full_path
stringlengths 31
232
| filename
stringlengths 4
167
| content
stringlengths 0
48.3M
|
|---|---|---|
combined_dataset/train/non-malicious/71.ps1
|
71.ps1
|
function Get-AuthToken {
[cmdletbinding()]
param
(
[Parameter(Mandatory=$true)]
$User
)
$userUpn = New-Object "System.Net.Mail.MailAddress" -ArgumentList $User
$tenant = $userUpn.Host
Write-Host "Checking for AzureAD module..."
$AadModule = Get-Module -Name "AzureAD" -ListAvailable
if ($AadModule -eq $null) {
Write-Host "AzureAD PowerShell module not found, looking for AzureADPreview"
$AadModule = Get-Module -Name "AzureADPreview" -ListAvailable
}
if ($AadModule -eq $null) {
write-host
write-host "AzureAD Powershell module not installed..." -f Red
write-host "Install by running 'Install-Module AzureAD' or 'Install-Module AzureADPreview' from an elevated PowerShell prompt" -f Yellow
write-host "Script can't continue..." -f Red
write-host
exit
}
if($AadModule.count -gt 1){
$Latest_Version = ($AadModule | select version | Sort-Object)[-1]
$aadModule = $AadModule | ? { $_.version -eq $Latest_Version.version }
if($AadModule.count -gt 1){
$aadModule = $AadModule | select -Unique
}
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
else {
$adal = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.dll"
$adalforms = Join-Path $AadModule.ModuleBase "Microsoft.IdentityModel.Clients.ActiveDirectory.Platform.dll"
}
[System.Reflection.Assembly]::LoadFrom($adal) | Out-Null
[System.Reflection.Assembly]::LoadFrom($adalforms) | Out-Null
$clientId = "d1ddf0e4-d672-4dae-b554-9d5bdfd93547"
$redirectUri = "urn:ietf:wg:oauth:2.0:oob"
$resourceAppIdURI = "https://graph.microsoft.com"
$authority = "https://login.microsoftonline.com/$Tenant"
try {
$authContext = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.AuthenticationContext" -ArgumentList $authority
$platformParameters = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.PlatformParameters" -ArgumentList "Auto"
$userId = New-Object "Microsoft.IdentityModel.Clients.ActiveDirectory.UserIdentifier" -ArgumentList ($User, "OptionalDisplayableId")
$authResult = $authContext.AcquireTokenAsync($resourceAppIdURI,$clientId,$redirectUri,$platformParameters,$userId).Result
if($authResult.AccessToken){
$authHeader = @{
'Content-Type'='application/json'
'Authorization'="Bearer " + $authResult.AccessToken
'ExpiresOn'=$authResult.ExpiresOn
}
return $authHeader
}
else {
Write-Host
Write-Host "Authorization Access Token is null, please re-run authentication..." -ForegroundColor Red
Write-Host
break
}
}
catch {
write-host $_.Exception.Message -f Red
write-host $_.Exception.ItemName -f Red
write-host
break
}
}
Function Get-IntuneApplication(){
[cmdletbinding()]
$graphApiVersion = "Beta"
$Resource = "deviceAppManagement/mobileApps"
try {
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
(Invoke-RestMethod -Uri $uri –Headers $authToken –Method Get).Value | ? { (!($_.'@odata.type').Contains("managed")) }
}
catch {
$ex = $_.Exception
Write-Host "Request to $Uri failed with HTTP Status $([int]$ex.Response.StatusCode) $($ex.Response.StatusDescription)" -f Red
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
Function Get-ApplicationAssignment(){
[cmdletbinding()]
param
(
$ApplicationId
)
$graphApiVersion = "Beta"
$Resource = "deviceAppManagement/mobileApps/$ApplicationId/?`$expand=categories,assignments"
try {
if(!$ApplicationId){
write-host "No Application Id specified, specify a valid Application Id" -f Red
break
}
else {
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
(Invoke-RestMethod -Uri $uri –Headers $authToken –Method Get)
}
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
Function Add-ApplicationAssignment(){
[cmdletbinding()]
param
(
$ApplicationId,
$TargetGroupId,
[ValidateSet("available", "required")]
$InstallIntent
)
$graphApiVersion = "Beta"
$Resource = "deviceAppManagement/mobileApps/$ApplicationId/assign"
try {
if(!$ApplicationId){
write-host "No Application Id specified, specify a valid Application Id" -f Red
break
}
if(!$TargetGroupId){
write-host "No Target Group Id specified, specify a valid Target Group Id" -f Red
break
}
if(!$InstallIntent){
write-host "No Install Intent specified, specify a valid Install Intent - available, notApplicable, required, uninstall, availableWithoutEnrollment" -f Red
break
}
$AssignedGroups = (Get-ApplicationAssignment -ApplicationId $ApplicationId).assignments
if($AssignedGroups){
$App_Count = @($AssignedGroups).count
$i = 1
if($AssignedGroups.target.GroupId -contains $TargetGroupId){
Write-Host "'$AADGroup' is already targetted to this application, can't add an AAD Group already assigned..." -f Red
}
else {
$JSON = @"
{
"mobileAppAssignments": [
{
"@odata.type": "
"target": {
"@odata.type": "
"groupId": "$TargetGroupId"
},
"intent": "$InstallIntent"
},
"@
foreach($Assignment in $AssignedGroups){
$ExistingTargetGroupId = $Assignment.target.GroupId
$ExistingInstallIntent = $Assignment.intent
$JSON += @"
{
"@odata.type": "
"target": {
"@odata.type": "
"groupId": "$ExistingTargetGroupId"
},
"intent": "$ExistingInstallIntent"
"@
if($i -ne $App_Count){
$JSON += @"
},
"@
}
else {
$JSON += @"
}
"@
}
$i++
}
$JSON += @"
]
}
"@
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
Invoke-RestMethod -Uri $uri -Headers $authToken -Method Post -Body $JSON -ContentType "application/json"
}
}
else {
$JSON = @"
{
"mobileAppAssignments": [
{
"@odata.type": "
"target": {
"@odata.type": "
"groupId": "$TargetGroupId"
},
"intent": "$InstallIntent"
}
]
}
"@
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Resource)"
Invoke-RestMethod -Uri $uri -Headers $authToken -Method Post -Body $JSON -ContentType "application/json"
}
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
Function Get-AADGroup(){
[cmdletbinding()]
param
(
$GroupName,
$id,
[switch]$Members
)
$graphApiVersion = "v1.0"
$Group_resource = "groups"
try {
if($id){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=id eq '$id'"
(Invoke-RestMethod -Uri $uri –Headers $authToken –Method Get).Value
}
elseif($GroupName -eq "" -or $GroupName -eq $null){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)"
(Invoke-RestMethod -Uri $uri –Headers $authToken –Method Get).Value
}
else {
if(!$Members){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=displayname eq '$GroupName'"
(Invoke-RestMethod -Uri $uri –Headers $authToken –Method Get).Value
}
elseif($Members){
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)?`$filter=displayname eq '$GroupName'"
$Group = (Invoke-RestMethod -Uri $uri –Headers $authToken –Method Get).Value
if($Group){
$GID = $Group.id
$Group.displayName
write-host
$uri = "https://graph.microsoft.com/$graphApiVersion/$($Group_resource)/$GID/Members"
(Invoke-RestMethod -Uri $uri –Headers $authToken –Method Get).Value
}
}
}
}
catch {
$ex = $_.Exception
$errorResponse = $ex.Response.GetResponseStream()
$reader = New-Object System.IO.StreamReader($errorResponse)
$reader.BaseStream.Position = 0
$reader.DiscardBufferedData()
$responseBody = $reader.ReadToEnd();
Write-Host "Response content:`n$responseBody" -f Red
Write-Error "Request to $Uri failed with HTTP Status $($ex.Response.StatusCode) $($ex.Response.StatusDescription)"
write-host
break
}
}
write-host
if($global:authToken){
$DateTime = (Get-Date).ToUniversalTime()
$TokenExpires = ($authToken.ExpiresOn.datetime - $DateTime).Minutes
if($TokenExpires -le 0){
write-host "Authentication Token expired" $TokenExpires "minutes ago" -ForegroundColor Yellow
write-host
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
}
else {
if($User -eq $null -or $User -eq ""){
$User = Read-Host -Prompt "Please specify your user principal name for Azure Authentication"
Write-Host
}
$global:authToken = Get-AuthToken -User $User
}
$AADGroup = Read-Host -Prompt "Enter the Azure AD Group name where application will be assigned"
$TargetGroupId = (get-AADGroup -GroupName "$AADGroup").id
if($TargetGroupId -eq $null -or $TargetGroupId -eq ""){
Write-Host "AAD Group - '$AADGroup' doesn't exist, please specify a valid AAD Group..." -ForegroundColor Red
Write-Host
exit
}
Write-Host
$ApplicationName = "IntuneApplication"
$Application = Get-IntuneApplication | ? { $_.displayName -eq "$ApplicationName" }
if(@($Application).count -eq 1){
$Application
Add-ApplicationAssignment -ApplicationId $Application.id -TargetGroupId "$TargetGroupId" -InstallIntent required
}
else {
Write-Host "There are" @($Application).count "applications with display Name '$ApplicationName'..." -ForegroundColor Red
Write-Host
}
|
combined_dataset/train/non-malicious/sample_24_37.ps1
|
sample_24_37.ps1
|
# Compiling Piglit
$ProgressPreference = "SilentlyContinue"
$MyPath = $MyInvocation.MyCommand.Path | Split-Path -Parent
. "$MyPath\mesa_init_msvc.ps1"
$source_dir = Join-Path -Path "$PWD" -ChildPath "src"
$waffle_source = Join-Path -Path "$source_dir" -ChildPath "waffle"
$waffle_install = Join-Path -Path "$PWD" -ChildPath "waffle"
$piglit_source = Join-Path -Path "$PWD" -ChildPath "Piglit"
Write-Host "Cloning Waffle at:"
Get-Date
New-Item -ItemType Directory -Path "$waffle_source" | Out-Null
Push-Location -Path $waffle_source
git init
git remote add origin https://gitlab.freedesktop.org/mesa/waffle.git
git fetch --depth 1 origin 950a1f35a718bc2a8e1dda75845e52651bb331a7 # of branch master
if (!$?) {
Write-Host "Failed to fetch Waffle repository"
Pop-Location
Exit 1
}
git checkout FETCH_HEAD
Pop-Location
Write-Host "Compiling Waffle at:"
Get-Date
$waffle_build = Join-Path -Path "$source_dir" -ChildPath "waffle\build"
New-Item -ItemType Directory -Path "$waffle_build" | Out-Null
Push-Location -Path $waffle_build
meson setup `
--buildtype=release `
--default-library=static `
--prefix="$waffle_install" && `
ninja -j32 install
if (!$?) {
Write-Host "Failed to compile or install Waffle"
Pop-Location
Exit 1
}
Pop-Location
Remove-Item -Recurse -Force -ErrorAction SilentlyContinue -Path "$waffle_build" | Out-Null
Write-Host "Downloading glext.h at:"
Get-Date
New-Item -ItemType Directory -Path "$source_dir\glext\GL" | Out-Null
Invoke-WebRequest -Uri 'https://github.com/KhronosGroup/OpenGL-Registry/raw/main/api/GL/glext.h' -OutFile "$source_dir\glext\GL\glext.h" | Out-Null
Write-Host "Cloning Piglit at:"
Get-Date
New-Item -ItemType Directory -Path "$piglit_source" | Out-Null
Push-Location -Path $piglit_source
git init
git remote add origin https://gitlab.freedesktop.org/mesa/piglit.git
git fetch --depth 1 origin b41accc83689966f91217fc5b57dbe06202b8c8c # of branch main
if (!$?) {
Write-Host "Failed to fetch Piglit repository"
Pop-Location
Exit 1
}
git checkout FETCH_HEAD
Write-Host "Compiling Piglit at:"
Get-Date
cmake -S . -B . `
-GNinja `
-DCMAKE_BUILD_TYPE=Release `
-DPIGLIT_USE_WAFFLE=ON `
-DWaffle_INCLUDE_DIRS="$waffle_install\include\waffle-1" `
-DWaffle_LDFLAGS="$waffle_install\lib\libwaffle-1.a" `
-DGLEXT_INCLUDE_DIR="$source_dir\glext" && `
ninja -j32
if (!$?) {
Write-Host "Failed to compile Piglit"
Pop-Location
Exit 1
}
Pop-Location
$depsInstallPath="C:\mesa-deps"
$piglit_bin = "$piglit_source\bin"
# Hard link Agility SDK into subfolder of piglit
$agility_dest = New-Item -ItemType Directory -Path $piglit_bin -Name 'D3D12'
New-Item -ItemType HardLink -path $agility_dest\D3D12Core.dll -Value $depsInstallPath\bin\D3D12\D3D12Core.dll
New-Item -ItemType HardLink -path $agility_dest\d3d12SDKLayers.dll -Value $depsInstallPath\bin\D3D12\d3d12SDKLayers.dll
# Hard link WARP next to piglit
New-Item -ItemType HardLink -path $piglit_bin\d3d10warp.dll -Value $depsInstallPath\bin\d3d10warp.dll
Remove-Item -Recurse -Force -ErrorAction SilentlyContinue -Path "$source_dir" | Out-Null
Remove-Item -Recurse -Force -ErrorAction SilentlyContinue -Path "$waffle_install" | Out-Null
# Cleanup piglit intermediate files
Get-ChildItem -Force -ErrorAction SilentlyContinue -Recurse "$piglit_source" | Where-Object {
if($_.FullName -match "CMake|.git|.lib"){
Remove-Item -Recurse -Force -ErrorAction SilentlyContinue -Path $_.FullName | Out-Null
}
}
Write-Host "Compiling Piglit finished at:"
Get-Date
|
combined_dataset/train/non-malicious/sample_18_43.ps1
|
sample_18_43.ps1
|
# ----------------------------------------------------------------------------------
#
# Copyright Microsoft Corporation
# Licensed under the Apache License, Version 2.0 (the \"License\");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an \"AS IS\" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Create a in-memory object for LoadBalancerFrontendIPConfiguration
.Description
Create a in-memory object for LoadBalancerFrontendIPConfiguration
#>
function New-AzCloudServiceLoadBalancerFrontendIPConfigurationObject {
[OutputType('Microsoft.Azure.PowerShell.Cmdlets.CloudService.Models.Api20220904.LoadBalancerFrontendIPConfiguration')]
[CmdletBinding(PositionalBinding=$false)]
Param(
[Parameter(HelpMessage="Name of FrontendIpConfigration.")]
[string]
$Name,
[Parameter(ParameterSetName="DefaultParameterSet", HelpMessage="Resource Id.")]
[string]
$PublicIPAddressId,
[Parameter(ParameterSetName="PrivateIP", HelpMessage="Private IP Address")]
[string]
$PrivateIPAddress,
[Parameter(ParameterSetName="PrivateIP", HelpMessage="Subnet ID")]
[string]
$SubnetId
)
process {
$Object = [Microsoft.Azure.PowerShell.Cmdlets.CloudService.Models.Api20220904.LoadBalancerFrontendIPConfiguration]::New()
$Object.Name = $Name
if ($PSBoundParameters.ContainsKey("PublicIPAddressId")) {
$Object.PublicIPAddressId = $PublicIPAddressId
}
if ($PSBoundParameters.ContainsKey("PrivateIPAddress")) {
$Object.privateIPAddress = $PrivateIPAddress
$Object.SubnetId = $SubnetId
}
return $Object
}
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBfBTV8G3uFKuQt
# RlJs+fo610LnUHbRHFYDNRntC3Br96CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDvDMsCAImKedY9WX4quQqG9
# +kv5xUi2l5RINsmxkQnbMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAoliMVPoh++mFmm5uFeJgCflSt6lHKJgivyq8mJ4mqGUdvOn664hZtYEv
# a1zau7jJovZUyLnh6PoBzkdKmxkGrJalnxNQGXE0LAM/CVmplVZPHpwyRIPfuk33
# LJqIAPjiD+z8T9BQ3Iym40JE5t4plezlndnss8xn3TY+NIHPMgzZ5G0Bijlj5pAL
# VBEbRe2rAR4lbqXr81Z672fU/xV1ASH8i9C9oJUWgLbRJZs01He/8ZHhSr9kJ1Yr
# CcZdPvgXenFs6OPlpCTJ2iADbRpaq0vuHmiE00GbrPIzhoBXfQo9TF770BjQ9rzC
# KVSkbQbBLZC8zr7KnvihVK3bCZFueKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBhs1sS+xgmDVRqxXKbzBTklgFzRRXTz1e8nfQoT/8VFAIGZiAsyEFB
# GBMyMDI0MDQyMzEzMTUyNC40NDFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC
# RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5
# ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi
# AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm
# JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz
# X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE
# nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP
# MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61
# ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG
# MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw
# S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+
# mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw
# WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3
# uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s
# Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU
# JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc
# ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0
# CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN
# jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1
# Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG
# eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp
# sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4
# vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW
# w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8
# FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE
# MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnRQkowIhgPMjAyNDA0MjMwNDA4NDJaGA8yMDI0MDQyNDA0MDg0MlowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6dFCSgIBADAHAgEAAgIUTDAHAgEAAgISBDAKAgUA
# 6dKTygIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKdfQ6krn/9XKU8Iy031
# XFlG85OEXSoh4dBGaqeGlD943dkMdlPnjE+MNokMWYaQ0JNKwtpMkAnPoDcyylCP
# CELlR54i9KaOR7WJp72VKtL04H/EbopdGU86A523FLhAdtVx7+UUaWwr/s7KcbHa
# SrCmgPUrOzaTxyDnHHkwJ3OWMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgXS7H1bjVCEVQZQgbg3DhrBonavxzemhoKLe4qGEUTCwwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIIN
# NzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3MHg
# jMJfWF6OAAEAAAHcMCIEIMlj5Czdui1+yXOeEgNyO7aqtd0QRMsB+0i74NsgRz7z
# MA0GCSqGSIb3DQEBCwUABIICAD4kuiUiNwLKP9WI4qGapMu15PZA5hGeKaA4BFdz
# AIRg47ehwn1pdzAcSuqa2YWb7EhFW1JFJjfKRvXutxZk3w+8T34sVVhlu45bO/Dj
# sJO5jwGjooxT12GyZZd6yOBT/SDDgceDwXjwO8XLWmrQ05iX1bmfFRCn6KvkYl+8
# O9YDB/JfBrgXlA5JwtBSklZl6MzzlQ8m6sUCH4WOmoZiPN6xi8uvbMZOShHyc4dG
# k5OngXKafYmpLD6J3HSWBRXDXyiueBvuszhr/VAmqP2loax/rRHbgZkoczDKrGxC
# TohYKBiFkLlkDOV/c5UmYBgW3veaSovpTouTg/dBQc6z3rGNa6U0LY3kL/iTXPDd
# J+MymMCUNUdXo1TMIfyVU4R99NypWVlsKOE7KP5x1cpzA3CtA3/yR+4YuT8eIl5F
# pHdpKA6sAPZp704rF3rHfGtnHQadaEoSne//j4/RokRgpeSE2y//sf99HD+A623w
# jnZ03J+noAUuQ/AZGoI6oF6aki2U0WZwpsNKLw4Zy2gU8zgCsvKtv2FNEuUio/qM
# OlFJG3hdYjlMvNJXxcHPjNdYPUwa5f5t1lfZBoQk7EANlMLROOFj6+PovezkfNU6
# 288I/7PYukLU5whhtRPFnFx3+GvcX/5iVwpytGQxTW6x5mX8q/RnfIX6yNCanumn
# BVGC
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_30_97.ps1
|
sample_30_97.ps1
|
Add-AppxPackage
exit
cd C:\Users\sampler-win_10_x64\Desktop\
Get-AppxPackage >apps.tx
cd C:\Users\sampler-win_10_x64\Desktop\
Get-AppxPackage -allusers | Select Name, PackageFullName > apps_v2.txt
Get-AppxPackage | Select Name, PackageFullName > apps_v2.txt
Get-AppxPackage
Get-AppxPackage -Online
Get-AppxPackage -h
Get-AppxPackage help
Get-help -Name Get-AppxPackage
Get-help -Name Add-AppxPackage
Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-Table –AutoSize
Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, InstallDate | Format-Table –AutoSize > C:\Users\sampler-win_10_x64\Desktop\InstalledPrograms-PS.txt
Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-Table –AutoSize
Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-List –AutoSize
Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-List
Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-Table –AutoSize
Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, InstallDate | Format-Table –AutoSize
cd ..
ls /l
ls
cd .\sampler-win_10_x64\
ls
cd .\Downloads\
ls
sha1sum .\shockwave-12.3.5.205-installer.exe
sha1sum shockwave-12.3.5.205-installer.exe
shasum shockwave-12.3.5.205-installer.exe
Get-FileHash shockwave-12.3.5.205-installer.exe sha1
Get-FileHash shockwave-12.3.5.205-installer.exe SHA1
Get-FileHash shockwave-12.3.5.205-installer.exe
Get-FileHash shockwave-12.3.5.205-installer.exe -Algorithm SHA!
Get-FileHash shockwave-12.3.5.205-installer.exe -Algorithm SHA1
Get-FileHash
Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads - Algorithm SHA1
Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\SQLA17Developer.exe -Alhorithm SHA1
Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\SQLA17Developer.exe -Algorithm SHA1
clear
Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\SlackSetup.exe -Algorithm SHA1
Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\ZoomInstallerFull.exe -Algorithm SHA1
Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\PBIDesktopSetup_x64.exe -Algorithm SHA1
Get-FileHash -Path C:\Users\sampler-win_10_x64\Downloads\atlassian-jira-software-9.13.0-x64.exe -Algorithm SHA1
cd C:\Program Files\WindowsApps
cd C:\Program Files\WindowsApps
ls
cd ..
ll
ls
cd ..
ls
cd '.\Program Files\'
ls
dir -Force
Get-ACL -Path .\WindowsApps\
ls
pwd
|
combined_dataset/train/non-malicious/2303.ps1
|
2303.ps1
|
[CmdletBinding()]
param (
[Parameter(ValueFromPipeline,
ValueFromPipelineByPropertyName)]
[ValidateScript({ Test-Connection $_ -Quiet -Count 1 })]
[string[]]$Computername = 'localhost',
[Parameter()]
[ValidateRange(20, 120)]
[int]$PasswordLength = 50,
[Parameter(Mandatory)]
[string]$PasswordFilePath,
[Parameter()]
[string]$EncryptionKey,
[Parameter()]
[switch]$EnableAccount
)
begin {
function Create-RandomPassword {
Param (
[Parameter(Mandatory = $true)]
[ValidateRange(20, 120)]
[Int]$PasswordLength
)
$Password = [System.Web.Security.Membership]::GeneratePassword($PasswordLength, $PasswordLength / 4)
if ($Password.Length -ne $PasswordLength) {
throw new Exception("Password returned by GeneratePassword is not the same length as required. Required length: $($PasswordLength). Generated length: $($Password.Length)")
}
return $Password
}
function Set-Encryption ($UnencryptedPassword, $EncryptionKey) {
try {
$PasswordSecureString = ConvertTo-SecureString -AsPlainText -Force -String $UnencryptedPassword
$Sha256 = new-object System.Security.Cryptography.SHA256CryptoServiceProvider
$SecureString = $Sha256.ComputeHash([System.Text.UnicodeEncoding]::Unicode.GetBytes($EncryptionKey))
ConvertFrom-SecureString -Key $SecureString -SecureString $PasswordSecureString
} catch {
Write-Error "Error creating encryption key" -ErrorAction Stop
$_.Exception.Message
}
}
function ConvertTo-CleartextPassword {
Param (
[Parameter(Mandatory)]
[String]$EncryptedPassword,
[Parameter(Mandatory)]
[String]$EncryptionKey
)
$Sha256 = new-object System.Security.Cryptography.SHA256CryptoServiceProvider
$SecureStringKey = $Sha256.ComputeHash([System.Text.UnicodeEncoding]::Unicode.GetBytes($EncryptionKey))
[SecureString]$SecureStringPassword = ConvertTo-SecureString -String $EncryptedPassword -Key $SecureStringKey
Write-Output ([System.Runtime.InteropServices.Marshal]::PtrToStringAuto([System.Runtime.InteropServices.Marshal]::SecureStringToCoTaskMemUnicode($SecureStringPassword)))
}
Add-Type -AssemblyName "System.Web" -ErrorAction Stop
}
process {
foreach ($Computer in $Computername) {
try {
$Properties = @{
ComputerName = $Computer
Username = ''
Password = ''
PasswordType = ''
Result = ''
EnabledAccount = ''
}
if (!(Test-Connection -ComputerName $Computer -Quiet -Count 1)) {
Write-Warning "Computer '$Computer' is not online"
$Properties.Result = 'Offline'
[pscustomobject]$Properties | Export-Csv -Path $PasswordFilePath -Delimiter "`t" -Append -NoTypeInformation
} else {
$LocalUsers = Get-WmiObject -ComputerName $Computer -Class Win32_UserAccount -Filter "LocalAccount=true"
Write-Verbose "Found $($LocalUsers.Count) local users on $Computer"
foreach ($LocalUser in $LocalUsers) {
Write-Verbose "--Checking username $($LocalUser.Name) for administrator account"
$oUser = [ADSI]"WinNT://$Computer/$($LocalUser.Name), user"
$Sid = $oUser.objectSid.ToString().Replace(' ', '')
if ($Sid.StartsWith('1500000521') -and $Sid.EndsWith('4100')) {
Write-Verbose "--Username $($LocalUser.Name)|SID '$Sid' is the local administrator account"
$LocalAdministrator = $LocalUser
break
}
}
$Properties.UserName = $LocalAdministrator.Name
Write-Verbose "Creating random password for $($LocalAdministrator.Name)"
$Password = Create-RandomPassword -PasswordLength $PasswordLength
if ($EncryptionKey) {
$Properties.PasswordType = 'Encrypted'
$Properties.Password = (Set-Encryption $Password $EncryptionKey)
} else {
$Properties.Password = $Password
$Properties.PasswordType = 'Unencrypted'
}
$oUser.psbase.Invoke("SetPassword", $Password)
$Properties.Result = 'Success'
Write-Verbose "Checking to ensure local administrator '$($LocalAdministrator.Name)' is enabled"
if ($LocalAdministrator.Disabled) {
Write-Verbose "Local administrator '$($LocalAdministrator.Name)' is disabled. Enabling..."
$Properties.EnabledAccount = 'True'
$LocalAdministrator.Disabled = $false
$LocalAdministrator.Put() | Out-Null
} else {
$Properties.EnabledAccount = 'False'
Write-Verbose "Local administrator '$($LocalAdministrator.Name)' is already enabled."
}
[pscustomobject]$Properties | Export-Csv -Path $PasswordFilePath -Delimiter "`t" -Append -NoTypeInformation
}
} catch {
Write-Error $_.Exception.Message
}
}
}
|
combined_dataset/train/non-malicious/sample_62_56.ps1
|
sample_62_56.ps1
|
# ------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License (MIT). See License.txt in the repo root for license information.
# ------------------------------------------------------------
param (
[Parameter(Mandatory=$true)]
[ValidateSet('install','uninstall')]
[string] $Operation
)
function Ensure-ServiceState($targetState)
{
Write-Host "Waiting for the service state to become $targetState"
$svc = Get-WmiObject -Class Win32_Service -Filter "Name='ServiceFabricUpdateService'"
while (($svc -eq $null) -or ($svc -ne $null -and $svc.State -ne $targetState))
{
Start-Sleep -Seconds 3
$svc = Get-WmiObject -Class Win32_Service -Filter "Name='ServiceFabricUpdateService'"
}
Write-Host "The service state is $targetState as expected"
}
function Remove-Data($svcDirPath)
{
$dataDirPath = Join-Path $svcDirPath -ChildPath "Data"
if (Test-Path $dataDirPath)
{
Write-Host "Cleaning up service data"
Remove-Item -Path $dataDirPath -Recurse -Force
}
}
$lastExitCode = 0
$Identity = [System.Security.Principal.WindowsIdentity]::GetCurrent()
$Principal = New-Object System.Security.Principal.WindowsPrincipal($Identity)
$IsAdmin = $Principal.IsInRole([System.Security.Principal.WindowsBuiltInRole]::Administrator)
if(!$IsAdmin)
{
Write-host "Please run the script with administrative privileges." -ForegroundColor "Red"
exit 1
}
$service = Get-WmiObject -Class Win32_Service -Filter "Name='ServiceFabricUpdateService'"
if ($Operation -eq 'install' -and $service -ne $null)
{
Write-host "The service is already installed." -ForegroundColor "Red"
exit 1
}
elseif ($Operation -eq 'uninstall' -and $service -eq $null)
{
Write-host "The service has not been installed." -ForegroundColor "Red"
exit 1
}
$svcDirPath = $(Split-Path -parent $MyInvocation.MyCommand.Definition)
$svcExePath = Join-Path $svcDirPath -ChildPath "ServiceFabricUpdateService.exe"
if(!(Test-Path $svcExePath))
{
Write-host "Please keep the script right beside ServiceFabricUpdateService.exe." -ForegroundColor "Red"
exit 1
}
Write-host "Operation starts: $Operation"
if ($Operation -eq 'install')
{
Remove-Data($svcDirPath)
Start-Process -FilePath $svcExePath -ArgumentList "-install" -Wait
Ensure-ServiceState('Stopped')
Start-Service -Name "ServiceFabricUpdateService"
Ensure-ServiceState('Running')
}
else
{
if ($service.State -ne 'Stopped')
{
$service.StopService() > $null
Ensure-ServiceState('Stopped')
}
$service.Delete() > $null
Remove-Data($svcDirPath)
}
if($lastExitCode -ne 0)
{
Write-host "The operation fails. Error code: $lastExitCode." -ForegroundColor "Red"
exit 1
}
else
{
Write-host "The operation succeeds."
exit 0
}
# SIG # Begin signature block
# MIInvgYJKoZIhvcNAQcCoIInrzCCJ6sCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBFkMpvnyMXs0A0
# dvTm02jkBo6GMKArX/RU4krX8iGqGKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ4wghmaAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIL5G17QsCTlJ95/MXa+iek97
# F3aNaICF6lDtaeAYGBvcMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEACX3LmzpaTMAYPT8GDlmw24hrnrPXbwvLjRz2jgtNUi3ZqMGpTPcRQOHG
# 2wRpT4RpV2lJbR/6f7sTU9ZTEkqOfnDByvu9WEKIFKMOAwJUVdoxELaGYLYumPO3
# 7zrJH1yX9ZYc5Xz/7FMsJJ0cPhKblEXRK1w6GSN2bN1lVG5U3ySpva7u+9C06PDv
# yL0m6urrkrtKQs3Bl7d6hzhcIdIZvNwScknbK2ZaBzMyR53aTlGbUbAw/upRjNZV
# /E6EStecJgnLKLUDRSph/+qtUe3CeHuynCmI7CnuyAPMJJKuZWLt5RMHtPrpyfRe
# dWRSJam+UP2iz2XnrrgYsBX9Z75bo6GCFygwghckBgorBgEEAYI3AwMBMYIXFDCC
# FxAGCSqGSIb3DQEHAqCCFwEwghb9AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDzt27OIWCFTcXIg9c1FJw8EBCKtcOUEnWaDRIFbZ6UEAIGZk3X7Xei
# GBMyMDI0MDUyMjIzMDgxMy41NThaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIRdzCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC
# RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b
# cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E
# 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2
# aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er
# bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf
# ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog
# 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy
# kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy
# 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv
# mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+
# yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt
# vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV
# izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4
# 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r
# cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W
# JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq
# bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt
# ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg
# ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ
# CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz
# FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn
# boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58
# 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv
# uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtMwggI8AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow
# ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOn4VmIwIhgPMjAyNDA1MjIxOTMyNTBaGA8yMDI0MDUyMzE5MzI1MFowczA5Bgor
# BgEEAYRZCgQBMSswKTAKAgUA6fhWYgIBADAGAgEAAgEAMAcCAQACAhFUMAoCBQDp
# +afiAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMH
# oSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAa1mcHX8/RnSnxr7z9kuu
# yntZuGaxIOAc8t/c7FQTc8KBD3Qd34IAUr2Px63Jb9L5jJQ+cVhAVFGuTbQqbdXU
# WAkHL18ibFxBap/gdizrttFDc0QtuV9hMZzMQBhkg5sfrmZLrs/kMQTRRjTEOh0T
# TZ7YJ0IE/GwoJdB3ZUAYhhIxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzET
# MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
# TWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1T
# dGFtcCBQQ0EgMjAxMAITMwAAAdqO1claANERsQABAAAB2jANBglghkgBZQMEAgEF
# AKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEi
# BCAbzUk8ZZQ+65XnHgziwLsJxoixI9G80CBFq5Qmf9WMezCB+gYLKoZIhvcNAQkQ
# Ai8xgeowgecwgeQwgb0EICKlo2liwO+epN73kOPULT3TbQjmWOJutb+d0gI7GD3G
# MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEm
# MCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHajtXJ
# WgDREbEAAQAAAdowIgQg6k3irm7+G7qolzinr8Y1qgdaeiBjSlGIxGsIV2NT6KYw
# DQYJKoZIhvcNAQELBQAEggIACrrPMN/Soq2L4RE/FCkMaG04ckUwt/DWTK1CPzKo
# Etn2a2Y2gQ8IaSp2hkZ2tMCb2cyRi17nwX+TvLLDPGGaOx0oRSCOQiKlATcm4lnx
# 6OibT6c3B69WRpLVN+fU9LEa2p7ie10dAkOzCX2K9hSk3+0z9e/XJbtcpMLPO+zb
# MKmiHHvuRoAJOLslsieSwBpWPONa26ErqnTXCXCPCpDKfryJA4imtVETlxuU0xLS
# CtOUEM1UsQRt7e+Yby8iXnTqD8dQY+ybpBGeGcga9FfNJ4FsfgTn8E4TSmSg21Mv
# 1ismtD9o0BnJxrHf8O32MGbzObalcxj0BeCKVi25nTYVsXZ+L847sjb9FL40PyKU
# 0jenG9Ch9L+t3dPz0AGawlQyHarJEyZVR+xGDupfSUP3kHOoo8vNmbPzOuRgmBYv
# DLCF8ayGY/vHfOzf92f712WK2WEC/b/jp0/1/t+wwUw5MYCy7BNSixvq6ileTJwl
# 4hSS6PEDjClr6WIELCmMrn3s7I13zFBI5f4bwfWVV84IdbnQ8DYBrOCspVya3m3w
# 1UrVacLVdei0aDNYfGm5iTO5979l+Kqx80WJukXxLozpqnax2yDU7IHSUiQBL4bB
# OwM4KMo5O0fs7h95PzSN8qBlx/B+ioEr6Crrk8BDrKzws08+nJXWkMHlrbJlBQ5d
# I18=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_24_64.ps1
|
sample_24_64.ps1
|
#
# Module manifest for module 'OCI.PSModules.Datascience'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Datascience.dll'
# Version number of this module.
ModuleVersion = '75.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'e310e88b-80a4-4419-8054-2984936bf580'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Datascience Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Datascience.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Enable-OCIDatascienceModel',
'Enable-OCIDatascienceModelDeployment',
'Enable-OCIDatascienceNotebookSession',
'Export-OCIDatascienceModelArtifact',
'Get-OCIDatascienceFastLaunchJobConfigsList',
'Get-OCIDatascienceJob', 'Get-OCIDatascienceJobArtifactContent',
'Get-OCIDatascienceJobRun', 'Get-OCIDatascienceJobRunsList',
'Get-OCIDatascienceJobShapesList', 'Get-OCIDatascienceJobsList',
'Get-OCIDatascienceModel', 'Get-OCIDatascienceModelArtifactContent',
'Get-OCIDatascienceModelDeployment',
'Get-OCIDatascienceModelDeploymentShapesList',
'Get-OCIDatascienceModelDeploymentsList',
'Get-OCIDatascienceModelProvenance', 'Get-OCIDatascienceModelsList',
'Get-OCIDatascienceModelVersionSet',
'Get-OCIDatascienceModelVersionSetsList',
'Get-OCIDatascienceNotebookSession',
'Get-OCIDatascienceNotebookSessionShapesList',
'Get-OCIDatascienceNotebookSessionsList',
'Get-OCIDatasciencePipeline', 'Get-OCIDatasciencePipelineRun',
'Get-OCIDatasciencePipelineRunsList',
'Get-OCIDatasciencePipelinesList',
'Get-OCIDatasciencePrivateEndpoint',
'Get-OCIDatasciencePrivateEndpointsList',
'Get-OCIDatascienceProject', 'Get-OCIDatascienceProjectsList',
'Get-OCIDatascienceStepArtifactContent',
'Get-OCIDatascienceWorkRequest',
'Get-OCIDatascienceWorkRequestErrorsList',
'Get-OCIDatascienceWorkRequestLogsList',
'Get-OCIDatascienceWorkRequestsList',
'Import-OCIDatascienceModelArtifact',
'Invoke-OCIDatascienceDeactivateModel',
'Invoke-OCIDatascienceDeactivateModelDeployment',
'Invoke-OCIDatascienceDeactivateNotebookSession',
'Invoke-OCIDatascienceHeadJobArtifact',
'Invoke-OCIDatascienceHeadModelArtifact',
'Invoke-OCIDatascienceHeadStepArtifact',
'Move-OCIDatascienceJobCompartment',
'Move-OCIDatascienceJobRunCompartment',
'Move-OCIDatascienceModelCompartment',
'Move-OCIDatascienceModelDeploymentCompartment',
'Move-OCIDatascienceModelVersionSetCompartment',
'Move-OCIDatascienceNotebookSessionCompartment',
'Move-OCIDatasciencePipelineCompartment',
'Move-OCIDatasciencePipelineRunCompartment',
'Move-OCIDatasciencePrivateEndpointCompartment',
'Move-OCIDatascienceProjectCompartment', 'New-OCIDatascienceJob',
'New-OCIDatascienceJobArtifact', 'New-OCIDatascienceJobRun',
'New-OCIDatascienceModel', 'New-OCIDatascienceModelArtifact',
'New-OCIDatascienceModelDeployment',
'New-OCIDatascienceModelProvenance',
'New-OCIDatascienceModelVersionSet',
'New-OCIDatascienceNotebookSession', 'New-OCIDatasciencePipeline',
'New-OCIDatasciencePipelineRun',
'New-OCIDatasciencePrivateEndpoint', 'New-OCIDatascienceProject',
'New-OCIDatascienceStepArtifact', 'Remove-OCIDatascienceJob',
'Remove-OCIDatascienceJobRun', 'Remove-OCIDatascienceModel',
'Remove-OCIDatascienceModelDeployment',
'Remove-OCIDatascienceModelVersionSet',
'Remove-OCIDatascienceNotebookSession',
'Remove-OCIDatasciencePipeline', 'Remove-OCIDatasciencePipelineRun',
'Remove-OCIDatasciencePrivateEndpoint',
'Remove-OCIDatascienceProject', 'Stop-OCIDatascienceJobRun',
'Stop-OCIDatasciencePipelineRun', 'Stop-OCIDatascienceWorkRequest',
'Update-OCIDatascienceJob', 'Update-OCIDatascienceJobRun',
'Update-OCIDatascienceModel',
'Update-OCIDatascienceModelDeployment',
'Update-OCIDatascienceModelProvenance',
'Update-OCIDatascienceModelVersionSet',
'Update-OCIDatascienceNotebookSession',
'Update-OCIDatasciencePipeline', 'Update-OCIDatasciencePipelineRun',
'Update-OCIDatasciencePrivateEndpoint',
'Update-OCIDatascienceProject'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Datascience'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/759.ps1
|
759.ps1
|
param([int]$Count=50, [int]$DelayMilliseconds=200)
function Write-Item($itemCount) {
$i = 1
while ($i -le $itemCount) {
$str = "Output $i"
Write-Output $str
$i = $i + 1
Start-Sleep -Milliseconds $DelayMilliseconds
}
}
function Do-Work($workCount) {
Write-Output "Doing work..."
Write-Item $workcount
Write-Host "Done!"
}
Do-Work $Count
|
combined_dataset/train/non-malicious/sample_30_95.ps1
|
sample_30_95.ps1
|
#
# Module manifest for module 'OCI.PSModules.Events'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Events.dll'
# Version number of this module.
ModuleVersion = '77.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '5e1c10f7-8832-4248-b692-89297c84ea32'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Events Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Events.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIEventsRule', 'Get-OCIEventsRulesList',
'Move-OCIEventsRuleCompartment', 'New-OCIEventsRule',
'Remove-OCIEventsRule', 'Update-OCIEventsRule'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Events'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/2666.ps1
|
2666.ps1
|
Set-PSReadlineOption -Color @{
"Command" = [ConsoleColor]::Green
"Parameter" = [ConsoleColor]::Gray
"Operator" = [ConsoleColor]::Magenta
"Variable" = [ConsoleColor]::White
"String" = [ConsoleColor]::Yellow
"Number" = [ConsoleColor]::Blue
"Type" = [ConsoleColor]::Cyan
"Comment" = [ConsoleColor]::DarkCyan
}
Import-Module posh-git
$GitPromptSettings.DefaultPromptPrefix.Text = "$([char]0x2192) "
$GitPromptSettings.DefaultPromptPrefix.ForegroundColor = [ConsoleColor]::Green
$GitPromptSettings.DefaultPromptPath.ForegroundColor =[ConsoleColor]::Cyan
$GitPromptSettings.DefaultPromptSuffix.Text = "$([char]0x203A) "
$GitPromptSettings.DefaultPromptSuffix.ForegroundColor = [ConsoleColor]::Magenta
$GitPromptSettings.BeforeStatus.ForegroundColor = [ConsoleColor]::Blue
$GitPromptSettings.BranchColor.ForegroundColor = [ConsoleColor]::Blue
$GitPromptSettings.AfterStatus.ForegroundColor = [ConsoleColor]::Blue
|
combined_dataset/train/non-malicious/sample_29_37.ps1
|
sample_29_37.ps1
|
#
# Module manifest for module 'OCI.PSModules.Certificatesmanagement'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Certificatesmanagement.dll'
# Version number of this module.
ModuleVersion = '74.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'c420014c-ae2b-4d3a-a11e-e78a626f134b'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Certificatesmanagement Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '74.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Certificatesmanagement.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCICertificatesmanagementAssociation',
'Get-OCICertificatesmanagementAssociationsList',
'Get-OCICertificatesmanagementCaBundle',
'Get-OCICertificatesmanagementCaBundlesList',
'Get-OCICertificatesmanagementCertificate',
'Get-OCICertificatesmanagementCertificateAuthoritiesList',
'Get-OCICertificatesmanagementCertificateAuthority',
'Get-OCICertificatesmanagementCertificateAuthorityVersion',
'Get-OCICertificatesmanagementCertificateAuthorityVersionsList',
'Get-OCICertificatesmanagementCertificatesList',
'Get-OCICertificatesmanagementCertificateVersion',
'Get-OCICertificatesmanagementCertificateVersionsList',
'Invoke-OCICertificatesmanagementRevokeCertificateAuthorityVersion',
'Invoke-OCICertificatesmanagementRevokeCertificateVersion',
'Invoke-OCICertificatesmanagementScheduleCertificateAuthorityDeletion',
'Invoke-OCICertificatesmanagementScheduleCertificateAuthorityVersionDeletion',
'Invoke-OCICertificatesmanagementScheduleCertificateDeletion',
'Invoke-OCICertificatesmanagementScheduleCertificateVersionDeletion',
'Move-OCICertificatesmanagementCaBundleCompartment',
'Move-OCICertificatesmanagementCertificateAuthorityCompartment',
'Move-OCICertificatesmanagementCertificateCompartment',
'New-OCICertificatesmanagementCaBundle',
'New-OCICertificatesmanagementCertificate',
'New-OCICertificatesmanagementCertificateAuthority',
'Remove-OCICertificatesmanagementCaBundle',
'Stop-OCICertificatesmanagementCertificateAuthorityDeletion',
'Stop-OCICertificatesmanagementCertificateAuthorityVersionDeletion',
'Stop-OCICertificatesmanagementCertificateDeletion',
'Stop-OCICertificatesmanagementCertificateVersionDeletion',
'Update-OCICertificatesmanagementCaBundle',
'Update-OCICertificatesmanagementCertificate',
'Update-OCICertificatesmanagementCertificateAuthority'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Certificatesmanagement'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/1095.ps1
|
1095.ps1
|
if( (Get-WmiObject -Class 'Win32_ComputerSystem').Domain -eq 'WORKGROUP' )
{
Write-Warning -Message ('Get-ADDomainController tests can''t run because this computer is not part of a domain.')
}
else
{
function Start-TestFixture
{
& (Join-Path -Path $PSScriptRoot -ChildPath '..\Initialize-CarbonTest.ps1' -Resolve)
}
function Test-ShouldFindDomainController
{
$domainController = Get-ADDomainController
Assert-NotNull $domainController
Assert-CanFindCurrentUser $domainController
}
function Test-ShouldFindDomainControllerForSpecificDomain
{
$domainController = Get-ADDomainController -Domain $env:USERDOMAIN
Assert-NotNull $domainController
Assert-CanFindCurrentUser $domainController
}
function Test-ShouldNotFindNonExistentDomain
{
$error.Clear()
$domainController = Get-ADDomainController -Domain 'FJDSKLJDSKLFJSDA' -ErrorAction SilentlyContinue
Assert-Null $domainController
Assert-equal 2 $error.Count
}
function Assert-CanFindCurrentUser($domainController)
{
$domain = [adsi] "LDAP://$domainController"
$searcher = [adsisearcher] $domain
$searcher.Filter = "(&(objectClass=User) (sAMAccountName=$($env:Username)))"
$result = $searcher.FindOne()
Assert-NotNull $result
}
}
|
combined_dataset/train/non-malicious/GUI process explorer.ps1
|
GUI process explorer.ps1
|
function BuildProcessesList {
$arr = New-Object Collections.ArrayList
$script:col = ps | select Name, Id, BasePriority, Description, Company | sort Name
$arr.AddRange($col)
$dtgGrid.DataSource = $arr
$frmMain.Refresh()
}
function SelectedItemModules {
$ErrorActionPreference = "SilentlyContinue"
$lstView.Items.Clear()
$sbRules.Text = ""
$row = $dtgGrid.CurrentRowIndex
if ($itm = $script:col[$row].Id) {
trap { $sbRules.Text = $_.Exception.Message }
(ps | ? {$_.Id -eq $itm}).Modules | % {
$sel = $lstView.Items.Add($_.Size)
[void]$sel.Subitems.Add($_.ModuleName)
[void]$sel.Subitems.Add($_.FileName)
}
}
}
function AutoUpdate {
if (!($mnuAuto.Checked)) {
$mnuAuto.Checked = $true
$trTimer.Start()
$sbRules.Text = "Auto update has been enabled."
}
else {
$mnuAuto.Checked = $false
$trTimer.Stop()
$sbRules.Text = "Auto update has been disabled."
}
}
$frmMain_OnLoad= {
BuildProcessesList
}
function ShowMainWindow {
[void][Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms")
[void][Reflection.Assembly]::LoadWithPartialName("System.Drawing")
[Windows.Forms.Application]::EnableVisualStyles()
$frmMain = New-Object Windows.Forms.Form
$mnuMain = New-Object Windows.Forms.MainMenu
$mnuFile = New-Object Windows.Forms.MenuItem
$mnuAuto = New-Object Windows.Forms.MenuItem
$mnuRfrs = New-Object Windows.Forms.MenuItem
$mnuNull = New-Object Windows.Forms.MenuItem
$mnuExit = New-Object Windows.Forms.MenuItem
$mnuHelp = New-Object Windows.Forms.MenuItem
$mnuInfo = New-Object Windows.Forms.MenuItem
$scSplit = New-Object Windows.Forms.SplitContainer
$dtgGrid = New-Object Windows.Forms.DataGrid
$lstView = New-Object Windows.Forms.ListView
$chSizeK = New-Object Windows.Forms.ColumnHeader
$chFileM = New-Object Windows.Forms.ColumnHeader
$chFileP = New-Object Windows.Forms.ColumnHeader
$trTimer = New-Object Windows.Forms.Timer
$sbRules = New-Object Windows.Forms.StatusBar
#mnuMain
$mnuMain.MenuItems.AddRange(@($mnuFile, $mnuHelp))
#mnuFile
$mnuFile.MenuItems.AddRange(@($mnuAuto, $mnuRfrs, $mnuNull, $mnuExit))
$mnuFile.Text = "&File"
#mnuAuto
$mnuAuto.Shortcut = "CtrlA"
$mnuAuto.Text = "Auto &Update"
$mnuAuto.Add_Click( { AutoUpdate } )
#mnuRfrs
$mnuRfrs.Shortcut = "F5"
$mnuRfrs.Text = "&Refresh"
$mnuRfrs.Add_Click( { $sbRules.Text = ""; BuildProcessesList } )
#mnuNull
$mnuNull.text = "-"
#mnuExit
$mnuExit.Shortcut = "CtrlX"
$mnuExit.Text = "E&xit"
$mnuExit.Add_Click( { $frmMain.Close() })
#mnuHelp
[void]$mnuHelp.MenuItems.Add($mnuInfo)
$mnuHelp.Text = "&Help"
#mnuInfo
$mnuInfo.Text = "About..."
$mnuInfo.Add_Click( { ShowAboutWindow } )
#scSplit
$scSplit.Dock = "Fill"
$scSplit.Orientation = "Horizontal"
$scSplit.Panel1.Controls.Add($dtgGrid)
$scSplit.Panel2.Controls.Add($lstView)
$scSplit.SplitterWidth = 1
#dtgGrid
$dtgGrid.CaptionVisible = $false
$dtgGrid.Dock = "Fill"
$dtgGrid.PreferredColumnWidth = 109
$dtgGrid.Add_Click( { SelectedItemModules } )
#lstView
$lstView.Columns.AddRange(@($chSizeK, $chFileM, $chFileP))
$lstView.Dock = "Fill"
$lstView.FullRowSelect = $true
$lstView.GridLines = $true
$lstView.Sorting = "Ascending"
$lstView.View = "Details"
#chSizeK
$chSizeK.Text = "Size (K)"
$chSizeK.Width = 70
#chFileM
$chFileM.Text = "Module Name"
$chFileM.Width = 130
#chFileP
$chFileP.Text = "Path"
$chFileP.Width = 380
#trTimer
$trTimer.Interval = 1000
$trTimer.Add_Tick( { BuildProcessesList } )
#sbRules
$sbRules.SizingGrip = $false
#frmMain
$frmMain.ClientSize = New-Object Drawing.Size(601, 480)
$frmMain.Controls.AddRange(@($scSplit, $sbRules))
$frmMain.FormBorderStyle = "FixedSingle"
$frmMain.Menu = $mnuMain
$frmMain.StartPosition = "CenterScreen"
$frmMain.Text = "PExplore"
$frmMain.Add_Load($frmMain_OnLoad)
[void]$frmMain.ShowDialog()
}
function ShowAboutWindow {
$frmMain = New-Object Windows.Forms.Form
$lblThis = New-Object Windows.Forms.Label
$btnExit = New-Object Windows.Forms.Button
#lblThis
$lblThis.Location = New-Object Drawing.Point(5, 29)
$lblThis.Size = New-Object Drawing.Size(330, 50)
$lblThis.Text = "(C) 2008 Grigori Zakharov `n
This is just an example that you can make better."
$lblThis.TextAlign = "MiddleCenter"
#btnExit
$btnExit.Location = New-Object Drawing.Point(132, 97)
$btnExit.Text = "Close"
$btnExit.Add_Click( { $frmMain.Close() } )
#frmMain
$frmMain.ClientSize = New-Object Drawing.Size(350, 137)
$frmMain.ControlBox = $false
$frmMain.Controls.AddRange(@($lblThis, $btnExit))
$frmMain.FormBorderStyle = "FixedSingle"
$frmMain.ShowInTaskbar = $false
$frmMain.StartPosition = "CenterScreen"
$frmMain.Text = "About..."
[void]$frmMain.ShowDialog()
}
ShowMainWindow
|
combined_dataset/train/non-malicious/sample_6_31.ps1
|
sample_6_31.ps1
|
# 2023-02-24 WalterE mod Trap #we#
$startTime_AutoAdd = Get-Date
trap [Exception]{
WriteTo-StdOut "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_" -shortformat; continue
Write-Host "$($_.InvocationInfo.ScriptName)($($_.InvocationInfo.ScriptLineNumber)): $_"
}
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Common ---"
# version of the psSDP Diagnostic
Run-DiagExpression .\DC_NetworkingDiagnostic.ps1
# MSInfo
Run-DiagExpression .\DC_MSInfo.ps1
# Obtain pstat output
Run-DiagExpression .\DC_PStat.ps1
# CheckSym
Run-DiagExpression .\DC_ChkSym.ps1
# PoolMon
Run-DiagExpression .\DC_PoolMon.ps1
# Collects registry entries for KIR (for 2019) and RBC (for 2016)
Run-DiagExpression .\DC_KIR-RBC-RegEntries.ps1
#_# Collect summary report
Run-DiagExpression .\DC_SummaryReliability.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: DC_WinStore ---"
# Windows Store Inbox Applications Interactive [AutoAdded]
#_# Run-DiagExpression .\DC_WinStoreMain.ps1
Run-DiagExpression .\DC_WinStoreCollect.ps1
Run-DiagExpression .\DC_WinUpdateCollect.ps1
Run-DiagExpression .\DC_AppxCollect.ps1
Run-DiagExpression .\DC_UEXCollect.ps1
Run-DiagExpression .\DC_NgenCollect.ps1
Run-DiagExpression .\DC_COMCollect.ps1
Run-DiagExpression .\DC_SystemCollect.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Collect Phase module: Update ---"
# Update History
#Run-DiagExpression .\DC_UpdateHistory.ps1
# Collect WindowsUpdate.Log
Run-DiagExpression .\DC_WindowsUpdateLog.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: ModernApps ---"
# [Idea ID 7524] [Windows] WinStore -Modern applications fail to start if 'Audit the access of global system object' is enabled [AutoAdded]
Run-DiagExpression .\TS_ModernAppsFailureForAuditOptionCheck.ps1
# [Idea ID 7723] [Windows] WinStore - Modern applications fail to start if incompatible security - av software installed [AutoAdded]
Run-DiagExpression .\TS_ModernAppsFailureForWindDefenderCheck.ps1
# [Idea ID 7727] [Windows] WinStore - Cannot install Windows Store Apps [AutoAdded]
Run-DiagExpression .\TS_ModernAppsFailureForTrustedPathCredentialsCheck.ps1
# [Idea ID 7712] [Windows] WinStore - Modern Apps fail to run if the UAC File Virtualization driver is not running [AutoAdded]
Run-DiagExpression .\TS_ModernAppsFailureForUACFileVirtualizationCheck.ps1
# [Idea ID 7508] [Windows] WinStore - This app cannot open while the User Account Control is turned off [AutoAdded]
Run-DiagExpression .\TS_ModernAppsFailureForUACDisabledCheck.ps1
# [Idea ID 6253] [Windows] Win8:APP - Store Apps do not launch due to video resolution [AutoAdded]
Run-DiagExpression .\TS_StoreAppsFailureForVideoResolutionCheck.ps1
# [Idea ID 7499] [Windows] Win8:APP - Skype fails to start [AutoAdded]
Run-DiagExpression .\TS_SkypeFailureForMissingKB2703761Check.ps1
# [Idea ID 7544] [Windows] WinStore - Apps do not launch, because 'ALL APPLICATIONS PACKAGES' removed from DCOM ACL [AutoAdded]
Run-DiagExpression .\TS_StoreAppsFailureForDCOMErrorCheck.ps1
# [Idea ID 7510] [Windows] WinStore - Apps fail to start if default registry permissions modified [AutoAdded]
Run-DiagExpression .\TS_ModernAppsFailureForRegistryPermissionCheck.ps1
# [Idea ID 7546] [Windows] WinStore - Modern Apps Fail to Start if the User Profile directory is Moved from default [AutoAdded]
Run-DiagExpression .\TS_ModernAppsFailureForUserProfileDirCheck.ps1
# [Idea ID 7547] [Windows] WinStore - Modern Apps Fail to Start if the ProgramData directory is Moved from default [AutoAdded]
Run-DiagExpression .\TS_ModernAppsFailureForProgramDataDirCheck.ps1
# [Idea ID 7512] [Windows] WinStore - Apps fail to start if default file permissions modified [AutoAdded]
Run-DiagExpression .\TS_ModernAppsFailureForFolderPermissionCheck.ps1
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object " --- $(Get-Date -Format 'yy-mm-dd HH:mm:ss') $Global:SDPtech - Diag Phase module: TS_Net ---"
# FirewallCheck [AutoAdded]
Run-DiagExpression .\RC_FirewallCheck.ps1
# List basic network configuration to results report [AutoAdded]
Run-DiagExpression .\TS_BasicNetworkInfo.ps1
# Hotfix Rollups
Run-DiagExpression .\DC_HotfixRollups.ps1
$stopTime_AutoAdd = Get-Date
$duration = $(New-TimeSpan -Start $startTime_AutoAdd -End $stopTime_AutoAdd)
Write-Host -BackgroundColor Gray -ForegroundColor Black -Object "*** $(Get-Date -UFormat "%R:%S") DONE (Dur: $duration) TS_AutoAddCommands_APPS.ps1 `n"
# SIG # Begin signature block
# MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA3iYGOLWeC4RWc
# uTpwT44hSnXbPTGtJ7IyXN14PevJg6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIC13X1PXnM04/DjDMpVXUE5w
# +SLBqMSvafsOMbHjQRP2MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEARC8TYDDeQW0YvPbJWTzR/bNgLVhvMLzJ2jmhVu1oW5lwrRTXhS/xr1RY
# xq/LZU0mYiFCq6vNWkOe9VRht5tbDl5crJhOoXFllwSwtrRxeDcNyxxEh//Z4SX+
# JeTKjtjddmDlb209XEr+m6G8Cbk9TFp/Nz/0uMEStC69PAI9HRq58oS9exRZJ+q2
# HHZMRgwvGPSN48iFNjcmKJ2soHcaG4P4SddVw91lZXEotH+KvUjUAtKv4baToJMK
# cl4ycQ+MaZBIVYUYRxhpdgzzygAjRBXivJRxVa0ZzquLjm7kTtKILKSjK3Afi/OG
# 8hcpfO1M1rn6rV7Hw5BGJgayn0j5cKGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC
# F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCD4OcoWa6y/Lro5MtEfGYxxCytb7EaSATfvcN/dvo/4fwIGZusiCs6F
# GBMyMDI0MTAyODExNDA0MC4yMzlaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB91ggdQTK+8L0AAEAAAH3MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzEwNloXDTI1MTAyMjE4MzEwNlowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM2MDUt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA0OdHTBNom6/uXKaEKP9r
# PITkT6QxF11tjzB0Nk1byDpPrFTHha3hxwSdTcr8Y0a3k6EQlwqy6ROz42e0R5eD
# W+dCoQapipDIFUOYp3oNuqwX/xepATEkY17MyXFx6rQW2NcWUJW3Qo2AuJ0HOtbl
# SpItQZPGmHnGqkt/DB45Fwxk6VoSvxNcQKhKETkuzrt8U6DRccQm1FdhmPKgDzgc
# fDPM5o+GnzbiMu6y069A4EHmLMmkecSkVvBmcZ8VnzFHTDkGLdpnDV5FXjVObAgb
# SM0cnqYSGfRp7VGHBRqyoscvR4bcQ+CV9pDjbJ6S5rZn1uA8hRhj09Hs33HRevt4
# oWAVYGItgEsG+BrCYbpgWMDEIVnAgPZEiPAaI8wBGemE4feEkuz7TAwgkRBcUzLg
# Q4uvPqRD1A+Jkt26+pDqWYSn0MA8j0zacQk9q/AvciPXD9It2ez+mqEzgFRRsJGL
# tcf9HksvK8Jsd6I5zFShlqi5bpzf1Y4NOiNOh5QwW1pIvA5irlal7qFhkAeeeZqm
# op8+uNxZXxFCQG3R3s5pXW89FiCh9rmXrVqOCwgcXFIJQAQkllKsI+UJqGq9rmRA
# BJz5lHKTFYmFwcM52KWWjNx3z6odwz2h+sxaxewToe9GqtDx3/aU+yqNRcB8w0tS
# XUf+ylN4uk5xHEpLpx+ZNNsCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBTfRqQzP3m9
# PZWuLf1p8/meFfkmmDAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAN0ajafILeL6S
# QIMIMAXM1Qd6xaoci2mOrpR8vKWyyTsL3b83A7XGLiAbQxTrqnXvVWWeNst5YQD8
# saO+UTgOLJdTdfUADhLXoK+RlwjfndimIJT9MH9tUYXLzJXKhZM09ouPwNsrn8YO
# LIpdAi5TPyN8Cl11OGZSlP9r8JnvomW00AoJ4Pl9rlg0G5lcQknAXqHa9nQdWp1Z
# xXqNd+0JsKmlR8tcANX33ClM9NnaClJExLQHiKeHUUWtqyLMl65TW6wRM7XlF7Y+
# PTnC8duNWn4uLng+ON/Z39GO6qBj7IEZxoq4o3avEh9ba43UU6TgzVZaBm8VaA0w
# SwUe/pqpTOYFWN62XL3gl/JC2pzfIPxP66XfRLIxafjBVXm8KVDn2cML9IvRK02s
# 941Y5+RR4gSAOhLiQQ6A03VNRup+spMa0k+XTPAi+2aMH5xa1Zjb/K8u9f9M05U0
# /bUMJXJDP++ysWpJbVRDiHG7szaca+r3HiUPjQJyQl2NiOcYTGV/DcLrLCBK2zG5
# 03FGb04N5Kf10XgAwFaXlod5B9eKh95PnXKx2LNBgLwG85anlhhGxxBQ5mFsJGkB
# n0PZPtAzZyfr96qxzpp2pH9DJJcjKCDrMmZziXazpa5VVN36CO1kDU4ABkSYTXOM
# 8RmJXuQm7mUF3bWmj+hjAJb4pz6hT5UwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# TjozNjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAb28KDG/xXbNBjmM7/nqw3bgrEOaggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJsSYwIhgPMjAyNDEwMjgwNjQzNTBaGA8yMDI0MTAyOTA2NDM1MFowdDA6
# BgorBgEEAYRZCgQBMSwwKjAKAgUA6smxJgIBADAHAgEAAgIPIDAHAgEAAgIT5zAK
# AgUA6ssCpgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQBaN24RfbEDYuiZ
# zqm7A4pV5f2hpp1MXvQiKNCPCo6auhWTBxhWvoAFA2Yduik5ad6IJA7n3eXZZvkf
# ovjXUeUfclz34hSqlUveVGitbm3K9Awqnk2tZGgk9Li0GfRa6QSb/KpHS+RGIAeR
# p0zHfzfqy/SmE6GTQFacpa8KRg7boj/ktDUBq0kkQ578OFTecSrudpM+HrP9rwux
# bsGhVUoCOEsKOp0WdtzSXBlryAdgyGP1izHSW9Tc92oI/x2UnsP+/eCeuyNqOYe6
# VBjwFFzrSlLoVp2/o4gAiafzJbJpD2LXbW7P8MOkaTRNky50Lo7MnEMgN3LQB6Hb
# 4jUX9rCAMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAH3WCB1BMr7wvQAAQAAAfcwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgbYd+N8JEBrUA
# kz4my+Nuc0tP2Q7wvQM7KSQcC2wz+KowgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCAh2pjaa3ca0ecYuhu60uYHP/IKnPbedbVQJ5SoIH5Z4jCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB91ggdQTK+8L0AAEAAAH3
# MCIEIGH07306AH18MQdXDVR9dHZ+mbda9Lv03oh+XI/bgvEVMA0GCSqGSIb3DQEB
# CwUABIICAILuZYDzHxy/SrcWK8Ajqqlqtt2gdfrIXmUuunrQhy5dSydTdr3CFpEg
# AlBmapDtb37d6KHI/9KRyBXz32RyZN7rUEs8RoryWM+nV83NhvdtfYUhNsEDzdyD
# Z2Oxtf+fKSzbqLN13/9vV+XUbX7nlR2g4VYoyJ/uxL5yvnlixbp7jO+KDs6Ec15o
# ncAu5h821Av0IBwfpvWrl7apJxdPylzpRIODOeaxZugkO0q+NpTI1w5pjnBhDjTj
# YpwBRAtzy1ht5u1Sp7GcRsnlnBeMG39/d6TptHadXAKU662k2teQsNKwj+2f75jH
# ahdsdxwU62ypLDMJ4mlJor69FvRTXFdzY9OwNJ9k4LVub5DZph8ZWauhmtXXYwUD
# eQf+1UrH7fr9izlXx+rdJ4AQnYi3OIahbsW+ezKn7BtCyQHr+DdwEFxUh+kbUq92
# Pn082fgYaHtS87+JttGUVQnb/GDuF09+z/0xUM8HAajJaeJphES2JZId8+WIRHae
# NIJDcqgGMuk6WWuJgOC2aF7H63fYkpsGbJktsveiXFmDzL0xWna+gEmWBvqaMgZf
# sEjDzs+zO98X4TIv0Yzmi7mTUWzodlzHGqILYLpr8NeqQVlOoYqTdSK7SHHPFc6G
# DZu9XOKTCCyFYqmMimaO40AnKEYeZ8zpeNrq+pdFmn8qdIXJHgir
# SIG # End signature block
|
combined_dataset/train/non-malicious/381.ps1
|
381.ps1
|
Describe "Unregister-PSFConfig Unit Tests" -Tag "CI", "Pipeline", "Unit" {
BeforeAll {
Get-PSFConfig -Module Unregister-PSFConfig -Force | ForEach-Object {
$null = [PSFramework.Configuration.ConfigurationHost]::Configurations.Remove($_.FullName)
}
}
AfterAll {
Get-PSFConfig -Module Unregister-PSFConfig -Force | ForEach-Object {
$null = [PSFramework.Configuration.ConfigurationHost]::Configurations.Remove($_.FullName)
}
}
It "Should have the designed for parameters & sets" {
(Get-Command Unregister-PSFConfig).ParameterSets.Name | Should -Be 'Pipeline', 'Module'
$properties = 'ConfigurationItem', 'FullName', 'Module', 'Name', 'Scope', 'Verbose', 'Debug', 'ErrorAction', 'WarningAction', 'InformationAction', 'ErrorVariable', 'WarningVariable', 'InformationVariable', 'OutVariable', 'OutBuffer', 'PipelineVariable'
Compare-Object $properties ((Get-Command Unregister-PSFConfig).Parameters.Keys | Remove-PSFNull -Enumerate) | Should -BeNullOrEmpty
}
function New-Location
{
[CmdletBinding()]
param (
[PSFramework.Configuration.ConfigScope]
$Scope,
[string]
$Path,
[ValidateSet('Registry', 'File')]
[string]
$Type,
[switch]
$Elevated
)
if ($Type -eq 'File') { $configPath = Join-Path $Path 'psf_config.json' }
else { $configPath = $Path }
[pscustomobject]@{
Scope = $Scope
Path = $Path
Type = $Type
Elevated = $Elevated.ToBool()
ConfigPath = $configPath
}
}
$module = Get-Module PSFramework | Sort-Object Version -Descending | Select-Object -First 1
$pathRegistryUserDefault = & $module { $path_RegistryUserDefault }
$pathRegistryUserEnforced = & $module { $path_RegistryUserEnforced }
$pathRegistryMachineDefault = & $module { $path_RegistryMachineDefault }
$pathRegistryMachineEnforced = & $module { $path_RegistryMachineEnforced }
$pathFileUserLocal = & $module { $path_FileUserLocal }
$pathFileUserShared = & $module { $path_FileUserShared }
$pathFileSystem = & $module { $path_FileSystem }
$locations = @()
$locations += New-Location -Path $pathRegistryUserDefault -Type 'Registry' -Scope UserDefault
$locations += New-Location -Path $pathRegistryUserEnforced -Type 'Registry' -Scope UserMandatory
$locations += New-Location -Path $pathRegistryMachineDefault -Type 'Registry' -Elevated -Scope SystemDefault
$locations += New-Location -Path $pathRegistryMachineEnforced -Type 'Registry' -Elevated -Scope SystemMandatory
$locations += New-Location -Path $pathFileUserLocal -Type File -Scope FileUserLocal
$locations += New-Location -Path $pathFileUserShared -Type File -Scope FileUserShared
$locations += New-Location -Path $pathFileSystem -Type File -Elevated -Scope FileSystem
$settingName1 = 'Unregister-PSFConfig.Phase1.Setting1'
$settingName2 = 'Unregister-PSFConfig.Phase1.Setting2'
$settingName3 = 'Unregister-PSFConfig.Phase1.Setting3'
$config = @()
$config += Set-PSFConfig -FullName $settingName1 -Value 23 -PassThru
$config += Set-PSFConfig -FullName $settingName2 -Value 17 -PassThru
$config += Set-PSFConfig -FullName $settingName3 -Value 42 -PassThru
foreach ($location in $locations)
{
if ($location.Elevated -and (-not (Test-PSFPowerShell -Elevated)))
{
continue
}
Describe "Testing unregistration from scope $($location.Scope)" {
switch ($location.Type)
{
'Registry'
{
It "Should properly set up configuration settings in registry" {
if (Test-Path $location.Path)
{
(Get-ItemProperty -Path $location.Path).$settingName1 | Should -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName2 | Should -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName3 | Should -BeNullOrEmpty
}
Register-PSFConfig -Config $config -Scope $location.Scope
(Get-ItemProperty -Path $location.Path).$settingName1 | Should -Not -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName2 | Should -Not -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName3 | Should -Not -BeNullOrEmpty
}
It "Should properly remove a single setting by fullname" {
Unregister-PSFConfig -FullName $settingName1 -Scope $location.Scope
(Get-ItemProperty -Path $location.Path).$settingName1 | Should -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName2 | Should -Not -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName3 | Should -Not -BeNullOrEmpty
}
It "Should properly remove multiple settings by fullname" {
Unregister-PSFConfig -FullName $settingName2, $settingName3 -Scope $location.Scope
(Get-ItemProperty -Path $location.Path).$settingName1 | Should -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName2 | Should -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName3 | Should -BeNullOrEmpty
}
It "Should properly remove all settings by fullname when piped to" {
Register-PSFConfig -Config $config -Scope $location.Scope
(Get-ItemProperty -Path $location.Path).$settingName1 | Should -Not -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName2 | Should -Not -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName3 | Should -Not -BeNullOrEmpty
$settingName1, $settingName2, $settingName3 | Unregister-PSFConfig -Scope $location.Scope
(Get-ItemProperty -Path $location.Path).$settingName1 | Should -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName2 | Should -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName3 | Should -BeNullOrEmpty
}
Register-PSFConfig -Config $config -Scope $location.Scope
It "Should properly remove a single setting by config-item" {
(Get-ItemProperty -Path $location.Path).$settingName1 | Should -Not -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName2 | Should -Not -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName3 | Should -Not -BeNullOrEmpty
Unregister-PSFConfig -ConfigurationItem $config[0] -Scope $location.Scope
(Get-ItemProperty -Path $location.Path).$settingName1 | Should -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName2 | Should -Not -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName3 | Should -Not -BeNullOrEmpty
}
It "Should properly remove multiple settings by config-item" {
Unregister-PSFConfig -ConfigurationItem $config[1..2] -Scope $location.Scope
(Get-ItemProperty -Path $location.Path).$settingName1 | Should -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName2 | Should -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName3 | Should -BeNullOrEmpty
}
It "Should properly remove all settings by config-item when piped to" {
Register-PSFConfig -Config $config -Scope $location.Scope
(Get-ItemProperty -Path $location.Path).$settingName1 | Should -Not -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName2 | Should -Not -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName3 | Should -Not -BeNullOrEmpty
$config | Unregister-PSFConfig -Scope $location.Scope
(Get-ItemProperty -Path $location.Path).$settingName1 | Should -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName2 | Should -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName3 | Should -BeNullOrEmpty
}
Register-PSFConfig -Config $config -Scope $location.Scope
It "Should properly remove a single setting by module and name" {
(Get-ItemProperty -Path $location.Path).$settingName1 | Should -Not -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName2 | Should -Not -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName3 | Should -Not -BeNullOrEmpty
Unregister-PSFConfig -Module 'Unregister-PSFConfig' -Name 'Phase1.Setting1' -Scope $location.Scope
(Get-ItemProperty -Path $location.Path).$settingName1 | Should -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName2 | Should -Not -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName3 | Should -Not -BeNullOrEmpty
}
It "Should properly remove multiple settings by module and name" {
Unregister-PSFConfig -Module 'Unregister-PSFConfig' -Scope $location.Scope
(Get-ItemProperty -Path $location.Path).$settingName1 | Should -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName2 | Should -BeNullOrEmpty
(Get-ItemProperty -Path $location.Path).$settingName3 | Should -BeNullOrEmpty
}
}
'File'
{
It "Should properly set up configuration settings in registry" {
if (Test-Path $location.ConfigPath)
{
Get-Content -Path $location.ConfigPath | Select-String "$($settingName1)|$($settingName2)|$($settingName3)" | Should -BeNullOrEmpty
}
Register-PSFConfig -Config $config -Scope $location.Scope
(Get-Content -Path $location.ConfigPath | Select-String "$($settingName1)|$($settingName2)|$($settingName3)" | Measure-Object).Count | Should -Be 3
}
It "Should properly remove a single setting by fullname" {
Unregister-PSFConfig -FullName $settingName1 -Scope $location.Scope
Get-Content -Path $location.ConfigPath | Select-String "$($settingName1)" | Should -BeNullOrEmpty
(Get-Content -Path $location.ConfigPath | Select-String "$($settingName2)|$($settingName3)" | Measure-Object).Count | Should -Be 2
}
It "Should properly remove multiple settings by fullname" {
Unregister-PSFConfig -FullName $settingName2, $settingName3 -Scope $location.Scope
if (Test-Path $location.ConfigPath)
{
Get-Content -Path $location.ConfigPath | Select-String "$($settingName1)|$($settingName2)|$($settingName3)" | Should -BeNullOrEmpty
}
}
It "Should properly remove all settings by fullname when piped to" {
Register-PSFConfig -Config $config -Scope $location.Scope
(Get-Content -Path $location.ConfigPath | Select-String "$($settingName1)|$($settingName2)|$($settingName3)" | Measure-Object).Count | Should -Be 3
$settingName1, $settingName2, $settingName3 | Unregister-PSFConfig -Scope $location.Scope
if (Test-Path $location.ConfigPath)
{
Get-Content -Path $location.ConfigPath | Select-String "$($settingName1)|$($settingName2)|$($settingName3)" | Should -BeNullOrEmpty
}
}
Register-PSFConfig -Config $config -Scope $location.Scope
It "Should properly remove a single setting by config-item" {
Unregister-PSFConfig -ConfigurationItem $config[0] -Scope $location.Scope
Get-Content -Path $location.ConfigPath | Select-String "$($settingName1)" | Should -BeNullOrEmpty
(Get-Content -Path $location.ConfigPath | Select-String "$($settingName2)|$($settingName3)" | Measure-Object).Count | Should -Be 2
}
It "Should properly remove multiple settings by config-item" {
Unregister-PSFConfig -ConfigurationItem $config[1..2] -Scope $location.Scope
if (Test-Path $location.ConfigPath)
{
Get-Content -Path $location.ConfigPath | Select-String "$($settingName1)|$($settingName2)|$($settingName3)" | Should -BeNullOrEmpty
}
}
It "Should properly remove all settings by config-item when piped to" {
Register-PSFConfig -Config $config -Scope $location.Scope
(Get-Content -Path $location.ConfigPath | Select-String "$($settingName1)|$($settingName2)|$($settingName3)" | Measure-Object).Count | Should -Be 3
$config | Unregister-PSFConfig -Scope $location.Scope
if (Test-Path $location.ConfigPath)
{
Get-Content -Path $location.ConfigPath | Select-String "$($settingName1)|$($settingName2)|$($settingName3)" | Should -BeNullOrEmpty
}
}
Register-PSFConfig -Config $config -Scope $location.Scope
It "Should properly remove a single setting by module and name" {
Unregister-PSFConfig -Module 'Unregister-PSFConfig' -Name 'Phase1.Setting1' -Scope $location.Scope
Get-Content -Path $location.ConfigPath | Select-String "$($settingName1)" | Should -BeNullOrEmpty
(Get-Content -Path $location.ConfigPath | Select-String "$($settingName2)|$($settingName3)" | Measure-Object).Count | Should -Be 2
}
It "Should properly remove multiple settings by module and name" {
Unregister-PSFConfig -Module 'Unregister-PSFConfig' -Scope $location.Scope
if (Test-Path $location.ConfigPath)
{
Get-Content -Path $location.ConfigPath | Select-String "$($settingName1)|$($settingName2)|$($settingName3)" | Should -BeNullOrEmpty
}
}
}
}
}
}
}
|
combined_dataset/train/non-malicious/4369.ps1
|
4369.ps1
|
function Get-First
{
param
(
[Parameter(Mandatory=$true)]
$IEnumerator
)
foreach($item in $IEnumerator)
{
return $item
}
return $null
}
|
combined_dataset/train/non-malicious/4481.ps1
|
4481.ps1
|
configuration PSModule_InstallModuleConfig
{
param
(
[Parameter()]
[System.String[]]
$NodeName = 'localhost',
[Parameter(Mandatory = $true)]
[ValidateNotNullOrEmpty()]
[System.String]
$ModuleName
)
Import-DscResource -ModuleName 'PowerShellGet'
Node $nodeName
{
PSModule 'InstallModule'
{
Name = $ModuleName
}
}
}
|
combined_dataset/train/non-malicious/New-HyperVVM.ps1
|
New-HyperVVM.ps1
|
function New-HyperVVM {
param (
[string]$Hypervhost = "localhost",
[string]$Vm = "VM Courtesy of PowerShell",
[string]$location = "C:\\MyVirtualMachines\\$vm"
)
$wmiClassString = "\\\\" + $Hypervhost + "\\root\\virtualization:Msvm_VirtualSystemGlobalSettingData"
$wmiclass = [WMIClass]$wmiClassString
$newVSGlobalSettingData = $wmiClass.CreateInstance()
$newVSGlobalSettingData.psbase.Properties.Item("ExternalDataRoot").value = $location
$newVSGlobalSettingData.psbase.Properties.Item("ElementName").value = $Vm
$VSManagementService = gwmi MSVM_VirtualSystemManagementService -namespace "root\\virtualization" -ComputerName $Hypervhost
$GlobalSettings = $newVSGlobalSettingData.psbase.GetText(1)
$VSManagementService.DefineVirtualSystem($GlobalSettings, $ResourceSettings)
}
|
combined_dataset/train/non-malicious/1235.ps1
|
1235.ps1
|
if( $IsWindows -and [Environment]::Is64BitOperatingSystem -and [Environment]::Is64BitProcess )
{
Write-Timing ('Dot-sourcing Initialize-Lcm.ps1')
. (Join-Path -Path $functionRoot -ChildPath 'Initialize-Lcm.ps1')
}
|
combined_dataset/train/non-malicious/sample_4_2.ps1
|
sample_4_2.ps1
|
ConvertFrom-StringData @'
id_dpm_information=DPM Information
id_dpm_errorlogs_files=DPM Errorlog Files
'@
# SIG # Begin signature block
# MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAzv0zcGsytBt1m
# b5LLS93vr+OZbm4II9cEyAaK5Pn2r6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJHL
# tWvqG8S6qXnf/E5hzlPaqGaxGcNdIJMni5Z4oj08MEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAIP1EppZ+x+FGf9xKmF11pAk6SicsiZ2xLDDz
# T9bPRHpVmfaNQ9ZjAzbEu2SCH1haYd6Fi3AnO2OM/THOntT9c66oFTMJFyYpHe/p
# OHHxhx0Tc7ivOKHejrz51B6F2UUvwQuHdZObqp6BxhtYpdMyIePBO5QHB78fbhUF
# KvSVX3Ql4hWoJb36fV1FcIEeOjI6sNndd+lYnFTzg+EitEuMCAvXBCuBQYmFs8VI
# b4RoxjQ+riJL4HbeETlpzwFgJRAJbW0/su/MTUUXjfXOdNC1MLZI8NP1g2+Q8wwC
# 9uV+U6DXW1qkg8dyusxHtFPsV/x8+eu1HvhFLXpAxpxSrZj0tqGCF60wghepBgor
# BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCAc76iComfeqbi6Wj675pNXEjdXeRO8Xc1t
# bZMhShJ7LwIGZutwxmWbGBMyMDI0MTAyODExNDAzOS45MDNaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAACAdFF
# WZgQzEJPAAEAAAIBMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEyMloXDTI1MTAyMjE4MzEyMlowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjU1MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# tWrf+HzDu7sk50y5YHheCIJG0uxRSFFcHNek+Td9ZmyJj20EEjaU8JDJu5pWc4pP
# AsBI38NEAJ1b+KBnlStqU8uvXF4qnEShDdi8nPsZZQsTZDKWAgUM2iZTOiWIuZcF
# s5ZC8/+GlrVLM5h1Y9nfMh5B4DnUQOXMremAT9MkvUhg3uaYgmqLlmYyODmba4lX
# ZBu104SLAFsXOfl/TLhpToT46y7lI9sbI9uq3/Aerh3aPi2knHvEEazilXeooXNL
# Cwdu+Is6o8kQLouUn3KwUQm0b7aUtsv1X/OgPmsOJi6yN3LYWyHISvrNuIrJ4iYN
# gHdBBumQYK8LjZmQaTKFacxhmXJ0q2gzaIfxF2yIwM+V9sQqkHkg/Q+iSDNpMr6m
# r/OwknOEIjI0g6ZMOymivpChzDNoPz9hkK3gVHZKW7NV8+UBXN4G0aBX69fKUbxB
# BLyk2cC+PhOoUjkl6UC8/c0huqj5xX8m+YVIk81e7t6I+V/E4yXReeZgr0FhYqNp
# vTjGcaO2WrkP5XmsYS7IvMPIf4DCyIJUZaqoBMToAJJHGRe+DPqCHg6bmGPm97Mr
# OWv16/Co6S9cQDkXp9vMSSRQWXy4KtJhZfmuDz2vr1jw4NeixwuIDGw1mtV/TdSI
# +vpLJfUiLl/b9w/tJB92BALQT8e1YH8NphdOo1xCwkcCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBSwcq9blqLoPPiVrym9mFmFWbyyUjAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAOjQAyz0cVztTFGqXX5JLRxFK/O/oMe55uDqEC8Vd1gbcM28KBUPgvUIP
# Xm/vdDN2IVBkWHmwCp4AIcy4dZtkuUmd0fnu6aT9Mvo1ndsLp2YJcMoFLEt3Ttri
# LaO+i4Grv0ZULtWXUPAW/Mn5Scjgn0xZduGPBD/Xs3J7+get9+8ZvBipsg/N7poi
# mYOVsHxLcem7V5XdMNsytTm/uComhM/wgR5KlDYTVNAXBxcSKMeJaiD3V1+HhNkV
# liMl5VOP+nw5xWF55u9h6eF2G7eBPqT+qSFQ+rQCQdIrN0yG1QN9PJroguK+FJQJ
# dQzdfD3RWVsciBygbYaZlT1cGJI1IyQ74DQ0UBdTpfeGsyrEQ9PI8QyqVLqb2q7L
# tI6DJMNphYu+jr//0spr1UVvyDPtuRnbGQRNi1COwJcj9OYmlkFgKNeCfbDT7U3u
# EOvWomekX60Y/m5utRcUPVeAPdhkB+DxDaev3J1ywDNdyu911nAVPgRkyKgMK3US
# LG37EdlatDk8FyuCrx4tiHyqHO3wE6xPw32Q8e/vmuQPoBZuX3qUeoFIsyZEenHq
# 2ScMunhcqW32SUVAi5oZ4Z3nf7dAgNau21NEPwgW+2wkrNqDg7Hp8yHyoOKbgEBu
# 6REQbvSfZ5Kh4PV+S2gxf2uq6GoYDnlqABOMYwz309ISi0bPMh8wggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA1+26cR/yH100
# DiNFGWhuAv2rYBqggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJVyEwIhgPMjAyNDEwMjgwMDE5NDVaGA8yMDI0
# MTAyOTAwMTk0NVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6slXIQIBADAHAgEA
# AgIBszAHAgEAAgITSjAKAgUA6sqooQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA
# A4IBAQABMN9oWsdpzGRztiY54MmqGWUVyuXmaxbDA6z8iE8obpRv+lydBHDEzF+b
# zjdtPSXWUAH0/FMRRhX0teLdCIIacsSa/2bH70CbOdzWv6Q+8mYD34Mes4H/MfoC
# K+NcUU2sDPmN4LqO/2eyh0kKM3DzfJuIidm6cvD2YA69CSh85IuoBwIJD3zHB1ga
# wgzN2hPCeSdXzXZoMevJN33/MSsU3gjjZk0RGc4Xol2tzHMD3/GkJdRTW7K5OP46
# vX9QfJzbfGiC4yGAPtbIY98+0m5sKTxGYHp9nxOyMAa+aGUH5MqAgXkBYGlW86uW
# YdQl/cvicZdjgMRYNUklFP/zfxppMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAIB0UVZmBDMQk8AAQAAAgEwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgwQAi/a3/q0JlmF3jFrKsDzLn5mPDuqJTgG4BuhKu8/QwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCBYa7I6TJQRcmx0HaSTWZdJgowdrl9+Zrr0pIdq
# Htc4IzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAC
# AdFFWZgQzEJPAAEAAAIBMCIEIKMcBulW2TKoXBfoaBGu0S2w65GKyV6YpORLn7xf
# HyoaMA0GCSqGSIb3DQEBCwUABIICAJu3VRvXJmODtTBy7b9Cf6Os7s0MezCUOi4O
# B7nGmdM0z+wNaVpV4KXG63tgV1Ro1/c0pqzqH7mGUiTQ1DbXx9zNjUdNtg41wOn0
# f/2L0PgBCEHOGV5KpORWOwyeDl2HDKlO8QDKWL1vq+uUpMnxi/WAapKxWvsS3uVk
# ZhWfmbtL46J4z78te+MMfb9waKA+q/EqX4sylfYUlMxnskQ5JJa5/OJ4/fiPcKI3
# 5U1U0dFZMS5FlYyv5N4TsUO/h45ya4tkDEAICjE01Wgl77QwKT2Rg/1B7YTU3+B+
# KYi6tKm7L2riYwwE0zcybH3zXpJUXVnTwAgOLj1PIRYWglw2h+fNwdHMuh60NAFO
# +9rH1hmCoVko4R1clYA+UWnE4lShcBsz0UERw4lFehAMVsGCpsE37LN7PZytTfFH
# 1T0ZPfgglfl35JkWAlABvS2gRv8TJ9dkXjUpfn0DAbifMiPCKG69UYsYTJWqiVfA
# F5lvBGhwTjUwQeEj0QNwmnq0BtU9eB8/2eMyjc8opafQZoIMmq8lbmtWquEC5etc
# OVdWBHkmbtgIEdzIt797c1o4RhB+lM2fBc3W0AfXzrMTYNF8/fNDhdrLswv+ISou
# eGZ6aTNZMhn7ypvN6vZk+/X1QcYgum24C1la0OVe79iRZoI9XdRGn5VnZZ2YGAiD
# 0GZAKSwU
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_49_52.ps1
|
sample_49_52.ps1
|
BeforeAll {
$ModuleManifestName = 'SampleModule.psd1'
Import-Module $PSScriptRoot\..\$ModuleManifestName
}
Describe 'Module Manifest Tests' {
It 'Passes Test-ModuleManifest' {
Test-ModuleManifest -Path $PSScriptRoot\..\$ModuleManifestName
$? | Should -Be $true
}
}
# SIG # Begin signature block
# MIIr5wYJKoZIhvcNAQcCoIIr2DCCK9QCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCArakFqhC1Ei7Bw
# aQ0xL8H6DyvVYRxckrLFvpB1x553Z6CCEW4wggh+MIIHZqADAgECAhM2AAAB33OB
# lxa+Mv0NAAIAAAHfMA0GCSqGSIb3DQEBCwUAMEExEzARBgoJkiaJk/IsZAEZFgNH
# QkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxFTATBgNVBAMTDEFNRSBDUyBDQSAwMTAe
# Fw0yNDAxMjAwMTMzNDRaFw0yNTAxMTkwMTMzNDRaMCQxIjAgBgNVBAMTGU1pY3Jv
# c29mdCBBenVyZSBDb2RlIFNpZ24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
# AoIBAQDVucAmkbIWpspYysyydQyyRh2L8q5igYFcy2vDk8xGvVMRBhxwbOsJIEd0
# wY8N7WU/xgkYMnSsM4vmc2B49DGdrAjSJqbsx0zf+DLFjrBITUecdRhlq0VKGX8U
# bVOkg0aIfFNLRs4DSrCZYh26zyB8qkL/jUmB7DhcBEhhgOlXRQ4LHnUv7qf+iXqD
# uwFz9tUTAh8JGsgLRBK0oSsRfUB+FJF2KyUxzmeFXJKiEynsWz4kqoM91ag1Yw0U
# 8d0e+RgAKi3Ft1cXA+3qKM6I1H11e/NdIjh7oThvrBtfEngwlwbTF3KZOHdhLBFZ
# 18U4v8VeTlb4r94346CY2+SKnQa7AgMBAAGjggWKMIIFhjApBgkrBgEEAYI3FQoE
# HDAaMAwGCisGAQQBgjdbAQEwCgYIKwYBBQUHAwMwPQYJKwYBBAGCNxUHBDAwLgYm
# KwYBBAGCNxUIhpDjDYTVtHiE8Ys+hZvdFs6dEoFgg93NZoaUjDICAWQCAQ4wggJ2
# BggrBgEFBQcBAQSCAmgwggJkMGIGCCsGAQUFBzAChlZodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F
# JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDEu
# YW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUy
# MDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDIuYW1lLmdibC9haWEv
# QlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBS
# BggrBgEFBQcwAoZGaHR0cDovL2NybDMuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAx
# LkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZG
# aHR0cDovL2NybDQuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F
# JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDCBrQYIKwYBBQUHMAKGgaBsZGFwOi8vL0NO
# PUFNRSUyMENTJTIwQ0ElMjAwMSxDTj1BSUEsQ049UHVibGljJTIwS2V5JTIwU2Vy
# dmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1BTUUsREM9R0JM
# P2NBQ2VydGlmaWNhdGU/YmFzZT9vYmplY3RDbGFzcz1jZXJ0aWZpY2F0aW9uQXV0
# aG9yaXR5MB0GA1UdDgQWBBSO7i0qme7tjtjFjyuIjlmGM6cbCTAOBgNVHQ8BAf8E
# BAMCB4AwRQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3Jh
# dGlvbjEWMBQGA1UEBRMNMjM2MTY3KzUwMTk3MDCCAeYGA1UdHwSCAd0wggHZMIIB
# 1aCCAdGgggHNhj9odHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ1JM
# L0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwxLmFtZS5nYmwv
# Y3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwyLmFtZS5n
# YmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwzLmFt
# ZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmw0
# LmFtZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGgb1sZGFwOi8v
# L0NOPUFNRSUyMENTJTIwQ0ElMjAwMSgyKSxDTj1CWTJQS0lDU0NBMDEsQ049Q0RQ
# LENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZp
# Z3VyYXRpb24sREM9QU1FLERDPUdCTD9jZXJ0aWZpY2F0ZVJldm9jYXRpb25MaXN0
# P2Jhc2U/b2JqZWN0Q2xhc3M9Y1JMRGlzdHJpYnV0aW9uUG9pbnQwHwYDVR0jBBgw
# FoAUllGE4Gtve/7YBqvD8oXmKa5q+dQwHwYDVR0lBBgwFgYKKwYBBAGCN1sBAQYI
# KwYBBQUHAwMwDQYJKoZIhvcNAQELBQADggEBAJe/YXNSCoXitLf/X5pfJZpep3cs
# jdqmBgg+8Kr++8XMjWwdm4tiLasJMUPCgmp5NYn3wC4GefGYwfF7Xm2FMSR2i6QU
# HjigGu6BjdWQh4EwGaNqXLkXlUM7Ww2Z0KrRtpCL16DCOTNZuCFPAytSHFskPWrr
# 6q3EBuiM6P5VLgFSKiAxcunldJorbrBrvZSZib1OINzFGAQszUR0ytovW6FOp+uo
# VhiQCqnOheC1ppnZPss7vnXoogyO0xgSW40bRlltGfwnlOd3IZ/43ZOj5XeeShg5
# 2SzVEiyYrZjD17MSNzQM1JKI07+mtAC7D+eZ/+g2pM/91oHcrDq9Nq4QrS0wggjo
# MIIG0KADAgECAhMfAAAAUeqP9pxzDKg7AAAAAABRMA0GCSqGSIb3DQEBCwUAMDwx
# EzARBgoJkiaJk/IsZAEZFgNHQkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxEDAOBgNV
# BAMTB2FtZXJvb3QwHhcNMjEwNTIxMTg0NDE0WhcNMjYwNTIxMTg1NDE0WjBBMRMw
# EQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQD
# EwxBTUUgQ1MgQ0EgMDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDJ
# mlIJfQGejVbXKpcyFPoFSUllalrinfEV6JMc7i+bZDoL9rNHnHDGfJgeuRIYO1LY
# /1f4oMTrhXbSaYRCS5vGc8145WcTZG908bGDCWr4GFLc411WxA+Pv2rteAcz0eHM
# H36qTQ8L0o3XOb2n+x7KJFLokXV1s6pF/WlSXsUBXGaCIIWBXyEchv+sM9eKDsUO
# LdLTITHYJQNWkiryMSEbxqdQUTVZjEz6eLRLkofDAo8pXirIYOgM770CYOiZrcKH
# K7lYOVblx22pdNawY8Te6a2dfoCaWV1QUuazg5VHiC4p/6fksgEILptOKhx9c+ia
# piNhMrHsAYx9pUtppeaFAgMBAAGjggTcMIIE2DASBgkrBgEEAYI3FQEEBQIDAgAC
# MCMGCSsGAQQBgjcVAgQWBBQSaCRCIUfL1Gu+Mc8gpMALI38/RzAdBgNVHQ4EFgQU
# llGE4Gtve/7YBqvD8oXmKa5q+dQwggEEBgNVHSUEgfwwgfkGBysGAQUCAwUGCCsG
# AQUFBwMBBggrBgEFBQcDAgYKKwYBBAGCNxQCAQYJKwYBBAGCNxUGBgorBgEEAYI3
# CgMMBgkrBgEEAYI3FQYGCCsGAQUFBwMJBggrBgEFBQgCAgYKKwYBBAGCN0ABAQYL
# KwYBBAGCNwoDBAEGCisGAQQBgjcKAwQGCSsGAQQBgjcVBQYKKwYBBAGCNxQCAgYK
# KwYBBAGCNxQCAwYIKwYBBQUHAwMGCisGAQQBgjdbAQEGCisGAQQBgjdbAgEGCisG
# AQQBgjdbAwEGCisGAQQBgjdbBQEGCisGAQQBgjdbBAEGCisGAQQBgjdbBAIwGQYJ
# KwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMBIGA1UdEwEB/wQI
# MAYBAf8CAQAwHwYDVR0jBBgwFoAUKV5RXmSuNLnrrJwNp4x1AdEJCygwggFoBgNV
# HR8EggFfMIIBWzCCAVegggFToIIBT4YxaHR0cDovL2NybC5taWNyb3NvZnQuY29t
# L3BraWluZnJhL2NybC9hbWVyb290LmNybIYjaHR0cDovL2NybDIuYW1lLmdibC9j
# cmwvYW1lcm9vdC5jcmyGI2h0dHA6Ly9jcmwzLmFtZS5nYmwvY3JsL2FtZXJvb3Qu
# Y3JshiNodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9hbWVyb290LmNybIaBqmxkYXA6
# Ly8vQ049YW1lcm9vdCxDTj1BTUVSb290LENOPUNEUCxDTj1QdWJsaWMlMjBLZXkl
# MjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPUFNRSxE
# Qz1HQkw/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNz
# PWNSTERpc3RyaWJ1dGlvblBvaW50MIIBqwYIKwYBBQUHAQEEggGdMIIBmTBHBggr
# BgEFBQcwAoY7aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL2NlcnRz
# L0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6Ly9jcmwyLmFt
# ZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6
# Ly9jcmwzLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUH
# MAKGK2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQw
# gaIGCCsGAQUFBzAChoGVbGRhcDovLy9DTj1hbWVyb290LENOPUFJQSxDTj1QdWJs
# aWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9u
# LERDPUFNRSxEQz1HQkw/Y0FDZXJ0aWZpY2F0ZT9iYXNlP29iamVjdENsYXNzPWNl
# cnRpZmljYXRpb25BdXRob3JpdHkwDQYJKoZIhvcNAQELBQADggIBAFAQI7dPD+jf
# XtGt3vJp2pyzA/HUu8hjKaRpM3opya5G3ocprRd7vdTHb8BDfRN+AD0YEmeDB5HK
# QoG6xHPI5TXuIi5sm/LeADbV3C2q0HQOygS/VT+m1W7a/752hMIn+L4ZuyxVeSBp
# fwf7oQ4YSZPh6+ngZvBHgfBaVz4O9/wcfw91QDZnTgK9zAh9yRKKls2bziPEnxeO
# ZMVNaxyV0v152PY2xjqIafIkUjK6vY9LtVFjJXenVUAmn3WCPWNFC1YTIIHw/mD2
# cTfPy7QA1pT+GPARAKt0bKtq9aCd/Ym0b5tPbpgCiRtzyb7fbNS1dE740re0COE6
# 7YV2wbeo2sXixzvLftH8L7s9xv9wV+G22qyKt6lmKLjFK1yMw4Ni5fMabcgmzRvS
# jAcbqgp3tk4a8emaaH0rz8MuuIP+yrxtREPXSqL/C5bzMzsikuDW9xH10graZzSm
# PjilzpRfRdu20/9UQmC7eVPZ4j1WNa1oqPHfzET3ChIzJ6Q9G3NPCB+7KwX0OQmK
# yv7IDimj8U/GlsHD1z+EF/fYMf8YXG15LamaOAohsw/ywO6SYSreVW+5Y0mzJutn
# BC9Cm9ozj1+/4kqksrlhZgR/CSxhFH3BTweH8gP2FEISRtShDZbuYymynY1un+Ry
# fiK9+iVTLdD1h/SxyxDpZMtimb4CgJQlMYIZzzCCGcsCAQEwWDBBMRMwEQYKCZIm
# iZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQDEwxBTUUg
# Q1MgQ0EgMDECEzYAAAHfc4GXFr4y/Q0AAgAAAd8wDQYJYIZIAWUDBAIBBQCgga4w
# GQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisG
# AQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICU1ULSb2aDLD0qWvAnhRaGsLTrVR46/
# rtANSyhqnTGTMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYA
# dKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEA
# BE1bfVJM2B3BI5k5+7vSDulZaxlrn1kt3WxFDRPtu910OGxwGvmHe9FkAN4ZGxQ9
# IWwoh1fklYZQnfMaSTpq8cdsQvvNrwwh00/yQV/LYeAGX63uBMK69yoSHwJYJJDZ
# DTsXeZprn7hJFr6o4UCPJ3pyhWSKr0JfeJRIU406WGNwRT7ZncwC8qUbcg5JoPPq
# t5p2QxN/yuqGHn1CqwZmt3c1KBpEPP4Blkg2G4NJfJNZCWQsQYBaABxP9NQLyufb
# NaxuJw2DnmJvVxTJR8iXZxCshxEdggv0YOzYe1HSGN9/QxVj428DKkfmo8BjOOet
# tPtuYRVknB0QOXethWzMJqGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCCF38GCSqG
# SIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0B
# CRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUA
# BCCpwJZVZC2qn9ZZUhjubMVSgRUPo4HDrmqbwwzLIWZblgIGZfL28GlUGBMyMDI0
# MDQwOTAwNDE1Mi42MDlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEG
# A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj
# cm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBP
# cGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5
# NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHtMIIH
# IDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0BAQsFADB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2MDJaFw0y
# NTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
# bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0
# aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYD
# VQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4IC
# DwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfXhlLYmGns
# UtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjHtivWGgGj
# 4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQSmE9jQRo
# BogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56xYPQikitQ
# jjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhbw+z3VetR
# wuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvniP7sfE1ut
# fi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+syO1udZOe
# KM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E41j3s7MlT
# F4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA7E5vytak
# 0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj8Ipg3uQv
# cug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+XxwIDAQAB
# o4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8GA1UdIwQY
# MBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6
# Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUt
# U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYB
# BQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj
# cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB
# /wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0G
# CSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w61FxRxPxC
# XRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4Go9AML4l
# hA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEBPJQUxxuC
# iS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRABTUICNNrS
# 19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxewCpD4lZL
# 6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1rgReGd2uq
# QxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3ye1Z3pne
# r0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QTSTtDvU7+
# zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRiKsDF370S
# wIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8nfDjzJa8
# CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCALt0rQPJYn
# OzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQEL
# BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNV
# BAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4X
# DTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzAR
# BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p
# Y3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3Rh
# bXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM
# 57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm
# 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzB
# RMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBb
# fowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCO
# Mcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYw
# XE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW
# /aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/w
# EPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPK
# Z6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2
# BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfH
# CBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYB
# BAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v
# BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYM
# KwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEF
# BQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBW
# BgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUH
# AQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtp
# L2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsF
# AAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518Jx
# Nj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+
# iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2
# pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefw
# C2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7
# T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFO
# Ry3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhL
# mm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3L
# wUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5
# m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE
# 0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQMIICOAIB
# ATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UE
# CxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNy
# b3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu+gYs2LRh
# a5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX
# YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg
# Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy
# MDEwMA0GCSqGSIb3DQEBCwUAAgUA6b5o+TAiGA8yMDI0MDQwODEzMDA0MVoYDzIw
# MjQwNDA5MTMwMDQxWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpvmj5AgEAMAoC
# AQACAgJYAgH/MAcCAQACAhNVMAoCBQDpv7p5AgEAMDYGCisGAQQBhFkKBAIxKDAm
# MAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcN
# AQELBQADggEBAKb0kIZWyRw2YUV2Xc201ekLaxNd4cexe9uOJinfmtCzP+Mg3agw
# /T1YGqFEGXcdemsfMwN4nwBYeo/s7y0f/23S975C+ludQRBL7l0jMtZJgLt5PvqP
# Q1EGv6KaLi6vW7tNYIruORMY7OgrO+S+HhRs6Axal1INuCDW+m0FtE8uXK/f6XSz
# a4zFAps1AH5wJ3g+Twtc8DUg9XPeXYMqTLnBbHdzHk546HK1EpJ1Cspl0XSQaM3i
# fEQD5+1hmtvUWpZ4jIhuGUkV+e5W2J3LkjA9P18OQ+ToeXs/jW1YgimX2ud3uPgL
# 0WgAk57luV3NXyfAvE0iop2HQSZT+yHZL9sxggQNMIIECQIBATCBkzB8MQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfPFCkOuA8wdMQABAAAB8zANBglg
# hkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqG
# SIb3DQEJBDEiBCDTk4HL6KdVr7HLFQRGDV32Q970AIdeza9HMHK84taCDjCB+gYL
# KoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi82TSLtuG4Vkp8wBmJk/T+RAh841sG
# /aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAC
# EzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQgMc3Cd+F0GNhRxX2aXWt/iEz9ltl6PfJr
# Ynl/NHABW6wwDQYJKoZIhvcNAQELBQAEggIAtEIXkN0IjG3im5zVahwsSDVRdt4R
# WmstCRCDlGjfP4MD6KIs1/6OEi1Td+9M9aTtKBzd3rymAupFX8aRoHCOutKRUD6o
# flGedf8TKgg6aUgAA1A6lecMzoa8qAAzvqKlxhUnNdxflzRUH3fzmSjCBZ11Qpwv
# qgfOoOfBeek29aGH+cJ5UPKsGtOkeZk2VoCG8cuy8lUSeNwAIbXPQPjTzV+APixH
# 3n62/Ao4f6WM1Mr1rG/CKaH0zcbL99CdroEX82SvPT9uc2AFULleTqb1NZ/ZmR1i
# o4F9R8B9hdPE+Glyc3McGmluVV/D8WPfvzw2dadMzT+KXvCMg/4Z/D7w4Z/etPv0
# nNaR/TKMWEc0AwDyN/pCwcx/Idctty1dgQRzznH2k4Xezf32QM4k6pSgeXrYqM5i
# J+jC/efEn8XZy1Fd7MevZyfQt+W0C47jIwSfanA3z32u/LXhg3V1lnCXvAIKNhel
# veLY17ok2FuPjxs/Am4P4RJ7WWzffTYo1Q/DbPG3qtLsVCsNrZAiSRlnvuPyZhDa
# ktZS7G34RJz+GIu/kDoblYvUqX8yBpRFCpfFbVJ+wtWXGuLCai4u3IMAgXTkj6oH
# vE88kOeufz4U+L5OHsu1EXzhpL4j4WXh0r8QBqs4TOLnXq+QzV8jrueBv18kHwcR
# QpjhMHyK51X67jw=
# SIG # End signature block
|
combined_dataset/train/non-malicious/1767.ps1
|
1767.ps1
|
try
{
$defaultParamValues = $PSDefaultParameterValues.Clone()
$PSDefaultParameterValues["it:Skip"] = !$IsWindows
Describe "AMSI scan should detect suspicious content" -Tags 'Feature','RequireAdminOnWindows' {
BeforeAll {
[System.Management.Automation.Internal.InternalTestHooks]::SetTestHook("UseDebugAmsiImplementation", $true)
}
AfterAll {
[System.Management.Automation.Internal.InternalTestHooks]::SetTestHook("UseDebugAmsiImplementation", $false)
}
It "Verifies AMSI scan detects debug suspicious content" {
$EICAR_STRING_B64 = "awZ8EmMWc3JjaAdvY2lrBgcbY20aBHBwGgROF3Z6cHJhHmBncn13cmF3HnJ9Z3plemFmYB5ndmBnHnV6f3YSF3sYexk= "
$bytes = [System.Convert]::FromBase64String($EICAR_STRING_B64)
$EICAR_STRING = -join ($bytes | ForEach-Object { [char]($_ -bxor 0x33) })
{ Invoke-Expression -Command "echo '$EICAR_STRING'" } |
Should -Throw -ErrorId "ScriptContainedMaliciousContent,Microsoft.PowerShell.Commands.InvokeExpressionCommand"
}
}
}
finally
{
if ($defaultParamValues -ne $null)
{
$Global:PSDefaultParameterValues = $defaultParamValues
}
}
|
combined_dataset/train/non-malicious/4127.ps1
|
4127.ps1
|
$LastInfection = get-winevent -filterhashtable @{ logname = 'system'; ID = 1116 } -maxevents 1 -ErrorAction SilentlyContinue
$LastFullScan = get-winevent -filterhashtable @{ logname = 'system'; ID = 1118 } -maxevents 1 -ErrorAction SilentlyContinue
If (($LastFullScan.TimeCreated -lt $LastInfection.TimeCreated) -or ($LastInfection -eq $null)) {
Start-Sleep -Seconds 5
exit 0
} else {
Write-Host "No Infection"
Start-Sleep -Seconds 5
exit 0
}
|
combined_dataset/train/non-malicious/sample_56_62.ps1
|
sample_56_62.ps1
|
$timestamp = get-date -uformat %Y%m%d-%k%M%S
$transcriptPath = "$($env:temp)\StorageSyncAgent-SetRegPIIAclSettings-$($timestamp).log"
