: {0}, '
TestsInconclusive = 'Inconclusive: {0} '
}
}
$Script:ReportTheme = DATA {
@{
Describe = 'Green'
DescribeDetail = 'DarkYellow'
Context = 'Cyan'
ContextDetail = 'DarkCyan'
Pass = 'DarkGreen'
PassTime = 'DarkGray'
Fail = 'Red'
FailTime = 'DarkGray'
Skipped = 'Yellow'
SkippedTime = 'DarkGray'
Pending = 'Gray'
PendingTime = 'DarkGray'
Inconclusive = 'Gray'
InconclusiveTime = 'DarkGray'
Incomplete = 'Yellow'
IncompleteTime = 'DarkGray'
Foreground = 'White'
Information = 'DarkGray'
Coverage = 'White'
CoverageWarn = 'DarkRed'
}
}
function Format-PesterPath ($Path, [String]$Delimiter) {
if ($null -eq $Path) {
$null
}
elseif ($Path -is [String]) {
$Path
}
elseif ($Path -is [hashtable]) {
$Path.Path
}
elseif ($null -ne ($path -as [hashtable[]])) {
($path | ForEach-Object { $_.Path }) -join $Delimiter
}
elseif ($Path -as [String[]]) {
$Path -join $Delimiter
}
}
function Write-PesterStart {
param(
[Parameter(mandatory = $true, valueFromPipeline = $true)]
$PesterState,
$Path = '.'
)
process {
if (-not ( $pester.Show | Has-Flag 'Header')) {
return
}
$OFS = $ReportStrings.MessageOfs
$moduleInfo = $MyInvocation.MyCommand.ScriptBlock.Module
$moduleVersion = $moduleInfo.Version.ToString()
if ($moduleInfo.PrivateData.PSData.Prerelease) {
$moduleVersion += "-$($moduleInfo.PrivateData.PSData.Prerelease)"
}
$message = $ReportStrings.HeaderMessage -f $moduleVersion
$message += [Environment]::NewLine
$message += $ReportStrings.StartMessage -f (Format-PesterPath $Path -Delimiter $OFS)
if ($PesterState.TestNameFilter) {
$message += $ReportStrings.FilterMessage -f "$($PesterState.TestNameFilter)"
}
if ($PesterState.ScriptBlockFilter) {
$m = $(foreach ($m in $PesterState.ScriptBlockFilter) { "$($m.Path):$($m.Line)" }) -join ", "
$message += $ReportStrings.FilterMessage -f $m
}
if ($PesterState.TagFilter) {
$message += $ReportStrings.TagMessage -f "$($PesterState.TagFilter)"
}
& $SafeCommands['Write-Host'] $message -Foreground $ReportTheme.Foreground
}
}
function Write-Describe {
param (
[Parameter(mandatory = $true, valueFromPipeline = $true)]
$Describe,
[string] $CommandUsed = 'Describe'
)
process {
if (-not ( $pester.Show | Has-Flag Describe)) {
return
}
$margin = $ReportStrings.Margin * $pester.IndentLevel
$Text = if ($Describe.PSObject.Properties['Name'] -and $Describe.Name) {
$ReportStrings.$CommandUsed -f $Describe.Name
}
else {
$ReportStrings.$CommandUsed -f $Describe
}
& $SafeCommands['Write-Host']
& $SafeCommands['Write-Host'] "${margin}${Text}" -ForegroundColor $ReportTheme.Describe
if ($Describe.PSObject.Properties['Description'] -and $Describe.Description) {
$Describe.Description -split "$([System.Environment]::NewLine)" | ForEach-Object {
& $SafeCommands['Write-Host'] ($ReportStrings.Margin * ($pester.IndentLevel + 1)) $_ -ForegroundColor $ReportTheme.DescribeDetail
}
}
}
}
function Write-Context {
param (
[Parameter(mandatory = $true, valueFromPipeline = $true)]
$Context
)
process {
if (-not ( $pester.Show | Has-Flag Context)) {
return
}
$Text = if ($Context.PSObject.Properties['Name'] -and $Context.Name) {
$ReportStrings.Context -f $Context.Name
}
else {
$ReportStrings.Context -f $Context
}
& $SafeCommands['Write-Host']
& $SafeCommands['Write-Host'] ($ReportStrings.Margin + $Text) -ForegroundColor $ReportTheme.Context
if ($Context.PSObject.Properties['Description'] -and $Context.Description) {
$Context.Description -split "$([System.Environment]::NewLine)" | ForEach-Object {
& $SafeCommands['Write-Host'] (" " * $ReportStrings.Context.Length) $_ -ForegroundColor $ReportTheme.ContextDetail
}
}
}
}
function ConvertTo-PesterResult {
param(
[String] $Name,
[Nullable[TimeSpan]] $Time,
[System.Management.Automation.ErrorRecord] $ErrorRecord
)
$testResult = @{
Name = $Name
Time = $time
FailureMessage = ""
StackTrace = ""
ErrorRecord = $null
Success = $false
Result = "Failed"
}
if (-not $ErrorRecord) {
$testResult.Result = "Passed"
$testResult.Success = $true
return $testResult
}
if (@('PesterAssertionFailed', 'PesterTestSkipped', 'PesterTestInconclusive', 'PesterTestPending') -contains $ErrorRecord.FullyQualifiedErrorID) {
$details = $ErrorRecord.TargetObject
$failureMessage = $details.Message
$file = $details.File
$line = $details.Line
$Text = $details.LineText
if (-not $Pester.Strict) {
switch ($ErrorRecord.FullyQualifiedErrorID) {
PesterTestInconclusive {
$testResult.Result = "Inconclusive"; break;
}
PesterTestPending {
$testResult.Result = "Pending"; break;
}
PesterTestSkipped {
$testResult.Result = "Skipped"; break;
}
}
}
}
else {
$failureMessage = $ErrorRecord.ToString()
$file = $ErrorRecord.InvocationInfo.ScriptName
$line = $ErrorRecord.InvocationInfo.ScriptLineNumber
$Text = $ErrorRecord.InvocationInfo.Line
}
$testResult.FailureMessage = $failureMessage
$testResult.StackTrace = "at <ScriptBlock>, ${file}: line ${line}$([System.Environment]::NewLine)${line}: ${Text}"
$testResult.ErrorRecord = $ErrorRecord
return $testResult
}
function Remove-Comments ($Text) {
$text -replace "(?s)()" -replace "\
}
function Write-PesterResult {
param (
[Parameter(mandatory = $true, valueFromPipeline = $true)]
$TestResult
)
process {
$quiet = $pester.Show -eq [Pester.OutputTypes]::None
$OutputType = [Pester.OutputTypes] $TestResult.Result
$writeToScreen = $pester.Show | Has-Flag $OutputType
$skipOutput = $quiet -or (-not $writeToScreen)
if ($skipOutput) {
return
}
$margin = $ReportStrings.Margin * ($pester.IndentLevel + 1)
$error_margin = $margin + $ReportStrings.Margin
$output = $TestResult.Name
$humanTime = Get-HumanTime $TestResult.Time.TotalSeconds
if (-not ($OutputType | Has-Flag 'Default, Summary')) {
switch ($TestResult.Result) {
Passed {
& $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.Pass "$margin[+] $output" -NoNewLine
& $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.PassTime " $humanTime"
break
}
Failed {
& $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.Fail "$margin[-] $output" -NoNewLine
& $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.FailTime " $humanTime"
if ($pester.IncludeVSCodeMarker) {
& $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.Fail $($TestResult.StackTrace -replace '(?m)^', $error_margin)
& $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.Fail $($TestResult.FailureMessage -replace '(?m)^', $error_margin)
}
else {
$TestResult.ErrorRecord |
ConvertTo-FailureLines |
ForEach-Object {$_.Message + $_.Trace} |
ForEach-Object { & $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.Fail $($_ -replace '(?m)^', $error_margin) }
}
break
}
Skipped {
$targetObject = if ($null -ne $testresult.ErrorRecord -and
($o = $testresult.ErrorRecord.PSObject.Properties.Item("TargetObject"))) { $o.Value }
$because = if ($targetObject -and $targetObject.Data.Because) {
", because $($testresult.ErrorRecord.TargetObject.Data.Because)"
}
else {
$null
}
& $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.Skipped "$margin[!] $output" -NoNewLine
& $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.Skipped ", is skipped$because" -NoNewLine
& $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.SkippedTime " $humanTime"
break
}
Pending {
$because = if ($testresult.ErrorRecord.TargetObject.Data.Because) {
", because $($testresult.ErrorRecord.TargetObject.Data.Because)"
}
else {
$null
}
& $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.Pending "$margin[?] $output" -NoNewLine
& $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.Pending ", is pending$because" -NoNewLine
& $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.PendingTime " $humanTime"
break
}
Inconclusive {
$because = if ($testresult.ErrorRecord.TargetObject.Data.Because) {
", because $($testresult.ErrorRecord.TargetObject.Data.Because)"
}
else {
$null
}
& $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.Inconclusive "$margin[?] $output" -NoNewLine
& $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.Inconclusive ", is inconclusive$because" -NoNewLine
& $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.InconclusiveTime " $humanTime"
break
}
default {
if ($null -eq $TestResult.Time) {