Start-Transcript -Path $transcriptPath
# The following script removes read permissions from registry key locations which may contain PII information.
$regPaths = 'HKLM:\Software\Microsoft\Azure\StorageSync\SyncShare','HKLM:\Software\Microsoft\Azure\StorageSync\SyncFolder','HKLM:\Software\Microsoft\Azure\StorageSync\ProxySettings','HKLM:\Software\Microsoft\Azure\StorageSync\ServerRegistration','HKLM:\Software\Microsoft\Azure\StorageSync\ServerSetting'
# The SDDL Below sets full access for Admins, Creator/Owners, and Local System. Permissions will be inherited by subkeys
# The effect is of this is to effectively remove read permissions from regular users
$sddl = 'O:BAG:SYD:P(A;CI;KA;;;CO)(A;CI;KA;;;SY)(A;CI;KA;;;BA)'
try
{
foreach ($path in $regPaths)
{
Write-Output "Setting SDDL for registry entry $path"
$acl = Get-Acl $path
if($acl.Sddl -ieq $sddl)
{
Write-Output "Skipping as SDDL already configured for registry entry $path"
}
else
{
Write-Output "Configuring SDDL for registry entry $path"
$acl.SetSecurityDescriptorSddlForm($sddl)
$acl | Set-Acl
}
}
}
catch
{
Write-Output "Exception encountered while setting up ACLs: $_.Exception.Message"
#add the error detail
$registryPath="HKLM:\SOFTWARE\Microsoft\Azure\StorageSync\AutoUpdate"
$registryName="UpdateError"
$registryValue="-2134359807" #ECS_E_INSTALLER_UNABLE_TO_SETUP_ACLS (hResult=80c84101)
if(Test-Path $registryPath) #path exist for agent with auto-update configured
{
New-ItemProperty -Path $registryPath -Name $registryName -Value $registryValue `
-PropertyType String -Force | Out-Null
}
throw
}
#Write transcript out to console.
Stop-Transcript
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCChmIxCG5rJ1awC
# JcJipaJYLEPkaLaxTm0j5MCf1IKPc6CCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMiwoSZFFHkQly6AE2bvY9I4
# cavW2zJvdxuArJGHkArmMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAEzu0yVcV8yu+7vmlFQiMcxg+b0gIIhYuBqG5c15OopjDh2jarRj3XpCl
# 4z6CGDehwD90IdQDWzVbMK3fU3yyBTOIYQIdze5ykP6w40Py2lRvXyeSVDqb9GKp
# i1kZKjWdudIgBshGZFAjsTQsEvKFFxVC6CkATIi7ONi+eIkfGiReg3Vapp15RrhT
# aY0IHOEAvhc4KBOPiNVk78yuIn9XcXJoQ5FytgDPaH0XXbT+f256CE8ZLA77Zb1x
# THbEEFSK+eho8dbCT6VdluZ9dSBEiSVbBdF4aaUfdKaWQCVXrTFu/SvZpqFMqjkt
# MlKGdidkl8dT2wUa5f5mzO3vRv8rRKGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAMbNJGiKR68vK5I2TGW8tafVq0TsdhhoQwNVhB6P9/1QIGZnMRA+Oi
# GBMyMDI0MDYyMTIxMjYxNC4wNjVaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC
# RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5
# ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi
# AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm
# JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz
# X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE
# nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP
# MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61
# ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG
# MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw
# S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+
# mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw
# WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3
# uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s
# Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU
# JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc
# ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0
# CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN
# jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1
# Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG
# eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp
# sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4
# vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW
# w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8
# FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE
# MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOogMkUwIhgPMjAyNDA2MjIwMTA5MjVaGA8yMDI0MDYyMzAxMDkyNVowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6iAyRQIBADAHAgEAAgIVQzAHAgEAAgIUJzAKAgUA
# 6iGDxQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAG/ocl7Gk1uW3xKo45Ff
# k14IggzsFHA335ud2SvVveEgljFYORT5IV+X8e2S4hYaqOHpaPMfTHb125/uApCj
# D2gyG6eTGetEJpCjdwWhs/dPTF9y+hM1u+aBKsgtIX1szAIkfpA/lUetuemQnKAw
# pBqfjJHqEpbJEVg+SMfB5y3tMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQg8MWtwWhTckHoF6gXofvQ7+5YRtqdru7Ls1h6wInNZDwwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLylxIIN
# NzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3MHg
# jMJfWF6OAAEAAAHcMCIEIAjrfoY3/1fWcU+rluJAz54nu6SiaZBCKXgOifxp8ACV
# MA0GCSqGSIb3DQEBCwUABIICAAo+BdNO8PJm78nxfVAG/k1oVmY/Vt6X0bX8Mp08
# pouojW29dRV7lTlZHbjo5+7LyJEavbbtkH7ZKK63J5eeyZdYVPD8qqGtMHzFErrq
# 4pXHnl5DTS9r4Jps+ylMogEhEOvxQNT6EZPjLPSUZXpNrihzvw6Pgtl7LUzK14gk
# 3Gzo1r4XrXF0b5Xd0pNnaSEvOVlq/FW3UWCX9oEukPAHS1jBXlK/Sxjw+tA3cK/c
# GJ9ynbQzJqaGq+ky1fobs+iXt9mr7Ie+dgHX4FtPcQRzqNExio5qQXanGLFiAnGP
# YpE40K8Mb30JgNCCJ7TRr28oDmek7Uuq935GtrdCT3glTNXhEIgY+HABsWuicDSE
# k9OuyrILa3PyjYfnVLxLjoTnsI0q1CjwXQLxMp5Eyp+DnxMZldnzzashYFgYm+em
# H6dne2GEX62ddOSGfu6DM6A3e3xBLsvhQ1H0YbS7xwp8L8EwopoaWVBF45giR64q
# cYXpKWbTNl8hYALeUNtibP07fBZJ8r/G6/7N07BLQWLYGcnM0nstSOv4RsKtfYW+
# sW07DZqtTdvVuPxQDCxjjv7yp4DpiDsS6RR1ugIRj932kepvXB4ZM2ueRCd59NnL
# unzkm5IeZDAeYXwbhL0QwZFUOHPlcBIEooJM5/IsLw56eb7Lz8CF+Myvh9BYoS5D
# UaH4
# SIG # End signature block
|
combined_dataset/train/non-malicious/Get-FileEncoding_4.ps1
|
Get-FileEncoding_4.ps1
|
<#
.SYNOPSIS
Gets file encoding.
.DESCRIPTION
The Get-FileEncoding function determines encoding by looking at Byte Order Mark (BOM).
Based on port of C# code from http://www.west-wind.com/Weblog/posts/197245.aspx
.EXAMPLE
Get-ChildItem *.ps1 | select FullName, @{n='Encoding';e={Get-FileEncoding $_.FullName}} | where {$_.Encoding -ne 'ASCII'}
This command gets ps1 files in current directory where encoding is not ASCII
.EXAMPLE
Get-ChildItem *.ps1 | select FullName, @{n='Encoding';e={Get-FileEncoding $_.FullName}} | where {$_.Encoding -ne 'ASCII'} | foreach {(get-content $_.FullName) | set-content $_.FullName -Encoding ASCII}
Same as previous example but fixes encoding using set-content
#>
function Get-FileEncoding
{
[CmdletBinding()] Param (
[Parameter(Mandatory = $True, ValueFromPipelineByPropertyName = $True)] [string]$Path
)
[byte[]]$byte = get-content -Encoding byte -ReadCount 4 -TotalCount 4 -Path $Path
if ($byte.count -ge 0)
{
if ( $byte[0] -eq 0xef -and $byte[1] -eq 0xbb -and $byte[2] -eq 0xbf )
{ $encoding = 'UTF8' }
elseif ($byte[0] -eq 0xfe -and $byte[1] -eq 0xff)
{ $encoding = 'BigEndianUnicode' }
elseif ($byte[0] -eq 0xff -and $byte[1] -eq 0xfe)
{ $encoding = 'Unicode' }
elseif ($byte[0] -eq 0 -and $byte[1] -eq 0 -and $byte[2] -eq 0xfe -and $byte[3] -eq 0xff)
{ $encoding = 'UTF32' }
elseif ($byte[0] -eq 0x2b -and $byte[1] -eq 0x2f -and $byte[2] -eq 0x76)
{ $encoding = 'UTF7'}
else
{ $encoding = 'ASCII' }
return $encoding
}
}
|
combined_dataset/train/non-malicious/sample_50_77.ps1
|
sample_50_77.ps1
|
# Copyright (C) Intel Corporation, 2007 - 2019 All Rights Reserved.
Function Get-AMTUserConsent {
<#
.Synopsis
Gets the Intel Active Management Technology user consent state
.Description
This CmdLet gets the Intel Active Management Technology (AMT) user consent state from clients that have Intel AMT firmware version 6.0 and higher.
.Notes
Supported AMT Firmware Versions: 6.0 or higher.
AMT Provisioning:
The vPro client AMT firmware must be provisioned prior to accessing AMT functionality. This CMDLet will fail if it is run against a vPro client that has not been provisioned.
AMT Client Authentication:
To invoke commands against AMT enabled clients credentials to authenticate must be specified.
When no credential is provided as a parameter, the script will use the local logged on Kerberos credential.
When only the username (Kerberos or Digest) parameter is included the user will be prompted to provide the associated password.
Credentials should be stored as a PowerShell variable then passed into the Cmdlet with the credential parameter.
$AMTCredential = get-credential
AMT Client Encryption:
If the Intel vPro client has been configured to use TLS (a web server certificate has been issued to the Intel Management Engine) the Cmdlet must be called with a -TLS switch.
When managing an Intel vPro client over TLS (Port 16993) it is important that the computername parameter matchs the primary subject name of the issued TLS certificate. Typically this is the fully qualified domain name (FQDN).
If Mutual TLS is desired, the Cmdlet must be called with -TLS switch and with a valid certificate name from the certificate store in the -CertificateName parameter.
Status:
Status output designates if the Cmdlet was run successfully. For failed attempts additional status may be provided.
.Link
http:\\vproexpert.com
http:\\www.intel.com\vpro
http:\\www.intel.com
.Example
Get-AMTUserConsent -computer:vproclient.vprodemo.com
ComputerName Port Status UserConsent
------------ ---- ------ -----------
vproclient.vprodemo.com 16992 Successful Not Required
.Example
Get-AMTUserConsent vproclient.vprodemo.com -Username:vprodemo\ITHelpDesk
Will prompt for Kerberos username password.
ComputerName Port Status UserConsent
------------ ---- ------ -----------
vproclient.vprodemo.com 16992 Successful Requested
.Example
Get-AMTUserConsent -ComputerName:vproclient.vprodemo.com -credential $AMTCredential -TLS -CertificateName "myCertificate"
ComputerName Port Status UserConsent
------------ ---- ------ ----------- vproclient.vprodemo.com 16993 Successful Displayed
.Example
Get-AMTUserConsent -ComputerName computer1.vprodemo.com,doesnotexist.vprodemo.com | Where {$_.Status -eq "Failed"}
Will get the power state of every AMT client in the list, but only display the ones that failed.
ComputerName Port Status UserConsent
------------ ---- ------ -----------
doesnotexist.vprodemo.com 16992 Failed Unknown
.Example
Get-Content computers.txt | Get-AMTUserConsent -TLS -CertificateName "myCertificate"
Will pull the list of AMT clients from a text file and pipe them in the Get-AMTUserConsent Cmdlet
ComputerName Port Status UserConsent
------------ ---- ------ -----------
computer1.vprodemo.com 16993 Successful Received
computer2.vprodemo.com 16993 Successful Not Required
computer3.vprodemo.com 16993 Successful Not Required
.Example
Get-Content computers.txt | Get-AMTUserConsent | Where {$_.UserConsent -eq "Not Started"}
Will pull the list of AMTclients from a text file pipe them into the Get-AMTUserConsent Cmdlet and display the ones that required user consent
ComputerName Port Status UserConsent
------------ ---- ------ -----------
computer2.vprodemo.com 16992 Successful Not Started
computer3.vprodemo.com 16992 Successful Not Started
#>
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$true, position=0, HelpMessage="Hostname, FQDN, or IP Address")] [String[]] $ComputerName,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=1, HelpMessage="Validate Ports are 16992 (non-TLS) or 16993 (TLS)")][ValidateSet("16992", "16993")] [String] $Port,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest or Kerberos User")] [string] $Username,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest or Kerberos Password")] [string] $Password,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Use TLS (Port 16993)")] [switch] $TLS,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Name of certificate. (Use for mutual TLS)")] [string] $CertificateName,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=3, HelpMessage="PS Credential")] [System.Management.Automation.PSCredential] $Credential
)
Process{
$Results = @()
$Obj = new-object psobject
try
{
#create a connection object
$Connection = New-Object Intel.Management.Wsman.WsmanConnection
if ($Credential.username.Length -gt 0) {
$Connection.SetCredentials($Credential.Username, $Credential.Password)
} elseif ($Username.length -gt 0) {
if ($Password.length -gt 0) {
$Connection.SetCredentials($Username, $Password)
} else {
$Cred = Get-Credential $Username
$Connection.SetCredentials($Cred.Username, $Cred.Password)
}
}
if ($Port.Length -lt 1) {
if ($TLS.IsPresent) {
$Port = 16993;
}
else {
$Port = 16992;
}
}
if($CertificateName.Length -gt 0)
{
$Connection.Options.SetClientCertificateByCertificateName($CertificateName)
}
ForEach ($Comp in $ComputerName) {
#Add Member to Object. Include Computer Name and Port
$Obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp
$Obj | Add-Member -MemberType noteproperty -Name Port -value $Port
try {
#Attempt Connection with Client
$Connection.SetHost($Comp, $Port)
#Get opt-in service state
$ObjRef = $Connection.NewReference("http://intel.com/wbem/wscim/1/ips-schema/1/IPS_OptInService")
$IPSObj = $ObjRef.Get()
#Check user consent is required
$OptInRequired = $IPSObj.GetProperty("OptInRequired").ToString()
$optInState = $IPSObj.GetProperty("OptInState").ToString()
#Add Member to Object. Include Status
$Obj | Add-Member -MemberType noteproperty -Name Status -value "Successful"
if ($OptInRequired -eq 0) {
$Obj | Add-Member -MemberType noteproperty -Name UserConsent -value "NotRequired"
} else {
switch ($optInState) {
0 {$UserConsent = "Not Started"}
1 {$UserConsent = "Requested"}
2 {$UserConsent = "Displayed"}
3 {$UserConsent = "Received"}
4 {$UserConsent = "In Session"}
default {$UserConsent = "Unknown"}
}
$Obj | Add-Member -MemberType noteproperty -Name UserConsent -value $UserConsent
}
} catch [System.Exception] {
if ($_.Exception.GetType().ToString() -eq "Intel.Management.Wsman.WsmanUnreachableException") {
# AMT will not have this object when Host Based Configuration is not available
$Obj | Add-Member -MemberType noteproperty -Name Status -value "Successful"
$Obj | Add-Member -MemberType noteproperty -Name UserConsent -value "Not Required"
} else {
if($_.ToString().Contains("Unauthorized"))
{
$Obj | Add-Member -MemberType noteproperty -Name Status -value "Unauthorized"
}
else
{
$Obj | Add-Member -MemberType noteproperty -Name Status -value "Cannot connect"
$Obj | Add-Member -MemberType noteproperty -Name Reason -value $_.Exception.Message
}
}
}
#Append to Result
$Results += $Obj
}
}
catch
{
$Obj | Add-Member -MemberType noteproperty -Name Status -value "Cannot connect"
$Obj | Add-Member -MemberType noteproperty -Name Reason -value $_.Exception.Message
#Append to Result
$Results += $Obj
}
Write-Output $Results
}
}
# SIG # Begin signature block
# MIIo1gYJKoZIhvcNAQcCoIIoxzCCKMMCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCNdNMpSdEQvRj1
# hqxxdvWjWAGZgCy3KYYJxVx3emhUv6CCEe8wggWIMIIEcKADAgECAhAK3oEU12eb
# Bm8tst/S9nrCMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAkdCMRswGQYDVQQI
# ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoT
# D1NlY3RpZ28gTGltaXRlZDEkMCIGA1UEAxMbU2VjdGlnbyBSU0EgQ29kZSBTaWdu
# aW5nIENBMB4XDTIxMDQwNTAwMDAwMFoXDTIzMDQwNTIzNTk1OVowcDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFDASBgNVBAcMC1NhbnRhIENsYXJh
# MRowGAYDVQQKDBFJbnRlbCBDb3Jwb3JhdGlvbjEaMBgGA1UEAwwRSW50ZWwgQ29y
# cG9yYXRpb24wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDjUVXd0eS2
# a1cJleh4bp6C5ngpid1fyZl3x1O7UH31slBxqjtjD45nsKBbDATVW/ZH0zqbLQ0P
# pQLpLbBVHEFasianjtLSjFXs1pJJ14rfuZCyiOaFFCGYqb/fLQ2ZBq/0riDFgwfC
# YS80SIV7V+hq+XJhpsUms/5QPqRilRnk+OPlbikQktkUVWi1qN7pkjkC5NgTDLnz
# oxGP3OYA6x+ac3/NMQYnRXzbjACLUq70L2hDC8sDwaCQXavaUG29FF4MjwE8MzMx
# DqcjpZmaO/jbTpExgMBfkDa+vqWSb99gdAeJI/JZXAeuYgGQ+66aIhwmRGsqQIXT
# z4ofo+mRQMgSXatXEOtuBrC5q5GZUnWTTrdfnkdxg0oD9CsttmZg6Fhu5mTLYbJ+
# lKrV/JtSjKNgtQdYXCtnV5FRRzlqcjXqsXG+Q1YaY/n0lTEwCAqJyRMyJLuK/S/U
# MUfPw9BvDQbpyB3ARSD4FJ3glwv9UDKd/BmQ2SVGpS+3/7whm633YIMCAwEAAaOC
# AZAwggGMMB8GA1UdIwQYMBaAFA7hOqhTOjHVir7Bu61nGgOFrTQOMB0GA1UdDgQW
# BBS5qxx6xBgtLKbRn3jrB6dtnHz6VDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/
# BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhCAQEEBAMCBBAwSgYD
# VR0gBEMwQTA1BgwrBgEEAbIxAQIBAwIwJTAjBggrBgEFBQcCARYXaHR0cHM6Ly9z
# ZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQBMEMGA1UdHwQ8MDowOKA2oDSGMmh0dHA6
# Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1JTQUNvZGVTaWduaW5nQ0EuY3JsMHMG
# CCsGAQUFBwEBBGcwZTA+BggrBgEFBQcwAoYyaHR0cDovL2NydC5zZWN0aWdvLmNv
# bS9TZWN0aWdvUlNBQ29kZVNpZ25pbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0dHA6
# Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBAdvRj4EEZ88QF
# gAGQZABeZB6XbzWNZaFrDGmZMTqREok2QqB6QxdyPSsAFEL5mVfwnD5f8F8iHx+W
# aZXjKHbSvn1f1CAMFMc/i7Byrr984Obp2raebwFNRUO7l2lewLCgkRBlb3+W7Hud
# eTGoTzhJL/Qcvy1jLT0VmhLJbvYjEpBuQ62z7MQH7HltsfjRnDu1RpqKsYWJuCt6
# tOSNn7MZ8vb5nsZEIqRoonucy4Yp1ItP/uXuLc4KcdLh+TzNUiXWWK6qQ6TqeeJp
# Z34IjoS1FvjXLV4ACypUuUvmEIq691NseI4ByVHCZyMa59A6Scpp+kadDUEw0LZj
# t9LGvtWIMIIF9TCCA92gAwIBAgIQHaJIMG+bJhjQguCWfTPTajANBgkqhkiG9w0B
# AQwFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNV
# BAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsx
# LjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkw
# HhcNMTgxMTAyMDAwMDAwWhcNMzAxMjMxMjM1OTU5WjB8MQswCQYDVQQGEwJHQjEb
# MBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgw
# FgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJDAiBgNVBAMTG1NlY3RpZ28gUlNBIENv
# ZGUgU2lnbmluZyBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAIYi
# jTKFehifSfCWL2MIHi3cfJ8Uz+MmtiVmKUCGVEZ0MWLFEO2yhyemmcuVMMBW9aR1
# xqkOUGKlUZEQauBLYq798PgYrKf/7i4zIPoMGYmobHutAMNhodxpZW0fbieW15dR
# hqb0J+V8aouVHltg1X7XFpKcAC9o95ftanK+ODtj3o+/bkxBXRIgCFnoOc2P0tbP
# BrRXBbZOoT5Xax+YvMRi1hsLjcdmG0qfnYHEckC14l/vC0X/o84Xpi1VsLewvFRq
# nbyNVlPG8Lp5UEks9wO5/i9lNfIi6iwHr0bZ+UYc3Ix8cSjz/qfGFN1VkW6KEQ3f
# BiSVfQ+noXw62oY1YdMCAwEAAaOCAWQwggFgMB8GA1UdIwQYMBaAFFN5v1qqK0rP
# VIDh2JvAnfKyA2bLMB0GA1UdDgQWBBQO4TqoUzox1Yq+wbutZxoDha00DjAOBgNV
# HQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHSUEFjAUBggrBgEF
# BQcDAwYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBD
# oEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZp
# Y2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEFBQcBAQRqMGgwPwYIKwYBBQUHMAKG
# M2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FBZGRUcnVzdENB
# LmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29jc3AudXNlcnRydXN0LmNvbTANBgkq
# hkiG9w0BAQwFAAOCAgEATWNQ7Uc0SmGk295qKoyb8QAAHh1iezrXMsL2s+Bjs/th
# AIiaG20QBwRPvrjqiXgi6w9G7PNGXkBGiRL0C3danCpBOvzW9Ovn9xWVM8Ohgyi3
# 3i/klPeFM4MtSkBIv5rCT0qxjyT0s4E307dksKYjalloUkJf/wTr4XRleQj1qZPe
# a3FAmZa6ePG5yOLDCBaxq2NayBWAbXReSnV+pbjDbLXP30p5h1zHQE1jNfYw08+1
# Cg4LBH+gS667o6XQhACTPlNdNKUANWlsvp8gJRANGftQkGG+OY96jk32nw4e/gdR
# EmaDJhlIlc5KycF/8zoFm/lv34h/wCOe0h5DekUxwZxNqfBZslkZ6GqNKQQCd3xL
# S81wvjqyVVp4Pry7bwMQJXcVNIr5NsxDkuS6T/FikyglVyn7URnHoSVAaoRXxrKd
# sbwcCtp8Z359LukoTBh+xHsxQXGaSynsCz1XUNLK3f2eBVHlRHjdAd6xdZgNVCT9
# 8E7j4viDvXK6yz067vBeF5Jobchh+abxKgoLpbn0nu6YMgWFnuv5gynTxix9vTp3
# Los3QqBqgu07SqqUEKThDfgXxbZaeTMYkuO1dfih6Y4KJR7kHvGfWocj/5+kUZ77
# OYARzdu1xKeogG/lU9Tg46LC0lsa+jImLWpXcBw8pFguo/NbSwfcMlnzh6cabVgw
# ggZmMIIETqADAgECAhMzAAAARLc//O9az6J6AAAAAABEMA0GCSqGSIb3DQEBBQUA
# MH8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAMT
# IE1pY3Jvc29mdCBDb2RlIFZlcmlmaWNhdGlvbiBSb290MB4XDTE1MDcyMjIxMDM0
# OVoXDTI1MDcyMjIxMDM0OVowgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpOZXcg
# SmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJU
# UlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmljYXRp
# b24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAgBJl
# FzYOw9sIs9CsVw127c0n00ytUINh4qogTQktZAnczomfzD2p7PbPwdzx07HWezco
# EStH2jnGvDoZtF+mvX2do2NCtnbyqTsrkfjib9DsFiCQCT7i6HTJGLSR1GJk23+j
# BvGIGGqQIjy8/hPwhxR79uQfjtTkUcYRZ0YIUcuGFFQ/vDP+fmyc/xadGL1RjjWm
# p2bIcmfbIWax1Jt4A8BQOujM8Ny8nkz+rwWWNR9XWrf/zvk9tyy29lTdyOcSOk2u
# TIq3XJq0tyA9yn8iNK5+O2hmAUTnAU5GU5szYPeUvlM3kHND8zLDU+/bqv50TmnH
# a4xgk97Exwzf4TKuzJM7UXiVZ4vuPVb+DNBpDxsP8yUmazNt925H+nND5X4OpWax
# KXwyhGNVicQNwZNUMBkTrNN9N6frXTpsNVzbQdcS2qlJC9/YgIoJk2KOtWbPJYjN
# hLixP6Q5D9kCnusSTJV882sFqV4Wg8y4Z+LoE53MW4LTTLPtW//e5XOsIzstAL81
# VXQJSdhJWBp/kjbmUZIO8yZ9HE0XvMnsQybQv0FfQKlERPSZ51eHnlAfV1SoPv10
# Yy+xUGUJ5lhCLkMaTLTwJUdZ+gQek9QmRkpQgbLevni3/GcV4clXhB4PY9bpYrrW
# X1Uu6lzGKAgEJTm4Diup8kyXHAc/DVL17e8vgg8CAwEAAaOB0DCBzTATBgNVHSUE
# DDAKBggrBgEFBQcDAzASBgNVHRMBAf8ECDAGAQH/AgECMB0GA1UdDgQWBBRTeb9a
# qitKz1SA4dibwJ3ysgNmyzALBgNVHQ8EBAMCAYYwHwYDVR0jBBgwFoAUYvsKIVt/
# Q24R2glUUGv10pZx8Z4wVQYDVR0fBE4wTDBKoEigRoZEaHR0cDovL2NybC5taWNy
# b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljcm9zb2Z0Q29kZVZlcmlmUm9v
# dC5jcmwwDQYJKoZIhvcNAQEFBQADggIBAGsikzw9OVRxZGsO8uQ8MBHFIEpLhg+S
# 8f8zeTrZ5JinDkCgIoB+YbLgpxnPJpUxKmXUak8xhurAxi7FZIw9SFnNCy90PZQm
# ExBC1JeYJ148dtJ4aR0aZOcFcnXg62ZAQ5+PDEb/l2CmyGetEAibYqbpvjqK0wdN
# n3KTJbwGEeAskDg+Zxz9GdeekM49wuDnYazA5QT1HplUDJENAVZxN64n1J5DIqXJ
# J81N5XESOSSlQVaH/7xVFA8lyonux5fl0hP/PX4aoI8/yCzXo3DQx2DA/Ng+UeeX
# xj477c94vorK48Typ6ftnq4IAo+gUttyHtU7w02fjvqbcMf4479sP5Kb5Dc+7GqM
# KfnBor+LPhppZvscY08mAckCxD7S/8NDqBv9mfrUvKW54pMvOwHF0fQ6L2jD4GS3
# WpVeRswHg2m7PAWSVnM1c0WYTnzYEqW3QumiY/ZCYBhw0TtvMcCHx+Zx4fNGFun1
# uHKz6W0fYiZJo0mL3WjHi2hW9978+ockuAOBF4/l8WdqHa7TdPeMpV2zC45CKZbO
# ScR3fmZ8ARcabBQkw7AXdwXYGkC3hmvY5HtArH7fTm8k+SCAgowz5+X6Kdid2otw
# XSvJHYJMC2fLhEGe5wZ+EYNELYoZ7vR/mt15HDcZHp8/jCm6DVwQhjdsSM1FXc1w
# vLzRTV3Yxbh2MYIWPTCCFjkCAQEwgZAwfDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT
# EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMP
# U2VjdGlnbyBMaW1pdGVkMSQwIgYDVQQDExtTZWN0aWdvIFJTQSBDb2RlIFNpZ25p
# bmcgQ0ECEAregRTXZ5sGby2y39L2esIwDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEE
# AYI3AgEMMQIwADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3
# AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQguOstkbBxhLseLi8a
# othEML26qBa2l3WlfEbUI3YAtyswDQYJKoZIhvcNAQEBBQAEggGAPjywauOqWk2X
# dy9oQEni56Q+UEy+YgCn6j6OP1Qfi5nEWSGe85RVADe+H5yfFfz805eNnvpkN8KI
# fqSGksj1Ukvhp4tKrP6DTGP8v6y0IAeuT6tcKVwNRXsMalBiAiP6BB7Qi+stf9Ao
# bhxNI7EE5XzgvNIiWsjOi87sh9KxLz0Fi0QFGNxR4TQKjmeDwWb2sIQCpl/3vxDX
# A0j8D3rcwyROdqd54+5Dv/iZG7bWqO4zNRiJbJFQg59lEyStpjU2+rxxZQB9OgE2
# FRmpybtn1lKDTnyqghE0X+6acXXcF2ZZzOhi2c3fFx86DVUgl234Ipvz4WQTJiPl
# y4NHw6xegpVtBCpqbfNIh/bIjgRKxiIXUh2PXagqOu7qDyZwhk5HMvNo1r01zT1N
# IcTQ03nYZHwAipNyQ8CWwrwHRk9L5kLQ4MtD0fsxru7l5eBh4DS8a5RpA23IaZgE
# xZBf8qHRkcZpgIaN3FQDCROfC4VsaK20pQHAcgDSfFHgKtNKD5YpoYITfzCCE3sG
# CisGAQQBgjcDAwExghNrMIITZwYJKoZIhvcNAQcCoIITWDCCE1QCAQMxDzANBglg
# hkgBZQMEAgIFADCCAQwGCyqGSIb3DQEJEAEEoIH8BIH5MIH2AgEBBgorBgEEAbIx
# AgEBMDEwDQYJYIZIAWUDBAIBBQAEIKxtjFPOjFOzi/mBGsp35+vuCrJbmZUf0xHm
# zTXXEJhLAhQZEx8/BoxAtUchl+8Nd+7BqVAVHRgPMjAyMTA3MTkxNjI5NTVaoIGK
# pIGHMIGEMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVy
# MRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLDAq
# BgNVBAMMI1NlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgU2lnbmVyICMyoIIN+zCC
# BwcwggTvoAMCAQICEQCMd6AAj/TRsMY9nzpIg41rMA0GCSqGSIb3DQEBDAUAMH0x
# CzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNV
# BAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMGA1UEAxMc
# U2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTAeFw0yMDEwMjMwMDAwMDBaFw0z
# MjAxMjIyMzU5NTlaMIGEMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBN
# YW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRgwFgYDVQQKEw9TZWN0aWdvIExp
# bWl0ZWQxLDAqBgNVBAMMI1NlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgU2lnbmVy
# ICMyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAkYdLLIvB8R6gntMH
# xgHKUrC+eXldCWYGLS81fbvA+yfaQmpZGyVM6u9A1pp+MshqgX20XD5WEIE1OiI2
# jPv4ICmHrHTQG2K8P2SHAl/vxYDvBhzcXk6Th7ia3kwHToXMcMUNe+zD2eOX6csZ
# 21ZFbO5LIGzJPmz98JvxKPiRmar8WsGagiA6t+/n1rglScI5G4eBOcvDtzrNn1AE
# HxqZpIACTR0FqFXTbVKAg+ZuSKVfwYlYYIrv8azNh2MYjnTLhIdBaWOBvPYfqnzX
# wUHOrat2iyCA1C2VB43H9QsXHprl1plpUcdOpp0pb+d5kw0yY1OuzMYpiiDBYMby
# AizE+cgi3/kngqGDUcK8yYIaIYSyl7zUr0QcloIilSqFVK7x/T5JdHT8jq4/pXL0
# w1oBqlCli3aVG2br79rflC7ZGutMJ31MBff4I13EV8gmBXr8gSNfVAk4KmLVqsrf
# 7c9Tqx/2RJzVmVnFVmRb945SD2b8mD9EBhNkbunhFWBQpbHsz7joyQu+xYT33Qqd
# 2rwpbD1W7b94Z7ZbyF4UHLmvhC13ovc5lTdvTn8cxjwE1jHFfu896FF+ca0kdBss
# 3Pl8qu/CdkloYtWL9QPfvn2ODzZ1RluTdsSD7oK+LK43EvG8VsPkrUPDt2aWXpQy
# +qD2q4lQ+s6g8wiBGtFEp8z3uDECAwEAAaOCAXgwggF0MB8GA1UdIwQYMBaAFBqh
# +GEZIA/DQXdFKI7RNV8GEgRVMB0GA1UdDgQWBBRpdTd7u501Qk6/V9Oa258B0a7e
# 0DAOBgNVHQ8BAf8EBAMCBsAwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggr
# BgEFBQcDCDBABgNVHSAEOTA3MDUGDCsGAQQBsjEBAgEDCDAlMCMGCCsGAQUFBwIB
# FhdodHRwczovL3NlY3RpZ28uY29tL0NQUzBEBgNVHR8EPTA7MDmgN6A1hjNodHRw
# Oi8vY3JsLnNlY3RpZ28uY29tL1NlY3RpZ29SU0FUaW1lU3RhbXBpbmdDQS5jcmww
# dAYIKwYBBQUHAQEEaDBmMD8GCCsGAQUFBzAChjNodHRwOi8vY3J0LnNlY3RpZ28u
# Y29tL1NlY3RpZ29SU0FUaW1lU3RhbXBpbmdDQS5jcnQwIwYIKwYBBQUHMAGGF2h0
# dHA6Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBKA3iQQjPs
# exqDCTYzmFW7nUAGMGtFavGUDhlQ/1slXjvhOcRbuumVkDc3vd/7ZOzlgreVzFdV
# cEtO9KiH3SKFple7uCEn1KAqMZSKByGeir2nGvUCFctEUJmM7D66A3emggKQwi6T
# qb4hNHVjueAtD88BN8uNovq4WpquoXqeE5MZVY8JkC7f6ogXFutp1uElvUUIl4DX
# VCAoT8p7s7Ol0gCwYDRlxOPFw6XkuoWqemnbdaQ+eWiaNotDrjbUYXI8DoViDaBe
# cNtkLwHHwaHHJJSjsjxusl6i0Pqo0bglHBbmwNV/aBrEZSk1Ki2IvOqudNaC58CI
# uOFPePBcysBAXMKf1TIcLNo8rDb3BlKao0AwF7ApFpnJqreISffoCyUztT9tr59f
# ClbfErHD7s6Rd+ggE+lcJMfqRAtK5hOEHE3rDbW4hqAwp4uhn7QszMAWI8mR5UID
# S4DO5E3mKgE+wF6FoCShF0DV29vnmBCk8eoZG4BU+keJ6JiBqXXADt/QaJR5oaCe
# jra3QmbL2dlrL03Y3j4yHiDk7JxNQo2dxzOZgjdE1CYpJkCOeC+57vov8fGP/lC4
# eN0Ult4cDnCwKoVqsWxo6SrkECtuIf3TfJ035CoG1sPx12jjTwd5gQgT/rJkXumx
# PObQeCOyCSziJmK/O6mXUczHRDKBsq/P3zCCBuwwggTUoAMCAQICEDAPb6zdZph0
# fKlGNqd4LbkwDQYJKoZIhvcNAQEMBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpOZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhl
# IFVTRVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRp
# ZmljYXRpb24gQXV0aG9yaXR5MB4XDTE5MDUwMjAwMDAwMFoXDTM4MDExODIzNTk1
# OVowfTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQ
# MA4GA1UEBxMHU2FsZm9yZDEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSUwIwYD
# VQQDExxTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIENBMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEAyBsBr9ksfoiZfQGYPyCQvZyAIVSTuc+gPlPvs1rA
# dtYaBKXOR4O168TMSTTL80VlufmnZBYmCfvVMlJ5LsljwhObtoY/AQWSZm8hq9Vx
# EHmH9EYqzcRaydvXXUlNclYP3MnjU5g6Kh78zlhJ07/zObu5pCNCrNAVw3+eolzX
# OPEWsnDTo8Tfs8VyrC4Kd/wNlFK3/B+VcyQ9ASi8Dw1Ps5EBjm6dJ3VV0Rc7NCF7
# lwGUr3+Az9ERCleEyX9W4L1GnIK+lJ2/tCCwYH64TfUNP9vQ6oWMilZx0S2UTMiM
# PNMUopy9Jv/TUyDHYGmbWApU9AXn/TGs+ciFF8e4KRmkKS9G493bkV+fPzY+DjBn
# K0a3Na+WvtpMYMyou58NFNQYxDCYdIIhz2JWtSFzEh79qsoIWId3pBXrGVX/0DlU
# LSbuRRo6b83XhPDX8CjFT2SDAtT74t7xvAIo9G3aJ4oG0paH3uhrDvBbfel2aZMg
# HEqXLHcZK5OVmJyXnuuOwXhWxkQl3wYSmgYtnwNe/YOiU2fKsfqNoWTJiJJZy6hG
# wMnypv99V9sSdvqKQSTUG/xypRSi1K1DHKRJi0E5FAMeKfobpSKupcNNgtCN2mu3
# 2/cYQFdz8HGj+0p9RTbB942C+rnJDVOAffq2OVgy728YUInXT50zvRq1naHelUF6
# p4MCAwEAAaOCAVowggFWMB8GA1UdIwQYMBaAFFN5v1qqK0rPVIDh2JvAnfKyA2bL
# MB0GA1UdDgQWBBQaofhhGSAPw0F3RSiO0TVfBhIEVTAOBgNVHQ8BAf8EBAMCAYYw
# EgYDVR0TAQH/BAgwBgEB/wIBADATBgNVHSUEDDAKBggrBgEFBQcDCDARBgNVHSAE
# CjAIMAYGBFUdIAAwUAYDVR0fBEkwRzBFoEOgQYY/aHR0cDovL2NybC51c2VydHJ1
# c3QuY29tL1VTRVJUcnVzdFJTQUNlcnRpZmljYXRpb25BdXRob3JpdHkuY3JsMHYG
# CCsGAQUFBwEBBGowaDA/BggrBgEFBQcwAoYzaHR0cDovL2NydC51c2VydHJ1c3Qu
# Y29tL1VTRVJUcnVzdFJTQUFkZFRydXN0Q0EuY3J0MCUGCCsGAQUFBzABhhlodHRw
# Oi8vb2NzcC51c2VydHJ1c3QuY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBtVIGlM10W
# 4bVTgZF13wN6MgstJYQRsrDbKn0qBfW8Oyf0WqC5SVmQKWxhy7VQ2+J9+Z8A70DD
# rdPi5Fb5WEHP8ULlEH3/sHQfj8ZcCfkzXuqgHCZYXPO0EQ/V1cPivNVYeL9IduFE
# Z22PsEMQD43k+ThivxMBxYWjTMXMslMwlaTW9JZWCLjNXH8Blr5yUmo7Qjd8Fng5
# k5OUm7Hcsm1BbWfNyW+QPX9FcsEbI9bCVYRm5LPFZgb289ZLXq2jK0KKIZL+qG9a
# JXBigXNjXqC72NzXStM9r4MGOBIdJIct5PwC1j53BLwENrXnd8ucLo0jGLmjwkcd
# 8F3WoXNXBWiap8k3ZR2+6rzYQoNDBaWLpgn/0aGUpk6qPQn1BWy30mRa2Coiwkud
# 8TleTN5IPZs0lpoJX47997FSkc4/ifYcobWpdR9xv1tDXWU9UIFuq/DQ0/yysx+2
# mZYm9Dx5i1xkzM3uJ5rloMAMcofBbk1a0x7q8ETmMm8c6xdOlMN4ZSA7D0GqH+mh
# QZ3+sbigZSo04N6o+TzmwTC7wKBjLPxcFgCo0MR/6hGdHgbGpm0yXbQ4CStJB6r9
# 7DDa8acvz7f9+tCjhNknnvsBZne5VhDhIG7GrrH5trrINV0zdo7xfCAMKneutaIC
# hrop7rRaALGMq+P5CslUXdS5anSevUiumDGCBC0wggQpAgEBMIGSMH0xCzAJBgNV
# BAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1Nh
# bGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMGA1UEAxMcU2VjdGln
# byBSU0EgVGltZSBTdGFtcGluZyBDQQIRAIx3oACP9NGwxj2fOkiDjWswDQYJYIZI
# AWUDBAICBQCgggFrMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG
# 9w0BCQUxDxcNMjEwNzE5MTYyOTU1WjA/BgkqhkiG9w0BCQQxMgQwjJAGwbzb6KLw
# CMNrABa0/WEqFBdO4xtppIKDpN+7IrMPTG1dwe9S/i0sdKhQqGCAMIHtBgsqhkiG
# 9w0BCRACDDGB3TCB2jCB1zAWBBSVETcQHYgvMb1RP5Sa2kxorYwI9TCBvAQUAtZb
# leKDcMFXAJX6iPkj3ZN/rY8wgaMwgY6kgYswgYgxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpOZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMV
# VGhlIFVTRVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENl
# cnRpZmljYXRpb24gQXV0aG9yaXR5AhAwD2+s3WaYdHypRjaneC25MA0GCSqGSIb3
# DQEBAQUABIICAFkXIfcfZMgS3YvkvIN5dGUVNElT3BScNn0MYTRUpfHRQg/Y1E6b
# bAmnvPmkU7LjJvE0LwXtYN2s1oHSoI6PSqmryf/HrjVi1vBYyX3eE/UJNm8/Tp31
# oSYfGDxZeay1xVnEVRgZ7H28jAz0OF7pUfXxwmGfjnThD4hgbWdiVRq33qT+h4GN
# j3UX7u2jgItbFnZq9FmJzbvsvo9TSLJBZBh23tkCd+DBUg2UatfTcGAFl9ZJfHVm
# RTM2l/W8pzzU1HwXU5nDdZkhEBTubAG/bmAzOO++J8x85rtDtIV0YVjc0LSlK5hJ
# QAl6DcMYYh3toAnHw9t+K7tcTVtBFc4FAmuU64fOp1kXiffX7Jjbpn8GbqybFp3X
# F3vtddLGjXAe8LxUyQPIZy62eJy8+6hJ5XeJuPIbzhuMZdIbLvgCF88LSMof1xPj
# s5RB7bz9MOXF3EJ4kxVQSuPWTaKJT7y6rr8STVAq8AzjnwVys/U2A2AsprzjV/9Z
# C9JRRILk6BWNr1jWuBj7bJ1dxMzGcvMiKqodpH5xA3zSR4vBfAIQvpAcko+0wS1G
# SqMAgCEl035G4oJgEq/TY3GMU3VKBXqkqOscmaX+mnQeqrK++CNuRlZnFOzRZXiZ
# Bv+dbNWRFI4AU+I/H+dLHWf5JFvbRy/sc2TVYkZwa9J1Dg4+9k0ruOlQ
# SIG # End signature block
|
combined_dataset/train/non-malicious/2498.ps1
|
2498.ps1
|
function invoke-sql
{
param(
[Parameter(Mandatory = $True)]
[string]$Query,
[Parameter(Mandatory = $True)]
[string]$DBName,
[Parameter(Mandatory = $True)]
[string]$DBServerName
)
$QueryTimeout = 36000
$ConnectionTimeout = 36000
$conn = New-Object System.Data.SqlClient.SQLConnection
$ConnectionString = "Server={0};Database={1};Integrated Security=True;Connect Timeout={2}" -f $DBServerName,$DBName,$ConnectionTimeout
$conn.ConnectionString = $ConnectionString
$conn.Open()
$cmd = New-Object system.Data.SqlClient.SqlCommand ($Query,$conn)
$cmd.CommandTimeout = $QueryTimeout
$ds = New-Object system.Data.DataSet
$da = New-Object system.Data.SqlClient.SqlDataAdapter ($cmd)
[void]$da.fill($ds)
$conn.Close()
$results = $ds.Tables[0]
$results
}
function SQL-Query {
param([string]$Query,
[string]$SqlServer = $DEFAULT_SQL_SERVER,
[string]$DB = $DEFAULT_SQL_DB,
[string]$RecordSeparator = "`t")
$conn_options = ("Data Source=$SqlServer; Initial Catalog=$DB;" + "Integrated Security=SSPI")
$conn = New-Object System.Data.SqlClient.SqlConnection ($conn_options)
$conn.Open()
$sqlCmd = New-Object System.Data.SqlClient.SqlCommand
$sqlCmd.CommandTimeout = "300"
$sqlCmd.CommandText = $Query
$sqlCmd.Connection = $conn
$reader = $sqlCmd.ExecuteReader()
if (-not $?) {
$lineno = Get-CurrentLineNumber
./logerror.ps1 $Output $date $lineno $title
}
[array]$serverArray
$arrayCount = 0
while ($reader.Read()) {
$serverArray +=,($reader.GetValue(0))
$arrayCount++
}
$serverArray
}
[string]$SMCIndexesScript = "\\xfs3\DataManagement\Scripts\Move_DB\PowershellScripts\SQL\SMCIndexes.sql";
[string]$SMCTriggersScript = "\\xfs3\Release\Prime Alliance\SMC\LatestVersion\DatabaseScripts\Other\Triggers.sql";
[string]$SMCViewsScript = "\\xfs3\Release\Prime Alliance\SMC\LatestVersion\DatabaseScripts\Other\Views.sql";
[string]$SMCImportLoansScript = "\\xfs3\Release\Prime Alliance\SMC\LatestVersion\DatabaseScripts\Other\ImportLoans.sql";
function Apply-SMCScripts {
param(
[Parameter(Mandatory = $True)]
[string]$DBServerName,
[Parameter(Mandatory = $True)]
[string]$DBName
)
Invoke-SQLCMD -ServerInstance $DBServerName -database $DBName -InputFile $SMCIndexesScript -QueryTimeout 120
Invoke-SQLCMD -ServerInstance $DBServerName -database $DBName -InputFile $SMCTriggersScript -QueryTimeout 120
Invoke-SQLCMD -ServerInstance $DBServerName -database $DBName -InputFile $SMCViewsScript -QueryTimeout 120
Invoke-SQLCMD -ServerInstance $DBServerName -database $DBName -InputFile $SMCImportLoansScript -QueryTimeout 120
}
function DO-Replication
{
param
(
[string][Parameter(Mandatory = $true,Position = 0)] $subscriber,
[string][Parameter(Mandatory = $true,Position = 1)] $publisher,
[string][Parameter(Mandatory = $true,Position = 2)] $publication,
[string][Parameter(Mandatory = $true,Position = 3)] $subscriptionDatabase,
[string][Parameter(Mandatory = $true,Position = 4)] $publicationDatabase,
[boolean][Parameter(Mandatory = $true,Position = 5)] $forceReInit,
[int32][Parameter(Mandatory = $true,Position = 6)] $verboseLevel,
[int32][Parameter(Mandatory = $true,Position = 7)] $retries
)
"Subscriber: $subscriber";
"Publisher: $publisher";
"Publication: $publication";
"Publication Database: $publicationDatabase";
"Subscription Database: $subscriptionDatabase";
"ForceReInit: $forceReinit";
"VerboseLevel: $verboseLevel";
"Retries: $retries";
for ($counter = 1; $counter -le $retries; $counter++)
{
$serverConnection = New-Object Microsoft.SqlServer.Management.Common.ServerConnection $publisher;
try
{
$transSubscription = New-Object Microsoft.SqlServer.Replication.TransSubscription
$transSubscription.ConnectionContext = $serverConnection;
$transSubscription.DatabaseName = $publicationDatabase;
$transSubscription.PublicationName = $publication;
$transSubscription.SubscriptionDBName = $subscriptionDatabase;
$transSubscription.SubscriberName = $subscriber;
if ($true -ne $transSubscription.LoadProperties())
{
throw New-Object System.ApplicationException "A subscription to [$publication] does not exist on [$subscriber]"
}
else
{
$ReplJob = SQL-Query -Query "select name from sysjobs where category_id = 15 and name like '%$($publicationDatabase)%' " -sqlserver $Publisher -DB "msdb"
SQL-Query -Query "exec sp_start_job '$($ReplJob)'" -sqlserver $publisher -DB "msdb"
}
if ($null -eq $transSubscription.SubscriberSecurity)
{
throw New-Object System.ApplicationException "There is insufficent metadata to synchronize the subscription. Recreate the subscription with the agent job or supply the required agent properties at run time.";
}
if ($forceReInit -eq $true)
{
$transSubscription.Reinitialize();
}
$transSubscription.SynchronizationAgent.CommitPropertyChanges;
$transSubscription.SynchronizationAgent.Synchronize;
"Sync Complete";
return;
} catch [exception]
{
if ($counter -lt $retries)
{
$_.Exception.Message + ": " + $_.Exception.InnerException
"Retry $counter";
continue;
}
else
{
$Error[0] | Out-String
return $_.Exception.Message + ": " + $_.Exception.InnerException
}
}
}
}
cls
Apply-SMCScripts -DBServerName "STGSQLLFC6" -dbname "RLCSMC"
|
combined_dataset/train/non-malicious/sample_63_38.ps1
|
sample_63_38.ps1
|
param(
[string]$rootDirectory
)
# Validate root directory parameter
if ([string]::IsNullOrWhiteSpace($rootDirectory)) {
Write-Host "Error: Root directory path is required."
exit 1
}
# Print the paths to confirm they are being set correctly
Write-Host "Root Directory Path: $rootDirectory"
# Define subdirectory paths based on the root directory
# $featureDirectoryPath = Join-Path -Path $rootDirectory -ChildPath "features"
# $pagesPath = Join-Path -Path $rootDirectory -ChildPath "Pages"
# $modulesPath = Join-Path -Path $rootDirectory -ChildPath "modules"
# $stepDefPath = Join-Path -Path $rootDirectory -ChildPath "step_definitions"
# ---- new code added ------------------------------------------------------------------
$featureDirectoryPath = Join-Path -Path $rootDirectory -ChildPath "src/test/resources/features"
$pagesPath = Join-Path -Path $rootDirectory -ChildPath "src/test/java/Pages"
$modulesPath = Join-Path -Path $rootDirectory -ChildPath "src/test/java/modules"
$stepDefPath = Join-Path -Path $rootDirectory -ChildPath "src/test/java/step_definitions"
# --------------------------------------------------------------------------------------
# Print the paths to confirm they are being set correctly
Write-Host "Feature Directory Path: $featureDirectoryPath"
Write-Host "Pages Path: $pagesPath"
Write-Host "Modules Path: $modulesPath"
Write-Host "Step Definitions Path: $stepDefPath"
# Check if the feature directory exists
if (-Not (Test-Path -Path $featureDirectoryPath)) {
Write-Host "Feature directory path does not exist: $featureDirectoryPath"
exit 1
}
# Get all feature files in the directory
$featureFiles = Get-ChildItem -Path $featureDirectoryPath -Filter *.feature
# Check if there are any feature files
if ($featureFiles.Count -eq 0) {
Write-Host "No feature files found in the directory: $featureDirectoryPath"
exit 1
}
# Ensure the output directories exist
if (-Not (Test-Path -Path $pagesPath)) {
New-Item -ItemType Directory -Path $pagesPath
}
if (-Not (Test-Path -Path $modulesPath)) {
New-Item -ItemType Directory -Path $modulesPath
}
if (-Not (Test-Path -Path $stepDefPath)) {
New-Item -ItemType Directory -Path $stepDefPath
}
# Set API endpoint
$endpoint = "https://api.openai.com/v1/chat/completions"
# Header for API key
$headers = @{
"Content-Type" = "application/json"
"Accept" = "application/json"
"Authorization" = "Bearer sk-proj-xGJkIkdCA5FYgpNPHviAT3BlbkFJSMHy8yPY7T2kXPQKRWSI"
"Cookie" = "__cf_bm=EJBUBMe_o31PeVThk.9ywwWLRkamx9A9pT4jAxjXW4M-1715917815-1.0.1.1-PW2WyDdtyUqHDv6oflUkIFj.NgOhFHKPgiuigJjn1UdDAacluuoYn0tzF5qa9ephpjGn.N0.UJUAOV4Sho91xQ; _cfuvid=pP3rRUKdN0MvEt9GlNi3j9OMPaEw_RwlPKEXxn5PfE0-1715914702942-0.0.1.1-604800000"
}
foreach ($featureFile in $featureFiles) {
$featureFilePath = $featureFile.FullName
$featureContent = Get-Content -Path $featureFilePath -Raw
# Extract the feature file name without extension
$featureFileName = [System.IO.Path]::GetFileNameWithoutExtension($featureFilePath)
Write-Output "Processing feature file: $featureFileName"
# Construct the content message
$contentMessage = @"
You are given a .feature file written in Cucumber. Your task is to generate three Java files based on the given feature file content, which implement the step definitions using Java:\n"
+ "1. A file containing all the locators (xpaths) named according to the feature file.\n"
+ "2. A file with function definitions for each step in the feature file, named according to the feature file.\n"
+ "3. A main file that calls the functions from the second file, named according to the feature file.\n\n"
+ "Please ensure the following:\n"
+ "1. The generated Java code should be syntactically correct and free of errors.\n"
+ "2. Do not add any extra Java keywords at the beginning of the file (e.g., 'java').\n"
+ "3. Import the necessary Cucumber libraries and any other libraries required for the steps.\n"
+ "4. Ensure proper naming conventions and code formatting are used.\n"
+ "5. Use meaningful comments within the methods to indicate what each step should perform.\n"
+ "6. We are using Selenium version 4.0.0 and above, so do not include ChromeDriver or WebDriver. Import only the required libraries.\n\n"
+ "Name the generated files according to the feature file name. For example, if the feature file is named 'Reports.feature', the generated files will be:\n"
+ " - ReportsPage.java: Contains locators (xpaths)\n"
+ " - Reports.java: Contains functions related to the feature file\n"
+ " - ReportsStepDef.java: Contains step definitions of the feature file\n\n"
+ "File name should be changed according to the name of feature file\n"
+ "Add necessary libraries in locators file depending on the feature file and Use 'By' locator for storing locators in variables\n\n"
+ "Add necessary functions with its content in function definitions for each step in feature file. Strictly ensure that all functions are included according to locators and properly defined.\n\n"
+ "We have KeywordUtil class which contains two function 'click' and 'inputText' , so use these functions in file which contains function definition related to feature file, use 'inputText for entering credentials as email, password and otp as 'KeywordUtil.inputText()' and import utilities.KeywordUtil;\n\n"
+ "use KeywordUtil functionality as KeywordUtil.inputText(InvoicePage.email_input, email, \"Entering email id \"); where it is required\n\n"
+ "use KeywordUtil.navigateToUrl for hitting to url and it takes only 1 argument \n\n"
+ "import package 'package Pages' in Locators files, package 'package modules' in function definition of files and package 'package step_definitions' in step definition file.\n\n"
+ "instead of using package 'com.example.utilities.KeywordUtil' , import package 'utilities.KeywordUtil'\n\n"
+ "instead of using 'isElementVisible', use 'waitForVisible' and 'waitForVisible' will take only 1 argument and when 'waitForVisible' function is used, it must be wrap under void type function.\n\n"
+ "access functions by creating an object of class \n\n"
+ "import io.cucumber.java.en.* in all stepDef files\n\n"
+ "Include a `Thread.sleep(15000)` for the step where 'the User is able to log in to the merchant account'\n\n"
+ "Include a `Thread.sleep(1500)` for the step where 'the User clicks on the profile icon', 'click on logout', 'click on yes' in the step definition file, no need to do changes in function definitions\n\n"
+ "Include a `Thread.sleep(1500)` for the step where 'the User click on Invoice option', 'The User click on In-Store order','the user click on Online order','The User click on Reports', 'The User is able to see the full Settlement Report with the selected date range'\n\n"
+ "Please ensure you use only the provided locators (xpaths) strictly according to the feature file content and do not generate any new xpaths and they must follow order according to feature file."
+ "\n\n\n Feature File name is: "
+ $featureFilePath
+ Feature file content:
+ $featureContent
"@
# Set data
$data = @{
"model" = "gpt-4-turbo"
"messages" = @(
@{
"role" = "user"
"content" = $contentMessage
}
)
"temperature" = 0
"top_p" = 1
"n" = 1
"stream" = $false
"max_tokens" = 4096
"presence_penalty" = 0
"frequency_penalty" = 0
}
# Convert data to JSON
$jsonData = $data | ConvertTo-Json -Depth 10
# Send request
try {
$response = Invoke-RestMethod -Uri $endpoint -Method Post -Headers $headers -Body $jsonData
# Check if response is empty
if (-not $response) {
Write-Output "Error: Empty response received for $featureFileName."
continue
}
# Log the full response for debugging
# Write-Output "API Response for ${featureFileName}: $($response | ConvertTo-Json -Depth 10)"
# Extract Java code from the response
$fullResponse = $response.choices[0].message.content
# Log the full response content
# Write-Output "Full Response Content for ${featureFileName}: $fullResponse"
# Replace '```java' with '```'
$fullResponse = $fullResponse -replace '```java', '```'
# Split the response into Java code segments
$javaCodes = $fullResponse -split '```'
# Output the length of $javaCodes
# Write-Output "Number of extracted Java code segments for ${featureFileName}: $($javaCodes.Length)"
# Log the extracted segments
for ($i = 0; $i -lt $javaCodes.Length; $i++) {
Write-Output "Segment $i for ${featureFileName}: $($javaCodes[$i])"
}
if ($javaCodes.Length -lt 6) {
Write-Output "Error: Response format is incorrect for ${featureFileName}."
continue
}
# Save files to their respective directories
$locatorsFilePath = Join-Path -Path $pagesPath -ChildPath ($featureFileName + "Page.java")
$mainFilePath = Join-Path -Path $modulesPath -ChildPath ($featureFileName + ".java")
$stepDefinitionsFilePath = Join-Path -Path $stepDefPath -ChildPath ($featureFileName + "StepDef.java")
Set-Content -Path $locatorsFilePath -Value $javaCodes[1]
Set-Content -Path $mainFilePath -Value $javaCodes[3]
Set-Content -Path $stepDefinitionsFilePath -Value $javaCodes[5]
Write-Output "Java files for ${featureFileName} have been generated and saved in their respective folders."
} catch {
Write-Error "Error processing feature file $featureFileName"
}
}
|
combined_dataset/train/non-malicious/Autoload Module_1.ps1
|
Autoload Module_1.ps1
|
#Requires -Version 2.0
## Automatically load functions from scripts on-demand, instead of having to dot-source them ahead of time, or reparse them from the script every time.
## Provides significant memory benefits over pre-loading all your functions, and significant performance benefits over using plain scripts. Can also *inject* functions into Modules so they inherit the module scope instead of the current local scope.
## Please see the use example in the script below
## Version History
## v 1.1 - 2011.02.09
## Added support for autoloading scripts (files that don't have a "function" in them)
## v 1.0 - 2010.10.20
## Officially out of beta -- this is working for me without problems on a daily basis.
## Renamed functions to respect the Verb-Noun expectations, and added Export-ModuleMember
## beta 8 - 2010.09.20
## Finally fixed the problem with aliases that point at Invoke-Autoloaded functions!
## beta 7 - 2010.06.03
## Added some help, and a function to force loading "now"
## Added a function to load AND show the help...
## beta 6 - 2010.05.18
## Fixed a bug in output when multiple outputs happen in the END block
## beta 5 - 2010.05.10
## Fixed non-pipeline use using $MyInvocation.ExpectingInput
## beta 4 - 2010.05.10
## I made a few tweaks and bug fixes while testing it's use with PowerBoots.
## beta 3 - 2010.05.10
## fix for signed scripts (strip signature)
## beta 2 - 2010.05.09
## implement module support
## beta 1 - 2010.04.14
## Initial Release
## To use:
## 1) Create a function. To be 100% compatible, it should specify pipeline arguments
## For example:
<#
function Skip-Object {
param(
[int]$First = 0, [int]$Last = 0, [int]$Every = 0, [int]$UpTo = 0,
[Parameter(Mandatory=$true,ValueFromPipeline=$true)]
$InputObject
)
begin {
if($Last) {
$Queue = new-object System.Collections.Queue $Last
}
$e = $every; $UpTo++; $u = 0
}
process {
$InputObject | where { --$First -lt 0 } |
foreach {
if($Last) {
$Queue.EnQueue($_)
if($Queue.Count -gt $Last) { $Queue.DeQueue() }
} else { $_ }
} |
foreach {
if(!$UpTo) { $_ } elseif( --$u -le 0) { $_; $U = $UpTo }
} |
foreach {
if($every -and (--$e -le 0)) { $e = $every } else { $_ }
}
}
}
#>
## 2) Put the function into a script (for our example: C:\\Users\\${Env:UserName}\\Documents\\WindowsPowerShell\\Scripts\\SkipObject.ps1 )
## 3) Import the Autoload Module
## 5) Run this command (or add it to your profile):
<#
New-Autoload C:\\Users\\${Env:UserName}\\Documents\\WindowsPowerShell\\Scripts\\SkipObject.ps1 Skip-Object
#>
## This tells us that you want to have that function loaded for you out of the script file if you ever try to use it.
## Now, you can just use the function:
## 1..10 | Skip-Object -first 2 -upto 2
function Invoke-Autoloaded {
#.Synopsis
# This function was autoloaded, but it has not been parsed yet.
# Use Get-AutoloadHelp to force parsing and get the correct help (or just invoke the function once).
#.Description
# You are seeing this help because the command you typed was imported via the New-Autoload command from the Autoload module. The script file containing the function has not been loaded nor parsed yet. In order to see the correct help for your function we will need to parse the full script file, to force that at this time you may use the Get-AutoloadHelp function.
#
# For example, if your command was Get-PerformanceHistory, you can force loading the help for it by running the command: Get-AutoloadHelp Get-PerformanceHistory
[CmdletBinding()]Param()
DYNAMICPARAM {
$CommandName = $MyInvocation.InvocationName
return LoadNow $CommandName
}#DynamicParam
begin {
Write-Verbose "Command: $CommandName"
if(!$Script:AutoloadHash[$CommandName]) {
do {
$Alias = $CommandName
$CommandName = Get-Alias $CommandName -ErrorAction SilentlyContinue | Select -Expand Definition
Write-Verbose "Invoke-Autoloaded Begin: $Alias -> $CommandName"
} while(!$Script:AutoloadHash[$CommandName] -and (Get-Alias $CommandName -ErrorAction SilentlyContinue))
} else {
Write-Verbose "CommandHash: $($Script:AutoloadHash[$CommandName])"
}
if(!$Script:AutoloadHash[$CommandName]) { throw "Unable to determine command!" }
$ScriptName, $ModuleName, $FunctionName = $Script:AutoloadHash[$CommandName]
Write-Verbose "Invoke-Autoloaded Begin: $Alias -> $CommandName -> $FunctionName"
#Write-Host "Parameters: $($PSBoundParameters | ft | out-string)" -Fore Magenta
$global:command = $ExecutionContext.InvokeCommand.GetCommand( $FunctionName, [System.Management.Automation.CommandTypes]::Function )
Write-Verbose "Autoloaded Command: $($Command|Out-String)"
$scriptCmd = {& $command @PSBoundParameters | Write-Output }
$steppablePipeline = $scriptCmd.GetSteppablePipeline($myInvocation.CommandOrigin)
$steppablePipeline.Begin($myInvocation.ExpectingInput)
}
process
{
Write-Verbose "Invoke-Autoloaded Process: $CommandName ($_)"
try {
if($_) {
$steppablePipeline.Process($_)
} else {
$steppablePipeline.Process()
}
} catch {
throw
}
}
end
{
try {
$steppablePipeline.End()
} catch {
throw
}
Write-Verbose "Invoke-Autoloaded End: $CommandName"
}
}#Invoke-Autoloaded
function Get-AutoloadHelp {
[CmdletBinding()]
Param([Parameter(Mandatory=$true)][String]$CommandName)
$null = LoadNow $CommandName
Get-Help $CommandName
}
function LoadNow {
[CmdletBinding()]
Param([Parameter(Mandatory=$true)][String]$CommandName)
Write-Verbose "Command: $CommandName"
if(!$Script:AutoloadHash[$CommandName]) {
do {
$Alias = $CommandName
$CommandName = Get-Alias $CommandName -ErrorAction SilentlyContinue | Select -Expand Definition
Write-Verbose "LoadNow Begin: $Alias -> $CommandName"
} while(!$Script:AutoloadHash[$CommandName] -and (Get-Alias $CommandName -ErrorAction SilentlyContinue))
} else {
Write-Verbose "CommandHash: $($Script:AutoloadHash[$CommandName])"
}
if(!$Script:AutoloadHash[$CommandName]) { throw "Unable to determine command!" }
Write-Verbose "LoadNow DynamicParam: $CommandName from $($Script:AutoloadHash[$CommandName])"
$ScriptName, $ModuleName, $FunctionName = $Script:AutoloadHash[$CommandName]
Write-Verbose "Autoloading:`nScriptName: $ScriptName `nModuleName: $ModuleName `nFunctionName: $FunctionName"
if(!$ScriptName){ $ScriptName = $CommandName }
if(!$FunctionName){ $FunctionName = $CommandName }
if($ModuleName) {
$Module = Get-Module $ModuleName
} else { $Module = $null }
## Determine the command name based on the alias used to invoke us
## Store the parameter set for use in the function later...
$paramDictionary = new-object System.Management.Automation.RuntimeDefinedParameterDictionary
#$externalScript = $ExecutionContext.InvokeCommand.GetCommand( $CommandName, [System.Management.Automation.CommandTypes]::ExternalScript )
$externalScript = Get-Command $ScriptName -Type ExternalScript | Select -First 1
Write-Verbose "Processing Script: $($externalScript |Out-String)"
$parserrors = $null
$prev = $null
$script = $externalScript.ScriptContents
[System.Management.Automation.PSToken[]]$tokens = [PSParser]::Tokenize( $script, [ref]$parserrors )
[Array]::Reverse($tokens)
$function = $false
ForEach($token in $tokens) {
if($prev -and $token.Content -eq "# SIG # Begin signature block") {
$script = $script.SubString(0, $token.Start )
}
if($prev -and $token.Type -eq "Keyword" -and $token.Content -ieq "function" -and $prev.Content -ieq $FunctionName ) {
$script = $script.Insert( $prev.Start, "global:" )
$function = $true
Write-Verbose "Globalized: $($script[(($prev.Start+7)..($prev.Start + 7 +$prev.Content.Length))] -join '')"
}
$prev = $token
}
if(!$function) {
$script = "function global:$Functionname { $script }"
}
if($Module) {
$script = Invoke-Expression "{ $Script }"
Write-Verbose "Importing Function into $($Module) module."
&$Module $Script | Out-Null
$command = Get-Command $FunctionName -Type Function
Write-Verbose "Loaded Module Function: $($command | ft CommandType, Name, ModuleName, Visibility|Out-String)"
} else {
Write-Verbose "Importing Function without module."
Invoke-Expression $script | out-null
$command = Get-Command $FunctionName -Type Function
Write-Verbose "Loaded Local Function: $($command | ft CommandType, Name, ModuleName, Visibility|Out-String)"
}
if(!$command) {
throw "Something went wrong autoloading the $($FunctionName) function. Function definition doesn't exist in script: $($externalScript.Path)"
}
if($CommandName -eq $FunctionName) {
Remove-Item Alias::$($CommandName)
Write-Verbose "Defined the function $($FunctionName) and removed the alias $($CommandName)"
} else {
Set-Alias $CommandName $FunctionName -Scope Global
Write-Verbose "Defined the function $($FunctionName) and redefined the alias $($CommandName)"
}
foreach( $pkv in $command.Parameters.GetEnumerator() ){
$parameter = $pkv.Value
if( $parameter.Aliases -match "vb|db|ea|wa|ev|wv|ov|ob" ) { continue }
$param = new-object System.Management.Automation.RuntimeDefinedParameter( $parameter.Name, $parameter.ParameterType, $parameter.Attributes)
$paramdictionary.Add($pkv.Key, $param)
}
return $paramdictionary
}
function New-Autoload {
[CmdletBinding()]
param(
[Parameter(Position=0,Mandatory=$True,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)]
[string[]]$Name
,
[Parameter(Position=1,Mandatory=$False,ValueFromPipelineByPropertyName=$true)]
[Alias("BaseName")]
$Alias = $Name
,
[Parameter(Position=2,Mandatory=$False,ValueFromPipelineByPropertyName=$true)]
$Function = $Alias
,
[Parameter(Position=3,Mandatory=$false)]
[String]$Module
,
[Parameter(Mandatory=$false)]
[String]$Scope = '2'
)
begin {
$xlr8r = [type]::gettype("System.Management.Automation.TypeAccelerators")
if(!$xlr8r::Get["PSParser"]) {
$xlr8r::Add( "PSParser", "System.Management.Automation.PSParser, System.Management.Automation, Version=1.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35" )
}
}
process {
for($i=0;$i -lt $Name.Count;$i++){
if($Alias -is [Scriptblock]) {
$a = $Name[$i] | &$Alias
} elseif($Alias -is [Array]) {
$a = $Alias[$i]
} else {
$a = $Alias
}
if($Function -is [Scriptblock]) {
$f = $Name[$i] | &$Function
} elseif($Function -is [Array]) {
$f = $Function[$i]
} else {
$f = $Function
}
Write-Verbose "Set-Alias $Module\\$a Invoke-Autoloaded -Scope $Scope"
Set-Alias $a Invoke-Autoloaded -Scope $Scope
$Script:AutoloadHash[$a] = $Name[$i],$Module,$f
Write-Verbose "`$AutoloadHash[$a] = $($Script:AutoloadHash[$a])"
}
}
}
Set-Alias Autoload New-Autoload
$Script:AutoloadHash = @{}
Export-ModuleMember -Function New-Autoload, Invoke-Autoloaded, Get-AutoloadHelp -Alias *
# SIG # Begin signature block
# MIIIDQYJKoZIhvcNAQcCoIIH/jCCB/oCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB
# gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR
# AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUssOSqKkXdzRkKCA3J7jqfwad
# YC+gggUrMIIFJzCCBA+gAwIBAgIQKQm90jYWUDdv7EgFkuELajANBgkqhkiG9w0B
# AQUFADCBlTELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAlVUMRcwFQYDVQQHEw5TYWx0
# IExha2UgQ2l0eTEeMBwGA1UEChMVVGhlIFVTRVJUUlVTVCBOZXR3b3JrMSEwHwYD
# VQQLExhodHRwOi8vd3d3LnVzZXJ0cnVzdC5jb20xHTAbBgNVBAMTFFVUTi1VU0VS
# Rmlyc3QtT2JqZWN0MB4XDTEwMDUxNDAwMDAwMFoXDTExMDUxNDIzNTk1OVowgZUx
# CzAJBgNVBAYTAlVTMQ4wDAYDVQQRDAUwNjg1MDEUMBIGA1UECAwLQ29ubmVjdGlj
# dXQxEDAOBgNVBAcMB05vcndhbGsxFjAUBgNVBAkMDTQ1IEdsb3ZlciBBdmUxGjAY
# BgNVBAoMEVhlcm94IENvcnBvcmF0aW9uMRowGAYDVQQDDBFYZXJveCBDb3Jwb3Jh
# dGlvbjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMfUdxwiuWDb8zId
# KuMg/jw0HndEcIsP5Mebw56t3+Rb5g4QGMBoa8a/N8EKbj3BnBQDJiY5Z2DGjf1P
# n27g2shrDaNT1MygjYfLDntYzNKMJk4EjbBOlR5QBXPM0ODJDROg53yHcvVaXSMl
# 498SBhXVSzPmgprBJ8FDL00o1IIAAhYUN3vNCKPBXsPETsKtnezfzBg7lOjzmljC
# mEOoBGT1g2NrYTq3XqNo8UbbDR8KYq5G101Vl0jZEnLGdQFyh8EWpeEeksv7V+YD
# /i/iXMSG8HiHY7vl+x8mtBCf0MYxd8u1IWif0kGgkaJeTCVwh1isMrjiUnpWX2NX
# +3PeTmsCAwEAAaOCAW8wggFrMB8GA1UdIwQYMBaAFNrtZHQUnBQ8q92Zqb1bKE2L
# PMnYMB0GA1UdDgQWBBTK0OAaUIi5wvnE8JonXlTXKWENvTAOBgNVHQ8BAf8EBAMC
# B4AwDAYDVR0TAQH/BAIwADATBgNVHSUEDDAKBggrBgEFBQcDAzARBglghkgBhvhC
# AQEEBAMCBBAwRgYDVR0gBD8wPTA7BgwrBgEEAbIxAQIBAwIwKzApBggrBgEFBQcC
# ARYdaHR0cHM6Ly9zZWN1cmUuY29tb2RvLm5ldC9DUFMwQgYDVR0fBDswOTA3oDWg
# M4YxaHR0cDovL2NybC51c2VydHJ1c3QuY29tL1VUTi1VU0VSRmlyc3QtT2JqZWN0
# LmNybDA0BggrBgEFBQcBAQQoMCYwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmNv
# bW9kb2NhLmNvbTAhBgNVHREEGjAYgRZKb2VsLkJlbm5ldHRAWGVyb3guY29tMA0G
# CSqGSIb3DQEBBQUAA4IBAQAEss8yuj+rZvx2UFAgkz/DueB8gwqUTzFbw2prxqee
# zdCEbnrsGQMNdPMJ6v9g36MRdvAOXqAYnf1RdjNp5L4NlUvEZkcvQUTF90Gh7OA4
# rC4+BjH8BA++qTfg8fgNx0T+MnQuWrMcoLR5ttJaWOGpcppcptdWwMNJ0X6R2WY7
# bBPwa/CdV0CIGRRjtASbGQEadlWoc1wOfR+d3rENDg5FPTAIdeRVIeA6a1ZYDCYb
# 32UxoNGArb70TCpV/mTWeJhZmrPFoJvT+Lx8ttp1bH2/nq6BDAIvu0VGgKGxN4bA
# T3WE6MuMS2fTc1F8PCGO3DAeA9Onks3Ufuy16RhHqeNcMYICTDCCAkgCAQEwgaow
# gZUxCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJVVDEXMBUGA1UEBxMOU2FsdCBMYWtl
# IENpdHkxHjAcBgNVBAoTFVRoZSBVU0VSVFJVU1QgTmV0d29yazEhMB8GA1UECxMY
# aHR0cDovL3d3dy51c2VydHJ1c3QuY29tMR0wGwYDVQQDExRVVE4tVVNFUkZpcnN0
# LU9iamVjdAIQKQm90jYWUDdv7EgFkuELajAJBgUrDgMCGgUAoHgwGAYKKwYBBAGC
# NwIBDDEKMAigAoAAoQKAADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor
# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAjBgkqhkiG9w0BCQQxFgQUoLiD3TXY
# htHM+1GkrG8rScPT4vEwDQYJKoZIhvcNAQEBBQAEggEAMLJBsTm5V6/9jyX1RrTz
# TgDFLvTTriT0ma6/2/nEEih4tjEDLM/4DO3HQR1f2r2DpuNwYeoKVLYCiohPm993
# VOqwzmxXgNBi3KC8hJ9/rq0prVCnlcQ9M5OveuAJITcR8KWxQpR9MRiYsvmjh3gv
# GwEuoPeAywdecbQFUNK1v0ZPl/U8DA0ekAXRHrmD1bvUK+Osa9tnXvYYMZ2QsPmJ
# XnetDsRFjEz968O30Ufrd5IlrGfvuUww5MtQPzSR9jW5RWSJa137ExNn1MifC6if
# kJMBhBBafbJmiSJARB3fIff8NVl0dlvOi2jHZ8zxQcpumzVtYBf4h5mvTnlB8Uef
# NA==
# SIG # End signature block
|
combined_dataset/train/non-malicious/3583.ps1
|
3583.ps1
|
function Test-CreateAndGetService
{
$rg = Create-ResourceGroupForTest
try
{
$service = Create-DataMigrationService($rg)
$all = Get-AzDataMigrationService -ResourceGroupName $rg.ResourceGroupName
Assert-AreEqual 1 $all.Count
$all = Get-AzDataMigrationService -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name
Assert-AreEqual $service.Name $all[0].Name
Assert-AreEqual $rg.Location $all[0].Location
Assert-AreEqual $service.Service.VirtualSubnetId $all[0].Service.VirtualSubnetId
Assert-ThrowsContains { $all = Get-AzDataMigrationService -ResourceGroupName $rg.ResourceGroupName -Name Get-ServiceName;} "NotFound"
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-StopStartDataMigrationService
{
$rg = Create-ResourceGroupForTest
try
{
$service = Create-DataMigrationService($rg)
Stop-AzDataMigrationService -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name
$all = Get-AzDataMigrationService -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name
Assert-AreEqual 1 $all.Count
Assert-AreEqual "Stopped" $all[0].Service.ProvisioningState
Start-AzDataMigrationService -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name
$all = Get-AzDataMigrationService -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name
Assert-AreEqual 1 $all.Count
Assert-AreEqual "Succeeded" $all[0].Service.ProvisioningState
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-CreateAndGetProjectSqlSqlDb
{
$rg = Create-ResourceGroupForTest
try
{
$service = Create-DataMigrationService($rg)
$project = Create-ProjectSqlSqlDb $rg $service
$all = Get-AzDataMigrationProject -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name
Write-Host $all
Assert-AreEqual $all.Count 1
$all = Get-AzDataMigrationProject -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name
Assert-AreEqual $project.Name $all[0].Name
Assert-AreEqual SQL $all[0].Project.SourcePlatform
Assert-AreEqual SQLDB $all[0].Project.TargetPlatform
Assert-ThrowsContains { $all = Get-AzDataMigrationProject -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName Get-ProjectName;} "NotFound"
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-RemoveService
{
$rg = Create-ResourceGroupForTest
try
{
$service = Create-DataMigrationService($rg)
Remove-AzDataMigrationService -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -Force
Assert-ThrowsContains { $all = Get-AzDataMigrationService -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name ;} "NotFound"
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-RemoveProject
{
$rg = Create-ResourceGroupForTest
try
{
$service = Create-DataMigrationService($rg)
$project = Create-ProjectSqlSqlDb $rg $service
Remove-AzDataMigrationProject -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -Force
Assert-ThrowsContains { $all = Get-AzDataMigrationProject -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name ;} "NotFound"
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-ConnectToSourceSqlServer
{
$rg = Create-ResourceGroupForTest
try
{
$service = Create-DataMigrationService($rg)
$project = Create-ProjectSqlSqlDb $rg $service
$taskName = Get-TaskName
$connectionInfo = New-SourceSqlConnectionInfo
$userName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_USERNAME")
$password = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_PASSWORD")
$cred = Get-Creds $userName $password
$task = New-AzDataMigrationTask -TaskType ConnectToSourceSqlServer -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -SourceConnection $connectioninfo -SourceCred $cred
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
Assert-AreEqual $taskName $task[0].Name
Assert-AreEqual 1 $task.Count
while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued"))
{
SleepTask 15
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
}
Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State
Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force
Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound"
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-ConnectToTargetSqlDb
{
$rg = Create-ResourceGroupForTest
try
{
$service = Create-DataMigrationService($rg)
$project = Create-ProjectSqlSqlDb $rg $service
$taskName = Get-TaskName
$connectionInfo = New-TargetSqlConnectionInfo
$userName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDB_USERNAME")
$password = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDB_PASSWORD")
$cred = Get-Creds $userName $password
$task = New-AzDataMigrationTask -TaskType ConnectToTargetSqlDb -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -TargetConnection $connectioninfo -TargetCred $cred
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
Assert-AreEqual $taskName $task[0].Name
Assert-AreEqual 1 $task.Count
while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued"))
{
SleepTask 15
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
}
Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State
Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force
Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound"
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-GetUserTableTask
{
$rg = Create-ResourceGroupForTest
try
{
$service = Create-DataMigrationService($rg)
$project = Create-ProjectSqlSqlDb $rg $service
$taskName = Get-TaskName
$connectionInfo = New-SourceSqlConnectionInfo
$userName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_USERNAME")
$password = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_PASSWORD")
$cred = Get-Creds $userName $password
$selectedDbs = @("JasmineTest")
$task = New-AzDataMigrationTask -TaskType GetUserTablesSql -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -SourceConnection $connectioninfo -SourceCred $cred -SelectedDatabase $selectedDbs
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
Assert-AreEqual $taskName $task[0].Name
Assert-AreEqual 1 $task.Count
while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued"))
{
SleepTask 15
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
}
Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State
Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force
Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound"
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-MigrateSqlSqlDB
{
$rg = Create-ResourceGroupForTest
try
{
$service = Create-DataMigrationService($rg)
$project = Create-ProjectSqlSqlDb $rg $service
$taskName = Get-TaskName
$sourceConnectionInfo = New-SourceSqlConnectionInfo
$sourceUserName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_USERNAME")
$sourcePassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_PASSWORD")
$sourceCred = Get-Creds $sourceUserName $sourcePassword
$targetConnectionInfo = New-TargetSqlConnectionInfo
$targetUserName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDB_USERNAME")
$targetPassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDB_PASSWORD")
$targetCred = Get-Creds $targetUserName $targetPassword
$tableMap = New-Object 'system.collections.generic.dictionary[string,string]'
$tableMap.Add("dbo.TestTable1", "dbo.TestTable1")
$tableMap.Add("dbo.TestTable2","dbo.TestTable2")
$sourceDbName = "MigrateOneTime"
$targetDbName = "JasmineTest"
$selectedDbs = New-AzDataMigrationSelectedDB -MigrateSqlServerSqlDb -Name $sourceDbName -TargetDatabaseName $targetDbName -TableMap $tableMap
Assert-AreEqual $sourceDbName $selectedDbs[0].Name
Assert-AreEqual $targetDbName $selectedDbs[0].TargetDatabaseName
Assert-AreEqual 2 $selectedDbs[0].TableMap.Count
Assert-AreEqual true $selectedDbs[0].TableMap.ContainsKey("dbo.TestTable1")
Assert-AreEqual "dbo.TestTable1" $selectedDbs[0].TableMap["dbo.TestTable1"]
$migTask = New-AzDmsTask -TaskType MigrateSqlServerSqlDb -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -SourceConnection $sourceConnectionInfo -SourceCred $sourceCred -TargetConnection $targetConnectionInfo -TargetCred $targetCred -SelectedDatabase $selectedDbs
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
Assert-AreEqual $taskName $task[0].Name
Assert-AreEqual 1 $task.Count
Assert-AreEqual $sourceDbName $task.ProjectTask.Properties.Input.SelectedDatabases[0].Name
Assert-AreEqual $targetDbName $task.ProjectTask.Properties.Input.SelectedDatabases[0].TargetDatabaseName
while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued"))
{
SleepTask 15
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
}
Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State
Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force
Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound"
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-ConnectToTargetSqlDbMi
{
$rg = Create-ResourceGroupForTest
try
{
$service = Create-DataMigrationService($rg)
$project = Create-ProjectSqlSqlDbMi $rg $service
$taskName = Get-TaskName
$connectionInfo = New-TargetSqlMiConnectionInfo
$userName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDBMI_USERNAME")
$password = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDBMI_PASSWORD")
$cred = Get-Creds $userName $password
$task = New-AzDataMigrationTask -TaskType ConnectToTargetSqlDbMi -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -TargetConnection $connectioninfo -TargetCred $cred
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
Assert-AreEqual $taskName $task[0].Name
Assert-AreEqual 1 $task.Count
while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued"))
{
SleepTask 15
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
}
Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State
Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force
Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound"
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-MigrateSqlSqlDBMi
{
$rg = Create-ResourceGroupForTest
try
{
$service = Create-DataMigrationService($rg)
$project = Create-ProjectSqlSqlDbMi $rg $service
$taskName = Get-TaskName
$sourceConnectionInfo = New-SourceSqlConnectionInfo
$sourceUserName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_USERNAME")
$sourcePassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_PASSWORD")
$sourceCred = Get-Creds $sourceUserName $sourcePassword
$targetConnectionInfo = New-TargetSqlMiConnectionInfo
$targetUserName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDBMI_USERNAME")
$targetPassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDBMI_PASSWORD")
$targetCred = Get-Creds $targetUserName $targetPassword
$blobSasUri = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("BLOB_SAS_URI")
$fileSharePath = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("FILESHARE_PATH")
$fileShareUsername = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("FILESHARE_USERNAME")
$fileSharePassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("FILESHARE_PASSWORD")
$fileShareCred = Get-Creds $fileShareUsername $fileSharePassword
$backupFileShare = New-AzDmsFileShare -Path $fileSharePath -Credential $fileShareCred
$sourceDbName = "TestMI"
$targetDbName = "TestMI6"
$backupMode = "CreateBackup"
$selectedDbs = New-AzDataMigrationSelectedDB -MigrateSqlServerSqlDbMi -Name $sourceDbName -TargetDatabaseName $targetDbName -BackupFileShare $backupFileShare
Assert-AreEqual $sourceDbName $selectedDbs[0].Name
Assert-AreEqual $targetDbName $selectedDbs[0].RestoreDatabaseName
$migTask = New-AzDataMigrationTask -TaskType MigrateSqlServerSqlDbMi `
-ResourceGroupName $rg.ResourceGroupName `
-ServiceName $service.Name `
-ProjectName $project.Name `
-TaskName $taskName `
-TargetConnection $targetConnectionInfo `
-TargetCred $targetCred `
-SourceConnection $sourceConnectionInfo `
-SourceCred $sourceCred `
-BackupBlobSasUri $blobSasUri `
-BackupFileShare $backupFileShare `
-SelectedDatabase $selectedDbs `
-BackupMode $backupMode
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
Assert-AreEqual $taskName $task[0].Name
Assert-AreEqual $sourceDbName $task.ProjectTask.Properties.Input.SelectedDatabases[0].Name
Assert-AreEqual $targetDbName $task.ProjectTask.Properties.Input.SelectedDatabases[0].RestoreDatabaseName
Assert-AreEqual 1 $task.Count
while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued"))
{
SleepTask 15
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
}
Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State
Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force
Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound"
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-ValidateMigrationInputSqlSqlDbMi
{
$rg = Create-ResourceGroupForTest
try
{
$service = Create-DataMigrationService($rg)
$project = Create-ProjectSqlSqlDbMi $rg $service
$taskName = Get-TaskName
$sourceConnectionInfo = New-SourceSqlConnectionInfo
$sourceUserName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_USERNAME")
$sourcePassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_PASSWORD")
$sourceCred = Get-Creds $sourceUserName $sourcePassword
$targetConnectionInfo = New-TargetSqlMiConnectionInfo
$targetUserName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDBMI_USERNAME")
$targetPassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDBMI_PASSWORD")
$targetCred = Get-Creds $targetUserName $targetPassword
$blobSasUri = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("BLOB_SAS_URI")
$fileSharePath = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("FILESHARE_PATH")
$fileShareUsername = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("FILESHARE_USERNAME")
$fileSharePassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("FILESHARE_PASSWORD")
$fileShareCred = Get-Creds $fileShareUsername $fileSharePassword
$backupFileShare = New-AzDmsFileShare -Path $fileSharePath -Credential $fileShareCred
$sourceDbName = "TestMI"
$targetDbName = "TestTarget"
$backupMode = "CreateBackup"
$selectedDbs = New-AzDataMigrationSelectedDB -MigrateSqlServerSqlDbMi -Name $sourceDbName -TargetDatabaseName $targetDbName -BackupFileShare $backupFileShare
$migTask = New-AzDataMigrationTask -TaskType ValidateSqlServerSqlDbMi `
-ResourceGroupName $rg.ResourceGroupName `
-ServiceName $service.Name `
-ProjectName $project.Name `
-TaskName $taskName `
-SourceConnection $sourceConnectionInfo `
-SourceCred $sourceCred `
-TargetConnection $targetConnectionInfo `
-TargetCred $targetCred `
-BackupBlobSasUri $blobSasUri `
-BackupFileShare $backupFileShare `
-SelectedDatabase $selectedDbs `
-BackupMode $backupMode
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
Assert-AreEqual $taskName $task[0].Name
Assert-AreEqual 1 $task.Count
while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued"))
{
SleepTask 15
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
}
Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State
Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force
Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound"
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-ConnectToSourceSqlServerSync
{
$rg = Create-ResourceGroupForTest
try
{
$service = Create-DataMigrationService($rg)
$project = Create-ProjectSqlSqlDb $rg $service
$taskName = Get-TaskName
$connectionInfo = New-SourceSqlConnectionInfo
$userName = "testuser"
$password = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_PASSWORD")
$cred = Get-Creds $userName $password
$task = New-AzDataMigrationTask -TaskType ConnectToSourceSqlServerSync -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -SourceConnection $connectioninfo -SourceCred $cred
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
Assert-AreEqual $taskName $task[0].Name
Assert-AreEqual 1 $task.Count
while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued"))
{
SleepTask 15
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
}
Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State
Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force
Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound"
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-ConnectToTargetSqlDbSync
{
$rg = Create-ResourceGroupForTest
try
{
$service = Create-DataMigrationService($rg)
$project = Create-ProjectSqlSqlDb $rg $service
$taskName = Get-TaskName
$sourceConnectionInfo = New-SourceSqlConnectionInfo
$sourceUserName = "testuser"
$sourcePassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_PASSWORD")
$sourceCred = Get-Creds $sourceUserName $sourcePassword
$targetConnectionInfo = New-TargetSqlConnectionInfo
$targetUserName = "testuser"
$targetPassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDB_PASSWORD")
$targetCred = Get-Creds $targetUserName $targetPassword
$task = New-AzDataMigrationTask -TaskType ConnectToTargetSqlSync -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -SourceConnection $sourceConnectionInfo -SourceCred $sourceCred -TargetConnection $targetConnectionInfo -TargetCred $targetCred
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
Assert-AreEqual $taskName $task[0].Name
Assert-AreEqual 1 $task.Count
while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued"))
{
SleepTask 15
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
}
Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State
Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force
Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound"
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-GetUserTableSyncTask
{
$rg = Create-ResourceGroupForTest
try
{
$service = Create-DataMigrationService($rg)
$project = Create-ProjectSqlSqlDb $rg $service
$taskName = Get-TaskName
$sourceConnectionInfo = New-SourceSqlConnectionInfo
$sourceUserName = "testuser"
$sourcePassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_PASSWORD")
$sourceCred = Get-Creds $sourceUserName $sourcePassword
$targetConnectionInfo = New-TargetSqlConnectionInfo
$targetUserName = "testuser"
$targetPassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDB_PASSWORD")
$targetCred = Get-Creds $targetUserName $targetPassword
$selectedSourceDb = @("MigrateOneTime")
$selectedTargetDb = @("JasmineTest")
$task = New-AzDataMigrationTask -TaskType GetUserTablesSqlSync `
-ResourceGroupName $rg.ResourceGroupName `
-ServiceName $service.Name `
-ProjectName $project.Name `
-TaskName $taskName `
-SourceConnection $sourceConnectionInfo `
-SourceCred $sourceCred `
-TargetConnection $targetConnectionInfo `
-TargetCred $targetCred `
-SelectedSourceDatabases $selectedSourceDb `
-SelectedTargetDatabases $selectedTargetDb
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
Assert-AreEqual $taskName $task[0].Name
Assert-AreEqual 1 $task.Count
while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued"))
{
SleepTask 15
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
}
Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State
Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force
Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound"
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-ValidateMigrationInputSqlSqlDbSync
{
$rg = Create-ResourceGroupForTest
try
{
$service = Create-DataMigrationService($rg)
$project = Create-ProjectSqlSqlDb $rg $service
$taskName = Get-TaskName
$sourceConnectionInfo = New-SourceSqlConnectionInfo
$sourceUserName = "testuser"
$sourcePassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_PASSWORD")
$sourceCred = Get-Creds $sourceUserName $sourcePassword
$targetConnectionInfo = New-TargetSqlConnectionInfo
$targetUserName = "testuser"
$targetPassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDB_PASSWORD")
$targetCred = Get-Creds $targetUserName $targetPassword
$tableMap = New-Object 'system.collections.generic.dictionary[string,string]'
$tableMap.Add("dbo.TestTable1", "dbo.TestTable1")
$tableMap.Add("dbo.TestTable2","dbo.TestTable2")
$sourceDb = "MigrateOneTime"
$targetDb = "JasmineTest"
$selectedDbs = New-AzDmsSyncSelectedDB -TargetDatabaseName $targetDb `
-SchemaName dbo `
-TableMap $tableMap `
-Name $sourceDb
$migTask = New-AzDataMigrationTask -TaskType ValidateSqlServerSqlDbSync `
-ResourceGroupName $rg.ResourceGroupName `
-ServiceName $service.Name `
-ProjectName $project.Name `
-TaskName $taskName `
-SourceConnection $sourceConnectionInfo `
-SourceCred $sourceCred `
-TargetConnection $targetConnectionInfo `
-TargetCred $targetCred `
-SelectedDatabase $selectedDbs
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
Assert-AreEqual $taskName $task[0].Name
Assert-AreEqual 1 $task.Count
while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued"))
{
SleepTask 15
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
}
Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State
Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force
Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound"
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-MigrateSqlSqlDBSync
{
$rg = Create-ResourceGroupForTest
try
{
$service = Create-DataMigrationService($rg)
$project = Create-ProjectSqlSqlDb $rg $service
$taskName = Get-TaskName
$sourceConnectionInfo = New-SourceSqlConnectionInfo
$sourceUserName = "testuser"
$sourcePassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_PASSWORD")
$sourceCred = Get-Creds $sourceUserName $sourcePassword
$targetConnectionInfo = New-TargetSqlConnectionInfo
$targetUserName = "testuser"
$targetPassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDB_PASSWORD")
$targetCred = Get-Creds $targetUserName $targetPassword
$tableMap = New-Object 'system.collections.hashtable'
$tableMap.Add("dbo.TestTable1", "dbo.TestTable1")
$tableMap.Add("dbo.TestTable2","dbo.TestTable2")
$sourceDb = "MigrateOneTime"
$targetDb = "JasmineTest"
$selectedDbs = New-AzDmsSyncSelectedDB -TargetDatabaseName $targetDb `
-SchemaName dbo `
-TableMap $tableMap `
-SourceDatabaseName $sourceDb
$migTask = New-AzDmsTask -TaskType MigrateSqlServerSqlDbSync `
-ResourceGroupName $rg.ResourceGroupName `
-ServiceName $service.Name `
-ProjectName $project.Name `
-TaskName $taskName `
-SourceConnection $sourceConnectionInfo `
-SourceCred $sourceCred `
-TargetConnection $targetConnectionInfo `
-TargetCred $targetCred `
-SelectedDatabase $selectedDbs
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
Assert-AreEqual $taskName $task[0].Name
Assert-AreEqual 1 $task.Count
while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued"))
{
Foreach($output in $task.ProjectTask.Properties.Output) {
if ($output.Id -clike 'db|*')
{
Write-Host ($output | Format-List | Out-String)
if ($output.MigrationState -eq "READY_TO_COMPLETE")
{
$command = Invoke-AzDmsCommand -CommandType CompleteSqlDBSync `
-ResourceGroupName $rg.ResourceGroupName `
-ServiceName $service.Name `
-ProjectName $project.Name `
-TaskName $taskName `
-DatabaseName $output.DatabaseName
}
}
}
SleepTask 15
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
}
Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State
Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force
Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound"
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-ConnectToSourceMongoDb
{
$rg = Create-ResourceGroupForTest
try
{
$service = Create-DataMigrationService($rg)
$project = Create-ProjectMongoDbMongoDb $rg $service
$taskName = Get-TaskName
$connectionInfo = New-SourceMongoDbConnectionInfo
$task = New-AzDataMigrationTask -TaskType ConnectToSourceMongoDb -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -SourceConnection $connectioninfo -Wait
Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State
Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force
Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound"
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-ConnectToTargetCosmosDb
{
$rg = Create-ResourceGroupForTest
try
{
$service = Create-DataMigrationService($rg)
$project = Create-ProjectMongoDbMongoDb $rg $service
$taskName = Get-TaskName
$connectionInfo = New-TargetMongoDbConnectionInfo
$task = New-AzDataMigrationTask -TaskType ConnectToSourceMongoDb -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -SourceConnection $connectioninfo -Wait
Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State
Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force
Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound"
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-MigrateMongoDb
{
$rg = Create-ResourceGroupForTest
try
{
$service = Create-DataMigrationService($rg)
$project = Create-ProjectMongoDbMongoDb $rg $service
$taskName = Get-TaskName
$sourceConnectionInfo = New-SourceMongoDbConnectionInfo
$targetConnectionInfo = New-TargetMongoDbConnectionInfo
$testColSettingA = New-AzDataMigrationMongoDbCollectionSetting -Name large -RU 1000 -CanDelete -ShardKey "_id"
$testColSettingB = New-AzDataMigrationMongoDbCollectionSetting -Name many -RU 1000 -CanDelete -ShardKey "_id"
$testDbSetting = New-AzDataMigrationMongoDbDatabaseSetting -Name test -CollectionSetting @($testColSettingA, $testColSettingB)
$validationTask = New-AzDmsTask -TaskType ValidateMongoDbMigration -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -SourceConnection $sourceConnectionInfo -TargetConnection $targetConnectionInfo -SelectedDatabase @($testDbSetting) -Wait
$taskName = Get-TaskName
$migTask = New-AzDmsTask -TaskType MigrateMongoDb -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -SourceConnection $sourceConnectionInfo -TargetConnection $targetConnectionInfo -SelectedDatabase @($testDbSetting) -MigrationValidation $validationTask -Replication Disabled
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
Assert-AreEqual $taskName $task[0].Name
Assert-AreEqual 1 $task.Count
while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued"))
{
SleepTask 15
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
if($task.ProjectTask.Properties.State -eq "Running") {
$res = Invoke-AzDataMigrationCommand -CommandType CancelMongoDB -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -ObjectName "test.many"
Assert-AreEqual "Accepted" $res.State
}
}
Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-ConnectToTargetSqlDbMiSync
{
$rg = Create-ResourceGroupForTest
try
{
$service = Create-DataMigrationService($rg)
$project = Create-ProjectSqlSqlDbMi $rg $service
$taskName = Get-TaskName
$connectionInfo = New-TargetSqlMiSyncConnectionInfo
$userName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDBMI_USERNAME")
$password = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDBMI_PASSWORD")
$cred = Get-Creds $userName $password
$app = New-AzureActiveDirectoryApp
$task = New-AzDataMigrationTask -TaskType ConnectToTargetSqlDbMiSync -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -TargetConnection $connectioninfo -TargetCred $cred -AzureActiveDirectoryApp $app
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
Assert-AreEqual $taskName $task[0].Name
Assert-AreEqual 1 $task.Count
while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued"))
{
SleepTask 15
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
}
Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State
Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force
Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound"
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-ValidateMigrationInputSqlSqlDbMiSync
{
$rg = Create-ResourceGroupForTest
try
{
$service = Create-DataMigrationService($rg)
$project = Create-ProjectSqlSqlDbMi $rg $service
$taskName = Get-TaskName
$sourceConnectionInfo = New-SourceSqlConnectionInfo
$sourceUserName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_USERNAME")
$sourcePassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_PASSWORD")
$sourceCred = Get-Creds $sourceUserName $sourcePassword
$targetConnectionInfo = New-TargetSqlMiSyncConnectionInfo
$targetUserName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDBMI_USERNAME")
$targetPassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDBMI_PASSWORD")
$targetCred = Get-Creds $targetUserName $targetPassword
$app = New-AzureActiveDirectoryApp
$fileSharePath = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("FILESHARE_PATH")
$fileShareUsername = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("FILESHARE_USERNAME")
$fileSharePassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("FILESHARE_PASSWORD")
$fileShareCred = Get-Creds $fileShareUsername $fileSharePassword
$backupFileShare = New-AzDmsFileShare -Path $fileSharePath -Credential $fileShareCred
$storageResourceId = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("STORAGE_RESOURCE_ID")
$sourceDbName = "AdventureWorks"
$targetDbName = getDmsAssetName AdventureWorks
$selectedDbs = New-AzDataMigrationSelectedDB -MigrateSqlServerSqlDbMi -Name $sourceDbName -TargetDatabaseName $targetDbName -BackupFileShare $backupFileShare
$migTask = New-AzDataMigrationTask -TaskType ValidateSqlServerSqlDbMiSync `
-ResourceGroupName $rg.ResourceGroupName `
-ServiceName $service.Name `
-ProjectName $project.Name `
-TaskName $taskName `
-SourceConnection $sourceConnectionInfo `
-SourceCred $sourceCred `
-TargetConnection $targetConnectionInfo `
-TargetCred $targetCred `
-BackupFileShare $backupFileShare `
-SelectedDatabase $selectedDbs `
-AzureActiveDirectoryApp $app `
-StorageResourceId $storageResourceId
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
Assert-AreEqual $taskName $task[0].Name
Assert-AreEqual 1 $task.Count
while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued"))
{
SleepTask 15
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
}
Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State
Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force
Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound"
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
function Test-MigrateSqlSqlDbMiSync
{
$rg = Create-ResourceGroupForTest
try
{
$service = Create-DataMigrationService($rg)
$project = Create-ProjectSqlSqlDbMi $rg $service
$taskName = Get-TaskName
$sourceConnectionInfo = New-SourceSqlConnectionInfo
$sourceUserName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_USERNAME")
$sourcePassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQL_PASSWORD")
$sourceCred = Get-Creds $sourceUserName $sourcePassword
$targetConnectionInfo = New-TargetSqlMiSyncConnectionInfo
$targetUserName = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDBMI_USERNAME")
$targetPassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("SQLDBMI_PASSWORD")
$targetCred = Get-Creds $targetUserName $targetPassword
$app = New-AzureActiveDirectoryApp
$fileSharePath = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("FILESHARE_PATH")
$fileShareUsername = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("FILESHARE_USERNAME")
$fileSharePassword = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("FILESHARE_PASSWORD")
$fileShareCred = Get-Creds $fileShareUsername $fileSharePassword
$backupFileShare = New-AzDmsFileShare -Path $fileSharePath -Credential $fileShareCred
$storageResourceId = [Microsoft.Azure.Commands.DataMigrationConfig]::GetConfigString("STORAGE_RESOURCE_ID")
$sourceDbName = "AdventureWorks"
$dbId = "db|"+$sourceDbName
$targetDbName = getDmsAssetName AdventureWorks
$selectedDbs = New-AzDataMigrationSelectedDB -MigrateSqlServerSqlDbMi -Name $sourceDbName -TargetDatabaseName $targetDbName -BackupFileShare $backupFileShare
$migTask = New-AzDataMigrationTask -TaskType MigrateSqlServerSqlDbMiSync `
-ResourceGroupName $rg.ResourceGroupName `
-ServiceName $service.Name `
-ProjectName $project.Name `
-TaskName $taskName `
-SourceConnection $sourceConnectionInfo `
-SourceCred $sourceCred `
-TargetConnection $targetConnectionInfo `
-TargetCred $targetCred `
-BackupFileShare $backupFileShare `
-SelectedDatabase $selectedDbs `
-AzureActiveDirectoryApp $app `
-StorageResourceId $storageResourceId
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
Assert-AreEqual $taskName $task[0].Name
Assert-AreEqual 1 $task.Count
while(($task.ProjectTask.Properties.State -eq "Running") -or ($task.ProjectTask.Properties.State -eq "Queued"))
{
Foreach($output in $task.ProjectTask.Properties.Output)
{
if ($output.Id -eq $dbId)
{
if ($output.MigrationState -eq "LOG_FILES_UPLOADING")
{
if ($output.FullBackupSetInfo.BackupType -eq "Database")
{
if($output.FullBackupSetInfo.IsBackupRestored)
{
$command = Invoke-AzDmsCommand -CommandType CompleteSqlMiSync `
-ResourceGroupName $rg.ResourceGroupName `
-ServiceName $service.Name `
-ProjectName $project.Name `
-TaskName $taskName `
-DatabaseName $output.SourceDatabaseName
}
}
}
}
}
SleepTask 15
$task = Get-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand
}
Assert-AreEqual "Succeeded" $task.ProjectTask.Properties.State
Remove-AzDataMigrationTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Force
Assert-ThrowsContains { $all = Get-AzDmsTask -ResourceGroupName $rg.ResourceGroupName -ServiceName $service.Name -ProjectName $project.Name -TaskName $taskName -Expand ;} "NotFound"
}
finally
{
Remove-ResourceGroupForTest $rg
}
}
|
combined_dataset/train/non-malicious/Get-RemoteRegistry_3.ps1
|
Get-RemoteRegistry_3.ps1
|
#.SYNOPSIS
# Query the registry on a remote machine
#.NOTE
# You have to have access, and the remote registry service has to be running
#
# Version History:
# 3.0
# + updated to PowerShell 2
# + support pipeline parameter for path
# 2.1
# + Fixed a pasting bug
# + I added the "Properties" parameter so you can select specific redgistry values
# ######################################################################################
#.EXAMPLE
# (Get-RemoteRegistry ${Env:ComputerName} HKLM:\\Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\).Subkeys |
# Get-RemoteRegistry ${Env:ComputerName} `
# -Path { "HKLM:\\Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\$_" } `
# -Properties DisplayName, DisplayVersion, Publisher, InstallDate, HelpLink, UninstallString
#.EXAMPLE
# Get-RemoteRegistry $RemotePC "HKLM\\SOFTWARE\\Microsoft\\NET Framework Setup\\NDP"
# * Returns a list of subkeys (because this key has no properties)
#.EXAMPLE
# Get-RemoteRegistry $RemotePC "HKLM\\SOFTWARE\\Microsoft\\NET Framework Setup\\NDP\\v2.0.50727"
# * Returns a list of subkeys and all the other "properties" of the key
#.EXAMPLE
# Get-RemoteRegistry $RemotePC "HKLM\\SOFTWARE\\Microsoft\\NET Framework Setup\\NDP\\v2.0.50727\\Version"
# * Returns JUST the full version of the .Net SP2 as a STRING (to preserve prior behavior)
#.EXAMPLE
# Get-RemoteRegistry $RemotePC "HKLM\\SOFTWARE\\Microsoft\\NET Framework Setup\\NDP\\v2.0.50727" Version
# * Returns a custom object with the property "Version" = "2.0.50727.3053" (your version)
#.EXAMPLE
# Get-RemoteRegistry $RemotePC "HKLM\\SOFTWARE\\Microsoft\\NET Framework Setup\\NDP\\v2.0.50727" Version,SP
# * Returns a custom object with "Version" and "SP" (Service Pack) properties
#
# For fun, get all .Net Framework versions (2.0 and greater)
# and return version + service pack with this one command line:
#
# Get-RemoteRegistry $RemotePC "HKLM:\\SOFTWARE\\Microsoft\\NET Framework Setup\\NDP" |
# Select -Expand Subkeys | ForEach-Object {
# Get-RemoteRegistry $RemotePC "HKLM:\\SOFTWARE\\Microsoft\\NET Framework Setup\\NDP\\$_" Version,SP
# }
param(
[Parameter(Position=0, Mandatory=$true)]
[string]$computer = $(Read-Host "Remote Computer Name")
,
[Parameter(Position=1, ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$true, Mandatory=$true)]
[string]$Path = $(Read-Host "Remote Registry Path (must start with HKLM,HKCU,etc)")
,
[Parameter(Position=2)]
[string[]]$Properties
)
process {
$root, $last = $Path.Split("\\")
$last = $last[-1]
$Path = $Path.Substring($root.Length + 1,$Path.Length - ( $last.Length + $root.Length + 2))
$root = $root.TrimEnd(":")
#split the path to get a list of subkeys that we will need to access
# ClassesRoot, CurrentUser, LocalMachine, Users, PerformanceData, CurrentConfig, DynData
switch($root) {
"HKCR" { $root = "ClassesRoot"}
"HKCU" { $root = "CurrentUser" }
"HKLM" { $root = "LocalMachine" }
"HKU" { $root = "Users" }
"HKPD" { $root = "PerformanceData"}
"HKCC" { $root = "CurrentConfig"}
"HKDD" { $root = "DynData"}
default { return "Path argument is not valid" }
}
#Access Remote Registry Key using the static OpenRemoteBaseKey method.
Write-Verbose "Accessing $root from $computer"
$rootkey = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey($root,$computer)
if(-not $rootkey) { Write-Error "Can't open the remote $root registry hive" }
Write-Verbose "Opening $Path"
$key = $rootkey.OpenSubKey( $Path )
if(-not $key) { Write-Error "Can't open $($root + '\\' + $Path) on $computer" }
$subkey = $key.OpenSubKey( $last )
$output = new-object object
if($subkey -and $Properties -and $Properties.Count) {
foreach($property in $Properties) {
Add-Member -InputObject $output -Type NoteProperty -Name $property -Value $subkey.GetValue($property)
}
Write-Output $output
} elseif($subkey) {
Add-Member -InputObject $output -Type NoteProperty -Name "Subkeys" -Value @($subkey.GetSubKeyNames())
foreach($property in $subkey.GetValueNames()) {
Add-Member -InputObject $output -Type NoteProperty -Name $property -Value $subkey.GetValue($property)
}
Write-Output $output
}
else
{
$key.GetValue($last)
}
}
|
combined_dataset/train/non-malicious/sample_50_28.ps1
|
sample_50_28.ps1
|
#
# Module manifest for module 'OCI.PSModules.Waas'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Waas.dll'
# Version number of this module.
ModuleVersion = '77.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'e0ab649a-b33b-4925-a05c-7520554bdad9'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Waas Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Waas.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIWaasAccessRulesList', 'Get-OCIWaasAddressList',
'Get-OCIWaasAddressListsList', 'Get-OCIWaasCachingRulesList',
'Get-OCIWaasCaptchasList', 'Get-OCIWaasCertificate',
'Get-OCIWaasCertificatesList', 'Get-OCIWaasCustomProtectionRule',
'Get-OCIWaasCustomProtectionRulesList',
'Get-OCIWaasDeviceFingerprintChallenge',
'Get-OCIWaasEdgeSubnetsList', 'Get-OCIWaasGoodBotsList',
'Get-OCIWaasHttpRedirect', 'Get-OCIWaasHttpRedirectsList',
'Get-OCIWaasHumanInteractionChallenge', 'Get-OCIWaasJsChallenge',
'Get-OCIWaasPoliciesList', 'Get-OCIWaasPolicy',
'Get-OCIWaasPolicyConfig',
'Get-OCIWaasPolicyCustomProtectionRulesList',
'Get-OCIWaasProtectionRule', 'Get-OCIWaasProtectionRulesList',
'Get-OCIWaasProtectionSettings', 'Get-OCIWaasRecommendationsList',
'Get-OCIWaasThreatFeedsList', 'Get-OCIWaasWafAddressRateLimiting',
'Get-OCIWaasWafBlockedRequestsList', 'Get-OCIWaasWafConfig',
'Get-OCIWaasWafLogsList', 'Get-OCIWaasWafRequestsList',
'Get-OCIWaasWafTrafficList', 'Get-OCIWaasWhitelistsList',
'Get-OCIWaasWorkRequest', 'Get-OCIWaasWorkRequestsList',
'Invoke-OCIWaasPurgeCache', 'Move-OCIWaasAddressListCompartment',
'Move-OCIWaasCertificateCompartment',
'Move-OCIWaasCustomProtectionRuleCompartment',
'Move-OCIWaasHttpRedirectCompartment',
'Move-OCIWaasPolicyCompartment', 'New-OCIWaasAddressList',
'New-OCIWaasCertificate', 'New-OCIWaasCustomProtectionRule',
'New-OCIWaasHttpRedirect', 'New-OCIWaasPolicy',
'Receive-OCIWaasRecommendations', 'Remove-OCIWaasAddressList',
'Remove-OCIWaasCertificate', 'Remove-OCIWaasCustomProtectionRule',
'Remove-OCIWaasHttpRedirect', 'Remove-OCIWaasPolicy',
'Stop-OCIWaasWorkRequest', 'Update-OCIWaasAccessRules',
'Update-OCIWaasAddressList', 'Update-OCIWaasCachingRules',
'Update-OCIWaasCaptchas', 'Update-OCIWaasCertificate',
'Update-OCIWaasCustomProtectionRule',
'Update-OCIWaasDeviceFingerprintChallenge',
'Update-OCIWaasGoodBots', 'Update-OCIWaasHttpRedirect',
'Update-OCIWaasHumanInteractionChallenge',
'Update-OCIWaasJsChallenge', 'Update-OCIWaasPolicy',
'Update-OCIWaasPolicyConfig',
'Update-OCIWaasPolicyCustomProtectionRules',
'Update-OCIWaasProtectionRules', 'Update-OCIWaasProtectionSettings',
'Update-OCIWaasThreatFeeds', 'Update-OCIWaasWafAddressRateLimiting',
'Update-OCIWaasWafConfig', 'Update-OCIWaasWhitelists'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Waas'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_26_63.ps1
|
sample_26_63.ps1
|
#
# Module manifest for module 'OCI.PSModules'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
# RootModule = ''
# Version number of this module.
ModuleVersion = '79.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core', 'Desktop'
# ID used to uniquely identify this module
GUID = '5ee167f1-0abc-4d85-b9b3-6d354fcaaa35'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'Oracle Cloud Infrastructure (OCI) PowerShell Modules - Cmdlets to manage resources in OCI.
For more information, please visit: https://docs.oracle.com/en-us/iaas/Content/API/SDKDocs/powershell.htm'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Accessgovernancecp'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Adm'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Aianomalydetection'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Aidocument'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Ailanguage'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Aispeech'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Aivision'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Analytics'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Announcementsservice'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Apigateway'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Apmconfig'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Apmcontrolplane'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Apmsynthetics'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Apmtraces'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Applicationmigration'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Appmgmtcontrol'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Artifacts'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Audit'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Autoscaling'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Bastion'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Bds'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Blockchain'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Budget'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Capacitymanagement'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Certificates'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Certificatesmanagement'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Cims'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Cloudbridge'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Cloudguard'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Cloudmigrations'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Computecloudatcustomer'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Computeinstanceagent'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Containerengine'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Containerinstances'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Core'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Dashboardservice'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Database'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Databasemanagement'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Databasemigration'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Databasetools'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Datacatalog'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Dataflow'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Dataintegration'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Datalabelingservice'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Datalabelingservicedataplane'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Datasafe'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Datascience'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Desktops'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Devops'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Disasterrecovery'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Dns'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Dts'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Email'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Emwarehouse'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Events'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Filestorage'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Fleetsoftwareupdate'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Functions'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Fusionapps'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Generativeai'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Generativeaiinference'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Genericartifactscontent'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Globallydistributeddatabase'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Goldengate'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Governancerulescontrolplane'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Healthchecks'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Identity'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Identitydataplane'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Identitydomains'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Integration'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Jms'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Jmsjavadownloads'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Keymanagement'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Licensemanager'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Limits'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Loadbalancer'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Lockbox'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Loganalytics'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Logging'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Loggingingestion'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Loggingsearch'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Managementagent'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Managementdashboard'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Marketplace'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Marketplacepublisher'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Mediaservices'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Monitoring'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Mysql'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Networkfirewall'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Networkloadbalancer'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Nosql'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Objectstorage'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Oce'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Ocicontrolcenter'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Ocvp'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Oda'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Onesubscription'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Ons'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Opa'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Opensearch'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Operatoraccesscontrol'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Opsi'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Optimizer'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Osmanagement'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Osmanagementhub'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Ospgateway'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Osubbillingschedule'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Osuborganizationsubscription'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Osubsubscription'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Osubusage'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Psql'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Queue'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Recovery'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Redis'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Resourcemanager'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Resourcesearch'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Rover'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Sch'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Secrets'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Servicecatalog'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Servicemanagerproxy'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Servicemesh'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Stackmonitoring'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Streaming'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Tenantmanagercontrolplane'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Threatintelligence'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Usage'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Usageapi'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Vault'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Vbsinst'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Visualbuilder'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Vnmonitoring'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Vulnerabilityscanning'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Waa'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Waas'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Waf'; RequiredVersion = '79.0.0'; },
@{ModuleName = 'OCI.PSModules.Workrequests'; RequiredVersion = '79.0.0'; })
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = @()
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = '*'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = @()
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/1324.ps1
|
1324.ps1
|
function Disable-CFirewallStatefulFtp
{
[CmdletBinding(SupportsShouldProcess=$true)]
param(
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
if( -not (Assert-CFirewallConfigurable) )
{
return
}
Invoke-ConsoleCommand -Target 'firewall' `
-Action 'disabling stateful FTP' `
-ScriptBlock {
netsh advfirewall set global StatefulFtp disable
}
}
|
combined_dataset/train/non-malicious/2141.ps1
|
2141.ps1
|
set-strictmode -v 2
Describe 'for statement parsing' -Tags "CI" {
ShouldBeParseError 'for' MissingOpenParenthesisAfterKeyword 4 -CheckColumnNumber
ShouldBeParseError 'for(' MissingEndParenthesisAfterStatement 5 -CheckColumnNumber
ShouldBeParseError 'for(;' MissingEndParenthesisAfterStatement 6 -CheckColumnNumber
ShouldBeParseError 'for(;;' MissingEndParenthesisAfterStatement 7 -CheckColumnNumber
ShouldBeParseError 'for($a' MissingEndParenthesisAfterStatement 7 -CheckColumnNumber
ShouldBeParseError 'for($a;' MissingEndParenthesisAfterStatement 8 -CheckColumnNumber
ShouldBeParseError 'for($a;$b' MissingEndParenthesisAfterStatement 10 -CheckColumnNumber
ShouldBeParseError 'for($a;$b;' MissingEndParenthesisAfterStatement 11 -CheckColumnNumber
ShouldBeParseError 'for($a;$b;$c' MissingEndParenthesisAfterStatement 13 -CheckColumnNumber
ShouldBeParseError 'for($a;$b;$c)' MissingLoopStatement 14 -CheckColumnNumber
ShouldBeParseError ':lab for' MissingOpenParenthesisAfterKeyword 9 -CheckColumnNumber
ShouldBeParseError ':lab for(' MissingEndParenthesisAfterStatement 9
ShouldBeParseError ':lab for(;' MissingEndParenthesisAfterStatement 11 -CheckColumnNumber
ShouldBeParseError ':lab for(;;' MissingEndParenthesisAfterStatement 12 -CheckColumnNumber
ShouldBeParseError ':lab for($a' MissingEndParenthesisAfterStatement 12 -CheckColumnNumber
ShouldBeParseError ':lab for($a;' MissingEndParenthesisAfterStatement 12
ShouldBeParseError ':lab for($a;$b' MissingEndParenthesisAfterStatement 14
ShouldBeParseError ':lab for($a;$b;' MissingEndParenthesisAfterStatement 15
ShouldBeParseError ':lab for($a;$b;$c' MissingEndParenthesisAfterStatement 17
ShouldBeParseError ':lab for($a;$b;$c)' MissingLoopStatement 18
Test-ErrorStmt 'for z' 'for'
Test-ErrorStmt 'for {}' 'for'
Test-ErrorStmt 'for ()' 'for ()'
Test-ErrorStmt 'for(' 'for('
Test-ErrorStmt 'for(;' 'for(;'
Test-ErrorStmt 'for(;;' 'for(;;'
Test-ErrorStmt 'for($a' 'for($a' '$a' '$a' '$a'
Test-ErrorStmt 'for($a;$b' 'for($a;$b' '$a' '$a' '$a' '$b' '$b' '$b'
Test-ErrorStmt 'for($a;$b;$c' 'for($a;$b;$c' '$a' '$a' '$a' '$b' '$b' '$b' '$c' '$c' '$c'
Test-ErrorStmt 'for($a;$b;$c)' 'for($a;$b;$c)' '$a' '$a' '$a' '$b' '$b' '$b' '$c' '$c' '$c'
Test-ErrorStmt 'for()zzzz' 'for()'
Test-ErrorStmt ':lab for z' ':lab for'
Test-ErrorStmt ':lab for {}' ':lab for'
Test-ErrorStmt ':lab for ()' ':lab for ()'
Test-ErrorStmt ':lab for(' ':lab for('
Test-ErrorStmt ':lab for(;' ':lab for(;'
Test-ErrorStmt ':lab for(;;' ':lab for(;;'
Test-ErrorStmt ':lab for($a' ':lab for($a' '$a' '$a' '$a'
Test-ErrorStmt ':lab for($a;$b' ':lab for($a;$b' '$a' '$a' '$a' '$b' '$b' '$b'
Test-ErrorStmt ':lab for($a;$b;$c' ':lab for($a;$b;$c' '$a' '$a' '$a' '$b' '$b' '$b' '$c' '$c' '$c'
Test-ErrorStmt ':lab for($a;$b;$c)' ':lab for($a;$b;$c)' '$a' '$a' '$a' '$b' '$b' '$b' '$c' '$c' '$c'
Test-ErrorStmt ':lab for()zzzz' ':lab for()'
}
Describe 'foreach statement parsing' -Tags "CI" {
ShouldBeParseError 'foreach' MissingOpenParenthesisAfterKeyword 7
ShouldBeParseError 'foreach (' MissingVariableNameAfterForeach 9
ShouldBeParseError 'foreach ($a' MissingInInForeach 11
ShouldBeParseError 'foreach ($a into' MissingInInForeach 11
ShouldBeParseError 'foreach ($a in' MissingForeachExpression 14
ShouldBeParseError 'foreach ($a in $x' MissingEndParenthesisAfterForeach 17
ShouldBeParseError 'foreach ($a in $x)' MissingForeachStatement 18
ShouldBeParseError ':lab foreach' MissingOpenParenthesisAfterKeyword 12
ShouldBeParseError ':lab foreach (' MissingVariableNameAfterForeach 14
ShouldBeParseError ':lab foreach ($a' MissingInInForeach 16
ShouldBeParseError ':lab foreach ($a into' MissingInInForeach 17 -CheckColumnNumber
ShouldBeParseError ':lab foreach ($a in' MissingForeachExpression 20 -CheckColumnNumber
ShouldBeParseError ':lab foreach ($a in $x' MissingEndParenthesisAfterForeach 23 -CheckColumnNumber
ShouldBeParseError ':lab foreach ($a in $x)' MissingForeachStatement 24 -CheckColumnNumber
Test-ErrorStmt 'foreach' 'foreach'
Test-ErrorStmt 'foreach z' 'foreach'
Test-ErrorStmt 'foreach (' 'foreach ('
Test-ErrorStmt 'foreach ($a' 'foreach ($a' '$a'
Test-ErrorStmt 'foreach ($a zz' 'foreach ($a' '$a'
Test-ErrorStmt 'foreach ($a
Test-ErrorStmt 'foreach ($a $zz' 'foreach ($a' '$a'
Test-ErrorStmt 'foreach ($a in' 'foreach ($a in' '$a'
Test-ErrorStmt 'foreach ($a in $b' 'foreach ($a in $b' '$a' '$b' '$b' '$b'
Test-ErrorStmt 'foreach ($a in $b )' 'foreach ($a in $b )' '$a' '$b' '$b' '$b'
Test-ErrorStmt ':lab foreach' ':lab foreach'
Test-ErrorStmt ':lab foreach z' ':lab foreach'
Test-ErrorStmt ':lab foreach (' ':lab foreach ('
Test-ErrorStmt ':lab foreach ($a' ':lab foreach ($a' '$a'
Test-ErrorStmt ':lab foreach ($a zz' ':lab foreach ($a' '$a'
Test-ErrorStmt ':lab foreach ($a
Test-ErrorStmt ':lab foreach ($a $zz' ':lab foreach ($a' '$a'
Test-ErrorStmt ':lab foreach ($a in' ':lab foreach ($a in' '$a'
Test-ErrorStmt ':lab foreach ($a in $b' ':lab foreach ($a in $b' '$a' '$b' '$b' '$b'
Test-ErrorStmt ':lab foreach ($a in $b )' ':lab foreach ($a in $b )' '$a' '$b' '$b' '$b'
}
Describe 'do/while statement statement parsing' -Tags "CI" {
ShouldBeParseError 'do' MissingLoopStatement 2
ShouldBeParseError 'do {}' MissingWhileOrUntilInDoWhile 5
ShouldBeParseError 'do {} while' MissingOpenParenthesisAfterKeyword 11
ShouldBeParseError 'do {} while (' MissingExpressionAfterKeyword 13
ShouldBeParseError 'do {} while (1' MissingEndParenthesisAfterStatement 14
ShouldBeParseError ':lab do' MissingLoopStatement 8 -CheckColumnNumber
ShouldBeParseError ':lab do {}' MissingWhileOrUntilInDoWhile 11 -CheckColumnNumber
ShouldBeParseError ':lab do {} while' MissingOpenParenthesisAfterKeyword 17 -CheckColumnNumber
ShouldBeParseError ':lab do {} while (' MissingExpressionAfterKeyword 19 -CheckColumnNumber
ShouldBeParseError ':lab do {} while (1' MissingEndParenthesisAfterStatement 20 -CheckColumnNumber
Test-ErrorStmt 'do' 'do'
Test-ErrorStmt 'do {1}' 'do {1}' '{1}' '1' '1' '1'
Test-ErrorStmt 'do {1} while' 'do {1} while' '{1}' '1' '1' '1'
Test-ErrorStmt 'do {1} while(' 'do {1} while(' '{1}' '1' '1' '1'
Test-ErrorStmt 'do {1} while($false' 'do {1} while($false' '{1}' '1' '1' '1' '$false' '$false' '$false'
Test-ErrorStmt ':lab do' ':lab do'
Test-ErrorStmt ':lab do {1}' ':lab do {1}' '{1}' '1' '1' '1'
Test-ErrorStmt ':lab do {1} while' ':lab do {1} while' '{1}' '1' '1' '1'
Test-ErrorStmt ':lab do {1} while(' ':lab do {1} while(' '{1}' '1' '1' '1'
Test-ErrorStmt ':lab do {1} while($false' ':lab do {1} while($false' '{1}' '1' '1' '1' '$false' '$false' '$false'
}
Describe 'do/while statement statement parsing' -Tags "CI" {
ShouldBeParseError 'do' MissingLoopStatement 3 -CheckColumnNumber
ShouldBeParseError 'do {}' MissingWhileOrUntilInDoWhile 6 -CheckColumnNumber
ShouldBeParseError 'do {} until' MissingOpenParenthesisAfterKeyword 12 -CheckColumnNumber
ShouldBeParseError 'do {} until (' MissingExpressionAfterKeyword 14 -CheckColumnNumber
ShouldBeParseError 'do {} until (1' MissingEndParenthesisAfterStatement 15 -CheckColumnNumber
ShouldBeParseError ':lab do' MissingLoopStatement 8 -CheckColumnNumber
ShouldBeParseError ':lab do {}' MissingWhileOrUntilInDoWhile 10
ShouldBeParseError ':lab do {} until' MissingOpenParenthesisAfterKeyword 16
ShouldBeParseError ':lab do {} until (' MissingExpressionAfterKeyword 18
ShouldBeParseError ':lab do {} until (1' MissingEndParenthesisAfterStatement 19
Test-ErrorStmt 'do' 'do'
Test-ErrorStmt 'do {1}' 'do {1}' '{1}' '1' '1' '1'
Test-ErrorStmt 'do {1} until' 'do {1} until' '{1}' '1' '1' '1'
Test-ErrorStmt 'do {1} until(' 'do {1} until(' '{1}' '1' '1' '1'
Test-ErrorStmt 'do {1} until($false' 'do {1} until($false' '{1}' '1' '1' '1' '$false' '$false' '$false'
Test-ErrorStmt ':lab do' ':lab do'
Test-ErrorStmt ':lab do {1}' ':lab do {1}' '{1}' '1' '1' '1'
Test-ErrorStmt ':lab do {1} until' ':lab do {1} until' '{1}' '1' '1' '1'
Test-ErrorStmt ':lab do {1} until(' ':lab do {1} until(' '{1}' '1' '1' '1'
Test-ErrorStmt ':lab do {1} until($false' ':lab do {1} until($false' '{1}' '1' '1' '1' '$false' '$false' '$false'
}
Describe 'trap statement parsing' -Tags "CI" {
ShouldBeParseError 'trap' MissingTrapStatement 4
ShouldBeParseError 'trap [int]' MissingTrapStatement 11 -CheckColumnNumber
Test-ErrorStmt 'trap' 'trap'
Test-ErrorStmt 'trap [int]' 'trap [int]' '[int]'
}
Describe 'named blocks parsing' -Tags "CI" {
ShouldBeParseError 'begin' MissingNamedStatementBlock 5
ShouldBeParseError 'process' MissingNamedStatementBlock 7
ShouldBeParseError 'end' MissingNamedStatementBlock 3
ShouldBeParseError 'dynamicparam' MissingNamedStatementBlock 12
ShouldBeParseError 'begin process {}' MissingNamedStatementBlock 6 -CheckColumnNumber
ShouldBeParseError 'end process {}' MissingNamedStatementBlock 4 -CheckColumnNumber
ShouldBeParseError 'dynamicparam process {}' MissingNamedStatementBlock 13 -CheckColumnNumber
ShouldBeParseError 'process begin {}' MissingNamedStatementBlock 8 -CheckColumnNumber
ShouldBeParseError 'begin process end' MissingNamedStatementBlock,MissingNamedStatementBlock,MissingNamedStatementBlock 6,14,18 -CheckColumnNumber
Test-Ast 'begin' 'begin' 'begin'
Test-Ast 'begin end' 'begin end' 'begin' 'end'
Test-Ast 'begin end process' 'begin end process' 'begin' 'end' 'process'
Test-Ast 'begin {} end' 'begin {} end' 'begin {}' 'end'
}
Describe 'data statement parsing' -Tags "CI" {
ShouldBeParseError 'data' MissingStatementBlockForDataSection 5 -CheckColumnNumber
ShouldBeParseError 'data foo' MissingStatementBlockForDataSection 9 -CheckColumnNumber
ShouldBeParseError 'data -abc' InvalidParameterForDataSectionStatement 6 -CheckColumnNumber
ShouldBeParseError 'data -abc foo {}' InvalidParameterForDataSectionStatement 6 -CheckColumnNumber
ShouldBeParseError 'data -abc & {}' InvalidParameterForDataSectionStatement 5
ShouldBeParseError 'data -s & {}' MissingValueForSupportedCommandInDataSectionStatement 7
ShouldBeParseError 'data -s ) {}' MissingValueForSupportedCommandInDataSectionStatement,UnexpectedToken 8,9 -CheckColumnNumber
ShouldBeParseError 'data -s } {}' MissingValueForSupportedCommandInDataSectionStatement,UnexpectedToken 7,8
ShouldBeParseError 'data -s ; {}' MissingValueForSupportedCommandInDataSectionStatement 7
ShouldBeParseError 'data -sup a,' MissingValueForSupportedCommandInDataSectionStatement 13 -CheckColumnNumber
ShouldBeParseError 'data -sup a,b' MissingStatementBlockForDataSection 14 -CheckColumnNumber
Test-ErrorStmt 'data' 'data'
Test-ErrorStmt 'data -s & {}' 'data -s'
Test-ErrorStmt 'data -s ) {}' 'data -s'
Test-ErrorStmt 'data -s abc' 'data -s abc' 'abc'
Test-ErrorStmt 'data -s abc,' 'data -s abc,' 'abc'
Test-ErrorStmt 'data -s a,b' 'data -s a,b' 'a' 'b'
}
Describe 'try/catch/finally statement parsing' -Tags "CI" {
ShouldBeParseError 'try' MissingTryStatementBlock 3
ShouldBeParseError 'try {}' MissingCatchOrFinally 6
ShouldBeParseError 'try {} catch' MissingCatchHandlerBlock 12
ShouldBeParseError 'try {} finally' MissingFinallyStatementBlock 15 -CheckColumnNumber
ShouldBeParseError 'try {} catch [int]' MissingCatchHandlerBlock 19 -CheckColumnNumber
ShouldBeParseError 'try {} catch {} finally' MissingFinallyStatementBlock 23
ShouldBeParseError 'try {} catch {} catch' MissingCatchHandlerBlock 21
ShouldBeParseError 'try {} catch [int],' MissingTypeLiteralToken 19
ShouldBeParseError 'try {} finally { return }' ControlLeavingFinally 17
ShouldBeParseError 'try {} finally { break }' ControlLeavingFinally 17
ShouldBeParseError 'try {} finally { continue }' ControlLeavingFinally 17
Test-ErrorStmt 'try' 'try'
Test-ErrorStmt 'try {1}' 'try {1}' '{1}' '1' '1' '1'
Test-ErrorStmt 'try {1} catch' 'try {1} catch' '{1}' '1' '1' '1'
Test-ErrorStmt 'try {1} finally' 'try {1} finally' '{1}' '1' '1' '1'
Test-ErrorStmt 'try {1} catch [int]' 'try {1} catch [int]' '{1}' '1' '1' '1' '[int]'
Test-ErrorStmt 'try {1} catch {2} finally' 'try {1} catch {2} finally' '{1}' '1' '1' '1' 'catch {2}' '{2}' '2' '2' '2'
Test-ErrorStmt 'try {1} catch {2} catch' 'try {1} catch {2} catch' '{1}' '1' '1' '1' 'catch {2}' '{2}' '2' '2' '2'
Test-ErrorStmt 'try {1} catch [int],[char] {2} catch' 'try {1} catch [int],[char] {2} catch' '{1}' '1' '1' '1' 'catch [int],[char] {2}' '{2}' '2' '2' '2' '[int]' '[char]'
Test-ErrorStmt 'try {1} catch [int],' 'try {1} catch [int],' '{1}' '1' '1' '1' '[int]'
}
Describe 'switch statement parsing' -Tags "CI" {
ShouldBeParseError 'switch' PipelineValueRequired 6
ShouldBeParseError 'switch -abc' InvalidSwitchFlag,PipelineValueRequired 7,11
ShouldBeParseError 'switch -file' MissingFilenameOption 12
ShouldBeParseError 'switch -file a (1)' PipelineValueRequired,MissingCurlyBraceInSwitchStatement 15,18
ShouldBeParseError 'switch (' PipelineValueRequired 8
ShouldBeParseError 'switch ()' PipelineValueRequired,MissingCurlyBraceInSwitchStatement 8,9
ShouldBeParseError 'switch ("abc") ' MissingCurlyBraceInSwitchStatement 14
ShouldBeParseError 'switch ("abc") {' MissingSwitchConditionExpression 17
ShouldBeParseError 'switch ("abc") { 1' MissingSwitchStatementClause 19
ShouldBeParseError 'switch ("abc") { 1 }' MissingSwitchStatementClause 19
ShouldBeParseError 'switch (1) {default {} default {}}' MultipleSwitchDefaultClauses 23
Test-ErrorStmt 'switch' 'switch'
Test-ErrorStmt 'switch -abc' 'switch -abc'
Test-ErrorStmt 'switch (' 'switch ('
Test-ErrorStmt 'switch ()' 'switch ()'
Test-ErrorStmt 'switch -file' 'switch -file'
Test-ErrorStmt 'switch -file a' 'switch -file a'
Test-ErrorStmtForSwitchFlag 'switch -file a' 'file' 'a' 'a' 'a'
Test-ErrorStmt 'switch -file a (1)' 'switch -file a (1)' '1' '1' '1'
Test-ErrorStmtForSwitchFlag 'switch -file a (1)' 'file' 'a' 'a' 'a'
Test-ErrorStmt 'switch (1) {foo' 'switch (1) {foo' 'foo' '1' '1' '1'
Test-ErrorStmt 'switch (1) {foo}' 'switch (1) {foo' 'foo' '1' '1' '1'
Test-ErrorStmt 'switch (1) {foo {bar}' 'switch (1) {foo {bar}' 'foo' '{bar}' 'bar' 'bar' 'bar' '1' '1' '1'
Test-ErrorStmt 'switch (1) {default {9} default{2}' 'switch (1) {default {9} default{2}' 'default' '{9}' '9' '9' '9' 'default' '{2}' '2' '2' '2' '1' '1' '1'
}
Describe 'function statement parsing' -Tags "CI" {
ShouldBeParseError 'function' MissingNameAfterKeyword 8
ShouldBeParseError 'function foo' MissingFunctionBody 12
ShouldBeParseError 'function foo(' MissingEndParenthesisInFunctionParameterList 13
ShouldBeParseError 'function foo {' MissingEndCurlyBrace 13
ShouldBeParseError 'function foo { function bar { if (1) {} }' MissingEndCurlyBrace 13
ShouldBeParseError 'function f { param($a,[int]$a) }' DuplicateFormalParameter 27
ShouldBeParseError 'function f($a,[int]$a){}' DuplicateFormalParameter 19
ShouldBeParseError 'function foo {param(}' MissingEndParenthesisInFunctionParameterList 20
Test-ErrorStmt 'function foo()' 'function foo()'
Test-ErrorStmt 'function foo($a)' 'function foo($a)' '$a' '$a'
Test-ErrorStmt 'function foo($a = 1)' 'function foo($a = 1)' '$a = 1' '1' '$a'
Test-ErrorStmt 'function foo($a' 'function foo($a' '$a' '$a'
Test-ErrorStmt 'function foo($a 1' 'function foo($a' '$a' '$a'
Test-ErrorStmt 'function foo($a = 1' 'function foo($a = 1' '$a = 1' '1' '$a'
}
Describe 'assignment statement parsing' -Tags "CI" {
ShouldBeParseError '$a,$b += 1,2' InvalidLeftHandSide 0
}
Describe 'null coalescing assignment statement parsing' -Tag 'CI' {
BeforeAll {
$skipTest = -not $EnabledExperimentalFeatures.Contains('PSCoalescingOperators')
if ($skipTest) {
Write-Verbose "Test Suite Skipped. The test suite requires the experimental feature 'PSCoalescingOperators' to be enabled." -Verbose
$originalDefaultParameterValues = $PSDefaultParameterValues.Clone()
$PSDefaultParameterValues["it:skip"] = $true
}
}
AfterAll {
if ($skipTest) {
$global:PSDefaultParameterValues = $originalDefaultParameterValues
}
}
ShouldBeParseError '1 ??= 1' InvalidLeftHandSide 0
ShouldBeParseError '@() ??= 1' InvalidLeftHandSide 0
ShouldBeParseError '@{} ??= 1' InvalidLeftHandSide 0
ShouldBeParseError '1..2 ??= 1' InvalidLeftHandSide 0
ShouldBeParseError '[int] ??= 1' InvalidLeftHandSide 0
ShouldBeParseError '$cricket ?= $soccer' ExpectedValueExpression,InvalidLeftHandSide 10,0
}
Describe 'null coalescing statement parsing' -Tag "CI" {
BeforeAll {
$skipTest = -not $EnabledExperimentalFeatures.Contains('PSCoalescingOperators')
if ($skipTest) {
Write-Verbose "Test Suite Skipped. The test suite requires the experimental feature 'PSCoalescingOperators' to be enabled." -Verbose
$originalDefaultParameterValues = $PSDefaultParameterValues.Clone()
$PSDefaultParameterValues["it:skip"] = $true
}
}
AfterAll {
if ($skipTest) {
$global:PSDefaultParameterValues = $originalDefaultParameterValues
}
}
ShouldBeParseError '$x??=' ExpectedValueExpression 5
ShouldBeParseError '$x ??Get-Thing' ExpectedValueExpression,UnexpectedToken 5,5
ShouldBeParseError '$??=$false' ExpectedValueExpression,InvalidLeftHandSide 3,0
ShouldBeParseError '$hello ??? $what' ExpectedValueExpression,MissingColonInTernaryExpression 9,17
}
Describe 'splatting parsing' -Tags "CI" {
ShouldBeParseError '@a' SplattingNotPermitted 0
ShouldBeParseError 'foreach (@a in $b) {}' SplattingNotPermitted 9
ShouldBeParseError 'param(@a)' SplattingNotPermitted 6
ShouldBeParseError 'function foo (@a) {}' SplattingNotPermitted 14
}
Describe 'Pipes parsing' -Tags "CI" {
ShouldBeParseError '|gps' EmptyPipeElement 0
ShouldBeParseError 'gps|' EmptyPipeElement 4
ShouldBeParseError 'gps| |foreach name' EmptyPipeElement 4
ShouldBeParseError '1|1' ExpressionsMustBeFirstInPipeline 2
ShouldBeParseError '$a=' ExpectedValueExpression 3
}
Describe 'commands parsing' -Tags "CI" {
ShouldBeParseError 'gcm -a:' ParameterRequiresArgument 7
ShouldBeParseError 'gcm -a: 1,' MissingExpression 11 -CheckColumnNumber
ShouldBeParseError 'gcm ,' MissingArgument 4
}
Describe 'tokens parsing' -Tags "CI" {
ShouldBeParseError ' )' UnexpectedToken 3
ShouldBeParseError ' }' UnexpectedToken 4 -CheckColumnNumber
}
Describe 'expressions parsing' -Tags "CI" {
ShouldBeParseError '1+' ExpectedValueExpression 2
ShouldBeParseError '[a()][b]' UnexpectedAttribute 0
ShouldBeParseError '[a()][b]2' UnexpectedAttribute 0
ShouldBeParseError '[ref][ref]$x' ReferenceNeedsToBeByItselfInTypeSequence 5
ShouldBeParseError '[int][ref]$x' ReferenceNeedsToBeLastTypeInTypeConversion 5
ShouldBeParseError '[int][ref]$x = 42' ReferenceNeedsToBeByItselfInTypeConstraint 5
}
Describe 'Hash Expression parsing' -Tags "CI" {
ShouldBeParseError '@{ a=1;b=2;c=3;' MissingEndCurlyBrace 2
}
Describe 'Unicode escape sequence parsing' -Tag "CI" {
ShouldBeParseError '"`u{}"' InvalidUnicodeEscapeSequence 1
ShouldBeParseError '"`u{219z}"' InvalidUnicodeEscapeSequence 7
ShouldBeParseError '"`u{12345z}"' InvalidUnicodeEscapeSequence 9
ShouldBeParseError '"`u{1234567}"' TooManyDigitsInUnicodeEscapeSequence 10
ShouldBeParseError '"`u{110000}"' InvalidUnicodeEscapeSequenceValue 4
ShouldBeParseError '"`u2195}"' InvalidUnicodeEscapeSequence 1
ShouldBeParseError '"`u{' InvalidUnicodeEscapeSequence,TerminatorExpectedAtEndOfString 4,0
ShouldBeParseError '"`u{1' InvalidUnicodeEscapeSequence,TerminatorExpectedAtEndOfString 5,0
ShouldBeParseError '"`u{123456' MissingUnicodeEscapeSequenceTerminator,TerminatorExpectedAtEndOfString 10,0
ShouldBeParseError '"`u{1234567' TooManyDigitsInUnicodeEscapeSequence,TerminatorExpectedAtEndOfString 10,0
}
Describe "Ternary Operator parsing" -Tags CI {
BeforeAll {
$skipTest = -not $EnabledExperimentalFeatures.Contains('PSTernaryOperator')
if ($skipTest) {
Write-Verbose "Test Suite Skipped. The test suite requires the experimental feature 'PSTernaryOperator' to be enabled." -Verbose
$originalDefaultParameterValues = $PSDefaultParameterValues.Clone()
$PSDefaultParameterValues["it:skip"] = $true
}
else {
$testCases_basic = @(
@{ Script = '$true?2:3'; TokenKind = [System.Management.Automation.Language.TokenKind]::Variable; }
@{ Script = '$false?'; TokenKind = [System.Management.Automation.Language.TokenKind]::Variable; }
@{ Script = '$:abc'; TokenKind = [System.Management.Automation.Language.TokenKind]::Variable; }
@{ Script = '$env:abc'; TokenKind = [System.Management.Automation.Language.TokenKind]::Variable; }
@{ Script = '$env:123'; TokenKind = [System.Management.Automation.Language.TokenKind]::Variable; }
@{ Script = 'a?2:2'; TokenKind = [System.Management.Automation.Language.TokenKind]::Generic; }
@{ Script = '1?2:3'; TokenKind = [System.Management.Automation.Language.TokenKind]::Generic; }
@{ Script = 'a?'; TokenKind = [System.Management.Automation.Language.TokenKind]::Generic; }
@{ Script = 'a?b'; TokenKind = [System.Management.Automation.Language.TokenKind]::Generic; }
@{ Script = '1?'; TokenKind = [System.Management.Automation.Language.TokenKind]::Generic; }
@{ Script = '?2:3'; TokenKind = [System.Management.Automation.Language.TokenKind]::Generic; }
)
$testCases_incomplete = @(
@{ Script = '$true ?'; ErrorId = "ExpectedValueExpression"; AstType = [System.Management.Automation.Language.ErrorExpressionAst] }
@{ Script = '$true ? 3'; ErrorId = "MissingColonInTernaryExpression"; AstType = [System.Management.Automation.Language.ErrorExpressionAst] }
@{ Script = '$true ? 3 :'; ErrorId = "ExpectedValueExpression"; AstType = [System.Management.Automation.Language.TernaryExpressionAst] }
@{ Script = "`$true`t?"; ErrorId = "ExpectedValueExpression"; AstType = [System.Management.Automation.Language.ErrorExpressionAst] }
@{ Script = "`$true`t?`t3"; ErrorId = "MissingColonInTernaryExpression"; AstType = [System.Management.Automation.Language.ErrorExpressionAst] }
@{ Script = "`$true`t?`t3`t:"; ErrorId = "ExpectedValueExpression"; AstType = [System.Management.Automation.Language.TernaryExpressionAst] }
)
}
}
AfterAll {
if ($skipTest) {
$global:PSDefaultParameterValues = $originalDefaultParameterValues
}
}
It "Question-mark and colon parsed correctly in <Script> when not in ternary expression context" -TestCases $testCases_basic {
param($Script, $TokenKind)
$tks = $null
$ers = $null
$result = [System.Management.Automation.Language.Parser]::ParseInput($Script, [ref]$tks, [ref]$ers)
$tks[0].Kind | Should -BeExactly $TokenKind
$tks[0].Text | Should -BeExactly $Script
if ($TokenKind -eq "Variable") {
$result.EndBlock.Statements[0].PipelineElements[0].Expression | Should -BeOfType 'System.Management.Automation.Language.VariableExpressionAst'
$result.EndBlock.Statements[0].PipelineElements[0].Expression.Extent.Text | Should -BeExactly $Script
} else {
$result.EndBlock.Statements[0].PipelineElements[0].CommandElements[0] | Should -BeOfType 'System.Management.Automation.Language.StringConstantExpressionAst'
$result.EndBlock.Statements[0].PipelineElements[0].CommandElements[0].Extent.Text | Should -BeExactly $Script
}
}
It "Question-mark and colon can be used as command names" {
function a?b:c { 'a?b:c' }
function 2?3:4 { '2?3:4' }
a?b:c | Should -BeExactly 'a?b:c'
2?3:4 | Should -BeExactly '2?3:4'
}
It "Incomplete ternary expression <Script> should generate correct error" -TestCases $testCases_incomplete {
param($Script, $ErrorId, $AstType)
$ers = $null
$result = [System.Management.Automation.Language.Parser]::ParseInput($Script, [ref]$null, [ref]$ers)
$ers.Count | Should -Be 1
$ers.IncompleteInput | Should -BeTrue
$ers.ErrorId | Should -BeExactly $ErrorId
$result.EndBlock.Statements[0].PipelineElements[0].Expression | Should -BeOfType $AstType
}
It "Generate ternary AST when operands are missing - '`$true ? :'" {
$ers = $null
$result = [System.Management.Automation.Language.Parser]::ParseInput('$true ? :', [ref]$null, [ref]$ers)
$ers.Count | Should -Be 2
$ers[0].IncompleteInput | Should -BeFalse
$ers[0].ErrorId | Should -BeExactly 'ExpectedValueExpression'
$ers[1].IncompleteInput | Should -BeTrue
$ers[1].ErrorId | Should -BeExactly 'ExpectedValueExpression'
$expr = $result.EndBlock.Statements[0].PipelineElements[0].Expression
$expr | Should -BeOfType 'System.Management.Automation.Language.TernaryExpressionAst'
$expr.IfTrue | Should -BeOfType 'System.Management.Automation.Language.ErrorExpressionAst'
$expr.IfFalse | Should -BeOfType 'System.Management.Automation.Language.ErrorExpressionAst'
}
It "Generate ternary AST when operands are missing - '`$true ? : 3'" {
$ers = $null
$result = [System.Management.Automation.Language.Parser]::ParseInput('$true ? : 3', [ref]$null, [ref]$ers)
$ers.Count | Should -Be 1
$ers.IncompleteInput | Should -BeFalse
$ers.ErrorId | Should -BeExactly "ExpectedValueExpression"
$expr = $result.EndBlock.Statements[0].PipelineElements[0].Expression
$expr | Should -BeOfType 'System.Management.Automation.Language.TernaryExpressionAst'
$expr.IfTrue | Should -BeOfType 'System.Management.Automation.Language.ErrorExpressionAst'
$expr.IfFalse | Should -BeOfType 'System.Management.Automation.Language.ConstantExpressionAst'
}
}
|
combined_dataset/train/non-malicious/sample_43_90.ps1
|
sample_43_90.ps1
|
ConvertFrom-StringData @'
FailoverClustersModuleRequired=O módulo PowerShell (FailoverClusters) necessário não foi encontrado. Utilize a Ferramenta de Funções e Funcionalidades para instalar: Ferramentas de Administração Remota do Servidor | Ferramentas de Administração de Funcionalidades | Ferramentas de Clustering de Ativação Pós-falha | Módulo Cluster de Ativação Pós-falha para o Windows PowerShell.