& $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.Incomplete "$margin[?] $output" -NoNewLine
& $SafeCommands['Write-Host'] -ForegroundColor $ReportTheme.IncompleteTime " $humanTime"
}
}
}
}
}
}
function Write-PesterReport {
param (
[Parameter(mandatory = $true, valueFromPipeline = $true)]
$PesterState
)
if (-not ($PesterState.Show | Has-Flag Summary)) {
return
}
& $SafeCommands['Write-Host'] ($ReportStrings.Timing -f (Get-HumanTime $PesterState.Time.TotalSeconds)) -Foreground $ReportTheme.Foreground
$Success, $Failure = if ($PesterState.FailedCount -gt 0) {
$ReportTheme.Foreground, $ReportTheme.Fail
}
else {
$ReportTheme.Pass, $ReportTheme.Information
}
$Skipped = if ($PesterState.SkippedCount -gt 0) {
$ReportTheme.Skipped
}
else {
$ReportTheme.Information
}
$Pending = if ($PesterState.PendingCount -gt 0) {
$ReportTheme.Pending
}
else {
$ReportTheme.Information
}
$Inconclusive = if ($PesterState.InconclusiveCount -gt 0) {
$ReportTheme.Inconclusive
}
else {
$ReportTheme.Information
}
Try {
$PesterStatePassedScenariosCount = $PesterState.PassedScenarios.Count
}
Catch {
$PesterStatePassedScenariosCount = 0
}
Try {
$PesterStateFailedScenariosCount = $PesterState.FailedScenarios.Count
}
Catch {
$PesterStateFailedScenariosCount = 0
}
if ($ReportStrings.ContextsPassed) {
& $SafeCommands['Write-Host'] ($ReportStrings.ContextsPassed -f $PesterStatePassedScenariosCount) -Foreground $Success -NoNewLine
& $SafeCommands['Write-Host'] ($ReportStrings.ContextsFailed -f $PesterStateFailedScenariosCount) -Foreground $Failure
}
if ($ReportStrings.TestsPassed) {
& $SafeCommands['Write-Host'] ($ReportStrings.TestsPassed -f $PesterState.PassedCount) -Foreground $Success -NoNewLine
& $SafeCommands['Write-Host'] ($ReportStrings.TestsFailed -f $PesterState.FailedCount) -Foreground $Failure -NoNewLine
& $SafeCommands['Write-Host'] ($ReportStrings.TestsSkipped -f $PesterState.SkippedCount) -Foreground $Skipped -NoNewLine
& $SafeCommands['Write-Host'] ($ReportStrings.TestsPending -f $PesterState.PendingCount) -Foreground $Pending -NoNewLine
& $SafeCommands['Write-Host'] ($ReportStrings.TestsInconclusive -f $PesterState.InconclusiveCount) -Foreground $Inconclusive
}
}
function Write-CoverageReport {
param ([object] $CoverageReport)
if ($null -eq $CoverageReport -or ($pester.Show -eq [Pester.OutputTypes]::None) -or $CoverageReport.NumberOfCommandsAnalyzed -eq 0) {
return
}
$totalCommandCount = $CoverageReport.NumberOfCommandsAnalyzed
$fileCount = $CoverageReport.NumberOfFilesAnalyzed
$executedPercent = ($CoverageReport.NumberOfCommandsExecuted / $CoverageReport.NumberOfCommandsAnalyzed).ToString("P2")
$command = if ($totalCommandCount -gt 1) {
$ReportStrings.CommandPlural
}
else {
$ReportStrings.CommandSingular
}
$file = if ($fileCount -gt 1) {
$ReportStrings.FilePlural
}
else {
$ReportStrings.FileSingular
}
$commonParent = Get-CommonParentPath -Path $CoverageReport.AnalyzedFiles
$report = $CoverageReport.MissedCommands | & $SafeCommands['Select-Object'] -Property @(
@{ Name = 'File'; Expression = { Get-RelativePath -Path $_.File -RelativeTo $commonParent } }
'Class'
'Function'
'Line'
'Command'
)
& $SafeCommands['Write-Host']
& $SafeCommands['Write-Host'] $ReportStrings.CoverageTitle -Foreground $ReportTheme.Coverage
if ($CoverageReport.MissedCommands.Count -gt 0) {
& $SafeCommands['Write-Host'] ($ReportStrings.CoverageMessage -f $command, $file, $executedPercent, $totalCommandCount, $fileCount) -Foreground $ReportTheme.CoverageWarn
if ($CoverageReport.MissedCommands.Count -eq 1) {
& $SafeCommands['Write-Host'] $ReportStrings.MissedSingular -Foreground $ReportTheme.CoverageWarn
}
else {
& $SafeCommands['Write-Host'] $ReportStrings.MissedPlural -Foreground $ReportTheme.CoverageWarn
}
$report | & $SafeCommands['Format-Table'] -AutoSize | & $SafeCommands['Out-Host']
}
else {
& $SafeCommands['Write-Host'] ($ReportStrings.CoverageMessage -f $command, $file, $executedPercent, $totalCommandCount, $fileCount) -Foreground $ReportTheme.Coverage
}
}
function ConvertTo-FailureLines {
param (
[Parameter(mandatory = $true, valueFromPipeline = $true)]
$ErrorRecord
)
process {
$lines = & $script:SafeCommands['New-Object'] psobject -Property @{
Message = @()
Trace = @()
}
$exception = $ErrorRecord.Exception
$exceptionLines = @()
while ($exception) {
$exceptionName = $exception.GetType().Name
$thisLines = $exception.Message.Split([string[]]($([System.Environment]::NewLine), "\n", "`n"), [System.StringSplitOptions]::RemoveEmptyEntries)
if ($ErrorRecord.FullyQualifiedErrorId -ne 'PesterAssertionFailed' -and $thisLines.Length -gt 0) {
$thisLines[0] = "$exceptionName`: $($thisLines[0])"
}
[array]::Reverse($thisLines)
$exceptionLines += $thisLines
$exception = $exception.InnerException
}
[array]::Reverse($exceptionLines)
$lines.Message += $exceptionLines
if ($ErrorRecord.FullyQualifiedErrorId -eq 'PesterAssertionFailed') {
$lines.Message += "$($ErrorRecord.TargetObject.Line)`: $($ErrorRecord.TargetObject.LineText)".Split([string[]]($([System.Environment]::NewLine), "\n", "`n"), [System.StringSplitOptions]::RemoveEmptyEntries)
}
if ( -not ($ErrorRecord | & $SafeCommands['Get-Member'] -Name ScriptStackTrace) ) {
if ($ErrorRecord.FullyQualifiedErrorID -eq 'PesterAssertionFailed') {
$lines.Trace += "at line: $($ErrorRecord.TargetObject.Line) in $($ErrorRecord.TargetObject.File)"
}
else {
$lines.Trace += "at line: $($ErrorRecord.InvocationInfo.ScriptLineNumber) in $($ErrorRecord.InvocationInfo.ScriptName)"
}
return $lines
}
if ($null -ne $ErrorRecord.ScriptStackTrace) {
$traceLines = $ErrorRecord.ScriptStackTrace.Split([Environment]::NewLine, [System.StringSplitOptions]::RemoveEmptyEntries)
}
$count = 0
If ((GetPesterOS) -ne 'Windows') {
[String]$pattern1 = '^at (Invoke-Test|Context|Describe|InModuleScope|Invoke-Pester), .*/Functions/.*.ps1: line [0-9]*$'
[String]$pattern2 = '^at Should<End>, .*/Functions/Assertions/Should.ps1: line [0-9]*$'
[String]$pattern3 = '^at Assert-MockCalled, .*/Functions/Mock.ps1: line [0-9]*$'
[String]$pattern4 = '^at Invoke-Assertion, .*/Functions/.*.ps1: line [0-9]*$'
[String]$pattern5 = '^at (<ScriptBlock>|Invoke-Gherkin.*), (<No file>|.*/Functions/.*.ps1): line [0-9]*$'
[String]$pattern6 = '^at Invoke-LegacyAssertion, .*/Functions/.*.ps1: line [0-9]*$'
}
Else {
[String]$pattern1 = '^at (Invoke-Test|Context|Describe|InModuleScope|Invoke-Pester), .*\\Functions\\.*.ps1: line [0-9]*$'
[String]$pattern2 = '^at Should<End>, .*\\Functions\\Assertions\\Should.ps1: line [0-9]*$'
[String]$pattern3 = '^at Assert-MockCalled, .*\\Functions\\Mock.ps1: line [0-9]*$'
[String]$pattern4 = '^at Invoke-Assertion, .*\\Functions\\.*.ps1: line [0-9]*$'
[String]$pattern5 = '^at (<ScriptBlock>|Invoke-Gherkin.*), (<No file>|.*\\Functions\\.*.ps1): line [0-9]*$'
[String]$pattern6 = '^at Invoke-LegacyAssertion, .*\\Functions\\.*.ps1: line [0-9]*$'
}
foreach ( $line in $traceLines ) {
if ( $line -match $pattern1 ) {
break
}
$count ++
}
if ($ExecutionContext.SessionState.PSVariable.GetValue("PesterDebugPreference_ShowFullErrors")) {
$lines.Trace += $traceLines
}
else {
$lines.Trace += $traceLines |
& $SafeCommands['Select-Object'] -First $count |
& $SafeCommands['Where-Object'] {
$_ -notmatch $pattern2 -and
$_ -notmatch $pattern3 -and
$_ -notmatch $pattern4 -and
$_ -notmatch $pattern5 -and
$_ -notmatch $pattern6
}
}
return $lines
}
}
|
combined_dataset/train/non-malicious/sample_62_94.ps1 | sample_62_94.ps1 |
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Create an in-memory object for DeliveryRuleCacheKeyQueryStringAction.
.Description
Create an in-memory object for DeliveryRuleCacheKeyQueryStringAction.
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.Cdn.Models.Api20240201.DeliveryRuleCacheKeyQueryStringAction
.Link
https://learn.microsoft.com/powershell/module/Az.Cdn/new-AzCdnDeliveryRuleCacheKeyQueryStringActionObject
#>
function New-AzCdnDeliveryRuleCacheKeyQueryStringActionObject {
[OutputType('Microsoft.Azure.PowerShell.Cmdlets.Cdn.Models.Api20240201.DeliveryRuleCacheKeyQueryStringAction')]
[CmdletBinding(PositionalBinding=$false)]
Param(
[Parameter(HelpMessage="query parameters to include or exclude (comma separated).")]
[string]
$ParameterQueryParameter,
[Parameter(Mandatory, HelpMessage="Caching behavior for the requests.")]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.Cdn.Support.QueryStringBehavior])]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Support.QueryStringBehavior]
$ParameterQueryStringBehavior,
[Parameter(Mandatory, HelpMessage="The name of the action for the delivery rule.")]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.Cdn.Support.DeliveryRuleAction])]
[Microsoft.Azure.PowerShell.Cmdlets.Cdn.Support.DeliveryRuleAction]
$Name
)
process {
$Object = [Microsoft.Azure.PowerShell.Cmdlets.Cdn.Models.Api20240201.DeliveryRuleCacheKeyQueryStringAction]::New()
if ($PSBoundParameters.ContainsKey('ParameterQueryParameter')) {
$Object.ParameterQueryParameter = $ParameterQueryParameter
}
if ($PSBoundParameters.ContainsKey('ParameterQueryStringBehavior')) {
$Object.ParameterQueryStringBehavior = $ParameterQueryStringBehavior
}
if ($PSBoundParameters.ContainsKey('Name')) {
$Object.Name = $Name
}
return $Object
}
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC/R8I6M3dQPSOg
# 8OfNJh9LTx99DQLY3JHVBn72wAgWGKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOkdaULv8rkJ2DRxdCF33JjE
# ihXAyGkY56M9J/C4xlVrMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAjJ8zFCY6TSm8hkMKVWnHg6SW/BdQlojqkE6YxNPQmUxGYyJ4OuBnHAf+
# umdh5HRAGCWI/TYfhgWg8idSftWYsiOy5ezPYfqYRI0b4NX2XxAQjWNEjoCjQRzK
# CJqjmq87RhvBRMraqfPUq8MsVOHFBoNOVqX3lJbEgkdfeQiCsCH8LWmNfZq1Hj8X
# CadC1UvayCDtuk30bBHILJeGZvmY+b9x5eMEfFTxFIubHTIJMFKw771k9ZuvzyaO
# KjjsFdDfE7BMHUn4vVxwayIVFBa6FeHPdkwQkG7OdqdA87n0eWH4xBIvc+A46K9p
# OUcpUy/HKKfrwj4qvgFTzYfPcyNm8KGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBTnjO2yP9wxb852TR85DPEfkoDwrcUEmgdbYwhBmbs+gIGZpVmIq5r
# GBMyMDI0MDczMTA3MDA0MC44MDRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2
# MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfX
# hlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjH
# tivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQ
# SmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56x
# YPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhb
# w+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvni
# P7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+s
# yO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E4
# 1j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA
# 7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj
# 8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+X
# xwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w6
# 1FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4
# Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEB
# PJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRAB
# TUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxe
# wCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1r
# gReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3
# ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QT
# STtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRi
# KsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8
# nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCAL
# t0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu
# +gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6lRSnDAiGA8yMDI0MDczMTA2MDUx
# NloYDzIwMjQwODAxMDYwNTE2WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqVFKc
# AgEAMAcCAQACAhsiMAcCAQACAhMpMAoCBQDqVaQcAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAISUYp2vurxlmPwkl60i2DmUL5ofOma2vK9P6cJ7k5l/GBP2
# XdornkIGqTVjMdMlYazQ0T3cIQluzLpo7gSNmp88N0C99b5m6kujxQKFo1tst00k
# IW4RvLTBzuHMNbdQCYm9Ulk+heVkp7h00vPbnMnSmH+4pcUhwnYfbKEPaJSAH5gZ
# yY+mnglUmVe3nVl9Z9HNkXJ+KasHo9BHAtzRbgDA2FOW27OqwYSBj4ASQ1DFfk6i
# Ti6iRwCxmXydSrLXhpWmbj8CGbG4OCmj+sz9OvIh8U+GFFnELAceVpuogedERdaS
# LTWC3FXRb9fepjn3EIjMBeuYN6XJXbL6LYGe0JMxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfPFCkOuA8wdMQABAAAB8zAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCBXy3VJsnrHpH0Dy9jlJTSaQFYDrgz1OQCtHzbJU3DmLTCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi82TSLtuG4Vkp8wBmJk/T+RAh8
# 41sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQge7E1WqK8LnDQEKLDrvqG2GOEagMd
# g17sshQXjVbsfvcwDQYJKoZIhvcNAQELBQAEggIAu4CUrrvKWP0nkqEnWdOPlcPH
# vxkGX2Mj27KJhCVV5Q0hnDZcfWPbn16xpkrWc+PxrkyRdOgO6vGcfW4Qi4bUQQ4R
# LV/8XKxAbItDtKeQqWyapLjpZx+zYDkaEZMr8t7MHQzzfvskNuYLSQAM0qjRCOlW
# mbdfcgKsSSuf1spepyTOt49NiTDr4XACFiVbXeeU5cDL+fUYyj4dr4AYfzVGPQt7
# UT4PfYHGKvk/nI0IHso0OVwOakqaGQh2hjIYtKBwNQGqrPx+yFpdmdkFJRudZlK8
# cpqNxagO4qALTS94Tr4DFg59wFI1Dynzq9BbnMov/PwNCK2s6BPOa4PnoJebkv35
# fNgPrFPbBhT2UKWY1yGe3u2rQ4SM9F12iKSM1yDQqujRZfiRCUB8Niou10K4fyD2
# m01W3dtt7Wy/bdPwozxrHFw/L1+r4jH4ZFX5wTYGTzHdpqhViAjnBlaXd9llDZFv
# 9/y3gAdZhqnN2COcF0sgh5E3A7oCaY5VDFO2u/tOn2QaSGF+3vJ7DZByewylFppe
# 0V+DWxH0/PVJx6RBR32XNuP7TwGb4auQzqfbgk4K08r9OKVP3pY8L1qoog85+NmD
# G7HnFwlGp6wFpKTkRhs3u8YgUDepPtgf/Soj+ZS3hWMJD7t4cAZNGcMB9BSzcb8l
# BkDS22dvC4EzfT1DkJs=
# SIG # End signature block
|
combined_dataset/train/non-malicious/874.ps1 | 874.ps1 | function add-pythonfiles {
$ErrorActionPreference = "Stop"
$sub = Get-AzSubscription -ErrorAction SilentlyContinue
if(-not($sub))
{
Connect-AzAccount
}
$pathToStreamingFile = ".\hiveudf.py"
$clusterName = Read-Host -Prompt "Enter the HDInsight cluster name"
$clusterInfo = Get-AzHDInsightCluster -ClusterName $clusterName
$resourceGroup = $clusterInfo.ResourceGroup
$storageAccountName=$clusterInfo.DefaultStorageAccount.split('.')[0]
$container=$clusterInfo.DefaultStorageContainer
$storageAccountKey=(Get-AzStorageAccountKey `
-ResourceGroupName $resourceGroup `
-Name $storageAccountName)[0].Value
$context = New-AzStorageContext `
-StorageAccountName $storageAccountName `
-StorageAccountKey $storageAccountKey
Set-AzStorageBlobContent `
-File $pathToStreamingFile `
-Blob "hiveudf.py" `
-Container $container `
-Context $context
}
function start-hivejob {
$ErrorActionPreference = "Stop"
$sub = Get-AzSubscription -ErrorAction SilentlyContinue
if(-not($sub))
{
Connect-AzAccount
}
$clusterName = Read-Host -Prompt "Enter the HDInsight cluster name"
$creds=Get-Credential -UserName "admin" -Message "Enter the login for the cluster"
$HiveQuery = "add file wasbs:///hiveudf.py;" +
"SELECT TRANSFORM (clientid, devicemake, devicemodel) " +
"USING 'python hiveudf.py' AS " +
"(clientid string, phoneLabel string, phoneHash string) " +
"FROM hivesampletable " +
"ORDER BY clientid LIMIT 50;"
$jobDefinition = New-AzHDInsightHiveJobDefinition `
-Query $HiveQuery
$activity="Hive query"
Write-Progress -Activity $activity -Status "Starting query..."
$job = Start-AzHDInsightJob `
-ClusterName $clusterName `
-JobDefinition $jobDefinition `
-HttpCredential $creds
Write-Progress -Activity $activity -Status "Waiting on query to complete..."
Wait-AzHDInsightJob `
-JobId $job.JobId `
-ClusterName $clusterName `
-HttpCredential $creds
Write-Progress -Activity $activity -Status "Retrieving output..."
Get-AzHDInsightJobOutput `
-Clustername $clusterName `
-JobId $job.JobId `
-HttpCredential $creds
}
function start-pigjob {
$ErrorActionPreference = "Stop"
$sub = Get-AzSubscription -ErrorAction SilentlyContinue
if(-not($sub))
{
Connect-AzAccount
}
$clusterName = Read-Host -Prompt "Enter the HDInsight cluster name"
$creds=Get-Credential -UserName "admin" -Message "Enter the login for the cluster"
$PigQuery = "Register wasbs:///pigudf.py using jython as myfuncs;" +
"LOGS = LOAD 'wasbs:///example/data/sample.log' as (LINE:chararray);" +
"LOG = FILTER LOGS by LINE is not null;" +
"DETAILS = foreach LOG generate myfuncs.create_structure(LINE);" +
"DUMP DETAILS;"
$jobDefinition = New-AzHDInsightPigJobDefinition -Query $PigQuery
$activity="Pig job"
Write-Progress -Activity $activity -Status "Starting job..."
$job = Start-AzHDInsightJob `
-ClusterName $clusterName `
-JobDefinition $jobDefinition `
-HttpCredential $creds
Write-Progress -Activity $activity -Status "Waiting for the Pig job to complete..."
Wait-AzHDInsightJob `
-Job $job.JobId `
-ClusterName $clusterName `
-HttpCredential $creds
Write-Progress -Activity $activity "Retrieving output..."
Get-AzHDInsightJobOutput `
-Clustername $clusterName `
-JobId $job.JobId `
-HttpCredential $creds
}
function fix-lineending($original_file) {
$text = [IO.File]::ReadAllText($original_file) -replace "`r`n", "`n"
[IO.File]::WriteAllText($original_file, $text)
}
|
combined_dataset/train/non-malicious/2486.ps1 | 2486.ps1 |
Read-Host -AsSecureString | ConvertFrom-SecureString | Out-File encrypted_password.txt
$vpn_profile = 'Profile name'
$username = 'username'
$enc_password = (gc .\encrypted_password.txt | ConvertTo-SecureString)
$credentials = new-object -typename System.Management.Automation.PSCredential -argumentlist $username,$enc_password $password = $credentials.GetNetworkCredential().Password
Set-Location 'C:\Program Files (x86)\Cisco Systems\VPN Client'
.\vpnclient.exe connect $vpn_profile user $username pwd $password
|
combined_dataset/train/non-malicious/sample_62_69.ps1 | sample_62_69.ps1 | #
# Module manifest for module 'OCI.PSModules.Cloudmigrations'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Cloudmigrations.dll'
# Version number of this module.
ModuleVersion = '87.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'b42be880-f45d-4128-a505-71c63f0f1b48'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Cloudmigrations Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '87.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Cloudmigrations.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Export-OCICloudmigrationsMigrationPlan',
'Get-OCICloudmigrationsAvailableShapesList',
'Get-OCICloudmigrationsMigration',
'Get-OCICloudmigrationsMigrationAsset',
'Get-OCICloudmigrationsMigrationAssetsList',
'Get-OCICloudmigrationsMigrationPlan',
'Get-OCICloudmigrationsMigrationPlansList',
'Get-OCICloudmigrationsMigrationsList',
'Get-OCICloudmigrationsReplicationProgress',
'Get-OCICloudmigrationsReplicationSchedule',
'Get-OCICloudmigrationsReplicationSchedulesList',
'Get-OCICloudmigrationsTargetAsset',
'Get-OCICloudmigrationsTargetAssetsList',
'Get-OCICloudmigrationsWorkRequest',
'Get-OCICloudmigrationsWorkRequestErrorsList',
'Get-OCICloudmigrationsWorkRequestLogsList',
'Get-OCICloudmigrationsWorkRequestsList',
'Import-OCICloudmigrationsMigrationPlan',
'Invoke-OCICloudmigrationsExecuteMigrationPlan',
'Invoke-OCICloudmigrationsRefreshMigration',
'Invoke-OCICloudmigrationsRefreshMigrationAsset',
'Invoke-OCICloudmigrationsRefreshMigrationPlan',
'Move-OCICloudmigrationsMigrationCompartment',
'Move-OCICloudmigrationsMigrationPlanCompartment',
'Move-OCICloudmigrationsReplicationScheduleCompartment',
'New-OCICloudmigrationsMigration',
'New-OCICloudmigrationsMigrationAsset',
'New-OCICloudmigrationsMigrationPlan',
'New-OCICloudmigrationsReplicationSchedule',
'New-OCICloudmigrationsTargetAsset',
'Remove-OCICloudmigrationsMigration',
'Remove-OCICloudmigrationsMigrationAsset',
'Remove-OCICloudmigrationsMigrationPlan',
'Remove-OCICloudmigrationsReplicationSchedule',
'Remove-OCICloudmigrationsTargetAsset',
'Start-OCICloudmigrationsAssetReplication',
'Start-OCICloudmigrationsMigrationReplication',
'Stop-OCICloudmigrationsWorkRequest',
'Update-OCICloudmigrationsMigration',
'Update-OCICloudmigrationsMigrationAsset',
'Update-OCICloudmigrationsMigrationPlan',
'Update-OCICloudmigrationsReplicationSchedule',
'Update-OCICloudmigrationsTargetAsset'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Cloudmigrations'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Get-FSMORoleOwner.ps1 | Get-FSMORoleOwner.ps1 | Function Get-FSMORoleOwner {
<#
.SYNOPSIS
Retrieves the list of FSMO role owners of a forest and domain
.DESCRIPTION
Retrieves the list of FSMO role owners of a forest and domain
.NOTES
Name: Get-FSMORoleOwner
Author: Boe Prox
DateCreated: 06/9/2011
.EXAMPLE
Get-FSMORoleOwner
DomainNamingMaster : dc1.rivendell.com
Domain : rivendell.com
RIDOwner : dc1.rivendell.com
Forest : rivendell.com
InfrastructureOwner : dc1.rivendell.com
SchemaMaster : dc1.rivendell.com
PDCOwner : dc1.rivendell.com
Description
-----------
Retrieves the FSMO role owners each domain in a forest. Also lists the domain and forest.