'@
# SIG # Begin signature block
# MIInwQYJKoZIhvcNAQcCoIInsjCCJ64CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAxS6ND5K84yw0p
# zhhoGnfMJPgqJ5rIC09S1G+7FrI8PqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGaEwghmdAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJ4fb4+UfwFQAY+RL675k46n
# 0+jvhqfxNXzwAGjoVlSOMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAg6mRLwD0GyVkNuPp5YlYpoTigkXfdXxVD4W5R2rsDFFXEljvc+AgAuf5
# x2JqH8Jm08fcIy8f2HUKmmR/Y20A9/RePtaJjy/TDVhD2TvT0mQfR5asRnmodKBA
# z6QYM2mMqjilT9GJT+khTXVZI4AA9T2Uvsp2CVABXvv6EBeQptEKAvWSz/umRhsp
# LsCy8T3drAZzvzdnNCtBRMGlC5icKYwJUjNP+m22u3upZU3a/28bZZYNKENs3MIO
# P1af8bsJs/8+iQpz54juEjAvb/Xfp507J3Gzk+d/zOWe0HWvdF2N+hRlHBn2TzU1
# DTI5eqLx+Jafkt6dLDVdasGz10ZELqGCFyswghcnBgorBgEEAYI3AwMBMYIXFzCC
# FxMGCSqGSIb3DQEHAqCCFwQwghcAAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBIPpwHdwx/qVZD0M9ti8vNIHePZwGy5pUaPBoRyM19TQIGZa6C/0rG
# GBMyMDI0MDEyMjIxMzIwMC43MDhaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjJBRDQtNEI5Mi1GQTAxMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIRejCCBycwggUPoAMCAQICEzMAAAHenkielp8oRD0AAQAAAd4wDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzEyWhcNMjUwMTEwMTkwNzEyWjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoyQUQ0LTRC
# OTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALSB9ByF9UIDhA6xFrOniw/x
# sDl8sSi9rOCOXSSO4VMQjnNGAo5VHx0iijMEMH9LY2SUIBkVQS0Ml6kR+TagkUPb
# aEpwjhQ1mprhRgJT/jlSnic42VDAo0en4JI6xnXoAoWoKySY8/ROIKdpphgI7OJb
# 4XHk1P3sX2pNZ32LDY1ktchK1/hWyPlblaXAHRu0E3ynvwrS8/bcorANO6Djuysy
# S9zUmr+w3H3AEvSgs2ReuLj2pkBcfW1UPCFudLd7IPZ2RC4odQcEPnY12jypYPnS
# 6yZAs0pLpq0KRFUyB1x6x6OU73sudiHON16mE0l6LLT9OmGo0S94Bxg3N/3aE6fU
# bnVoemVc7FkFLum8KkZcbQ7cOHSAWGJxdCvo5OtUtRdSqf85FklCXIIkg4sm7nM9
# TktUVfO0kp6kx7mysgD0Qrxx6/5oaqnwOTWLNzK+BCi1G7nUD1pteuXvQp8fE1Kp
# TjnG/1OJeehwKNNPjGt98V0BmogZTe3SxBkOeOQyLA++5Hyg/L68pe+DrZoZPXJa
# GU/iBiFmL+ul/Oi3d83zLAHlHQmH/VGNBfRwP+ixvqhyk/EebwuXVJY+rTyfbRfu
# h9n0AaMhhNxxg6tGKyZS4EAEiDxrF9mAZEy8e8rf6dlKIX5d3aQLo9fDda1ZTOw+
# XAcAvj2/N3DLVGZlHnHlAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUazAmbxseaapg
# dxzK8Os+naPQEsgwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAOKUwHsXDacGOvUI
# gs5HDgPs0LZ1qyHS6C6wfKlLaD36tZfbWt1x+GMiazSuy+GsxiVHzkhMW+FqK8gr
# uLQWN/sOCX+fGUgT9LT21cRIpcZj4/ZFIvwtkBcsCz1XEUsXYOSJUPitY7E8bbld
# mmhYZ29p+XQpIcsG/q+YjkqBW9mw0ru1MfxMTQs9MTDiD28gAVGrPA3NykiSChvd
# qS7VX+/LcEz9Ubzto/w28WA8HOCHqBTbDRHmiP7MIj+SQmI9VIayYsIGRjvelmNa
# 0OvbU9CJSz/NfMEgf2NHMZUYW8KqWEjIjPfHIKxWlNMYhuWfWRSHZCKyIANA0aJL
# 4soHQtzzZ2MnNfjYY851wHYjGgwUj/hlLRgQO5S30Zx78GqBKfylp25aOWJ/qPhC
# +DXM2gXajIXbl+jpGcVANwtFFujCJRdZbeH1R+Q41FjgBg4m3OTFDGot5DSuVkQg
# jku7pOVPtldE46QlDg/2WhPpTQxXH64sP1GfkAwUtt6rrZM/PCwRG6girYmnTRLL
# sicBhoYLh+EEFjVviXAGTk6pnu8jx/4WPWu0jsz7yFzg82/FMqCk9wK3LvyLAyDH
# N+FxbHAxtgwad7oLQPM0WGERdB1umPCIiYsSf/j79EqHdoNwQYROVm+ZX10RX3n6
# bRmAnskeNhi0wnVaeVogLMdGD+nqMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtYwggI/AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoy
# QUQ0LTRCOTItRkEwMTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAaKBSisy4y86pl8Xy22CJZExE2vOggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOlZAXgwIhgPMjAyNDAxMjIyMzAwMDhaGA8yMDI0MDEyMzIzMDAwOFowdjA8Bgor
# BgEEAYRZCgQBMS4wLDAKAgUA6VkBeAIBADAJAgEAAgEGAgH/MAcCAQACAhFNMAoC
# BQDpWlL4AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEA
# AgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEASXzy0QumYD5FJty8
# CaDX5T5aA/+aFNaT3pHiTpwJtjl3YisVMK9spV4xRtiMCt1N1iNFLsvmBdcl3UwJ
# jbK/5DWZZjPyUEph8Qon/GfrdC35ZDhTI8L93HwuxbYgD+VwNrsDmZGT2gewGnLg
# K5pYatQM1AWj+dtBluuU+3gqzVUxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAd6eSJ6WnyhEPQABAAAB3jANBglghkgBZQME
# AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ
# BDEiBCA1baYnCGR0nQe4SdmsOs73jbVEvHQbCpjzb5PogEoD8zCB+gYLKoZIhvcN
# AQkQAi8xgeowgecwgeQwgb0EII4+I58NwV4QEEkCf+YLcyCtPnD9TbPzUtgPjgdz
# fh17MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHe
# nkielp8oRD0AAQAAAd4wIgQgYj8w3kfC0Jvs9rCNyXm8xM06hS2hsBx8v5ACk2bu
# InAwDQYJKoZIhvcNAQELBQAEggIAFIInPTey/PxUhFoi29bvgT8JvtJ6JSVcsvEH
# q2Vy8EuvtSLNG8KNAWHt+AGbCji3G5beK98dCz8VxaxNXQA741wqMNYMWexlnAMw
# t7qBsrKbaGHmHx8/x52bnGzbBewA/QY/SHR1XEuEH0wHF43cN57BWO8tSGAKOICR
# kWsuCBm4BKKWZZ9aln/DGBHtsVb85WSW+0cjOnruwMqkHEcxozN53AX6Jx3Dp4KT
# OKBPC5g+nlaFxqWUtgRl34VQ+b3Yv6gfe3/bABY1ezmJYF1RS3p3fMeRhq0NEu0w
# gJvumwSMoBEPC+uGqy5mjgIJZx4u4FHRYbk9PJHJuSIk/z6stHFtHwal45rVzUQk
# 7IOiasPrxDO+N6BdpQiVy6DMnkf/cSghpoSBOjgJvg+fFiS0pK1jQ2ey54Aem7re
# zaoyULvpkh+B8CTAHJvlNmXt4ZoorqD6cc3d1j2VWGjOq9GUTqalxXAzFkwz8Ot1
# 8VrhbOhfrk2O492OSjE54se66er93dmhUIpgF2YdHciTrl0yiqFKLC1hujK+P6Zq
# H1hOnCsbKeeihZJQ6l4tYtPszbr2P1bEws/5/kHZqGRHlVfeVlhTEIxpDNAEjkuO
# yFVZdzca8ZqmRJeWWrgX1TyQdmxvviHoDNSdBz1gUtKTjo1iMkznlsVXSq8s4/Is
# cZ2HXa0=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_42_26.ps1
|
sample_42_26.ps1
|
#
# Module manifest for module 'OCI.PSModules.Apmcontrolplane'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Apmcontrolplane.dll'
# Version number of this module.
ModuleVersion = '77.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '2656b809-7098-428e-b605-696525730fec'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Apmcontrolplane Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Apmcontrolplane.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIApmcontrolplaneApmDomain',
'Get-OCIApmcontrolplaneApmDomainsList',
'Get-OCIApmcontrolplaneApmDomainWorkRequestsList',
'Get-OCIApmcontrolplaneDataKeysList',
'Get-OCIApmcontrolplaneWorkRequest',
'Get-OCIApmcontrolplaneWorkRequestErrorsList',
'Get-OCIApmcontrolplaneWorkRequestLogsList',
'Get-OCIApmcontrolplaneWorkRequestsList',
'Move-OCIApmcontrolplaneApmDomainCompartment',
'New-OCIApmcontrolplaneApmDomain', 'New-OCIApmcontrolplaneDataKeys',
'Remove-OCIApmcontrolplaneApmDomain',
'Remove-OCIApmcontrolplaneDataKeys',
'Update-OCIApmcontrolplaneApmDomain'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Apmcontrolplane'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_27_79.ps1
|
sample_27_79.ps1
|
#
# Module manifest for module 'OCI.PSModules.Operatoraccesscontrol'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Operatoraccesscontrol.dll'
# Version number of this module.
ModuleVersion = '83.2.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'd1ca9ba8-0f36-4759-8992-932d0bb2c9bb'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Operatoraccesscontrol Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Operatoraccesscontrol.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Confirm-OCIOperatoraccesscontrolOperatorAssignment',
'Get-OCIOperatoraccesscontrolAccessRequest',
'Get-OCIOperatoraccesscontrolAccessRequestHistoriesList',
'Get-OCIOperatoraccesscontrolAccessRequestsList',
'Get-OCIOperatoraccesscontrolAssignmentValidationStatus',
'Get-OCIOperatoraccesscontrolAuditLogReport',
'Get-OCIOperatoraccesscontrolInteractionsList',
'Get-OCIOperatoraccesscontrolOperatorAction',
'Get-OCIOperatoraccesscontrolOperatorActionsList',
'Get-OCIOperatoraccesscontrolOperatorControl',
'Get-OCIOperatoraccesscontrolOperatorControlAssignment',
'Get-OCIOperatoraccesscontrolOperatorControlAssignmentsList',
'Get-OCIOperatoraccesscontrolOperatorControlsList',
'Invoke-OCIOperatoraccesscontrolApproveAccessRequest',
'Invoke-OCIOperatoraccesscontrolInteractionRequest',
'Invoke-OCIOperatoraccesscontrolRejectAccessRequest',
'Invoke-OCIOperatoraccesscontrolReviewAccessRequest',
'Invoke-OCIOperatoraccesscontrolRevokeAccessRequest',
'Move-OCIOperatoraccesscontrolOperatorControlAssignmentCompartment',
'Move-OCIOperatoraccesscontrolOperatorControlCompartment',
'New-OCIOperatoraccesscontrolOperatorControl',
'New-OCIOperatoraccesscontrolOperatorControlAssignment',
'Remove-OCIOperatoraccesscontrolOperatorControl',
'Remove-OCIOperatoraccesscontrolOperatorControlAssignment',
'Update-OCIOperatoraccesscontrolOperatorControl',
'Update-OCIOperatoraccesscontrolOperatorControlAssignment'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Operatoraccesscontrol'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Get-LastReboot.ps1
|
Get-LastReboot.ps1
|
Param (
[Parameter(Position=0,ValueFromPipeline=$True,ValueFromPipelineByPropertyName=$true)]
[alias("Name","ComputerName")]$Computer=@($env:ComputerName),
[switch] $Output
)
process{
if (Test-Connection -ComputerName $Computer -Count 1 -Quiet){
write-host "Getting Uptime for $Computer" -foregroundcolor green
$Result = GetUpTime $Computer
$Global:objOut += $Result
}
else {
Write-Output $("$($Computer) cannot be reached")
}
}
begin{
$Global:objOut = @()
Function GetUpTime ($HostName){
try{
$UpTime = [System.Management.ManagementDateTimeconverter]::ToDateTime((Get-WmiObject -Class Win32_OperatingSystem -Computer $HostName).LastBootUpTime)
$UpTimeSpan = New-TimeSpan -start $UpTime -end $(Get-Date -Hour 8 -Minute 0 -second 0)
$Filter = @{ProviderName= "USER32";LogName = "system"}
$Reason = (Get-WinEvent -ComputerName $HostName -FilterHashtable $Filter | where {$_.Id -eq 1074} | Select -First 1)
$Result = New-Object PSObject -Property @{
Date = $(Get-Date -Format d)
ComputerName = [string]$HostName
LastBoot = $UpTime
Reason = $Reason.Message
Days = $($UpTimeSpan.Days)
Hours = $($UpTimeSpan.Hours)
Minutes = $($UpTimeSpan.Minutes)
Seconds = $($UpTimeSpan.Seconds)
}
return $Result
}
catch{
write-error $error[0]
return $null
}
}
}
end{
if ($Output){
[string]$OutputLog = ([environment]::getfolderpath("mydocuments")) + "\\" + "Servers_Uptime.csv"
$Global:objOut | ConvertTo-Csv -Delimiter ";" -NoTypeInformation | out-file $OutputLog
}
else{
$Global:objOut | Select Date, Servername, Lastboot, Reason, Days, Hours, Minutes, Seconds | fl
}
}
|
combined_dataset/train/non-malicious/1774.ps1
|
1774.ps1
|
Import-Module HelpersSecurity
try
{
$defaultParamValues = $PSDefaultParameterValues.Clone()
$PSDefaultParameterValues["it:Skip"] = !$IsWindows
Describe "Help built-in function should not expose nested module private functions when run on locked down systems" -Tags 'Feature','RequireAdminOnWindows' {
BeforeAll {
$restorePSModulePath = $env:PSModulePath
$env:PSModulePath += ";$TestDrive"
$trustedModuleName1 = "TrustedModule$(Get-Random -Max 999)_System32"
$trustedModulePath1 = Join-Path $TestDrive $trustedModuleName1
New-Item -ItemType Directory $trustedModulePath1
$trustedModuleFilePath1 = Join-Path $trustedModulePath1 ($trustedModuleName1 + ".psm1")
$trustedModuleManifestPath1 = Join-Path $trustedModulePath1 ($trustedModuleName1 + ".psd1")
$trustedModuleName2 = "TrustedModule$(Get-Random -Max 999)_System32"
$trustedModulePath2 = Join-Path $TestDrive $trustedModuleName2
New-Item -ItemType Directory $trustedModulePath2
$trustedModuleFilePath2 = Join-Path $trustedModulePath2 ($trustedModuleName2 + ".psm1")
$trustedModuleScript1 = @'
function PublicFn1
{
NestedFn1
PrivateFn1
}
function PrivateFn1
{
"PrivateFn1"
}
'@
$trustedModuleScript1 | Out-File -FilePath $trustedModuleFilePath1
'@{{ FunctionsToExport = "PublicFn1"; ModuleVersion = "1.0"; RootModule = "{0}"; NestedModules = "{1}" }}' -f @($trustedModuleFilePath1,$trustedModuleName2) | Out-File -FilePath $trustedModuleManifestPath1
$trustedModuleScript2 = @'
function NestedFn1
{
"NestedFn1"
"Language mode is $($ExecutionContext.SessionState.LanguageMode)"
}
'@
$trustedModuleScript2 | Out-File -FilePath $trustedModuleFilePath2
}
AfterAll {
$env:PSModulePath = $restorePSModulePath
if ($trustedModuleName1 -ne $null) { Remove-Module -Name $trustedModuleName1 -Force -ErrorAction Ignore }
if ($trustedModuleName2 -ne $null) { Remove-Module -Name $trustedModuleName2 -Force -ErrorAction Ignore }
}
It "Verifies that private functions in trusted nested modules are not globally accessible after running the help function" {
$isCommandAccessible = "False"
try
{
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
$command = @"
Import-Module -Name $trustedModuleName1 -Force -ErrorAction Stop;
"@
$command += @'
$null = help -Name NestedFn1 -Category Function 2> $null;
$result = Get-Command NestedFn1 2> $null;
return ($result -ne $null)
'@
$isCommandAccessible = powershell.exe -noprofile -nologo -c $command
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$isCommandAccessible | Should -BeExactly "False"
}
}
Describe "NoLanguage runspace pool session should remain in NoLanguage mode when created on a system-locked down machine" -Tags 'Feature','RequireAdminOnWindows' {
BeforeAll {
$configFileName = "RestrictedSessionConfig.pssc"
$configFilePath = Join-Path $TestDrive $configFileName
'@{ SchemaVersion = "2.0.0.0"; SessionType = "RestrictedRemoteServer"}' > $configFilePath
$scriptModuleName = "ImportTrustedModuleForTest_System32"
$moduleFilePath = Join-Path $TestDrive ($scriptModuleName + ".psm1")
$template = @'
function TestRestrictedSession
{{
$iss = [initialsessionstate]::CreateFromSessionConfigurationFile("{0}")
$rsp = [runspacefactory]::CreateRunspacePool($iss)
$rsp.Open()
$ps = [powershell]::Create()
$ps.RunspacePool = $rsp
$null = $ps.AddScript("Hello")
try
{{
$ps.Invoke()
}}
finally
{{
$ps.Dispose()
$rsp.Dispose()
}}
}}
Export-ModuleMember -Function TestRestrictedSession
'@
$template -f $configFilePath > $moduleFilePath
}
It "Verifies that a NoLanguage runspace pool throws the expected 'script not allowed' error" {
try
{
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
$mod = Import-Module -Name $moduleFilePath -Force -PassThru
try
{
& "$scriptModuleName\TestRestrictedSession"
throw "No Exception!"
}
catch
{
$expectedError = $_
}
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$expectedError.Exception.InnerException.ErrorRecord.FullyQualifiedErrorId | Should -BeExactly "ScriptsNotAllowed"
}
}
Describe "Built-ins work within constrained language" -Tags 'Feature','RequireAdminOnWindows' {
BeforeAll {
$TestCasesBuiltIn = @(
@{testName = "Verify built-in function"; scriptblock = { Get-Verb } }
@{testName = "Verify built-in error variable"; scriptblock = { Write-Error SomeError -ErrorVariable ErrorOutput -ErrorAction SilentlyContinue; $ErrorOutput} }
)
}
It "<testName>" -TestCases $TestCasesBuiltIn {
param ($scriptblock)
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
$result = (& $scriptblock)
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode
}
$result.Count | Should -BeGreaterThan 0
}
}
Describe "Background jobs" -Tags 'Feature','RequireAdminOnWindows' {
Context "Background jobs in system lock down mode" {
It "Verifies that background jobs in system lockdown mode run in constrained language" {
try
{
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$job = Start-Job -ScriptBlock { [object]::Equals("A", "B") } | Wait-Job
$expectedErrorId = $job.ChildJobs[0].Error.FullyQualifiedErrorId
$job | Remove-Job
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$expectedErrorId | Should -BeExactly "MethodInvocationNotSupportedInConstrainedLanguage"
}
}
Context "Background jobs within inconsistent mode" {
It "Verifies that background job is denied when mode is inconsistent" {
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Start-Job { [object]::Equals("A", "B") }
throw "No Exception!"
}
catch
{
$expectedError = $_
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode
}
$expectedError.FullyQualifiedErrorId | Should -BeExactly "CannotStartJobInconsistentLanguageMode,Microsoft.PowerShell.Commands.StartJobCommand"
}
}
}
Describe "Add-Type in constrained language" -Tags 'Feature','RequireAdminOnWindows' {
It "Verifies Add-Type fails in constrained language mode" {
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Add-Type -TypeDefinition 'public class ConstrainedLanguageTest { public static string Hello = "HelloConstrained"; }'
throw "No Exception!"
}
catch
{
$expectedError = $_
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode
}
$expectedError.FullyQualifiedErrorId | Should -BeExactly "CannotDefineNewType,Microsoft.PowerShell.Commands.AddTypeCommand"
}
It "Verifies Add-Type works back in full language mode again" {
Add-Type -TypeDefinition 'public class AfterFullLanguageTest { public static string Hello = "HelloAfter"; }'
[AfterFullLanguageTest]::Hello | Should -BeExactly "HelloAfter"
}
}
Describe "New-Object in constrained language" -Tags 'Feature','RequireAdminOnWindows' {
Context "New-Object with dotNet types" {
It "Verifies New-Object works in constrained language of allowed string type" {
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
$resultString = New-Object System.String "Hello"
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode
}
$resultString | Should -Be "Hello"
}
It "Verifies New-Object throws error in constrained language for disallowed IntPtr type" {
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
New-Object System.IntPtr 1234
throw "No Exception!"
}
catch
{
$expectedError = $_
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode
}
$expectedError.FullyQualifiedErrorId | Should -BeExactly "CannotCreateTypeConstrainedLanguage,Microsoft.PowerShell.Commands.NewObjectCommand"
}
It "Verifies New-Object works for IntPtr type back in full language mode again" {
New-Object System.IntPtr 1234 | Should -Be 1234
}
}
Context "New-Object with COM types" {
It "Verifies New-Object with COM types is disallowed in system lock down" {
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
New-Object -Com ADODB.Parameter
throw "No Exception!"
}
catch
{
$expectedError = $_
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$expectedError.FullyQualifiedErrorId | Should -BeExactly "CannotCreateComTypeConstrainedLanguage,Microsoft.PowerShell.Commands.NewObjectCommand"
}
It "Verifies New-Object with COM types works back in full language mode again" {
$result = New-Object -ComObject ADODB.Parameter
$result.Direction | Should -Be 1
}
}
}
Describe "New-Item command on function drive in constrained language" -Tags 'Feature','RequireAdminOnWindows' {
It "Verifies New-Item directory on function drive is not allowed in constrained language mode" {
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
$null = New-Item -Path function:\SomeEvilFunction -ItemType Directory -Value SomeBadScriptBlock -ErrorAction Stop
throw "No Exception!"
}
catch
{
$expectedError = $_
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode
}
$expectedError.FullyQualifiedErrorId | Should -BeExactly "NotSupported,Microsoft.PowerShell.Commands.NewItemCommand"
}
}
Describe "Engine events in constrained language mode" -Tags 'Feature','RequireAdminOnWindows' {
It "Verifies engine event in constrained language mode, its action runs as constrained" {
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
$job = Register-EngineEvent LockdownEvent -Action { [object]::Equals("A", "B") }
$null = New-Event LockdownEvent
Wait-Job $job
Unregister-Event LockdownEvent
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode
}
$job.Error.FullyQualifiedErrorId | Should -Match "MethodInvocationNotSupportedInConstrainedLanguage"
}
}
Describe "Module scope scripts in constrained language mode" -Tags 'Feature','RequireAdminOnWindows' {
It "Verifies that while in constrained language mode script run in a module scope also runs constrained" {
Import-Module PSDiagnostics
$module = Get-Module PSDiagnostics
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
& $module { [object]::Equals("A", "B") }
}
catch
{
$expectedError = $_
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode
}
$expectedError.FullyQualifiedErrorId | Should -BeExactly "CantInvokeCallOperatorAcrossLanguageBoundaries"
}
}
Describe "Switch -file in constrained language mode" -Tags 'Feature','RequireAdminOnWindows' {
It "Verifies that switch -file will not work in constrained language without provider" {
[initialsessionstate] $iss = [initialsessionstate]::Create()
$iss.LanguageMode = "ConstrainedLanguage"
[runspace] $rs = [runspacefactory]::CreateRunspace($iss)
$rs.Open()
$pl = $rs.CreatePipeline("switch -file $testDrive/foo.txt { 'A' { 'B' } }")
$e = { $pl.Invoke() } | Should -Throw -ErrorId "DriveNotFoundException"
$rs.Dispose()
}
}
Describe "Get content syntax in constrained language mode" -Tags 'Feature','RequireAdminOnWindows' {
It "Verifies that the get content syntax returns null value in constrained language without provider" {
$iss = [initialsessionstate]::Create()
$iss.LanguageMode = "ConstrainedLanguage"
$rs = [runspacefactory]::CreateRunspace($iss)
$rs.Open()
$pl = $rs.CreatePipeline('${' + "$testDrive/foo.txt}")
$result = $pl.Invoke()
$rs.Dispose()
$result[0] | Should -BeNullOrEmpty
}
}
Describe "Stream redirection in constrained language mode" -Tags 'Feature','RequireAdminOnWindows' {
It "Verifies that stream redirection doesn't work in constrained language mode without provider" {
$iss = [initialsessionstate]::CreateDefault2()
$iss.Providers.Clear()
$iss.LanguageMode = "ConstrainedLanguage"
$rs = [runspacefactory]::CreateRunspace($iss)
$rs.Open()
$pl = $rs.CreatePipeline('"Hello" > c:\temp\foo.txt')
$e = { $pl.Invoke() } | Should -Throw -ErrorId "CmdletInvocationException"
$rs.Dispose()
}
}
Describe "Invoke-Expression in constrained language mode" -Tags 'Feature','RequireAdminOnWindows' {
BeforeAll {
function VulnerableFunctionFromFullLanguage { Invoke-Expression $Args[0] }
$TestCasesIEX = @(
@{testName = "Verifies direct Invoke-Expression does not bypass constrained language mode";
scriptblock = { Invoke-Expression '[object]::Equals("A", "B")' } }
@{testName = "Verifies indirect Invoke-Expression does not bypass constrained language mode";
scriptblock = { VulnerableFunctionFromFullLanguage '[object]::Equals("A", "B")' } }
)
}
It "<testName>" -TestCases $TestCasesIEX {
param ($scriptblock)
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
& $scriptblock
throw "No Exception!"
}
catch
{
$expectedError = $_
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode
}
$expectedError.FullyQualifiedErrorId | Should -BeExactly "MethodInvocationNotSupportedInConstrainedLanguage,Microsoft.PowerShell.Commands.InvokeExpressionCommand"
}
}
Describe "Dynamic method invocation in constrained language mode" -Tags 'Feature','RequireAdminOnWindows' {
It "Verifies dynamic method invocation does not bypass constrained language mode" {
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
& {
$type = [IO.Path]
$method = "GetRandomFileName"
$type::$method()
}
throw "No Exception!"
}
catch
{
$expectedError = $_
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode
}
$expectedError.FullyQualifiedErrorId | Should -BeExactly "MethodInvocationNotSupportedInConstrainedLanguage"
}
It "Verifies dynamic methods invocation does not bypass constrained language mode" {
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
& {
$type = [IO.Path]
$methods = "GetRandomFileName","GetTempPath"
$type::($methods[0])()
}
throw "No Exception!"
}
catch
{
$expectedError = $_
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode
}
$expectedError.FullyQualifiedErrorId | Should -BeExactly "MethodInvocationNotSupportedInConstrainedLanguage"
}
}
Describe "Tab expansion in constrained language mode" -Tags 'Feature','RequireAdminOnWindows' {
It "Verifies that tab expansion cannot convert disallowed IntPtr type" {
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
$result = @(TabExpansion2 '(1234 -as [IntPtr]).' 20 | ForEach-Object CompletionMatches | Where-Object CompletionText -Match Pointer)
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode
}
$result.Count | Should -Be 0
}
}
Describe "Variable AllScope in constrained language mode" -Tags 'Feature','RequireAdminOnWindows' {
It "Verifies Set-Variable cannot create AllScope in constrained language" {
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Set-Variable -Name SetVariableAllScopeNotSupported -Value bar -Option AllScope
throw "No Exception!"
}
catch
{
$expectedError = $_
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode
}
$expectedError.FullyQualifiedErrorId | Should -BeExactly "NotSupported,Microsoft.PowerShell.Commands.SetVariableCommand"
}
It "Verifies New-Variable cannot create AllScope in constrained language" {
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
New-Variable -Name NewVarialbeAllScopeNotSupported -Value bar -Option AllScope
throw "No Exception!"
}
catch
{
$expectedError = $_
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode
}
$expectedError.FullyQualifiedErrorId | Should -BeExactly "NotSupported,Microsoft.PowerShell.Commands.NewVariableCommand"
}
}
Describe "Data section additional commands in constrained language" -Tags 'Feature','RequireAdminOnWindows' {
function InvokeDataSectionConstrained
{
try
{
Invoke-Expression 'data foo -SupportedCommand Add-Type { Add-Type }'
throw "No Exception!"
}
catch
{
return $_
}
}
It "Verifies data section Add-Type additional command is disallowed in constrained language" {
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
$exception1 = InvokeDataSectionConstrained
$exception2 = InvokeDataSectionConstrained
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode
}
$exception1.FullyQualifiedErrorId | Should -Match "DataSectionAllowedCommandDisallowed"
$exception2.FullyQualifiedErrorId | Should -Match "DataSectionAllowedCommandDisallowed"
}
It "Verifies data section with no-constant expression Add-Type additional command is disallowed in constrained language" {
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
$addedCommand = "Add-Type"
Invoke-Expression 'data foo -SupportedCommand $addedCommand { Add-Type }'
throw "No Exception!"
}
catch
{
$expectedError = $_
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode
}
$expectedError.FullyQualifiedErrorId | Should -BeExactly "DataSectionAllowedCommandDisallowed,Microsoft.PowerShell.Commands.InvokeExpressionCommand"
}
}
Describe "Import-LocalizedData additional commands in constrained language" -Tags 'Feature','RequireAdminOnWindows' {
It "Verifies Import-LocalizedData disallows Add-Type in constrained language" {
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
& {
$localizedDataFileName = Join-Path $TestDrive ImportLocalizedDataAdditionalCommandsNotSupported.psd1
$null = New-Item -ItemType File -Path $localizedDataFileName -Force
Import-LocalizedData -SupportedCommand Add-Type -BaseDirectory $TestDrive -FileName ImportLocalizedDataAdditionalCommandsNotSupported
}
}
catch
{
$expectedError = $_
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode
}
$expectedError.FullyQualifiedErrorId | Should -BeExactly "CannotDefineSupportedCommand,Microsoft.PowerShell.Commands.ImportLocalizedData"
}
}
Describe "Where and Foreach operators should not allow unapproved types in constrained language" -Tags 'Feature','RequireAdminOnWindows' {
BeforeAll {
$script1 = @'
$data = @(
@{
Node = "first"
Value1 = 1
Value2 = 2
first = $true
}
@{
Node = "second"
Value1 = 3
Value2 = 4
Second = $true
}
@{
Node = "third"
Value1 = 5
Value2 = 6
third = $true
}
)
$result = $data.where{$_.Node -eq "second"}
Write-Output $result
$data.where{[system.io.path]::GetRandomFileName() -eq "Hello"}
'@
$script2 = @'
$data = @(
@{
Node = "first"
Value1 = 1
Value2 = 2
first = $true
}
@{
Node = "second"
Value1 = 3
Value2 = 4
Second = $true
}
@{
Node = "third"
Value1 = 5
Value2 = 6
third = $true
}
)
$result = $data.ForEach('value1')
Write-Output $result
$data.ForEach{[system.io.path]::GetRandomFileName().Length}
'@
$script3 = @'
(Get-Process powershell*).ForEach('GetHashCode')
'@
$script4 = @'
(get-process powershell).where{$_.GetType().FullName -match "process"}
'@
$TestCasesForeach = @(
@{testName = "Verify where statement with invalid method call in constrained language is disallowed"; script = $script1 }
@{testName = "Verify foreach statement with invalid method call in constrained language is disallowed"; script = $script2 }
@{testName = "Verify foreach statement with embedded method call in constrained language is disallowed"; script = $script3 }
@{testName = "Verify where statement with embedded method call in constrained language is disallowed"; script = $script4 }
)
}
It "<testName>" -TestCases $TestCasesForeach {
param (
[string] $script
)
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
& {
$sb = [scriptblock]::Create($script)
& sb
}
throw "No Exception!"
}
catch
{
$expectedError = $_
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode
}
$expectedError.FullyQualifiedErrorId | Should -BeExactly "MethodInvocationNotSupportedInConstrainedLanguage"
}
}
Describe "ThreadJob Constrained Language Tests" -Tags 'Feature','RequireAdminOnWindows' {
BeforeAll {
$sb = { $ExecutionContext.SessionState.LanguageMode }
}
It "ThreadJob script must run in ConstrainedLanguage mode with system lock down" {
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$results = Start-ThreadJob -ScriptBlock { $ExecutionContext.SessionState.LanguageMode } | Wait-Job | Receive-Job
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$results | Should -BeExactly "ConstrainedLanguage"
}
It "ThreadJob script block using variable must run in ConstrainedLanguage mode with system lock down" {
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$results = Start-ThreadJob -ScriptBlock { & $using:sb } | Wait-Job | Receive-Job
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$results | Should -BeExactly "ConstrainedLanguage"
}
It "ThreadJob script block argument variable must run in ConstrainedLanguage mode with system lock down" {
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$results = Start-ThreadJob -ScriptBlock { param ($sb) & $sb } -ArgumentList $sb | Wait-Job | Receive-Job
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$results | Should -BeExactly "ConstrainedLanguage"
}
It "ThreadJob script block piped variable must run in ConstrainedLanguage mode with system lock down" {
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$results = $sb | Start-ThreadJob -ScriptBlock { $input | ForEach-Object { & $_ } } | Wait-Job | Receive-Job
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$results | Should -BeExactly "ConstrainedLanguage"
}
}
Describe "ForEach-Object -Parallel Constrained Language Tests" -Tags 'Feature','RequireAdminOnWindows' {
BeforeAll {
$skipTest = -not $EnabledExperimentalFeatures.Contains('PSForEachObjectParallel')
if ($skipTest) {
Write-Verbose "Test Suite Skipped. The test suite requires the experimental feature 'PSForEachObjectParallel' to be enabled." -Verbose
$originalDefaultParameterValues = $PSDefaultParameterValues.Clone()
$PSDefaultParameterValues["it:skip"] = $true
}
}
AfterAll {
if ($skipTest) {
$global:PSDefaultParameterValues = $originalDefaultParameterValues
}
}
It 'Foreach-Object -Parallel must run in ConstrainedLanguage mode under system lock down' {
try
{
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$results = 1..1 | ForEach-Object -Parallel { $ExecutionContext.SessionState.LanguageMode }
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$results | Should -BeExactly "ConstrainedLanguage"
}
}
Describe "Dot sourced script block functions from trusted script files should not run FullLanguage in ConstrainedLanguage context" -Tags 'Feature','RequireAdminOnWindows' {
BeforeAll {
$scriptFileName = "TrustedScriptBlockTest_System32"
$scriptFilePath = Join-Path $TestDrive ($scriptFileName + ".ps1")
@'
function TrustedFn {
Write-Output $ExecutionContext.SessionState.LanguageMode
}
'@ | Out-File -FilePath $scriptFilePath
$scriptModuleName = "UntrustedModuleScriptBlockTest"
$scriptModulePath = Join-Path $TestDrive ($scriptModuleName + ".psm1")
@'
function RunScriptBlock {{
$sb = (Get-Command -Name {0}).ScriptBlock
1 | ForEach-Object $sb
TrustedFn
}}
'@ -f $scriptFilePath | Out-File -FilePath $scriptModulePath
}
It "Verifies a scriptblock from a trusted script file does not run as trusted" {
$result = $null
try
{
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Import-Module -Name $scriptModulePath -Force
$result = RunScriptBlock
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$result | Should -BeExactly "ConstrainedLanguage"
}
}
Describe "Dot sourcing trusted script in ConstrainedLanguage context is allowed when importing modules" -Tags 'Feature','RequireAdminOnWindows' {
BeforeAll {
$importModuleName = "ToImportTrustedModuleTest_System32"
$importModulePath = Join-Path $TestDrive ($importModuleName + ".psm1")
$modScript = @'
function ImportModuleFn { "ImportModuleFn: $($ExecutionContext.SessionState.LanguageMode)" }
Export-ModuleMember -Function "ImportModuleFn"
'@ | Out-File -FilePath $importModulePath
$scriptModuleName = "ImportTrustedModuleTest_System32"
$scriptModulePath = Join-Path $TestDrive ($scriptModuleName + ".psm1")
@'
Import-Module -Name {0} -Force
function ModuleFn {{ "ModuleFn: $($ExecutionContext.SessionState.LanguageMode)" }}
Export-ModuleMember -Function "ModuleFn","ImportModuleFn"
'@ -f $importModulePath | Out-File -FilePath $scriptModulePath
}
It "Verifies that trusted module functions run in FullLanguage" {
$result1 = $null
$result2 = $null
try
{
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Import-Module -Name $scriptModulePath -Force
$result1 = ModuleFn
$result2 = ImportModuleFn
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$result1 | Should -BeExactly "ModuleFn: FullLanguage"
$result2 | Should -BeExactly "ImportModuleFn: FullLanguage"
}
}
Describe "PowerShell classes are not allowed in constrained language mode" -Tags 'Feature','RequireAdminOnWindows' {
BeforeAll {
$randomClassName = "class_$(Get-Random -Max 9999)"
$script = @'
class {0} {{ static Hello([string] $msg) {{ [System.Console]::WriteLine("Hello from: $msg") }} }}
'@ -f $randomClassName
$modulePathName = "modulePath_$(Get-Random -Max 9999)"
$modulePath = Join-Path $testdrive $modulePathName
New-Item -Path $modulePath -ItemType Directory -Force
$untrustedScriptFile = Join-Path $modulePath "T1ScriptClass.ps1"
$script | Out-File -FilePath $untrustedScriptFile
$untrustedScriptModule = Join-Path $modulePath "T1ScriptClass.psm1"
$script | Out-File -FilePath $untrustedScriptModule
$trustedScriptFile = Join-Path $modulePath "T1ScriptClass_System32.ps1"
$script | Out-File -FilePath $trustedScriptFile
$trustedScriptModule = Join-Path $modulePath "T1ScriptClass_System32.psm1"
$script | Out-File -FilePath $trustedScriptModule
}
AfterAll {
Remove-Module -Name T1ScriptClass_System32 -Force -ErrorAction Ignore
}
It "Verifies that classes cannot be created in script running under constrained language" {
try
{
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Invoke-Expression -Command $script 2>$null -ErrorAction Stop
throw "No Error!"
}
catch
{
$expectedError = $_
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$expectedError.FullyQualifiedErrorId | Should -BeExactly "ClassesNotAllowedInConstrainedLanguage,Microsoft.PowerShell.Commands.InvokeExpressionCommand"
}
It "Verifies that classes cannot be created in script files running under constrained language" {
try
{
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
& ($untrustedScriptFile)
throw "No Error!"
}
catch
{
$expectedError = $_
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode -RevertLockdownMode
}
$expectedError.FullyQualifiedErrorId | Should -BeExactly "ClassesNotAllowedInConstrainedLanguage"
}
It "Verifies that classes cannot be created in untrusted script modules running under constrained language" {
try
{
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Import-Module -Name $untrustedScriptModule -ErrorAction Stop
throw "No Error!"
}
catch
{
$expectedError = $_
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode -RevertLockdownMode
}
$expectedError.FullyQualifiedErrorId | Should -BeExactly "ClassesNotAllowedInConstrainedLanguage"
}
It "Verifies that classes can be created in trusted script files running under constrained language" {
try
{
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
{ & ($trustedScriptFile) } | Should -Not -Throw
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode -RevertLockdownMode
}
}
It "Verifies that classes can be created in trusted script modules running under constrained language" {
try
{
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
{ Import-Module -Name $trustedScriptModule -ErrorAction Stop } | Should -Not -Throw
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -EnableFullLanguageMode -RevertLockdownMode
}
}
}
Describe "Invoke-History should not run command lines in FullLanguage mode when system is locked down" -Tags 'Feature','RequireAdminOnWindows' {
BeforeAll {
$LanguageModeHistoryFilePath = Join-Path $TestDrive "LanguageModeHistory.XML"
@'
<Objs Version="1.1.0.1" xmlns="http://schemas.microsoft.com/powershell/2004/04">
<Obj RefId="0">
<TN RefId="0">
<T>Microsoft.PowerShell.Commands.HistoryInfo</T>
<T>System.Object</T>
</TN>
<ToString>$ExecutionContext.SessionState.LanguageMode</ToString>
<Props>
<I64 N="Id">123</I64>
<S N="CommandLine">$ExecutionContext.SessionState.LanguageMode</S>
<Obj N="ExecutionStatus" RefId="1">
<TN RefId="1">
<T>System.Management.Automation.Runspaces.PipelineState</T>
<T>System.Enum</T>
<T>System.ValueType</T>
<T>System.Object</T>
</TN>
<ToString>Completed</ToString>
<I32>4</I32>
</Obj>
<DT N="StartExecutionTime">2018-07-26T14:36:33.923608-07:00</DT>
<DT N="EndExecutionTime">2018-07-26T14:36:33.9266018-07:00</DT>
</Props>
</Obj>
</Objs>
'@ | Out-File -FilePath $LanguageModeHistoryFilePath
$historyItem = Import-Clixml -Path $LanguageModeHistoryFilePath
}
It "Verifies that Invoke-History runs command lines in ConstrainedLanguage" {
$result = $null
try
{
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
$historyItem | Add-History
$retrievedItem = Get-History -Count 1
$result = $retrievedItem | Invoke-History
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$result | Should -BeExactly "ConstrainedLanguage"
}
}
Describe "Enter-PSHostProcess cmdlet should be disabled on locked down systems" -Tags 'Feature','RequireAdminOnWindows' {
It "Verifies that Enter-PSHostProcess is disabled with lock down policy" {
$expectedError = $null
try
{
Invoke-LanguageModeTestingSupportCmdlet -SetLockdownMode
$ExecutionContext.SessionState.LanguageMode = "ConstrainedLanguage"
Enter-PSHostProcess -Id 5555 -ErrorAction Stop
}
catch
{
$expectedError = $_
}
finally
{
Invoke-LanguageModeTestingSupportCmdlet -RevertLockdownMode -EnableFullLanguageMode
}
$expectedError.FullyQualifiedErrorId | Should -BeExactly 'EnterPSHostProcessCmdletDisabled,Microsoft.PowerShell.Commands.EnterPSHostProcessCommand'
}
}
}
finally
{
if ($defaultParamValues -ne $null)
{
$Global:PSDefaultParameterValues = $defaultParamValues
}
}
|
combined_dataset/train/non-malicious/Start-Encryption_2.ps1
|
Start-Encryption_2.ps1
|
## Start-Encryption
##################################################################################################
## Rijndael symmetric key encryption ... with no passes on the key. Very lazy.
## USAGE:
## $encrypted = Encrypt-String "Oisin Grehan is a genius" "P@ssw0rd"
## Decrypt-String $encrypted "P@ssw0rd"
##
## You can choose to return an array by passing -arrayOutput to Encrypt-String
## I chose to use Base64 encoded strings because they're easier to save ...
[Reflection.Assembly]::LoadWithPartialName("System.Security")
function Encrypt-String($String, $Passphrase, $salt="My Voice is my P455W0RD!", $init="Yet another key", [switch]$arrayOutput)
{
$r = new-Object System.Security.Cryptography.RijndaelManaged
$pass = [Text.Encoding]::UTF8.GetBytes($Passphrase)
$salt = [Text.Encoding]::UTF8.GetBytes($salt)
$r.Key = (new-Object Security.Cryptography.PasswordDeriveBytes $pass, $salt, "SHA1", 5).GetBytes(32) #256/8
$r.IV = (new-Object Security.Cryptography.SHA1Managed).ComputeHash( [Text.Encoding]::UTF8.GetBytes($init) )[0..15]
$c = $r.CreateEncryptor()
$ms = new-Object IO.MemoryStream
$cs = new-Object Security.Cryptography.CryptoStream $ms,$c,"Write"
$sw = new-Object IO.StreamWriter $cs
$sw.Write($String)
$sw.Close()
$cs.Close()
$ms.Close()
$r.Clear()
[byte[]]$result = $ms.ToArray()
if($arrayOutput) {
return $result
} else {
return [Convert]::ToBase64String($result)
}
}
function Decrypt-String($Encrypted, $Passphrase, $salt="My Voice is my P455W0RD!", $init="Yet another key")
{
if($Encrypted -is [string]){
$Encrypted = [Convert]::FromBase64String($Encrypted)
}
$r = new-Object System.Security.Cryptography.RijndaelManaged
$pass = [System.Text.Encoding]::UTF8.GetBytes($Passphrase)
$salt = [System.Text.Encoding]::UTF8.GetBytes($salt)
$r.Key = (new-Object Security.Cryptography.PasswordDeriveBytes $pass, $salt, "SHA1", 5).GetBytes(32) #256/8
$r.IV = (new-Object Security.Cryptography.SHA1Managed).ComputeHash( [Text.Encoding]::UTF8.GetBytes($init) )[0..15]
$d = $r.CreateDecryptor()
$ms = new-Object IO.MemoryStream @(,$Encrypted)
$cs = new-Object Security.Cryptography.CryptoStream $ms,$d,"Read"
$sr = new-Object IO.StreamReader $cs
Write-Output $sr.ReadToEnd()
$sr.Close()
$cs.Close()
$ms.Close()
$r.Clear()
}
|
combined_dataset/train/non-malicious/Search-StartMenu.ps1
|
Search-StartMenu.ps1
|
##############################################################################\n##\n## Search-StartMenu\n##\n## From Windows PowerShell Cookbook (O'Reilly)\n## by Lee Holmes (http://www.leeholmes.com/blog)\n##\n##############################################################################\n\n<#\n\n.SYNOPSIS\n\nSearch the Start Menu for items that match the provided text. This script\nsearches both the name (as displayed on the Start Menu itself,) and the\ndestination of the link.\n\n.Example\n\nSearch-StartMenu "Character Map" | Invoke-Item\nSearches for the "Character Map" appication, and then runs it\n\nSearch-StartMenu PowerShell | Select-FilteredObject | Invoke-Item\nSearches for anything with "PowerShell" in the application name, lets you\npick which one to launch, and then launches it.\n\n#>\n\nparam(\n ## The pattern to match\n [Parameter(Mandatory = $true)]\n $Pattern\n)\n\nSet-StrictMode -Version Latest\n\n## Get the locations of the start menu paths\n$myStartMenu = [Environment]::GetFolderPath("StartMenu")\n$shell = New-Object -Com WScript.Shell\n$allStartMenu = $shell.SpecialFolders.Item("AllUsersStartMenu")\n\n## Escape their search term, so that any regular expression\n## characters don't affect the search\n$escapedMatch = [Regex]::Escape($pattern)\n\n## Search for text in the link name\ndir $myStartMenu *.lnk -rec | ? { $_.Name -match "$escapedMatch" }\ndir $allStartMenu *.lnk -rec | ? { $_.Name -match "$escapedMatch" }\n\n## Search for text in the link destination\ndir $myStartMenu *.lnk -rec |\n Where-Object { $_ | Select-String "\\\\[^\\\\]*$escapedMatch\\." -Quiet }\ndir $allStartMenu *.lnk -rec |\n Where-Object { $_ | Select-String "\\\\[^\\\\]*$escapedMatch\\." -Quiet }
|
combined_dataset/train/non-malicious/Set-Computername_13.ps1
|
Set-Computername_13.ps1
|
function Set-ComputerName {
param( [switch]$help,
[string]$originalPCName=$(read-host "Please specify the current name of the computer"),
[string]$computerName=$(read-host "Please specify the new name of the computer"))
$usage = "set-ComputerName -originalPCname CurrentName -computername AnewName"
if ($help) {Write-Host $usage;break}
$computer = Get-WmiObject Win32_ComputerSystem -OriginalPCname OriginalName -computername $originalPCName
$computer.Rename($computerName)
}
|
combined_dataset/train/non-malicious/CLR4 module.ps1
|
CLR4 module.ps1
|
function Start-CLR4 {
[CmdletBinding()]
param ( [string] $cmd )
if ($PSVersionTable.CLRVersion.Major -eq 4)
{
write-debug 'already running clr 4'
invoke-expression $cmd;
return
}
$RunActivationConfigPath = resolve-path ~ | Join-Path -ChildPath .CLR4PowerShell;
write-debug "clr4 config path: $runactivationconfigpath"
if( -not( test-path $runactivationconfigpath ))
{
New-Item -Path $RunActivationConfigPath -ItemType Container | Out-Null;
@"
<?xml version="1.0" encoding="utf-8" ?>
<configuration>
<startup useLegacyV2RuntimeActivationPolicy="true">
<supportedRuntime version="v4.0"/>
</startup>
</configuration>
"@ | Set-Content -Path $RunActivationConfigPath\\powershell.exe.activation_config -Encoding UTF8;
}
$EnvVarName = 'COMPLUS_ApplicationMigrationRuntimeActivationConfigPath';
[Environment]::SetEnvironmentVariable($EnvVarName, $RunActivationConfigPath);
write-debug "current COMPLUS_ApplicationMigrationRuntimeActivationConfigPath: $env:COMPLUS_ApplicationMigrationRuntimeActivationConfigPath";
& powershell.exe -nologo -command "$cmd";
}
|
combined_dataset/train/non-malicious/399.ps1
|
399.ps1
|
$scriptBlock = {
$script:___ScriptName = 'psframework.taskengine'
try
{
while ($true)
{
if ([PSFramework.Runspace.RunspaceHost]::Runspaces[$___ScriptName.ToLower()].State -notlike "Running")
{
break
}
$task = $null
$tasksDone = @()
while ($task = [PSFramework.TaskEngine.TaskHost]::GetNextTask($tasksDone))
{
$task.State = 'Running'
try
{
[PSFramework.Utility.UtilityHost]::ImportScriptBlock($task.ScriptBlock)
$task.ScriptBlock.Invoke()
$task.State = 'Pending'
}
catch
{
$task.State = 'Error'
$task.LastError = $_
Write-PSFMessage -EnableException $false -Level Warning -Message "[Maintenance] Task '$($task.Name)' failed to execute" -ErrorRecord $_ -FunctionName "task:TaskEngine" -Target $task -ModuleName PSFramework
}
$task.LastExecution = Get-Date
if (-not $task.Pending -and ($task.Status -eq "Pending")) { $task.Status = 'Completed' }
$tasksDone += $task.Name
}
if (-not ([PSFramework.TaskEngine.TaskHost]::HasPendingTasks)) { break }
Start-Sleep -Seconds 5
}
}
catch { }
finally
{
[PSFramework.Runspace.RunspaceHost]::Runspaces[$___ScriptName.ToLower()].SignalStopped()
}
}
Register-PSFRunspace -ScriptBlock $scriptBlock -Name 'psframework.taskengine' -NoMessage
|
combined_dataset/train/non-malicious/sample_44_15.ps1
|
sample_44_15.ps1
|
# escape=`
# This Dockerfile will only build on Docker for Windows.
#
# If you change dependencies etc here, please also check and update
# the other Windows build resources:
#
# - DEVELOPER_GUIDE.md "Windows" section
# - appveyor.yml
# - .github/workflows/call-build-windows.yaml
# - dockerfiles/Dockerfile.windows
#
ARG WINDOWS_VERSION=ltsc2019
# Builder Image - Windows Server Core
FROM mcr.microsoft.com/windows/servercore:$WINDOWS_VERSION as builder
RUN setx /M PATH "%PATH%;C:\BuildTools\Common7\IDE\CommonExtensions\Microsoft\CMake\CMake\bin;C:\WinFlexBison"
SHELL ["powershell", "-Command", "$ErrorActionPreference = 'Stop'; $ProgressPreference = 'SilentlyContinue';"]
WORKDIR /local
# Install Visual Studio 2019
ADD https://aka.ms/vs/16/release/vs_buildtools.exe /local/vs_buildtools.exe
ADD https://aka.ms/vs/16/release/channel /local/VisualStudio.chman
RUN Start-Process /local/vs_buildtools.exe `
-ArgumentList '--quiet ', '--wait ', '--norestart ', '--nocache', `
'--installPath C:\BuildTools', `
'--channelUri C:\local\VisualStudio.chman', `
'--installChannelUri C:\local\VisualStudio.chman', `
'--add Microsoft.VisualStudio.Workload.VCTools', `
'--includeRecommended' -NoNewWindow -Wait;
ADD https://github.com/lexxmark/winflexbison/releases/download/v2.5.22/win_flex_bison-2.5.22.zip /local/win_flex_bison.zip
RUN Expand-Archive /local/win_flex_bison.zip -Destination /WinFlexBison; `
Copy-Item -Path /WinFlexBison/win_bison.exe /WinFlexBison/bison.exe; `
Copy-Item -Path /WinFlexBison/win_flex.exe /WinFlexBison/flex.exe;
# Technique from https://github.com/StefanScherer/dockerfiles-windows/blob/master/mongo/3.6/Dockerfile
WORKDIR /local
ADD https://aka.ms/vs/15/release/vc_redist.x64.exe /local/vc_redist.x64.exe
WORKDIR /fluent-bit/bin/
RUN Start-Process /local/vc_redist.x64.exe -ArgumentList '/install', '/quiet', '/norestart' -NoNewWindow -Wait; `
Copy-Item -Path /Windows/System32/msvcp140.dll -Destination /fluent-bit/bin/; `
Copy-Item -Path /Windows/System32/vccorlib140.dll -Destination /fluent-bit/bin/; `
Copy-Item -Path /Windows/System32/vcruntime140.dll -Destination /fluent-bit/bin/;
# Install Chocolatey and OpenSSL: https://github.com/StefanScherer/dockerfiles-windows/blob/main/openssl/Dockerfile
ENV chocolateyUseWindowsCompression false
ENV chocolateyVersion '1.4.0'
RUN iex ((new-object net.webclient).DownloadString('https://chocolatey.org/install.ps1')); `
choco feature disable --name showDownloadProgress ; `
choco install -y openssl;
# Build Fluent Bit from source - context must be the root of the Git repo
WORKDIR /src/build
COPY . /src/
RUN cmake -G "'Visual Studio 16 2019'" -DOPENSSL_ROOT_DIR='C:\Program Files\OpenSSL-Win64\lib\VC\x64\MT' -DOPENSSL_INCLUDE_DIR='C:\Program Files\OpenSSL-Win64\include' -DCMAKE_BUILD_TYPE=Release ../;`
cmake --build . --config Release;
# Set up config files and binaries in single /fluent-bit hierarchy for easy copy in later stage
RUN New-Item -Path /fluent-bit/etc/ -ItemType "directory"; `
Copy-Item -Path /src/conf/fluent-bit-win32.conf /fluent-bit/etc/fluent-bit.conf; `
Copy-Item -Path /src/conf/parsers.conf /fluent-bit/etc/; `
Copy-Item -Path /src/conf/parsers_ambassador.conf /fluent-bit/etc/; `
Copy-Item -Path /src/conf/parsers_java.conf /fluent-bit/etc/; `
Copy-Item -Path /src/conf/parsers_extra.conf /fluent-bit/etc/; `
Copy-Item -Path /src/conf/parsers_openstack.conf /fluent-bit/etc/; `
Copy-Item -Path /src/conf/parsers_cinder.conf /fluent-bit/etc/; `
Copy-Item -Path /src/conf/plugins.conf /fluent-bit/etc/; `
Copy-Item -Path /src/build/bin/Release/fluent-bit.exe /fluent-bit/bin/; `
Copy-Item -Path /src/build/bin/Release/fluent-bit.dll /fluent-bit/bin/;
#
# Runtime Image - Windows Server Core
#
FROM mcr.microsoft.com/windows/servercore:$WINDOWS_VERSION as runtime
ARG FLUENTBIT_VERSION=master
ARG IMAGE_CREATE_DATE
ARG IMAGE_SOURCE_REVISION
# Metadata as defined in OCI image spec annotations
# https://github.com/opencontainers/image-spec/blob/master/annotations.md
LABEL org.opencontainers.image.title="Fluent Bit" `
org.opencontainers.image.description="Fluent Bit is an open source and multi-platform Log Processor and Forwarder which allows you to collect data/logs from different sources, unify and send them to multiple destinations. It's fully compatible with Docker and Kubernetes environments." `
org.opencontainers.image.created=$IMAGE_CREATE_DATE `
org.opencontainers.image.version=$FLUENTBIT_VERSION `
org.opencontainers.image.authors="Eduardo Silva <eduardo@calyptia.com>" `
org.opencontainers.image.url="https://hub.docker.com/r/fluent/fluent-bit" `
org.opencontainers.image.documentation="https://docs.fluentbit.io/manual/" `
org.opencontainers.image.vendor="Fluent Organization" `
org.opencontainers.image.licenses="Apache-2.0" `
org.opencontainers.image.source="https://github.com/fluent/fluent-bit" `
org.opencontainers.image.revision=$IMAGE_SOURCE_REVISION
COPY --from=builder /fluent-bit /fluent-bit
RUN setx /M PATH "%PATH%;C:\fluent-bit\bin"
ENTRYPOINT [ "fluent-bit.exe" ]
# Hadolint gets confused by Windows it seems
# hadolint ignore=DL3025
CMD [ "fluent-bit.exe", "-c", "/fluent-bit/etc/fluent-bit.conf" ]
|
combined_dataset/train/non-malicious/1321.ps1
|
1321.ps1
|
function Remove-CSslCertificateBinding
{
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[IPAddress]
$IPAddress = '0.0.0.0',
[UInt16]
$Port = 443
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
if( -not (Test-CSslCertificateBinding -IPAddress $IPAddress -Port $Port) )
{
return
}
if( $IPAddress.AddressFamily -eq [Net.Sockets.AddressFamily]::InterNetworkV6 )
{
$ipPort = '[{0}]:{1}' -f $IPAddress,$Port
}
else
{
$ipPort = '{0}:{1}' -f $IPAddress,$Port
}
Invoke-ConsoleCommand -Target $ipPort `
-Action "removing SSL certificate binding" `
-ScriptBlock { netsh http delete sslcert ipPort=$ipPort }
}
|
combined_dataset/train/non-malicious/Get-WebSite_2.ps1
|
Get-WebSite_2.ps1
|
function Get-WebPage {
<#
.SYNOPSIS
Downloads web page from site.
.DESCRIPTION
Downloads web page from site and displays source code or displays total bytes of webpage downloaded
.PARAMETER Url
URL of the website to test access to.
.PARAMETER UseDefaultCredentials
Use the currently authenticated user's credentials
.PARAMETER Proxy
Used to connect via a proxy
.PARAMETER Credential
Provide alternate credentials
.PARAMETER ShowSize
Displays the size of the downloaded page in Kilobytes
.NOTES
Name: Get-WebPage
Author: Boe Prox
DateCreated: 08Feb2011
.EXAMPLE
Get-WebPage -url "http://www.bing.com"
Description
------------
Returns the source code from bing.com -showsize
.EXAMPLE
Get-WebPage -url "http://www.bing.com" -ShowSize
Description
------------
Returns the size of the webpage bing.com in bytes.
#>
[cmdletbinding(
DefaultParameterSetName = 'url',
ConfirmImpact = 'low'
)]
Param(
[Parameter(
Mandatory = $True,
Position = 0,
ParameterSetName = '',
ValueFromPipeline = $True)]
[string][ValidatePattern("^(http|https)\\://*")]$Url,
[Parameter(
Position = 1,
Mandatory = $False,
ParameterSetName = 'defaultcred')]
[switch]$UseDefaultCredentials,
[Parameter(
Mandatory = $False,
ParameterSetName = '')]
[string]$Proxy,
[Parameter(
Mandatory = $False,
ParameterSetName = 'altcred')]
[switch]$Credential,
[Parameter(
Mandatory = $False,
ParameterSetName = '')]
[switch]$ShowSize
)
Begin {
$psBoundParameters.GetEnumerator() | % {
Write-Verbose "Parameter: $_"
}
#Create the initial WebClient object
Write-Verbose "Creating web client object"
$wc = New-Object Net.WebClient
#Use Proxy address if specified
If ($PSBoundParameters.ContainsKey('Proxy')) {
#Create Proxy Address for Web Request
Write-Verbose "Creating proxy address and adding into Web Request"
$wc.Proxy = New-Object -TypeName Net.WebProxy($proxy,$True)
}
#Determine if using Default Credentials
If ($PSBoundParameters.ContainsKey('UseDefaultCredentials')) {
#Set to True, otherwise remains False
Write-Verbose "Using Default Credentials"
$webrequest.UseDefaultCredentials = $True
}
#Determine if using Alternate Credentials
If ($PSBoundParameters.ContainsKey('Credentials')) {
#Prompt for alternate credentals
Write-Verbose "Prompt for alternate credentials"
$wc.Credential = (Get-Credential).GetNetworkCredential()
}
}
Process {
Try {
If ($ShowSize) {
#Get the size of the webpage
Write-Verbose "Downloading web page and determining size"
"{0:N0}" -f ($wr.DownloadString($url) | Out-String).length -as [INT]
}
Else {
#Get the contents of the webpage
Write-Verbose "Downloading web page and displaying source code"
$wc.DownloadString($url)
}
}
Catch {
Write-Warning "$($Error[0])"
}
}
}
|
combined_dataset/train/non-malicious/sample_24_34.ps1
|
sample_24_34.ps1
|
Manifest-Version: 1.0
Name: com/q1labs/sem/dsm/checkpoint/firewall/CheckPoint$SysEnum.class
SHA-256-Digest: Dim/Do7LRwT7Wvac11np/+Ykp7+A1taXnG153xK7eVo=
Name: com/q1labs/sem/dsm/checkpoint/firewall/CheckPointConfigParameter
s.class
SHA-256-Digest: aZ9YC9A2Va3saVusmXFad4rUuNsBySK8or8eDH4QEhw=
Name: com/q1labs/sem/dsm/checkpoint/firewall/CheckPoint$CpEnum.class
SHA-256-Digest: Af4UqWhDuiBrN28d4CFG2hKpR8/jYwnLfAThTDvLgjo=
Name: com/q1labs/sem/dsm/checkpoint/firewall/CheckPoint$Products.class
SHA-256-Digest: YYAkLdZ1+/XS5wrGnn3u6OG7aAV8wsNfznoMshcZUL0=
Name: com/q1labs/sem/dsm/checkpoint/firewall/CheckPoint$EndPointSecuri
tyVPNEnum.class
SHA-256-Digest: SSr7YHCrmrbPksbXtNMvoEoDaNBonGVIp/BDzfxeAgU=
Name: com/q1labs/sem/dsm/checkpoint/firewall/CheckPoint$FieldMapping.c
lass
SHA-256-Digest: rldjhzTnKmdKdwBB22HE2EdwN4qHCIlTtvZ+1Aorax8=
Name: com/q1labs/sem/dsm/checkpoint/firewall/CheckPoint$FailureReasonE
num.class
SHA-256-Digest: 8nv6jqkAFNz/USOt2aOD8L6+L8Df0XVZHpdh8uhOwQE=
Name: com/q1labs/sem/dsm/checkpoint/firewall/CheckPoint$1.class
SHA-256-Digest: CPeHmk85rc733kklLN5EEOwuHJfgdp5t9RHSFjODiWs=
Name: com/q1labs/sem/dsm/checkpoint/firewall/CheckPointConfigParameter
s$CheckPointConfigParametersEnum.class
SHA-256-Digest: QnNJ9C3zFsPOi/hfqDfAjBxXpn2CTG3KzlyKI68zVas=
Name: com/q1labs/sem/dsm/checkpoint/firewall/CheckPoint.class
SHA-256-Digest: ljlPooq6vDlY4P9KGK1kbl32bJOprsLOFdCX/s0qRM0=
|
combined_dataset/train/non-malicious/563.ps1
|
563.ps1
|
function Test-SPOField
{
[CmdletBinding()]
param
(
[Parameter(Mandatory=$true, Position=1)]
[Microsoft.SharePoint.Client.List] $list,
[Parameter(Mandatory=$true, Position=2)]
[Microsoft.SharePoint.Client.FieldCollection] $fields,
[Parameter(Mandatory=$true, Position=3)]
[string] $fieldName
)
$fieldNames = $fields.GetEnumerator() | select -ExpandProperty Title
$exists = ($fieldNames -contains $fieldName)
return $exists
}
|
combined_dataset/train/non-malicious/1830.ps1
|
1830.ps1
|
Import-Module HelpersCommon
Describe "Test-Connection" -tags "CI" {
BeforeAll {
$oldInformationPreference = $InformationPreference
$oldProgressPreference = $ProgressPreference
$InformationPreference = "Ignore"
$ProgressPreference = "SilentlyContinue"
$hostName = [System.Net.Dns]::GetHostName()
$targetName = "localhost"
$targetAddress = "127.0.0.1"
$targetAddressIPv6 = [System.Net.Dns]::GetHostEntry($targetName).AddressList[0].IPAddressToString
$UnreachableAddress = "10.11.12.13"
$realAddress = [System.Net.Dns]::GetHostEntry($hostName).AddressList |
Where-Object {$_.AddressFamily -eq "InterNetwork"} |
Select-Object -First 1 |
Foreach-Object {$_.IPAddressToString}
$jobContinues = Start-Job { Test-Connection $using:targetAddress -Continues }
}
AfterAll {
$InformationPreference = $oldInformationPreference
$ProgressPreference = $oldProgressPreference
}
Context "Ping" {
It "Default parameter set is 'Ping'" {
$result = Test-Connection $targetName
$replies = $result.Replies
$result.Count | Should -Be 1
$result[0] | Should -BeOfType "Microsoft.PowerShell.Commands.TestConnectionCommand+PingReport"
$result[0].Source | Should -BeExactly $hostName
$result[0].Destination | Should -BeExactly $targetName
$replies.Count | Should -Be 4
$replies[0] | Should -BeOfType "System.Net.NetworkInformation.PingReply"
$replies[0].Address | Should -BeExactly $targetAddressIPv6
$replies[0].Status | Should -BeExactly "Success"
if ($isWindows) {
$replies[0].Buffer.Count | Should -Be 32
}
}
It "Count parameter" {
$result1 = Test-Connection -Ping $targetName -Count 1
$result2 = Test-Connection $targetName -Count 2
$result1.Replies.Count | Should -Be 1
$result2.Replies.Count | Should -Be 2
}
It "Quiet works" {
$result1 = Test-Connection $targetName -Count 1 -Quiet
$result2 = Test-Connection $UnreachableAddress -Count 1 -Quiet
$result1 | Should -BeTrue
$result2 | Should -BeFalse
}
It "Ping fake host" {
{ $result = Test-Connection "fakeHost" -Count 1 -Quiet -ErrorAction Stop } | Should -Throw -ErrorId "TestConnectionException,Microsoft.PowerShell.Commands.TestConnectionCommand"
if (!$isWindows) {
$Error[0].Exception.InnerException.ErrorCode | Should -Be -131073
} else {
$Error[0].Exception.InnerException.ErrorCode | Should -Be 11001
}
}
It "Force IPv4 with implicit PingOptions" {
$result = Test-Connection $hostName -Count 1 -IPv4
$result.Replies[0].Address | Should -BeExactly $realAddress
$result.Replies[0].Options.Ttl | Should -BeLessOrEqual 128
if ($isWindows) {
$result.Replies[0].Options.DontFragment | Should -BeFalse
}
}
It "Force IPv4 with explicit PingOptions" {
$result1 = Test-Connection $hostName -Count 1 -IPv4 -MaxHops 10 -DontFragment
$result2 = Test-Connection 8.8.8.8 -Count 1 -IPv4 -MaxHops 1 -DontFragment
$result1.Replies[0].Address | Should -BeExactly $realAddress
$result1.Replies[0].Options.Ttl | Should -BeLessOrEqual 128
if (!$isWindows) {
if ( (Get-PlatformInfo) -eq "alpine" ) {
$result1.Replies[0].Options.DontFragment | Should -Be $true
}
else {
$result1.Replies[0].Options.DontFragment | Should -BeNullOrEmpty
}
$result2.Replies[0].Status | Should -BeIn "TtlExpired","TimedOut","Success"
} else {
$result1.Replies[0].Options.DontFragment | Should -BeFalse
$result2.Replies[0].Status | Should -BeIn "TtlExpired","TimedOut",$null
}
}
It "Force IPv6" -Pending {
$result = Test-Connection $targetName -Count 1 -IPv6
$result.Replies[0].Address | Should -BeExactly $targetAddressIPv6
$result.Replies[0].Options | Should -Be $null
}
It "MaxHops Should -Be greater 0" {
{ Test-Connection $targetName -MaxHops 0 } | Should -Throw -ErrorId "System.ArgumentOutOfRangeException,Microsoft.PowerShell.Commands.TestConnectionCommand"
{ Test-Connection $targetName -MaxHops -1 } | Should -Throw -ErrorId "ParameterArgumentValidationError,Microsoft.PowerShell.Commands.TestConnectionCommand"
}
It "Count Should -Be greater 0" {
{ Test-Connection $targetName -Count 0 } | Should -Throw -ErrorId "ParameterArgumentValidationError,Microsoft.PowerShell.Commands.TestConnectionCommand"
{ Test-Connection $targetName -Count -1 } | Should -Throw -ErrorId "ParameterArgumentValidationError,Microsoft.PowerShell.Commands.TestConnectionCommand"
}
It "Delay Should -Be greater 0" {
{ Test-Connection $targetName -Delay 0 } | Should -Throw -ErrorId "ParameterArgumentValidationError,Microsoft.PowerShell.Commands.TestConnectionCommand"
{ Test-Connection $targetName -Delay -1 } | Should -Throw -ErrorId "ParameterArgumentValidationError,Microsoft.PowerShell.Commands.TestConnectionCommand"
}
It "Delay works" {
$result1 = measure-command {Test-Connection localhost -Count 2}
$result2 = measure-command {Test-Connection localhost -Delay 4 -Count 2}
$result1.TotalSeconds | Should -BeGreaterThan 1
$result1.TotalSeconds | Should -BeLessThan 3
$result2.TotalSeconds | Should -BeGreaterThan 4
}
It "BufferSize Should -Be between 0 and 65500" {
{ Test-Connection $targetName -BufferSize 0 } | Should Not Throw
{ Test-Connection $targetName -BufferSize -1 } | Should -Throw -ErrorId "ParameterArgumentValidationError,Microsoft.PowerShell.Commands.TestConnectionCommand"
{ Test-Connection $targetName -BufferSize 65501 } | Should -Throw -ErrorId "ParameterArgumentValidationError,Microsoft.PowerShell.Commands.TestConnectionCommand"
}
It "BufferSize works" -Pending:(!$IsWindows) {
$result = Test-Connection $targetName -Count 1 -BufferSize 2
if ($isWindows) {
$result.Replies[0].Buffer.Count | Should -Be 2
}
}
It "ResolveDestination for address" {
$result = Test-Connection $targetAddress -ResolveDestination -Count 1
$resolvedName = [System.Net.DNS]::GetHostEntry($targetAddress).HostName
$result.Destination | Should -BeExactly $resolvedName
$result.Replies[0].Address | Should -BeExactly $targetAddress
}
It "ResolveDestination for name" {
$result = Test-Connection $targetName -ResolveDestination -Count 1
$resolvedName = [System.Net.DNS]::GetHostByName($targetName).HostName
$resolvedAddress = ([System.Net.DNS]::GetHostAddresses($resolvedName)[0] -split "%")[0]
$result.Destination | Should -BeExactly $resolvedName
$result.Replies[0].Address | Should -BeExactly $resolvedAddress
}
It "TimeOut works" {
(Measure-Command { Test-Connection $UnreachableAddress -Count 1 -TimeOut 1 }).TotalSeconds | Should -BeLessThan 3
(Measure-Command { Test-Connection $UnreachableAddress -Count 1 -TimeOut 4 }).TotalSeconds | Should -BeGreaterThan 3
}
It "Continues works" {
$result = Receive-Job $jobContinues
Remove-Job $jobContinues -Force
$result.Count | Should -BeGreaterThan 4
$result[0].Address | Should -BeExactly $targetAddress
$result[0].Status | Should -BeExactly "Success"
if ($isWindows) {
$result[0].Buffer.Count | Should -Be 32
}
}
}
Context "MTUSizeDetect" {
It "MTUSizeDetect works" -pending:($IsMacOS) {
$result = Test-Connection $hostName -MTUSizeDetect
$result | Should -BeOfType "System.Net.NetworkInformation.PingReply"
$result.Destination | Should -BeExactly $hostName
$result.Status | Should -BeExactly "Success"
$result.MTUSize | Should -BeGreaterThan 0
}
It "Quiet works" -pending:($IsMacOS) {
$result = Test-Connection $hostName -MTUSizeDetect -Quiet
$result | Should -BeOfType "Int32"
$result | Should -BeGreaterThan 0
}
}
Context "TraceRoute" {
It "TraceRoute works" {
$result = Test-Connection $hostName -TraceRoute -IPv4
$replies = $result.Replies
$pingReplies = $replies[-1].PingReplies
$result.Count | Should -Be 1
$result | Should -BeOfType "Microsoft.PowerShell.Commands.TestConnectionCommand+TraceRouteResult"
$result.Source | Should -BeExactly $hostName
$result.DestinationAddress | Should -BeExactly $realAddress
$result.DestinationHost | Should -BeExactly $hostName
$replies.Count | Should -BeGreaterThan 0
$replies[0] | Should -BeOfType "Microsoft.PowerShell.Commands.TestConnectionCommand+TraceRouteReply"
$replies[0].Hop | Should -Be 1
$pingReplies.Count | Should -Be 3
$pingReplies[0].Address | Should -BeExactly $realAddress
$pingReplies[0].Status | Should -BeExactly "Success"
if (!$isWindows) {
$pingReplies[0].Buffer.Count | Should -Match '^0$|^32$'
} else {
$pingReplies[0].Buffer.Count | Should -Be 32
}
}
It "Quiet works" {
$result = Test-Connection $hostName -TraceRoute -Quiet 6> $null
$result | Should -BeTrue
}
}
}
Describe "Connection" -Tag "CI", "RequireAdminOnWindows" {
BeforeAll {
$WebListener = Start-WebListener
$UnreachableAddress = "10.11.12.13"
}
It "Test connection to local host port 80" {
Test-Connection '127.0.0.1' -TCPPort $WebListener.HttpPort | Should -BeTrue
}
It "Test connection to unreachable host port 80" {
Test-Connection $UnreachableAddress -TCPPort 80 -TimeOut 1 | Should -BeFalse
}
}
|
combined_dataset/train/non-malicious/sample_24_59.ps1
|
sample_24_59.ps1
|
#
# Module manifest for module 'OCI.PSModules.Keymanagement'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Keymanagement.dll'
# Version number of this module.
ModuleVersion = '82.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '4a9c2614-4d97-430e-b149-edbf0d70bf0b'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Keymanagement Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Keymanagement.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Backup-OCIKeymanagementKey', 'Backup-OCIKeymanagementVault',
'Disable-OCIKeymanagementKey', 'Enable-OCIKeymanagementKey',
'Export-OCIKeymanagementKey',
'Get-OCIKeymanagementEkmsPrivateEndpoint',
'Get-OCIKeymanagementEkmsPrivateEndpointsList',
'Get-OCIKeymanagementHsmCluster',
'Get-OCIKeymanagementHsmClustersList',
'Get-OCIKeymanagementHsmPartition',
'Get-OCIKeymanagementHsmPartitionsList', 'Get-OCIKeymanagementKey',
'Get-OCIKeymanagementKeysList', 'Get-OCIKeymanagementKeyVersion',
'Get-OCIKeymanagementKeyVersionsList',
'Get-OCIKeymanagementPreCoUserCredentials',
'Get-OCIKeymanagementReplicationStatus',
'Get-OCIKeymanagementVault',
'Get-OCIKeymanagementVaultReplicasList',
'Get-OCIKeymanagementVaultsList', 'Get-OCIKeymanagementVaultUsage',
'Get-OCIKeymanagementWrappingKey', 'Import-OCIKeymanagementKey',
'Import-OCIKeymanagementKeyVersion',
'Invoke-OCIKeymanagementDecrypt',
'Invoke-OCIKeymanagementDownloadCertificateSigningRequest',
'Invoke-OCIKeymanagementEncrypt',
'Invoke-OCIKeymanagementScheduleHsmClusterDeletion',
'Invoke-OCIKeymanagementScheduleKeyDeletion',
'Invoke-OCIKeymanagementScheduleKeyVersionDeletion',
'Invoke-OCIKeymanagementScheduleVaultDeletion',
'Invoke-OCIKeymanagementSign', 'Invoke-OCIKeymanagementVerify',
'Move-OCIKeymanagementHsmClusterCompartment',
'Move-OCIKeymanagementKeyCompartment',
'Move-OCIKeymanagementVaultCompartment',
'New-OCIKeymanagementDataEncryptionKey',
'New-OCIKeymanagementEkmsPrivateEndpoint',
'New-OCIKeymanagementHsmCluster', 'New-OCIKeymanagementKey',
'New-OCIKeymanagementKeyVersion', 'New-OCIKeymanagementVault',
'New-OCIKeymanagementVaultReplica',
'Remove-OCIKeymanagementEkmsPrivateEndpoint',
'Remove-OCIKeymanagementVaultReplica',
'Restore-OCIKeymanagementKeyFromFile',
'Restore-OCIKeymanagementKeyFromObjectStore',
'Restore-OCIKeymanagementVaultFromFile',
'Restore-OCIKeymanagementVaultFromObjectStore',
'Stop-OCIKeymanagementHsmClusterDeletion',
'Stop-OCIKeymanagementKeyDeletion',
'Stop-OCIKeymanagementKeyVersionDeletion',
'Stop-OCIKeymanagementVaultDeletion',
'Update-OCIKeymanagementEkmsPrivateEndpoint',
'Update-OCIKeymanagementHsmCluster', 'Update-OCIKeymanagementKey',
'Update-OCIKeymanagementVault',
'Write-OCIKeymanagementPartitionCertificates'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Keymanagement'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/410.ps1
|
410.ps1
|
function Convert-PsfMessageException
{
[CmdletBinding()]
Param (
[Parameter(Mandatory = $true)]
$Exception,
[Parameter(Mandatory = $true)]
[string]
$FunctionName,
[Parameter(Mandatory = $true)]
[string]
$ModuleName
)
if ($null -eq $Exception) { return }
$typeName = $Exception.GetType().FullName.ToLower()
if ([PSFramework.Message.MessageHost]::ExceptionTransforms.ContainsKey($typeName))
{
$scriptBlock = [PSFramework.Message.MessageHost]::ExceptionTransforms[$typeName]
try
{
$tempException = $ExecutionContext.InvokeCommand.InvokeScript($false, ([scriptblock]::Create($scriptBlock.ToString())), $null, $Exception)
return $tempException
}
catch
{
[PSFramework.Message.MessageHost]::WriteTransformError($_, $FunctionName, $ModuleName, $Exception, "Exception", ([System.Management.Automation.Runspaces.Runspace]::DefaultRunspace.InstanceId))
return $Exception
}
}
if ($transform = [PSFramework.Message.MessageHost]::ExceptionTransformList.Get($typeName, $ModuleName, $FunctionName))
{
try
{
$tempException = $ExecutionContext.InvokeCommand.InvokeScript($false, ([scriptblock]::Create($transform.ScriptBlock.ToString())), $null, $Exception)
return $tempException
}
catch
{
[PSFramework.Message.MessageHost]::WriteTransformError($_, $FunctionName, $ModuleName, $Exception, "Target", ([System.Management.Automation.Runspaces.Runspace]::DefaultRunspace.InstanceId))
return $Exception
}
}
return $Exception
}
|
combined_dataset/train/non-malicious/sample_15_54.ps1
|
sample_15_54.ps1
|
<#
.Synopsis
Activate a Python virtual environment for the current PowerShell session.
.Description
Pushes the python executable for a virtual environment to the front of the
$Env:PATH environment variable and sets the prompt to signify that you are
in a Python virtual environment. Makes use of the command line switches as
well as the `pyvenv.cfg` file values present in the virtual environment.
.Parameter VenvDir
Path to the directory that contains the virtual environment to activate. The
default value for this is the parent of the directory that the Activate.ps1
script is located within.
.Parameter Prompt
The prompt prefix to display when this virtual environment is activated. By
default, this prompt is the name of the virtual environment folder (VenvDir)
surrounded by parentheses and followed by a single space (ie. '(.venv) ').
.Example
Activate.ps1
Activates the Python virtual environment that contains the Activate.ps1 script.
.Example
Activate.ps1 -Verbose
Activates the Python virtual environment that contains the Activate.ps1 script,
and shows extra information about the activation as it executes.
.Example
Activate.ps1 -VenvDir C:\Users\MyUser\Common\.venv
Activates the Python virtual environment located in the specified location.
.Example
Activate.ps1 -Prompt "MyPython"
Activates the Python virtual environment that contains the Activate.ps1 script,
and prefixes the current prompt with the specified string (surrounded in
parentheses) while the virtual environment is active.
.Notes
On Windows, it may be required to enable this Activate.ps1 script by setting the
execution policy for the user. You can do this by issuing the following PowerShell
command:
PS C:\> Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUser
For more information on Execution Policies:
https://go.microsoft.com/fwlink/?LinkID=135170
#>
Param(
[Parameter(Mandatory = $false)]
[String]
$VenvDir,
[Parameter(Mandatory = $false)]
[String]
$Prompt
)
<# Function declarations --------------------------------------------------- #>
<#
.Synopsis
Remove all shell session elements added by the Activate script, including the
addition of the virtual environment's Python executable from the beginning of
the PATH variable.
.Parameter NonDestructive
If present, do not remove this function from the global namespace for the
session.
#>
function global:deactivate ([switch]$NonDestructive) {
# Revert to original values
# The prior prompt:
if (Test-Path -Path Function:_OLD_VIRTUAL_PROMPT) {
Copy-Item -Path Function:_OLD_VIRTUAL_PROMPT -Destination Function:prompt
Remove-Item -Path Function:_OLD_VIRTUAL_PROMPT
}
# The prior PYTHONHOME:
if (Test-Path -Path Env:_OLD_VIRTUAL_PYTHONHOME) {
Copy-Item -Path Env:_OLD_VIRTUAL_PYTHONHOME -Destination Env:PYTHONHOME
Remove-Item -Path Env:_OLD_VIRTUAL_PYTHONHOME
}
# The prior PATH:
if (Test-Path -Path Env:_OLD_VIRTUAL_PATH) {
Copy-Item -Path Env:_OLD_VIRTUAL_PATH -Destination Env:PATH
Remove-Item -Path Env:_OLD_VIRTUAL_PATH
}
# Just remove the VIRTUAL_ENV altogether:
if (Test-Path -Path Env:VIRTUAL_ENV) {
Remove-Item -Path env:VIRTUAL_ENV
}
# Just remove VIRTUAL_ENV_PROMPT altogether.
if (Test-Path -Path Env:VIRTUAL_ENV_PROMPT) {
Remove-Item -Path env:VIRTUAL_ENV_PROMPT
}
# Just remove the _PYTHON_VENV_PROMPT_PREFIX altogether:
if (Get-Variable -Name "_PYTHON_VENV_PROMPT_PREFIX" -ErrorAction SilentlyContinue) {
Remove-Variable -Name _PYTHON_VENV_PROMPT_PREFIX -Scope Global -Force
}
# Leave deactivate function in the global namespace if requested:
if (-not $NonDestructive) {
Remove-Item -Path function:deactivate
}
}
<#
.Description
Get-PyVenvConfig parses the values from the pyvenv.cfg file located in the
given folder, and returns them in a map.
For each line in the pyvenv.cfg file, if that line can be parsed into exactly
two strings separated by `=` (with any amount of whitespace surrounding the =)
then it is considered a `key = value` line. The left hand string is the key,
the right hand is the value.
If the value starts with a `'` or a `"` then the first and last character is
stripped from the value before being captured.
.Parameter ConfigDir
Path to the directory that contains the `pyvenv.cfg` file.
#>
function Get-PyVenvConfig(
[String]
$ConfigDir
) {
Write-Verbose "Given ConfigDir=$ConfigDir, obtain values in pyvenv.cfg"
# Ensure the file exists, and issue a warning if it doesn't (but still allow the function to continue).
$pyvenvConfigPath = Join-Path -Resolve -Path $ConfigDir -ChildPath 'pyvenv.cfg' -ErrorAction Continue
# An empty map will be returned if no config file is found.
$pyvenvConfig = @{ }
if ($pyvenvConfigPath) {
Write-Verbose "File exists, parse `key = value` lines"
$pyvenvConfigContent = Get-Content -Path $pyvenvConfigPath
$pyvenvConfigContent | ForEach-Object {
$keyval = $PSItem -split "\s*=\s*", 2
if ($keyval[0] -and $keyval[1]) {
$val = $keyval[1]
# Remove extraneous quotations around a string value.
if ("'""".Contains($val.Substring(0, 1))) {
$val = $val.Substring(1, $val.Length - 2)
}
$pyvenvConfig[$keyval[0]] = $val
Write-Verbose "Adding Key: '$($keyval[0])'='$val'"
}
}
}
return $pyvenvConfig
}
<# Begin Activate script --------------------------------------------------- #>
# Determine the containing directory of this script
$VenvExecPath = Split-Path -Parent $MyInvocation.MyCommand.Definition
$VenvExecDir = Get-Item -Path $VenvExecPath
Write-Verbose "Activation script is located in path: '$VenvExecPath'"
Write-Verbose "VenvExecDir Fullname: '$($VenvExecDir.FullName)"
Write-Verbose "VenvExecDir Name: '$($VenvExecDir.Name)"
# Set values required in priority: CmdLine, ConfigFile, Default
# First, get the location of the virtual environment, it might not be
# VenvExecDir if specified on the command line.
if ($VenvDir) {
Write-Verbose "VenvDir given as parameter, using '$VenvDir' to determine values"
}
else {
Write-Verbose "VenvDir not given as a parameter, using parent directory name as VenvDir."