#>
[cmdletbinding()]
Try {
$forest = [system.directoryservices.activedirectory.Forest]::GetCurrentForest()
ForEach ($domain in $forest.domains) {
$forestproperties = @{
Forest = $Forest.name
Domain = $domain.name
SchemaMaster = $forest.SchemaRoleOwner
DomainNamingMaster = $forest.NamingRoleOwner
RIDOwner = $Domain.RidRoleOwner
PDCOwner = $Domain.PdcRoleOwner
InfrastructureOwner = $Domain.InfrastructureRoleOwner
}
$newobject = New-Object PSObject -Property $forestproperties
$newobject.PSTypeNames.Insert(0,"ForestRoles")
$newobject
}
}
Catch {
Write-Warning "$($Error)"
}
}
|
combined_dataset/train/non-malicious/2156.ps1 | 2156.ps1 |
[CmdletBinding()]
param
(
[ValidateNotNullOrEmpty()]
[string] $Path = $PSScriptRoot
)
Set-StrictMode -Version Latest
$ErrorActionPreference = 'Stop'
function Test-Elevated
{
[CmdletBinding()]
[OutputType([bool])]
Param()
return (([Security.Principal.WindowsIdentity]::GetCurrent()).Groups -contains "S-1-5-32-544")
}
$IsWindowsOs = $PSHOME.EndsWith('\WindowsPowerShell\v1.0', [System.StringComparison]::OrdinalIgnoreCase) -or $IsWindows
if (-not $IsWindowsOs)
{
throw 'This script must be run on Windows.'
}
if (-not (Test-Elevated))
{
throw 'This script must be run from an elevated process.'
}
if ([System.Management.Automation.Platform]::IsNanoServer)
{
throw 'Group policy definitions are not supported on Nano Server.'
}
$admxName = 'PowerShellCoreExecutionPolicy.admx'
$admlName = 'PowerShellCoreExecutionPolicy.adml'
$admx = Get-Item -Path (Join-Path -Path $Path -ChildPath $admxName)
$adml = Get-Item -Path (Join-Path -Path $Path -ChildPath $admlName)
$admxTargetPath = Join-Path -Path $env:WINDIR -ChildPath "PolicyDefinitions"
$admlTargetPath = Join-Path -Path $admxTargetPath -ChildPath "en-US"
$files = @($admx, $adml)
foreach ($file in $files)
{
if (-not (Test-Path -Path $file))
{
throw "Could not find $($file.Name) at $Path"
}
}
Write-Verbose "Copying $admx to $admxTargetPath"
Copy-Item -Path $admx -Destination $admxTargetPath -Force
$admxTargetFullPath = Join-Path -Path $admxTargetPath -ChildPath $admxName
if (Test-Path -Path $admxTargetFullPath)
{
Write-Verbose "$admxName was installed successfully"
}
else
{
Write-Error "Could not install $admxName"
}
Write-Verbose "Copying $adml to $admlTargetPath"
Copy-Item -Path $adml -Destination $admlTargetPath -Force
$admlTargetFullPath = Join-Path -Path $admlTargetPath -ChildPath $admlName
if (Test-Path -Path $admlTargetFullPath)
{
Write-Verbose "$admlName was installed successfully"
}
else
{
Write-Error "Could not install $admlName"
}
|
combined_dataset/train/non-malicious/3959.ps1 | 3959.ps1 |
function Test-LocalNetworkGatewayCRUD
{
$rgname = Get-ResourceGroupName
$rname = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/localNetworkGateways"
$location = Get-ProviderLocation $resourceTypeParent
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" }
$job = New-AzLocalNetworkGateway -ResourceGroupName $rgname -name $rname -location $location -AddressPrefix 192.168.0.0/16 -GatewayIpAddress 192.168.3.4 -AsJob
$job | Wait-Job
$actual = $job | Receive-Job
$expected = Get-AzLocalNetworkGateway -ResourceGroupName $rgname -name $rname
Assert-AreEqual $expected.ResourceGroupName $actual.ResourceGroupName
Assert-AreEqual $expected.Name $actual.Name
Assert-AreEqual "192.168.3.4" $expected.GatewayIpAddress
Assert-AreEqual "192.168.0.0/16" $expected.LocalNetworkAddressSpace.AddressPrefixes[0]
$expected.Location = $location
$list = Get-AzLocalNetworkGateway -ResourceGroupName $rgname
Assert-AreEqual 1 @($list).Count
Assert-AreEqual $list[0].ResourceGroupName $actual.ResourceGroupName
Assert-AreEqual $list[0].Name $actual.Name
Assert-AreEqual $list[0].Location $actual.Location
Assert-AreEqual "192.168.3.4" $list[0].GatewayIpAddress
$job = Set-AzLocalNetworkGateway -LocalNetworkGateway $expected -AddressPrefix "200.168.0.0/16" -AsJob
$job | Wait-Job
$actual = $job | Receive-Job
$expected = Get-AzLocalNetworkGateway -ResourceGroupName $rgname -name $rname
Assert-AreEqual "200.168.0.0/16" $expected.LocalNetworkAddressSpace.AddressPrefixes[0]
$asn = 1234
$bgpPeeringAddress = "1.2.3.4"
$peerWeight = 15
$actual = Set-AzLocalNetworkGateway -LocalNetworkGateway $expected -Asn $asn -BgpPeeringAddress $bgpPeeringAddress -PeerWeight $peerWeight
$expected = Get-AzLocalNetworkGateway -ResourceGroupName $rgname -name $rname
Assert-AreEqual $asn $expected.BgpSettings.Asn
Assert-AreEqual $bgpPeeringAddress $expected.BgpSettings.BgpPeeringAddress
Assert-AreEqual $peerWeight $expected.BgpSettings.PeerWeight
$list = Get-AzLocalNetworkGateway -ResourceGroupName "*" -Name "*"
Assert-True { $list.Count -ge 0 }
$list = Get-AzLocalNetworkGateway -ResourceGroupName "*"
Assert-True { $list.Count -ge 0 }
$asn = 1337
$actual = Set-AzLocalNetworkGateway -LocalNetworkGateway $expected -Asn $asn
$expected = Get-AzLocalNetworkGateway -ResourceGroupName $rgname -name $rname
Assert-AreEqual $asn $expected.BgpSettings.Asn
Assert-ThrowsContains { Set-AzLocalNetworkGateway -LocalNetworkGateway $expected -PeerWeight -1 } "PeerWeight cannot be negative"
$job = Remove-AzLocalNetworkGateway -ResourceGroupName $actual.ResourceGroupName -name $rname -PassThru -Force -AsJob
$job | Wait-Job
$delete = $job | Receive-Job
Assert-AreEqual true $delete
$list = Get-AzLocalNetworkGateway -ResourceGroupName $actual.ResourceGroupName
Assert-AreEqual 0 @($list).Count
Assert-ThrowsContains { Set-AzLocalNetworkGateway -LocalNetworkGateway $actual } "not found"
Assert-Throws { New-AzLocalNetworkGateway -ResourceGroupName $rgname -name $rname -location $location -PeerWeight -1 } "PeerWeight cannot be negative"
Assert-ThrowsContains { New-AzLocalNetworkGateway -ResourceGroupName $rgname -name $rname -location $location -Asn 64 } "ASN and BgpPeeringAddress must both be specified"
Assert-ThrowsContains { New-AzLocalNetworkGateway -ResourceGroupName $rgname -name $rname -location $location -BgpPeeringAddress "1.2.3.4" } "ASN and BgpPeeringAddress must both be specified"
}
finally
{
Clean-ResourceGroup $rgname
}
}
|
combined_dataset/train/non-malicious/sample_48_54.ps1 | sample_48_54.ps1 | #!/usr/bin/env pwsh
$basedir=Split-Path $MyInvocation.MyCommand.Definition -Parent
$exe=""
$pathsep=":"
$env_node_path=$env:NODE_PATH
$new_node_path="C:\Users\abder\component-maker\web\node_modules\.pnpm\rollup@4.9.6\node_modules\rollup\dist\bin\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\rollup@4.9.6\node_modules\rollup\dist\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\rollup@4.9.6\node_modules\rollup\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\rollup@4.9.6\node_modules;C:\Users\abder\component-maker\web\node_modules\.pnpm\node_modules"
if ($PSVersionTable.PSVersion -lt "6.0" -or $IsWindows) {
# Fix case when both the Windows and Linux builds of Node
# are installed in the same directory
$exe=".exe"
$pathsep=";"
} else {
$new_node_path="/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/rollup@4.9.6/node_modules/rollup/dist/bin/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/rollup@4.9.6/node_modules/rollup/dist/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/rollup@4.9.6/node_modules/rollup/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/rollup@4.9.6/node_modules:/mnt/c/Users/abder/component-maker/web/node_modules/.pnpm/node_modules"
}
if ([string]::IsNullOrEmpty($env_node_path)) {
$env:NODE_PATH=$new_node_path
} else {
$env:NODE_PATH="$new_node_path$pathsep$env_node_path"
}
$ret=0
if (Test-Path "$basedir/node$exe") {
# Support pipeline input
if ($MyInvocation.ExpectingInput) {
$input | & "$basedir/node$exe" "$basedir/../rollup/dist/bin/rollup" $args
} else {
& "$basedir/node$exe" "$basedir/../rollup/dist/bin/rollup" $args
}
$ret=$LASTEXITCODE
} else {
# Support pipeline input
if ($MyInvocation.ExpectingInput) {
$input | & "node$exe" "$basedir/../rollup/dist/bin/rollup" $args
} else {
& "node$exe" "$basedir/../rollup/dist/bin/rollup" $args
}
$ret=$LASTEXITCODE
}
$env:NODE_PATH=$env_node_path
exit $ret
|
combined_dataset/train/non-malicious/Start-Timer.ps1 | Start-Timer.ps1 | ## Start-Timer.ps1
## A kitchen timer script with visible countdown and customizable audio alert and messages
####################################################################################################
param( $seconds=0, $reason="The Timer", $SoundFile="$env:SystemRoot\\Media\\notify.wav",
$minutes=0, $hours=0, $timeout=0, [switch]$novoice, [string[]]$status="Cooking","Burning"
)
$start = [DateTime]::Now
write-progress -activity $reason -status "Running"
$seconds = [Math]::Abs($seconds) + [Math]::Abs($minutes*60) + [Math]::Abs($hours*60*60)
$end = $start.AddSeconds( $seconds )