$VenvDir = $VenvExecDir.Parent.FullName.TrimEnd("\\/")
Write-Verbose "VenvDir=$VenvDir"
}
# Next, read the `pyvenv.cfg` file to determine any required value such
# as `prompt`.
$pyvenvCfg = Get-PyVenvConfig -ConfigDir $VenvDir
# Next, set the prompt from the command line, or the config file, or
# just use the name of the virtual environment folder.
if ($Prompt) {
Write-Verbose "Prompt specified as argument, using '$Prompt'"
}
else {
Write-Verbose "Prompt not specified as argument to script, checking pyvenv.cfg value"
if ($pyvenvCfg -and $pyvenvCfg['prompt']) {
Write-Verbose " Setting based on value in pyvenv.cfg='$($pyvenvCfg['prompt'])'"
$Prompt = $pyvenvCfg['prompt'];
}
else {
Write-Verbose " Setting prompt based on parent's directory's name. (Is the directory name passed to venv module when creating the virtual environment)"
Write-Verbose " Got leaf-name of $VenvDir='$(Split-Path -Path $venvDir -Leaf)'"
$Prompt = Split-Path -Path $venvDir -Leaf
}
}
Write-Verbose "Prompt = '$Prompt'"
Write-Verbose "VenvDir='$VenvDir'"
# Deactivate any currently active virtual environment, but leave the
# deactivate function in place.
deactivate -nondestructive
# Now set the environment variable VIRTUAL_ENV, used by many tools to determine
# that there is an activated venv.
$env:VIRTUAL_ENV = $VenvDir
if (-not $Env:VIRTUAL_ENV_DISABLE_PROMPT) {
Write-Verbose "Setting prompt to '$Prompt'"
# Set the prompt to include the env name
# Make sure _OLD_VIRTUAL_PROMPT is global
function global:_OLD_VIRTUAL_PROMPT { "" }
Copy-Item -Path function:prompt -Destination function:_OLD_VIRTUAL_PROMPT
New-Variable -Name _PYTHON_VENV_PROMPT_PREFIX -Description "Python virtual environment prompt prefix" -Scope Global -Option ReadOnly -Visibility Public -Value $Prompt
function global:prompt {
Write-Host -NoNewline -ForegroundColor Green "($_PYTHON_VENV_PROMPT_PREFIX) "
_OLD_VIRTUAL_PROMPT
}
$env:VIRTUAL_ENV_PROMPT = $Prompt
}
# Clear PYTHONHOME
if (Test-Path -Path Env:PYTHONHOME) {
Copy-Item -Path Env:PYTHONHOME -Destination Env:_OLD_VIRTUAL_PYTHONHOME
Remove-Item -Path Env:PYTHONHOME
}
# Add the venv to the PATH
Copy-Item -Path Env:PATH -Destination Env:_OLD_VIRTUAL_PATH
$Env:PATH = "$VenvExecDir$([System.IO.Path]::PathSeparator)$Env:PATH"
# SIG # Begin signature block
# MIIvIwYJKoZIhvcNAQcCoIIvFDCCLxACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBnL745ElCYk8vk
# dBtMuQhLeWJ3ZGfzKW4DHCYzAn+QB6CCE8MwggWQMIIDeKADAgECAhAFmxtXno4h
# MuI5B72nd3VcMA0GCSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNV
# BAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0xMzA4MDExMjAwMDBaFw0z
# ODAxMTUxMjAwMDBaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJ
# bmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0
# IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3EMB/z
# G6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKyunWZ
# anMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsFxl7s
# Wxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU15zHL
# 2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJBMtfb
# BHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObURWBf3
# JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6nj3c
# AORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxBYKqx
# YxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5SUUd0
# viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+xq4aL
# T8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjQjBAMA8GA1Ud
# EwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBTs1+OC0nFdZEzf
# Lmc/57qYrhwPTzANBgkqhkiG9w0BAQwFAAOCAgEAu2HZfalsvhfEkRvDoaIAjeNk
# aA9Wz3eucPn9mkqZucl4XAwMX+TmFClWCzZJXURj4K2clhhmGyMNPXnpbWvWVPjS
# PMFDQK4dUPVS/JA7u5iZaWvHwaeoaKQn3J35J64whbn2Z006Po9ZOSJTROvIXQPK
# 7VB6fWIhCoDIc2bRoAVgX+iltKevqPdtNZx8WorWojiZ83iL9E3SIAveBO6Mm0eB
# cg3AFDLvMFkuruBx8lbkapdvklBtlo1oepqyNhR6BvIkuQkRUNcIsbiJeoQjYUIp
# 5aPNoiBB19GcZNnqJqGLFNdMGbJQQXE9P01wI4YMStyB0swylIQNCAmXHE/A7msg
# dDDS4Dk0EIUhFQEI6FUy3nFJ2SgXUE3mvk3RdazQyvtBuEOlqtPDBURPLDab4vri
# RbgjU2wGb2dVf0a1TD9uKFp5JtKkqGKX0h7i7UqLvBv9R0oN32dmfrJbQdA75PQ7
# 9ARj6e/CVABRoIoqyc54zNXqhwQYs86vSYiv85KZtrPmYQ/ShQDnUBrkG5WdGaG5
# nLGbsQAe79APT0JsyQq87kP6OnGlyE0mpTX9iV28hWIdMtKgK1TtmlfB2/oQzxm3
# i0objwG2J5VT6LaJbVu8aNQj6ItRolb58KaAoNYes7wPD1N1KarqE3fk3oyBIa0H
# EEcRrYc9B9F1vM/zZn4wggawMIIEmKADAgECAhAIrUCyYNKcTJ9ezam9k67ZMA0G
# CSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJ
# bmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0
# IFRydXN0ZWQgUm9vdCBHNDAeFw0yMTA0MjkwMDAwMDBaFw0zNjA0MjgyMzU5NTla
# MGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjFBMD8GA1UE
# AxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcgUlNBNDA5NiBTSEEz
# ODQgMjAyMSBDQTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDVtC9C
# 0CiteLdd1TlZG7GIQvUzjOs9gZdwxbvEhSYwn6SOaNhc9es0JAfhS0/TeEP0F9ce
# 2vnS1WcaUk8OoVf8iJnBkcyBAz5NcCRks43iCH00fUyAVxJrQ5qZ8sU7H/Lvy0da
# E6ZMswEgJfMQ04uy+wjwiuCdCcBlp/qYgEk1hz1RGeiQIXhFLqGfLOEYwhrMxe6T
# SXBCMo/7xuoc82VokaJNTIIRSFJo3hC9FFdd6BgTZcV/sk+FLEikVoQ11vkunKoA
# FdE3/hoGlMJ8yOobMubKwvSnowMOdKWvObarYBLj6Na59zHh3K3kGKDYwSNHR7Oh
# D26jq22YBoMbt2pnLdK9RBqSEIGPsDsJ18ebMlrC/2pgVItJwZPt4bRc4G/rJvmM
# 1bL5OBDm6s6R9b7T+2+TYTRcvJNFKIM2KmYoX7BzzosmJQayg9Rc9hUZTO1i4F4z
# 8ujo7AqnsAMrkbI2eb73rQgedaZlzLvjSFDzd5Ea/ttQokbIYViY9XwCFjyDKK05
# huzUtw1T0PhH5nUwjewwk3YUpltLXXRhTT8SkXbev1jLchApQfDVxW0mdmgRQRNY
# mtwmKwH0iU1Z23jPgUo+QEdfyYFQc4UQIyFZYIpkVMHMIRroOBl8ZhzNeDhFMJlP
# /2NPTLuqDQhTQXxYPUez+rbsjDIJAsxsPAxWEQIDAQABo4IBWTCCAVUwEgYDVR0T
# AQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUaDfg67Y7+F8Rhvv+YXsIiGX0TkIwHwYD
# VR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMG
# A1UdJQQMMAoGCCsGAQUFBwMDMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYY
# aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2Fj
# ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNV
# HR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRU
# cnVzdGVkUm9vdEc0LmNybDAcBgNVHSAEFTATMAcGBWeBDAEDMAgGBmeBDAEEATAN
# BgkqhkiG9w0BAQwFAAOCAgEAOiNEPY0Idu6PvDqZ01bgAhql+Eg08yy25nRm95Ry
# sQDKr2wwJxMSnpBEn0v9nqN8JtU3vDpdSG2V1T9J9Ce7FoFFUP2cvbaF4HZ+N3HL
# IvdaqpDP9ZNq4+sg0dVQeYiaiorBtr2hSBh+3NiAGhEZGM1hmYFW9snjdufE5Btf
# Q/g+lP92OT2e1JnPSt0o618moZVYSNUa/tcnP/2Q0XaG3RywYFzzDaju4ImhvTnh
# OE7abrs2nfvlIVNaw8rpavGiPttDuDPITzgUkpn13c5UbdldAhQfQDN8A+KVssIh
# dXNSy0bYxDQcoqVLjc1vdjcshT8azibpGL6QB7BDf5WIIIJw8MzK7/0pNVwfiThV
# 9zeKiwmhywvpMRr/LhlcOXHhvpynCgbWJme3kuZOX956rEnPLqR0kq3bPKSchh/j
# wVYbKyP/j7XqiHtwa+aguv06P0WmxOgWkVKLQcBIhEuWTatEQOON8BUozu3xGFYH
# Ki8QxAwIZDwzj64ojDzLj4gLDb879M4ee47vtevLt/B3E+bnKD+sEq6lLyJsQfmC
# XBVmzGwOysWGw/YmMwwHS6DTBwJqakAwSEs0qFEgu60bhQjiWQ1tygVQK+pKHJ6l
# /aCnHwZ05/LWUpD9r4VIIflXO7ScA+2GRfS0YW6/aOImYIbqyK+p/pQd52MbOoZW
# eE4wggd3MIIFX6ADAgECAhAHHxQbizANJfMU6yMM0NHdMA0GCSqGSIb3DQEBCwUA
# MGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjFBMD8GA1UE
# AxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcgUlNBNDA5NiBTSEEz
# ODQgMjAyMSBDQTEwHhcNMjIwMTE3MDAwMDAwWhcNMjUwMTE1MjM1OTU5WjB8MQsw
# CQYDVQQGEwJVUzEPMA0GA1UECBMGT3JlZ29uMRIwEAYDVQQHEwlCZWF2ZXJ0b24x
# IzAhBgNVBAoTGlB5dGhvbiBTb2Z0d2FyZSBGb3VuZGF0aW9uMSMwIQYDVQQDExpQ
# eXRob24gU29mdHdhcmUgRm91bmRhdGlvbjCCAiIwDQYJKoZIhvcNAQEBBQADggIP
# ADCCAgoCggIBAKgc0BTT+iKbtK6f2mr9pNMUTcAJxKdsuOiSYgDFfwhjQy89koM7
# uP+QV/gwx8MzEt3c9tLJvDccVWQ8H7mVsk/K+X+IufBLCgUi0GGAZUegEAeRlSXx
# xhYScr818ma8EvGIZdiSOhqjYc4KnfgfIS4RLtZSrDFG2tN16yS8skFa3IHyvWdb
# D9PvZ4iYNAS4pjYDRjT/9uzPZ4Pan+53xZIcDgjiTwOh8VGuppxcia6a7xCyKoOA
# GjvCyQsj5223v1/Ig7Dp9mGI+nh1E3IwmyTIIuVHyK6Lqu352diDY+iCMpk9Zanm
# SjmB+GMVs+H/gOiofjjtf6oz0ki3rb7sQ8fTnonIL9dyGTJ0ZFYKeb6BLA66d2GA
# LwxZhLe5WH4Np9HcyXHACkppsE6ynYjTOd7+jN1PRJahN1oERzTzEiV6nCO1M3U1
# HbPTGyq52IMFSBM2/07WTJSbOeXjvYR7aUxK9/ZkJiacl2iZI7IWe7JKhHohqKuc
# eQNyOzxTakLcRkzynvIrk33R9YVqtB4L6wtFxhUjvDnQg16xot2KVPdfyPAWd81w
# tZADmrUtsZ9qG79x1hBdyOl4vUtVPECuyhCxaw+faVjumapPUnwo8ygflJJ74J+B
# Yxf6UuD7m8yzsfXWkdv52DjL74TxzuFTLHPyARWCSCAbzn3ZIly+qIqDAgMBAAGj
# ggIGMIICAjAfBgNVHSMEGDAWgBRoN+Drtjv4XxGG+/5hewiIZfROQjAdBgNVHQ4E
# FgQUt/1Teh2XDuUj2WW3siYWJgkZHA8wDgYDVR0PAQH/BAQDAgeAMBMGA1UdJQQM
# MAoGCCsGAQUFBwMDMIG1BgNVHR8Ega0wgaowU6BRoE+GTWh0dHA6Ly9jcmwzLmRp
# Z2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWduaW5nUlNBNDA5NlNI
# QTM4NDIwMjFDQTEuY3JsMFOgUaBPhk1odHRwOi8vY3JsNC5kaWdpY2VydC5jb20v
# RGlnaUNlcnRUcnVzdGVkRzRDb2RlU2lnbmluZ1JTQTQwOTZTSEEzODQyMDIxQ0Ex
# LmNybDA+BgNVHSAENzA1MDMGBmeBDAEEATApMCcGCCsGAQUFBwIBFhtodHRwOi8v
# d3d3LmRpZ2ljZXJ0LmNvbS9DUFMwgZQGCCsGAQUFBwEBBIGHMIGEMCQGCCsGAQUF
# BzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5jb20wXAYIKwYBBQUHMAKGUGh0dHA6
# Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWdu
# aW5nUlNBNDA5NlNIQTM4NDIwMjFDQTEuY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZI
# hvcNAQELBQADggIBABxv4AeV/5ltkELHSC63fXAFYS5tadcWTiNc2rskrNLrfH1N
# s0vgSZFoQxYBFKI159E8oQQ1SKbTEubZ/B9kmHPhprHya08+VVzxC88pOEvz68nA
# 82oEM09584aILqYmj8Pj7h/kmZNzuEL7WiwFa/U1hX+XiWfLIJQsAHBla0i7QRF2
# de8/VSF0XXFa2kBQ6aiTsiLyKPNbaNtbcucaUdn6vVUS5izWOXM95BSkFSKdE45O
# q3FForNJXjBvSCpwcP36WklaHL+aHu1upIhCTUkzTHMh8b86WmjRUqbrnvdyR2yd
# I5l1OqcMBjkpPpIV6wcc+KY/RH2xvVuuoHjlUjwq2bHiNoX+W1scCpnA8YTs2d50
# jDHUgwUo+ciwpffH0Riq132NFmrH3r67VaN3TuBxjI8SIZM58WEDkbeoriDk3hxU
# 8ZWV7b8AW6oyVBGfM06UgkfMb58h+tJPrFx8VI/WLq1dTqMfZOm5cuclMnUHs2uq
# rRNtnV8UfidPBL4ZHkTcClQbCoz0UbLhkiDvIS00Dn+BBcxw/TKqVL4Oaz3bkMSs
# M46LciTeucHY9ExRVt3zy7i149sd+F4QozPqn7FrSVHXmem3r7bjyHTxOgqxRCVa
# 18Vtx7P/8bYSBeS+WHCKcliFCecspusCDSlnRUjZwyPdP0VHxaZg2unjHY3rMYIa
# tjCCGrICAQEwfTBpMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIElu
# Yy4xQTA/BgNVBAMTOERpZ2lDZXJ0IFRydXN0ZWQgRzQgQ29kZSBTaWduaW5nIFJT
# QTQwOTYgU0hBMzg0IDIwMjEgQ0ExAhAHHxQbizANJfMU6yMM0NHdMA0GCWCGSAFl
# AwQCAQUAoIHIMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcC
# AQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCBnAZ6P7YvTwq0fbF62
# o7E75R0LxsW5OtyYiFESQckLhjBcBgorBgEEAYI3AgEMMU4wTKBGgEQAQgB1AGkA
# bAB0ADoAIABSAGUAbABlAGEAcwBlAF8AdgAzAC4AMQAyAC4AMwBfADIAMAAyADQA
# MAA0ADAAOQAuADAAMaECgAAwDQYJKoZIhvcNAQEBBQAEggIAhvmA8nPNyn7jYkuO
# UobHjUZGgjE7xB8BnrDg5IErORsyIbCSQpdJ4oJ4cnEiVFElql5hVsEY6JWfguaj
# zELkcgfK5etJxPtNSua/FiBbXqitnDNyHtReLTb+u/T5110GDiTMzpytPorKc21h
# 6VRXrPmjSTp+Nuji0lulPR9KN6Lxua72t/LZYfT83iZD0eP7rnDoLHqoslb5llEV
# CaKgLZ8ap8l5uDwHqMm4FYvU9BswEcTQ75wD7jFQd5yGpOzht0hWjAgq9C+nI4Uu
# nygUpyj1XUAw9FaeRYiVtI0+hkmLNSkUELScNsyFSpZEOJWii3nKkRcupSp8YORJ
# d24/DjkUuNQMzlHDoVX07E8MFnzzGtgftoRilePSS6qer/RC+SHb18ioY4F0l/EU
# A8xb+ztHHdeR7OuThn4S/1TMCYJdmqUYpIkmAt1dG/eUlkp+R1DY1KdpT71L828L
# XgWipnS0PJuHSrWb428U7uF439jB2HjI35a5QclApg2UTeDPQvE0GhLPfJyJCYZ8
# UYLtbOnd82M4pUJvU6NKmfxZuT2OhsXxQPDTwaqdKaVaBupPbsSTC0o58uarJSSi
# G5pj4NQyyt1IvZmM2ESV/FufDG5/zSoJ+HO5Ah/AV5ikPlgGwzjdY8vG2CSYJ9os
# kU9LigwvXmSH/4QYoWN7NtCTCAuhghc/MIIXOwYKKwYBBAGCNwMDATGCFyswghcn
# BgkqhkiG9w0BBwKgghcYMIIXFAIBAzEPMA0GCWCGSAFlAwQCAQUAMHcGCyqGSIb3
# DQEJEAEEoGgEZjBkAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgOm4M
# dN4NqIa6dQy8bSjVKj542yV4A8OJPLti6aa7ZLUCEGqMmddBL+N1YSiZhxqcmY0Y
# DzIwMjQwNDA5MTQ0MTE2WqCCEwkwggbCMIIEqqADAgECAhAFRK/zlJ0IOaa/2z9f
# 5WEWMA0GCSqGSIb3DQEBCwUAMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdp
# Q2VydCwgSW5jLjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2
# IFNIQTI1NiBUaW1lU3RhbXBpbmcgQ0EwHhcNMjMwNzE0MDAwMDAwWhcNMzQxMDEz
# MjM1OTU5WjBIMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x
# IDAeBgNVBAMTF0RpZ2lDZXJ0IFRpbWVzdGFtcCAyMDIzMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEAo1NFhx2DjlusPlSzI+DPn9fl0uddoQ4J3C9Io5d6
# OyqcZ9xiFVjBqZMRp82qsmrdECmKHmJjadNYnDVxvzqX65RQjxwg6seaOy+WZuNp
# 52n+W8PWKyAcwZeUtKVQgfLPywemMGjKg0La/H8JJJSkghraarrYO8pd3hkYhftF
# 6g1hbJ3+cV7EBpo88MUueQ8bZlLjyNY+X9pD04T10Mf2SC1eRXWWdf7dEKEbg8G4
# 5lKVtUfXeCk5a+B4WZfjRCtK1ZXO7wgX6oJkTf8j48qG7rSkIWRw69XloNpjsy7p
# Be6q9iT1HbybHLK3X9/w7nZ9MZllR1WdSiQvrCuXvp/k/XtzPjLuUjT71Lvr1KAs
# NJvj3m5kGQc3AZEPHLVRzapMZoOIaGK7vEEbeBlt5NkP4FhB+9ixLOFRr7StFQYU
# 6mIIE9NpHnxkTZ0P387RXoyqq1AVybPKvNfEO2hEo6U7Qv1zfe7dCv95NBB+plwK
# WEwAPoVpdceDZNZ1zY8SdlalJPrXxGshuugfNJgvOuprAbD3+yqG7HtSOKmYCaFx
# smxxrz64b5bV4RAT/mFHCoz+8LbH1cfebCTwv0KCyqBxPZySkwS0aXAnDU+3tTbR
# yV8IpHCj7ArxES5k4MsiK8rxKBMhSVF+BmbTO77665E42FEHypS34lCh8zrTioPL
# QHsCAwEAAaOCAYswggGHMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBYG
# A1UdJQEB/wQMMAoGCCsGAQUFBwMIMCAGA1UdIAQZMBcwCAYGZ4EMAQQCMAsGCWCG
# SAGG/WwHATAfBgNVHSMEGDAWgBS6FtltTYUvcyl2mi91jGogj57IbzAdBgNVHQ4E
# FgQUpbbvE+fvzdBkodVWqWUxo97V40kwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDov
# L2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1
# NlRpbWVTdGFtcGluZ0NBLmNybDCBkAYIKwYBBQUHAQEEgYMwgYAwJAYIKwYBBQUH
# MAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBYBggrBgEFBQcwAoZMaHR0cDov
# L2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNI
# QTI1NlRpbWVTdGFtcGluZ0NBLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAgRrW3qCp
# tZgXvHCNT4o8aJzYJf/LLOTN6l0ikuyMIgKpuM+AqNnn48XtJoKKcS8Y3U623mzX
# 4WCcK+3tPUiOuGu6fF29wmE3aEl3o+uQqhLXJ4Xzjh6S2sJAOJ9dyKAuJXglnSoF
# eoQpmLZXeY/bJlYrsPOnvTcM2Jh2T1a5UsK2nTipgedtQVyMadG5K8TGe8+c+nji
# kxp2oml101DkRBK+IA2eqUTQ+OVJdwhaIcW0z5iVGlS6ubzBaRm6zxbygzc0brBB
# Jt3eWpdPM43UjXd9dUWhpVgmagNF3tlQtVCMr1a9TMXhRsUo063nQwBw3syYnhmJ
# A+rUkTfvTVLzyWAhxFZH7doRS4wyw4jmWOK22z75X7BC1o/jF5HRqsBV44a/rCcs
# QdCaM0qoNtS5cpZ+l3k4SF/Kwtw9Mt911jZnWon49qfH5U81PAC9vpwqbHkB3NpE
# 5jreODsHXjlY9HxzMVWggBHLFAx+rrz+pOt5Zapo1iLKO+uagjVXKBbLafIymrLS
# 2Dq4sUaGa7oX/cR3bBVsrquvczroSUa31X/MtjjA2Owc9bahuEMs305MfR5ocMB3
# CtQC4Fxguyj/OOVSWtasFyIjTvTs0xf7UGv/B3cfcZdEQcm4RtNsMnxYL2dHZeUb
# c7aZ+WssBkbvQR7w8F/g29mtkIBEr4AQQYowggauMIIElqADAgECAhAHNje3JFR8
# 2Ees/ShmKl5bMA0GCSqGSIb3DQEBCwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNV
# BAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMjAzMjMwMDAwMDBaFw0z
# NzAzMjIyMzU5NTlaMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg
# SW5jLjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1
# NiBUaW1lU3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDGhjUGSbPBPXJJUVXHJQPE8pE3qZdRodbSg9GeTKJtoLDMg/la9hGhRBVCX6SI
# 82j6ffOciQt/nR+eDzMfUBMLJnOWbfhXqAJ9/UO0hNoR8XOxs+4rgISKIhjf69o9
# xBd/qxkrPkLcZ47qUT3w1lbU5ygt69OxtXXnHwZljZQp09nsad/ZkIdGAHvbREGJ
# 3HxqV3rwN3mfXazL6IRktFLydkf3YYMZ3V+0VAshaG43IbtArF+y3kp9zvU5Emfv
# DqVjbOSmxR3NNg1c1eYbqMFkdECnwHLFuk4fsbVYTXn+149zk6wsOeKlSNbwsDET
# qVcplicu9Yemj052FVUmcJgmf6AaRyBD40NjgHt1biclkJg6OBGz9vae5jtb7IHe
# IhTZgirHkr+g3uM+onP65x9abJTyUpURK1h0QCirc0PO30qhHGs4xSnzyqqWc0Jo
# n7ZGs506o9UD4L/wojzKQtwYSH8UNM/STKvvmz3+DrhkKvp1KCRB7UK/BZxmSVJQ
# 9FHzNklNiyDSLFc1eSuo80VgvCONWPfcYd6T/jnA+bIwpUzX6ZhKWD7TA4j+s4/T
# Xkt2ElGTyYwMO1uKIqjBJgj5FBASA31fI7tk42PgpuE+9sJ0sj8eCXbsq11GdeJg
# o1gJASgADoRU7s7pXcheMBK9Rp6103a50g5rmQzSM7TNsQIDAQABo4IBXTCCAVkw
# EgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxqII+e
# yG8wHwYDVR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQD
# AgGGMBMGA1UdJQQMMAoGCCsGAQUFBwMIMHcGCCsGAQUFBwEBBGswaTAkBggrBgEF
# BQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRw
# Oi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNy
# dDBDBgNVHR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGln
# aUNlcnRUcnVzdGVkUm9vdEc0LmNybDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglg
# hkgBhv1sBwEwDQYJKoZIhvcNAQELBQADggIBAH1ZjsCTtm+YqUQiAX5m1tghQuGw
# GC4QTRPPMFPOvxj7x1Bd4ksp+3CKDaopafxpwc8dB+k+YMjYC+VcW9dth/qEICU0
# MWfNthKWb8RQTGIdDAiCqBa9qVbPFXONASIlzpVpP0d3+3J0FNf/q0+KLHqrhc1D
# X+1gtqpPkWaeLJ7giqzl/Yy8ZCaHbJK9nXzQcAp876i8dU+6WvepELJd6f8oVInw
# 1YpxdmXazPByoyP6wCeCRK6ZJxurJB4mwbfeKuv2nrF5mYGjVoarCkXJ38SNoOeY
# +/umnXKvxMfBwWpx2cYTgAnEtp/Nh4cku0+jSbl3ZpHxcpzpSwJSpzd+k1OsOx0I
# SQ+UzTl63f8lY5knLD0/a6fxZsNBzU+2QJshIUDQtxMkzdwdeDrknq3lNHGS1yZr
# 5Dhzq6YBT70/O3itTK37xJV77QpfMzmHQXh6OOmc4d0j/R0o08f56PGYX/sr2H7y
# Rp11LB4nLCbbbxV7HhmLNriT1ObyF5lZynDwN7+YAN8gFk8n+2BnFqFmut1VwDop
# hrCYoCvtlUG3OtUVmDG0YgkPCr2B2RP+v6TR81fZvAT6gt4y3wSJ8ADNXcL50CN/
# AAvkdgIm2fBldkKmKYcJRyvmfxqkhQ/8mJb2VVQrH4D6wPIOK+XW+6kvRBVK5xMO
# Hds3OBqhK/bt1nz8MIIFjTCCBHWgAwIBAgIQDpsYjvnQLefv21DiCEAYWjANBgkq
# hkiG9w0BAQwFADBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5j
# MRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBB
# c3N1cmVkIElEIFJvb3QgQ0EwHhcNMjIwODAxMDAwMDAwWhcNMzExMTA5MjM1OTU5
# WjBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQL
# ExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJv
# b3QgRzQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1K
# PDAiMGkz7MKnJS7JIT3yithZwuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2r
# snnyyhHS5F/WBTxSD1Ifxp4VpX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C
# 8weE5nQ7bXHiLQwb7iDVySAdYyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBf
# sXpm7nfISKhmV1efVFiODCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGY
# QJB5w3jHtrHEtWoYOAMQjdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8
# rhsDdV14Ztk6MUSaM0C/CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaY
# dj1ZXUJ2h4mXaXpI8OCiEhtmmnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+
# wJS00mFt6zPZxd9LBADMfRyVw4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw
# ++hkpjPRiQfhvbfmQ6QYuKZ3AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+N
# P8m800ERElvlEFDrMcXKchYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7F
# wI+isX4KJpn15GkvmB0t9dmpsh3lGwIDAQABo4IBOjCCATYwDwYDVR0TAQH/BAUw
# AwEB/zAdBgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wHwYDVR0jBBgwFoAU
# Reuir/SSy4IxLVGLp6chnfNtyA8wDgYDVR0PAQH/BAQDAgGGMHkGCCsGAQUFBwEB
# BG0wazAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsG
# AQUFBzAChjdodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1
# cmVkSURSb290Q0EuY3J0MEUGA1UdHwQ+MDwwOqA4oDaGNGh0dHA6Ly9jcmwzLmRp
# Z2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcmwwEQYDVR0gBAow
# CDAGBgRVHSAAMA0GCSqGSIb3DQEBDAUAA4IBAQBwoL9DXFXnOF+go3QbPbYW1/e/
# Vwe9mqyhhyzshV6pGrsi+IcaaVQi7aSId229GhT0E0p6Ly23OO/0/4C5+KH38nLe
# JLxSA8hO0Cre+i1Wz/n096wwepqLsl7Uz9FDRJtDIeuWcqFItJnLnU+nBgMTdydE
# 1Od/6Fmo8L8vC6bp8jQ87PcDx4eo0kxAGTVGamlUsLihVo7spNU96LHc/RzY9Hda
# XFSMb++hUD38dglohJ9vytsgjTVgHAIDyyCwrFigDkBjxZgiwbJZ9VVrzyerbHbO
# byMt9H5xaiNrIv8SuFQtJ37YOtnwtoeW/VvRXKwYw02fc7cBqZ9Xql4o4rmUMYID
# djCCA3ICAQEwdzBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIElu
# Yy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYg
# VGltZVN0YW1waW5nIENBAhAFRK/zlJ0IOaa/2z9f5WEWMA0GCWCGSAFlAwQCAQUA
# oIHRMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG9w0BCQUxDxcN
# MjQwNDA5MTQ0MTE2WjArBgsqhkiG9w0BCRACDDEcMBowGDAWBBRm8CsywsLJD4Jd
# zqqKycZPGZzPQDAvBgkqhkiG9w0BCQQxIgQgZm7KOZQwUzSPGy0QMkwOOcWaG+w5
# Nm03VWlT93Aec3QwNwYLKoZIhvcNAQkQAi8xKDAmMCQwIgQg0vbkbe10IszR1EBX
# aEE2b4KK2lWarjMWr00amtQMeCgwDQYJKoZIhvcNAQEBBQAEggIATk+R26sfZdRy
# JMi4Ei4Xaj5TwNTbaUxG2P3ggvT5YpIxZobFK2OohvHFyr8g3ipihMeFc4LdruGS
# y/8GNua9BnUIYHBXMaxEtxYtiIs32a1R73VSoL/RHVXt/kNI0818/wVOI1aCZdt5
# MJpjiopPNuneZqH5iym6URk1bvrKlWMFhgA8VggbqQwKiqEtVM7Fy744tuDQjqvE
# 5TG0Ts298gWzsDnwknFei8RKrbCsr+TRIQ5mWvs9zIBo6d2Rs+JMclGjTwJ71o50
# Tcq7LgVDldWXARib9mQJmagw+y5LkG66W8I+i1mwQ/9Ur2Lrwnophg7F1HkODXI+
# 7i3qeNDmnZLXiQM2WTsZ8OlEygAbFtE+ue4ucwFAMbh+1DRCOuwQoN2JMFGNtcj5
# cbhBBb7am6mYGzg7sGvM7inLEKRV+pqJx1gV/SG+DIVQrHzdlvWTdRmJHIDBMqxr
# fpnulV80FMuiBJXvKU0RYEgQHw9QDyUNhdQeXSjBd9myt0EW2WyJLY3cYzjmZE1A
# AcQePJfMbMfYuIBtz7rIXZKNL7/wznLalKxS4aulS7chi5qRiaPJG3lFhlMx//cD
# 91DxPlbbpCymSjO+3aMRAZyEXjmpHPbROZDSkqLXFf8OYcw4uUZLPLxjbmbZM1hH
# dz3vPpscd6J1Tz93GwJu/8fZvMEYDjo=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_28_15.ps1
|
sample_28_15.ps1
|
@{
GUID="EEFCB906-B326-4E99-9F54-8B4BB6EF3C6D"
Author="PowerShell"
CompanyName="Microsoft Corporation"
Copyright="Copyright (c) Microsoft Corporation."
ModuleVersion="7.0.0.0"
CompatiblePSEditions = @("Core")
PowerShellVersion="3.0"
NestedModules="Microsoft.PowerShell.Commands.Management.dll"
HelpInfoURI = 'https://aka.ms/powershell72-help'
FunctionsToExport = @()
AliasesToExport = @("gcb", "gin", "gtz", "scb", "stz")
CmdletsToExport=@("Add-Content",
"Clear-Content",
"Get-Clipboard",
"Set-Clipboard",
"Clear-ItemProperty",
"Join-Path",
"Convert-Path",
"Copy-ItemProperty",
"Get-ChildItem",
"Get-Content",
"Get-ItemProperty",
"Get-ItemPropertyValue",
"Move-ItemProperty",
"Get-Location",
"Set-Location",
"Push-Location",
"Pop-Location",
"New-PSDrive",
"Remove-PSDrive",
"Get-PSDrive",
"Get-Item",
"New-Item",
"Set-Item",
"Remove-Item",
"Move-Item",
"Rename-Item",
"Copy-Item",
"Clear-Item",
"Invoke-Item",
"Get-PSProvider",
"New-ItemProperty",
"Split-Path",
"Test-Path",
"Test-Connection",
"Get-Process",
"Stop-Process",
"Wait-Process",
"Debug-Process",
"Start-Process",
"Remove-ItemProperty",
"Rename-ItemProperty",
"Resolve-Path",
"Get-Service",
"Stop-Service",
"Start-Service",
"Suspend-Service",
"Resume-Service",
"Restart-Service",
"Set-Service",
"New-Service",
"Remove-Service",
"Set-Content",
"Set-ItemProperty",
"Restart-Computer",
"Stop-Computer",
"Rename-Computer",
"Get-ComputerInfo",
"Get-TimeZone",
"Set-TimeZone",
"Get-HotFix",
"Clear-RecycleBin")
}
# SIG # Begin signature block
# MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAOkUHfBYP8n8JI
# rFMR/Pi6BPlAC/b/pz0LBmd3yrLJC6CCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIG8C
# gBXFFJ/2vAtXu5Tg5CsnXsYj0AU0agFGmPJaSF8WMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAER8fpwwiL8Ker9uzLQTXchlVPS2mvxp6QtnD
# 3t4uwBDUTK/QQSR/rUmCJfquVcq8dKLF/qXawg7BPP8WN8UNNLpoK/wkQB2xqyVK
# c5ryQRrYi3OiR1AlQO8fbd/mTPdx0n5mUYkZ7A+Ci/pm4erKmLCoyNhMZg958mp9
# e9UtiPOE0gcMD/XSSjAXnzQe8s2lODmj651SAWp5g4c7irgCEl61I3TzazBSeMEU
# aAZXwhfMaGgRdZd1k0nexj2CaF9C/rVZa3ZLx880kV7M+UCNXvNoE9pa73XZIKbP
# 3B+ga0l9dsBBfKlDLhu1ZvTjT0lfmrTxMZmojA/q12k3OJtERaGCFykwghclBgor
# BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCC35EcF8PBCyV/56ap+VaG58sKgcqnWaNxt
# mrfgFR1eQwIGZfypflVoGBMyMDI0MDQxNzE0NDMyMS45NDZaMASAAgH0oIHYpIHV
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCM
# wl9YXo4AAQAAAdwwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvI
# syA1sjg9kSKJzelrUWF5ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0Ra
# GrU8EHydF8NxPMR2KVNiAtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYn
# iwKLPQLJ00EkXw5TSwfmJXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdF
# LKwo4BTlEgnvzeTfXukzX8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8Xl
# BQDVDX5JeMEsx7jgJDdEnK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7
# rSFvcLnwAqMdqcy/iqQPMlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg
# 8oWwXyiv3+bGB6dmdM61ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/Db
# USqW2RqTUa2O2KuvsyRGMEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+f
# dTw+geRn6Mo2S6+/bZEwS/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGV
# PRqkmz5UYz+R5ybMJWj+mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0ph
# jUTH2GChHIvE4SDSk2hwWP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNV
# HQ4EFgQU6HPSBd0OfEX3uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D
# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l
# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD
# ggIBANnrb8Ewr8eX/H1sKt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g
# 6Tf7tNx1q0NpKk1JTupUJfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXT
# MzxiewfErVLt8WefebncST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz
# /zEA1AbZL/viXtHmryA0CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+d
# h+UsFi0d4lkdcE+Zq5JNjIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YW
# zhP/5XQnYl03AfXErn+1Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1
# qy4y4vlVKaShtbdfgPyGeeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3h
# sHzG8n5u5CQajPwx9PzpsZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4Q
# wGf5B71x57OjaX53gxT4vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ06
# 2nyIZKnsXxzuKFb0TjXWw6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0
# bSrAlVeihcaG5F74SZT8FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIB
# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1
# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O
# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn
# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t
# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq
# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP
# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW
# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv
# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb
# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc
# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a
# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB
# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw
# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E
# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB
# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/
# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ
# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v
# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h
# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x
# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p
# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A
# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC
# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB
# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt
# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3
# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV
# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw
# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB
# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJf
# SbL3djnQEqaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAOnKFXMwIhgPMjAyNDA0MTcxNzMxMzFaGA8yMDI0MDQx
# ODE3MzEzMVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6coVcwIBADAHAgEAAgIc
# XjAHAgEAAgIRfDAKAgUA6ctm8wIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE
# AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB
# AGHj8sVzfh0uupx47pHvZZjzq36biRHek7Y7t2YX9eJmkgbps2NAu8/BJb/d1PG6
# ESW5UZZV/5aUie1uYUP7UmPkqIyO78ZDNCiR98gnU0FLApnERB3oP7qxLe/O5IUk
# bIHHaht67sWrhtsQ1g4Q0j6/6ePSfdteDb7+TpdEGDhiMYIEDTCCBAkCAQEwgZMw
# fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
# TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAA
# AdwwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB
# BDAvBgkqhkiG9w0BCQQxIgQgu0a1ix6Lt96aVAy4enqfHyUwQBK2Ceu1Q5BqAXWy
# JikwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0
# Ou0IqxELDhX2TLylxIINNzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
# QSAyMDEwAhMzAAAB3MHgjMJfWF6OAAEAAAHcMCIEIO0GtXpb51D31Pe5k2EeH+UC
# eNSHTxSqH63fPlmSQBsnMA0GCSqGSIb3DQEBCwUABIICACgsfNsT1d3aCjHyylIQ
# YVKnZWrxmBAIyroKsjqr6Z8EZq78xKndYMVZN6wzVBQD7yODZtbgW3RuUqmHaNOM
# gCNdFtMkcRWoX0UCx/THbpXhX0IdhRVcqIWlxdVkcO4OLlZMbof2V7Z4/FGirV8c
# OVvSQYE6p8xx4n0DxNHsuqvN/Kk76bG16YyBIMzVIoQimIPPMSKFT6n/9QQ+oOt+
# XSk8E1Y3CNcHjL87EkkZLZEa36PB2KkXbE8WfkJIqzK061GqjRLagiJpkZ1o1vGR
# U7bIJUU7yEwDfv/kX7m0CQ2Q+HP80xrgv9dLl8FdosEX78ydtYwiPwwt+ps/q7sX
# GP+WQWbhule/HGpy6pCM50q1G5hJ9xMoMf1wn4Y7WXmcnJlzNUGeygWXt+y9EPX0
# iVbeOn8S6C8vD0yf8sHPs0ZezV2oZiapIDCdtnHy3h1aQTACrYJN+lB57ZgRZyTN
# CJrNUavQ3sH2AMu1twDIUCX0/ZgA5xK1Wpi1KVwBwLFgp0If8qGL39JX33SkoMQx
# a4WgwcmXzH2KdPhGILGyP0NTF9k1r11F9I+1isxzA7b55r15hDYOUTJ3sis0m0+Z
# GjFej1ZuPC4JMa2+yc3C0qlFQAercyYgOcFbNuNl/CrgepsU4oEoqBvojlZC66vR
# r/BjffluGaQ6kZCDe1evlUf4
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_44_90.ps1
|
sample_44_90.ps1
|
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Creates or updates an environment.
.Description
Creates or updates an environment.
.Example
{{ Add code here }}
.Example
{{ Add code here }}
.Inputs
Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Models.Api20231001Preview.IEnvironment
.Inputs
Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Models.IDevCenterdataIdentity
.Outputs
System.Boolean
.Notes
COMPLEX PARAMETER PROPERTIES
To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
BODY <IEnvironment>: Properties of an environment.
CatalogName <String>: Name of the catalog.
DefinitionName <String>: Name of the environment definition.
Type <String>: Environment type.
[Parameter <IAny>]: Parameters object for the environment.
[Code <String>]: An identifier for the error. Codes are invariant and are intended to be consumed programmatically.
[Detail <ICloudErrorBody[]>]: A list of additional details about the error.
Code <String>: An identifier for the error. Codes are invariant and are intended to be consumed programmatically.
Message <String>: A message describing the error, intended to be suitable for display in a user interface.
[Detail <ICloudErrorBody[]>]: A list of additional details about the error.
[Target <String>]: The target of the particular error. For example, the name of the property in error.
[Message <String>]: A message describing the error, intended to be suitable for display in a user interface.
[OperationLocation <String>]:
[Target <String>]: The target of the particular error. For example, the name of the property in error.
INPUTOBJECT <IDevCenterdataIdentity>: Identity Parameter
[Name <String>]: The name of an action that will take place on a Dev Box.
[CatalogName <String>]: The name of the catalog
[DefinitionName <String>]: The name of the environment definition
[DevBoxName <String>]: The name of a Dev Box.
[EnvironmentName <String>]: The name of the environment.
[Id <String>]: Resource identity path
[PoolName <String>]: The name of a pool of Dev Boxes.
[ProjectName <String>]: The DevCenter Project upon which to execute operations.
[ScheduleName <String>]: The name of a schedule.
[UserId <String>]: The AAD object id of the user. If value is 'me', the identity is taken from the authentication context.
.Link
https://learn.microsoft.com/powershell/module/az.devcenter/new-azdevcenteruserenvironment
#>
function New-AzDevCenterUserEnvironment {
[OutputType([System.Boolean])]
[CmdletBinding(DefaultParameterSetName = 'CreateExpanded', PositionalBinding = $false, SupportsShouldProcess, ConfirmImpact = 'Medium')]
param(
[Parameter(ParameterSetName = 'CreateExpanded', Mandatory)]
[Parameter(ParameterSetName = 'CreateViaIdentityExpanded', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Uri')]
[System.String]
# The DevCenter-specific URI to operate on.
${Endpoint},
[Parameter(ParameterSetName = 'CreateViaIdentityExpandedByDevCenter', Mandatory)]
[Parameter(ParameterSetName = 'CreateExpandedByDevCenter', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Uri')]
[Alias('DevCenter')]
[System.String]
# The DevCenter upon which to execute operations.
${DevCenterName},
[Parameter(ParameterSetName = 'CreateExpanded', Mandatory)]
[Parameter(ParameterSetName = 'CreateExpandedByDevCenter', Mandatory)]
[Alias('EnvironmentName')]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Path')]
[System.String]
# The name of the environment.
${Name},
[Parameter(ParameterSetName = 'CreateExpanded', Mandatory)]
[Parameter(ParameterSetName = 'CreateExpandedByDevCenter', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Path')]
[System.String]
# The DevCenter Project upon which to execute operations.
${ProjectName},
[Parameter(ParameterSetName = 'CreateExpanded')]
[Parameter(ParameterSetName = 'CreateExpandedByDevCenter')]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Runtime.DefaultInfo(Script = '"me"')]
[System.String]
# The AAD object id of the user.
# If value is 'me', the identity is taken from the authentication context.
${UserId},
[Parameter(ParameterSetName = 'CreateViaIdentityExpanded', Mandatory, ValueFromPipeline)]
[Parameter(ParameterSetName = 'CreateViaIdentityExpandedByDevCenter', Mandatory, ValueFromPipeline)]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Models.IDevCenterdataIdentity]
# Identity Parameter
# To construct, see NOTES section for INPUTOBJECT properties and create a hash table.
${InputObject},
[Parameter(ParameterSetName = 'CreateExpanded', Mandatory)]
[Parameter(ParameterSetName = 'CreateViaIdentityExpanded', Mandatory)]
[Parameter(ParameterSetName = 'CreateViaIdentityExpandedByDevCenter', Mandatory)]
[Parameter(ParameterSetName = 'CreateExpandedByDevCenter', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Body')]
[System.String]
# Name of the catalog.
${CatalogName},
[Parameter(ParameterSetName = 'CreateExpanded', Mandatory)]
[Parameter(ParameterSetName = 'CreateViaIdentityExpanded', Mandatory)]
[Parameter(ParameterSetName = 'CreateViaIdentityExpandedByDevCenter', Mandatory)]
[Parameter(ParameterSetName = 'CreateExpandedByDevCenter', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Body')]
[System.String]
# Name of the environment definition.
${EnvironmentDefinitionName},
[Parameter(ParameterSetName = 'CreateExpanded', Mandatory)]
[Parameter(ParameterSetName = 'CreateViaIdentityExpanded', Mandatory)]
[Parameter(ParameterSetName = 'CreateViaIdentityExpandedByDevCenter', Mandatory)]
[Parameter(ParameterSetName = 'CreateExpandedByDevCenter', Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Body')]
[System.String]
# Environment type.
${EnvironmentType},
[Parameter(ParameterSetName = 'CreateExpanded')]
[Parameter(ParameterSetName = 'CreateViaIdentityExpanded')]
[Parameter(ParameterSetName = 'CreateViaIdentityExpandedByDevCenter')]
[Parameter(ParameterSetName = 'CreateExpandedByDevCenter')]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Models.Api20231001Preview.IEnvironmentUpdatePropertiesParameters]))]
[System.Collections.Hashtable]
# Parameters object for the environment.
${Parameter},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Body')]
[System.DateTime]
# The time the expiration date will be triggered (UTC), after which the environment and associated resources will be deleted.
${ExpirationDate},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Azure')]
[System.Management.Automation.PSObject]
# The DefaultProfile parameter is not functional.
# Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.
${DefaultProfile},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command as a job
${AsJob},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command asynchronously
${NoWait},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.DevCenterdata.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process {
if (-not $PSBoundParameters.ContainsKey('Endpoint')) {
$Endpoint = GetEndpointFromResourceGraph -DevCenterName $DevCenterName -Project $ProjectName
$null = $PSBoundParameters.Add("Endpoint", $Endpoint)
$null = $PSBoundParameters.Remove("DevCenterName")
}
else {
$Endpoint = ValidateAndProcessEndpoint -Endpoint $Endpoint
$PSBoundParameters["Endpoint"] = $Endpoint
}
Az.DevCenterdata.internal\New-AzDevCenterUserEnvironment @PSBoundParameters
}
}
# SIG # Begin signature block
# MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDPhWsEYC6op7tD
# Ox0jo47BRJrLWoyORDMBpxLnO+nykKCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIGi+
# APWTzbS7wuOaAyWoA+KqewZaLPz6l36tlda/vpqzMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAfyuhVf3pFtzhtRXNaOCGeOPA6aD9g9jcktuY
# Z9DPJwTbfkS4H7D68nZEQXVDv0/KUlpkq6Le6kZGupLIy63PcO1ChAhgzTEGL9QG
# h4MFIxj8guHTIUqYjft24QI7dITVZTNwgOclywugbUcNtO6a2V16MNdTZKSYNU7f
# 7xojtBT+jpVw3pds8jJdLtrh0S9T53lt/NiNUGFyu93av+dDzeD5Mm/MElWDExca
# Gz+xSfM3/fgweBD34+xqEKxQL8ZKGWZQtgpMiFaHGEa1W5yQQCc0OUO6kI6+t1AR
# c4fxTBtX5emIJvpxy+gsAmZ0KzlGiOxuvwK8Vg5gJHAgXKV+qKGCFykwghclBgor
# BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCAGdre21ue4+vjNbnVSmxbGJlEvp5Ns6xz0
# YxIjY2nkYAIGZh/+xT6TGBMyMDI0MDQyMzEzMTUxNy42MDZaMASAAgH0oIHYpIHV
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOjg2REYtNEJCQy05MzM1MSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHdXVcd
# ldStqhsAAQAAAd0wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzA5WhcNMjUwMTEwMTkwNzA5WjCB0jELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKhO
# A5RE6i53nHURH4lnfKLp+9JvipuTtctairCxMUSrPSy5CWK2DtriQP+T52HXbN2g
# 7AktQ1pQZbTDGFzK6d03vYYNrCPuJK+PRsP2FPVDjBXy5mrLRFzIHHLaiAaobE5v
# FJuoxZ0ZWdKMCs8acjhHUmfaY+79/CR7uN+B4+xjJqwvdpU/mp0mAq3earyH+AKm
# v6lkrQN8zgrcbCgHwsqvvqT6lEFqYpi7uKn7MAYbSeLe0pMdatV5EW6NVnXMYOTR
# KuGPfyfBKdShualLo88kG7qa2mbA5l77+X06JAesMkoyYr4/9CgDFjHUpcHSODuj
# lFBKMi168zRdLerdpW0bBX9EDux2zBMMaEK8NyxawCEuAq7++7ktFAbl3hUKtuzY
# C1FUZuUl2Bq6U17S4CKsqR3itLT9qNcb2pAJ4jrIDdll5Tgoqef5gpv+YcvBM834
# bXFNwytd3ujDD24P9Dd8xfVJvumjsBQQkK5T/qy3HrQJ8ud1nHSvtFVi5Sa/ubGu
# YEpS8gF6GDWN5/KbveFkdsoTVIPo8pkWhjPs0Q7nA5+uBxQB4zljEjKz5WW7BA4w
# pmFm24fhBmRjV4Nbp+n78cgAjvDSfTlA6DYBcv2kx1JH2dIhaRnSeOXePT6hMF0I
# l598LMu0rw35ViUWcAQkUNUTxRnqGFxz5w+ZusMDAgMBAAGjggFJMIIBRTAdBgNV
# HQ4EFgQUbqL1toyPUdpFyyHSDKWj0I4lw/EwHwYDVR0jBBgwFoAUn6cVXQBeYl2D
# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l
# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD
# ggIBAC5U2bINLgXIHWbMcqVuf9jkUT/K8zyLBvu5h8JrqYR2z/eaO2yo1Ooc9Shy
# vxbe9GZDu7kkUzxSyJ1IZksZZw6FDq6yZNT3PEjAEnREpRBL8S+mbXg+O4VLS0LS
# mb8XIZiLsaqZ0fDEcv3HeA+/y/qKnCQWkXghpaEMwGMQzRkhGwcGdXr1zGpQ7HTx
# vfu57xFxZX1MkKnWFENJ6urd+4teUgXj0ngIOx//l3XMK3Ht8T2+zvGJNAF+5/5q
# Bk7nr079zICbFXvxtidNN5eoXdW+9rAIkS+UGD19AZdBrtt6dZ+OdAquBiDkYQ5k
# VfUMKS31yHQOGgmFxuCOzTpWHalrqpdIllsy8KNsj5U9sONiWAd9PNlyEHHbQZDm
# i9/BNlOYyTt0YehLbDovmZUNazk79Od/A917mqCdTqrExwBGUPbMP+/vdYUqaJsp
# upBnUtjOf/76DAhVy8e/e6zR98PkplmliO2brL3Q3rD6+ZCVdrGM9Rm6hUDBBkvY
# h+YjmGdcQ5HB6WT9Rec8+qDHmbhLhX4Zdaard5/OXeLbgx2f7L4QQQj3KgqjqDOW
# InVhNE1gYtTWLHe4882d/k7Lui0K1g8EZrKD7maOrsJLKPKlegceJ9FCqY1sDUKU
# hRa0EHUW+ZkKLlohKrS7FwjdrINWkPBgbQznCjdE2m47QjTbMIIHcTCCBVmgAwIB
# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1
# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O
# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn
# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t
# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq
# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP
# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW
# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv
# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb
# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc
# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a
# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB
# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw
# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E
# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB
# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/
# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ
# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v
# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h
# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x
# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p
# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A
# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC
# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB
# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt
# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3
# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV
# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw
# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB
# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUANiNHGWXbNaDPxnyi
# DbEOciSjFhCggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAOnRvQQwIhgPMjAyNDA0MjMxMjUyMjBaGA8yMDI0MDQy
# NDEyNTIyMFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6dG9BAIBADAHAgEAAgIH
# /zAHAgEAAgISKDAKAgUA6dMOhAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE
# AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB
# AEtAJf9QQUkfnjakWpA/WTJ4s59d1ydd1YCu0doiQ7zKrtg+fPXaO+UnceDABE97
# pgPadQ3qu9K0ikm1c/cMWaf6FyR3t7zee3PwsEGTk2CPIUwLCYrMasurESYCykjm
# cyo5aeimsVVRSCr36tnZYZLeD4pEzDs6hAxbbMfDl26nMYIEDTCCBAkCAQEwgZMw
# fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
# TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHdXVcdldStqhsAAQAA
# Ad0wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB
# BDAvBgkqhkiG9w0BCQQxIgQgKLrX/TrwloYEuW0hTcUcSNxSFJHSJyjOB9OGQcGX
# d5cwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBh/w4tmmWsT3iZnHtH0Vk3
# 7UCN02lRxY+RiON6wDFjZjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
# QSAyMDEwAhMzAAAB3V1XHZXUraobAAEAAAHdMCIEIOmVHNIZrArpRiTxre+ot/Sc
# GrSRpjA9BFR2kZJAoOaAMA0GCSqGSIb3DQEBCwUABIICAGljHPiVicsnWGoklKSC
# cxh6O8KwnW6/NTwFqaIVU8+S4dHFEURhBSw8ZUZW9Jgqz/O2w5Vdz4zf/rPH7FP/
# af/LvnIc6m0hJkU1olsnKm6TJJHk/11ECNDQJwFYeQfnES8xPMoa536bd3Glc3Os
# Rti3ac3IbyXLZqLiZSuIwGIA6T+g8Mu7UJUZgsvIVty1ABR7rAG+hnulClNbc5FX
# +dbKKw6a9YTA3QtS8tam1LggKNZ6KT4upMwFxeCiwDoEjeTvNxbbhBHxAjIU89L9
# 7uHqQxd8/39Vle9M5J4ChF7aJ48UKwC1tKQd60ub9opJjYNZS2yUJ5lchtDmx9Wc
# 4MF9+pUv0rrjchhRykEk+IMXiAwpJIuvA0mNm6bl0SjwZjN+N0RZ1MhBBV9HLIko
# RmJ9S+l0l9Ds0/A4SUXbp9FyAbuIJcQABDcmEUQ3c1KbJsbGpEDBIH10ryWUIipi
# aBTgp7Fy2mPrdm96+UxyfUv+E7/CU71neUgIkLwraDEK/1RbMfttn3VY0qWy/i6X
# pWuem1YHVvKxNDugLAe61jAZk8+IfYsJdA9y0HlrepykAgroXWAxgbL5fFATBt4T
# YXyNBQtaYr2TM+vI0MFSa1nhEl8fr8Lga5XNgVhNhE5I26XQBRXO+eiGhuVQ0o43
# SCwBqeV8/9nf/cMT7YnAlTen
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_15_0.ps1
|
sample_15_0.ps1
|
#************************************************
# DC_ExchangeServerEventLogs.ps1
# Version 1.2.0
# Date: 2013-05-21
# Author: Brian Prince - brianpr@microsoft.com
# Description: This script calls TS_GetEvents.ps1 to export Exchange Server and backup -related event logs
#************************************************
PARAM([array]$EventLogNames=("Application","System"),
$OutputFormats="",
$ExclusionList="",
$Days="",
$EventLogAdvisorAlertXMLs ="",
$SectionDescription="",
$Prefix=$null,
$Suffix=$null,
$Query=$Null)
#if($debug -eq $true){[void]$shell.popup("Run DC_ExchangeServerEventLogs.ps1")}
Import-LocalizedData -BindingVariable ExchangeEventLogsStrings
If ($Days -ne $null)
{
$Days = $Days
}
Else
{
$Days = 14 #Set default to fourteen days
}
#,"Microsoft-Windows-VHDMP/Operational"
If ([environment]::osversion.Version.Major -gt 5)
{
$EventLogNames += "MSExchange Management","Exchange Auditing","Windows PowerShell"
# Get all event logs with "Microsoft-Exchange" in event log name
# specifically excluding most chatty/huge Exchange 2013 logs
$EventLogNames += wevtutil.exe el | Select-String "Microsoft-Exchange" |
Where-Object {
($_ -notlike "*-ActiveMonitoring/Maintenance*") -and
($_ -notlike "*-ActiveMonitoring/Monitor*") -and
($_ -notlike "*-ActiveMonitoring/Probe*") -and
($_ -notlike "*-ActiveMonitoring/Responder*") -and
($_ -notlike "*-HighAvailability/AppLogMirror") -and
($_ -notlike "*-HighAvailability/Monitoring") -and
($_ -notlike "*-ManagedAvailability/Invoke*") -and
($_ -notlike "*-ManagedAvailability/Monitoring*") -and
($_ -notlike "*-ManagedAvailability/Recovery*") -and
($_ -notlike "*-ManagedAvailability/Remote*") -and
($_ -notlike "*-ManagedAvailability/Startup*")
}
"EventLogNames: $EventLogNames" | WriteTo-StdOut
.\TS_GetEvents.ps1 -EventLogNames $EventLogNames -ExclusionList $ExclusionList -Days $Days -OutputFormats ("CSV","evtx")
}
Else
{
.\TS_GetEvents.ps1 -EventLogNames $EventLogNames -ExclusionList $ExclusionList -Days $Days -OutputFormats ("CSV")
}
#.\TS_GetEvents.ps1 -EventLogNames $EventLogNames -ExclusionList $ExclusionList -Days $Days -OutputFormats ("CSV","evtx","evt") #-EventLogAdvisorAlertXMLs $EventLogAdvisorAlertXMLs
# SIG # Begin signature block
# MIIoVQYJKoZIhvcNAQcCoIIoRjCCKEICAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDLCGmTqhybOTv9
# IUhMb6EMWyXGEz01miN8TPjB/KWa3aCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOQ2
# c1qMgg3rayFzCK1jPyXErEy1bpZqUuwDp8goZF/dMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEARWV1w1kEM7iac06PrDuvaljcCxx9AzLHSRGj
# /W5qw75sgxgXKnSwAAToO38xiWP56s45+/TWrW+Pf3wIbcQyty7TVKrgApNDDVgH
# RgNLEPqUGep+4BhT1JCAv60NPwYB0UoUvISVxoFrludmt4QMkrMOHOut6kRJ50YS
# 4bVuJB07HElHblU/FY1C8Ln1htfGgMATv6cMm/6GrxuEVUPymSsp5sg84cf3EivT
# XuW+WmGnuUvmHYA81lCO3ou/J3+1U+QMvneNyaqfSEUjZ+Dofu7y0fWYTIGb7NDG
# SNjFnWW5ab8bKwpXz5J9Zu0TpSK6DaFabs++VERlOifeDfumy6GCF7AwghesBgor
# BgEEAYI3AwMBMYIXnDCCF5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCD/l1VJXmD1sqxvrwA1LlILQtUee17J9nrE
# 0zuG2wqdWQIGZutZ6YJ5GBMyMDI0MTAyODExNDA0NC40MjJaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo1MjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAACAAvX
# qn8bKhdWAAEAAAIAMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEyMVoXDTI1MTAyMjE4MzEyMVowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjUyMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# r1XaadKkP2TkunoTF573/tF7KJM9Doiv3ccv26mqnUhmv2DM59ikET4WnRfo5biF
# IHc6LqrIeqCgT9fT/Gks5VKO90ZQW2avh/PMHnl0kZfX/I5zdVooXHbdUUkPiZfN
# XszWswmL9UlWo8mzyv9Lp9TAtw/oXOYTAxdYSqOB5Uzz1Q3A8uCpNlumQNDJGDY6
# cSn0MlYukXklArChq6l+KYrl6r/WnOqXSknABpggSsJ33oL3onmDiN9YUApZwjnN
# h9M6kDaneSz78/YtD/2pGpx9/LXELoazEUFxhyg4KdmoWGNYwdR7/id81geOER69
# l5dJv71S/mH+Lxb6L692n8uEmAVw6fVvE+c8wjgYZblZCNPAynCnDduRLdk1jswC
# qjqNc3X/WIzA7GGs4HUS4YIrAUx8H2A94vDNiA8AWa7Z/HSwTCyIgeVbldXYM2Bt
# xMKq3kneRoT27NQ7Y7n8ZTaAje7Blfju83spGP/QWYNZ1wYzYVGRyOpdA8Wmxq5V
# 8f5r4HaG9zPcykOyJpRZy+V3RGighFmsCJXAcMziO76HinwCIjImnCFKGJ/IbLjH
# 6J7fJXqRPbg+H6rYLZ8XBpmXBFH4PTakZVYxB/P+EQbL5LNw0ZIM+eufxCljV4O+
# nHkM+zgSx8+07BVZPBKslooebsmhIcBO0779kehciYMCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBSAJSTavgkjKqge5xQOXn35fXd3OjAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEAKPCG9njRtIqQ+fuECgxzWMsQOI3HvW7sV9PmEWCCOWlTuGCIzNi3ibdL
# ZS0b2IDHg0yLrtdVuBi3FxVdesIXuzYyofIe/alTBdV4DhijLTXtB7NgOno7G12i
# O3t6jy1hPSquzGLry/2mEZBwIsSoS2D+H+3HCJxPDyhzMFqP+plltPACB/QNwZ7q
# +HGyZv3v8et+rQYg8sF3PTuWeDg3dR/zk1NawJ/dfFCDYlWNeCBCLvNPQBceMYXF
# RFKhcSUws7mFdIDDhZpxqyIKD2WDwFyNIGEezn+nd4kXRupeNEx+eSpJXylRD+1d
# 45hb6PzOIF7BkcPtRtFW2wXgkjLqtTWWlBkvzl2uNfYJ3CPZVaDyMDaaXgO+H6Di
# rsJ4IG9ikId941+mWDejkj5aYn9QN6ROfo/HNHg1timwpFoUivqAFu6irWZFw5V+
# yLr8FLc7nbMa2lFSixzu96zdnDsPImz0c6StbYyhKSlM3uDRi9UWydSKqnEbtJ6M
# k+YuxvzprkuWQJYWfpPvug+wTnioykVwc0yRVcsd4xMznnnRtZDGMSUEl9tMVneb
# YRshwZIyJTsBgLZmHM7q2TFK/X9944SkIqyY22AcuLe0GqoNfASCIcZtzbZ/zP4l
# T2/N0pDbn2ffAzjZkhI+Qrqr983mQZWwZdr3Tk1MYElDThz2D0MwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo1MjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAjJOfLZb3ivip
# L3sSLlWFbLrWjmSggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJ6QUwIhgPMjAyNDEwMjgxMDQyMTNaGA8yMDI0
# MTAyOTEwNDIxM1owdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6snpBQIBADAKAgEA
# AgIa1wIB/zAHAgEAAgITPjAKAgUA6ss6hQIBADA2BgorBgEEAYRZCgQCMSgwJjAM
# BgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEB
# CwUAA4IBAQAb6NwhJU6AqC9y7uh2hreA2bMAlUuzSXcR6GPun/rHgrgfQTe4RBRr
# /jfnUT+KQlJtxfDU/IHDXlRFv0FVU5U7cety3IMK0/IZ1ahLcCNSLoMvMnyiTjO3
# qKyN4MEFl3yXKar4dOwpuXIc6RDKvk90wK2dB5N/J0xbq7DWoizimYbYj0s0Eb/3
# 9OIVKvzQ2C32cLh8WRrg+s29DIGtm6yPrp1YUMXeXEBzc765thUReieMSIXpuMhk
# wVuch5mEOYFv2ftoL3lD4CGRFEwUHwwt1rgfRwyWQ+pn3ZXRAA+1v5iEzjN81+VP
# 8zAakq6wB0hFJ6xpVsYTxo1Q4u6bJqYJMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAIAC9eqfxsqF1YAAQAAAgAwDQYJYIZI
# AWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG
# 9w0BCQQxIgQg2Kdt6tppM3nyTbjf1NveAY8Du0L0gnIEqoApsgcLOHIwgfoGCyqG
# SIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDUyO3sNZ3burBNDGUCV4NfM2gH4aWuRudI
# k/9KAk/ZJzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMz
# AAACAAvXqn8bKhdWAAEAAAIAMCIEIL1IrqDou+p7PvcuEWcaTRFbuM53lAEMQcad
# RIs4/Ph4MA0GCSqGSIb3DQEBCwUABIICAGmqypxnNdIkWNxrxQATwHHp3jz5eMdW
# TghS2P9ZzXiUH/7+QJuZBP7Kdbi3IR3K7kxmCRrKrru/RryPJjg1Y//i2fUhQH2V
# DWzfXP/D2LGOYIT2hGffXPyMJyM/1RKizt8j098ZpRCguegszcj2w9olkEehs0e2
# 2sZPsH6kiYCJ+EGEoy+nCiN0E0bmo2nnbghHuJX/BZqauCMXuwJM3qK/adBpttl+
# 1YowRXuCwfTFnjnnZ1VjiMdbFatd47U6Bma4sOZ266ZN499xfbWNiexZIyFvwmiM
# WP4jE0bVf1x0nGctPANy842K2naNoeGCSBggSm4LPLJDogBc9Rs6+Er5KVceDBzp
# kJhNWnXcVPDLQi6q7Wwoo5dBdMVgg7GzzfKHwlUJoRHi6HJ5q6RGKvhUwNoW5dE4
# hkXBFF16cC60BS6mt8bNQ4y+GGFbTQBXZRWmpWAEJ99pN6XW4wpRMHE/N/nlyqDE
# I5wTaFvcM5v21+pFAry9o1PGtdgAXguWEwrwEFHw7D6Js4ypG3umT/EQhUdhcfHo
# SrCRqkujvkre30Akt08Lyii0K52qwBxkoFyYobP5/Gl8lFBW6eoZ9sq1coR7Is8E
# +ExUKJXM56jJG+r2keJ9iFEZff9+oen9zx3QMevwed7VCgArj/W6dKVjtlQSfUMx
# uMDFgsVRoqMR
# SIG # End signature block
|
combined_dataset/train/non-malicious/2846.ps1
|
2846.ps1
|
function LoadModules {
$currentConfig = $psake.context.peek().config
if ($currentConfig.modules) {
$scope = $currentConfig.moduleScope
$global = [string]::Equals($scope, "global", [StringComparison]::CurrentCultureIgnoreCase)
$currentConfig.modules | ForEach-Object {
resolve-path $_ | ForEach-Object {
"Loading module: $_"
$module = Import-Module $_ -passthru -DisableNameChecking -global:$global
if (!$module) {
throw ($msgs.error_loading_module -f $_.Name)
}
}
}
""
}
}
|
combined_dataset/train/non-malicious/Snippet Compiler_2.ps1
|
Snippet Compiler_2.ps1
|
#Required 2.0
$def = $(if ((gi .).FullName -eq (gi .).Root) {
([string](gi .).Root).TrimEnd("\\")
}
else { (gi .).FullName }
)
##################################################################################################
$mnuOpen_Click= {
(New-Object Windows.Forms.OpenFileDialog) | % {
$_.FileName = "source"
$_.Filter = "C# (*.cs)|*.cs"
$_.InitialDirectory = $def
if ($_.ShowDialog() -eq [Windows.Forms.DialogResult]::OK) {
$sr = New-Object IO.StreamReader $_.FileName
$txtEdit.Text = $sr.ReadToEnd()
$sr.Close()
}
}
}
$mnuFont_Click= {
(New-Object Windows.Forms.FontDialog) | % {
$_.Font = "Lucida Console"
$_.MinSize = 10
$_.MaxSize = 12
$_.ShowEffects = $false
if ($_.ShowDialog() -eq [Windows.Forms.DialogResult]::OK) {
$txtEdit.Font = $_.Font
}
}
}
$mnuOpaF_Click= {
$frmMain.Opacity = 1
$cur.Checked = $false
$mnuOpaF.Checked = $true
$cur = $mnuOpaF
}
$mnuWrap_Click= {
$toggle =! $mnuWrap.Checked
$mnuWrap.Checked = $toggle
$txtEdit.WordWrap = $toggle
}
$tbTools_ButtonClick= {
switch ($_.Button.Tag) {
"Atom" { Invoke-Atom; break }
"Progress" { Show-Panel $mnuToS1 $scSplt1; break }
"Params" { Show-Panel $mnuToS2 $scSplt2; break }
"Build" { Invoke-Builder; break }
"BuildEx" { Start-AfterBuilding; break }
"Exit" { $frmMain.Close(); break }
}
}
$cboPlat_SelectedIndexChanged= {
switch ($cboPlat.SelectedIndex) {
"0" { $lboRefs.Items.Remove("`"System.Core.dll`""); break }
"1" { $lboRefs.Items.Add("`"System.Core.dll`""); break }
}
}
$chkExec_Click= {
switch ($chkExec.Checked) {
$true {
$txtIOut.Text = $def + '\\app.exe'
$chkWApp.Enabled = $true
$chkIMem.Enabled = $false
$mnuBnRA.Enabled = $true
$btnBnRA.Enabled = $true
break
}
$false {
$txtIOut.Text = $def + '\\lib.dll'
$chkWApp.Enabled = $false
$chkIMem.Enabled = $true
$mnuBnRA.Enabled = $false
$btnBnRA.Enabled = $false
break
}
}
}
$chkWApp_Click= {
switch ($chkWApp.Checked) {
$true {
$lboRefs.Items.AddRange(@("`"System.Drawing.dll`"", "`"System.Windows.Forms.dll`""))
break
}
$false {
$lboRefs.Items.Remove("`"System.Windows.Forms.dll`"")
$lboRefs.Items.Remove("`"System.Drawing.dll`"")
break
}
}
}
$mnuICnM_Click= {
$script:buff = $lboRefs.SelectedItem
$lboRefs.Items.Remove($lboRefs.SelectedItem)
}
$mnuIIns_Click= {
(New-Object Windows.Forms.OpenFileDialog) | % {
$_.Filter = "PE File (*.dll)|*.dll"
$_.InitialDirectory = [Runtime.InteropServices.RuntimeEnvironment]::GetRuntimeDirectory()
if ($_.ShowDialog() -eq [Windows.Forms.DialogResult]::OK) {
$lboRefs.Items.Add('"' + (Split-Path -leaf $_.FileName) + '"')
}
}
}
$frmMain_Load= {
$txtIOut.Text = $def + '\\app.exe'
$sbPnl_2.Text = "Str: 1, Col: 0"
$lboRefs.Items.Add("`"System.dll`"")
}
##################################################################################################
function frmMain_Show {
Add-Type -AssemblyName System.Windows.Forms
[Windows.Forms.Application]::EnableVisualStyles()
$ico = [Drawing.Icon]::ExtractAssociatedIcon($($PSHome + '\\powershell_ise.exe'))
$cdcp = New-Object CodeDom.Compiler.CompilerParameters
$dict = New-Object "Collections.Generic.Dictionary[String, String]"
$dict.Add("CompilerVersion", "v3.5")
$frmMain = New-Object Windows.Forms.Form
$mnuMain = New-Object Windows.Forms.MainMenu
$mnuFile = New-Object Windows.Forms.MenuItem
$mnuAtom = New-Object Windows.Forms.MenuItem
$mnuOpen = New-Object Windows.Forms.MenuItem
$mnuEmp1 = New-Object Windows.Forms.MenuItem
$mnuExit = New-Object Windows.Forms.MenuItem
$mnuEdit = New-Object Windows.Forms.MenuItem
$mnuUndo = New-Object Windows.Forms.MenuItem
$mnuEmp2 = New-Object Windows.Forms.MenuItem
$mnuCopy = New-Object Windows.Forms.MenuItem
$mnuPast = New-Object Windows.Forms.MenuItem
$mnuICut = New-Object Windows.Forms.MenuItem
$mnuEmp3 = New-Object Windows.Forms.MenuItem
$mnuSAll = New-Object Windows.Forms.MenuItem
$mnuView = New-Object Windows.Forms.MenuItem
$mnuFont = New-Object Windows.Forms.MenuItem
$mnuEmp4 = New-Object Windows.Forms.MenuItem
$mnuOpac = New-Object Windows.Forms.MenuItem
$mnuOp50 = New-Object Windows.Forms.MenuItem
$mnuOp60 = New-Object Windows.Forms.MenuItem
$mnuOp70 = New-Object Windows.Forms.MenuItem
$mnuOp80 = New-Object Windows.Forms.MenuItem
$mnuOp90 = New-Object Windows.Forms.MenuItem
$mnuOpaF = New-Object Windows.Forms.MenuItem
$mnuTgls = New-Object Windows.Forms.MenuItem
$mnuWrap = New-Object Windows.Forms.MenuItem
$mnuToS1 = New-Object Windows.Forms.MenuItem
$mnuToS2 = New-Object Windows.Forms.MenuItem
$mnuMake = New-Object Windows.Forms.MenuItem
$mnuBAsm = New-Object Windows.Forms.MenuItem
$mnuBnRA = New-Object Windows.Forms.MenuItem
$mnuHelp = New-Object Windows.Forms.MenuItem
$mnuInfo = New-Object Windows.Forms.MenuItem
$tbTools = New-Object Windows.Forms.ToolBar
$btnAtom = New-Object Windows.Forms.ToolBarButton
$btnToS1 = New-Object Windows.Forms.ToolBarButton
$btnMake = New-Object Windows.Forms.ToolBarButton
$btnBAsm = New-Object Windows.Forms.ToolBarButton
$btnBnRA = New-Object Windows.Forms.ToolBarButton
$btnExit = New-Object Windows.Forms.ToolBarButton
$scSplt1 = New-Object Windows.Forms.SplitContainer
$scSplt2 = New-Object Windows.Forms.SplitContainer
$lstView = New-Object Windows.Forms.ListView
$chPoint = New-Object Windows.Forms.ColumnHeader
$chError = New-Object Windows.Forms.ColumnHeader
$chCause = New-Object Windows.Forms.ColumnHeader
$txtEdit = New-Object Windows.Forms.RichTextBox
$gboMake = New-Object Windows.Forms.GroupBox
$lblLab1 = New-Object Windows.Forms.Label
$cboPlat = New-Object Windows.Forms.ComboBox
$chkExec = New-Object Windows.Forms.CheckBox
$chkWApp = New-Object Windows.Forms.CheckBox
$chkIDbg = New-Object Windows.Forms.CheckBox
$chkIMem = New-Object Windows.Forms.CheckBox
$lblLab2 = New-Object Windows.Forms.Label
$txtIOut = New-Object Windows.Forms.TextBox
$lblLab3 = New-Object Windows.Forms.Label
$lboRefs = New-Object Windows.Forms.ListBox
$sbPanel = New-Object Windows.Forms.StatusBar
$sbPnl_1 = New-Object Windows.Forms.StatusBarPanel
$sbPnl_2 = New-Object Windows.Forms.StatusBarPanel
$imgList = New-Object Windows.Forms.ImageList
$mnuRefs = New-Object Windows.Forms.ContextMenu
$mnuIMov = New-Object Windows.Forms.MenuItem
$mnuICnM = New-Object Windows.Forms.MenuItem
$mnuIBuf = New-Object Windows.Forms.MenuItem
$mnuIIns = New-Object Windows.Forms.MenuItem
#
#mnuMain
#
$mnuMain.MenuItems.AddRange(@($mnuFile, $mnuEdit, $mnuView, $mnuMake, $mnuHelp))
#
#mnuFile
#
$mnuFile.MenuItems.AddRange(@($mnuAtom, $mnuOpen, $mnuEmp1, $mnuExit))
$mnuFile.Text = "&File"
#
#mnuAtom
#
$mnuAtom.Shortcut = "F3"
$mnuAtom.Text = "Nu&Clear..."
$mnuAtom.Add_Click({Invoke-Atom})
#
#mnuOpen
#
$mnuOpen.Shortcut = "CtrlO"
$mnuOpen.Text = "&Open"
$mnuOpen.Add_Click($mnuOpen_Click)
#
#mnuEmp1
#
$mnuEmp1.Text = "-"
#
#mnuExit
#
$mnuExit.Shortcut = "CtrlX"
$mnuExit.Text = "E&xit"
$mnuExit.Add_Click({$frmMain.Close()})
#
#mnuEdit
#
$mnuEdit.menuItems.AddRange(@($mnuUndo, $mnuEmp2, $mnuCopy, $mnuPast, $mnuICut, `
$mnuEmp3, $mnuSAll))
$mnuEdit.Text = "&Edit"
#
#mnuUndo
#
$mnuUndo.Shortcut = "CtrlZ"
$mnuUndo.Text = "&Undo"
$mnuUndo.Add_Click({$txtEdit.Undo()})
#
#mnuEmp2
#
$mnuEmp2.Text = "-"
#
#mnuCopy
#
$mnuCopy.Shortcut = "CtrlC"
$mnuCopy.Text = "&Copy"
$mnuCopy.Add_Click({if ($txtEdit.SelectionLength -ge 0) {$txtEdit.Copy()}})
#
#mnuPast
#
$mnuPast.Shortcut = "CtrlV"
$mnuPast.Text = "&Paste"
$mnuPast.Add_Click({$txtEdit.Paste()})
#
#mnuICut
#
$mnuICut.Shortcut = "Del"
$mnuICut.Text = "Cut &Item"
$mnuICut.Add_Click({if ($txtEdit.SelectionLength -ge 0) {$txtEdit.Cut()}})
#
#mnuEmp3
#
$mnuEmp3.Text = "-"
#
#mnuSAll
#
$mnuSAll.Shortcut = "CtrlA"
$mnuSAll.Text = "Select &All"
$mnuSAll.Add_Click({$txtEdit.SelectAll()})
#
#mnuView
#
$mnuView.MenuItems.AddRange(@($mnuFont, $mnuEmp4, $mnuOpac, $mnuTgls))
$mnuView.Text = "&View"
#
#mnuFont
#
$mnuFont.Text = "&Font..."
$mnuFont.Add_Click($mnuFont_Click)
#
#mnuEmp4
#
$mnuEmp4.Text = "-"
#
#mnuOpac
#
$mnuOpac.MenuItems.AddRange(@($mnuOp50, $mnuOp60, $mnuOp70, $mnuOp80, $mnuOp90, $mnuOpaF))
$mnuOpac.Text = "&Opacity"
#
#mnuOp50
#
$mnuOp50.Text = "50%"
$mnuOp50.Add_Click({Set-Opacity $mnuOp50; $cur = $mnuOp50})
#
#mnuOp60
#
$mnuOp60.Text = "60%"
$mnuOp60.Add_Click({Set-Opacity $mnuOp60; $cur = $mnuOp60})
#
#mnuOp70
#
$mnuOp70.Text = "70%"
$mnuOp70.Add_Click({Set-Opacity $mnuOp70; $cur = $mnuOp70})
#
#mnuOp80
#
$mnuOp80.Text = "80%"
$mnuOp80.Add_Click({Set-Opacity $mnuOp80; $cur = $mnuOp80})
#
#mnuOp90
#
$mnuOp90.Text = "90%"
$mnuOp90.Add_Click({Set-Opacity $mnuOp90; $cur = $mnuOp90})
#
#mnuOpaF
#
$cur = $mnuOpaF #checked item by default
$mnuOpaF.Checked = $true
$mnuOpaF.Text = "Opaque"
$mnuOpaF.Add_Click($mnuOpaF_Click)
#
#mnuTgls
#
$mnuTgls.MenuItems.AddRange(@($mnuWrap, $mnuToS1, $mnuToS2))
$mnuTgls.Text = "&Toggles"
#
#mnuWrap
#
$mnuWrap.Checked = $true
$mnuWrap.Shortcut = "CtrlW"
$mnuWrap.Text = "&Wrap Mode"
$mnuWrap.Add_Click($mnuWrap_Click)
#
#mnuToS1
#
$mnuToS1.Checked = $true
$mnuToS1.Text = "Building &Progress"
$mnuToS1.Add_Click({Show-Panel $mnuToS1 $scSplt1})
#
#mnuToS2
#
$mnuToS2.Checked = $true
$mnuToS2.Shortcut = "F12"
$mnuToS2.Text = "Building P&roperties"
$mnuToS2.Add_Click({Show-Panel $mnuToS2 $scSplt2})
#
#mnuMake
#
$mnuMake.MenuItems.AddRange(@($mnuBAsm, $mnuBnRA))
$mnuMake.Text = "&Build"
#
#mnuBAsm
#
$mnuBAsm.Shortcut = "F5"
$mnuBAsm.Text = "&Compile"
$mnuBAsm.Add_Click({Invoke-Builder})
#
#mnuBnRA
#
$mnuBnRA.Shortcut = "F9"
$mnuBnRA.Text = "Compile And &Run"
$mnuBnRA.Add_Click({Start-AfterBuilding})
#
#mnuHelp
#
$mnuHelp.MenuItems.AddRange(@($mnuInfo))
$mnuHelp.Text = "&Help"
#
#mnuInfo
#
$mnuInfo.Text = "About..."
$mnuInfo.Add_Click({frmInfo_Show})
#
#tbTools
#
$tbTools.Buttons.AddRange(@($btnAtom, $btnToS1, $btnMake, $btnBAsm, $btnBnRA, $btnExit))
$tbTools.ImageList = $imgList
$tbTools.Add_ButtonClick($tbTools_ButtonClick)
#
#btnAtom
#
$btnAtom.ImageIndex = 0
$btnAtom.Tag = "Atom"
$btnAtom.ToolTipText = "NuClear (F3)"
#
#btnToS1
#
$btnToS1.ImageIndex = 1
$btnToS1.Tag = "Progress"
$btnToS1.ToolTipText = "Building Progress Panel"
#
#btnMake
#
$btnMake.ImageIndex = 2
$btnMake.Tag = "Params"
$btnMake.ToolTipText = "Building Properties (F12)"
#
#btnBAsm
#
$btnBAsm.ImageIndex = 3
$btnBAsm.Tag = "Build"
$btnBAsm.ToolTipText = "Compile (F5)"
#
#btnBnRA
#
$btnBnRA.ImageIndex = 4
$btnBnRA.Tag = "BuildEx"
$btnBnRA.ToolTipText = "Compile And Run (F9)"
#
#btnExit
#
$btnExit.ImageIndex = 5
$btnExit.Tag = "Exit"
$btnExit.ToolTipText = "Exit (Ctrl+X)"
#
#scSplt1
#
$scSplt1.Anchor = "Left, Top, Right, Bottom"
$scSplt1.Location = New-Object Drawing.Point(0, 28)
$scSplt1.Orientation = "Horizontal"
$scSplt1.Panel1.Controls.Add($scSplt2)
$scSplt1.Panel2.Controls.Add($lstView)
$scSplt1.Size = New-Object Drawing.Size(790, 500)
$scSplt1.SplitterDistance = 410
$scSplt1.SplitterWidth = 1
#
#scSplt2
#
$scSplt2.Dock = "Fill"
$scSplt2.Panel1.Controls.Add($txtEdit)
$scSplt2.Panel2.Controls.Add($gboMake)
$scSplt2.SplitterDistance = 510
$scSplt2.SplitterWidth = 1
#
#lstView
#
$lstView.Columns.AddRange(@($chPoint, $chError, $chCause))
$lstView.Dock = "Fill"
$lstView.FullRowSelect = $true
$lstView.GridLines = $true
$lstView.MultiSelect = $false
$lstView.ShowItemToolTips = $true
$lstView.SmallImageList = $imgList
$lstView.View = "Details"
#
#chPoint
#
$chPoint.Text = "Line"
$chPoint.Width = 50
#
#chError
#
$chError.Text = "Error"
$chError.TextAlign = "Right"
$chError.Width = 65
#
#chCause
#
$chCause.Text = "Description"
$chCause.Width = 650
#
#txtEdit
#
$txtEdit.AcceptsTab = $true
$txtEdit.Dock = "Fill"
$txtEdit.Font = New-Object Drawing.Font("Courier New", 10)
$txtEdit.ScrollBars = "Both"
$txtEdit.Add_Click({Write-CursorPoint})
$txtEdit.Add_KeyUp({Write-CursorPoint})
$txtEdit.Add_TextChanged({Write-CursorPoint})
#
#gboMake
#
$gboMake.Controls.AddRange(@($lblLab1, $cboPlat, $chkExec, $chkWApp, $chkIDbg, `
$chkIMem, $lblLab2, $txtIOut, $lblLab3, $lboRefs))
$gboMake.Dock = "Fill"
$gboMake.Text = "Building Parameters"
#
#lblLab1
#
$lblLab1.Location = New-Object Drawing.Point(21, 33)
$lblLab1.Text = "Platform:"
$lblLab1.Width = 50
#
#cboPlat
#
$cboPlat.Anchor = "Left, Top, Right"
$cboPlat.Items.AddRange(@(".NET Framework 2.0", ".NET Framework 3.5"))
$cboPlat.Location = New-Object Drawing.Point(71, 30)
$cboPlat.SelectedItem = ".NET Framework 2.0"
$cboPlat.Width = 180
$cboPlat.Add_SelectedIndexChanged($cboPlat_SelectedIndexChanged)
#
#chkExec
#
$chkExec.Checked = $true
$chkExec.Location = New-Object Drawing.Point(23, 63)
$chkExec.Text = "Create Executable"
$chkExec.Width = 120
$chkExec.Add_Click($chkExec_Click)
#
#chkWApp
#
$chkWApp.Location = New-Object Drawing.Point(43, 83)
$chkWApp.Text = "Windows Application"
$chkWApp.Width = 130
$chkWApp.Add_Click($chkWApp_Click)
#
#chkIDbg
#
$chkIDbg.Checked = $true
$chkIDbg.Location = New-Object Drawing.Point(23, 103)
$chkIDbg.Text = "Include Debug Information"
$chkIDbg.Width = 157
#
#chkIMem
#
$chkIMem.Enabled = $false
$chkIMem.Location = New-Object Drawing.Point(23, 123)
$chkIMem.Text = "Building In Memory"
$chkIMem.Width = 130
#
#lblLab2
#
$lblLab2.Location = New-Object Drawing.Point(23, 163)
$lblLab2.Text = "Output:"
$lblLab2.Width = 45
#
#txtIOut
#
$txtIOut.Anchor = "Left, Top, Right"
$txtIOut.Location = New-Object Drawing.Point(71, 160)
$txtIOut.Width = 180
#
#lblLab3
#
$lblLab3.Location = New-Object Drawing.Point(23, 203)
$lblLab3.Size = New-Object Drawing.Size(70, 17)
$lblLab3.Text = "References:"
#
#lboRefs
#
$lboRefs.Anchor = "Left, Top, Right, Bottom"
$lboRefs.ContextMenu = $mnuRefs
$lboRefs.Location = New-Object Drawing.Point(23, 223)
$lboRefs.SelectionMode = "One"
$lboRefs.Size = New-Object Drawing.Size(229, 157)
#
#sbPanle
#
$sbPanel.Panels.AddRange(@($sbPnl_1, $sbPnl_2))
$sbPanel.ShowPanels = $true
$sbPanel.SizingGrip = $false
#
#sbPnl_1
#
$sbPnl_1.AutoSize = "Spring"
#
#sbPnl_2
#
$sbPnl_2.Alignment = "Center"
$sbPnl_2.AutoSize = "Contents"
#
#imgList
#
$i_1, $i_2, $i_3, $i_4, $i_5, $i_6, $i_7, $i_8 | % { $imgList.Images.Add((Get-Image $_)) }
#
#mnuRefs
#
$mnuRefs.MenuItems.AddRange(@($mnuIMov, $mnuICnM, $mnuIBuf, $mnuIIns))
#
#mnuIMov
#
$mnuIMov.Shortcut = "Del"
$mnuIMov.Text = "Remove Item"
$mnuIMov.Add_Click({$lboRefs.Items.Remove($lboRefs.SelectedItem)})
#
#mnuICnM
#
$mnuICnM.Shortcut = "CtrlM"
$mnuICnM.Text = "Copy And Remove"
$mnuICnM.Add_Click($mnuICnM_Click)
#
#mnuIBuf
#
$mnuIBuf.Text = "Insert Copied..."