## Take care of as much overhead as we can BEFORE we start counting
## So the sounds can play as cloase to the end as possible
$Voice = new-object -com SAPI.SpVoice
$Sound = new-Object System.Media.SoundPlayer
if(Test-Path $soundFile) {
$Sound.SoundLocation=$SoundFile
} else {
$soundFile = $Null
}
## The actual timing loop ...
do {
$remain = ($end - [DateTime]::Now).TotalSeconds
$percent = [Math]::Min(100, ((($seconds - $remain)/$seconds) * 100))
$sec = [Math]::Max(000, $remain)
write-progress -activity $reason -status $status[0] -percent $percent -seconds $sec
start-sleep -milli 100
} while( $remain -gt 0 )
## And a loop for beeping
$Host.UI.RawUI.FlushInputBuffer()
do {
if($SoundFile) {
$Sound.PlaySync()
} else {
[System.Media.SystemSounds]::Exclamation.Play()
}
if(!$novoice -and !$Host.UI.RawUI.KeyAvailable){
$null = $Voice.Speak( "$reason is $($status[1])!!", 0 )
}
write-progress -activity $reason -status $status[1] -percent ([Math]::Min(100,((($seconds - $remain)/$seconds) * 100))) -seconds ([Math]::Max(0,$remain))
$remain = ($end - [DateTime]::Now).TotalSeconds
} while( !$Host.UI.RawUI.KeyAvailable -and ($timeout -eq 0 -or $remain -gt -$timeout))
if($SoundFile) {
$Sound.Stop()
}
|
combined_dataset/train/non-malicious/3248.ps1 | 3248.ps1 |
class PluginManager : BaseLogger {
[hashtable]$Plugins = @{}
[hashtable]$Commands = @{}
hidden [string]$_PoshBotModuleDir
[RoleManager]$RoleManager
[StorageProvider]$_Storage
PluginManager([RoleManager]$RoleManager, [StorageProvider]$Storage, [Logger]$Logger, [string]$PoshBotModuleDir) {
$this.RoleManager = $RoleManager
$this._Storage = $Storage
$this.Logger = $Logger
$this._PoshBotModuleDir = $PoshBotModuleDir
$this.Initialize()
}
[void]Initialize() {
$this.LogInfo('Initializing')
$this.LoadState()
$this.LoadBuiltinPlugins()
}
[void]LoadState() {
$this.LogVerbose('Loading plugin state from storage')
$pluginsToLoad = $this._Storage.GetConfig('plugins')
if ($pluginsToLoad) {
foreach ($pluginKey in $pluginsToLoad.Keys) {
$pluginToLoad = $pluginsToLoad[$pluginKey]
$pluginVersions = $pluginToLoad.Keys
foreach ($pluginVersionKey in $pluginVersions) {
$pv = $pluginToLoad[$pluginVersionKey]
$manifestPath = $pv.ManifestPath
$adhocPermissions = $pv.AdhocPermissions
$this.CreatePluginFromModuleManifest($pluginKey, $manifestPath, $true, $false)
if ($newPlugin = $this.Plugins[$pluginKey]) {
foreach ($version in $newPlugin.Keys) {
$npv = $newPlugin[$version]
foreach($permission in $adhocPermissions) {
if ($p = $this.RoleManager.GetPermission($permission)) {
$npv.AddPermission($p)
}
}
$commandPermissions = $pv.CommandPermissions
foreach ($commandName in $commandPermissions.Keys ) {
$permissions = $commandPermissions[$commandName]
foreach ($permission in $permissions) {
if ($p = $this.RoleManager.GetPermission($permission)) {
$npv.AddPermission($p)
}
}
}
}
}
}
}
}
}
[void]SaveState() {
$this.LogVerbose('Saving loaded plugin state to storage')
$pluginsToSave = @{}
foreach($pluginKey in $this.Plugins.Keys | Where-Object {$_ -ne 'Builtin'}) {
$versions = @{}
foreach ($versionKey in $this.Plugins[$pluginKey].Keys) {
$pv = $this.Plugins[$pluginKey][$versionKey]
$versions.Add($versionKey, $pv.ToHash())
}
$pluginsToSave.Add($pluginKey, $versions)
}
$this._Storage.SaveConfig('plugins', $pluginsToSave)
}
[void]InstallPlugin([string]$ManifestPath, [bool]$SaveAfterInstall = $false) {
if (Test-Path -Path $ManifestPath) {
$moduleName = (Get-Item -Path $ManifestPath).BaseName
$this.CreatePluginFromModuleManifest($moduleName, $ManifestPath, $true, $SaveAfterInstall)
} else {
$msg = "Module manifest path [$manifestPath] not found"
$this.LogInfo([LogSeverity]::Warning, $msg)
}
}
[void]AddPlugin([Plugin]$Plugin, [bool]$SaveAfterInstall = $false) {
if (-not $this.Plugins.ContainsKey($Plugin.Name)) {
$this.LogInfo("Attaching plugin [$($Plugin.Name)]")
$pluginVersion = @{
($Plugin.Version).ToString() = $Plugin
}
$this.Plugins.Add($Plugin.Name, $pluginVersion)
foreach ($permission in $Plugin.Permissions.GetEnumerator()) {
$this.LogVerbose("Adding permission [$($permission.Value.ToString())] to Role Manager")
$this.RoleManager.AddPermission($permission.Value)
}
} else {
if (-not $this.Plugins[$Plugin.Name].ContainsKey($Plugin.Version)) {
$this.LogInfo("Attaching version [$($Plugin.Version)] of plugin [$($Plugin.Name)]")
$this.Plugins[$Plugin.Name].Add($Plugin.Version.ToString(), $Plugin)
foreach ($permission in $Plugin.Permissions.GetEnumerator()) {
$this.LogVerbose("Adding permission [$($permission.Value.ToString())] to Role Manager")
$this.RoleManager.AddPermission($permission.Value)
}
} else {
$msg = "Plugin [$($Plugin.Name)] version [$($Plugin.Version)] is already loaded"
$this.LogInfo([LogSeverity]::Warning, $msg)
throw [PluginException]::New($msg)
}
}
$this.LoadCommands()
if ($SaveAfterInstall) {
$this.SaveState()
}
}
[void]RemovePlugin([Plugin]$Plugin) {
if ($this.Plugins.ContainsKey($Plugin.Name)) {
$pluginVersions = $this.Plugins[$Plugin.Name]
if ($pluginVersions.Keys.Count -eq 1) {
foreach ($permission in $Plugin.Permissions.GetEnumerator()) {
$this.LogVerbose("Removing permission [$($Permission.Value.ToString())]. No longer in use")
$this.RoleManager.RemovePermission($Permission.Value)
}
$this.LogInfo("Removing plugin [$($Plugin.Name)]")
$this.Plugins.Remove($Plugin.Name)
$moduleSpec = @{
ModuleName = $Plugin.Name
ModuleVersion = $pluginVersions
}
Remove-Module -FullyQualifiedName $moduleSpec -Verbose:$false -Force
} else {
if ($pluginVersions.ContainsKey($Plugin.Version)) {
$this.LogInfo("Removing plugin [$($Plugin.Name)] version [$($Plugin.Version)]")
$pluginVersions.Remove($Plugin.Version)
$moduleSpec = @{
ModuleName = $Plugin.Name
ModuleVersion = $Plugin.Version
}
Remove-Module -FullyQualifiedName $moduleSpec -Verbose:$false -Force
} else {
$msg = "Plugin [$($Plugin.Name)] version [$($Plugin.Version)] is not loaded in bot"
$this.LogInfo([LogSeverity]::Warning, $msg)
throw [PluginNotFoundException]::New($msg)
}
}
}
$this.LoadCommands()
$this.SaveState()
}
[void]RemovePlugin([string]$PluginName, [string]$Version) {
if ($p = $this.Plugins[$PluginName]) {
if ($pv = $p[$Version]) {
if ($p.Keys.Count -eq 1) {
foreach ($permission in $pv.Permissions.GetEnumerator()) {
$this.LogVerbose("Removing permission [$($Permission.Value.ToString())]. No longer in use")
$this.RoleManager.RemovePermission($Permission.Value)
}
$this.LogInfo("Removing plugin [$($pv.Name)]")
$this.Plugins.Remove($pv.Name)
} else {
$this.LogInfo("Removing plugin [$($pv.Name)] version [$Version]")
$p.Remove($pv.Version.ToString())
}
$unloadModuleParams = @{
FullyQualifiedName = @{
ModuleName = $PluginName
ModuleVersion = $Version
}
Verbose = $false
Force = $true
}
$this.LogDebug("Unloading module [$PluginName] version [$Version]")
Remove-Module @unloadModuleParams
} else {
$msg = "Plugin [$PluginName] version [$Version] is not loaded in bot"
$this.LogInfo([LogSeverity]::Warning, $msg)
throw [PluginNotFoundException]::New($msg)
}
} else {
$msg = "Plugin [$PluginName] is not loaded in bot"
$this.LogInfo([LogSeverity]::Warning, $msg)
throw [PluginNotFoundException]::New()
}
$this.LoadCommands()
$this.SaveState()
}
[void]ActivatePlugin([string]$PluginName, [string]$Version) {
if ($p = $this.Plugins[$PluginName]) {
if ($pv = $p[$Version]) {
$this.LogInfo("Activating plugin [$PluginName] version [$Version]")
$pv.Activate()
$this.LoadCommands()
$this.SaveState()
} else {
$msg = "Plugin [$PluginName] version [$Version] is not loaded in bot"
$this.LogInfo([LogSeverity]::Warning, $msg)
throw [PluginNotFoundException]::New($msg)
}
} else {
$msg = "Plugin [$PluginName] is not loaded in bot"
$this.LogInfo([LogSeverity]::Warning, $msg)
throw [PluginNotFoundException]::New()
}
}
[void]ActivatePlugin([Plugin]$Plugin) {
$p = $this.Plugins[$Plugin.Name]
if ($p) {
if ($pv = $p[$Plugin.Version.ToString()]) {
$this.LogInfo("Activating plugin [$($Plugin.Name)] version [$($Plugin.Version)]")