$mnuIBuf.Add_Click({if ($script:buff -ne $null) {$lboRefs.Items.Add($script:buff)}})
#
#mnuIIns
#
$mnuIIns.Shortcut = "CtrlR"
$mnuIIns.Text = "Add Reference"
$mnuIIns.Add_Click($mnuIIns_Click)
#
#frmMain
#
$frmMain.ClientSize = New-Object Drawing.Size(790, 550)
$frmMain.Controls.AddRange(@($tbTools, $scSplt1, $sbPanel))
$frmMain.FormBorderStyle = "FixedSingle"
$frmMain.Icon = $ico
$frmMain.Menu = $mnuMain
$frmMain.StartPosition = "CenterScreen"
$frmMain.Text = "Snippet Compiler"
$frmMain.Add_Load($frmMain_Load)
[void]$frmMain.ShowDialog()
}
##################################################################################################
function frmInfo_Show {
$frmInfo = New-Object Windows.Forms.Form
$pbImage = New-Object Windows.Forms.PictureBox
$lblName = New-Object Windows.Forms.Label
$lblCopy = New-Object Windows.Forms.Label
$btnExit = New-Object Windows.Forms.Button
#
#pbImage
#
$pbImage.Location = New-Object Drawing.Point(16, 16)
$pbImage.Size = New-Object Drawing.Size(32, 32)
$pbImage.SizeMode = "StretchImage"
#
#lblName
#
$lblName.Font = New-Object Drawing.Font("Microsoft Sans Serif", 8, [Drawing.FontStyle]::Bold)
$lblName.Location = New-Object Drawing.Point(53, 19)
$lblName.Size = New-Object Drawing.Size(360, 18)
$lblName.Text = "Snippet Compiler v2.54"
#
#lblCopy
#
$lblCopy.Location = New-Object Drawing.Point(67, 37)
$lblCopy.Size = New-Object Drawing.Size(360, 23)
$lblCopy.Text = "(C) 2012-2013 greg zakharov gregzakh@gmail.com"
#
#btnExit
#
$btnExit.Location = New-Object Drawing.Point(135, 67)
$btnExit.Text = "OK"
#
#frmInfo
#
$frmInfo.AcceptButton = $btnExit
$frmInfo.CancelButton = $btnExit
$frmInfo.ClientSize = New-Object Drawing.Size(350, 110)
$frmInfo.ControlBox = $false
$frmInfo.Controls.AddRange(@($pbImage, $lblName, $lblCopy, $btnExit))
$frmInfo.ShowInTaskBar = $false
$frmInfo.StartPosition = "CenterScreen"
$frmInfo.Text = "About..."
$frmInfo.Add_Load({$pbImage.Image = $ico.ToBitmap()})
[void]$frmInfo.ShowDialog()
}
##################################################################################################
function Invoke-Atom {
if ($txtEdit.Text -ne "") {
$res = [Windows.Forms.MessageBox]::Show("Do you want to save data before?", `
$frmMain.Text, [Windows.Forms.MessageBoxButtons]::YesNoCancel, `
[Windows.Forms.MessageBoxIcon]::Question)
switch ($res) {
'Yes' {
(New-Object Windows.Forms.SaveFileDialog) | % {
$_.FileName = "source"
$_.Filter = "C# (*.cs)|*.cs"
$_.InitialDirectory = $def
if ($_.ShowDialog() -eq [Windows.Forms.DialogResult]::OK) {
Out-File $_.FileName -enc UTF8 -input $txtEdit.Text
}
}
break
}
'No' { $txtEdit.Clear(); break }
'Cancel' { return }
}
}#if
}
function Set-Opacity($obj) {
$cur.Checked = $false
$frmMain.Opacity = [float]('.' + $($obj.Text)[0])
$obj.Checked = $true
}
function Show-Panel($obj1, $obj2) {
switch ($obj1.Checked) {
$true {$obj1.Checked = $false; $obj2.Panel2Collapsed = $true; break }
$false {$obj1.Checked = $true; $obj2.Panel2Collapsed = $false; break }
}
}
function Get-CursorPoint {
$z = $txtEdit.SelectionStart
$y = $txtEdit.GetLineFromCharIndex($z) + 1
$x = $z - $txtEdit.GetFirstCharIndexOfCurrentLine()
return (New-Object Drawing.Point($x, $y))
}
function Write-CursorPoint {
$sbPnl_2.Text = 'Str: ' + (Get-CursorPoint).Y.ToString() + ', Col: ' + `
(Get-CursorPoint).X.ToString()
}
function Invoke-Builder {
$lstView.Items.Clear()
if ($txtEdit.Text -ne "") {
switch ($cboPlat.SelectedIndex) {
"0" { $cscp = New-Object Microsoft.CSharp.CSharpCodeProvider; break }
"1" { $cscp = New-Object Microsoft.CSharp.CSharpCodeProvider($dict); break}
}
$cdcp.GenerateExecutable = $chkExec.Checked
if ($chkWApp.Checked) { $cdcp.CompilerOptions = "/t:winexe" }
$cdcp.IncludeDebugInformation = $chkIDbg.Checked
$cdcp.GenerateInMemory = $chkIMem.Checked
if ($lboRefs.Items.Count -ne 0) {
for ($i = 0; $i -lt $lboRefs.Items.Count; $i++) {
$cdcp.ReferencedAssemblies.Add($lboRefs.Items[$i].ToString())
}
}
$cdcp.WarningLevel = 3
$cdcp.OutputAssembly = $txtIOut.Text
$script:make = $cscp.CompileAssemblyFromSource($cdcp, $txtEdit.Text)
$make.Errors | % {
if ($_.Line -ne 0 -and $_.Column -ne 0) {
$err = $_.Line.ToString() + ', ' + ($_.Column - 1).ToString()
}
elseif ($_.Line -ne 0 -and $_.Column -eq 0) {
$err = $_.Line.ToString() + ', 0'
}
elseif ($_.Line -eq 0 -and $_.Column -eq 0) {
$err = '*'
}
if (!($_.IsWarning)) {
$lstView.ForeColor = [Drawing.Color]::Crimson
$itm = $lstView.Items.Add($err, 6)
}
else {
$lstView.ForeColor = [Drawing.Color]::Gray
$itm = $lstView.Items.Add($err, 7)
}
$itm.SubItems.Add($_.ErrorNumber)
$itm.SubItems.Add($_.ErrorText)
}
}#if
}
function Start-AfterBuilding {
Invoke-Builder
if ($script:make.Errors.Count -eq 0) { Invoke-Item $txtIOut.Text }
}
function Get-Image($img) {
[Drawing.Image]::FromStream((New-Object IO.MemoryStream(($$ = `
[Convert]::FromBase64String($img)), 0, $$.Length)))
}
##################################################################################################
#
#do not modify or remove this because these are images for toolbar and lower panel
#
$i_1 = "iVBORw0KGgoAAAANSUhEUgAAAA8AAAARCAIAAACNaGH2AAAAAXNSR0IArs4c6QAAAARnQU1BAACxjwv8YQUAA" + `
"AAgY0hSTQAAeiYAAICEAAD6AAAAgOgAAHUwAADqYAAAOpgAABdwnLpRPAAAAVFJREFUOE91kTGOgzAQRc2ZOA" + `
"s9lU+Uxj1lak7hMtJKVCjalSIZkpiEVbSN980Y2GijjEaDgTff3+PiNs/GmJQKKk+txuhboR9TsX7kCd22rXP" + `
"eeU/d7/eydr5pGuput6NO8yx5n810/4Z7vMT1kUjrCJod9G2h3XvaOp8ScqW1St8iTt5qW1dVVV3XpXXxHoVm" + `
"r3+0ejCDhveiTYPQcYqcbKN/wof+ddCkXyLhJE5XodFGjAaffIaeE21aVjqODCvTWYzd+75nXcqroATu4zSaG" + `
"Ee0IWjw3mbHzEE75UtusJwS+hIHxgkkB1KIPBwOyHddt/aIk8s1LDQc9KtpvWIJJij0+XzievOkqHi11ujdO7" + `
"Q336J9PgnNfW2j5ffz4NYJim+hx/EL7U0Dx8veG7hOcBw+heaU2GIvar7kvNYqiTATFDqE418Ox6A55AySz8A" + `
"v1EEhBG84RKcAAAAASUVORK5CYII="
$i_2 = "iVBORw0KGgoAAAANSUhEUgAAABIAAAARCAIAAABfOGuuAAAAAXNSR0IArs4c6QAAAARnQU1BAACxjwv8YQUAA" + `
"AAgY0hSTQAAeiYAAICEAAD6AAAAgOgAAHUwAADqYAAAOpgAABdwnLpRPAAAAOVJREFUOE+VkUEOgyAQRfFMnM" + `
"NrzJ3Yu3TtKTiEaVOTFgICXXQ3nQG1xjapkOEzII8vQ5OeSQiB1IVoysBZGZY5Yp4vi7QNBWFKoVJ6U8g5Kaw" + `
"qQUuFrMCaUlwxjeoQfBbBHFtCZxEWV0wDMd8mbMj71iiGGYvRE/A63SRAiI6xYRiIwnNNyoxRL27nKPpPCCFj" + `
"1W6MzabOTcIcDGN93+dX+h9aa7obY94/6iopwfs7Y13XVZRkwdxUdzcA527Cu6nWjTFrr3VuEqy9MEZuVB96R" + `
"9ZfSdu2n3XImDHjFtaM+9h/OuRvranSBDuoeeYAAAAASUVORK5CYII="
$i_3 = "iVBORw0KGgoAAAANSUhEUgAAABIAAAAQCAIAAACUZLgLAAAAAXNSR0IArs4c6QAAAARnQU1BAACxjwv8YQUAA" + `
"AAgY0hSTQAAeiYAAICEAAD6AAAAgOgAAHUwAADqYAAAOpgAABdwnLpRPAAAAWJJREFUOE+FkTFywjAQRcUROI" + `
"sqWnpKeirVHIFD0OwdqDnFnsANZiZFEguwncad8tYCm2Bmovksa3nffq08a38aN13psTXLyeM5/7MJ9kdtoyK" + `
"qBFbY7/fE3W4nIRyPR1EJGsxpiqUk2+02pWDSe1QNEjwtIA1r2muvS1ZZljQGoGJgLFGP2PTiKTPMOgiFmg9H" + `
"UWYWi0UPBFWv4pO4EaubyCyiSTUxTeL0wXOkzWaD53K5BOjlcPJIPIjjhw8M09MYhi5E8tVqxcG8d/P5nLher" + `
"/vXhri6/sKk67oYIzdBJKcNRZgAYEtBXX8iEh8MGTGqn9fhcOBURVHQCNuMAWS52816vDA81l0C0GQz40zZs0" + `
"bMvqYoQE6Yl0gO7EN4xa7Xj6lbtjI3bjglDkmZ6XKXG7DBLZsMhpBvsBjPb93G2Xq3SzyjGEtTdXZg3DsvmJv" + `
"4nOTHvF6xqjr9r+9TlfUo/gXNq15sSG6qYQAAAABJRU5ErkJggg=="
$i_4 = "iVBORw0KGgoAAAANSUhEUgAAABQAAAARCAIAAABSJhvpAAAAAXNSR0IArs4c6QAAAARnQU1BAACxjwv8YQUAA" + `
"AAgY0hSTQAAeiYAAICEAAD6AAAAgOgAAHUwAADqYAAAOpgAABdwnLpRPAAAARRJREFUOE9tklFuxCAMROH+J9" + `
"jTNU1VabUQAmT/qc3AwNJYoyQEPzwYbH5fthRTo1iLN4a26LD0oYyRhFkNga8rQ/JdlR8PUzSMfEA1M6kkrUt" + `
"+yaDRzKuw8sDmGJWuPGBWa1uoldXmPwvNpsL5zDmIWA01p2ezQF8pB2jAUmR2C8NYAlMIkgqndMQURFgY+8ST" + `
"/LLtqMghYINnz51p3eIW2PkBx+hifLFb7DDOic7nY0vpJRLKANavGkhiKrq92B7weT6p5WB6WWXZsI98Dmbny" + `
"zktV20UC+H3rGLP6B+GedXYf0EgQ1j4eW+8WMuGSSrs/c/h90W3Bb3fq7679ntY1loKyp8b2LltkXfbrGn2y7" + `
"lZ2x9XMW8UGH69+AAAAABJRU5ErkJggg=="
$i_5 = "iVBORw0KGgoAAAANSUhEUgAAABIAAAAQCAIAAACUZLgLAAAAAXNSR0IArs4c6QAAAARnQU1BAACxjwv8YQUAA" + `
"AAgY0hSTQAAeiYAAICEAAD6AAAAgOgAAHUwAADqYAAAOpgAABdwnLpRPAAAAhNJREFUOE9jfPPyBgMZAKgNju" + `
"o2nlWtXqVVtQpOAhnIKGDqbohiBmQ9fXuv77rzbsOdtxC08dY7NLTu0tvgaXtQtOk3rQcq7Tv5BEheePFx4rm" + `
"X7SefQ1DrcRC7+9TLxVdfuEzdiaIN6IAZpx/V7r0F1Pbr77/7H382HH9eeugpEBXvA6GmA89699/OX3ISRVve" + `
"irNAPambrhXvubPzwXugznOvvmYffJq0/SEQxa+/V7ntYeHasyh+q1x3unLzhYTV53wWnw1afSVpx929jz8Bd" + `
"a66+8Fu8W3TKZd0u85FzbvqO20fijagC4Ha3OccNZ9+zGTOOasll6P2PHjx9fenn39MZ1xTaTqjUnEideYls9" + `
"aNKNqAoQx0pFbHTo2+Q0BtufsfPv3yC+i92A13gfYA9egWHMxfchFdm23Xlri5B4DarOadAAYX0HnAgHFdegP" + `
"oPL3mM5oVx8zKjhStuARUg2Jb1Kx9QTP3WE/bBwx6oMMaD98LX3sdEmnAuAIit8ZjQOd0br+I0Na27ULB4iPu" + `
"E7YA42T5hYdBi0+Y9O/3n3fmwL13Jx992nH9HRAFdZ0On30YnjZAqQRodeXyg5b1yzTKFwERMHEBkXbtLuPmg" + `
"0BkUHkE6DFgeAA9gqINmF6m7blQtfJQ/sL9+YsPAW0GxikYXYSg0mVXJ+6+DQw2FG1ADlAnWqpF40KSIro2ZC" + `
"Fi2ACR3EDpQ7cspgAAAABJRU5ErkJggg=="
$i_6 = "iVBORw0KGgoAAAANSUhEUgAAAA8AAAANCAIAAAD5fKMWAAAAAXNSR0IArs4c6QAAAARnQU1BAACxjwv8YQUAA" + `
"AAgY0hSTQAAeiYAAICEAAD6AAAAgOgAAHUwAADqYAAAOpgAABdwnLpRPAAAAJxJREFUKFONjEEOwyAMBMn/P5" + `
"lD1FSCENt5QLpgcA1tpaI52LtjFrk42LvvMi59r9uwwn4jJOAqwAS2llAoMCegHUsq9LWFVVAG22odADm12hS" + `
"JGyb1s8ioICgcBxudP8A620RPz/T91IZPG4m/8UI4z92AVOcH8AeaoPppfzvYQ86bgs/ysQ3U0ED1l91+hJ3i" + `
"mlLjiCsoidJzG15Z2J4gUYDWoQAAAABJRU5ErkJggg=="
$i_7 = "iVBORw0KGgoAAAANSUhEUgAAABAAAAAQCAIAAACQkWg2AAAAAXNSR0IArs4c6QAAAARnQU1BAACxjwv8YQUAA" + `
"AAgY0hSTQAAeiYAAICEAAD6AAAAgOgAAHUwAADqYAAAOpgAABdwnLpRPAAAAsZJREFUOE9FkmtIk1EYx9/nvH" + `
"u3V+dUyltIIaI5DAsiyy5SlphmCprpirnp8MWaoEikXwzayrQgzTLtQ0hN0UIssyQv1AcnQnMaXlIzTDOsvG7" + `
"OnG7qTmdq+vBwLpzf/znP4fwBY0z9D6O+k6qpdlha5lOwsri4zDI2eSqz/4DQyWmLoYiAhNlg+JsQjzkOFxXh" + `
"ykpcUYELCnBGBo6Onj1xfH5iYgOzV9+gLafDcGoqVqlwYSHOzcUKBU5JsWd8PA4NnQvY211fty2Yi47CERE2i" + `
"eRDerotONjm7W1xdV11d1/192+NicFBQSaxWO/jM/Fz3H7DtE5nDgzEISHNKtXIzExTVtYUwC+A3wBPpFL96K" + `
"g2O9vg5TXg6VkadtIuGEpKMPj62vz8Rjhu1mIxLi015+aOATy7cvWP0UiIaaXyh0jU6eKicXXt7+ulevcFjnl" + `
"4kBqTLNsnkxms1sWVlX6t1mQ2E3qc477weH1CYZujY4ODw7VMJdW+c0ePs/N3F5dhgaAfoFuWvGyzEXQN428K" + `
"hQ5AzzA6gaCVz28QCKRxsVSrl6eWZT+zbA+f3wVQl5NjXSMwJqI2tbodoJ2mP/J4r2i6imEuno+img4famSYN" + `
"ob5hFCJXD41P0/oSY1mBeMFq/VldnYLQANCGoTu03RSQhzVVVJcw+O9BXisVE6uv7KP494BdHCcaXXVZLHU5+" + `
"VVkVOaTqbp/PyblMlorBYKNQCNEgmp2p2W9hrgDUJkbJHLib41MfEBwD2EgtzchgYH7D/dUV5WjlAZQK1Y/By" + `
"gmiRClQBPAaoCAu4C5CMUSdPy5Eub1iDTe7W6mHQJUAJQShoAeAhAtvkAKoBYhI4dPTK/3vCm+ciq/lHJDZHo" + `
"DkK3AW6tcyQzETrIspFnw41Gw7aXtpw4/HXwuuyyNFB8YZfXOU+PkD27w8+cqq19sbBg2mL+AY/qjcgixtNMA" + `
"AAAAElFTkSuQmCC"
$i_8 = "iVBORw0KGgoAAAANSUhEUgAAAA8AAAAPCAIAAAC0tAIdAAAABGdBTUEAALGPC/xhBQAAAglJREFUKFN1jktoE" + `
"1EUhufMTCbJNNNFS01xZ9GFCCIYhBYUF1XR7nygSxvRVSS6kbQoEoklYggUiuJj300NkRpsXdqNZhHRpp1ETW" + `
"LSdJJ08piZmFGbx3EmDdoUvfxc/vvf/3wcArtPsXir2bBUq+bZ2Vc7vrQnsT1S1ZKYB0Rbq8F5vSM8n9wx0NU" + `
"uCK6axCCy2ByURMbhmPlvW1XLxQy5keu96aAWFqxYZ+65j6XT69sH/rILmQlVNLjdrBn2HRiyYbO/+M3k8wX+" + `
"0VZrlQ2exp/c00cMRx4ZGz6E2NeSmTuu0UpF+TPQYeeTt6spAypsOgZDg+efePejQuMPq7DM+v3BrrZak3IRQ" + `
"73QgwKJMowcvLwU6kcBUB1orFOuGyclqYPX2YWEW4pSKFowDViGC2eGy3FK9zlTq9SXCfdMT7/cwhP6xmFjY4" + `
"3DFI0JwAyEnlkxC7r/Cvh9dzNJTzpPyW08kefvKhEasxzGAD+DEqPck8Z3QbNejQOmTCjuyi6x/jaeyL811WM" + `
"s8hSuAPLwYIKxGPeeOHwa10BPooD5gUaUctrHZFkhsm/gV4Ta/EBqqn8kl+eNo7aj4cDVehQ64Se69p5afL5n" + `
"5vFr4st878ocuToHW4oHQFiERBBWX3QSLcyESNe142fPTRGKrDiv++zjnivj93XZNeNp35pvJ7o8Fy89LJWk3" + `
"9PM0i5eafwSAAAAAElFTkSuQmCC"
##################################################################################################
frmMain_Show
|
combined_dataset/train/non-malicious/239.ps1
|
239.ps1
|
function Get-NetFrameworkTypeAccelerator
{
[Alias('Get-Acceletrator')]
PARAM ()
[System.Management.Automation.PSObject].Assembly.GetType("System.Management.Automation.TypeAccelerators")::get
}
|
combined_dataset/train/non-malicious/New-Struct 3.ps1
|
New-Struct 3.ps1
|
function New-Struct {
#.Synopsis
# Creates Struct types from a list of types and properties
#.Description
# A wrapper for Add-Type to create struct types.
#.Example
# New-Struct Song {
# [string]$Artist
# [string]$Album
# [string]$Name
# [TimeSpan]$Length
# } -CreateConstructorFunction
#
# Description
# -----------
# Creates a "Song" type with strongly typed Artist, Album, Name, and Length properties, with a simple constructor and a constructor function
#.Example
# New-Struct @{
# >> Product = { [string]$Name; [double]$Price; }
# >> Order = { [Guid]$Id; [Product]$Product; [int]$Quantity }
# >> Customer = {
# >> [string]$FirstName
# >> [string]$LastName
# >> [int]$Age
# >> [Order[]]$OrderHistory
# >> }
# >> }
# >>
#
# Description
# -----------
# To create a series of related struct types (where one type is a property of another type), you need to use the -Types hashtable parameter set. That way, all of the types will compiled together at once, so the compiler will be able to find them all.
#
[CmdletBinding(DefaultParameterSetName="Multiple")]
param(
# The name of the TYPE you are creating. Must be unique per PowerShell session.
[ValidateScript({
if($_ -notmatch '^[a-z][a-z1-9_]*$') {
throw "'$_' is invalid. A valid name identifier must start with a letter, and contain only alpha-numeric or the underscore (_)."
}
return $true
})]
[Parameter(Position=0, Mandatory=$true, ValueFromPipelineByPropertyName=$true, ParameterSetName = "Single")]
[string]$Name
,
# A Scriptblock full of "[Type]$Name" definitions to show what properties you want on your Struct type
[Parameter(Position=1, Mandatory=$true, ValueFromPipelineByPropertyName=$true, ParameterSetName = "Single")]
[ScriptBlock]$Property
,
# A Hashtable in the form @{Name={Properties}} with multiple Names and Property Scriptblocks to define related structs (see example 2).
[Parameter(Position=0, Mandatory=$true, ParameterSetName = "Multiple")]
[HashTable]$Types
,
# Generate a New-StructName shortcut function for each New-Object StructName
[Alias("CTorFunction","ConstructorFunction")]
[Switch]$CreateConstructorFunction
,
# Output the defined type(s)
[Switch]$PassThru
)
begin {
if($PSCmdlet.ParameterSetName -eq "Multiple") {
$Structs = foreach($key in $Types.Keys) {
New-Object PSObject -Property @{Name=$key;Property=$Types.$key}
}
Write-Verbose ($Structs | Out-String)
$Structs | New-Struct -Passthru:$Passthru -CreateConstructorFunction:$CreateConstructorFunction
} else {
$code = "using System;`nusing System.Collections;`nusing System.Management.Automation;`n"
$function = ""
}
}
process {
if($PSCmdlet.ParameterSetName -ne "Multiple") {
$parserrors = $null
$tokens = [System.Management.Automation.PSParser]::Tokenize( $Property, [ref]$parserrors ) | Where-Object { "Newline","StatementSeparator" -notcontains $_.Type }
# CODE GENERATION MAGIKS!
$Name = $Name.ToUpper()[0] + $Name.SubString(1)
$ctor = @()
$setr = @()
$prop = @()
$parm = @()
$cast = @()
$hash = @()
$2Str = @()
$(while($tokens.Count -gt 0) {
$typeToken,$varToken,$tokens = $tokens
if($typeToken.Type -ne "Type") {
throw "Syntax error on line $($typeToken.StartLine) Column $($typeToken.Start). Missing Type. The Struct Properties block must contain only statements of the form: [Type]`$Name, see Get-Help New-Struct -Parameter Properties.`n$($typeToken | Out-String)"
} elseif($varToken.Type -ne "Variable") {
throw "Syntax error on line $($varToken.StartLine) Column $($varToken.Start). Missing Name. The Struct Properties block must contain only statements of the form: [Type]`$Name, see Get-Help New-Struct -Parameter Properties.`n$($typeToken | Out-String)"
}
$varName = $varToken.Content.ToUpper()[0] + $varToken.Content.SubString(1)
$varNameLower = $varName.ToLower()[0] + $varName.SubString(1)
try {
Write-Verbose "TypeToken: $($typeToken.Content) $varName"
if($PSVersionTable.PSVersion.Major -lt 3) {
$typeName = Invoke-Expression "[$($typeToken.Content)].FullName"
} else {
$typeName = Invoke-Expression "$($typeToken.Content).FullName"
}
} catch {
## It's probably a reference to another struct, so just put the name in
if($PSVersionTable.PSVersion.Major -lt 3) {
$typeName = $typeToken.Content
} else {
$typeName = $typeToken.Content -replace '\\[(.*)\\]','$1'
}
}
Write-Verbose "Type Name: $typeName $varName"
$prop += ' public {0} {1};' -f $typeName,$varName
$setr += ' {0} = {1};' -f $varName,$varNameLower
$ctor += '{0} {1}' -f $typeName,$varNameLower
$cast += ' if(input.Properties["{0}"] != null){{ output.{0} = ({1})input.Properties["{0}"].Value; }}' -f $varName,$typeName
$hash += ' if(hash.ContainsKey("{0}")){{ output.{0} = ({1})hash["{0}"]; }}' -f $varName,$typeName
$2Str += '"{0} = [{1}]\\"" + {0}.ToString() + "\\""' -f $varName, $typeName
if($CreateConstructorFunction) {
$parm += '[{0}]${1}' -f $typeName,$varName
}
})
$code += @"
public struct $Name {
$($prop -join "`n")
public $Name ($( $ctor -join ","))
{
$($setr -join "`n")
}
public static implicit operator $Name(Hashtable hash)
{
$Name output = new $Name();
$($hash -join "`n")
return output;
}
public static implicit operator $Name(PSObject input)
{
$Name output = new $Name();
$($cast -join "`n")
return output;
}
public override string ToString()
{
return "@{" + $($2Str -join ' + "; " + ') + "}";
}
}
"@
if($CreateConstructorFunction) {
$function += @"
Function global:New-$Name {
[CmdletBinding()]
param(
$( $parm -join ",`n" )
)
New-Object $Name -Property `$PSBoundParameters
}
"@
}
}}
end {
if($PSCmdlet.ParameterSetName -ne "Multiple") {
Write-Verbose "C# Code:`n$code"
Write-Verbose "PowerShell Code:`n$function"
Add-Type -TypeDefinition $code -PassThru:$Passthru -ErrorAction Stop
if($CreateConstructorFunction) {
Invoke-Expression $function
}
}}}
|
combined_dataset/train/non-malicious/sample_41_18.ps1
|
sample_41_18.ps1
|
#
# Module manifest for module 'OCI.PSModules.Disasterrecovery'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Disasterrecovery.dll'
# Version number of this module.
ModuleVersion = '80.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'c43e3d16-09c4-4426-9ab9-cdda84fd5f2c'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Disasterrecovery Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '80.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Disasterrecovery.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIDisasterrecoveryDrPlan',
'Get-OCIDisasterrecoveryDrPlanExecution',
'Get-OCIDisasterrecoveryDrPlanExecutionsList',
'Get-OCIDisasterrecoveryDrPlansList',
'Get-OCIDisasterrecoveryDrProtectionGroup',
'Get-OCIDisasterrecoveryDrProtectionGroupsList',
'Get-OCIDisasterrecoveryWorkRequest',
'Get-OCIDisasterrecoveryWorkRequestErrorsList',
'Get-OCIDisasterrecoveryWorkRequestLogsList',
'Get-OCIDisasterrecoveryWorkRequestsList',
'Invoke-OCIDisasterrecoveryAssociateDrProtectionGroup',
'Invoke-OCIDisasterrecoveryDisassociateDrProtectionGroup',
'Invoke-OCIDisasterrecoveryIgnoreDrPlanExecution',
'Invoke-OCIDisasterrecoveryPauseDrPlanExecution',
'Invoke-OCIDisasterrecoveryResumeDrPlanExecution',
'Invoke-OCIDisasterrecoveryRetryDrPlanExecution',
'Move-OCIDisasterrecoveryDrProtectionGroupCompartment',
'New-OCIDisasterrecoveryDrPlan',
'New-OCIDisasterrecoveryDrPlanExecution',
'New-OCIDisasterrecoveryDrProtectionGroup',
'Remove-OCIDisasterrecoveryDrPlan',
'Remove-OCIDisasterrecoveryDrPlanExecution',
'Remove-OCIDisasterrecoveryDrProtectionGroup',
'Stop-OCIDisasterrecoveryDrPlanExecution',
'Stop-OCIDisasterrecoveryWorkRequest',
'Update-OCIDisasterrecoveryDrPlan',
'Update-OCIDisasterrecoveryDrPlanExecution',
'Update-OCIDisasterrecoveryDrProtectionGroup',
'Update-OCIDisasterrecoveryDrProtectionGroupRole'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Disasterrecovery'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_21_24.ps1
|
sample_21_24.ps1
|
# ------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License (MIT). See License.txt in the repo root for license information.
# ------------------------------------------------------------
##
## TODO: Refactor the certificate generation and installation in smaller
## functions and move them (including enums) to ClusterSetupUtilities.psm1 module.
##
param
(
[Parameter(Mandatory=$True, ParameterSetName = "Install")]
[switch] $Install,
[Parameter(Mandatory=$True, ParameterSetName = "Clean")]
[switch] $Clean,
[Parameter(Mandatory=$False)]
[string] $CertSubjectName = "CN=ServiceFabricDevClusterCert"
)
function Cleanup-Cert([string] $CertSubjectName)
{
Write-Host "Cleaning existing certificates..."
$cerLocations = @("cert:\LocalMachine\My", "cert:\LocalMachine\root", "cert:\LocalMachine\CA", "cert:\CurrentUser\My")
foreach($cerLoc in $cerLocations)
{
Get-ChildItem -Path $cerLoc | ? { $_.Subject -like "*$CertSubjectName*" } | Remove-Item
}
Write-Host "Certificates removed."
}
$warningMessage = @"
This will install certificate with '$CertSubjectName' in following stores:
# LocalMachine\My
# LocalMachine\root &
# CurrentUser\My
The CleanCluster.ps1 will clean these certificates or you can clean them up using script 'CertSetup.ps1 -Clean -CertSubjectName $CertSubjectName'.
"@
$X509KeyUsageFlags = @{
DIGITAL_SIGNATURE = 0x80
KEY_ENCIPHERMENT = 0x20
DATA_ENCIPHERMENT = 0x10
}
$X509KeySpec = @{
NONE = 0
KEYEXCHANGE = 1
SIGNATURE = 2
}
$X509PrivateKeyExportFlags = @{
EXPORT_NONE = 0
EXPORT_FLAG = 0x1
PLAINTEXT_EXPORT_FLAG = 0x2
ARCHIVING_FLAG = 0x4
PLAINTEXT_ARCHIVING_FLAG = 0x8
}
$X509CertificateEnrollmentContext = @{
USER = 0x1
MACHINE = 0x2
ADMINISTRATOR_FORCE_MACHINE = 0x3
}
$EncodingType = @{
STRING_BASE64HEADER = 0
STRING_BASE64 = 0x1
STRING_BINARY = 0x2
STRING_BASE64REQUESTHEADER = 0x3
STRING_HEX = 0x4
STRING_HEXASCII = 0x5
STRING_BASE64_ANY = 0x6
STRING_ANY = 0x7
STRING_HEX_ANY = 0x8
STRING_BASE64X509CRLHEADER = 0x9
STRING_HEXADDR = 0xa
STRING_HEXASCIIADDR = 0xb
STRING_HEXRAW = 0xc
STRING_NOCRLF = 0x40000000
STRING_NOCR = 0x80000000
}
$InstallResponseRestrictionFlags = @{
ALLOW_NONE = 0x00000000
ALLOW_NO_OUTSTANDING_REQUEST = 0x00000001
ALLOW_UNTRUSTED_CERTIFICATE = 0x00000002
ALLOW_UNTRUSTED_ROOT = 0x00000004
}
if($Install)
{
#cleanup previous installs of the certificate
Cleanup-Cert -CertSubjectName $CertSubjectName
Write-Host "Installing new certificates..."
Write-Warning $warningMessage
$identity = [Security.Principal.WindowsIdentity]::GetCurrent()
$name = new-object -com "X509Enrollment.CX500DistinguishedName"
$name.Encode($CertSubjectName, 0x00100000)
$key = new-object -com "X509Enrollment.CX509PrivateKey.1"
$key.ProviderName = "Microsoft RSA SChannel Cryptographic Provider"
$key.ExportPolicy = $X509PrivateKeyExportFlags.PLAINTEXT_EXPORT_FLAG
$key.KeySpec = $X509KeySpec.KEYEXCHANGE
$key.Length = 1024
$sd = "D:PAI(A;;0xd01f01ff;;;SY)(A;;0xd01f01ff;;;BA)(A;;0xd01f01ff;;;NS)(A;;0xd01f01ff;;;" + $identity.User.Value + ")"
$key.SecurityDescriptor = $sd
$key.MachineContext = $TRUE
$key.Create()
#set server auth keyspec
$serverauthoid = new-object -com "X509Enrollment.CObjectId.1"
$serverauthoid.InitializeFromValue("1.3.6.1.5.5.7.3.1")
$ekuoids = new-object -com "X509Enrollment.CObjectIds.1"
$ekuoids.add($serverauthoid)
$clientauthoid = new-object -com "X509Enrollment.CObjectId.1"
$clientauthoid.InitializeFromValue("1.3.6.1.5.5.7.3.2")
$ekuoids.add($clientauthoid)
$ekuext = new-object -com "X509Enrollment.CX509ExtensionEnhancedKeyUsage.1"
$ekuext.InitializeEncode($ekuoids)
$keyUsageExt = New-Object -ComObject X509Enrollment.CX509ExtensionKeyUsage
$keyUsageExt.InitializeEncode($X509KeyUsageFlags.KEY_ENCIPHERMENT -bor $X509KeyUsageFlags.DIGITAL_SIGNATURE)
$certTemplateName = ""
$cert = new-object -com "X509Enrollment.CX509CertificateRequestCertificate.1"
$cert.InitializeFromPrivateKey($X509CertificateEnrollmentContext.MACHINE, $key, $certTemplateName)
$cert.Subject = $name
$cert.Issuer = $cert.Subject
$notbefore = get-date
$ts = new-timespan -Days 2
$cert.NotBefore = $notbefore.Subtract($ts)
$cert.NotAfter = $cert.NotBefore.AddYears(1)
$cert.X509Extensions.Add($ekuext)
$cert.X509Extensions.Add($keyUsageExt)
$cert.Encode()
#install certificate in LocalMachine My store
$enrollment = new-object -com "X509Enrollment.CX509Enrollment.1"
$enrollment.InitializeFromRequest($cert)
$certdata = $enrollment.CreateRequest($EncodingType.STRING_BASE64HEADER)
$password = ""
$enrollment.InstallResponse($InstallResponseRestrictionFlags.ALLOW_UNTRUSTED_CERTIFICATE, $certdata, $EncodingType.STRING_BASE64HEADER, $password)
if (!$?)
{
Write-Warning "Failed to create certificates required for cluster"
return
}
$srcStoreScope = "LocalMachine"
$srcStoreName = "My"
$srcStore = New-Object System.Security.Cryptography.X509Certificates.X509Store $srcStoreName, $srcStoreScope
$srcStore.Open([System.Security.Cryptography.X509Certificates.OpenFlags]::ReadOnly)
$cert = $srcStore.certificates -match "$CertSubjectName"
$dstStoreScope = "LocalMachine"
$dstStoreName = "root"
#copy cert to root store so chain build succeeds
$dstStore = New-Object System.Security.Cryptography.X509Certificates.X509Store $dstStoreName, $dstStoreScope
$dstStore.Open([System.Security.Cryptography.X509Certificates.OpenFlags]::ReadWrite)
foreach($c in $cert)
{
$dstStore.Add($c)
}
$dstStore.Close()
$dstStoreScope = "CurrentUser"
$dstStoreName = "My"
$dstStore = New-Object System.Security.Cryptography.X509Certificates.X509Store $dstStoreName, $dstStoreScope
$dstStore.Open([System.Security.Cryptography.X509Certificates.OpenFlags]::ReadWrite)
foreach($c in $cert)
{
$dstStore.Add($c)
}
$srcStore.Close()
$dstStore.Close()
}
if($Clean)
{
Cleanup-Cert -CertSubjectName $CertSubjectName
}
# SIG # Begin signature block
# MIIoLAYJKoZIhvcNAQcCoIIoHTCCKBkCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAGpzFgtkUmO6NZ
# gQoc/sFlY42MkN6RwnHH2QV8eo6TbqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFcvRHa4XgIJOKkSAuecsn67
# tMg/3wHCAyBogGj5bNKiMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAM/9afC1Gzys9IpEmfdC2nzw4kSKdh7Fv5qN2MFtvKRbs8fkjaZlzwyLa
# Qm1/VwfYxTzGcXfcT7jz8/AH26w6plm6K08JxZsEnOBb5kcx+GSrub3WZ7//Kl21
# tFHir35eoTBW7yuG8oNXubebYV0ZpnCkD2A4K4c/EBjKU1mKOWTw8AxvDRHoRm6I
# CX4L7jQ3tLPj+jnChxfEg/AtMCDGH8RrkQfsxt2+QFhkKfEMYtTcwyKcekPYCL6u
# wFX33+VZI3ggzDXMMeKGkY42utZ6/lrmi3cferHMKRkQrPXXY61qsCTnj5ioYSub
# t0wP6fx/RbB+s8mbmUesLyCnjBvn8KGCF5YwgheSBgorBgEEAYI3AwMBMYIXgjCC
# F34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDjpAv7c9zQ/zpxbPKnotQMf4kFlQWZEpVvzbCa+h/oLQIGZc4NjVSj
# GBMyMDI0MDIxNTIxNDg1MS42MzNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHsMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2
# MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfX
# hlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjH
# tivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQ
# SmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56x
# YPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhb
# w+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvni
# P7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+s
# yO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E4
# 1j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA
# 7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj
# 8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+X
# xwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w6
# 1FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4
# Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEB
# PJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRAB
# TUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxe
# wCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1r
# gReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3
# ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QT
# STtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRi
# KsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8
# nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCAL
# t0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNP
# MIICNwIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu
# +gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XiMBDAiGA8yMDI0MDIxNTEzMTEz
# MloYDzIwMjQwMjE2MTMxMTMyWjB2MDwGCisGAQQBhFkKBAExLjAsMAoCBQDpeIwE
# AgEAMAkCAQACAQYCAf8wBwIBAAICEGUwCgIFAOl53YQCAQAwNgYKKwYBBAGEWQoE
# AjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkq
# hkiG9w0BAQsFAAOCAQEAAyppjNtMaK3exqVr0XKhQZ3TH629EVMQIJF583jdnZjx
# pxjkULaLAkHOj8taW1HyxQ/uFJaba7yTfns/CIuGc2nLuRAr1+puVtc2Te/EzKcr
# OhXgOcoThxjGGsyjA1wf4emKeRYExK7zOeFc2W3QYrw/U0J9dTI6OSGE8Ir2G3Yz
# e7rTQ1UivDBOp5HhjkvmNNPvBm1vfS6iE6xW5ku7KQPtzmY8qdcVtujTqXFmeo2F
# pAhaVVTFDFka6QWr0nME3XR1uLQe3X/0xia0Fa+VTmnWURAAN3DOZw13Ilu0rYsg
# 81lb9cTgwMnNpHGDLB6SWNJyzCDpZyWt0VW2MIcTBjGCBA0wggQJAgEBMIGTMHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB88UKQ64DzB0xAAEAAAHz
# MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQw
# LwYJKoZIhvcNAQkEMSIEIIGiri98o9oBi0p9hqc4ALyOWZMyESdIei++JXufIH21
# MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgGLzZNIu24bhWSnzAGYmT9P5E
# CHzjWwb9oM7DGDo7YugwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg
# MjAxMAITMwAAAfPFCkOuA8wdMQABAAAB8zAiBCAEb2+7Ts1WUcNQtYDML7vx8Jgp
# 8YvKbMP/ElU6xdpRQTANBgkqhkiG9w0BAQsFAASCAgALJiTiXA2yhHAb7AaIDjXT
# kY8M09LlUbsIRAmvHLu4GmXYlu7tacm1gKndhf6A69xP/WY8Tq3Ca/ISW4vesq8e
# 3AHQOrNhGirzmJkykgP681hrbugi9mH1jgGiE/i1aGfnFcP9E+OF3T6QkcakA2QT
# RJEFJkAAG+KUrAuQDC+GH3Kl8Zt5DLIwDLU9k/ZrLpy8xJ8ea+oVOzhYFCs4uCVj
# Vw4Hx/ZadvqMtXh5cpEbSZiq47iGXd5AOKxbt90yLnpX/+J500NDKH+Bc1EuSNky
# dxuj1loo9jo0/XZmeUcK5X1X5eoazJyEICkOQhvGGCosqH0Yq1eJmEhciH9cQYW6
# YmSppfkrBXtcFo2CaiFvE2nIXk37Gg5x+nJgGI88ewzu/qRcUVwnLF2Ph711AAvo
# eK4mtulE6zud0PKazja6WrAhIXR/DITM3upibnXUHbHrEk0HOgU8NTfV8jsv7QBd
# 3QQTmJ8eNMpNWaJQlBp7BzqBNI78p5GVSkUGHtBfAgIMrfJMLghlICK4huT13b+m
# qZlVhALv2JmnGUOeJvC/Lt8HByQEckW1fGWrYUKmNPo4d2SE+HhRWa4amh5gGI3K
# OAr/eGkESjMgq/D4Aijfs9ddP2DDxWlbwxkjzr9XvrLH7s4wvD3c1aTi7EnDDrMF
# TtjbriG012Hbl+91hTjnhg==
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_30_2.ps1
|
sample_30_2.ps1
|
#
# Module manifest for module 'OCI.PSModules.Identitydomains'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Identitydomains.dll'
# Version number of this module.
ModuleVersion = '73.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'a6c13cbd-d51d-4887-9285-9eb20c02e9cc'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Identitydomains Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '73.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Identitydomains.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIIdentitydomainsAccountMgmtInfo',
'Get-OCIIdentitydomainsAccountMgmtInfosList',
'Get-OCIIdentitydomainsAccountRecoverySetting',
'Get-OCIIdentitydomainsAccountRecoverySettingsList',
'Get-OCIIdentitydomainsApiKey', 'Get-OCIIdentitydomainsApiKeysList',
'Get-OCIIdentitydomainsApp', 'Get-OCIIdentitydomainsAppRole',
'Get-OCIIdentitydomainsAppRolesList',
'Get-OCIIdentitydomainsApprovalWorkflow',
'Get-OCIIdentitydomainsApprovalWorkflowAssignment',
'Get-OCIIdentitydomainsApprovalWorkflowAssignmentsList',
'Get-OCIIdentitydomainsApprovalWorkflowsList',
'Get-OCIIdentitydomainsApprovalWorkflowStep',
'Get-OCIIdentitydomainsApprovalWorkflowStepsList',
'Get-OCIIdentitydomainsAppsList',
'Get-OCIIdentitydomainsAuthenticationFactorSetting',
'Get-OCIIdentitydomainsAuthenticationFactorSettingsList',
'Get-OCIIdentitydomainsAuthToken',
'Get-OCIIdentitydomainsAuthTokensList',
'Get-OCIIdentitydomainsBrandingSetting',
'Get-OCIIdentitydomainsBrandingSettingsList',
'Get-OCIIdentitydomainsCloudGate',
'Get-OCIIdentitydomainsCloudGateMapping',
'Get-OCIIdentitydomainsCloudGateMappingsList',
'Get-OCIIdentitydomainsCloudGateServer',
'Get-OCIIdentitydomainsCloudGateServersList',
'Get-OCIIdentitydomainsCloudGatesList',
'Get-OCIIdentitydomainsCondition',
'Get-OCIIdentitydomainsConditionsList',
'Get-OCIIdentitydomainsCustomerSecretKey',
'Get-OCIIdentitydomainsCustomerSecretKeysList',
'Get-OCIIdentitydomainsDynamicResourceGroup',
'Get-OCIIdentitydomainsDynamicResourceGroupsList',
'Get-OCIIdentitydomainsGrant', 'Get-OCIIdentitydomainsGrantsList',
'Get-OCIIdentitydomainsGroup', 'Get-OCIIdentitydomainsGroupsList',
'Get-OCIIdentitydomainsIdentityPropagationTrust',
'Get-OCIIdentitydomainsIdentityPropagationTrustsList',
'Get-OCIIdentitydomainsIdentityProvider',
'Get-OCIIdentitydomainsIdentityProvidersList',
'Get-OCIIdentitydomainsIdentitySetting',
'Get-OCIIdentitydomainsIdentitySettingsList',
'Get-OCIIdentitydomainsKmsiSetting',
'Get-OCIIdentitydomainsKmsiSettingsList',
'Get-OCIIdentitydomainsMe', 'Get-OCIIdentitydomainsMyApiKey',
'Get-OCIIdentitydomainsMyApiKeysList',
'Get-OCIIdentitydomainsMyAppsList',
'Get-OCIIdentitydomainsMyAuthToken',
'Get-OCIIdentitydomainsMyAuthTokensList',
'Get-OCIIdentitydomainsMyCompletedApproval',
'Get-OCIIdentitydomainsMyCompletedApprovalsList',
'Get-OCIIdentitydomainsMyCustomerSecretKey',
'Get-OCIIdentitydomainsMyCustomerSecretKeysList',
'Get-OCIIdentitydomainsMyDevice',
'Get-OCIIdentitydomainsMyDevicesList',
'Get-OCIIdentitydomainsMyGroupsList',
'Get-OCIIdentitydomainsMyOAuth2ClientCredential',
'Get-OCIIdentitydomainsMyOAuth2ClientCredentialsList',
'Get-OCIIdentitydomainsMyPendingApproval',
'Get-OCIIdentitydomainsMyPendingApprovalsList',
'Get-OCIIdentitydomainsMyRequest',
'Get-OCIIdentitydomainsMyRequestableGroupsList',
'Get-OCIIdentitydomainsMyRequestsList',
'Get-OCIIdentitydomainsMySmtpCredential',
'Get-OCIIdentitydomainsMySmtpCredentialsList',
'Get-OCIIdentitydomainsMySupportAccount',
'Get-OCIIdentitydomainsMySupportAccountsList',
'Get-OCIIdentitydomainsMyTrustedUserAgent',
'Get-OCIIdentitydomainsMyTrustedUserAgentsList',
'Get-OCIIdentitydomainsMyUserDbCredential',
'Get-OCIIdentitydomainsMyUserDbCredentialsList',
'Get-OCIIdentitydomainsNetworkPerimeter',
'Get-OCIIdentitydomainsNetworkPerimetersList',
'Get-OCIIdentitydomainsNotificationSetting',
'Get-OCIIdentitydomainsNotificationSettingsList',
'Get-OCIIdentitydomainsOAuth2ClientCredential',
'Get-OCIIdentitydomainsOAuth2ClientCredentialsList',
'Get-OCIIdentitydomainsOAuthClientCertificate',
'Get-OCIIdentitydomainsOAuthClientCertificatesList',
'Get-OCIIdentitydomainsOAuthPartnerCertificate',
'Get-OCIIdentitydomainsOAuthPartnerCertificatesList',
'Get-OCIIdentitydomainsPasswordPoliciesList',
'Get-OCIIdentitydomainsPasswordPolicy',
'Get-OCIIdentitydomainsPoliciesList',
'Get-OCIIdentitydomainsPolicy',
'Get-OCIIdentitydomainsResourceTypeSchemaAttributesList',
'Get-OCIIdentitydomainsRule', 'Get-OCIIdentitydomainsRulesList',
'Get-OCIIdentitydomainsSchema', 'Get-OCIIdentitydomainsSchemasList',
'Get-OCIIdentitydomainsSecurityQuestion',
'Get-OCIIdentitydomainsSecurityQuestionSetting',
'Get-OCIIdentitydomainsSecurityQuestionSettingsList',
'Get-OCIIdentitydomainsSecurityQuestionsList',
'Get-OCIIdentitydomainsSelfRegistrationProfile',
'Get-OCIIdentitydomainsSelfRegistrationProfilesList',
'Get-OCIIdentitydomainsSetting',
'Get-OCIIdentitydomainsSettingsList',
'Get-OCIIdentitydomainsSmtpCredential',
'Get-OCIIdentitydomainsSmtpCredentialsList',
'Get-OCIIdentitydomainsUser',
'Get-OCIIdentitydomainsUserAttributesSetting',
'Get-OCIIdentitydomainsUserAttributesSettingsList',
'Get-OCIIdentitydomainsUserDbCredential',
'Get-OCIIdentitydomainsUserDbCredentialsList',
'Get-OCIIdentitydomainsUsersList',
'Invoke-OCIIdentitydomainsPatchAccountRecoverySetting',
'Invoke-OCIIdentitydomainsPatchApiKey',
'Invoke-OCIIdentitydomainsPatchApp',
'Invoke-OCIIdentitydomainsPatchAppRole',
'Invoke-OCIIdentitydomainsPatchApprovalWorkflow',
'Invoke-OCIIdentitydomainsPatchApprovalWorkflowStep',
'Invoke-OCIIdentitydomainsPatchAuthToken',
'Invoke-OCIIdentitydomainsPatchCloudGate',
'Invoke-OCIIdentitydomainsPatchCloudGateMapping',
'Invoke-OCIIdentitydomainsPatchCloudGateServer',
'Invoke-OCIIdentitydomainsPatchCondition',
'Invoke-OCIIdentitydomainsPatchCustomerSecretKey',
'Invoke-OCIIdentitydomainsPatchDynamicResourceGroup',
'Invoke-OCIIdentitydomainsPatchGrant',
'Invoke-OCIIdentitydomainsPatchGroup',
'Invoke-OCIIdentitydomainsPatchIdentityPropagationTrust',
'Invoke-OCIIdentitydomainsPatchIdentityProvider',
'Invoke-OCIIdentitydomainsPatchIdentitySetting',
'Invoke-OCIIdentitydomainsPatchKmsiSetting',
'Invoke-OCIIdentitydomainsPatchMe',
'Invoke-OCIIdentitydomainsPatchMyApiKey',
'Invoke-OCIIdentitydomainsPatchMyAuthToken',
'Invoke-OCIIdentitydomainsPatchMyCustomerSecretKey',
'Invoke-OCIIdentitydomainsPatchMyDevice',
'Invoke-OCIIdentitydomainsPatchMyOAuth2ClientCredential',
'Invoke-OCIIdentitydomainsPatchMyPendingApproval',
'Invoke-OCIIdentitydomainsPatchMyRequest',
'Invoke-OCIIdentitydomainsPatchMySmtpCredential',
'Invoke-OCIIdentitydomainsPatchNetworkPerimeter',
'Invoke-OCIIdentitydomainsPatchOAuth2ClientCredential',
'Invoke-OCIIdentitydomainsPatchPasswordPolicy',
'Invoke-OCIIdentitydomainsPatchPolicy',
'Invoke-OCIIdentitydomainsPatchRule',
'Invoke-OCIIdentitydomainsPatchSchema',
'Invoke-OCIIdentitydomainsPatchSecurityQuestion',
'Invoke-OCIIdentitydomainsPatchSecurityQuestionSetting',
'Invoke-OCIIdentitydomainsPatchSelfRegistrationProfile',
'Invoke-OCIIdentitydomainsPatchSetting',
'Invoke-OCIIdentitydomainsPatchSmtpCredential',
'Invoke-OCIIdentitydomainsPatchUser',
'Invoke-OCIIdentitydomainsPatchUserAttributesSetting',
'Invoke-OCIIdentitydomainsSearchAccountMgmtInfos',
'Invoke-OCIIdentitydomainsSearchApiKeys',
'Invoke-OCIIdentitydomainsSearchAppRoles',
'Invoke-OCIIdentitydomainsSearchApps',
'Invoke-OCIIdentitydomainsSearchAuthenticationFactorSettings',
'Invoke-OCIIdentitydomainsSearchAuthTokens',
'Invoke-OCIIdentitydomainsSearchCloudGateMappings',
'Invoke-OCIIdentitydomainsSearchCloudGates',
'Invoke-OCIIdentitydomainsSearchCloudGateServers',
'Invoke-OCIIdentitydomainsSearchConditions',
'Invoke-OCIIdentitydomainsSearchCustomerSecretKeys',
'Invoke-OCIIdentitydomainsSearchDynamicResourceGroups',
'Invoke-OCIIdentitydomainsSearchGrants',
'Invoke-OCIIdentitydomainsSearchGroups',
'Invoke-OCIIdentitydomainsSearchIdentityProviders',
'Invoke-OCIIdentitydomainsSearchIdentitySettings',
'Invoke-OCIIdentitydomainsSearchKmsiSettings',
'Invoke-OCIIdentitydomainsSearchMyApps',
'Invoke-OCIIdentitydomainsSearchMyGroups',
'Invoke-OCIIdentitydomainsSearchMyRequestableGroups',
'Invoke-OCIIdentitydomainsSearchMyRequests',
'Invoke-OCIIdentitydomainsSearchNetworkPerimeters',
'Invoke-OCIIdentitydomainsSearchNotificationSettings',
'Invoke-OCIIdentitydomainsSearchOAuth2ClientCredentials',
'Invoke-OCIIdentitydomainsSearchOAuthClientCertificates',
'Invoke-OCIIdentitydomainsSearchOAuthPartnerCertificates',
'Invoke-OCIIdentitydomainsSearchPasswordPolicies',
'Invoke-OCIIdentitydomainsSearchPolicies',
'Invoke-OCIIdentitydomainsSearchResourceTypeSchemaAttributes',
'Invoke-OCIIdentitydomainsSearchRules',
'Invoke-OCIIdentitydomainsSearchSchemas',
'Invoke-OCIIdentitydomainsSearchSecurityQuestions',
'Invoke-OCIIdentitydomainsSearchSecurityQuestionSettings',
'Invoke-OCIIdentitydomainsSearchSelfRegistrationProfiles',
'Invoke-OCIIdentitydomainsSearchSettings',
'Invoke-OCIIdentitydomainsSearchSmtpCredentials',
'Invoke-OCIIdentitydomainsSearchUserAttributesSettings',
'Invoke-OCIIdentitydomainsSearchUserDbCredentials',
'Invoke-OCIIdentitydomainsSearchUsers',
'New-OCIIdentitydomainsApiKey', 'New-OCIIdentitydomainsApp',
'New-OCIIdentitydomainsAppRole',
'New-OCIIdentitydomainsApprovalWorkflow',
'New-OCIIdentitydomainsApprovalWorkflowAssignment',
'New-OCIIdentitydomainsApprovalWorkflowStep',
'New-OCIIdentitydomainsAuthenticationFactorsRemover',
'New-OCIIdentitydomainsAuthToken',
'New-OCIIdentitydomainsCloudGate',
'New-OCIIdentitydomainsCloudGateMapping',
'New-OCIIdentitydomainsCloudGateServer',
'New-OCIIdentitydomainsCondition',
'New-OCIIdentitydomainsCustomerSecretKey',
'New-OCIIdentitydomainsDynamicResourceGroup',
'New-OCIIdentitydomainsGrant', 'New-OCIIdentitydomainsGroup',
'New-OCIIdentitydomainsIdentityPropagationTrust',
'New-OCIIdentitydomainsIdentityProvider',
'New-OCIIdentitydomainsMe', 'New-OCIIdentitydomainsMyApiKey',
'New-OCIIdentitydomainsMyAuthenticationFactorInitiator',
'New-OCIIdentitydomainsMyAuthenticationFactorsRemover',
'New-OCIIdentitydomainsMyAuthenticationFactorValidator',
'New-OCIIdentitydomainsMyAuthToken',
'New-OCIIdentitydomainsMyCustomerSecretKey',
'New-OCIIdentitydomainsMyOAuth2ClientCredential',
'New-OCIIdentitydomainsMyRequest',
'New-OCIIdentitydomainsMySmtpCredential',
'New-OCIIdentitydomainsMySupportAccount',
'New-OCIIdentitydomainsMyUserDbCredential',
'New-OCIIdentitydomainsNetworkPerimeter',
'New-OCIIdentitydomainsOAuth2ClientCredential',
'New-OCIIdentitydomainsOAuthClientCertificate',
'New-OCIIdentitydomainsOAuthPartnerCertificate',
'New-OCIIdentitydomainsPasswordPolicy',
'New-OCIIdentitydomainsPolicy', 'New-OCIIdentitydomainsRule',
'New-OCIIdentitydomainsSecurityQuestion',
'New-OCIIdentitydomainsSelfRegistrationProfile',
'New-OCIIdentitydomainsSmtpCredential',
'New-OCIIdentitydomainsUser',
'New-OCIIdentitydomainsUserDbCredential',
'Remove-OCIIdentitydomainsApiKey', 'Remove-OCIIdentitydomainsApp',
'Remove-OCIIdentitydomainsAppRole',
'Remove-OCIIdentitydomainsApprovalWorkflow',
'Remove-OCIIdentitydomainsApprovalWorkflowAssignment',
'Remove-OCIIdentitydomainsApprovalWorkflowStep',
'Remove-OCIIdentitydomainsAuthToken',
'Remove-OCIIdentitydomainsCloudGate',
'Remove-OCIIdentitydomainsCloudGateMapping',
'Remove-OCIIdentitydomainsCloudGateServer',
'Remove-OCIIdentitydomainsCondition',
'Remove-OCIIdentitydomainsCustomerSecretKey',
'Remove-OCIIdentitydomainsDynamicResourceGroup',
'Remove-OCIIdentitydomainsGrant', 'Remove-OCIIdentitydomainsGroup',
'Remove-OCIIdentitydomainsIdentityPropagationTrust',
'Remove-OCIIdentitydomainsIdentityProvider',
'Remove-OCIIdentitydomainsMyApiKey',
'Remove-OCIIdentitydomainsMyAuthToken',
'Remove-OCIIdentitydomainsMyCustomerSecretKey',
'Remove-OCIIdentitydomainsMyDevice',
'Remove-OCIIdentitydomainsMyOAuth2ClientCredential',
'Remove-OCIIdentitydomainsMySmtpCredential',
'Remove-OCIIdentitydomainsMySupportAccount',
'Remove-OCIIdentitydomainsMyTrustedUserAgent',
'Remove-OCIIdentitydomainsMyUserDbCredential',
'Remove-OCIIdentitydomainsNetworkPerimeter',
'Remove-OCIIdentitydomainsOAuth2ClientCredential',
'Remove-OCIIdentitydomainsOAuthClientCertificate',
'Remove-OCIIdentitydomainsOAuthPartnerCertificate',
'Remove-OCIIdentitydomainsPasswordPolicy',
'Remove-OCIIdentitydomainsPolicy', 'Remove-OCIIdentitydomainsRule',
'Remove-OCIIdentitydomainsSecurityQuestion',
'Remove-OCIIdentitydomainsSelfRegistrationProfile',
'Remove-OCIIdentitydomainsSmtpCredential',
'Remove-OCIIdentitydomainsUser',
'Remove-OCIIdentitydomainsUserDbCredential',
'Write-OCIIdentitydomainsAccountRecoverySetting',
'Write-OCIIdentitydomainsApp',
'Write-OCIIdentitydomainsApprovalWorkflow',
'Write-OCIIdentitydomainsAppStatusChanger',
'Write-OCIIdentitydomainsAuthenticationFactorSetting',
'Write-OCIIdentitydomainsCloudGate',
'Write-OCIIdentitydomainsCloudGateMapping',
'Write-OCIIdentitydomainsCloudGateServer',
'Write-OCIIdentitydomainsCondition',
'Write-OCIIdentitydomainsDynamicResourceGroup',
'Write-OCIIdentitydomainsGroup',
'Write-OCIIdentitydomainsIdentityPropagationTrust',
'Write-OCIIdentitydomainsIdentityProvider',
'Write-OCIIdentitydomainsIdentitySetting',
'Write-OCIIdentitydomainsKmsiSetting', 'Write-OCIIdentitydomainsMe',
'Write-OCIIdentitydomainsMePasswordChanger',
'Write-OCIIdentitydomainsNetworkPerimeter',
'Write-OCIIdentitydomainsNotificationSetting',
'Write-OCIIdentitydomainsPasswordPolicy',
'Write-OCIIdentitydomainsPolicy', 'Write-OCIIdentitydomainsRule',
'Write-OCIIdentitydomainsSchema',
'Write-OCIIdentitydomainsSecurityQuestionSetting',
'Write-OCIIdentitydomainsSelfRegistrationProfile',
'Write-OCIIdentitydomainsSetting', 'Write-OCIIdentitydomainsUser',
'Write-OCIIdentitydomainsUserCapabilitiesChanger',
'Write-OCIIdentitydomainsUserPasswordChanger',
'Write-OCIIdentitydomainsUserPasswordResetter',
'Write-OCIIdentitydomainsUserStatusChanger'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Identitydomains'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Test-IsAdmin.ps1
|
Test-IsAdmin.ps1
|
Function Test-IsAdmin
{
<#
.SYNOPSIS
Function used to detect if current user is an Administrator.
.DESCRIPTION
Function used to detect if current user is an Administrator. Presents a menu if not an Administrator
.NOTES
Name: Test-IsAdmin
Author: Boe Prox
DateCreated: 30April2011
.EXAMPLE
Test-IsAdmin
Description
-----------
Command will check the current user to see if an Administrator. If not, a menu is presented to the user to either
continue as the current user context or enter alternate credentials to use. If alternate credentials are used, then
the [System.Management.Automation.PSCredential] object is returned by the function.
#>
[cmdletbinding()]
Param()
Write-Verbose "Checking to see if current user context is Administrator"
If (-NOT ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator"))
{
Write-Warning "You are not currently running this under an Administrator account! `nThere is potential that this command could fail if not running under an Administrator account."
Write-Verbose "Presenting option for user to pick whether to continue as current user or use alternate credentials"
#Determine Values for Choice
$choice = [System.Management.Automation.Host.ChoiceDescription[]] @("Use &Alternate Credentials","&Continue with current Credentials")
#Determine Default Selection
[int]$default = 0
#Present choice option to user
$userchoice = $host.ui.PromptforChoice("Warning","Please select to use Alternate Credentials or current credentials to run command",$choice,$default)
Write-Debug "Selection: $userchoice"
#Determine action to take
Switch ($Userchoice)
{
0
{
#Prompt for alternate credentials
Write-Verbose "Prompting for Alternate Credentials"
$Credential = Get-Credential
Write-Output $Credential
}
1
{
#Continue using current credentials
Write-Verbose "Using current credentials"
Write-Output "CurrentUser"
}
}
}
Else
{
Write-Verbose "Passed Administrator check"
}
}
|
combined_dataset/train/non-malicious/sample_25_92.ps1
|
sample_25_92.ps1
|
version: '{build}'
skip_tags: true
clone_depth: 30
environment:
JAVA_HOME: C:\Program Files\Java\jdk11
install:
- ps: |
Add-Type -AssemblyName System.IO.Compression.FileSystem
if (!(Test-Path -Path "C:\maven\apache-maven-3.8.4" )) {
(new-object System.Net.WebClient).DownloadFile(
'https://dlcdn.apache.org/maven/maven-3/3.8.4/binaries/apache-maven-3.8.4-bin.zip',
'C:\maven-bin.zip'
)
[System.IO.Compression.ZipFile]::ExtractToDirectory("C:\maven-bin.zip", "C:\maven")
}
- cmd: SET PATH=C:\maven\apache-maven-3.8.4\bin;%JAVA_HOME%\bin;%PATH%
build_script:
- mvn clean install -B -DskipTests
test_script:
- mvn test -B -Dskip.systests=true --fail-at-end
- mvn verify -pl systests/protocol-tests-amqp-1-0,systests/protocol-tests-amqp-0-8,systests/protocol-tests-amqp-0-10 -Dskip.unittests=true -B --fail-at-end
on_failure:
- ps: |
7z a -r surefire-reports.zip '**\target\surefire-reports\*'
Push-AppveyorArtifact surefire-reports.zip -DeploymentName 'Surefire Reports'
on_finish:
- ps: |
$url = "https://ci.appveyor.com/api/testresults/junit/$($env:APPVEYOR_JOB_ID)"
$wc = New-Object 'System.Net.WebClient'
$dirs = Get-ChildItem -Filter surefire-reports -Recurse
ForEach ($dir in $dirs)
{
$files = Get-ChildItem -Path $dir.FullName -Filter TEST-*.xml
ForEach ($file in $files)
{
$wc.UploadFile($url, (Resolve-Path $file.FullName))
}
}
cache:
- C:\maven\apache-maven-3.8.4
|
combined_dataset/train/non-malicious/1277.ps1
|
1277.ps1
|
function Unlock-CIisConfigurationSection
{
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[Parameter(Mandatory=$true)]
[string[]]
$SectionPath
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
$SectionPath |
ForEach-Object {
$section = Get-CIisConfigurationSection -SectionPath $_
$section.OverrideMode = 'Allow'
if( $pscmdlet.ShouldProcess( $_, 'unlocking IIS configuration section' ) )
{
$section.CommitChanges()
}
}
}
|
combined_dataset/train/non-malicious/sample_4_84.ps1
|
sample_4_84.ps1
|
# Localized 10/16/2024 05:34 PM (GMT) 303:7.1.41104 Add-AppDevPackage.psd1
# Culture = "en-US"
ConvertFrom-StringData @'
###PSLOC
PromptYesString=&Sì
PromptNoString=&No
BundleFound=Pacchetto trovato: {0}
PackageFound=Pacchetto trovato: {0}
EncryptedBundleFound=Bundle crittografato trovato: {0}
EncryptedPackageFound=Pacchetto crittografato trovato: {0}
CertificateFound=Certificato trovato: {0}
DependenciesFound=Pacchetti di dipendenza trovati:
GettingDeveloperLicense=Acquisizione della licenza per sviluppatori in corso...
InstallingCertificate=Installazione del certificato in corso...
InstallingPackage=\nInstallazione dell'applicazione in corso...
AcquireLicenseSuccessful=Acquisizione di una licenza per sviluppatori completata.
InstallCertificateSuccessful=Installazione del certificato completata.
Success=\nOperazione completata: l'applicazione è stata installata.
WarningInstallCert=\nVerrà installato un certificato digitale nell'archivio certificati Persone attendibili del computer. Questa operazione costituisce un grave rischio per la sicurezza e deve essere eseguita solo se si considera attendibile l'origine del certificato digitale.\n\nDopo aver terminato di usare l'app, è consigliabile rimuovere manualmente il certificato digitale associato. Le istruzioni necessarie sono disponibili all'indirizzo: http://go.microsoft.com/fwlink/?LinkId=243053\n\nContinuare?\n\n
ElevateActions=\nPrima di installare questa applicazione, è necessario eseguire quanto segue:
ElevateActionDevLicense=\t- Acquisire una licenza per sviluppatori
ElevateActionCertificate=\t- Installare il certificato di firma
ElevateActionsContinue=Per continuare sono necessarie credenziali di amministratore. Accettare l'avviso di Controllo dell'account utente e specificare, se richiesta, la password di amministratore.
ErrorForceElevate=Per continuare è necessario specificare credenziali di amministratore. Eseguire questo script senza il parametro -Force oppure da una finestra di PowerShell con privilegi elevati.
ErrorForceDeveloperLicense=L'acquisizione di una licenza per sviluppatori richiede l'intervento dell'utente. Eseguire di nuovo lo script senza il parametro -Force.
ErrorLaunchAdminFailed=Errore: impossibile avviare un nuovo processo come amministratore.
ErrorNoScriptPath=Errore: è necessario avviare questo script da un file.
ErrorNoPackageFound=Errore: nessun pacchetto trovato nella directory dello script. Accertarsi che nella directory dello script sia presente il pacchetto da installare.
ErrorManyPackagesFound=Errore: più pacchetti trovati nella directory dello script. Accertarsi che nella directory dello script sia presente solo il pacchetto da installare.
ErrorPackageUnsigned=Errore: il pacchetto non è provvisto di firma digitale oppure la firma è danneggiata.
ErrorNoCertificateFound=Errore: nessun certificato trovato nella directory dello script. Accertarsi che nella directory dello script sia presente il certificato utilizzato per firmare il pacchetto da installare.
ErrorManyCertificatesFound=Errore: più certificati trovati nella directory dello script. Accertarsi che nella directory dello script sia presente solo il certificato utilizzato per firmare il pacchetto da installare.
ErrorBadCertificate=Errore: il file "{0}" non è un certificato digitale valido. CertUtil terminato con codice di errore {1}.
ErrorExpiredCertificate=Errore: il certificato "{0}" dello sviluppatore è scaduto. È possibile che l'orologio di sistema non sia impostato sulla data e sull'ora corrette. Se le impostazioni di sistema sono corrette, contattare il proprietario dell'applicazione per ricreare un pacchetto con un certificato valido.
ErrorCertificateMismatch=Errore: il certificato non corrisponde a quello utilizzato per firmare il pacchetto.
ErrorCertIsCA=Errore: il certificato non può essere un'autorità di certificazione.
ErrorBannedKeyUsage=Errore: il certificato non può avere il seguente utilizzo chiavi: {0}. L'utilizzo chiavi deve essere non specificato o corrispondere a "DigitalSignature".
ErrorBannedEKU=Errore: il certificato non può avere il seguente utilizzo chiavi avanzato: {0}. Sono consentiti solo utilizzi chiavi avanzati (EKU) Firma codice e Firma definitiva.
ErrorNoBasicConstraints=Errore: il certificato non dispone dell'estensione Limitazioni di base.
ErrorNoCodeSigningEku=Errore: il certificato non dispone dell'utilizzo chiavi avanzato per Firma codice.
ErrorInstallCertificateCancelled=Errore: installazione del certificato annullata.
ErrorCertUtilInstallFailed=Errore: impossibile installare il certificato. CertUtil terminato con codice di errore {0}.
ErrorGetDeveloperLicenseFailed=Errore: impossibile acquisire una licenza per sviluppatori. Per ulteriori informazioni, vedere http://go.microsoft.com/fwlink/?LinkID=252740.
ErrorInstallCertificateFailed=Errore: impossibile installare il certificato. Stato: {0}. Per ulteriori informazioni, vedere http://go.microsoft.com/fwlink/?LinkID=252740.
ErrorAddPackageFailed=Errore: impossibile installare l'applicazione.
ErrorAddPackageFailedWithCert=Errore: impossibile installare l'applicazione. Per garantire la sicurezza, provare a disinstallare il certificato di firma finché non risulta possibile installare l'applicazione. Le istruzioni necessarie sono disponibili qui:\nhttp://go.microsoft.com/fwlink/?LinkId=243053
'@
|
combined_dataset/train/non-malicious/sample_23_66.ps1
|
sample_23_66.ps1
|
# region Generated
# Load the private module dll
$null = Import-Module -PassThru -Name (Join-Path $PSScriptRoot '..\bin\Az.ServiceBus.private.dll')
# Load the internal module
$internalModulePath = Join-Path $PSScriptRoot '..\internal\Az.ServiceBus.internal.psm1'
if(Test-Path $internalModulePath) {
$null = Import-Module -Name $internalModulePath
}
# Export nothing to clear implicit exports
Export-ModuleMember
# Export script cmdlets
Get-ChildItem -Path $PSScriptRoot -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName }
Export-ModuleMember -Function (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot) -Alias (Get-ScriptCmdlet -ScriptFolder $PSScriptRoot -AsAlias)
# endregion
# SIG # Begin signature block
# MIIoOwYJKoZIhvcNAQcCoIIoLDCCKCgCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC1sWsmBhU6y3Cj
# 53C7D2jiqPwYFOvVFboxLaRFWESOXqCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFud
# 40LtbzMPUcJo1l2Qr/CSBycfPSv86bY86eatVZqMMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEApWOPG1heesiPUFYF9UXjM1e3KGOomKnuhNtT
# Vke7YwNRuLti2a/L884nRvKeEMm+NhHfWjhum1qri8j4eWFPSvpAw3ZldPgpkv5m
# lWtO3KeEPajH2TrvgYRZmmh4eKVk24V/E1O90+oepe/QZwGg7j/gdasiPDyyAEQZ
# 1P+EhSih4vdn4QtgCB2uVPnSKGUkPkYb5S5LC+wRpcZTIv59BOel64zKXNoBjvu5
# UmKWZWvweWUGO4C9L/jDsl+yl7RermPiP3TsTTzQJ3m6FurQvKfBHzmYgp6FmEcT
# l7RlPhwVQM9uEBiFLENhlButnEmwy8uYpWcjXTXsnmsvhTYTw6GCF5YwgheSBgor
# BgEEAYI3AwMBMYIXgjCCF34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFRBgsqhkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCA0JCmCm/3tLrb63ZzAhkAWOP1q9eyj84za
# TValwIUhCgIGZjOaa5vhGBIyMDI0MDUxNjA2NDIxMS40NlowBIACAfSggdGkgc4w
# gcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsT
# HE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQg
# VFNTIEVTTjo5NjAwLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZaCCEe0wggcgMIIFCKADAgECAhMzAAAB74k/VqFYzKjaAAEA
# AAHvMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MB4XDTIzMTIwNjE4NDU0OFoXDTI1MDMwNTE4NDU0OFowgcsxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy
# aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjo5NjAwLTA1
# RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKMLWOKfDOAfCE5qRmrLXugT
# gEgEqybmRfgNSYIFYjSUVWkSIrmZnYqHn2ygvieznamEUxBgYbmTKkKKm6eDA/02
# hvhUZUTpqgyjmFn03K1dHllGBv1nw1HoSYsogJGEPiyiM8yD9GcZFNx1/v9Ni/Iz
# XSMuOYvIoR6Awd+8jA+Yz4A/uHNAt8TEN2oIna7rgZ3leWesU6S7lT2Ms4qTXLvR
# z5PC3Tj9Euqu6/V8Y/wuZia0e+sHhNwGwANdKZwWOHRWBCRfjNcXCqcgbyuBj7MO
# olhA1k/w7VijiRJyQdPjdcLSgzjTJ7b72X+tNiIMUzeeVl7aOG06QYI7oaqJOnnT
# Ej0hOkleLS8R6TwB6NPg8owQ7Zs/FTrenre5luN03kv6WAhwI0wI0jRIiilLiBpV
# HhLL8igO/W8Nal74jbz8rLyNZN553Q7cfE8kxmpfhAHcjoOfBmseIqfqgTfy2AFM
# IIAq8Shg5ODuvaUXQi5u3/f5U+8q1MJRtk8U4byNm32roAWh2W9Ce2KiVghi2pKs
# vJcBAiVcaFniA1y/h2/VgCKWdtYD0KydiH44oQWv/jDgzr2Uj7Jqhncv+39R9elP
# /7JzuFL8WiVyasYUlMFiVLicTVy4puXBn9Q4bbpIuEM41ZcZkMowko3neg4tJKTi
# V1HQeWxtPiF4uVaU4SUlAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU7UxaooXCsJu2
# vD0/wDrdsBVInMswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBABgZlrdoIO51uT0R
# V2Q/zFxAZm4gAg9HH0rUIDu5HMG3zR8LRpaS5hiFAy8cclEdShtIzhTDfM3t8cQ3
# yGFoENv01FoacVZ20fGYn14zPommfoqIjKL1Tk6DtAJNkyXXufbDh512rm+2TitF
# Y5W+mIMEYkBEqJdYH27aLHRYfYQwUYeqMiGNZReE+BHgLo0oU1ce9a9d5wnZZesm
# e+9AZcB80kYRMlkalHjWdQ3eKN+IJKMUPFqYY+zLmJi73Tge/265Jdh3mbQnF/ZY
# 0lJeQ8aU2Gs7buk/GBPXXWbIBHrVLdLaFznvbM33KgkQ5sT3xXLkoQzdlfndwt58
# 3zUXUL2n9wAqQTq71XqvLKX+pKDG7VSp45kK0b+JodIoyjEzsyrhIwWw9P/yJ453
# AKVilzDQKNl7koHHbEtrgHWd4WJvwnz+BKiyMx0XeceLIfHVh51kO3FJKB6B4myL
# R9tSB3OxUwli+pXDnZapA27QZELv1m5Wt5RUp0ImZQwEcGlOnpUWikvQl/hKuCD7
# NEP2LBtz25muf7z2h2kidvOdiuc8oeI7bqp7V6Q3CX93uujYi0/+WCHPQOgPuQQZ
# 6KQolYd22jt5UmgmGStRxqdO5QfTyD41jAbpL4+MFIH83I0Xpsdr/FH5x4BiFyPH
# SIGK/3QyfQmIZ+cDb+EuPl6+FNwCMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCA1AwggI4AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzET
# MBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMV
# TWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmlj
# YSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTYwMC0wNUUw
# LUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoB
# ATAHBgUrDgMCGgMVAEtwjzWDFt5rUTHaYVtfHtyT7SD/oIGDMIGApH4wfDELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDp7+RqMCIY
# DzIwMjQwNTE2MDE0ODI2WhgPMjAyNDA1MTcwMTQ4MjZaMHcwPQYKKwYBBAGEWQoE
# ATEvMC0wCgIFAOnv5GoCAQAwCgIBAAICBLcCAf8wBwIBAAICE3QwCgIFAOnxNeoC
# AQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEK
# MAgCAQACAwGGoDANBgkqhkiG9w0BAQsFAAOCAQEAu0FKTif6tJN4xlBSGgn3YYZ2
# GP+OTvExcu7ZYXuFP2lEOtwPPK49v8uspVyoeviNCFuOSL6tjyEvTrOQfqex4nhb
# TrzN4KE+02zSexJtOf18vtTdDm68e+sMQkWPqK9Oh7PwQYFppZvnUqXLxRU6DE5M
# 7crAEcSzsBKZVUX2Clx0IW0cGABR3jeXqHL+UPga+argiwY+qFqqweFE0MfYX7NQ
# 02NeFEIlno/dZIIJCu69qvem9B+gfOI8lH5fF71y2Xo9JxcAaMaUNzwzePtc6nFM
# rfgL9wflGyW3k1BcJxtsbgSoVz+Ma8aGye8IDyJLcthG1s/qk57RZYQH5B8ZHDGC
# BA0wggQJAgEBMIGTMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 74k/VqFYzKjaAAEAAAHvMA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMx
# DQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkEMSIEIP+fYW/XYXpwlh81MPu1xUDG
# jtHPk9od1OdMVFe6MaWUMIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQg8GEo
# RbgWjfBTPT01DHZrQNtx2xfyOi8zkuLMeafJf6MwgZgwgYCkfjB8MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQg
# VGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe+JP1ahWMyo2gABAAAB7zAiBCByD+GC
# ceSUCvMZsGSif6LO2ySKv160qRO0HLaEmDaX4zANBgkqhkiG9w0BAQsFAASCAgAh
# bbMibeJqCP1hW09T39sYBkjCNs0xoeOrlccBwzwvBjE9iSlGR0o+Ec1IKCSbSLtw
# lNtBoApBrkTVeMXvbO1u0eRxyWM03zOdZCGFZ0JT43t2emk6EZAblODmmCsLtVbC
# 9F/fyr77R88aVKPdi/QlZr1rICoHXG4Vwg6ceMZ2KrqEPSem4OQnU9ipE/DNjMc7
# mqCw0c//YE41uSPiCRDhfmAz+xNygzToIpmis4mTt6ScMiL2Sx8FnciDKJRokayS
# deJsLGQTdn+8Pd4zCp6XAwrsPsv5BQgYZ0GsuodmiLR6ZaUP76VW8PsZHPdIa1xG
# tDDoQY8E759LNRHVb8wR9+2V28WBarMHXcN6VzH3maH+TpPMiRRwCB3kNRwnanyG
# usjJT5FQ2q1/7mpchDns4E/RcLII84SUL5m1CXDVDv3ddnPhIrLE6HJJhoSDhPnb
# DBqFtrK3Orio++mgi4LpGkFVao43jwygA2vq4pAUmx3X+xD/fM2YCLClwtNO9GY4
# YUYAiad0vdAkroNDMp753jLjFGUV4rWYdtUd3nhpHnsyk/WXEmceLCB/4woditPO
# eSteSBCIasajSA9ce3eRfU6130uHoRliXjEAdEX0TafN3zjKjCpkOxEMBIhnYHCt
# Y6H9dq6FFu/7mLI5htpoy5LaZ1q7ej+qngp29j8jTQ==
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_19_78.ps1
|
sample_19_78.ps1
|
<#############################################################
# #
# Copyright (C) Microsoft Corporation. All rights reserved. #
# #
#############################################################>
<#
.SYNOPSIS
Executes collection Diagnostic logs utilizing the JEA endpoint.
.PARAMETER EndpointName
The name of the JEA endpoint to access.
.PARAMETER ComputerName
The name of the computer on which to invoke the endpoint.
.PARAMETER FromDate
The starting window from which to start collection logs.
By default this value is 4 hours before now.
.PARAMETER ToDate
The ending time window for collecting logs.
.PARAMETER IncludeGetSDDCLogs
If true, collect cluster logs.
.PARAMETER FilterByRole
The roles to filter on.
.PARAMETER FilterByNode
The nodes to filter on.
.PARAMETER TimeoutInMinutes
Timeout for gathering log data.
.PARAMETER TracingContext
Value passed to other script so that traces between components can be correlated.
.PARAMETER IsAutonomous
Whether this is an autonomous log collection.
.PARAMETER LogCollectionJobType
Whether the job is OnDemand or Scheduled
.PARAMETER FallbackNotDistributed
If present, log orchestration should collect logs from all nodes in the cluster.
.OUTPUTS
A result object continating the results of the log collection.
#>
function CollectDiagnosticLogsJEA
{
Param(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]
$EndpointName,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]
$ComputerName,
[Parameter(Mandatory=$false)]
[nullable[DateTime]]
$FromDate,
[Parameter(Mandatory=$false)]
[nullable[DateTime]]
$ToDate,
[Parameter(Mandatory=$false)]
[Switch]
$IncludeGetSDDCLogs,
[Parameter(Mandatory=$false)]
[string[]]
$FilterByRole,
[Parameter(Mandatory=$false)]
[string[]]
$FilterByNode,
[Parameter(Mandatory=$false)]
[int]
$TimeoutInMinutes,
[Parameter(Mandatory=$false)]
[Guid]
$TracingContext = [Guid]::Empty,
[Parameter(Mandatory=$false)]
[bool]
$IsAutonomous,
[Parameter(Mandatory=$false)]
[string]
$LogCollectionJobType,
[Parameter(Mandatory=$false)]
[Switch]
$FallbackNotDistributed
)
try
{
if ($null -eq $FromDate)
{
$FromDate = (Get-Date).AddHours(-4)
Write-Information "FromDate parameter not specified. Setting to default value: $FromDate"
}
if ($null -eq $ToDate)
{
$ToDate = Get-Date
Write-Information "ToDate parameter not specified. Setting to default value: $ToDate"
}
$logResult = $null
$arcAEnvironment = (Get-ItemProperty -Path "HKLM:\Software\Microsoft\ArcA\" -ErrorAction SilentlyContinue).IsArcAEnv
if (-not $FallbackNotDistributed.IsPresent)
{
# Import the module (Get-DiagnosticLog)
$module = Get-ChildItem -Include *Microsoft.AzureStack.Observability.LogOrchestrator.dll -Recurse
Write-Information "Importing module: $($module.FullName)"
Import-Module $module.FullName -Force -Verbose
# Overrides for Arc-A
if ($arcAEnvironment)
{
$IncludeGetSDDCLogsBool = $false
$LogCollectionJobType = "OnDemand"
$LocalMode = $true
$BypassedObsAgent = $true
}
else
{
$IncludeGetSDDCLogsBool = $IncludeGetSDDCLogs.IsPresent
$LocalMode = $true
$BypassedObsAgent = $false
}
$getLogParams = @{
LogCollectionStartTimeUTC = $FromDate
LogCollectionEndTimeUTC = $ToDate
IncludeGetSDDCLogs = $IncludeGetSDDCLogsBool
FilterByRole = $FilterByRole
FilterByNode = $FilterByNode
TimeoutInMinutes = $TimeoutInMinutes
TracingContext = $TracingContext
IsAutonomous = $IsAutonomous
LogCollectionJobType = $LogCollectionJobType
LocalMode = $LocalMode
BypassedObsAgent = $BypassedObsAgent
}
Write-Information "Invoking Get-DiagnosticLog directly on $($env:COMPUTERNAME) with parameters: $($getLogParams | ConvertTo-Json)"
$logResult = Get-DiagnosticLog @getLogParams
}
else
{
$getLogParams = @{
LogCollectionStartTimeUTC = $FromDate
LogCollectionEndTimeUTC = $ToDate
IncludeGetSDDCLogs = $IncludeGetSDDCLogs.IsPresent
FilterByRole = $FilterByRole
FilterByNode = $FilterByNode
TimeoutInMinutes = $TimeoutInMinutes
TracingContext = $TracingContext
IsAutonomous = $IsAutonomous
LogCollectionJobType = $LogCollectionJobType
LocalMode = !$FallbackNotDistributed.IsPresent
}
$jeaSession = Get-JEASession -Endpoint $EndpointName -ComputerName $ComputerName
$getLogScript = { param($pHash) Get-DiagnosticLog 6>&1 @pHash }
Write-Information "Invoking Get-DiagnosticLog via JEA session with parameters: $($getLogParams | ConvertTo-Json)"
$logResult = Invoke-Command -Session $jeaSession -ScriptBlock $getLogScript -ArgumentList $getLogParams
}
if ($null -ne $logResult)
{
Write-Information "Get-DiagnosticLog returned: $($logResult | ConvertTo-Json)"
$genevaResult = @{
TotalFileCount = $logResult.GenevaConnector_TotalFileCount
ParsedFileCount = $logResult.GenevaConnector_ParsedFileCount
FailedFileCount = $logResult.GenevaConnector_FailedFileCount
SkippedFileCount = $logResult.GenevaConnector_SkippedFileCount
NotParsableFileCount = $logResult.GenevaConnector_NotParsableFileCount
ExcludedFileCount = $logResult.GenevaConnector_ExcludedFileCount
ParsedFileSizeInMB = $logResult.GenevaConnector_ParsedFileSizeInMB
ElapsedTimeInMinutes = $logResult.GenevaConnector_ElapsedTimeInMinutes
Failed = $logResult.GenevaConnector_Failed
Exception = $logResult.GenevaConnector_Exception
}
return @{
OverallSuccess = $logResult.OverallSuccess
IsClusterLogCollectionSuccessful = $logResult.IsGetSddcCollectionSuccessful
ClusterLogCollectionExceptionMessage = $logResult.GetSddcCollectionException
IncludeSDDCLogs = $logResult.IncludeSddcLogs
IsDiagLogCollectionSuccessful = $logResult.IsGetAszLogCollectionSuccessful
DiagLogCollectionExceptionMessage = $logResult.GetAszLogCollectionError
LogCollectionExceptionMessage = $logResult.Exception
GenevaResults = $genevaResult
}
}
else
{
Write-Error "Get-DiagnosticLog failed to produce a result. Diagnostics data will not be collected."
return $null
}
}
catch {
Write-Error "Get-DiagnosticLog failed with exception on $ComputerName with: $_"
return $null
}
finally {
if ($null -ne $jeaSession) {
Write-Information "Removing JEA session $($jeaSession.InstanceId)"
Remove-PSSession $jeaSession
}
}
}
<#
.SYNOPSIS
Initializes a JEA PS session.
.DESCRIPTION
Uses the current user's credentials to create a JEA PowerShell session.
.PARAMETER EndpointName
The name of the JEA endpoint.
.PARAMETER ComputerName
The name of the computer on which to invoke the endpoint.
#>
function Get-JEASession {
Param(
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]
$EndpointName,
[Parameter(Mandatory=$true)]
[ValidateNotNullOrEmpty()]
[string]
$ComputerName
)
$currentSessions = Get-PSSession -ComputerName $ComputerName -ConfigurationName $EndpointName
# Remove any existing JEA sessions to this endpoint
if ($null -ne $currentSessions) {
# ASK-CEDRICDA-Couldn't we be closing a session that is currently in use?
Write-Information "Found $($currentSessions.Count) open sessions for $EndpointName" -Verbose
# TODO-CEDRICDA-Clean up sessions. See code from Hub
}
Write-Information "Opening session on $ComputerName with endpoint $EndpointName" -Verbose
$psSessionOption = New-PSSessionOption -IdleTimeout 60000
# ASK-CEDRICDA-Are retries necessary? Hub code has it.
# TODO-CEDRICDA-retries
$jeaSession = New-PSSession -ComputerName $ComputerName -ConfigurationName $EndpointName -Verbose -SessionOption $psSessionOption -ErrorAction Stop
return $jeaSession
}
function Get-EndpointExists {
Param(
[Parameter(Mandatory=$true)]
[string]
$EndpointName
)
return $(Get-PSSessionConfiguration -Name $EndpointName -ErrorAction SilentlyContinue)
}
Export-ModuleMember -Function CollectDiagnosticLogsJEA
# SIG # Begin signature block
# MIIoLAYJKoZIhvcNAQcCoIIoHTCCKBkCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCC+w148JirzRvZF
# 5ZJGmDzKzOJgFEQr53LhDRI4sGfYxqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgwwghoIAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHiS+4g8K7fLL4isd6ccBNSi
# VaDng0gTEXENJhsMjO2uMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAdV2EppzqR89yWNvxbDsb8ln2tHvuTl2GIe16d5AhLl43N3TrBdTSnORR
# 5mxAxabgCnOgfp+YMkQhFMccP8GphYmuIcHAFhnR7ewf/Re3V/9iNdRyi+Z7W1Vw
# KxVa/Twq97CY6EWfoPE8W1iXIj7vzVDB8wCMI9MMU8i/59n1ExUzkgTGDPMWWoKM
# JqzfHEOKj3c2MgtS6GJWHhZhlmDItIDKPkZk278bkrBEfC2liM1YtaD3rmGB2UdN
# 1XB+0pI80moaIWH/pqrmT2UV+B3mC1ktsgnWEboPjAeH21LLN+HuGt7GlajjHJdZ
# pkbS/d6PQLcjVkFtlPcAxuGEVcl3QKGCF5YwgheSBgorBgEEAYI3AwMBMYIXgjCC
# F34GCSqGSIb3DQEHAqCCF28wghdrAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFRBgsq
# hkiG9w0BCRABBKCCAUAEggE8MIIBOAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAhHYDZlSudmONWX3jh0/NWxoJ80JtUuNMeu4HVQWfMrAIGZbwTZ7ZS
# GBIyMDI0MDIxMjE0MDkyMC42MlowBIACAfSggdGkgc4wgcsxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVy
# aWNhIE9wZXJhdGlvbnMxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpBNDAwLTA1
# RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaCC
# Ee0wggcgMIIFCKADAgECAhMzAAAB7OArpILQkVKAAAEAAAHsMA0GCSqGSIb3DQEB
# CwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIzMTIwNjE4NDUz
# OFoXDTI1MDMwNTE4NDUzOFowgcsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJTAjBgNVBAsTHE1pY3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMx
# JzAlBgNVBAsTHm5TaGllbGQgVFNTIEVTTjpBNDAwLTA1RTAtRDk0NzElMCMGA1UE
# AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBALBH9G4JNuDFRZWb9V26Xba7B0RmbQigAWzqgivf1Ur8
# i0/zRyf7xOa0/ruJpsHgOYAon0Yfp0kaEQ8mlji9MpFI7CtE3FUgqg895QXd/hXI
# cRyj+7VBRp2XAPXfY25kLFueHoyLaUsbukO+zNmowbtLcwKLZuTae+0Yp14Agv4f
# vuAvivTVNJZvuuwTYlvU/83pj9bUKoOLX8hvf/NGpZe3jPG90gZw+NLhkrJAQXdI
# RkCrhciOLKjA8dqo1tnF1/aRY79qN19NTzm33fgJcCKdvSj65D0q1oo0tVVw1/lC
# lLh/r8yxc68gW4JgxF0oOOma+jAB4v7WPbtsLEIGkNAetaR8/Nmn9f5u30LsTmE8
# /odVGioFhHu7WBR/kYSr7mvUcDSNqOfRDo699hyQTQd06/opZr6wCYkbs8O9Nlp7
# vuGibPHog+qCBWk1m4KTv1J9Wacq70XnxQCdTnxOoMcTMaxCcxRAqy1LfOOfpJTQ
# 0sQU0J62W5oqSpYNFUsRZu7fb0gSHe2pc9d/LpGH/AJvB71IIkiiq0F7EGs/JBgD
# ZdrPV8r3KxOzHSQD1XUnBVXjghr1z4zC0BHqyop0CBGj9uz9e7yC5rwsN7opbK73
# vh72YZbtk7ydqsMWsBPURcYcO57KBIq+/YrvAHyUCAwYmPvcJC+v6OqhbDHpd3J5
# AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU9FrQR2T+K/XCFhCxXxSAR/hMhYYwHwYD
# VR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZO
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIw
# VGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBc
# BggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0
# cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYD
# VR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMC
# B4AwDQYJKoZIhvcNAQELBQADggIBAJK8xKQxKu+OUM9qDwBFvQ4WsBC1IswOk3RR
# jcWO8+HAYoOuuLGae4x+OuZWNGrW7wiGQO8YX9t99sVOv4gCcNJ6DxMH3N8b/jJu
# Se6imSVt4aNu3swvGl+GiUIRHIRzbQ8xkonP1K/N+47WfnGuss4vybSea/mQFy/7
# LUBcnlBwuJyaF7Yinf8PrsR3qg+pAjTeYONhpLU1CEE227nvA8pdnUSg1OgGTxsD
# rzf3DXX1v5r1ZOioiyR1Eag/nGMMi/6ZzS8EeFkaQlW98iGbgCnzOm0LvFUCXLSN
# 46/l1QYwJiBmO+hOaB3jluoDC6d2Y+Ua6vt6V5Zh50tB/uzcvn6p9pj/ESH/26jX
# tKcz+AdVIYDO+et4aE6sHYu10qhVJ7kttimKFdy0N7vqJi0v6aHFc8SnN1rdsmWE
# 9M5Dco4RkClUREGjnKW1aM8JaVfHIKmXmOP2djSd93TvVt6aei7wDetRmt2Aohq6
# 2wftIc6I55tkao277rba8m1rd4BiwIBrEBwH0GIk+Vrtdp32qtNh1PjlWUJhO0FJ
# jihVGx51IAO/32O/+JggAbLVsLK25rSj9Cq/16sqbNAJNUxdoNzbkNMtwwYmtG5r
# crTGK922egF7HNUmvrJeoz4FrbCEhVG8ZyuIGQpfQUkV5buvb1df6TR7gOcbqIEc
# pCN5zpU3MIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG
# 9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAO
# BgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEy
# MDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw
# MTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az
# /1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V2
# 9YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oa
# ezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkN
# yjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7K
# MtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRf
# NN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SU
# HDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoY
# WmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5
# C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8
# FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TAS
# BgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1
# Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUw
# UzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNy
# b3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoG
# CCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIB
# hjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fO
# mhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9w
# a2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggr
# BgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNv
# bS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3
# DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEz
# tTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJW
# AAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G
# 82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/Aye
# ixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI9
# 5ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1j
# dEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZ
# KCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xB
# Zj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuP
# Ntq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvp
# e784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCA1Aw
# ggI4AgEBMIH5oYHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScw
# JQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNVBAMT
# HE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVAI4c
# +2BV3P0RbSI80v8FeomipUx/oIGDMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwDQYJKoZIhvcNAQELBQACBQDpdGiYMCIYDzIwMjQwMjEyMDk1MTIw
# WhgPMjAyNDAyMTMwOTUxMjBaMHcwPQYKKwYBBAGEWQoEATEvMC0wCgIFAOl0aJgC
# AQAwCgIBAAICJCgCAf8wBwIBAAICEx0wCgIFAOl1uhgCAQAwNgYKKwYBBAGEWQoE
# AjEoMCYwDAYKKwYBBAGEWQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkq
# hkiG9w0BAQsFAAOCAQEAUFTrvzo7b1KQFRP6gLv9BydWF9M5Bby2GMNzRGhFgmIh
# RE86TFE78iUN32VnWB8810Bj7y8ff4r3KbtZ+krhurTyPZvypUjqYns5RTUiolTl
# VONABXwmvlvcGDPd3r3QKBPAtEO9sQjUHO4sE1x4sRMEO4Im3anqeX+5BPHp39JL
# wsqD/V5I5Kqc/OgQarend7pnVekeUpFkVcNlFkTiEY+4+I03nZ+yxLvtYWZSA5Zq
# +TTGmqsJcXEzJqUfpS5bgkM/R0YDgUSFvJLhbIMVLFCw9u2b8vWOSVF2HsKOV6gu
# YglAnro0jOpD9yybnP6ySgO6W8J8I3PSubgdDhbcjTGCBA0wggQJAgEBMIGTMHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB7OArpILQkVKAAAEAAAHs
# MA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQw
# LwYJKoZIhvcNAQkEMSIEIC7ZEKrM+ZOgxHcr+c7D7uLKH4bb60AwizguBFnHRcET
# MIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQgJwnm9Wp9N8iHHbVAEFsrKj/F
# yJAhdqgxZQt6MATVCoMwgZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0Eg
# MjAxMAITMwAAAezgK6SC0JFSgAABAAAB7DAiBCDiH61S/YxE5U0K5l7Ehm708C7c
# /DSEfwf9tSghQ1wO5TANBgkqhkiG9w0BAQsFAASCAgBK7q1dY0p+rXfZ4hGlZ3VJ
# twY7+zXMc09vF0DXIh1UbizEUmBUeJLBo0TmU1OU18lIFMRI+eTkAKLD+Lq2M9vC
# urI6vJEIZ4YGzqVzL8I50fhKpr4bMYKvdMSOIIBcrOMNOS63irI+/xYH0twA61qa
# hdM64SJ9lhKFNFE9SH0n6VMaLI0Lf3IQ2y49wPXw9dpK18ffxpchHOKtzkfoLybM
# pYt3KGW2cECqQJ4gAVCglKgLY6UvEmHeNUO8MeNiFL+5QTgUBeTvPPieekPaKh5s
# uKXsCT01l2AQ/qxyFUxnRxWO4OOqIAVp1UlSj7iFl/YtlYIP95t1lYamJRbGfUg0
# 16WWKoZpeO52SkriYrem5sI/5IeAR15DB8LgRObNZM+h8nvCJDSV8Lcymkyf9tIE
# eIccBB3aFadTdo354UwjRVeE6ENfmQifG/hiaFH6MGzOJp/S6N7LEaghoVy7I3I7
# 7Tmbyl3NAzL6p2JUK9jqDW2WCLoDsPfKTiP618y/kfL6s0IXkxPV5GuCXu/qYU6b
# WXKA1FdiDEvcSnGUcxFee9pSnipHmxmpq2gqzPgCr+YRPtCjgc8369SkJBk2yWzL
# AHi7sCNnpmMjdsIfOc0FBuwctKNu1Qq7nyKXiNov+giWjPd+eO1/n0l4gbO4TX03
# gHf8Ppx25G0cOG11Aw0QRA==
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_5_17.ps1
|
sample_5_17.ps1
|
#
# Module manifest for module 'OCI.PSModules.Resourcescheduler'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Resourcescheduler.dll'
# Version number of this module.
ModuleVersion = '92.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '410b94b1-9573-414c-8179-e65332969614'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Resourcescheduler Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '92.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Resourcescheduler.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Enable-OCIResourceschedulerSchedule',
'Get-OCIResourceschedulerResourceTypesList',
'Get-OCIResourceschedulerSchedule',
'Get-OCIResourceschedulerSchedulesList',
'Get-OCIResourceschedulerWorkRequest',
'Get-OCIResourceschedulerWorkRequestErrorsList',
'Get-OCIResourceschedulerWorkRequestLogsList',
'Get-OCIResourceschedulerWorkRequestsList',
'Invoke-OCIResourceschedulerDeactivateSchedule',
'New-OCIResourceschedulerSchedule',
'Remove-OCIResourceschedulerSchedule',
'Stop-OCIResourceschedulerWorkRequest',
'Update-OCIResourceschedulerSchedule'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Resourcescheduler'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/New-StoredProcFunction_3.ps1
|
New-StoredProcFunction_3.ps1
|
# New-StoredProcFunction.ps1
# Steven Murawski
# http://blog.usepowershell.com
# 04/08/2009
# Replaced the parsing of the stored procedure text and use Information_Schema.Parameters to get the parameter information
# Thanks to Chad Miller for the idea.
# Example: ./New-StoredProcFunction.ps1 'Data Source=MySqlServer;Database=Northwind;User=AnythingButSa;Password=abc123' sp_createnewcustomer
# Example 'sp_createnewcustomer | ./New-StoredProcFunction.ps1 'Data Source=MySqlServer;Database=Northwind;User=AnythingButSa;Password=abc123'
param($ConnectionString, [String[]]$StoredProc= $null)
BEGIN
{
if ($StoredProc.count -gt 0)
{
$StoredProc | ./New-StoredProcFunction $ConnectionString
}
function Invoke-SQLQuery()
{
param ($ConnectionString, $Query)
$connection = New-Object System.Data.SqlClient.SqlConnection $connectionString
$command = New-Object System.Data.SqlClient.SqlCommand $query,$connection
$connection.Open()
$adapter = New-Object System.Data.SqlClient.SqlDataAdapter $command
$dataset = New-Object System.Data.DataSet
[void] $adapter.Fill($dataSet)
$connection.Close()
$dataSet.Tables | ForEach-Object {$_.Rows}
}
function Get-FunctionParameter()
{
param($FunctionName, $ConnectionString)
$query = @"
SELECT parameter_Name, data_type, character_maximum_length, parameter_mode
FROM INFORMATION_SCHEMA.Parameters
WHERE specific_NAME LIKE '$FunctionName'
"@
$Rows = Invoke-SQLQuery $ConnectionString $Query
foreach ($Row in $Rows)
{
$Parameter = "" | Select-Object Name, DataType, Length, IsOutput
$Parameter.Name = $row.parameter_Name
$Parameter.DataType = $Row.data_type
$Parameter.Length = $Row.character_maximum_length
$Parameter.IsOutput = if ($Row.parameter_mode -eq 'INOUT'){$true} else {$false}
$Parameter
}
}
}
PROCESS
{
if ($_ -ne $null)
{
$FunctionName = $_
$Parameters = Get-FunctionParameter $FunctionName $ConnectionString
[String[]]$InputParamNames = $Parameters | where {-not $_.IsOutput} | ForEach-Object {$_.Name -replace '@' }
[String[]]$OutputParameterNames = $Parameters | Where-Object {$_.IsOutput} | ForEach-Object {$_.Name -replace '@'}
$ScriptText = ' '
if ($InputParamNames.count -gt 0)
{
$OFS = ', $'
$ScriptText += 'param (${0})' -f $InputParamNames
$ScriptText += "`n"
$OFS = ', '
}
$BodyTemplate = @'
$connection = New-Object System.Data.SqlClient.SqlConnection('{0}')
$command = New-Object System.Data.SqlClient.SqlCommand('{1}', $connection)
$command.CommandType = [System.Data.CommandType]::StoredProcedure
'@
$ScriptText += $BodyTemplate -f $ConnectionString, $FunctionName
if ( ($Parameters -ne $null) -or ($Parameters.count -gt 1) )
{
if ($OutputParameterNames.count -gt 0)
{
$ReturnText = ""
$CommandOutput = "" | select $OutputParameterNames
}
#Add the parameters
foreach ($param in $Parameters)
{
if ($param.length -isnot [DBNull])
{
$ParamTemplate = '$command.Parameters.Add("{0}", "{1}", {2}) | out-null '
$ScriptText += "`n"
$ScriptText += $ParamTemplate -f $param.name, $param.datatype, $param.length
}
else
{
$ParamTemplate = '$command.Parameters.Add("{0}", "{1}") | out-null '
$ScriptText += "`n"
$ScriptText += $ParamTemplate -f $param.name, $param.datatype
}
if ($param.IsOutput)
{
$ScriptText += "`n"
$ScriptText += '$command.Parameters["{0}"].Direction = [System.Data.ParameterDirection]::Output ' -f $param.Name
$ReturnText += "`n"
$ReturnText += '$CommandOutput.{1} = $command.Parameters["{0}"].Value' -f $param.name, ($param.name -replace '@')
}
else
{
$ScriptText += "`n"
$ScriptText += '$command.Parameters["{0}"].Value = ${1} ' -f $param.name, ($param.name -replace '@')
}
}
}
$ScriptText += "`n"
$ScriptText += @'
$connection.Open() | out-null
$command.ExecuteNonQuery() | out-null
'@
if ($OutputParameterNames.count -gt 0)
{
$ScriptText += $ReturnText
}
$ScriptText += @'
$connection.Close() | out-null
return $CommandOutput
'@
#$ScriptText
Set-Item -Path function:global:$FunctionName -Value $scripttext
}
}
|
combined_dataset/train/non-malicious/Resolve-Aliases _1.7.ps1
|
Resolve-Aliases _1.7.ps1
|
#requires -version 2.0
## ResolveAliases Module v 1.6
########################################################################################################################
## Sample Use:
## Resolve-Aliases Script.ps1 | Set-Content Script.Resolved.ps1
## ls *.ps1 | Resolve-Aliases -Inplace
########################################################################################################################
## Version History
## 1.0 - First Version. "It worked on my sample script"
## 1.1 - Now it parses the $(...) blocks inside strings
## 1.2 - Some tweaks to spacing and indenting (I really gotta get some more test case scripts)
## 1.3 - I went back to processing the whole script at once (instead of a line at a time)
## Processing a line at a time makes it impossible to handle Here-Strings...
## I'm considering maybe processing the tokens backwards, replacing just the tokens that need it
## That would mean I could get rid of all the normalizing code, and leave the whitespace as-is
## 1.4 - Now resolves parameters too
## 1.5 - Fixed several bugs with command resolution (the ? => ForEach-Object problem)
## - Refactored the Resolve-Line filter right out of existence
## - Created a test script for validation, and
## 1.6 - Added resolving parameter ALIASES instead of just short-forms
## 1.7 - Minor tweak to make it work in CTP3
##
## * *TODO:* Put back the -FullPath option to resolve cmdlets with their snapin path
## * *TODO:* Add an option to put #requires statements at the top for each snapin used
########################################################################################################################
function which {
PARAM( [string]$command )
# aliases, functions, cmdlets, scripts, executables, normal files
$cmds = @(Get-Command $command -EA "SilentlyContinue")
if($cmds.Count -gt 1) {
$cmd = @( $cmds | Where-Object { $_.Name -match "^$([Regex]::Escape($command))" })[0]
} else {
$cmd = $cmds[0]
}
if(!$cmd) {
$cmd = @(Get-Command "Get-$command" -EA "SilentlyContinue" | Where-Object { $_.Name -match "^Get-$([Regex]::Escape($command))" })[0]
}
if( $cmd.CommandType -eq "Alias" ) {
$cmd = which $cmd.Definition
}
return $cmd
}
function Resolve-Aliases
{
[CmdletBinding(ConfirmImpact="low",DefaultParameterSetName="Files")]
Param (
[Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true, ParameterSetName="Text")]
[string]$Line
,
[Parameter(Position=0, Mandatory=$true, ValueFromPipeline=$true, ParameterSetName="Files")]
[Alias("FullName","PSChildName","PSPath")]
[IO.FileInfo]$File
,
[Parameter(Position=1, ParameterSetName="Files")]
[Switch]$InPlace
)
BEGIN {
Write-Debug $PSCmdlet.ParameterSetName
}
PROCESS {
if($PSCmdlet.ParameterSetName -eq "Files") {
if($File -is [System.IO.FileInfo]){
$Line = ((Get-Content $File) -join "`n")
} else {
throw "We can't resolve a whole folder at once yet"
}
}
$Tokens = [System.Management.Automation.PSParser]::Tokenize($Line,[ref]$null)
for($t = $Tokens.Count; $t -ge 0; $t--) {
$token = $Tokens[$t]
# DEBUG $token | fl * | out-host
switch($token.Type) {
"Command" {
$cmd = which $token.Content
Write-Debug "Command $($token.Content) => $($cmd.Name)"
#if($cmd.CommandType -eq "Alias") {
$Line = $Line.Remove( $token.Start, $token.Length ).Insert( $token.Start, $cmd.Name )
#}
}
"CommandParameter" {
Write-Debug "Parameter $($token.Content)"
for($c = $t; $c -ge 0; $c--) {
if( $Tokens[$c].Type -eq "Command" ) {
$cmd = which $Tokens[$c].Content
# if($cmd.CommandType -eq "Alias") {
# $cmd = @(which $cmd.Definition)[0]
# }
$short = $token.Content -replace "^-?","^"
Write-Debug "Parameter $short"
$parameters = $cmd.ParameterSets | Select -expand Parameters
$param = @($parameters | Where-Object { $_.Name -match $short -or $_.Aliases -match $short} | Select -Expand Name -Unique)
if($param.Count -eq 1) {
$Line = $Line.Remove( $token.Start, $token.Length ).Insert( $token.Start, "-$($param[0])" )
}
break
}
}
}
}
}
switch($PSCmdlet.ParameterSetName) {
"Text" {
$Line
}
"Files" {
switch($File.GetType()) {
"System.IO.FileInfo" {
if($InPlace) {
$Line | Set-Content $File
} else {
$Line
}
}
default { throw "We can't resolve a whole folder at once yet" }
}
}
default { throw "ParameterSet: $($PSCmdlet.ParameterSetName)" }
}
}
}
|
combined_dataset/train/non-malicious/4056.ps1
|
4056.ps1
|
param([string]$RootDir, [string]$CertThumbPrint = 'BB25149CDAF879A29DB6A011F6FC874AF32CBF51')
$cert = Get-ChildItem Cert:\CurrentUser\My\$CertThumbPrint
Get-ChildItem $RootDir -Recurse -Include *.ps1,*.psm1,*.ps1xml -File |
Where Name -ne 'Pscx.UserPreferences.ps1' |
Foreach {
Set-AuthenticodeSignature -Certificate $cert -TimestampServer http://timestamp.digicert.com $_.FullName
}
|
combined_dataset/train/non-malicious/sample_44_9.ps1
|
sample_44_9.ps1
|
# ----------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code
# is regenerated.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Creates or updates a service hybrid connection.
This operation is idempotent.
.Description
Creates or updates a service hybrid connection.
This operation is idempotent.
.Example
Set-AzRelayHybridConnection -ResourceGroupName lucas-relay-rg -Namespace namespace-pwsh01 -Name connection-01 -UserMetadata "Test UserMetadata updated" | fl
.Example
$connection = Get-AzRelayHybridConnection -ResourceGroupName lucas-relay-rg -Namespace namespace-pwsh01 -Name connection-01
$connection.UserMetadata = "testHybirdConnection"
Set-AzRelayHybridConnection -ResourceGroupName lucas-relay-rg -Namespace namespace-pwsh01 -Name connection-01 -InputObject $connection
.Inputs
Microsoft.Azure.PowerShell.Cmdlets.Relay.Models.Api20211101.IHybridConnection
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.Relay.Models.Api20211101.IHybridConnection
.Notes
COMPLEX PARAMETER PROPERTIES
To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables.
INPUTOBJECT <IHybridConnection>: Description of hybrid connection resource.
[RequiresClientAuthorization <Boolean?>]: Returns true if client authorization is needed for this hybrid connection; otherwise, false.
[SystemDataCreatedAt <DateTime?>]: The timestamp of resource creation (UTC).
[SystemDataCreatedBy <String>]: The identity that created the resource.
[SystemDataCreatedByType <CreatedByType?>]: The type of identity that created the resource.
[SystemDataLastModifiedAt <DateTime?>]: The timestamp of resource last modification (UTC)
[SystemDataLastModifiedBy <String>]: The identity that last modified the resource.
[SystemDataLastModifiedByType <CreatedByType?>]: The type of identity that last modified the resource.
[UserMetadata <String>]: The usermetadata is a placeholder to store user-defined string data for the hybrid connection endpoint. For example, it can be used to store descriptive data, such as a list of teams and their contact information. Also, user-defined configuration settings can be stored.
.Link
https://learn.microsoft.com/powershell/module/az.relay/set-azrelayhybridconnection
#>
function Set-AzRelayHybridConnection {
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.Relay.Models.Api20211101.IHybridConnection])]
[CmdletBinding(DefaultParameterSetName='UpdateExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')]
param(
[Parameter(Mandatory)]
[Alias('HybridConnectionName')]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')]
[System.String]
# The hybrid connection name.
${Name},
[Parameter(Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')]
[System.String]
# The namespace name
${Namespace},
[Parameter(Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')]
[System.String]
# Name of the Resource group within the Azure subscription.
${ResourceGroupName},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String]
# Subscription credentials which uniquely identify the Microsoft Azure subscription.
# The subscription ID forms part of the URI for every service call.
${SubscriptionId},
[Parameter(ParameterSetName='Update', Mandatory, ValueFromPipeline)]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Models.Api20211101.IHybridConnection]
# Description of hybrid connection resource.
# To construct, see NOTES section for INPUTOBJECT properties and create a hash table.
${InputObject},
[Parameter(ParameterSetName='UpdateExpanded')]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Body')]
[System.String]
# The usermetadata is a placeholder to store user-defined string data for the hybrid connection endpoint.
# For example, it can be used to store descriptive data, such as a list of teams and their contact information.
# Also, user-defined configuration settings can be stored.
${UserMetadata},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Azure')]
[System.Management.Automation.PSObject]
# The DefaultProfile parameter is not functional.
# Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.
${DefaultProfile},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.Relay.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process {
try {
$outBuffer = $null
if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) {
$PSBoundParameters['OutBuffer'] = 1
}
# 1. Get
$parameterSet = $PSCmdlet.ParameterSetName
if (('Update', 'UpdateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId')) {
$PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id
}
$hybridConnection = $null
$hasUserMetadata = $PSBoundParameters.Remove('UserMetadata')
if ('UpdateExpanded' -contains $parameterSet) {
$hybridConnection = Get-AzRelayHybridConnection @PSBoundParameters
}
if ('Update'-contains $parameterSet){
$hybridConnection = $InputObject
}
# 2. Put
if ($hasUserMetadata) {
$hybridConnection.UserMetadata = $UserMetadata
}
if ($PSCmdlet.ShouldProcess("WCF relay on namespace $($hybridConnection.Name)", "Update")) {
Az.Relay.internal\Set-AzRelayHybridConnection -InputObject $hybridConnection @PSBoundParameters
}
} catch {
throw
}
}
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA5my/h+46GRah5
# QVoHvh2Pb6PkTM5GWVFXfFB45PqTOKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICTWWCrW+5zHXiJy4oCzZ88K
# sV/i3uliEqCanY7dQIYdMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAgPdGpSUNO806T6bMjWVN9TMUa1n1AyXuIorwOwaKHkM6p8o19WW7IRjD
# QQ9XHDTttDmeMMXxyLaRunDq5jMLC0smZ6lGomydcyBCwdXPsG7LwMZQFzHjWLQn
# MgrAsdRkJ5u0D4sE1lrOMaZd9wZv53Uni2zl++x5+16ee77rBNXzKLz49NT/zGsS
# PxSy44UrlfIoqpjPNuXJd5/GmHnZpYbumT+NXDAlcoSFWj6MpDKRx9dODQzXQNKM
# PJtqAsNRajzs8YfKVY7lRIa2xYdB0U6DRkPRQFn1FDZSTKp6GPD5SVP/PVRK8chc
# 7GlHGry9GB5QKotPiBFbOivtJGF0zaGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCQloIBVgV0Rba6k0u1uFVJbCvxp4b9sJHAmKSzfem/8wIGZh+4i4lP
# GBMyMDI0MDQyMzEzMTUyMy45NzdaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC
# RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b
# cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E
# 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2
# aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er
# bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf
# ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog
# 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy
# kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy
# 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv
# mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+
# yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt
# vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV
# izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4
# 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r
# cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W
# JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq
# bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt
# ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg
# ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ
# CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz
# FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn
# boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58
# 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv
# uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow
# ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnSH4QwIhgPMjAyNDA0MjMxOTUyMzZaGA8yMDI0MDQyNDE5NTIzNlowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6dIfhAIBADAHAgEAAgIU6jAHAgEAAgIRVDAKAgUA
# 6dNxBAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBACaiRtshc9G8WfVMjQ9x
# gEYZNyoQzv72BU6LutxlZM2r2C6LuYvcx7q63PWs3MxkStXHAb2esRYvBMPDXsgq
# +NN6fYXSMTKwpnHYRiK/t3Uv3SwtPXjykiR2mqVxj6/PkN2nsimpupdSo/lnOZCf
# y706cQscQBC5MafJvRllTUbaMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgn5+q5p39kcAvMxq2y8KThZc8rX9YCjUngQnzFVquJNwwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9
# xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V
# yVoA0RGxAAEAAAHaMCIEIFb/iamaUnR+fesQaHni5azXdqy22buGhS1oKaTDDm+J
# MA0GCSqGSIb3DQEBCwUABIICAH/LGfiuII+rWF3L7dLPX7N3BqWAKJJNAERsefI+
# yLZ3+G51dDDuBtxbtffId6WhpqaLuZddxh46o1WJEjpp/B7HvAd0dFvFAEnScgpo
# QbaAsMIrb+onuKwjf160oxoSPxSMLnc4bAP8lIGK4XCBrWzoLPqeZqTVlXoPSqJR
# xfweExn1NxQcWemGVzYFm3Ufbohe59xRAZTUk+66UpdrXg8pqzSea1hAG3377AxH
# VsZr315uFORY7/dd+qspgLrLkAL0uBqhg25+y//cSbK4auiCazIIz1stZm3tIIFB
# VDzc09ukpdwpZlh135wND19N3c/SKohy6MOS4LeP77T8SWi7ka33dqJw+hlvqe9l
# QBihX48HPciEg0jrliMmMwRvKFL5u1BGt62bHADLtIgHfBFxiMFNVoS5H2EyuWXj
# lkK7VP/UTvCCmXAYrzt7wna0k+VrYYdthu9N2cUc75wWdeMn+UBpq8BZo1EoegW+
# HXQyun0ZnM0a8EWgBTO7XqGpAutHuLZfc2eWT0nCn4FRE1JTTJVLuDP7R6ShdTPP
# eChgF/WU+YEZ8yERmaT1j/XLNqxc2Y6jcsuInvV90MUG2NgVjQLaqS1CdcSJXNxz
# st/JfCda5vyNN/74u/lTo9BI3GDrRgth9MDOmtNZ6FZr6NqwgEOp7ipFf3Y6cz2R
# sOhS
# SIG # End signature block
|
combined_dataset/train/non-malicious/Remove-MyOldComputers.ps1
|
Remove-MyOldComputers.ps1
|
##
# Remove-MyOldComputers.ps1
#
# Makes certian assumptions about your computers naming scheme: mainly that all your
# computers are named as follows: {username}* I.E. bob1, bob-test, bob-server, etc
#
##
param (
[String] $Name=((whoami).Split('\\')[1]),
[Int32] $MaxDaysOld=20
)
$root = [ADSI]''
$searcher = new-object System.DirectoryServices.DirectorySearcher($root)
$searcher.filter = "(Name=$Name*)"
$computers = $searcher.findall()
$computers | % {
$Comp = [ADSI]$_.Path
$LastChange = [DateTime]::Now - [DateTime][String]$Comp.WhenChanged
if ($LastChange.TotalDays -gt $MaxDaysOld) {
Write-Host Deleting $Comp.Name [$LastChangeTimeSpan.TotalDays days old]
$Comp.psbase.DeleteTree()
}
}
|
combined_dataset/train/non-malicious/608.ps1
|
608.ps1
|
param(
[string]$Version,
[string]$Path,
[switch]$Force,
[switch]$Update,
[switch]$Uninstall
)
$Configs = @{
Url = "http://ola.hallengren.com/scripts/MaintenanceSolution.sql",
"http://ola.hallengren.com/scripts/DatabaseBackup.sql",
"http://ola.hallengren.com/scripts/DatabaseIntegrityCheck.sql",
"http://ola.hallengren.com/scripts/IndexOptimize.sql",
"http://ola.hallengren.com/scripts/CommandExecute.sql",
"http://ola.hallengren.com/scripts/CommandLog.sql"
}
$Configs | ForEach-Object{
try{
$_.Result = $null
if(-not $_.Path){$_.Path = $Path}
$Config = $_
if(-not $Uninstall){
if($_.ConditionExclusion){
$_.ConditionExclusionResult = $(Invoke-Expression $Config.ConditionExclusion -ErrorAction SilentlyContinue)
}
if(($_.ConditionExclusionResult -eq $null) -or $Force){
$_.Downloads = $_.Url | ForEach-Object{
Get-File -Url $_ -Path $Config.Path
}
if($Update){$_.Result = "AppUpdated";$_
}else{$_.Result = "AppInstalled";$_}
}else{
$_.Result = "ConditionExclusion";$_
}
}else{
$_.Result = "AppUninstalled";$_
}
}catch{
$Config.Result = "Error";$Config
}
}
|
combined_dataset/train/non-malicious/443.ps1
|
443.ps1
|
Register-PSFConfigValidation -Name "datetime" -ScriptBlock {
Param (
$Value
)
$Result = New-Object PSObject -Property @{
Success = $True
Value = $null
Message = ""
}
try { [DateTime]$DateTime = $Value }
catch
{
$Result.Message = "Not a DateTime: $Value"
$Result.Success = $False
return $Result
}
$Result.Value = $DateTime
return $Result
}
|
combined_dataset/train/non-malicious/sample_56_30.ps1
|
sample_56_30.ps1
|
#
# Module manifest for module 'OCI.PSModules.Database'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Database.dll'
# Version number of this module.
ModuleVersion = '82.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'e1b520e7-13c2-41a0-be48-3eacc401dff5'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Database Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '82.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Database.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Add-OCIDatabaseStorageCapacityCloudExadataInfrastructure',
'Add-OCIDatabaseStorageCapacityExadataInfrastructure',
'Add-OCIDatabaseVirtualMachineToCloudVmCluster',
'Add-OCIDatabaseVirtualMachineToVmCluster',
'Complete-OCIDatabaseExternalBackupJob',
'Confirm-OCIDatabaseVmClusterNetwork',
'Disable-OCIDatabaseAutonomousDatabaseManagement',
'Disable-OCIDatabaseAutonomousDatabaseOperationsInsights',
'Disable-OCIDatabaseExternalContainerDatabaseDatabaseManagement',
'Disable-OCIDatabaseExternalContainerDatabaseStackMonitoring',
'Disable-OCIDatabaseExternalNonContainerDatabaseDatabaseManagement',
'Disable-OCIDatabaseExternalNonContainerDatabaseOperationsInsights',
'Disable-OCIDatabaseExternalNonContainerDatabaseStackMonitoring',
'Disable-OCIDatabaseExternalPluggableDatabaseDatabaseManagement',
'Disable-OCIDatabaseExternalPluggableDatabaseOperationsInsights',
'Disable-OCIDatabaseExternalPluggableDatabaseStackMonitoring',
'Disable-OCIDatabaseManagement',
'Disable-OCIDatabasePluggableDatabaseManagement',
'Edit-OCIDatabaseManagement',
'Edit-OCIDatabasePluggableDatabaseManagement',
'Enable-OCIDatabaseAutonomousDatabaseManagement',
'Enable-OCIDatabaseAutonomousDatabaseOperationsInsights',
'Enable-OCIDatabaseExadataInfrastructure',
'Enable-OCIDatabaseExternalContainerDatabaseDatabaseManagement',
'Enable-OCIDatabaseExternalContainerDatabaseStackMonitoring',
'Enable-OCIDatabaseExternalNonContainerDatabaseDatabaseManagement',
'Enable-OCIDatabaseExternalNonContainerDatabaseOperationsInsights',
'Enable-OCIDatabaseExternalNonContainerDatabaseStackMonitoring',
'Enable-OCIDatabaseExternalPluggableDatabaseDatabaseManagement',
'Enable-OCIDatabaseExternalPluggableDatabaseOperationsInsights',
'Enable-OCIDatabaseExternalPluggableDatabaseStackMonitoring',
'Enable-OCIDatabaseManagement',
'Enable-OCIDatabasePluggableDatabaseManagement', 'Get-OCIDatabase',
'Get-OCIDatabaseApplicationVip',
'Get-OCIDatabaseApplicationVipsList',
'Get-OCIDatabaseAutonomousContainerDatabase',
'Get-OCIDatabaseAutonomousContainerDatabaseDataguardAssociation',
'Get-OCIDatabaseAutonomousContainerDatabaseDataguardAssociationsList',
'Get-OCIDatabaseAutonomousContainerDatabaseResourceUsage',
'Get-OCIDatabaseAutonomousContainerDatabasesList',
'Get-OCIDatabaseAutonomousContainerDatabaseVersionsList',
'Get-OCIDatabaseAutonomousDatabase',
'Get-OCIDatabaseAutonomousDatabaseBackup',
'Get-OCIDatabaseAutonomousDatabaseBackupsList',
'Get-OCIDatabaseAutonomousDatabaseCharacterSetsList',
'Get-OCIDatabaseAutonomousDatabaseClonesList',
'Get-OCIDatabaseAutonomousDatabaseDataguardAssociation',
'Get-OCIDatabaseAutonomousDatabaseDataguardAssociationsList',
'Get-OCIDatabaseAutonomousDatabaseRefreshableClonesList',
'Get-OCIDatabaseAutonomousDatabaseRegionalWallet',
'Get-OCIDatabaseAutonomousDatabasesList',
'Get-OCIDatabaseAutonomousDatabaseSoftwareImage',
'Get-OCIDatabaseAutonomousDatabaseSoftwareImagesList',
'Get-OCIDatabaseAutonomousDatabaseWallet',
'Get-OCIDatabaseAutonomousDbPreviewVersionsList',
'Get-OCIDatabaseAutonomousDbVersionsList',
'Get-OCIDatabaseAutonomousExadataInfrastructure',
'Get-OCIDatabaseAutonomousExadataInfrastructureShapesList',
'Get-OCIDatabaseAutonomousExadataInfrastructuresList',
'Get-OCIDatabaseAutonomousPatch',
'Get-OCIDatabaseAutonomousVirtualMachine',
'Get-OCIDatabaseAutonomousVirtualMachinesList',
'Get-OCIDatabaseAutonomousVmCluster',
'Get-OCIDatabaseAutonomousVmClusterAcdResourceUsageList',
'Get-OCIDatabaseAutonomousVmClusterResourceUsage',
'Get-OCIDatabaseAutonomousVmClustersList', 'Get-OCIDatabaseBackup',
'Get-OCIDatabaseBackupDestination',
'Get-OCIDatabaseBackupDestinationList',
'Get-OCIDatabaseBackupsList',
'Get-OCIDatabaseCloudAutonomousVmCluster',
'Get-OCIDatabaseCloudAutonomousVmClusterAcdResourceUsageList',
'Get-OCIDatabaseCloudAutonomousVmClusterResourceUsage',
'Get-OCIDatabaseCloudAutonomousVmClustersList',
'Get-OCIDatabaseCloudExadataInfrastructure',
'Get-OCIDatabaseCloudExadataInfrastructuresList',
'Get-OCIDatabaseCloudExadataInfrastructureUnallocatedResources',
'Get-OCIDatabaseCloudVmCluster',
'Get-OCIDatabaseCloudVmClusterIormConfig',
'Get-OCIDatabaseCloudVmClustersList',
'Get-OCIDatabaseCloudVmClusterUpdate',
'Get-OCIDatabaseCloudVmClusterUpdateHistoryEntriesList',
'Get-OCIDatabaseCloudVmClusterUpdateHistoryEntry',
'Get-OCIDatabaseCloudVmClusterUpdatesList',
'Get-OCIDatabaseConsoleConnection',
'Get-OCIDatabaseConsoleConnectionsList',
'Get-OCIDatabaseConsoleHistoriesList',
'Get-OCIDatabaseConsoleHistory',
'Get-OCIDatabaseConsoleHistoryContent',
'Get-OCIDatabaseContainerDatabasePatchesList',
'Get-OCIDatabaseDataGuardAssociation',
'Get-OCIDatabaseDataGuardAssociationsList', 'Get-OCIDatabaseDbHome',
'Get-OCIDatabaseDbHomePatch', 'Get-OCIDatabaseDbHomePatchesList',
'Get-OCIDatabaseDbHomePatchHistoryEntriesList',
'Get-OCIDatabaseDbHomePatchHistoryEntry',
'Get-OCIDatabaseDbHomesList', 'Get-OCIDatabaseDbNode',
'Get-OCIDatabaseDbNodesList', 'Get-OCIDatabaseDbServer',
'Get-OCIDatabaseDbServersList', 'Get-OCIDatabaseDbSystem',
'Get-OCIDatabaseDbSystemComputePerformancesList',
'Get-OCIDatabaseDbSystemPatch',
'Get-OCIDatabaseDbSystemPatchesList',
'Get-OCIDatabaseDbSystemPatchHistoryEntriesList',
'Get-OCIDatabaseDbSystemPatchHistoryEntry',
'Get-OCIDatabaseDbSystemShapesList', 'Get-OCIDatabaseDbSystemsList',
'Get-OCIDatabaseDbSystemStoragePerformancesList',
'Get-OCIDatabaseDbSystemUpgradeHistoryEntriesList',
'Get-OCIDatabaseDbSystemUpgradeHistoryEntry',
'Get-OCIDatabaseDbVersionsList',
'Get-OCIDatabaseExadataInfrastructure',
'Get-OCIDatabaseExadataInfrastructureOcpus',
'Get-OCIDatabaseExadataInfrastructuresList',
'Get-OCIDatabaseExadataInfrastructureUnAllocatedResources',
'Get-OCIDatabaseExadataIormConfig',
'Get-OCIDatabaseExternalBackupJob',
'Get-OCIDatabaseExternalContainerDatabase',
'Get-OCIDatabaseExternalContainerDatabasesList',
'Get-OCIDatabaseExternalDatabaseConnector',
'Get-OCIDatabaseExternalDatabaseConnectorsList',
'Get-OCIDatabaseExternalNonContainerDatabase',
'Get-OCIDatabaseExternalNonContainerDatabasesList',
'Get-OCIDatabaseExternalPluggableDatabase',
'Get-OCIDatabaseExternalPluggableDatabasesList',
'Get-OCIDatabaseFlexComponentsList',
'Get-OCIDatabaseGiVersionsList',
'Get-OCIDatabaseInfrastructureTargetVersions',
'Get-OCIDatabaseKeyStore', 'Get-OCIDatabaseKeyStoresList',
'Get-OCIDatabaseMaintenanceRun',
'Get-OCIDatabaseMaintenanceRunHistory',
'Get-OCIDatabaseMaintenanceRunHistoryList',
'Get-OCIDatabaseMaintenanceRunsList', 'Get-OCIDatabaseOneoffPatch',
'Get-OCIDatabaseOneoffPatchesList',
'Get-OCIDatabasePdbConversionHistoryEntriesList',
'Get-OCIDatabasePdbConversionHistoryEntry',
'Get-OCIDatabasePluggableDatabase',
'Get-OCIDatabasePluggableDatabasesList', 'Get-OCIDatabasesList',
'Get-OCIDatabaseSoftwareImage', 'Get-OCIDatabaseSoftwareImagesList',
'Get-OCIDatabaseSystemVersionsList',
'Get-OCIDatabaseUpgradeHistoryEntriesList',
'Get-OCIDatabaseUpgradeHistoryEntry', 'Get-OCIDatabaseVmCluster',
'Get-OCIDatabaseVmClusterNetwork',
'Get-OCIDatabaseVmClusterNetworksList',
'Get-OCIDatabaseVmClusterPatch',
'Get-OCIDatabaseVmClusterPatchesList',
'Get-OCIDatabaseVmClusterPatchHistoryEntriesList',
'Get-OCIDatabaseVmClusterPatchHistoryEntry',
'Get-OCIDatabaseVmClustersList', 'Get-OCIDatabaseVmClusterUpdate',
'Get-OCIDatabaseVmClusterUpdateHistoryEntriesList',
'Get-OCIDatabaseVmClusterUpdateHistoryEntry',
'Get-OCIDatabaseVmClusterUpdatesList',
'Invoke-OCIDatabaseAutonomousDatabaseManualRefresh',
'Invoke-OCIDatabaseCheckExternalDatabaseConnectorConnectionStatus',
'Invoke-OCIDatabaseConfigureAutonomousDatabaseVaultKey',
'Invoke-OCIDatabaseConfigureSaasAdminUser',
'Invoke-OCIDatabaseConvertToPdb',
'Invoke-OCIDatabaseConvertToRegularPluggableDatabase',
'Invoke-OCIDatabaseDbNodeAction',
'Invoke-OCIDatabaseDownloadExadataInfrastructureConfigFile',
'Invoke-OCIDatabaseDownloadOneoffPatch',
'Invoke-OCIDatabaseDownloadValidationReport',
'Invoke-OCIDatabaseDownloadVmClusterNetworkConfigFile',
'Invoke-OCIDatabaseFailoverAutonomousContainerDatabaseDataguardAssociation',
'Invoke-OCIDatabaseFailOverAutonomousDatabase',
'Invoke-OCIDatabaseFailoverDataGuardAssociation',
'Invoke-OCIDatabaseLaunchAutonomousExadataInfrastructure',
'Invoke-OCIDatabaseLocalClonePluggableDatabase',
'Invoke-OCIDatabaseMigrateExadataDbSystemResourceModel',
'Invoke-OCIDatabaseMigrateVaultKey',
'Invoke-OCIDatabaseRefreshPluggableDatabase',
'Invoke-OCIDatabaseReinstateAutonomousContainerDatabaseDataguardAssociation',
'Invoke-OCIDatabaseReinstateDataGuardAssociation',
'Invoke-OCIDatabaseRemoteClonePluggableDatabase',
'Invoke-OCIDatabaseResizeVmClusterNetwork',
'Invoke-OCIDatabaseResourcePoolShapes',
'Invoke-OCIDatabaseRotateAutonomousContainerDatabaseEncryptionKey',
'Invoke-OCIDatabaseRotateAutonomousDatabaseEncryptionKey',
'Invoke-OCIDatabaseRotateAutonomousVmClusterOrdsCerts',
'Invoke-OCIDatabaseRotateAutonomousVmClusterSslCerts',
'Invoke-OCIDatabaseRotateCloudAutonomousVmClusterOrdsCerts',
'Invoke-OCIDatabaseRotateCloudAutonomousVmClusterSslCerts',
'Invoke-OCIDatabaseRotateOrdsCerts',
'Invoke-OCIDatabaseRotatePluggableDatabaseEncryptionKey',
'Invoke-OCIDatabaseRotateSslCerts',
'Invoke-OCIDatabaseRotateVaultKey',
'Invoke-OCIDatabaseSaasAdminUserStatus',
'Invoke-OCIDatabaseScanExternalContainerDatabasePluggableDatabases',
'Invoke-OCIDatabaseShrinkAutonomousDatabase',
'Invoke-OCIDatabaseSwitchoverAutonomousContainerDatabaseDataguardAssociation',
'Invoke-OCIDatabaseSwitchoverAutonomousDatabase',
'Invoke-OCIDatabaseSwitchoverDataGuardAssociation',
'Invoke-OCIDatabaseTerminateAutonomousContainerDatabase',
'Invoke-OCIDatabaseTerminateAutonomousExadataInfrastructure',
'Invoke-OCIDatabaseTerminateDbSystem',
'Invoke-OCIDatabaseUpgradeDatabase',
'Invoke-OCIDatabaseUpgradeDbSystem',
'Move-OCIDatabaseAutonomousContainerDatabaseCompartment',
'Move-OCIDatabaseAutonomousDatabaseCompartment',
'Move-OCIDatabaseAutonomousDatabaseSoftwareImageCompartment',
'Move-OCIDatabaseAutonomousExadataInfrastructureCompartment',
'Move-OCIDatabaseAutonomousVmClusterCompartment',
'Move-OCIDatabaseBackupDestinationCompartment',
'Move-OCIDatabaseCloudAutonomousVmClusterCompartment',
'Move-OCIDatabaseCloudExadataInfrastructureCompartment',
'Move-OCIDatabaseCloudVmClusterCompartment',
'Move-OCIDatabaseDataguardRole',
'Move-OCIDatabaseDbSystemCompartment',
'Move-OCIDatabaseDisasterRecoveryConfiguration',
'Move-OCIDatabaseExadataInfrastructureCompartment',
'Move-OCIDatabaseExternalContainerDatabaseCompartment',
'Move-OCIDatabaseExternalNonContainerDatabaseCompartment',
'Move-OCIDatabaseExternalPluggableDatabaseCompartment',
'Move-OCIDatabaseKeyStoreCompartment',
'Move-OCIDatabaseKeyStoreType',
'Move-OCIDatabaseOneoffPatchCompartment',
'Move-OCIDatabaseSoftwareImageCompartment',
'Move-OCIDatabaseVmClusterCompartment', 'New-OCIDatabase',
'New-OCIDatabaseApplicationVip',
'New-OCIDatabaseAutonomousContainerDatabase',
'New-OCIDatabaseAutonomousContainerDatabaseDataguardAssociation',
'New-OCIDatabaseAutonomousDatabase',
'New-OCIDatabaseAutonomousDatabaseBackup',
'New-OCIDatabaseAutonomousDatabaseSoftwareImage',
'New-OCIDatabaseAutonomousDatabaseWallet',
'New-OCIDatabaseAutonomousVmCluster', 'New-OCIDatabaseBackup',
'New-OCIDatabaseBackupDestination',
'New-OCIDatabaseCloudAutonomousVmCluster',
'New-OCIDatabaseCloudExadataInfrastructure',
'New-OCIDatabaseCloudVmCluster', 'New-OCIDatabaseConsoleConnection',
'New-OCIDatabaseConsoleHistory',
'New-OCIDatabaseDataGuardAssociation', 'New-OCIDatabaseDbHome',
'New-OCIDatabaseDbSystem', 'New-OCIDatabaseExadataInfrastructure',
'New-OCIDatabaseExternalBackupJob',
'New-OCIDatabaseExternalContainerDatabase',
'New-OCIDatabaseExternalDatabaseConnector',
'New-OCIDatabaseExternalNonContainerDatabase',
'New-OCIDatabaseExternalPluggableDatabase',
'New-OCIDatabaseKeyStore', 'New-OCIDatabaseMaintenanceRun',
'New-OCIDatabaseOneoffPatch', 'New-OCIDatabasePluggableDatabase',
'New-OCIDatabaseRecommendedVmClusterNetwork',
'New-OCIDatabaseSoftwareImage', 'New-OCIDatabaseVmCluster',
'New-OCIDatabaseVmClusterNetwork',
'Register-OCIDatabaseAutonomousDatabaseDataSafe',
'Remove-OCIDatabase', 'Remove-OCIDatabaseApplicationVip',
'Remove-OCIDatabaseAutonomousDatabase',
'Remove-OCIDatabaseAutonomousDatabaseBackup',
'Remove-OCIDatabaseAutonomousDatabaseSoftwareImage',
'Remove-OCIDatabaseAutonomousVmCluster', 'Remove-OCIDatabaseBackup',
'Remove-OCIDatabaseBackupDestination',
'Remove-OCIDatabaseCloudAutonomousVmCluster',
'Remove-OCIDatabaseCloudExadataInfrastructure',
'Remove-OCIDatabaseCloudVmCluster',
'Remove-OCIDatabaseConsoleConnection',
'Remove-OCIDatabaseConsoleHistory', 'Remove-OCIDatabaseDbHome',
'Remove-OCIDatabaseExadataInfrastructure',
'Remove-OCIDatabaseExternalContainerDatabase',
'Remove-OCIDatabaseExternalDatabaseConnector',
'Remove-OCIDatabaseExternalNonContainerDatabase',
'Remove-OCIDatabaseExternalPluggableDatabase',
'Remove-OCIDatabaseKeyStore', 'Remove-OCIDatabaseOneoffPatch',
'Remove-OCIDatabasePluggableDatabase',
'Remove-OCIDatabaseSoftwareImage',
'Remove-OCIDatabaseVirtualMachineFromCloudVmCluster',
'Remove-OCIDatabaseVirtualMachineFromVmCluster',
'Remove-OCIDatabaseVmCluster', 'Remove-OCIDatabaseVmClusterNetwork',
'Restart-OCIDatabaseAutonomousContainerDatabase',
'Restart-OCIDatabaseAutonomousDatabase', 'Restore-OCIDatabase',
'Restore-OCIDatabaseAutonomousDatabase',
'Start-OCIDatabaseAutonomousDatabase',
'Start-OCIDatabasePluggableDatabase',
'Stop-OCIDatabaseAutonomousDatabase', 'Stop-OCIDatabaseBackup',
'Stop-OCIDatabasePluggableDatabase',
'Unregister-OCIDatabaseAutonomousDatabaseDataSafe',
'Update-OCIDatabase',
'Update-OCIDatabaseAutonomousContainerDatabase',
'Update-OCIDatabaseAutonomousContainerDatabaseDataguardAssociation',
'Update-OCIDatabaseAutonomousDatabase',
'Update-OCIDatabaseAutonomousDatabaseBackup',
'Update-OCIDatabaseAutonomousDatabaseRegionalWallet',
'Update-OCIDatabaseAutonomousDatabaseSoftwareImage',
'Update-OCIDatabaseAutonomousDatabaseWallet',
'Update-OCIDatabaseAutonomousExadataInfrastructure',
'Update-OCIDatabaseAutonomousVmCluster',
'Update-OCIDatabaseBackupDestination',
'Update-OCIDatabaseCloudAutonomousVmCluster',
'Update-OCIDatabaseCloudExadataInfrastructure',
'Update-OCIDatabaseCloudVmCluster',
'Update-OCIDatabaseCloudVmClusterIormConfig',
'Update-OCIDatabaseConsoleConnection',
'Update-OCIDatabaseConsoleHistory',
'Update-OCIDatabaseDataGuardAssociation',
'Update-OCIDatabaseDbHome', 'Update-OCIDatabaseDbNode',
'Update-OCIDatabaseDbSystem',
'Update-OCIDatabaseExadataInfrastructure',
'Update-OCIDatabaseExadataIormConfig',
'Update-OCIDatabaseExternalContainerDatabase',
'Update-OCIDatabaseExternalDatabaseConnector',
'Update-OCIDatabaseExternalNonContainerDatabase',
'Update-OCIDatabaseExternalPluggableDatabase',
'Update-OCIDatabaseKeyStore', 'Update-OCIDatabaseMaintenanceRun',
'Update-OCIDatabaseOneoffPatch',
'Update-OCIDatabasePluggableDatabase',
'Update-OCIDatabaseSoftwareImage', 'Update-OCIDatabaseVmCluster',
'Update-OCIDatabaseVmClusterNetwork'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Database'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_27_48.ps1
|
sample_27_48.ps1
|
#
# Module manifest for module 'OCI.PSModules.Usage'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Usage.dll'
# Version number of this module.
ModuleVersion = '83.2.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '9ad21498-2007-42f7-9492-bacc9b5b532f'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Usage Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.2.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Usage.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIUsageLimitsList', 'Get-OCIUsageProductsList',
'Get-OCIUsageRedeemableUsersList', 'Get-OCIUsageRedemptionsList',
'Get-OCIUsageResourceQuotaList', 'Get-OCIUsageResourcesList',
'Get-OCIUsageRewardsList', 'New-OCIUsageRedeemableUser',
'Remove-OCIUsageRedeemableUser'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Usage'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_48_38.ps1
|
sample_48_38.ps1
|
#!/usr/bin/env pwsh
$basedir=Split-Path $MyInvocation.MyCommand.Definition -Parent
$exe=""
$pathsep=":"
$env_node_path=$env:NODE_PATH
$new_node_path="C:\practice\demo\quick-reference\node_modules\.pnpm\node_modules"
if ($PSVersionTable.PSVersion -lt "6.0" -or $IsWindows) {
# Fix case when both the Windows and Linux builds of Node
# are installed in the same directory
$exe=".exe"
$pathsep=";"
} else {
$new_node_path="/mnt/c/practice/demo/quick-reference/node_modules/.pnpm/node_modules"
}
if ([string]::IsNullOrEmpty($env_node_path)) {
$env:NODE_PATH=$new_node_path
} else {
$env:NODE_PATH="$env_node_path$pathsep$new_node_path"
}
$ret=0
if (Test-Path "$basedir/node$exe") {
# Support pipeline input
if ($MyInvocation.ExpectingInput) {
$input | & "$basedir/node$exe" "$basedir/../../../../node_modules/.pnpm/prettier@3.2.5/node_modules/prettier/bin/prettier.cjs" $args
} else {
& "$basedir/node$exe" "$basedir/../../../../node_modules/.pnpm/prettier@3.2.5/node_modules/prettier/bin/prettier.cjs" $args
}
$ret=$LASTEXITCODE
} else {
# Support pipeline input
if ($MyInvocation.ExpectingInput) {
$input | & "node$exe" "$basedir/../../../../node_modules/.pnpm/prettier@3.2.5/node_modules/prettier/bin/prettier.cjs" $args
} else {
& "node$exe" "$basedir/../../../../node_modules/.pnpm/prettier@3.2.5/node_modules/prettier/bin/prettier.cjs" $args
}
$ret=$LASTEXITCODE
}
$env:NODE_PATH=$env_node_path
exit $ret
|
combined_dataset/train/non-malicious/2519.ps1
|
2519.ps1
|
$MissingIndexesQuery =
"sel_SQLIndexesMissingByDatabase"
function Run-Query()
{
param (
$SqlQuery,
$SqlServer,
$SqlCatalog
)
$SqlConnection = New-Object System.Data.SqlClient.SqlConnection("Data Source=$SqlServer;Integrated Security=SSPI;Initial Catalog=$SqlCatalog;");
$SqlCmd = New-Object System.Data.SqlClient.SqlCommand
$sqlCmd.CommandTimeout = "300"
$SqlCmd.CommandText = $SqlQuery
$SqlCmd.Connection = $SqlConnection
$SqlAdapter = New-Object System.Data.SqlClient.SqlDataAdapter
$SqlAdapter.SelectCommand = $SqlCmd
$DataSet = New-Object System.Data.DataSet
$a = $SqlAdapter.Fill($DataSet)
$SqlConnection.Close()
$DataSet.Tables | Select-Object -ExpandProperty Rows
}
$indexes = Run-Query -SqlQuery $MissingIndexesQuery -SqlServer XSQLUTIL18 -SqlCatalog Status
$SpreadSheet = ("E:\Dexma\logs\IndexesMissing-" + (Get-Date -Format ddMMyyyy) + ".xlsx")
$TempCSV = ($env:TEMP + "\" + ([System.GUID]::NewGuid()).ToString() + ".csv")
$indexes | Export-Csv -Path $TempCSV -NoTypeInformation
if (Test-Path -Path $SpreadSheet) { Remove-Item -Path $SpreadSheet }
$erroractionpreference = "SilentlyContinue"
$OutBook = New-Object -comobject Excel.Application
$OutBook.visible = $False
$Workbook = $OutBook.Workbooks.Open($TempCSV)
$Workbook.Title = ("Missing Indexes reported by SQL Server DMVs" + (Get-Date -Format D))
$Workbook.Author = "Michael J. Messano"
$Worksheet = $Workbook.Worksheets.Item(1)
$LastColumn = ($worksheet.UsedRange.Columns.Count + 1 )
for ( $i = 1; $i -lt $LastColumn; $i++) {
$Worksheet.Cells.item(1,$i).Interior.ColorIndex = 15
$Worksheet.Cells.item(1,$i).Font.ColorIndex = 5
$Worksheet.Cells.item(1,$i).Font.Bold = $True
if ($i -gt 2) {
$Worksheet.Cells.item(1,$i).Orientation = 90
}
}
$Worksheet.UsedRange.EntireColumn.Autofit() | Out-Null
$Worksheet.Name = "Missing Indexes"
$List = $Worksheet.ListObjects.Add([Microsoft.Office.Interop.Excel.XlListObjectSourceType]::xlSrcRange, $Worksheet.UsedRange, $null, [Microsoft.Office.Interop.Excel.X1YesNoGuess]::xlYes, $null)
$List.Name = "Item Table"
$LastRow = ($worksheet.UsedRange.Rows.Count + 1)
for ( $i = 2; $i -lt $LastRow; $i++) {
$Worksheet.Cells.item($i,3) = "=SUM(RC[1]" + ':' + "RC[" + ($worksheet.UsedRange.Columns.Count - 3) + "])"
}
$order = [Microsoft.Office.Interop.Excel.XlSortOrder]::xlDescending
$xlDescending = 2
$hasHead = [Microsoft.Office.Interop.Excel.XlYesNoGuess]::xlYes
$range = $worksheet.UsedRange
$sortcolumn = $worksheet.Columns.Item(3)
$range.Sort($sortcolumn, $xlDescending)
$Workbook.SaveAs($SpreadSheet, 51)
$Workbook.Saved = $true
$Workbook.Close()
[System.Runtime.InteropServices.Marshal]::ReleaseComObject($Workbook) | Out-Null
$SpreadSheet.Quit()
[System.Runtime.InteropServices.Marshal]::ReleaseComObject($SpreadSheet) | Out-Null
[System.GC]::Collect()
[System.GC]::WaitForPendingFinalizers()
if (Test-Path -Path $TempCSV) { Remove-Item -Path $TempCSV }
|
combined_dataset/train/non-malicious/2205.ps1
|
2205.ps1
|
[CmdletBinding(SupportsShouldProcess=$true)]
param(
[parameter(Mandatory=$true, HelpMessage="Site server where the SMS Provider is installed")]
[ValidateScript({Test-Connection -ComputerName $_ -Count 1 -Quiet})]
[ValidateNotNullOrEmpty()]
[string]$SiteServer,
[parameter(Mandatory=$true, HelpMessage="Name of the collection to be used as limiting collection for all maintenance collections")]
[ValidateNotNullOrEmpty()]
[string]$LimitingCollectionName,
[parameter(Mandatory=$false, HelpMessage="Name of a Device Collections folder where the collections will be created. If not specified, the collections will be created in the root of Device Collections")]
[ValidateNotNullOrEmpty()]
[string]$FolderName
)
Begin {
try {
Write-Verbose "Determining SiteCode for Site Server: '$($SiteServer)'"
$SiteCodeObjects = Get-WmiObject -Namespace "root\SMS" -Class SMS_ProviderLocation -ComputerName $SiteServer -ErrorAction Stop
foreach ($SiteCodeObject in $SiteCodeObjects) {
if ($SiteCodeObject.ProviderForLocalSite -eq $true) {
$SiteCode = $SiteCodeObject.SiteCode
Write-Debug "SiteCode: $($SiteCode)"
}
}
}
catch [Exception] {
Write-Warning -Message "Unable to determine SiteCode" ; break
}
if (-not(Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_Collection -ComputerName $SiteServer -Filter "Name like '$($LimitingCollectionName)'")) {
Write-Warning -Message "Unable to determine the existence of a collection named '$($LimitingCollectionName)'" ; break
}
}
Process {
function New-ScheduleToken {
param(
[parameter(Mandatory=$false)]
[int]$DayDuration = 0,
[parameter(Mandatory=$false)]
[int]$DaySpan = 0,
[parameter(Mandatory=$false)]
[int]$HourDuration = 0,
[parameter(Mandatory=$false)]
[int]$HourSpan = 0,
[parameter(Mandatory=$false)]
[bool]$IsGMT = $false,
[parameter(Mandatory=$false)]
[int]$MinuteDuration = 0,
[parameter(Mandatory=$false)]
[int]$MinuteSpan = 0,
[parameter(Mandatory=$true)]
[int]$StartTimeHour = 0,
[parameter(Mandatory=$true)]
[int]$StartTimeMin = 0,
[parameter(Mandatory=$true)]
[int]$StartTimeSec = 0
)
$StartTime = [System.Management.ManagementDateTimeconverter]::ToDMTFDateTime((Get-Date -Hour $StartTimeHour -Minute $StartTimeMin -Second $StartTimeSec))
$ScheduleToken = ([WMIClass]"\\$($SiteServer)\root\SMS\Site_$($SiteCode):SMS_ST_RecurInterval").CreateInstance()
$ScheduleToken.DayDuration = $DayDuration
$ScheduleToken.DaySpan = $DaySpan
$ScheduleToken.HourDuration = $HourDuration
$ScheduleToken.HourSpan = $HourSpan
$ScheduleToken.IsGMT = $IsGMT
$ScheduleToken.MinuteDuration = $MinuteDuration
$ScheduleToken.MinuteSpan = $MinuteSpan
$ScheduleToken.StartTime = $StartTime
return $ScheduleToken
}
function Get-LimitingCollectionID {
param(
[parameter(Mandatory=$true)]
[string]$LimitingCollection
)
$LimitingCollectionID = Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_Collection -ComputerName $SiteServer -Filter "Name like '$($LimitingCollectionName)'" | Select-Object -ExpandProperty CollectionID
return $LimitingCollectionID
}
function Create-Collection {
param(
[parameter(Mandatory=$true)]
[string]$CollectionName,
[parameter(Mandatory=$true)]
[string]$CollectionQuery,
[parameter(Mandatory=$true)]
[string]$QueryRuleName
)
$ValidateQuery = Invoke-WmiMethod -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_CollectionRuleQuery -Name ValidateQuery -ArgumentList $CollectionQuery -ComputerName $SiteServer
if ($ValidateQuery) {
$NewRule = ([WMIClass]"\\$($SiteServer)\root\SMS\Site_$($SiteCode):SMS_CollectionRuleQuery").CreateInstance()
$NewRule.QueryExpression = $CollectionQuery
$NewRule.RuleName = $QueryRuleName
Write-Verbose -Message "Creating collection: $($CollectionName)"
$NewDeviceCollection = ([WmiClass]"\\$($SiteServer)\root\SMS\Site_$($SiteCode):SMS_Collection").CreateInstance()
$NewDeviceCollection.Name = $CollectionName
$NewDeviceCollection.OwnedByThisSite = $true
$NewDeviceCollection.CollectionRules += $NewRule
$NewDeviceCollection.LimitToCollectionID = (Get-LimitingCollectionID -LimitingCollection $LimitingCollectionName)
$NewDeviceCollection.RefreshSchedule = (New-ScheduleToken -HourSpan 12 -StartTimeHour 7 -StartTimeMin 0 -StartTimeSec 0)
$NewDeviceCollection.RefreshType = 2
$NewDeviceCollection.CollectionType = 2
$NewDeviceCollection.Put() | Out-Null
if ((Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_Collection -ComputerName $SiteServer -Filter "Name like '$($CollectionName)'" | Measure-Object).Count -eq 1) {
Write-Verbose -Message "Successfully created collection '$($CollectionName)'"
}
else {
Write-Warning -Message "Unable to create collection '$($CollectionName)'"
}
if ($Script:PSBoundParameters["FolderName"]) {
$CollectionID = Get-WmiObject -Namespace "root\SMS\Site_$($SiteCode)" -Class SMS_Collection -ComputerName $SiteServer -Filter "Name like '$($CollectionName)' AND CollectionType = 2" | Select-Object -ExpandProperty CollectionID
[int]$TargetFolder = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_ObjectContainerNode -ComputerName $SiteServer -Filter "ObjectType = 5000 AND Name like '$($FolderName)'" | Select-Object -ExpandProperty ContainerNodeID
[int]$SourceFolder = Get-WmiObject -Namespace "root\SMS\site_$($SiteCode)" -Class SMS_ObjectContainerItem -ComputerName $SiteServer -Filter "InstanceKey like '$($CollectionID)'" | Select-Object -ExpandProperty ContainerNodeID
$Parameters = ([WmiClass]"\\$($SiteServer)\root\SMS\Site_$($SiteCode):SMS_ObjectContainerItem").GetMethodParameters("MoveMembers")
$Parameters.ObjectType = 5000
$Parameters.ContainerNodeID = $SourceFolder
$Parameters.TargetContainerNodeID = $TargetFolder
$Parameters.InstanceKeys = $CollectionID
$MoveCollectionToFolder = ([WmiClass]"\\$($SiteServer)\root\SMS\Site_$($SiteCode):SMS_ObjectContainerItem").InvokeMethod("MoveMembers", $Parameters, $null)
if ($MoveCollectionToFolder.ReturnValue -eq 0) {
Write-Verbose -Message "Successfully moved collection '$($CollectionName)' to the '$($FolderName)' folder"
}
}
$NewDeviceCollection.RequestRefresh() | Out-Null
}
}
$CollectionsTable = @{
"ConfigMgr 2012 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7711.0000"'
"ConfigMgr 2012 CU1 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7711.0200"'
"ConfigMgr 2012 CU2 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7711.0301"'
"ConfigMgr 2012 SP1 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7804.1000"'
"ConfigMgr 2012 SP1 CU1 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7804.1202"'
"ConfigMgr 2012 SP1 CU2 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7804.1300"'
"ConfigMgr 2012 SP1 CU3 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7804.1400"'
"ConfigMgr 2012 SP1 CU4 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7804.1500"'
"ConfigMgr 2012 SP1 CU5 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7804.1600"'
"ConfigMgr 2012 R2 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7958.1000"'
"ConfigMgr 2012 R2 KB2905002 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7958.1101"'
"ConfigMgr 2012 R2 CU1 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7958.1203"'
"ConfigMgr 2012 R2 CU2 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7958.1303"'
"ConfigMgr 2012 R2 CU3 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7958.1401"'
"ConfigMgr 2012 R2 CU4 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7958.1501"'
"ConfigMgr 2012 R2 CU5 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.7958.1604"'
"ConfigMgr 2012 R2 SP1 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.8239.1000"'
"ConfigMgr 2012 R2 SP1 CU1 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.8239.1203"'
"ConfigMgr 2012 R2 SP1 CU2 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.8239.1301"'
"ConfigMgr 2012 R2 SP1 CU3 Clients" = 'select SMS_R_System.ResourceId, SMS_R_System.ResourceType, SMS_R_System.Name, SMS_R_System.SMSUniqueIdentifier, SMS_R_System.ResourceDomainORWorkgroup, SMS_R_System.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.8239.1403"'
"ConfigMgr 1511 Clients" = 'select SMS_R_SYSTEM.ResourceID,SMS_R_SYSTEM.ResourceType,SMS_R_SYSTEM.Name,SMS_R_SYSTEM.SMSUniqueIdentifier,SMS_R_SYSTEM.ResourceDomainORWorkgroup,SMS_R_SYSTEM.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.8325.1000"'
"ConfigMgr 1602 Clients" = 'select SMS_R_SYSTEM.ResourceID,SMS_R_SYSTEM.ResourceType,SMS_R_SYSTEM.Name,SMS_R_SYSTEM.SMSUniqueIdentifier,SMS_R_SYSTEM.ResourceDomainORWorkgroup,SMS_R_SYSTEM.Client from SMS_R_System where SMS_R_System.Client is not null and SMS_R_System.ClientVersion = "5.00.8355.1000"'
}
foreach ($Collection in $CollectionsTable.Keys) {
Create-Collection -CollectionName $Collection -CollectionQuery $CollectionsTable["$Collection"] -QueryRuleName $Collection
}
}
|
combined_dataset/train/non-malicious/1291.ps1
|
1291.ps1
|
function Get-CPermission
{
[CmdletBinding()]
[OutputType([System.Security.AccessControl.AccessRule])]
param(
[Parameter(Mandatory=$true)]
[string]
$Path,
[string]
$Identity,
[Switch]
$Inherited
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
$account = $null
if( $Identity )
{
$account = Test-CIdentity -Name $Identity -PassThru
if( $account )
{
$Identity = $account.FullName
}
}
if( -not (Test-Path -Path $Path) )
{
Write-Error ('Path ''{0}'' not found.' -f $Path)
return
}
Invoke-Command -ScriptBlock {
Get-Item -Path $Path -Force |
ForEach-Object {
if( $_.PSProvider.Name -eq 'Certificate' )
{
if( $_.HasPrivateKey -and $_.PrivateKey )
{
$_.PrivateKey.CspKeyContainerInfo.CryptoKeySecurity
}
}
else
{
$_.GetAccessControl([Security.AccessControl.AccessControlSections]::Access)
}
}
} |
Select-Object -ExpandProperty Access |
Where-Object {
if( $Inherited )
{
return $true
}
return (-not $_.IsInherited)
} |
Where-Object {
if( $Identity )
{
return ($_.IdentityReference.Value -eq $Identity)
}
return $true
}
}
Set-Alias -Name 'Get-Permissions' -Value 'Get-CPermission'
|
combined_dataset/train/non-malicious/Add new smtp_set prmary_2.ps1
|
Add new smtp_set prmary_2.ps1
|
#alias,addnewemailaddress
import-csv .\\source.csv | foreach {
$user = Get-Mailbox $_.alias
$user.emailAddresses+= $_.addnewemailaddress
$user.primarysmtpaddress = $_.addnewemailaddress
Set-Mailbox $user -emailAddresses $user.emailAddresses
set-Mailbox $user -PrimarySmtpAddress $user.primarysmtpaddress
}
|
combined_dataset/train/non-malicious/sample_40_88.ps1
|
sample_40_88.ps1
|
/* -----------------------------------------------------------------------
Copyright (c) Microsoft Corporation. All rights reserved.