$pv.Activate()
}
} else {
$msg = "Plugin [$($Plugin.Name)] version [$($Plugin.Version)] is not loaded in bot"
$this.LogInfo([LogSeverity]::Warning, $msg)
throw [PluginNotFoundException]::New($msg)
}
$this.LoadCommands()
$this.SaveState()
}
[void]DeactivatePlugin([Plugin]$Plugin) {
$p = $this.Plugins[$Plugin.Name]
if ($p) {
if ($pv = $p[$Plugin.Version.ToString()]) {
$this.LogInfo("Deactivating plugin [$($Plugin.Name)] version [$($Plugin.Version)]")
$pv.Deactivate()
}
} else {
$msg = "Plugin [$($Plugin.Name)] version [$($Plugin.Version)] is not loaded in bot"
$this.LogInfo([LogSeverity]::Warning, $msg)
throw [PluginNotFoundException]::New($msg)
}
$this.LoadCommands()
$this.SaveState()
}
[void]DeactivatePlugin([string]$PluginName, [string]$Version) {
if ($p = $this.Plugins[$PluginName]) {
if ($pv = $p[$Version]) {
$this.LogInfo("Deactivating plugin [$PluginName)] version [$Version]")
$pv.Deactivate()
$this.LoadCommands()
$this.SaveState()
} else {
$msg = "Plugin [$PluginName] version [$Version] is not loaded in bot"
$this.LogInfo([LogSeverity]::Warning, $msg)
throw [PluginNotFoundException]::New($msg)
}
} else {
$msg = "Plugin [$PluginName] is not loaded in bot"
$this.LogInfo([LogSeverity]::Warning, $msg)
throw [PluginNotFoundException]::New($msg)
}
}
[PluginCommand]MatchCommand([ParsedCommand]$ParsedCommand, [bool]$CommandSearch = $true) {
$builtinKey = $this.Plugins['Builtin'].Keys | Select-Object -First 1
$builtinPlugin = $this.Plugins['Builtin'][$builtinKey]
foreach ($commandKey in $builtinPlugin.Commands.Keys) {
$command = $builtinPlugin.Commands[$commandKey]
if ($command.TriggerMatch($ParsedCommand, $CommandSearch)) {
$this.LogInfo("Matched parsed command [$($ParsedCommand.Plugin)`:$($ParsedCommand.Command)] to builtin command [Builtin:$commandKey]")
return [PluginCommand]::new($builtinPlugin, $command)
}
}
if (($ParsedCommand.Plugin -ne [string]::Empty) -and ($ParsedCommand.Command -ne [string]::Empty)) {
$plugin = $this.Plugins[$ParsedCommand.Plugin]
if ($plugin) {
if ($ParsedCommand.Version) {
$pluginVersion = $plugin[$ParsedCommand.Version]
} else {
$latestVersionKey = $plugin.Keys | Sort-Object -Descending | Select-Object -First 1
$pluginVersion = $plugin[$latestVersionKey]
}
if ($pluginVersion) {
foreach ($commandKey in $pluginVersion.Commands.Keys) {
$command = $pluginVersion.Commands[$commandKey]
if ($command.TriggerMatch($ParsedCommand, $CommandSearch)) {
$this.LogInfo("Matched parsed command [$($ParsedCommand.Plugin)`:$($ParsedCommand.Command)] to plugin command [$($plugin.Name)`:$commandKey]")
return [PluginCommand]::new($pluginVersion, $command)
}
}
}
$this.LogInfo([LogSeverity]::Warning, "Unable to match parsed command [$($ParsedCommand.Plugin)`:$($ParsedCommand.Command)] to a command in plugin [$($plugin.Name)]")
} else {
$this.LogInfo([LogSeverity]::Warning, "Unable to match parsed command [$($ParsedCommand.Plugin)`:$($ParsedCommand.Command)] to a plugin command")
return $null
}
} else {
foreach ($pluginKey in $this.Plugins.Keys) {
$plugin = $this.Plugins[$pluginKey]
$pluginVersion = $null
if ($ParsedCommand.Version) {
$pluginVersion = $plugin[$ParsedCommand.Version]
foreach ($commandKey in $pluginVersion.Commands.Keys) {
$command = $pluginVersion.Commands[$commandKey]
if ($command.TriggerMatch($ParsedCommand, $CommandSearch)) {
$this.LogInfo("Matched parsed command [$($ParsedCommand.Plugin)`:$($ParsedCommand.Command)] to plugin command [$pluginKey`:$commandKey]")
return [PluginCommand]::new($pluginVersion, $command)
}
}
} else {
foreach ($pluginVersionKey in $plugin.Keys | Sort-Object -Descending | Select-Object -First 1) {
$pluginVersion = $plugin[$pluginVersionKey]
foreach ($commandKey in $pluginVersion.Commands.Keys) {
$command = $pluginVersion.Commands[$commandKey]
if ($command.TriggerMatch($ParsedCommand, $CommandSearch)) {
$this.LogInfo("Matched parsed command [$($ParsedCommand.Plugin)`:$($ParsedCommand.Command)] to plugin command [$pluginKey`:$commandKey]")
return [PluginCommand]::new($pluginVersion, $command)
}
}
}
}
}
}
$this.LogInfo([LogSeverity]::Warning, "Unable to match parsed command [$($ParsedCommand.Plugin)`:$($ParsedCommand.Command)] to a plugin command")
return $null
}
[void]LoadCommands() {
$allCommands = New-Object System.Collections.ArrayList
foreach ($pluginKey in $this.Plugins.Keys) {
$plugin = $this.Plugins[$pluginKey]
foreach ($pluginVersionKey in $plugin.Keys | Sort-Object -Descending | Select-Object -First 1) {
$pluginVersion = $plugin[$pluginVersionKey]
if ($pluginVersion.Enabled) {
foreach ($commandKey in $pluginVersion.Commands.Keys) {
$command = $pluginVersion.Commands[$commandKey]
$fullyQualifiedCommandName = "$pluginKey`:$CommandKey`:$pluginVersionKey"
$allCommands.Add($fullyQualifiedCommandName)
if (-not $this.Commands.ContainsKey($fullyQualifiedCommandName)) {
$this.LogVerbose("Loading command [$fullyQualifiedCommandName]")
$this.Commands.Add($fullyQualifiedCommandName, $command)
}
}
}
}
}
$remove = New-Object System.Collections.ArrayList
foreach($c in $this.Commands.Keys) {
if (-not $allCommands.Contains($c)) {
$remove.Add($c)
}
}
$remove | ForEach-Object {
$this.LogVerbose("Removing command [$_]. Plugin has either been removed or is deactivated.")
$this.Commands.Remove($_)
}
}
[void]CreatePluginFromModuleManifest([string]$ModuleName, [string]$ManifestPath, [bool]$AsJob = $true, [bool]$SaveAfterCreation = $false) {
$manifest = Import-PowerShellDataFile -Path $ManifestPath -ErrorAction SilentlyContinue
if ($manifest) {
$this.LogInfo("Creating new plugin [$ModuleName]")
$plugin = [Plugin]::new($this.Logger)
$plugin.Name = $ModuleName
$plugin._ManifestPath = $ManifestPath
if ($manifest.ModuleVersion) {
$plugin.Version = $manifest.ModuleVersion
} else {
$plugin.Version = '0.0.0'
}
$pluginConfig = $this.GetPluginConfig($plugin.Name, $plugin.Version)
$this.GetPermissionsFromModuleManifest($manifest) | ForEach-Object {
$_.Plugin = $plugin.Name
$plugin.AddPermission($_)
}
if ($pluginConfig -and $pluginConfig.AdhocPermissions.Count -gt 0) {
foreach ($permissionName in $pluginConfig.AdhocPermissions) {
if ($p = $this.RoleManager.GetPermission($permissionName)) {
$this.LogDebug("Adding adhoc permission [$permissionName] to plugin [$($plugin.Name)]")
$plugin.AddPermission($p)
} else {
$this.LogInfo([LogSeverity]::Warning, "Adhoc permission [$permissionName] not found in Role Manager. Can't attach permission to plugin [$($plugin.Name)]")
}
}
}
$this.AddPlugin($plugin, $SaveAfterCreation)
Import-Module -Name $ManifestPath -Scope Local -Verbose:$false -WarningAction SilentlyContinue -Force
$moduleCommands = Microsoft.PowerShell.Core\Get-Command -Module $ModuleName -CommandType @('Cmdlet', 'Function') -Verbose:$false
foreach ($command in $moduleCommands) {
if ($command.CommandType -eq 'Function') {
$metadata = $this.GetCommandMetadata($command)
} else {
$metadata = $null
}
$this.LogVerbose("Creating command [$($command.Name)] for new plugin [$($plugin.Name)]")
$cmd = [Command]::new()
$cmd.Name = $command.Name
$cmd.ModuleQualifiedCommand = "$ModuleName\$($command.Name)"
$cmd.ManifestPath = $ManifestPath
$cmd.Logger = $this.Logger
$cmd.AsJob = $AsJob
if ($command.CommandType -eq 'Function') {
$cmd.FunctionInfo = $command
} elseIf ($command.CommandType -eq 'Cmdlet') {
$cmd.CmdletInfo = $command
}
$triggers = @()
if ($metadata) {
if ($metadata.CommandName) {
$cmd.Name = $metadata.CommandName
}
if ($metadata.Aliases) {
$metadata.Aliases | Foreach-Object {
$cmd.Aliases += $_
$triggers += [Trigger]::new([TriggerType]::Command, $_)
}
}
if ($metadata.Permissions) {
foreach ($item in $metadata.Permissions) {
$fqPermission = "$($plugin.Name):$($item)"
if ($p = $plugin.GetPermission($fqPermission)) {
$cmd.AddPermission($p)
} else {
$this.LogInfo([LogSeverity]::Warning, "Permission [$fqPermission] is not defined in the plugin module manifest. Command will not be added to plugin.")
continue
}
}
}
if ($pluginConfig) {
foreach ($permissionName in $pluginConfig.AdhocPermissions) {
if ($p = $this.RoleManager.GetPermission($permissionName)) {
$this.LogDebug("Adding adhoc permission [$permissionName] to command [$($plugin.Name):$($cmd.name)]")
$cmd.AddPermission($p)
} else {
$this.LogInfo([LogSeverity]::Warning, "Adhoc permission [$permissionName] not found in Role Manager. Can't attach permission to command [$($plugin.Name):$($cmd.name)]")
}
}
}
$cmd.KeepHistory = $metadata.KeepHistory
$cmd.HideFromHelp = $metadata.HideFromHelp
if ($metadata.TriggerType) {
switch ($metadata.TriggerType) {
'Command' {
$cmd.TriggerType = [TriggerType]::Command
$cmd.Triggers += [Trigger]::new([TriggerType]::Command, $cmd.Name)
if ($metadata.Aliases) {
$metadata.Aliases | Foreach-Object {
$cmd.Aliases += $_
$triggers += [Trigger]::new([TriggerType]::Command, $_)
}
}
}
'Event' {
$cmd.TriggerType = [TriggerType]::Event
$t = [Trigger]::new([TriggerType]::Event, $command.Name)
if ($metadata.MessageType) {
$t.MessageType = $metadata.MessageType
}
if ($metadata.MessageSubtype) {
$t.MessageSubtype = $metadata.MessageSubtype
}
$triggers += $t
}
'Regex' {
$cmd.TriggerType = [TriggerType]::Regex
$t = [Trigger]::new([TriggerType]::Regex, $command.Name)
$t.Trigger = $metadata.Regex
$triggers += $t
}
}
} else {
$triggers += [Trigger]::new([TriggerType]::Command, $cmd.Name)
}
} else {
$cmd.Name = $command.Name
$triggers += [Trigger]::new([TriggerType]::Command, $cmd.Name)
}
$cmdHelp = Get-Help -Name $cmd.ModuleQualifiedCommand -ErrorAction SilentlyContinue
if ($cmdHelp) {
$cmd.Description = $cmdHelp.Synopsis.Trim()
}
if ($cmd.TriggerType -eq [TriggerType]::Command) {
if ($cmdHelp) {
$helpSyntax = ($cmdHelp.syntax | Out-String).Trim() -split "`n" | Where-Object {$_ -ne "`r"}
$helpSyntax = $helpSyntax -replace '\[\<CommonParameters\>\]', ''
$helpSyntax = $helpSyntax -replace '-Bot \<Object\> ', ''
$helpSyntax = $helpSyntax -replace '\[-Bot\] \<Object\> ', '['
$helpSyntax = foreach ($item in $helpSyntax) {
$item -replace $command.Name, $cmd.Name
}
$cmd.Usage = $helpSyntax.ToLower().Trim()
} else {
$this.LogInfo([LogSeverity]::Warning, "Unable to parse help for command [$($command.Name)]")
$cmd.Usage = 'ERROR: Unable to parse command help'
}
} elseIf ($cmd.TriggerType -eq [TriggerType]::Regex) {
$cmd.Usage = @($triggers | Select-Object -Expand Trigger) -join "`n"
}
$cmd.Triggers += $triggers
$plugin.AddCommand($cmd)
}
if ($pluginConfig -and (-not $pluginConfig.Enabled)) {
$plugin.Deactivate()
}
$this.LoadCommands()
if ($SaveAfterCreation) {
$this.SaveState()
}
} else {
$msg = "Unable to load module manifest [$ManifestPath]"
$this.LogInfo([LogSeverity]::Error, $msg)
Write-Error -Message $msg
}
}
[PoshBot.BotCommand]GetCommandMetadata([System.Management.Automation.FunctionInfo]$Command) {
$attrs = $Command.ScriptBlock.Attributes
$botCmdAttr = $attrs | ForEach-Object {
if ($_.GetType().ToString() -eq 'PoshBot.BotCommand') {
$_
}
}
if ($botCmdAttr) {
$this.LogDebug("Command [$($Command.Name)] has metadata defined")
} else {
$this.LogDebug("No metadata defined for command [$($Command.Name)]")
}
return $botCmdAttr
}
[Permission[]]GetPermissionsFromModuleManifest($Manifest) {
$permissions = New-Object System.Collections.ArrayList
foreach ($permission in $Manifest.PrivateData.Permissions) {
if ($permission -is [string]) {
$p = [Permission]::new($Permission)
$permissions.Add($p)
} elseIf ($permission -is [hashtable]) {
$p = [Permission]::new($permission.Name)
if ($permission.Description) {
$p.Description = $permission.Description
}
$permissions.Add($p)
}
}
if ($permissions.Count -gt 0) {
$this.LogDebug("Permissions defined in module manifest", $permissions)
} else {
$this.LogDebug('No permissions defined in module manifest')
}
return $permissions
}
[void]LoadBuiltinPlugins() {
$this.LogInfo('Loading builtin plugins')
$builtinPlugin = Get-Item -Path "$($this._PoshBotModuleDir)/Plugins/Builtin"
$moduleName = $builtinPlugin.BaseName
$manifestPath = Join-Path -Path $builtinPlugin.FullName -ChildPath "$moduleName.psd1"
$this.CreatePluginFromModuleManifest($moduleName, $manifestPath, $false, $false)
}
[hashtable]GetPluginConfig([string]$PluginName, [string]$Version) {
if ($pluginConfig = $this._Storage.GetConfig('plugins')) {
if ($thisPluginConfig = $pluginConfig[$PluginName]) {
if (-not [string]::IsNullOrEmpty($Version)) {
if ($thisPluginConfig.ContainsKey($Version)) {
$pluginVersion = $Version
} else {
$this.LogDebug([LogSeverity]::Warning, "Plugin [$PluginName`:$Version] not defined in plugins.psd1")
return $null
}
} else {
$pluginVersion = @($thisPluginConfig.Keys | Sort-Object -Descending)[0]
}
$pv = $thisPluginConfig[$pluginVersion]
return $pv
} else {
$this.LogDebug([LogSeverity]::Warning, "Plugin [$PluginName] not defined in plugins.psd1")
return $null
}
} else {
$this.LogDebug([LogSeverity]::Warning, "No plugin configuration defined in storage")
return $null
}
}
}
|
combined_dataset/train/non-malicious/New-Zip_3.ps1 | New-Zip_3.ps1 | Function New-Zip
{
<#
.SYNOPSIS
Create a Zip File from any files piped in.
.DESCRIPTION
Requires that you have the SharpZipLib installed, which is available from
http://www.icsharpcode.net/OpenSource/SharpZipLib/
.NOTES
File Name : PowerZip.psm1
Author : Christophe CREMON (uxone) - http://powershell.codeplex.com
Requires : PowerShell V2
.PARAMETER Source
Set the name of the source to zip (file or directory)
.PARAMETER ZipFile
Set the name of the zip file to create
.PARAMETER Recurse
Browse the source recursively
.PARAMETER Include
Include only items you specify
.PARAMETER Exclude
Exclude items you specify
.PARAMETER AbsolutePaths
Preserve the absolute path name of each item in the zip container
.PARAMETER DeleteAfterZip
Delete source items after successful zip
.EXAMPLE
New-Zip -Source C:\\Temp -ZipFile C:\\Archive\\Scripts.zip -Include *.ps1 -DeleteAfterZip
Copies all PS1 files from the C:\\Temp directory to C:\\Archive\\Scripts.zip and delete them after successful ZIP
#>
param (
[ValidateNotNullOrEmpty()]
[Parameter(
Mandatory = $true)
]
[string] $Source,
[Parameter(
Mandatory = $true)
]
[string] $ZipFile,
[switch] $Recurse,
[array] $Include,
[array] $Exclude,
[switch] $AbsolutePaths,
[switch] $DeleteAfterZip )
$LoadAssembly = [System.Reflection.Assembly]::LoadWithPartialName("ICSharpCode.SharpZipLib")
if ( -not $LoadAssembly ) { throw "! Assembly not found {ICSharpCode.SharpZipLib}" }
$RootPath = ( Resolve-Path -Path $Source -ErrorAction SilentlyContinue ).Path
if ( -not $RootPath ) { throw "! Source not found {$Source}" }
if ( $ZipFile -notmatch "\\.zip$" ) { $ZipFile = $ZipFile -replace "$",".zip" }
if ( $Recurse -eq $true ) { $RecurseArgument = "-Recurse" }
if ( $AbsolutePaths -eq $true ) { $AbsolutePathsArgument = "-AbsolutePaths" }
if ( $DeleteAfterZip -eq $true ) { $DeleteAfterZipArgument = "-DeleteAfterZip" }
if ( $Include )
{
$Include = $Include -join ","
$IncludeArgument = "-Include $Include"
$Source = $Source+"\\*"
}
if ( $Exclude )
{
$Exclude = $Exclude -join ","
$ExcludeArgument = "-Exclude $Exclude"
}
$GetCommand = "Get-ChildItem -Path '$Source' $RecurseArgument $IncludeArgument $ExcludeArgument -Force"
$ItemsToZip = Invoke-Expression -Command $GetCommand
$SizeBeforeZip = ( $ItemsToZip | Measure-Object -Property Length -Sum -ErrorAction SilentlyContinue ).Sum
$SizeBeforeZipInMB = $SizeBeforeZip | ForEach-Object { "{0:N2}" -f ($_ / 1MB) }
if ( -not $SizeBeforeZip )
{
Write-Output "NOTHING TO ZIP"
break
}
$StartTime = Get-Date
Write-Output "`n===================================`n=> Start Time : $($StartTime.ToString(""dd/MM/yyyy-HH:mm:ss""))`n"
Write-Output "TOTAL SIZE BEFORE ZIP : {$SizeBeforeZipInMB MB}`n"
Write-Output "Initializing ZIP File {$ZipFile} ...`n"
$CreateZIPContainer = New-Item -ItemType File -Path $ZipFile -Force -ErrorAction SilentlyContinue
if ( -not $CreateZIPContainer ) { throw "! Unable to create ZIP container {$ZipFile}" }
$oZipOutputStream = New-Object -TypeName ICSharpCode.SharpZipLib.Zip.ZipOutputStream([System.IO.File]::Create($ZipFile))
[byte[]] $Buffer = New-Object Byte[] 4096
foreach ( $Item in $ItemsToZip )
{
if ( $Item.FullName -ne $ZipFile )
{
if ( Test-Path ( $Item.FullName ) -ErrorAction SilentlyContinue )
{
$ZipEntry = $Item.FullName
if ( -not $AbsolutePaths )
{
$ReplacePath = [Regex]::Escape( $RootPath+"\\" )
$ZipEntry = $Item.FullName -replace $ReplacePath,""
}
if ( $Item.psIsContainer -eq $true )
{
if ( $Recurse -eq $true )
{
Write-Output "Processing ZIP of Directory {$($Item.FullName)} ..."
$OldErrorActionPreference = $ErrorActionPreference
$ErrorActionPreference = "SilentlyContinue"
$oZipEntry = New-Object -TypeName ICSharpCode.SharpZipLib.Zip.ZipEntry("$ZipEntry/")
$oZipOutputStream.PutNextEntry($oZipEntry)
if ( $? -ne $true )
{
$ItemsNotZipped += @($Item.FullName)
$ErrorsArray += @("! Unable to ZIP Directory {$($Item.FullName)}")
}
$ErrorActionPreference = $OldErrorActionPreference
}
}
else
{
Write-Output "Processing ZIP of File {$($Item.FullName)} ..."
$OldErrorActionPreference = $ErrorActionPreference
$ErrorActionPreference = "SilentlyContinue"
$FileStream = [IO.File]::OpenRead($Item.FullName)
$oZipEntry = New-Object -TypeName ICSharpCode.SharpZipLib.Zip.ZipEntry("$ZipEntry")
$oZipOutputStream.PutNextEntry($oZipEntry)
[ICSharpCode.SharpZipLib.Core.StreamUtils]::Copy($FileStream,$oZipOutputStream,$Buffer)
if ( $? -ne $true )
{
$ItemsNotZipped += @($Item.FullName)
$ErrorsArray += @("! Unable to ZIP File {$($Item.FullName)}")
}
$FileStream.Close()
}
}
}
}
$oZipOutputStream.Finish()
$oZipOutputStream.Close()
if ( $? -eq $true )
{
$ErrorActionPreference = $OldErrorActionPreference
if ( $DeleteAfterZip )
{
$ItemsToZip | Where-Object { $ItemsNotZipped -notcontains $_.FullName } | ForEach-Object {
if ( $_.psIsContainer -ne $true )
{
if ( Test-Path ( $_.FullName ) -ErrorAction SilentlyContinue )
{
Write-Output "Processing Delete of File {$($_.FullName)} ..."
$RemoveItem = Remove-Item -Path $_.FullName -Force -ErrorAction SilentlyContinue
if ( $? -ne $true )
{
$ErrorsArray += @("! Unable to Delete File {$($_.FullName)}")
}
}
}
}
if ( $Recurse )
{
$ItemsToZip | Where-Object { $ItemsNotZipped -notcontains ( Split-Path -Parent $_.FullName ) } | ForEach-Object {
if ( $_.psIsContainer -eq $true )
{
if ( Test-Path ( $_.FullName ) -ErrorAction SilentlyContinue )
{
Write-Output "Processing Delete of Directory {$($_.FullName)} ..."
$RemoveItem = Remove-Item -Path $_.FullName -Force -Recurse -ErrorAction SilentlyContinue
if ( $? -ne $true )
{
$ErrorsArray += @("! Unable to Delete Directory {$($_.FullName)}")
}
}
}
}
}
}
Write-Output "`nZIP File Created {$ZipFile} ...`n"
}
else
{
$ErrorActionPreference = $OldErrorActionPreference
$ErrorsArray += @("! ZIP Archive {$ZipFile} Creation Failed`n")
}
$EndTime = Get-Date
$ExecutionTime = ($EndTime-$StartTime)
Write-Output "`nExecution Time : $ExecutionTime`n"
Write-Output "=> End Time : $($EndTime.ToString(""dd/MM/yyyy-HH:mm:ss""))`n=================================`n"
if ( $ErrorsArray )
{
Write-Output "`n[ ERRORS OCCURED ]"
$ErrorsArray
return $false
}
else
{
$SizeAfterZip = ( Get-Item -Path $ZipFile -Force -ErrorAction SilentlyContinue | Measure-Object -Property Length -Sum -ErrorAction SilentlyContinue ).Sum
$SizeAfterZipInMB = $SizeAfterZip | ForEach-Object { "{0:N2}" -f ($_ / 1MB) }
Write-Output "`nTOTAL SIZE AFTER ZIP : {$SizeAfterZipInMB MB}`n"
$Gain = ( $SizeBeforeZip - $SizeAfterZip )
$GainInMB = $Gain | ForEach-Object { "{0:N2}" -f ($_ / 1MB) }
if ( $Gain -gt 0 )
{
$GainInPercent = (($SizeBeforeZip - $SizeAfterZip) / $SizeBeforeZip) * 100 | ForEach-Object { "{0:N2}" -f $_ }
Write-Output "GAIN : {$GainInMB MB} ($GainInPercent %)`n"
}
}
}
Export-ModuleMember -Function New-Zip
|
combined_dataset/train/non-malicious/sample_59_74.ps1 | sample_59_74.ps1 | @{
GUID="CA046F10-CA64-4740-8FF9-2565DBA61A4F"
Author="PowerShell"
CompanyName="Microsoft Corporation"
Copyright="Copyright (c) Microsoft Corporation."
ModuleVersion="7.0.0.0"
CompatiblePSEditions = @("Core")
PowerShellVersion="3.0"
FunctionsToExport = @()
CmdletsToExport="Get-WinEvent", "New-WinEvent", "Get-Counter"
AliasesToExport = @()
NestedModules="Microsoft.PowerShell.Commands.Diagnostics.dll"
TypesToProcess="GetEvent.types.ps1xml"
FormatsToProcess="Event.format.ps1xml", "Diagnostics.format.ps1xml"
HelpInfoURI = 'https://aka.ms/powershell72-help'
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDPn0/Kw53z57yO
# 1TekDBJE1OmAf8RR94VaWe+Hq0qiG6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDg1qHtk+kS+nPK5UxxfdCkB
# E2/pV7IDBT4ObGuanFTvMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAciCqWpO091PCUBl8VcQfuJ7tcB3Z5xS0fsTyC9pakH9sEKWpkDMr/3vB
# GYmU0HPSF0sGKjVu69hP36x4VfzB4ccGaz7Ofq+nP5kvcgWA89xdXB9u9pV219Pq
# m/3KqeoI0sam56aXRbWxRS78o296XaGWzYTkj/il89e7m8CsM78VHOkLztqq8CH2
# WLZHwhMeqjP1+nBnVHW7vH7PTYsNzBjkoyTR1wTGjKl9nWH6Wdv1BvODOASd3l9S
# 8veaeS8xO0RGMs+LUjg9sbB08R68x8cAfMAV48x/XInpoC/JyQ5Uaw+XmWCzfYSo
# vdqWsneKpRLF4bDJ5RiPlg0IKhOooaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDcpWwqflvXyMz7JNlNApi3kTCwneX0LBlIbFRKzW9KNwIGZlddqYdx
# GBMyMDI0MDYxMzAzMjAxNi44NjhaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC
# RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5
# ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi
# AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm
# JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz
# X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE
# nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP
# MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61
# ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG
# MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw
# S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+
# mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw
# WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3
# uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s
# Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU
# JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc
# ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0
# CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN
# jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1
# Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG
# eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp
# sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4
# vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW
# w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8
# FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE
# MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOoUT80wIhgPMjAyNDA2MTMwMDQ4MTNaGA8yMDI0MDYxNDAwNDgxM1owdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6hRPzQIBADAHAgEAAgIDxTAHAgEAAgITQTAKAgUA
# 6hWhTQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAIhI1mgXH10uv2l9GzMQ
# OLg+7GWGDmVwOXPpQPD54KKIj7gNfvMz7zgUFwoZkHwwvuRjyvCSTx/0VQXPJHWQ
# k6ojHfin1eNNu9n5Fk0no9MMRc/4jtmZohJtDY44yyJ1hvsJoOTopdgxAbCVMSrs
# xlExm89ChUm9bmjZi1XgnQ2qMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgGgsdVNM/C/UfKuHQvFgfCNojVYZygRzUMzkUPrUh1BAwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIIN
# NzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3MHg
# jMJfWF6OAAEAAAHcMCIEILx5R9MK3zyYbzuTcDmU0TTvF3fgg9/5CXdl+AeUFU6a
# MA0GCSqGSIb3DQEBCwUABIICAAS+QcTxoD49AtS+CmEiw9nvJun67aDL6aNtY+LF
# Ps40KFjj4HIX4n5u4jDWijS5A7+JDMJTHu3FMGzUHqAEuLKwtmqAzIXR7D2+YXlI
# Okv/sIQbjBVdgzGaQyrgim0so+zGQf0awu7Uzt0ESBwJ92zW3s7ivPsyPNTEVRst
# Wn2q51kkt5ymi1XG8vMTeHvOlYui9PkgitLEdb34AO+4nkU70AMx7OPKKOni0Vic
# tmvWVd2DbHhtzycgVBgYPmIYoRz38pstz48l/Y2WwT79jplMhURNss2WPo5QnHgZ
# JpV4sOqFirfGazer9lrD1FneGESwuXOZl3WveD79PBIozuyd2113YpkHB9xgAExf
# Ep1zftg215KTcjzC0jnMI6IEXbupfhx73pVHNa7FgDAZQsTZux/Z6UHpBTJGCryf
# kXK45yQHnXqZjzLtLLyGpyyWhC1aIT8NTaOE6uzcmCprgJ03VGbRaeuRlU+Lb98L
# GjVAOLdpJDsVwhocpZw+OFnrgZWehSAUEos8vi6DMGBtDyakhiCKn5GSquAqOZYy
# SohOVeyqeLL/c3lXpYaCxExBXQ+55CZBVF6u62ou7iAIgPkod2lcWXlciw0P966m
# nt/mUIFblxZ9gQJNrUjZjrht/e7m9MJgeH4n0j6/LhPlbRY6O9d7M4fzvP1oVJRx
# iyfc
# SIG # End signature block
|
combined_dataset/train/non-malicious/78.ps1 | 78.ps1 |
function Get-AuthToken {
[cmdletbinding()]
param
(
[Parameter(Mandatory=$true)]
$User
)
$userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User
$tenant = $userUpn.Host
Write-Host "Checking for AzureAD module..."
$AadModule = Get-Module -Name "AzureAD" -ListAvailable
if ($AadModule -eq $null) {
Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview"
$AadModule = Get-Module -Name "AzureADPreview" -ListAvailable
}
if ($AadModule -eq $null) {
write-host
write-host "AzureAD Powershell module not installed..." -f Red
write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow
write-host "Script can't continue..." -f Red
write-host
exit
}
if($AadModule.count -gt 1){
$Latest_Version = ($AadModule | select version | Sort-Object)[-1]
$aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version }
if($AadModule.count -gt 1){
$aadModule = $AadModule | select -Unique
}
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
else {
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
[System.Reflection.Assembly]::LoadFrom($adal) | Out-Null
[System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null
$clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547"
$redirectUri = "urn:ietf:wg:oauth:2.0:oob"
$resourceAppIdURI = "https://graph.microsoft.com"
$authority = "https://login.microsoftonline.com/$Tenant"
try {
$authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority
$platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto"
$userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId")
$authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result
if($authResult.AccessToken){
$authHeader = @{
'Content-Type'='application/json'
'Authorization'="Bearer " + $authResult.AccessToken
'ExpiresOn'=$authResult.ExpiresOn
}
return $authHeader
}
else {
Write-Host
Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red
Write-Host
break
}
}
catch {
write-host $_.Exception.Message -f Red
write-host $_.Exception.ItemName -f Red
write-host
break
}
}
Function Get-IntuneBrand(){
[cmdletbinding()]
$graphApiVersion = "Beta"
$Resource = "deviceManagement/intuneBrand"
try {
$uri = "https://graph.microsoft.com/$graphApiVersion/$($resource)"
Invoke-RestMethod -Uri $uri -Headers $authToken -Method Get
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
Function Export-JSONData(){
param (
$JSON,
$ExportPath
)
try {
if($JSON -eq "" -or $JSON -eq $null){
write-host "No JSON specified, please specify valid JSON..." -f Red
}
elseif(!$ExportPath){
write-host "No export path parameter set, please provide a path to export the file" -f Red
}
elseif(!(Test-Path $ExportPath)){
write-host "$ExportPath doesn't exist, can't export JSON Data" -f Red
}
else {
$JSON1 = ConvertTo-Json $JSON -Depth 5
$JSON_Convert = $JSON1 | ConvertFrom-Json
$displayName = $JSON_Convert.displayName
$DisplayName = $DisplayName -replace '\<|\>|:|"|/|\\|\||\?|\*', "_"
$Properties = ($JSON_Convert | Get-Member | ? { $_.MemberType -eq "NoteProperty" }).Name
$FileName_JSON = "$DisplayName" + "_" + $(get-date -f dd-MM-yyyy-H-mm-ss) + ".json"
$Object = New-Object System.Object
foreach($Property in $Properties){
$Object | Add-Member -MemberType NoteProperty -Name $Property -Value $JSON_Convert.$Property
}
write-host "Export Path:" "$ExportPath"
$JSON1 | Set-Content -LiteralPath "$ExportPath\$FileName_JSON"
write-host "JSON created in $ExportPath\$FileName_JSON..." -f cyan
}
}
catch {
$_.Exception
}
}
write-host
if($global:authToken){
$DateTime = (Get-Date).ToUniversalTime()
$TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes
if($TokenExpires -le 0){
write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow
write-host
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
}
else {
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
$ExportPath = Read-Host -Prompt "Please specify a path to export Company Portal Branding data to e.g. C:\IntuneOutput"
$ExportPath = $ExportPath.replace('"','')
if(!(Test-Path "$ExportPath")){
Write-Host
Write-Host "Path '$ExportPath' doesn't exist, do you want to create this directory? Y or N?" -ForegroundColor Yellow
$Confirm = read-host
if($Confirm -eq "y" -or $Confirm -eq "Y"){
new-item -ItemType Directory -Path "$ExportPath" | Out-Null
Write-Host
}
else {
Write-Host "Creation of directory path was cancelled..." -ForegroundColor Red
Write-Host
break
}
}
Write-Host
$IntuneBrand = Get-IntuneBrand
if($IntuneBrand.displayName){
write-host "Exporting Company Portal Branding" -f Yellow
Export-JSONData -JSON $IntuneBrand -ExportPath "$ExportPath"
Write-Host
}
else {
Write-Host "Company Portal Branding is set as default..." -ForegroundColor Red
write-host "Company Name property is required at a minimum..." -ForegroundColor Red
Write-Host
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.