----------------------------------------------------------------------- */
let pluginUrl = window.chrome.webview.hostObjects.sync.external.GetPluginUrl();
let scripts = [pluginUrl, "scripts/redux.js", "scripts/funcMap.js", "scripts/resources.js"];
let currentScriptElement = document.querySelector("script[src='scripts/plugin.js']");
if (currentScriptElement !== null) {
scripts.forEach(element => {
let newScriptElement = document.createElement("script");
newScriptElement.setAttribute("src", element);
newScriptElement.setAttribute("type", "text/javascript");
newScriptElement.async = false;
currentScriptElement.parentNode.insertBefore(newScriptElement, currentScriptElement.nextSibling);
currentScriptElement = newScriptElement;
});
}
// SIG // Begin signature block
// SIG // MIInzAYJKoZIhvcNAQcCoIInvTCCJ7kCAQExDzANBglg
// SIG // hkgBZQMEAgEFADB3BgorBgEEAYI3AgEEoGkwZzAyBgor
// SIG // BgEEAYI3AgEeMCQCAQEEEBDgyQbOONQRoqMAEEvTUJAC
// SIG // AQACAQACAQACAQACAQAwMTANBglghkgBZQMEAgEFAAQg
// SIG // 8AmDEstmvB46D02UrAEnWnsGP0ACic8C1MnCqO/b/Eeg
// SIG // gg2FMIIGAzCCA+ugAwIBAgITMwAAA64tNVHIU49VHQAA
// SIG // AAADrjANBgkqhkiG9w0BAQsFADB+MQswCQYDVQQGEwJV
// SIG // UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
// SIG // UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
// SIG // cmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBT
// SIG // aWduaW5nIFBDQSAyMDExMB4XDTIzMTExNjE5MDg1OVoX
// SIG // DTI0MTExNDE5MDg1OVowdDELMAkGA1UEBhMCVVMxEzAR
// SIG // BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1v
// SIG // bmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
// SIG // bjEeMBwGA1UEAxMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
// SIG // MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
// SIG // 9CD8pjY3wxCoPmMhOkow7ycCltfqYnqk4wGNApzh2dTY
// SIG // +YqxozWTzJUOB38VxsgFQmXBFhOMdrGYGpvO9kdbNPkw
// SIG // HpTrW6hZqFuLLiRwGKEx4ZM5zVSqbHJuX2fPfUJ0Xmb+
// SIG // VrVsGw/BwBV2zz0rVtiSgqj3GeeGOsG7llfWyrSjyJqm
// SIG // 5DHE3o04BAI/NuhkHOv04euiqJGvHFCL8+fXvyD9OAxq
// SIG // 4fcJKtoyBb0PBA3oMNQeCsiUyLO+voZqVTOUsAWY0bN5
// SIG // YjkK4nq5DVaNdVrrowd5AX9gmz6D/TJTssns6pDCG00Y
// SIG // +Dh3ipWpnVmkhYcByyUSEKX3PLC8DkiAQQIDAQABo4IB
// SIG // gjCCAX4wHwYDVR0lBBgwFgYKKwYBBAGCN0wIAQYIKwYB
// SIG // BQUHAwMwHQYDVR0OBBYEFIcf73Spl4cHOFoll27H9COd
// SIG // 4fE/MFQGA1UdEQRNMEukSTBHMS0wKwYDVQQLEyRNaWNy
// SIG // b3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQx
// SIG // FjAUBgNVBAUTDTIzMDAxMis1MDE4MzYwHwYDVR0jBBgw
// SIG // FoAUSG5k5VAF04KqFzc3IrVtqMp1ApUwVAYDVR0fBE0w
// SIG // SzBJoEegRYZDaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
// SIG // L3BraW9wcy9jcmwvTWljQ29kU2lnUENBMjAxMV8yMDEx
// SIG // LTA3LTA4LmNybDBhBggrBgEFBQcBAQRVMFMwUQYIKwYB
// SIG // BQUHMAKGRWh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w
// SIG // a2lvcHMvY2VydHMvTWljQ29kU2lnUENBMjAxMV8yMDEx
// SIG // LTA3LTA4LmNydDAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3
// SIG // DQEBCwUAA4ICAQBqyWA1Eu7PKNMjaaxl0V7gJ0XBysUo
// SIG // xZluMHJXFE2LEGZIZ2zMLYVjOnAGG/4dluRjSrZZo/8v
// SIG // wk4Xt8v6NBB9ofo8H1P/XidHytWTv9lg9MYu++6lPmu5
// SIG // fCozD3cI2NLZPW2BBhGX2D0R8tQBj0FbmZRuIucpiQ7D
// SIG // K3CHKlfKcc7MP8pPzuMv55Tox8+KFQD1NG6+bfbYA/BN
// SIG // PBkg4tyOh+exbaHfcNuodDJUIjq9dF6oa+Yjy0u0pUMI
// SIG // /B1t+8m6rJo0KSoZlrpesYl0jRhpt+hmqx8uENXoGJcY
// SIG // ZVJ5N2Skq90LViKNRhi9N4U+e8c4y9uXyomUF/6viCPJ
// SIG // 7huTNEJo75ehIJba+IWd3txUEc0R3y6DT6txC6cW1nR/
// SIG // LTbo9I/8fQq538G5IvJ+e5iSiOSVVkVk0i5m03Awy5E2
// SIG // ZSS4PVdQSCcFxmN4tpEfYuR7AAy/GJVtIDFlUpSgdXok
// SIG // pSui5hYtK1R9enXXvo+U/xGkLRc+qp4De3dZbzu7pOq7
// SIG // V/jCyhuCw0bEIAU4urCGIip7TI6GBRzD7yPzjFIqeZY7
// SIG // S4rVW5BRn2oEqpm8Su6yTIQvMIk8x2pwYNUa2339Z4gW
// SIG // 5xW21eFA5mLpo7NRSKRQms5OgAA18aCgqOU7Ds0h6q/Y
// SIG // B4BmEAtoTMl/TBiyKaMGAlEcdy+5FIhmzojMGjCCB3ow
// SIG // ggVioAMCAQICCmEOkNIAAAAAAAMwDQYJKoZIhvcNAQEL
// SIG // BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
// SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
// SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMT
// SIG // KU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhv
// SIG // cml0eSAyMDExMB4XDTExMDcwODIwNTkwOVoXDTI2MDcw
// SIG // ODIxMDkwOVowfjELMAkGA1UEBhMCVVMxEzARBgNVBAgT
// SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
// SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYG
// SIG // A1UEAxMfTWljcm9zb2Z0IENvZGUgU2lnbmluZyBQQ0Eg
// SIG // MjAxMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC
// SIG // ggIBAKvw+nIQHC6t2G6qghBNNLrytlghn0IbKmvpWlCq
// SIG // uAY4GgRJun/DDB7dN2vGEtgL8DjCmQawyDnVARQxQtOJ
// SIG // DXlkh36UYCRsr55JnOloXtLfm1OyCizDr9mpK656Ca/X
// SIG // llnKYBoF6WZ26DJSJhIv56sIUM+zRLdd2MQuA3WraPPL
// SIG // bfM6XKEW9Ea64DhkrG5kNXimoGMPLdNAk/jj3gcN1Vx5
// SIG // pUkp5w2+oBN3vpQ97/vjK1oQH01WKKJ6cuASOrdJXtjt
// SIG // 7UORg9l7snuGG9k+sYxd6IlPhBryoS9Z5JA7La4zWMW3
// SIG // Pv4y07MDPbGyr5I4ftKdgCz1TlaRITUlwzluZH9TupwP
// SIG // rRkjhMv0ugOGjfdf8NBSv4yUh7zAIXQlXxgotswnKDgl
// SIG // mDlKNs98sZKuHCOnqWbsYR9q4ShJnV+I4iVd0yFLPlLE
// SIG // tVc/JAPw0XpbL9Uj43BdD1FGd7P4AOG8rAKCX9vAFbO9
// SIG // G9RVS+c5oQ/pI0m8GLhEfEXkwcNyeuBy5yTfv0aZxe/C
// SIG // HFfbg43sTUkwp6uO3+xbn6/83bBm4sGXgXvt1u1L50kp
// SIG // pxMopqd9Z4DmimJ4X7IvhNdXnFy/dygo8e1twyiPLI9A
// SIG // N0/B4YVEicQJTMXUpUMvdJX3bvh4IFgsE11glZo+TzOE
// SIG // 2rCIF96eTvSWsLxGoGyY0uDWiIwLAgMBAAGjggHtMIIB
// SIG // 6TAQBgkrBgEEAYI3FQEEAwIBADAdBgNVHQ4EFgQUSG5k
// SIG // 5VAF04KqFzc3IrVtqMp1ApUwGQYJKwYBBAGCNxQCBAwe
// SIG // CgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB
// SIG // /wQFMAMBAf8wHwYDVR0jBBgwFoAUci06AjGQQ7kUBU7h
// SIG // 6qfHMdEjiTQwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDov
// SIG // L2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj
// SIG // dHMvTWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNy
// SIG // bDBeBggrBgEFBQcBAQRSMFAwTgYIKwYBBQUHMAKGQmh0
// SIG // dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMv
// SIG // TWljUm9vQ2VyQXV0MjAxMV8yMDExXzAzXzIyLmNydDCB
// SIG // nwYDVR0gBIGXMIGUMIGRBgkrBgEEAYI3LgMwgYMwPwYI
// SIG // KwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNv
// SIG // bS9wa2lvcHMvZG9jcy9wcmltYXJ5Y3BzLmh0bTBABggr
// SIG // BgEFBQcCAjA0HjIgHQBMAGUAZwBhAGwAXwBwAG8AbABp
// SIG // AGMAeQBfAHMAdABhAHQAZQBtAGUAbgB0AC4gHTANBgkq
// SIG // hkiG9w0BAQsFAAOCAgEAZ/KGpZjgVHkaLtPYdGcimwuW
// SIG // EeFjkplCln3SeQyQwWVfLiw++MNy0W2D/r4/6ArKO79H
// SIG // qaPzadtjvyI1pZddZYSQfYtGUFXYDJJ80hpLHPM8QotS
// SIG // 0LD9a+M+By4pm+Y9G6XUtR13lDni6WTJRD14eiPzE32m
// SIG // kHSDjfTLJgJGKsKKELukqQUMm+1o+mgulaAqPyprWElj
// SIG // HwlpblqYluSD9MCP80Yr3vw70L01724lruWvJ+3Q3fMO
// SIG // r5kol5hNDj0L8giJ1h/DMhji8MUtzluetEk5CsYKwsat
// SIG // ruWy2dsViFFFWDgycScaf7H0J/jeLDogaZiyWYlobm+n
// SIG // t3TDQAUGpgEqKD6CPxNNZgvAs0314Y9/HG8VfUWnduVA
// SIG // KmWjw11SYobDHWM2l4bf2vP48hahmifhzaWX0O5dY0Hj
// SIG // Wwechz4GdwbRBrF1HxS+YWG18NzGGwS+30HHDiju3mUv
// SIG // 7Jf2oVyW2ADWoUa9WfOXpQlLSBCZgB/QACnFsZulP0V3
// SIG // HjXG0qKin3p6IvpIlR+r+0cjgPWe+L9rt0uX4ut1eBrs
// SIG // 6jeZeRhL/9azI2h15q/6/IvrC4DqaTuv/DDtBEyO3991
// SIG // bWORPdGdVk5Pv4BXIqF4ETIheu9BCrE/+6jMpF3BoYib
// SIG // V3FWTkhFwELJm3ZbCoBIa/15n8G9bW1qyVJzEw16UM0x
// SIG // ghmfMIIZmwIBATCBlTB+MQswCQYDVQQGEwJVUzETMBEG
// SIG // A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
// SIG // ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
// SIG // MSgwJgYDVQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5n
// SIG // IFBDQSAyMDExAhMzAAADri01UchTj1UdAAAAAAOuMA0G
// SIG // CWCGSAFlAwQCAQUAoIGuMBkGCSqGSIb3DQEJAzEMBgor
// SIG // BgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEE
// SIG // AYI3AgEVMC8GCSqGSIb3DQEJBDEiBCBXYjEFBNAxYAuP
// SIG // E0/03D4QqNtJMbT0KkdlV/EhQrtlozBCBgorBgEEAYI3
// SIG // AgEMMTQwMqAUgBIATQBpAGMAcgBvAHMAbwBmAHShGoAY
// SIG // aHR0cDovL3d3dy5taWNyb3NvZnQuY29tMA0GCSqGSIb3
// SIG // DQEBAQUABIIBAKa8JOJlbGJmbzDXYNaNwIQ4inTleS8s
// SIG // i3kbOZ/jkzJKqUjaQpEhLVUvxOJ27PqIOa6wLyjb3MKj
// SIG // zEudmXYL3YRRJciqVXl37UTacLsBDvIb9Y01Q2cTpJW7
// SIG // kmN0PPKfdCdgeOIhvgiv4gunB1DdbARBvDQ0dc6dSN/r
// SIG // DDBmVjBxtg58ZWDTEgxG7p68lfd/wCpF/J+X79e43mhy
// SIG // JUkdSJOTOxeI14RC2Prys6vWFGThgRj5uaESEkDv6lHy
// SIG // fgBhLk4SvUnmuUlG+HGOH2jRwHo6ooCK1vuBOiGS7Jhu
// SIG // 5VnEgGvh+BvMhtUycncuYZo5SF9bBINee1sjavSo8XRq
// SIG // NhChghcpMIIXJQYKKwYBBAGCNwMDATGCFxUwghcRBgkq
// SIG // hkiG9w0BBwKgghcCMIIW/gIBAzEPMA0GCWCGSAFlAwQC
// SIG // AQUAMIIBWQYLKoZIhvcNAQkQAQSgggFIBIIBRDCCAUAC
// SIG // AQEGCisGAQQBhFkKAwEwMTANBglghkgBZQMEAgEFAAQg
// SIG // 5lCIF7x4SJq509TlODFD+DTWWnTlPjIi6NEt5Sy0hTUC
// SIG // BmYzqvfgSRgTMjAyNDA1MDgwNTEyMDUuMDY3WjAEgAIB
// SIG // 9KCB2KSB1TCB0jELMAkGA1UEBhMCVVMxEzARBgNVBAgT
// SIG // Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
// SIG // BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsG
// SIG // A1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9u
// SIG // cyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVT
// SIG // Tjo4NkRGLTRCQkMtOTMzNTElMCMGA1UEAxMcTWljcm9z
// SIG // b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEXgwggcnMIIF
// SIG // D6ADAgECAhMzAAAB3V1XHZXUraobAAEAAAHdMA0GCSqG
// SIG // SIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
// SIG // EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w
// SIG // HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAk
// SIG // BgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy
// SIG // MDEwMB4XDTIzMTAxMjE5MDcwOVoXDTI1MDExMDE5MDcw
// SIG // OVowgdIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
// SIG // aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
// SIG // ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT
// SIG // JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGlt
// SIG // aXRlZDEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046ODZE
// SIG // Ri00QkJDLTkzMzUxJTAjBgNVBAMTHE1pY3Jvc29mdCBU
// SIG // aW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
// SIG // AQUAA4ICDwAwggIKAoICAQCoTgOUROoud5x1ER+JZ3yi
// SIG // 6fvSb4qbk7XLWoqwsTFEqz0suQlitg7a4kD/k+dh12zd
// SIG // oOwJLUNaUGW0wxhcyundN72GDawj7iSvj0bD9hT1Q4wV
// SIG // 8uZqy0RcyBxy2ogGqGxObxSbqMWdGVnSjArPGnI4R1Jn
// SIG // 2mPu/fwke7jfgePsYyasL3aVP5qdJgKt3mq8h/gCpr+p
// SIG // ZK0DfM4K3GwoB8LKr76k+pRBamKYu7ip+zAGG0ni3tKT
// SIG // HWrVeRFujVZ1zGDk0Srhj38nwSnUobmpS6PPJBu6mtpm
// SIG // wOZe+/l9OiQHrDJKMmK+P/QoAxYx1KXB0jg7o5RQSjIt
// SIG // evM0XS3q3aVtGwV/RA7sdswTDGhCvDcsWsAhLgKu/vu5
// SIG // LRQG5d4VCrbs2AtRVGblJdgaulNe0uAirKkd4rS0/ajX
// SIG // G9qQCeI6yA3ZZeU4KKnn+YKb/mHLwTPN+G1xTcMrXd7o
// SIG // ww9uD/Q3fMX1Sb7po7AUEJCuU/6stx60CfLndZx0r7RV
// SIG // YuUmv7mxrmBKUvIBehg1jefym73hZHbKE1SD6PKZFoYz
// SIG // 7NEO5wOfrgcUAeM5YxIys+VluwQOMKZhZtuH4QZkY1eD
// SIG // W6fp+/HIAI7w0n05QOg2AXL9pMdSR9nSIWkZ0njl3j0+
// SIG // oTBdCJeffCzLtK8N+VYlFnAEJFDVE8UZ6hhcc+cPmbrD
// SIG // AwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFG6i9baMj1Ha
// SIG // Rcsh0gylo9COJcPxMB8GA1UdIwQYMBaAFJ+nFV0AXmJd
// SIG // g/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0
// SIG // dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3Js
// SIG // L01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAy
// SIG // MDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYB
// SIG // BQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w
// SIG // a2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFt
// SIG // cCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQC
// SIG // MAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0P
// SIG // AQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAuVNmy
// SIG // DS4FyB1mzHKlbn/Y5FE/yvM8iwb7uYfCa6mEds/3mjts
// SIG // qNTqHPUocr8W3vRmQ7u5JFM8UsidSGZLGWcOhQ6usmTU
// SIG // 9zxIwBJ0RKUQS/Evpm14PjuFS0tC0pm/FyGYi7GqmdHw
// SIG // xHL9x3gPv8v6ipwkFpF4IaWhDMBjEM0ZIRsHBnV69cxq
// SIG // UOx08b37ue8RcWV9TJCp1hRDSerq3fuLXlIF49J4CDsf
// SIG // /5d1zCtx7fE9vs7xiTQBfuf+agZO569O/cyAmxV78bYn
// SIG // TTeXqF3VvvawCJEvlBg9fQGXQa7benWfjnQKrgYg5GEO
// SIG // ZFX1DCkt9ch0DhoJhcbgjs06Vh2pa6qXSJZbMvCjbI+V
// SIG // PbDjYlgHfTzZchBx20GQ5ovfwTZTmMk7dGHoS2w6L5mV
// SIG // DWs5O/TnfwPde5qgnU6qxMcARlD2zD/v73WFKmibKbqQ
// SIG // Z1LYzn/++gwIVcvHv3us0ffD5KZZpYjtm6y90N6w+vmQ
// SIG // lXaxjPUZuoVAwQZL2IfmI5hnXEORwelk/UXnPPqgx5m4
// SIG // S4V+GXWmq3efzl3i24Mdn+y+EEEI9yoKo6gzliJ1YTRN
// SIG // YGLU1ix3uPPNnf5Oy7otCtYPBGayg+5mjq7CSyjypXoH
// SIG // HifRQqmNbA1ClIUWtBB1FvmZCi5aISq0uxcI3ayDVpDw
// SIG // YG0M5wo3RNpuO0I02zCCB3EwggVZoAMCAQICEzMAAAAV
// SIG // xedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgx
// SIG // CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
// SIG // MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
// SIG // b3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jv
// SIG // c29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
// SIG // MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
// SIG // NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
// SIG // bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
// SIG // FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
// SIG // TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIi
// SIG // MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM
// SIG // 57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/
// SIG // bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1
// SIG // jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhx
// SIG // XFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41
// SIG // JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP
// SIG // 1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3j
// SIG // tIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF
// SIG // 50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg
// SIG // 3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F
// SIG // 37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
// SIG // lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
// SIG // jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLX
// SIG // pyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJ
// SIG // YfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzF
// SIG // ER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+e
// SIG // FnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYB
// SIG // BAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS
// SIG // /mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0A
// SIG // XmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYB
// SIG // BAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93
// SIG // d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBv
// SIG // c2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZ
// SIG // BgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8E
// SIG // BAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAW
// SIG // gBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBN
// SIG // MEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
// SIG // cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
// SIG // MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsG
// SIG // AQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20v
// SIG // cGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIz
// SIG // LmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4Swf
// SIG // ZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518Jx
// SIG // Nj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6
// SIG // th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9I
// SIG // dQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq
// SIG // 95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBew
// SIG // VIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7
// SIG // bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa
// SIG // 2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzH
// SIG // VG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZ
// SIG // c9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakUR
// SIG // R6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
// SIG // QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
// SIG // excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+AN
// SIG // uOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/
// SIG // OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQd
// SIG // VTNYs6FwZvKhggLUMIICPQIBATCCAQChgdikgdUwgdIx
// SIG // CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
// SIG // MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
// SIG // b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
// SIG // c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEm
// SIG // MCQGA1UECxMdVGhhbGVzIFRTUyBFU046ODZERi00QkJD
// SIG // LTkzMzUxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0
// SIG // YW1wIFNlcnZpY2WiIwoBATAHBgUrDgMCGgMVADYjRxll
// SIG // 2zWgz8Z8og2xDnIkoxYQoIGDMIGApH4wfDELMAkGA1UE
// SIG // BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV
// SIG // BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
// SIG // b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
// SIG // bWUtU3RhbXAgUENBIDIwMTAwDQYJKoZIhvcNAQEFBQAC
// SIG // BQDp5WkwMCIYDzIwMjQwNTA4MTEwMDAwWhgPMjAyNDA1
// SIG // MDkxMTAwMDBaMHQwOgYKKwYBBAGEWQoEATEsMCowCgIF
// SIG // AOnlaTACAQAwBwIBAAICF1swBwIBAAICE3IwCgIFAOnm
// SIG // urACAQAwNgYKKwYBBAGEWQoEAjEoMCYwDAYKKwYBBAGE
// SIG // WQoDAqAKMAgCAQACAwehIKEKMAgCAQACAwGGoDANBgkq
// SIG // hkiG9w0BAQUFAAOBgQAKF0eJj4HgbSk+2jh9oygsT4xQ
// SIG // 8VbPjIlcGR30hgCZE/ck3X5J+gcfltEiXDP+zwJFEJ/t
// SIG // pb2P+TyIG+0DhANgxBvumgfWm7ImJaV/f1yp3hhhNt9d
// SIG // gg5AMLipvxhlC6RBzdTk66l3fTlGLlhCEp/TtUWYB6In
// SIG // hbs1XwUab1h02DGCBA0wggQJAgEBMIGTMHwxCzAJBgNV
// SIG // BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYD
// SIG // VQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg
// SIG // Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBU
// SIG // aW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB3V1XHZXUraob
// SIG // AAEAAAHdMA0GCWCGSAFlAwQCAQUAoIIBSjAaBgkqhkiG
// SIG // 9w0BCQMxDQYLKoZIhvcNAQkQAQQwLwYJKoZIhvcNAQkE
// SIG // MSIEICKjyIPtb5B9ssSGfBBPKSIVXKgm67qW354UKDFL
// SIG // W2oVMIH6BgsqhkiG9w0BCRACLzGB6jCB5zCB5DCBvQQg
// SIG // Yf8OLZplrE94mZx7R9FZN+1AjdNpUcWPkYjjesAxY2Yw
// SIG // gZgwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMK
// SIG // V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
// SIG // A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
// SIG // VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
// SIG // MAITMwAAAd1dVx2V1K2qGwABAAAB3TAiBCATBhAqHbFv
// SIG // PKJIzdXMVJMw9Xi2tvY+mhXuFsKnz3GYTjANBgkqhkiG
// SIG // 9w0BAQsFAASCAgAtDNeg5/mvn4ckepwg0DecBVD6GtIe
// SIG // awlGnpcAPJIrue2mq2YxI2SKTPhzZS4vsHbuDLoWyvFG
// SIG // wAKPvqYzoDCRqPHX0yHXQCGzHbjBC2qr2d9ljuWzQBhr
// SIG // Ip6//ezcl1xc4AZNthf3XlHsUwR0II0IQGo34IOp85TR
// SIG // PvkasWSgNac1avI3Kr0z1Fi9wCIlUqolVdZZHOiBgplK
// SIG // 6EB7egxBsrR+fnfQfbM/Dm0AIjx9aQySJ7I8f0U9Lxb7
// SIG // aBAiQgl/briznf4KrP1dMPUnFCGgSYHreWeXlZ5HA+Fh
// SIG // KyeGroULNF5QAz5YR68Rpa8cgoktVBqbrkgQHHiDQ57C
// SIG // yn9nVJjCxZSXf7tOt3RhmWdfKi+Xk2ggYP0ULnLPsc54
// SIG // 5g+LYZ4YLAtZ4K3zBTv8SiW0hQGajxzDpGTFLtea/gLa
// SIG // huUeueVUWsrC/uZQ0KKZOQOjr57MZ8gB2+AFesE4Lpf7
// SIG // hnaVEHhzLiPhDEnl6PrJ5jlUWms50Zdv8JwaOyxj2OWs
// SIG // +kbOOW3P2PNnVKaqKGXL3HLK5sl73CyGl/l6HYpTZ6rN
// SIG // 1R5tRApkntQ5MJPVFrz2LJl9erKBs5oTpN6QkWZqXP03
// SIG // lSVceLQaLWCtpBD53ifooOSx+sOHWMNpfIUqWXF61py9
// SIG // jhrJ6LzqVFkco69of3I286XgWRVmj3b73fCbnQ==
// SIG // End signature block
|
combined_dataset/train/non-malicious/Compare-Drive_1.ps1
|
Compare-Drive_1.ps1
|
param($ComputerName1,$ComputerName2)
$a = gwmi win32_volume -filter "DriveType=3" -computername $ComputerName1 | where {@('Y:','Z:') -notcontains $_.DriveLetter} | select name, @{n='capacity'; e={[math]::truncate($_.Capacity/1GB)}}
$b = gwmi win32_volume -filter "DriveType=3" -computername $ComputerName2 | where {@('Y:','Z:') -notcontains $_.DriveLetter} | select name, @{n='capacity'; e={[math]::truncate($_.Capacity/1GB)}}
Compare-Object -ReferenceObject $a -DifferenceObject $b -Property name,capacity -PassThru |
select-object name, @{n='ComputerName1';e={$ComputerName1}}, @{n='ComputerName2';e={$ComputerName2}},
@{n='Capacity1';e={$name = $_.name; $drive = $a | ? { $_.name -eq $name }; if ($drive.capacity) {$drive.capacity} else {0} }},
@{n='Capacity2';e={$name = $_.name; $drive = $b | ? { $_.name -eq $name }; if ($drive.capacity) {$drive.capacity} else {0} }} |
Sort-Object -Property name -Unique
#get-content .\\serverpairs.txt | %{$servers = $_ -split ','; .\\compare-drive.ps1 $servers[0] $servers[1] } | ogv
|
combined_dataset/train/non-malicious/sample_10_98.ps1
|
sample_10_98.ps1
|
ConvertFrom-StringData @'
id_dpm_eventlog_activity=Gathering Eventlogs
id_dpm_status_eventlogs=Running DC_DPMEventLogs.ps1
'@
# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCObuswAI1rRsqh
# d7RWCZa0JfwhUGuBtHS0Hxl78v2mwqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEII3w
# xI1xSVVKASXhbtY7YrZIC2LhVGZo8wfM77j0IL/bMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEABAlCgrWGFH38884KqUX98Lq2/rPhkMgq3t4E
# d0ujvj8OeU5I4JpHcaTBBqlC7nzc4WRcE0vASuV4LZxqCEEpTnbA+a9SEk548aag
# lgCwrFGXwC0mrtUkyM/DahNXPQe7R0hPWNCoEoKM9AMyzB2FmtdxPlPXwSNE4eKY
# 7TeUBV3g776j2hrvhXx4hkw6VruOaTgx2oMHnWpbiT9eGRwVKa2BEAIwvIQC8rEu
# xg+WYigp7CQsO+Q92nhF/pPKOB3TXelQ+xqKIbBuzEHD1sNzxEKrJbMhEvZuFL9K
# zrw4yTH/X8Jz8xRKFFfQGq2x8TPTOvNYxyWlWBMSBpRwsd/JxKGCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDdpZxdzUCpvM4i9xeqZ8uDt8gA6reQ9dZH
# UAqBF0HNCAIGZxqItyNJGBMyMDI0MTAyODExNDA0My40NjZaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwAB
# AAAB6jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rW
# b2ksqaF65QtJkbQpmsc6G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T
# 0KfylTulrzKtgxnxZh7q1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGo
# n/4VDHnZhdas22svSC5GHywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB
# +KHCy08ds36an7IcOGfRmhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjA
# lsBBHD1TdGBucrGC3TQXSTp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1f
# xYk2nY6SCKsV+VmtV5aiPzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEU
# TBPXME/ia+t8jrT2y3ug15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM
# 3HPVJJ19vOSvrCP9lsEcEwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp
# 081X5RQ6HGVUz6ZdgQ0jcT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc
# 9KHKTWfXpAVj1Syqt5X4nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8
# HUVMp+mAA4rXjOw42vkHfQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebp
# F0BU1MTIcosFblleMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxV
# bX3G37KgvyoNAnuu2w3HoWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI5
# 3kOWSaWCaV3xCznpRt3c4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqe
# kZb4ivMR6LoPb5HNlq0WbBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8Cx
# iAg2KlbPyMwBOPcr9hJT8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzE
# GafPUwLmoETihOGLqIQlCpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3Qd
# iNS8u9ujYh1B7NLr6t3IglfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2
# JG5BYu/XitRE8cdzaJmDVBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dix
# UxE4qlfUPMixGr0Ft4/S0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi
# 5auiqB6xQBADUf+F7hSKZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Q
# bt45Cz/QMa7EmMGNn7a8MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5D
# r5m3T4bDj9WTNLgP8SFe3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQCJ2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smkOTAi
# GA8yMDI0MTAyODA1NDg0MVoYDzIwMjQxMDI5MDU0ODQxWjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDqyaQ5AgEAMAcCAQACAgZUMAcCAQACAhPVMAoCBQDqyvW5AgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAFfF191Vr1N1sln3mHz61HMNMQEg
# Ea636VH1IhLDsW3Fa0ADcc4HhLIGewlJNoGCXcZBml5HEec91aylUr95ZJqXwUeq
# PPb9X5bmbVFXObHp67WigFKCbNOFbIiG8ecu331cmM1GqdiZAhT6hW4gc/LC7F/n
# qvDz8msZXcAtE96/FvXd43LKJVHk/kN5IP3SUKVHfZo6zUQvLAaoPylUdoYADAn6
# hMlUIcog3CD8TCcit1MWEuBxZZBPsBMJdzSNeM+RfcmNb6nEzgkv8hGAlRMFGEp/
# jpNVEuQ5uey+mvVyZ/KaPkY+I4n2Y/SEuQKBMvP6FLyr9gfGyH8jpbHQG8gxggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqa
# JHLVWT9hYwABAAAB6jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDDsNkkWR0Ru4zcNJfjunNX8twH
# 9OZCJMioKeiPBV9OZTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXj
# ZDR4iwg0ltLANXBh5G1uKqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQgLTk9jKlH
# i0Od4rfyi3FO/mCmLpu/ZxHUB/cVCTvgf/QwDQYJKoZIhvcNAQELBQAEggIAbO7e
# YMjPv7dUAHPzgkUiQrtTK95aiXIfBmvT/e1K5rrBiVHzlmopq9fmhm0ki0bhJ/jS
# Zw5IDY4wgiaLZmKetxmSDpp2/y8INnJDMlenUGbH4X+p4h8n1hc5kJXZ3ruX8O99
# 7wEwrjaRFynJvAvVXOkiRYMLddF7+d3w07tECDCfQMFplR7aV2ZALpDWeG2TO3Y6
# cTpOr+GjPm4rGV50lwftmPPZ2GRIe6YnskIhPxvMOG5+xY66bd2NZRPHQlggR5pm
# EHe4WyCaWmeyhN9MweQHmf2N8j20XJmCK/2ygvgQpfQuM0HW6bV/IU5nYrnJuxRW
# Njf1FBJrpVN+7zq7AXEqoDbjXSRxSBAmx8i5RAig1oxWctn6eeWgvzc7FSqArP/j
# QsroJcIqQ0akphI3ks/k8oRRweFq976aK4kCYfYJA+nQ2j1e2Ltagci4p4jIKhfv
# YwN083Nperj4bovzHiz6U1viiYq6gSZWYaA4Ew7bf18AGaWMbIiGVAVKdVqT9SKr
# 7JdU8PRHsD/FPK0zUlDm593AWViVI95sFqj3X9brGvFH1N0aGBgQCduqGyeTgX3S
# zRli3Fpari/b+fbdJzrdy54dpsqu88U9tBDreViVQ2YAYlGpApnaOueob25O0MKD
# pG3LEjT8czMCS21uG9WKAz2aIL0lL2JK/zye8a0=
# SIG # End signature block
|
combined_dataset/train/non-malicious/Send-Mapi.ps1
|
Send-Mapi.ps1
|
##############################################################################
#.AUTHOR
# Josh Einstein
# Einstein Technologies, LLC
##############################################################################
##############################################################################
#.SYNOPSIS
# Opens a new mail message window (without actually sending it) with the
# To/CC/BCC/Subject/Body pre-filled with optional values and optional file
# attachments added to the message.
#
#.DESCRIPTION
# This function uses your default email client to display a new message
# window with the specified file(s) attached and a pre-filled subject and
# message body.
#
#.PARAMETER Path
# Specifies the path to one or more attachments to add. Wildcards are permitted.
#
#.PARAMETER LiteralPath
# Specifies the path to an item. Unlike Path, the value of LiteralPath is
# used exactly as it is typed. No characters are interpreted as wildcards.
# If the path includes escape characters, enclose it in single quotation marks.
# Single quotation marks tell Windows PowerShell not to interpret any
# characters as escape sequences.
#
#.PARAMETER To
# Specifies one or more recipients on the To line.
#
#.PARAMETER CC
# Specifies one or more recipients on the CC line.
#
#.PARAMETER BCC
# Specifies one or more recipients on the BCC line.
#
#.PARAMETER Subject
# The subject of the message.
#
#.PARAMETER Body
# The body of the message.
#
#.EXAMPLE
# Get-ChildItem C:\\temp\\*.txt | Send-MAPI -To josheinstein@hotmail.com
##############################################################################
function Send-MAPI {
[CmdletBinding(DefaultParameterSetName='Path')]
param(
[Parameter(ParameterSetName='Path', Position=1, Mandatory=$true, ValueFromPipeline=$true, ValueFromPipelineByPropertyName=$true)]
[String[]]$Path,
[Alias("PSPath")]
[Parameter(ParameterSetName='LiteralPath', Mandatory=$true, ValueFromPipelineByPropertyName=$true)]
[String[]]$LiteralPath,
[Parameter()]
[String[]]$To,
[Parameter()]
[String[]]$CC,
[Parameter()]
[String[]]$BCC,
[Parameter()]
[String]$Subject,
[Parameter()]
[String]$Body
)
begin {
$Message = New-Object MAPI.Message
$Message.AddRecipient($To)
$Message.AddCC($CC)
$Message.AddBCC($BCC)
$Message.Subject = $Subject
$Message.Body = $Body
}
process {
switch ($PSCmdlet.ParameterSetName) {
Path { $ResolvedPaths = @(Resolve-Path -Path:$Path) }
LiteralPath { $ResolvedPaths = @(Resolve-Path -LiteralPath:$LiteralPath) }
}
foreach ($ResolvedPath in $ResolvedPaths) {
Write-Verbose "$($PSCmdlet.MyInvocation.MyCommand.Name) Processing $ResolvedPath"
$Message.Attachments.Add($ResolvedPath.ProviderPath)
}
}
end {
if ($Message.Attachments.Count) {
if (-not $Message.Subject) { $Message.Subject = "Emailing: $($Message.Attachments | %{ [IO.Path]::GetFileName($_) })" }
if (-not $Message.Body) {
$Message.Body = @"
Your message is ready to be sent with the following file or link attachments:
$(($Message.Attachments | %{ [IO.Path]::GetFileName($_) }) -join "`n" )
Note: To protect against computer viruses, e-mail programs may prevent sending or receiving certain types of file attachments. Check your e-mail security settings to determine how attachments are handled.
"@
}
}
$Message.Show()
}
}
Add-Type @"
// Credit goes to David M Brooks
// http://www.codeproject.com/KB/IP/SendFileToNET.aspx
using System;
using System.Collections.Specialized;
using System.Runtime.InteropServices;
using System.IO;
using System.Collections.Generic;
using System.Threading;
namespace MAPI
{
public sealed class Message
{
public Message() {
Attachments = new List<string>();
}
public string Subject;
public string Body;
public List<string> Attachments;
public void AddRecipient(string[] email)
{
if (email == null || email.Length == 0) return;
foreach ( string e in email) {
AddRecipient(e, HowTo.MAPI_TO);
}
}
public void AddCC(string[] email)
{
if (email == null || email.Length == 0) return;
foreach ( string e in email ) {
AddRecipient(e, HowTo.MAPI_TO);
}
}
public void AddBCC(string[] email)
{
if (email == null || email.Length == 0) return;
foreach ( string e in email ) {
AddRecipient(e, HowTo.MAPI_TO);
}
}
public void Show() {
Thread t = new Thread((ThreadStart)delegate {
SendMail(Subject, Body, MAPI_LOGON_UI | MAPI_DIALOG);
});
t.SetApartmentState(ApartmentState.STA);
t.Start();
}
public void Send() {
Thread t = new Thread((ThreadStart)delegate {
SendMail(Subject, Body, MAPI_LOGON_UI);
});
t.SetApartmentState(ApartmentState.STA);
t.Start();
}
[DllImport("MAPI32.DLL")]
static extern int MAPISendMail(IntPtr sess, IntPtr hwnd, MapiMessage message, int flg, int rsv);
int SendMail(string strSubject, string strBody, int how)
{
MapiMessage msg = new MapiMessage();
msg.subject = strSubject;
msg.noteText = strBody;
msg.recips = GetRecipients(out msg.recipCount);
msg.files = GetAttachments(out msg.fileCount);
m_lastError = MAPISendMail(new IntPtr(0), new IntPtr(0), msg, how, 0);
if (m_lastError > 1)
throw new Exception("MAPISendMail failed! " + GetLastError());
Cleanup(ref msg);
return m_lastError;
}
bool AddRecipient(string email, HowTo howTo)
{
MapiRecipDesc recipient = new MapiRecipDesc();
recipient.recipClass = (int)howTo;
recipient.name = email;
m_recipients.Add(recipient);
return true;
}
IntPtr GetRecipients(out int recipCount)
{
recipCount = 0;
if (m_recipients.Count == 0)
return IntPtr.Zero;
int size = Marshal.SizeOf(typeof(MapiRecipDesc));
IntPtr intPtr = Marshal.AllocHGlobal(m_recipients.Count * size);
int ptr = (int)intPtr;
foreach (MapiRecipDesc mapiDesc in m_recipients)
{
Marshal.StructureToPtr(mapiDesc, (IntPtr)ptr, false);
ptr += size;
}
recipCount = m_recipients.Count;
return intPtr;
}
IntPtr GetAttachments(out int fileCount)
{
fileCount = 0;
if (Attachments == null)
return IntPtr.Zero;
if ((Attachments.Count <= 0) || (Attachments.Count > maxAttachments))
return IntPtr.Zero;
int size = Marshal.SizeOf(typeof(MapiFileDesc));
IntPtr intPtr = Marshal.AllocHGlobal(Attachments.Count * size);
MapiFileDesc mapiFileDesc = new MapiFileDesc();
mapiFileDesc.position = -1;
int ptr = (int)intPtr;
foreach (string strAttachment in Attachments)
{
mapiFileDesc.name = Path.GetFileName(strAttachment);
mapiFileDesc.path = strAttachment;
Marshal.StructureToPtr(mapiFileDesc, (IntPtr)ptr, false);
ptr += size;
}
fileCount = Attachments.Count;
return intPtr;
}
void Cleanup(ref MapiMessage msg)
{
int size = Marshal.SizeOf(typeof(MapiRecipDesc));
int ptr = 0;
if (msg.recips != IntPtr.Zero)
{
ptr = (int)msg.recips;
for (int i = 0; i < msg.recipCount; i++)
{
Marshal.DestroyStructure((IntPtr)ptr, typeof(MapiRecipDesc));
ptr += size;
}
Marshal.FreeHGlobal(msg.recips);
}
if (msg.files != IntPtr.Zero)
{
size = Marshal.SizeOf(typeof(MapiFileDesc));
ptr = (int)msg.files;
for (int i = 0; i < msg.fileCount; i++)
{
Marshal.DestroyStructure((IntPtr)ptr, typeof(MapiFileDesc));
ptr += size;
}
Marshal.FreeHGlobal(msg.files);
}
m_lastError = 0;
}
public string GetLastError()
{
if (m_lastError <= 26)
return errors[ m_lastError ];
return "MAPI error [" + m_lastError.ToString() + "]";
}
readonly string[] errors = new string[] {
"OK [0]", "User abort [1]", "General MAPI failure [2]", "MAPI login failure [3]",
"Disk full [4]", "Insufficient memory [5]", "Access denied [6]", "-unknown- [7]",
"Too many sessions [8]", "Too many files were specified [9]", "Too many recipients were specified [10]", "A specified attachment was not found [11]",
"Attachment open failure [12]", "Attachment write failure [13]", "Unknown recipient [14]", "Bad recipient type [15]",
"No messages [16]", "Invalid message [17]", "Text too large [18]", "Invalid session [19]",
"Type not supported [20]", "A recipient was specified ambiguously [21]", "Message in use [22]", "Network failure [23]",
"Invalid edit fields [24]", "Invalid recipients [25]", "Not supported [26]"
};
List<MapiRecipDesc> m_recipients = new List<MapiRecipDesc>();
int m_lastError = 0;
const int MAPI_LOGON_UI = 0x00000001;
const int MAPI_DIALOG = 0x00000008;
const int maxAttachments = 20;
enum HowTo{MAPI_ORIG=0, MAPI_TO, MAPI_CC, MAPI_BCC};
[StructLayout(LayoutKind.Sequential, CharSet = CharSet.Ansi)]
private class MapiMessage
{
public int reserved;
public string subject;
public string noteText;
public string messageType;
public string dateReceived;
public string conversationID;
public int flags;
public IntPtr originator;
public int recipCount;
public IntPtr recips;
public int fileCount;
public IntPtr files;
}
[StructLayout(LayoutKind.Sequential, CharSet = CharSet.Ansi)]
private class MapiFileDesc
{
public int reserved;
public int flags;
public int position;
public string path;
public string name;
public IntPtr type;
}
[StructLayout(LayoutKind.Sequential, CharSet=CharSet.Ansi)]
private class MapiRecipDesc
{
public int reserved;
public int recipClass;
public string name;
public string address;
public int eIDSize;
public IntPtr entryID;
}
}
}
"@
|
combined_dataset/train/non-malicious/4285.ps1
|
4285.ps1
|
$scriptblock =
{
param ($Payload)
$PipeName = "PoshMSDaisy"
$p = [System.IO.Directory]::GetFiles("\\.\\pipe\\")
$start = $true
foreach ($i in $p) {
if ($i -like "*PoshMSDaisy") {
$start = $false
}
}
while ($start) {
add-Type -assembly "System.Core"
$PipeSecurity = New-Object System.IO.Pipes.PipeSecurity
$AccessRule = New-Object System.IO.Pipes.PipeAccessRule( "Everyone", "ReadWrite", "Allow" )
$PipeSecurity.AddAccessRule($AccessRule)
$Pipe = New-Object System.IO.Pipes.NamedPipeServerStream($PipeName,"InOut",100, "Byte", "None", 1024, 1024, $PipeSecurity)
$pipe.WaitForConnection();
$pipeReader = new-object System.IO.StreamReader($pipe)
$pipeWriter = new-object System.IO.StreamWriter($pipe)
$pipeWriter.AutoFlush = $true
$pipeWriter.WriteLine($Payload);
$pipeReader.Dispose();
$pipe.Dispose();
}
exit
}
add-Type -assembly "System.Core"
$MaxThreads = 5
$RunspacePool = [RunspaceFactory]::CreateRunspacePool(1, $MaxThreads)
$RunspacePool.Open()
$Jobs = @()
$Job = [powershell]::Create().AddScript($ScriptBlock).AddArgument($daisypayload)
$Job.RunspacePool = $RunspacePool
$Job.BeginInvoke() | Out-Null
$pi = new-object System.IO.Pipes.NamedPipeClientStream(".", "PoshMSDaisy");
|
combined_dataset/train/non-malicious/sample_15_94.ps1
|
sample_15_94.ps1
|
#
# Module manifest for module 'Microsoft.SME.StorageMigration'
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'Microsoft.SME.StorageMigration.psm1'
# Version number of this module.
ModuleVersion = '4.9.0'
# Supported PSEditions
# CompatiblePSEditions = @()
# ID used to uniquely identify this module
GUID = 'efc37b2c-cc98-45c2-9b4f-497b9ad06e46'
# Author of this module
Author = 'SME'
# Company or vendor of this module
CompanyName = 'Microsoft'
# Copyright statement for this module
Copyright = '(c) 2018 Microsoft. All rights reserved.'
# Description of the functionality provided by this module
# Description = ''
# Minimum version of the Windows PowerShell engine required by this module
PowerShellVersion = '5.0'
# Name of the Windows PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the Windows PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# CLRVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
# RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
# RequiredAssemblies = @()
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = @(
'Get-WACSMSCutoverSummary',
'Get-WACSMSInventoryConfigDetail',
'Get-WACSMSInventoryDFSNDetail',
'Get-WACSMSInventorySMBDetail',
'Get-WACSMSInventorySummary',
'Get-WACSMSSmbNetFirewallRule',
'Get-WACSMSSmsCutover',
'Get-WACSMSSmsCutoverPairing',
'Get-WACSMSSmsDestinationConfig',
'Get-WACSMSSmsFeature',
'Get-WACSMSSmsInventory',
'Get-WACSMSSmsNasPrescan',
'Get-WACSMSSmsRequiredVolumeSize',
'Get-WACSMSSmsState',
'Get-WACSMSSmsStats',
'Get-WACSMSSmsTransfer',
'Get-WACSMSSmsTransferExcludedShares',
'Get-WACSMSSmsTransferExcludedSharesAndAFS',
'Get-WACSMSSmsTransferPairing',
'Get-WACSMSSmsTransferVolumePairing',
'Get-WACSMSSmsVersion',
'Get-WACSMSTemporaryFile',
'Get-WACSMSTransferDFSNDetail',
'Get-WACSMSTransferFileDetail',
'Get-WACSMSTransferSMBDetail',
'Get-WACSMSTransferSummary',
'Get-WACSMSWinEvent',
'Get-WACSMSWindowsFeature',
'Import-WACSMSSmsModule',
'Install-WACSMSSmsFeature',
'Install-WACSMSSmsProxy',
'Install-WACSMSWindowsFeature',
'Invoke-WACSMSCommand',
'New-WACSMSSmsCutover',
'New-WACSMSSmsInventory',
'New-WACSMSSmsNasPrescan',
'New-WACSMSSmsTransfer',
'Register-WACSMSSmsProxy',
'Remove-WACSMSSmsCutoverPairing',
'Remove-WACSMSSmsInventory',
'Remove-WACSMSSmsTransferPairing',
'Resume-WACSMSSmsCutover',
'Resume-WACSMSSmsTransfer',
'Set-WACSMSSmsCutover',
'Set-WACSMSSmsCutoverPairing',
'Set-WACSMSSmsInventory',
'Set-WACSMSSmsTransfer',
'Set-WACSMSSmsTransferExcludedShares',
'Set-WACSMSSmsTransferExcludedSharesAndAFS',
'Set-WACSMSSmsTransferPairing',
'Set-WACSMSSmsTransferVolumePairings',
'Start-WACSMSSmsCutover',
'Start-WACSMSSmsInventory',
'Start-WACSMSSmsNasPrescan',
'Start-WACSMSSmsTransfer',
'Stop-WACSMSSmsCutover',
'Stop-WACSMSSmsInventory',
'Stop-WACSMSSmsTransfer',
'Suspend-WACSMSSmsInventory',
'Suspend-WACSMSSmsTransfer',
'Test-WACSMSLocal',
'Test-WACSMSSmsMigration',
'Clear-WACSMSEventLogChannel',
'Clear-WACSMSEventLogChannelAfterExport',
'Export-WACSMSEventLogChannel',
'Get-WACSMSCimEventLogRecords',
'Get-WACSMSCimWin32LogicalDisk',
'Get-WACSMSCimWin32NetworkAdapter',
'Get-WACSMSCimWin32PhysicalMemory',
'Get-WACSMSCimWin32Processor',
'Get-WACSMSClusterEvents',
'Get-WACSMSClusterInventory',
'Get-WACSMSClusterNodes',
'Get-WACSMSDecryptedDataFromNode',
'Get-WACSMSEncryptionJWKOnNode',
'Get-WACSMSEventLogDisplayName',
'Get-WACSMSEventLogFilteredCount',
'Get-WACSMSEventLogRecords',
'Get-WACSMSEventLogSummary',
'Get-WACSMSServerInventory',
'Set-WACSMSEventLogChannelStatus'
)
# Function attributes: {"localScripts":["Get-WACSMSCutoverSummary","Get-WACSMSInventoryConfigDetail","Get-WACSMSInventoryDFSNDetail","Get-WACSMSInventorySMBDetail","Get-WACSMSInventorySummary","Get-WACSMSSmbNetFirewallRule","Get-WACSMSSmsCutover","Get-WACSMSSmsCutoverPairing","Get-WACSMSSmsDestinationConfig","Get-WACSMSSmsFeature","Get-WACSMSSmsInventory","Get-WACSMSSmsNasPrescan","Get-WACSMSSmsRequiredVolumeSize","Get-WACSMSSmsState","Get-WACSMSSmsStats","Get-WACSMSSmsTransfer","Get-WACSMSSmsTransferExcludedShares","Get-WACSMSSmsTransferExcludedSharesAndAFS","Get-WACSMSSmsTransferPairing","Get-WACSMSSmsTransferVolumePairing","Get-WACSMSSmsVersion","Get-WACSMSTemporaryFile","Get-WACSMSTransferDFSNDetail","Get-WACSMSTransferFileDetail","Get-WACSMSTransferSMBDetail","Get-WACSMSTransferSummary","Get-WACSMSWinEvent","Get-WACSMSWindowsFeature","Import-WACSMSSmsModule","Install-WACSMSSmsFeature","Install-WACSMSSmsProxy","Install-WACSMSWindowsFeature","Invoke-WACSMSCommand","New-WACSMSSmsCutover","New-WACSMSSmsInventory","New-WACSMSSmsNasPrescan","New-WACSMSSmsTransfer","Register-WACSMSSmsProxy","Remove-WACSMSSmsCutoverPairing","Remove-WACSMSSmsInventory","Remove-WACSMSSmsTransferPairing","Resume-WACSMSSmsCutover","Resume-WACSMSSmsTransfer","Set-WACSMSSmsCutover","Set-WACSMSSmsCutoverPairing","Set-WACSMSSmsInventory","Set-WACSMSSmsTransfer","Set-WACSMSSmsTransferExcludedShares","Set-WACSMSSmsTransferExcludedSharesAndAFS","Set-WACSMSSmsTransferPairing","Set-WACSMSSmsTransferVolumePairings","Start-WACSMSSmsCutover","Start-WACSMSSmsInventory","Start-WACSMSSmsNasPrescan","Start-WACSMSSmsTransfer","Stop-WACSMSSmsCutover","Stop-WACSMSSmsInventory","Stop-WACSMSSmsTransfer","Suspend-WACSMSSmsInventory","Suspend-WACSMSSmsTransfer","Test-WACSMSLocal","Test-WACSMSSmsMigration"],"externalScripts":["Clear-WACSMSEventLogChannel","Clear-WACSMSEventLogChannelAfterExport","Export-WACSMSEventLogChannel","Get-WACSMSCimEventLogRecords","Get-WACSMSCimWin32LogicalDisk","Get-WACSMSCimWin32NetworkAdapter","Get-WACSMSCimWin32PhysicalMemory","Get-WACSMSCimWin32Processor","Get-WACSMSClusterEvents","Get-WACSMSClusterInventory","Get-WACSMSClusterNodes","Get-WACSMSDecryptedDataFromNode","Get-WACSMSEncryptionJWKOnNode","Get-WACSMSEventLogDisplayName","Get-WACSMSEventLogFilteredCount","Get-WACSMSEventLogRecords","Get-WACSMSEventLogSummary","Get-WACSMSServerInventory","Set-WACSMSEventLogChannelStatus"]}
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = @()
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = @()
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
# Tags = @()
# A URL to the license for this module.
# LicenseUri = ''
# A URL to the main website for this project.
# ProjectUri = ''
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
# ReleaseNotes = ''
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
# SIG # Begin signature block
# MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBvVfgSc7n4+z+k
# Fipa4u0qWHwwjuACuiRZKaGGR1ygrKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIPRlPfZVIV5byzL7Bq4XZjY
# 22wZIoALh7f5zPHiwDo3MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAd2UnlO9+WU3UxCakSCT+E0UKsesYiv2ca2WbrTozSEdaZB7sjvzIGRNv
# FHEMrNnENbhrxHpWZFaGauOMHJ11cufD3BWdluizNEfymXUT7Qyca4SaXQDKO2Wk
# aqW+iiy2dsR+KV0fY33ETXiWgR/J/P0e2qf1va9wsbqJSXztrwqvoGLXxif8TZU8
# p+QKeLzIC8K0DwPcUKm381eQnRy8Qzgo+FfVM/G4HMzVdlUlXnvNvqj6kuEajzuw
# qfAcXUSZFYAJRxqc7g1cNXV2H44DrUvXuRMVESfLvDfbYI8GEAH0SFQENg20G7sg
# yF/5FzTElcwAh3TAoYhe3vblo3qYWaGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC
# FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCA4eiwtb6p8IBjhkXR3EL50HdxaihskiuLkvb/NEA0kWgIGZbqldNUi
# GBMyMDI0MDIyMDIyNTUwMC4yNDJaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpEMDgyLTRC
# RkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvIsyA1sjg9kSKJzelrUWF5
# ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0RaGrU8EHydF8NxPMR2KVNi
# AtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYniwKLPQLJ00EkXw5TSwfm
# JXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdFLKwo4BTlEgnvzeTfXukz
# X8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8XlBQDVDX5JeMEsx7jgJDdE
# nK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7rSFvcLnwAqMdqcy/iqQP
# MlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg8oWwXyiv3+bGB6dmdM61
# ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/DbUSqW2RqTUa2O2KuvsyRG
# MEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+fdTw+geRn6Mo2S6+/bZEw
# S/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGVPRqkmz5UYz+R5ybMJWj+
# mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0phjUTH2GChHIvE4SDSk2hw
# WP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU6HPSBd0OfEX3
# uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBANnrb8Ewr8eX/H1s
# Kt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g6Tf7tNx1q0NpKk1JTupU
# JfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXTMzxiewfErVLt8Wefebnc
# ST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz/zEA1AbZL/viXtHmryA0
# CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+dh+UsFi0d4lkdcE+Zq5JN
# jIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YWzhP/5XQnYl03AfXErn+1
# Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1qy4y4vlVKaShtbdfgPyG
# eeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3hsHzG8n5u5CQajPwx9Pzp
# sZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4QwGf5B71x57OjaX53gxT4
# vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ062nyIZKnsXxzuKFb0TjXW
# w6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0bSrAlVeihcaG5F74SZT8
# FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpE
# MDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJfSbL3djnQEqaggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOl/gCkwIhgPMjAyNDAyMjEwMzQ2NDlaGA8yMDI0MDIyMjAzNDY0OVowdzA9Bgor
# BgEEAYRZCgQBMS8wLTAKAgUA6X+AKQIBADAKAgEAAgIDZAIB/zAHAgEAAgITfzAK
# AgUA6YDRqQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAKpPt70uUsv1P4/X
# ML85ps6mfxRTO8xnSz8/Ag8nRdL1xAJ/KYHxiVIL5noExa5QVaLZwvfQ3Q2uJTdK
# e4/YCWkm++TDHUmHfG1c6vvEBXKUywKtNp1Rubum/PbOKB5nJpxFyAzjEbNApPaB
# 6X2XKd08DNuzukJ4YZOmC7mFsBxAMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAAAdwwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQggJz0Wn92sDFBvEeLvnu/9DJDsa3MLnkC3BuxgS5BPXgwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0Ou0IqxELDhX2TLyl
# xIINNzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 3MHgjMJfWF6OAAEAAAHcMCIEIJHEw8XmJ0Cl6OeupdmUITCi2EYqR+P3f3c9SNhu
# pHUjMA0GCSqGSIb3DQEBCwUABIICAESk1ROjpF3A4JNsLnzw9AuY6cxJB5Sqtu4+
# gcxD2nc4Wf4dBoamRbzsGQHZSbYYEGzMIc6BD0cQUVJJPsif5C/ScJzjr+Obk+Xa
# f9k1L1M6hawAyPaw7dU/iQ5gaXb9VlkHzhL0rh4aKa415aBE9hFRAXfC/Fk8fSIi
# jS3IxYptkfIfMZGKNEtrqZpVgG8g9Z2VSOJUmIqjRpnJYIsvzM6Kb4wCcN5sJMV4
# ukuceTMCiLsvltHFvX09wYCkhpVTbFScKEHOTgi5ib66rPOPTAKiOhYfovcm3QMO
# BHlG6x11OsnKGC1Fd4BqDVvi2oINbpDgBuAn3f7PAeAXpYvsxVFL90DBQcyPx6PW
# ppmNirxUOmvI7T1eXu0P76RrEQpiAqcFD542Q3euZ0Ojfstq2L++LyBRCy6B7pgJ
# gkutnjGyZC6TymXMwNEK4K5GqbuKSAjV/cD7uQubK2QeMSBtqOVdicOGa7KYIxbG
# cEyN83Rs8q3/5VX4GY6rZVcjw8DKk2kf6FFZv0aFUjYu2dpUFQvBBrl63fcHdvLJ
# I8OiLJNl6Ms2SHnSLZFK27+im1PWgqxzLoaFaTkKOHnY5QtltyOAfUyEKiWBzvTD
# ix4xHHSiJKKHpUf1afnjs/PRSwxtovIeKn+x5E4ifIWNwtXn5cV8ZZPm023ayS6Z
# LlTS4R2R
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_29_69.ps1
|
sample_29_69.ps1
|
TОбмеження PrintAllTranslations та IgnoreTranslations не можна використовувати разом. oОбчислюваний стовпець "%{ccon_column/}" не можна додавати до гібридної таблиці "%{ccon_table/}". Вилучіть його.Не можна додавати стовпець "alternateOf", що використовується для агрегацій, до гібридної таблиці "%{ccon_table/}". Вилучіть "alternateOf".õНе можна створювати стовпець "alternateOf", що використовуватиметься для агрегацій, з посиланням на гібридну таблицю "%{ccon_baseTable/}" як BaseTable. Укажіть посилання на базову таблицю в режимі DirectQuery або вилучіть стовпець "alternateOf".Не можна створювати кілька розділів у режимі DirectQuery для таблиці "%{ccon_table/}". Підтримується використання лише одного розділу DirectQuery.ÊУ гібридній таблиці "%{ccon_table/}" типу сутності не можна створити розділ, що посилається на інший набір даних Power BI, SAP або Azure Analysis Services як на джерело DirectQuery. Вилучіть цей розділ.ǀНе можна налаштувати таблицю "%{ccon_table/}" як таблицю нарощуваного оновлення з розділом у реальному часі, оскільки вираз запиту даних посилається на кілька джерел даних (%d{datasourceNumber/}). Таблиця нарощуваного оновлення з розділом у реальному часі може використовувати лише одне джерело даних. Змініть вираз таблиці, щоб використовувати лише одне джерело даних. Докладніше див. за посиланням https://go.microsoft.com/fwlink/?linkid=2172127.aВластивість "%{property/}" в об’єкті ChangedProperty для батьківського типу "%{type/}" несумісна.rТип ArtifactType "%{ArtifactType/}" в об’єкті ExcludedArtifact для батьківського типу "%{parentType/}" несумісний.fКолекція об’єктів changedProperty "FormatString" уже існує. Тепер дозволено використовувати дублікати.aКолекція об’єктів changedProperty "Caption" уже існує. Тепер дозволено використовувати дублікати.eКолекція об’єктів changedProperty "Description" уже існує. Тепер дозволено використовувати дублікати.gКолекція об’єктів changedProperty "DisplayFolder" вже існує. Тепер дозволено використовувати дублікати.uТаблиця відомостей "%{ccon_table/}" негрупованого AlternateOf (наприклад, Sum/Min/Max) має бути таблицею DirectQuery.Таблиця агрегації "%{ccon_table/}" не може бути в режимі DirectQuery, якщо її таблиця відомостей "%{ccon_basetable/}" перебуває в подвійному режимі.
|
combined_dataset/train/non-malicious/82bfeecc-3581-4dec-8684-4e98aef8a59a.ps1
|
82bfeecc-3581-4dec-8684-4e98aef8a59a.ps1
|
# Enumerate fan speeds on an ESX host that is running WSMAN.
# This doesn't take advantage of CTP3's WSMAN cmdlets.
# Needs winrm installed.
$serverName = "your.server"
$user = "root"
$password = "password"
$x = [xml](winrm enumerate `
http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/CIM_NumericSensor `
"-username:$user" "-password:$password" "-auth:basic" "-skipCAcheck" `
"-skipCNcheck" "-r:https://$serverName/wsman" "-format:pretty")
$pattern = "(?<ID>FAN .)"
$x.Results.OMC_NumericSensor
|
combined_dataset/train/non-malicious/Format-Column 0.3.ps1
|
Format-Column 0.3.ps1
|
function global:Format-Column {
################################################################
#.Synopsis
# Formats incoming data to columns.
#.Description
# It works similarly as Format-Wide but it works vertically. Format-Wide outputs
# the data row by row, but Format-Columns outputs them column by column.
#.Parameter Property
# Name of property to get from the object.
# It may be
# -- string - name of property.
# -- scriptblock
# -- hashtable with keys 'Expression' (value is string=property name or scriptblock)
# and 'FormatString' (used in -f operator)
#.Parameter Column
# Number of columns to display.
#.Parameter Autosize
# Automatically calculate the number of columns to display.
#.Parameter MaxColumn
# Maximum number of columns to display if using Autosize.
#.Parameter Flow
# The direction of flow to display items.
#.Parameter InputObject
# Data to display.
#.Example
# PS> 1..150 | Format-Column -Autosize
#.Example
# PS> Format-Column -Col 3 -Input 1..130
#.Example
# PS> Get-Process | Format-Column -prop @{Expression='Handles'; FormatString='{0:00000}'} -auto
#.Example
# PS> Get-Process | Format-Column -prop {$_.Handles} -auto
#.Notes
# Name: Format-Column
# Author: stej, http://twitter.com/stejcz
# Version 0.1 - January 6, 2010 - stej
# Version 0.2 - January 14, 2010 - stej
# - ADDED parameter MaxColumn
# - FIXED displaying collection of 1 item was incorrect
# Version 0.3 - March 14, 2012 - By Jason Archer (This Version)
# - ADDED parameter Flow
################################################################
param(
[Parameter(Position=0)][Object]$Property,
[Parameter()][switch]$Autosize,
[Parameter()][int]$Column,
[Parameter()][int]$MaxColumn,
[Parameter()][ValidateSet("Horizontal","Vertical")][String]$Flow = "Horizontal",
[Parameter(Mandatory=$true,ValueFromPipeline=$true)][Object[]]$InputObject
)
begin { [Object[]]$Values = @() }
process { $Values += $InputObject }
end {
function ProcessValues {
if ($Property -is [Hashtable]) {
$exp = $Property.Expression
if ($exp) {
if ($exp -is [string]) { $Values = $Values | % { $_.($exp) } }
elseif ($exp -is [scriptblock]) { $Values = $Values | % { & $exp $_} }
else { throw 'Invalid Expression value' }
}
if ($Property.FormatString) {
if ($Property.FormatString -is [string]) {
$Values = $Values | % { $Property.FormatString -f $_ }
} else {
throw 'Invalid format string'
}
}
}
elseif ($Property -is [scriptblock]) { $Values = $Values | % { & $Property $_} }
elseif ($Property -is [string]) { $Values = $Values | % { $_.$Property } }
elseif ($Property -ne $null) { throw 'Invalid -Property type' }
# in case there were some numbers, objects, etc., convert them to string
$Values | % { $_.ToString() }
}
function Base($i) { [Math]::Floor($i) }
function Max($i1, $i2) { [Math]::Max($i1, $i2) }
if (!$Column) { $Autosize = $true }
$Values = ProcessValues
$valuesCount = $values.Count
if ($valuesCount -eq 1) {
$Values | Out-Host
return
}
# For some reason the console host doesn't use the last column and writes to new line
$consoleWidth = $Host.UI.RawUI.MaxWindowSize.Width - 1
$spaceWidthBetweenCols = 2
# get length of the longest string
$Values | ForEach-Object -Begin { [int]$maxLength = -1 } -Process { $maxLength = Max $maxLength $_.Length }
# get count of columns if not provided
if ($Autosize) {
$Column = Max (Base ($consoleWidth/($maxLength+$spaceWidthBetweenCols))) 1
$remainingSpace = $consoleWidth - $Column*($maxLength+$spaceWidthBetweenCols);
if ($remainingSpace -ge $maxLength) {
$Column++
}
if ($MaxColumn -and $MaxColumn -lt $Column) {
Write-Debug "Columns corrected to $MaxColumn (original: $Column)"
$Column = $MaxColumn
}
}
$countOfRows = [Math]::Ceiling($valuesCount / $Column)
$maxPossibleLength = Base ($consoleWidth / $Column)
# cut too long values, considers count of columns and space between them
$Values = $Values | ForEach-Object {
if ($_.length -gt $maxPossibleLength) { $_.Remove($maxPossibleLength-2) + '..' }
else { $_ }
}
#add empty values so that the values fill rectangle (2 dim array) without space
if ($Column -gt 1) {
$Values += (@('') * ($countOfRows * $Column - $valuesCount))
}
<#
now we have values like this: 1, 2, 3, 4, 5, 6, 7, ''
#>
$formatString = (1..$Column | %{"{$($_-1),-$maxPossibleLength}"}) -join ''
1..$countOfRows | ForEach-Object {
$r = $_ - 1
if ($Flow -eq "Horizontal") {
<# Display them like this:
1 2 3 4
5 6 7 ''
#>
$line = @(1..$Column | % { $Values[($r * $Column) + ($_ - 1)]})
} else {
<# Display them like this:
1 3 5 7
2 4 6 ''
#>
$line = @(1..$Column | % { $Values[$r + ($_ - 1) * $countOfRows]})
}
$formatString -f $line | Out-Host
}
}
}
|
combined_dataset/train/non-malicious/sample_34_97.ps1
|
sample_34_97.ps1
|
# ----------------------------------------------------------------------------------
#
# Copyright Microsoft Corporation
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ----------------------------------------------------------------------------------
<#
.Synopsis
This operation disables the Disaster Recovery and stops replicating changes from primary to secondary namespaces
.Description
This operation disables the Disaster Recovery and stops replicating changes from primary to secondary namespaces
#>
function Set-AzEventHubGeoDRConfigurationBreakPair{
[OutputType([System.Boolean])]
[CmdletBinding(DefaultParameterSetName = 'Break', PositionalBinding = $false, SupportsShouldProcess, ConfirmImpact = 'Medium')]
param(
[Parameter(ParameterSetName = 'Break', Mandatory, HelpMessage = "The name of the Consumer Group.")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')]
[System.String]
${Name},
[Parameter(ParameterSetName = 'Break', Mandatory, HelpMessage = "The name of EventHub namespace")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')]
[System.String]
# The name of EventHub namespace
${NamespaceName},
[Parameter(ParameterSetName = 'Break', Mandatory, HelpMessage = "The name of the resource group. The name is case insensitive.")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')]
[System.String]
# The name of the resource group.
# The name is case insensitive.
${ResourceGroupName},
[Parameter(ParameterSetName = 'Break', HelpMessage = "The ID of the target subscription.")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Runtime.DefaultInfo(Script = '(Get-AzContext).Subscription.Id')]
[System.String]
# The ID of the target subscription.
${SubscriptionId},
[Parameter(ParameterSetName = 'BreakViaIdentity', Mandatory, ValueFromPipeline, HelpMessage = "Identity parameter. To construct, see NOTES section for INPUTOBJECT properties and create a hash table.")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Models.IEventHubIdentity]
# Identity Parameter
# To construct, see NOTES section for INPUTOBJECT properties and create a hash table.
${InputObject},
[Parameter(HelpMessage = "The credentials, account, tenant, and subscription used for communication with Azure.")]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Azure')]
[System.Management.Automation.PSObject]
# The credentials, account, tenant, and subscription used for communication with Azure.
${DefaultProfile},
[Parameter(HelpMessage = "Run the command as a job")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command as a job
${AsJob},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter(HelpMessage = "Run the command asynchronously")]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command asynchronously
${NoWait},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.EventHub.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process{
try{
$hasAsJob = $PSBoundParameters.Remove('AsJob')
$null = $PSBoundParameters.Remove('WhatIf')
$null = $PSBoundParameters.Remove('Confirm')
$drConfig = Get-AzEventHubGeoDRConfiguration @PSBoundParameters
# 2. PUT
$null = $PSBoundParameters.Remove('InputObject')
if ($hasAsJob) {
$PSBoundParameters.Add('AsJob', $true)
}
if($PSCmdlet.ParameterSetName -eq 'Break'){
if ($PSCmdlet.ShouldProcess("EventHub Disaster Recovery Alias $($Name)", "Break Pair")) {
Az.EventHub.private\Invoke-AzEventHubBreakDisasterRecoveryConfigPairing_Break @PSBoundParameters
}
}
elseif($PSCmdlet.ParameterSetName -eq 'BreakViaIdentity'){
$EnvPSBoundParameters = @{}
if ($PSBoundParameters.ContainsKey('Debug')) {
$EnvPSBoundParameters['Debug'] = $Debug
}
if ($PSBoundParameters.ContainsKey('HttpPipelineAppend')) {
$EnvPSBoundParameters['HttpPipelineAppend'] = $HttpPipelineAppend
}
if ($PSBoundParameters.ContainsKey('HttpPipelinePrepend')) {
$EnvPSBoundParameters['HttpPipelinePrepend'] = $HttpPipelinePrepend
}
if ($PSBoundParameters.ContainsKey('Proxy')) {
$EnvPSBoundParameters['Proxy'] = $Proxy
}
if ($PSBoundParameters.ContainsKey('ProxyCredential')) {
$EnvPSBoundParameters['ProxyCredential'] = $ProxyCredential
}
if ($PSBoundParameters.ContainsKey('ProxyUseDefaultCredentials')) {
$EnvPSBoundParameters['ProxyUseDefaultCredentials'] = $ProxyUseDefaultCredentials
}
if($InputObject.Id -ne $null){
$ResourceHashTable = ParseResourceId -ResourceId $InputObject.Id
}
else{
$ResourceHashTable = ParseResourceId -ResourceId $InputObject
}
if ($PSCmdlet.ShouldProcess("EventHub Disaster Recovery Alias $($InputObject.Name)", "Break Pair")) {
Az.EventHub.private\Invoke-AzEventHubBreakDisasterRecoveryConfigPairing_Break -Name $ResourceHashTable['AliasName'] -NamespaceName $ResourceHashTable['NamespaceName'] -ResourceGroupName $ResourceHashTable['ResourceGroupName'] -SubscriptionId $ResourceHashTable['SubscriptionName'] @EnvPSBoundParameters
}
}
}
catch{
throw
}
}
}
# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAxr2HP4JVQ0HR5
# ek9XIoA7Reu+NiTCopGlWaHy1loa4qCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJMh
# Pca+N2IQtY3wZR2zTO3HZxlE7wi2rQ0QJpggmePKMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAO0QQtE4ONloAb5sl6XRatfzJy2l2kjUiAHfA
# No/UQe/58do0+sxaLeHX8fsE/JoP/KaRrt+RbWt+AhrcL6VXzxvGisesI8bgTezd
# CROfjK5tCzTg437yU95BUEdPK67TeI56zOJmOIyft2tko6CSfWbBm7FhoqKFeDnr
# IUHYK9lEgwVjT8P2wWz3FkVmqk24QlNUalNptnoz7IsRsO+HR3Ddq8Y4uiG/tkEA
# TRykt3smN+P55HFz3BGGrEWu2xZ8jfUMbdUoGFyPWhMBzc6WzJH6BgFAS+5ZVrRG
# ey2ccyBhzLrgeE999LFtIt8BdxSj+GCzuI5yq7jL+ChdhUL4b6GCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDxa5/PIODAMreA3t/BZAvoMn+A0ACUCI9Q
# wCl3b9C7qgIGZjOb9uk/GBMyMDI0MDUxNjA2NDIxNC42NjlaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046MzMwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAebZQp7qAPh94QAB
# AAAB5jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1MTVaFw0yNTAzMDUxODQ1MTVaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzMwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC9vph84tgluEzm/wpNKlAj
# cElGzflvKADZ1D+2d/ieYYEtF2HKMrKGFDOLpLWWG5DEyiKblYKrE2nt540OGu35
# Zx0gXJBE0zWanZEAjCjt4eGBi+uakZsk70zHTQHHyfP+B3m2BSSNFPhgsVIPp6vo
# /9t6OeNezIwX5E5+VwEG37nZgEexQF2fQZYbxQ1AauqDvRdXsSpK1dh1UBt9EaMs
# zuucaR5nMwQN6sDjG99FzdK9Atzbn4SmlsoLUtRAh/768sKd0Y1hMmKVHwIX8/4J
# uURUBRZ0JWu0NYQBp8khku18Q8CAQ500tFB7VH3pD8zoA4lcA7JkxTGoPKrufm+l
# RZAA4iMgbcLZ2P/xSdnKFxU8vL31RoNlZJiGL5MqTXvvyBLz+MRP4En9Nye1N8x/
# lJD1stdNo5wJG+mgXsE/zfzg2GaVqQczFHg0Nl8bpIqnNFUReQRq3C1jVYMCSceg
# NzHeYtw5OmZ/7eVnRmjXlCsLvdsxOzc1YVn6nZLkQD5y31HYrB9iIHuswhaMv2hJ
# NNjVndkpWy934PIZuWTMk360kjXPFwl2Wv1Tzm9tOrCq8+l408KIL6J+efoGNkR8
# YB3M+u1tYeVDO/TcObGHxaGFB6QZxAUpnfB5N/MmBNxMOqzG1N8QiwW8gtjjMJiF
# Bf6iYYrCjtRwF7IPdQLFtQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFOUEMXntN54+
# 11ZM+Qu7Q5rg3Fc9MB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBhbuogTapRsuwS
# kaFMQ6dyu8ZCYUpWQ8iIrbi40tU2hK6pHgu0hj0z/9zFRRx5DfhukjvbjA/dS5VY
# fxz1EIbPlt897MJ2sBGO2YLYwYelfJpDwbB0XS9Zkrqpzq6X/lmDQDn3G5vcYpYQ
# CJ55LLvyFlJ195AVo4Wy8UX5p7g9W3MgNHQMpM+EV64+cszj4Ho5aQmeKGtKy7w7
# 2eRY/vWDuptrvzruFNmKCIt12UcA5BOsXp1Ptkjx2yRsCj77DSml0zVYjqW/ISWk
# rGjyeVJ+khzctxaLkklVwCxigokD6fkWby0hCEKTOTPMzhugPIAcxcHsR2sx01YR
# a9pH2zvddsuBEfSFG6Cj0QSvEZ/M9mJ+h4miaQSR7AEbVGDbyRKkYn80S+3AmRlh
# 3ZOe+BFqJ57OXdeIDSHbvHzJ7oTqG896l3eUhPsZg69fNgxTxlvRNmRE/+61Yj7Z
# 1uB0XYQP60rsMLdTlVYEyZUl5MLTL5LvqFozZlS2Xoji4BEP6ddVTzmHJ4odOZMW
# TTeQ0IwnWG98vWv/roPegCr1G61FVrdXLE3AXIft4ZN4ZkDTnoAhPw7DZNPRlSW4
# TbVj/Lw0XvnLYNwMUA9ouY/wx9teTaJ8vTkbgYyaOYKFz6rNRXZ4af6e3IXwMCff
# CaspKUXC72YMu5W8L/zyTxsNUEgBbTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjMzMDMtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQDiWNBeFJ9jvaErN64D1G86eL0mu6CBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e/l9jAi
# GA8yMDI0MDUxNjAxNTUwMloYDzIwMjQwNTE3MDE1NTAyWjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDp7+X2AgEAMAcCAQACAgwbMAcCAQACAhOhMAoCBQDp8Td2AgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAI7LY3XHCbPSeNy5R2v3jNqNjpn/
# TszpX4mYA7AOcRF0XrpxxC7Z4bDOG0gyEURJJkqTLJhlKyYKrLFmYjv5Z+KWlK9L
# sV+QoOAydATsSdHO4XsZE0+eys7gz6D13zmrBUImPjpyfJ2cFzVA1aG8ttRPkjD0
# xhreQOE3X9nqnXLgi7aNWkQBJouuuB3zt0vAnNTZXy7p+s99aleGvZTSz5N9uN27
# 27aFHqElkN9fvWAOBaf8L/nuABEzCgPT8DaT0V9NEEMnKoVb/Q5vtDqhOYzYwU+m
# u5Qtlr/Dg1K/GCC1RUj6UgLLEue1DFKWUT30PSOaVYBWbbv0PpSu/TnKYWkxggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAebZ
# Qp7qAPh94QABAAAB5jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCAU2jgCrmQdt9qiHjYG5N2sPTK5
# QmHGcorpcYl8d89L0jCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM+7o4ao
# HrMJaG8gnLO1q16hIYcRnoy6FnOCbnSD0sZZMIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHm2UKe6gD4feEAAQAAAeYwIgQg/aC5e6EY
# z2geYp/4pDtyItHIWei+WBH1MjDrz8KgtvwwDQYJKoZIhvcNAQELBQAEggIArt3E
# +RcnbdOsal0gjAOPDo+8waAA9Ky14ofrb+iJpli8P7HvVMB9LHO7yD4wc5bHBtUv
# hOSNh1wjqX66nzbpozbFQjSJDiQz838f3EdSnBJv7swIqFyvHnT6Exgd+dZNSo0S
# fB5pVK8echZT7ehC9QroFy/xwKDLK0IcC9EkUCVG9Pnf6E96mH9Lg6slkTw4iaCF
# /3leQ71/WzguuCcovR8dr6BpYiGWQa0PcRTyHc1DhkY23wiIwNCHuYp7c9pVbq+N
# xJP+BvHZcN5ZSIPxUEsqOBlmM3JfnwEOdKeReyacZ0RhUvHmXuOCrq7rc4KM7DWv
# dcYCgTkrCxZxI4AwxyIhvQNWhmZPgyzPYth/38bYejHuFKJ3TrZXtUqfhxwvMl7h
# JYf37/tRjk8g2yLSDTpn1M234UzVkHHcQWG2HMsgOSeJZBK9fI2PcEavTL2xcazJ
# tJG9Z+B1W6jE7+40bolLUnqb1bNwWgZwN24n0GJHqtkO+untJOTop/prM385PnTn
# vQVm6t+2QNDuwqI2KZWvy5WFXq6B1MmnaMtqF4CV/FKvmc2V/9C7FuJs84xbqfOq
# HQSN8+ryCHrnZuC4rVnscuHVA4qFPVl0P8dLl1fMZcvPJ6oakRQCMFOMjNAEAMQW
# SNpKzawhNIDFW2EavaAYpxrq/1wnyDo/OMqgBEA=
# SIG # End signature block
|
combined_dataset/train/non-malicious/Script-Object.ps1
|
Script-Object.ps1
|
#Copyright (c) 2011 Justin Dearing
#
#Permission is hereby granted, free of charge, to any person obtaining a copy
#of this software and associated documentation files (the "Software"), to deal
#in the Software without restriction, including without limitation the rights
#to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
#copies of the Software, and to permit persons to whom the Software is
#furnished to do so, subject to the following conditions:
#
#The above copyright notice and this permission notice shall be included in
#all copies or substantial portions of the Software.
#
#THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
#IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
#FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
#AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
#LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
#OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
#THE SOFTWARE.
param(
[Parameter(Mandatory=$true, HelpMessage='The name of the stored procedure or user defined function to script')]
[string] $ProcedureName,
[string] $Path = "$($ProcedureName).sql",
[string] $ConnectionString = 'Data Source=.\\sqlexpress2k8R2;Initial Catalog=master;Integrated Security=SSPI;'
);
try {
[System.Data.SqlClient.SqlConnection] $cn = New-Object System.Data.SqlClient.SqlConnection (,$ConnectionString);
$cn.Open() > $null;
$cmd = $cn.CreateCommand();
$cmd.CommandType = [System.Data.CommandType]::StoredProcedure;
$cmd.CommandText = 'sp_helptext';
$cmd.Parameters.AddWithValue('@objname', $ProcedureName) > $null;
[System.Data.IDataReader] $rdr = $cmd.ExecuteReader();
[string] $sproc_text = '';
while ($rdr.Read()) {
$sproc_text += $rdr[0];
}
$rdr.Close();
$sproc_text | Out-File -FilePath $Path;
}
finally {
if ($cmd -ne $null) { $cmd.Dispose(); }
if ($cn -ne $null) { $cn.Dispose(); }
}
|
combined_dataset/train/non-malicious/ESXi Config BackupScript_1.ps1
|
ESXi Config BackupScript_1.ps1
|
###ESXi Configuration Backup Script
#DESCRIPION: This Script takes a CSV file with the hostname, username, and password of a list of ESXi servers, and backs up their configurations to a specified Destination
#USAGE: This script is meant to be run as a regular scheduled task or a pre-script for a backup job. There is no version control, so it is recommended to use an external backup program (Such as Backup Exec) to scan this.
#LAST MODIFIED: 15 Dec 2009 by JGrote <jgrote AT enpointe NOSPAMDOT-com>
#REQUIREMENTS:
#VMWare Remote CLI (Tested with 4.0U1)
### SETTINGS
#Location of the VMWare Remote CLI vicfg-cfgbackup.pl command (will be different for 32-bit systems)
$vSphereCLIPath = "C:\\Program Files (x86)\\VMware\\VMware vSphere CLI\\"
#Backup Destination Folder
$BackupDest = "E:\\Backup\\ESXi"
#Path to ESXi CSV File. APPLY STRICT PERMISSIONS TO THIS FILE SO THAT ONLY THE SCRIPTAND ADMINISTRATORS CAN READ IT!
#Format:
#1st Field - HOSTNAME - ESXi IP Address or Hostname
#2nd Field - USERNAME - Local Username (usually root)
#3rd Field - PASSWORD - Password
#
#Example:
#HOSTNAME,USERNAME,PASSWORD
#server1,root,password
#server2,root,password2
#It is recommended to create and edit this file using Excel (Save as CSV)
$ESXiCSV = "C:\\Scripts\\ESXiBackupList.csv"
### PREPARATION
#Create an ESXi Backup Event Source if it doesn't already exist
$eventsource = "Backup-ESXi"
$eventlog = "Application"
if (!(get-eventlog -logname $eventlog -source $eventsource)) {new-eventlog -logname $eventlog -source $eventsource}
#Write an error and exit the script if an exception is ever thrown
trap {write-eventlog -logname $eventlog -eventID 1 -source $eventsource -EntryType "Error" -Message "An Error occured during $($eventsource): $_ . Script run from $($MyInvocation.MyCommand.Definition)"; exit}
#Path Verification
#Verify that the following paths and files exist. If it is not there, it will throw an exception caught by the trap above that will exit the script.
#Verify:ESX Config File
$ESXiCSVIsPresentTest = Get-Item $ESXiCSV
#Verify:VMWare Remote CLI Path
$vSphereCLIISPresentTest = Get-Item $vSphereCLIPath
#Verify:Backup Destination Directory
$BackupDestIsPresentTest = Get-Item $BackupDest
### SCRIPT
#Read Each Host from the File and back up the config to the backup directory
import-csv $ESXiCSV | ForEach-Object {
$BackupResult = invoke-expression "& '$vSphereCLIPath\\perl\\bin\\perl.exe' '$vSphereCLIPath\\bin\\vicfg-cfgbackup.pl' --server $($_.HOSTNAME) --username $($_.USERNAME) --password $($_.PASSWORD) --save $($BackupDest)\\$($_.HOSTNAME)-cfgbackup.tgz"
if ($LastExitCode -ne 0) {throw "An Error occurred while executing $BackupBin for $($_.HOSTNAME): $BackupResult"}
}
#Compose and Write Success Event
$successText = "ESXi Configurations were successfully backed up to $BackupDest. Script run from $($MyInvocation.MyCommand.Definition)"
write-eventlog -logname $eventlog -eventID 1 -source $eventsource -EntryType "Information" -Message $successText
|
combined_dataset/train/non-malicious/get-serials.ps1
|
get-serials.ps1
|
<#
.SYNOPSIS
Get the BIOS serial numbers from computers in the domain.
.DESCRIPTION
Return a list of computers with their serial numbers. For Dell computers the Win32_BIOS.SerialNumber property
is the service tag of the computer. This identifies the computer on the Dell support site, and with it you can
get the proper drivers/manuals and warranty information.
.PARAMETER ADSPath
The location within Active Directory to find computers.
.EXAMPLE
.\\get-serials.ps1 -ADSPath "LDAP://OU=workstations,DC=company,DC=com"
ComputerName ServiceTag
------------ ----------
Desktop-pc01 a1b2c3d
Desktop-pc02 b2c3d4e
Desktop-pc03 The RPC server is unavailable. (Exception from H ...
Desktop-pc04 f4g5h6i
Description
-----------
This example shows the output of the command.
.EXAMPLE
.\\get-serials.ps1 -ADSPath "LDAP://OU=workstations,DC=company,DC=com" `
| Export-Csv .\\sample.csv -NoTypeInformation
Description
-----------
This example shows piping the output to a csv file.
.NOTES
.LINK
http://scripts.patton-tech.com/wiki/PowerShell/Production/GetSerials
#>
Param
(
[Parameter(Mandatory=$true)]
$ADSPath
)
Begin
{
$ScriptName = $MyInvocation.MyCommand.ToString()
$LogName = "Application"
$ScriptPath = $MyInvocation.MyCommand.Path
$Username = $env:USERDOMAIN + "\\" + $env:USERNAME
New-EventLog -Source $ScriptName -LogName $LogName -ErrorAction SilentlyContinue
$Message = "Script: " + $ScriptPath + "`nScript User: " + $Username + "`nStarted: " + (Get-Date).toString()
Write-EventLog -LogName $LogName -Source $ScriptName -EventID "100" -EntryType "Information" -Message $Message
# Dotsource in the AD functions I need
. .\\includes\\ActiveDirectoryManagement.ps1
}
Process
{
$Workstations = Get-ADObjects -ADSPath $ADSPath
$Jobs = @()
foreach ($Workstation in $Workstations)
{
[string]$ThisWorkstation = $Workstation.Properties.name
$ThisJob = New-Object PSobject
if ($Workstation -eq $null){}
else
{
Try
{
$ErrorActionPreference = "Stop"
$Serial = Get-WmiObject -query "select SerialNumber from win32_bios" `
-computername $ThisWorkstation
$Return = $serial.serialnumber
}
Catch
{
[string]$ThisError = $Error[0].Exception
$ThisError = $ThisError.Substring($ThisError.IndexOf(":"))
$ThisError = $ThisError.Substring(1,$ThisError.IndexOf("`r"))
$return = $ThisError.Trim()
}
Add-Member -InputObject $ThisJob -MemberType NoteProperty -Name "ComputerName" `
-Value $ThisWorkstation
Add-Member -InputObject $ThisJob -MemberType NoteProperty -Name "ServiceTag" -Value $Return
}
$Jobs += $ThisJob
$ThisJob
}
$Message = [system.string]::Join("`n",($Jobs))
Write-EventLog -LogName $LogName -Source $ScriptName -EventId "101" -EntryType "Information" -Message $Message
}
End
{
$Message = "Script: " + $ScriptPath + "`nScript User: " + $Username + "`nFinished: " + (Get-Date).toString()
Write-EventLog -LogName $LogName -Source $ScriptName -EventID "100" -EntryType "Information" -Message $Message
}
|
combined_dataset/train/non-malicious/3216.ps1
|
3216.ps1
|
InModuleScope PoshBot {
Describe ScheduledMessage {
$msg = [Message]::new()
$msg.Id = 1
$msg.Text = "This is a test message"
$Interval = 'Days'
$TimeValue = 1
$Message = $msg
$StartAfter = (Get-Date).AddMinutes(1)
Context "Constructor: String, Int, Message, DateTime" {
$ScheduledMessage = [ScheduledMessage]::new($Interval, $TimeValue, $Message, $StartAfter)
It 'TimeInterval should match argument' {
$ScheduledMessage.TimeInterval | Should be $Interval
}
It 'TimeValue should match argument' {
$ScheduledMessage.TimeValue | Should be $TimeValue
}
It 'Message Id should be 1' {
$ScheduledMessage.Message.Id | Should be 1
}
It 'Message Text should match argument' {
$ScheduledMessage.Message.Text | Should match $msg.Text
}
It 'StartAfter value should match argument converted to UTC' {
$ScheduledMessage.StartAfter | Should be $StartAfter.ToUniversalTime()
}
}
Context "Constructor: String, Int, Message" {
$ScheduledMessage = [ScheduledMessage]::new($Interval, $TimeValue, $Message)
It 'TimeInterval should match argument' {
$ScheduledMessage.TimeInterval | Should be $Interval
}
It 'TimeValue should match argument' {
$ScheduledMessage.TimeValue | Should be $TimeValue
}
It 'Message Id should be 1' {
$ScheduledMessage.Message.Id | Should be 1
}
It 'Message Text should match argument' {
$ScheduledMessage.Message.Text | Should match $msg.Text
}
It 'Should have a StartAfter value without passing the argument' {
$ScheduledMessage.StartAfter | Should not BeNullOrEmpty
}
}
Context "Methods: Init()" {
$Intervals = @(
@{
Interval = 'Days'
MS = 86400000
},
@{
Interval = 'Hours'
MS = 3600000
},
@{
Interval = 'Minutes'
MS = 60000
},
@{
Interval = 'Seconds'
MS = 1000
}
)
foreach ($Type in $Intervals) {
It "Should calculate milliseconds for single $($Type.Interval) correctly" {
$ScheduledMessage = [ScheduledMessage]::new($Type.Interval, 1, $Message)
$ScheduledMessage.IntervalMS | Should be (1 * $Type.MS)
}
It "Should calculate milliseconds for multiple $($Type.Interval) correctly" {
$ScheduledMessage = [ScheduledMessage]::new($Type.Interval, 5, $Message)
$ScheduledMessage.IntervalMS | Should be (5 * $Type.MS)
}
}
}
Context "Method: HasElapsed()" {
$ElapsedMessage = [ScheduledMessage]::new($Interval, $TimeValue, $Message, (Get-Date).AddHours(-5))
$ScheduledMessage = [ScheduledMessage]::new($Interval, $TimeValue, $Message, (Get-Date).AddHours(5))
It 'Should return true when past the StartAfter DateTime' {
$ElapsedMessage.HasElapsed() | Should be $true
}
It 'Should return false when before the StartAfter DateTime' {
$ScheduledMessage.HasElapsed() | Should Not be $true
}
It 'TimesExecuted should be 1 after executing' {
$ElapsedMessage.TimesExecuted | Should be 1
}
}
Context "Method: Disable()" {
$ScheduledMessage = [ScheduledMessage]::new($Interval, $TimeValue, $Message, (Get-Date))
It 'Disables the instance when called' {
$ScheduledMessage.Disable()
$SceduleMessage.Enabled | Should Not be $true
}
It 'Does not throw an error when being called on an already-disabled instance' {
$ScheduledMessage.Disable()
$ScheduledMessage.Enabled | Should Not be $true
}
}
Context "Method: Enable()" {
$ScheduledMessage = [ScheduledMessage]::new($Interval, $TimeValue, $Message, (Get-Date))
It 'Enables the instance when called' {
$ScheduledMessage.Disable()
$ScheduledMessage.Enable()
$ScheduledMessage.Enabled | Should be $true
}
It 'Does not throw an error when being called on an already-enabled instance' {
$ScheduledMessage.Enable()
$ScheduledMessage.Enabled | Should be $true
}
}
Context "Method: RecalculateStartAfter()" {
It 'Should increase the StartAfter property by IntervalMS' {
$ScheduledMessage = [ScheduledMessage]::new($Interval, $TimeValue, $Message, (Get-Date))
$StartingValue = $ScheduledMessage.StartAfter
$ScheduledMessage.RecalculateStartAfter()
(New-TimeSpan $StartingValue $ScheduledMessage.StartAfter).TotalDays | Should Be 1
}
It 'Should not reschedule a run before the current time' {
$currentDate = (Get-Date).ToUniversalTime();
$startAfter = $currentDate.AddDays(-5);
$ScheduledMessage = [ScheduledMessage]::new($Interval, $TimeValue, $Message, $startAfter)
$ScheduledMessage.RecalculateStartAfter();
$ScheduledMessage.StartAfter | Should Not BeLessThan $currentDate
}
It 'Should only move StartAfter value forward' {
$StartingValue = (Get-Date).AddDays($daysDifference).ToUniversalTime()
$ScheduledMessage = [ScheduledMessage]::new($Interval, $TimeValue, $Message, $StartingValue)
$ScheduledMessage.RecalculateStartAfter()
$ScheduledMessage.StartAfter | Should Be $StartingValue.AddDays(1)
}
}
}
}
|
combined_dataset/train/non-malicious/bc7d5dc9-76a4-432e-ad15-2f3acae17658.ps1
|
bc7d5dc9-76a4-432e-ad15-2f3acae17658.ps1
|
param (
$UserName,
$FilePath,
[switch]$SaveCredential=$False,
[switch]$RdpSaveCredential=$False,
[switch]$DeleteCredential=$False,
[switch]$Help=$False
)
$ScriptFilenam = $MyInvocation.MyCommand.Name # ScriptFilename wo path.
$ScriptUnbArgs = $MyInvocation.UnboundArguments # UnNamed Arguments of the PowerShell Script ($Args)
$CredDir = $env:UserProfile # sotres credential files
$RdpFilenam = $env:UserProfile + "\\My Documents\\Default.rdp"
function Get-ScriptHelp {
Write-Host -ForegroundColor:White "
Usage:`t`t version 2009.10.07 ,karaszmiklos@gmail.com
$ScriptFilenam [-UserName:]UserName [[-FilePath:]program [arg1] ['arg 2'] [arg...]] [-SaveCredential] [-RdpSaveCredential] [-DeleteCredential] [-Help]
-UserName:
Required parameter! There is no default value.
1st position if parameter name is not defined.
Predefined user aliases:
SU Local Admin (SID ending with 500)
EMA Domain Admin (UserDomain\\uEMAsername)
Alias1 Default alias for context menus.
You can define aliases by runing: su AliasName -SaveCred
-FilePath:
Executable files. Default value:cmd.exe
2nd position if parameter name is not defined.
-SaveCredential
Switch parameter. Default value:$False
Force asking and saving credential into efs encrypted file.
-RdpSaveCredential
Switch parameter. Default value:$False
Force saving the specified credential into RDP profile:default.rdp
-DeleteCredential
Switch parameter. Default value:$False
Forcing deletion of the specified credential.
-Help
Switch parameter. Default value:$False
.\\ means current directory.
Use 'single quotes' for programs and arguments containing spaces.
Partial paramter names can be used while they are not ambiguous.
Examples:
su SU
su EMA
su EMA -Save
su EMA -Rdp
su EMA -Save -RdpSave
su Alias1 -SaveCred
su Alias1 -DeleteCred
su Domain\\Username cmd
powershell.exe $ScriptFilenam SU cmd.exe
su SU sc.exe stop ccmexec
powershell.exe $ScriptFilenam SU sc.exe stop ccmexec
su.bat SU 'c:\\Directory with spaces\\procexp.exe' /t /p:r -accepteula
"
}
function Export-PSCredential { #http://halr9000.com/article/531
param ( $Credential = (Get-Credential), $Path = "credentials.enc.xml" )
# Look at the object type of the $Credential parameter to determine how to handle it
switch ( $Credential.GetType().Name ) {
# It is a credential, so continue
PSCredential { continue }
# It is a string, so use that as the username and prompt for the password
String { $Credential = Get-Credential -credential:$Credential }
# In all other cases, throw an error and exit
default { Throw "You must specify a credential object to export to disk." }
}
$export = New-Object PSObject # Create temporary object to be serialized to disk
Add-Member -InputObject $export -Name:Username -Value:$Credential.Username -MemberType:NoteProperty
# Encrypt SecureString password using Data Protection API
$EncryptedPassword = $Credential.Password | ConvertFrom-SecureString
Add-Member -InputObject:$export -Name:EncryptedPassword -Value:$EncryptedPassword -MemberType:NoteProperty
$export.PSObject.TypeNames.Insert(0,’ExportedPSCredential’) # Give object a type name which can be identified later
$export | Export-Clixml $Path # Export using the Export-Clixml cmdlet
Write-Host -foregroundcolor:Green "Credential saved to: "
Get-Item -Force $Path # Return FileInfo object referring to saved credentials
}
function Import-PSCredential { #http://halr9000.com/article/531
param ( [string]$Path = "credentials.enc.xml", [string]$CredentialVariable ) #to create a global credential with a specified name
$import = Import-Clixml $Path # Import credential file
# Test for valid import
if ( !$import.UserName -or !$import.EncryptedPassword ) {
Throw "Input is not a valid ExportedPSCredential object, exiting."
}
$Username = $import.Username
$SecurePass = $import.EncryptedPassword | ConvertTo-SecureString # Decrypt the password and store as a SecureString object for safekeeping
$PsCredential = New-Object System.Management.Automation.PSCredential $Username, $SecurePass # Build the new credential object
if ($CredentialVariable) {
New-Variable -Name:$CredentialVariable -Scope:Global -Value:$PsCredential
} else {
return $PsCredential
}
}
if ( $Help ) {
Get-ScriptHelp
exit 0;
}
switch ($UserName) {
$null {
Write-Host -ForegroundColor:Red "UserName is not defined. Exiting..."
Get-ScriptHelp
exit 1;
}
"SU" {
$CredUsrExpr = '(Get-WmiObject -Query "SELECT * FROM Win32_Account WHERE LocalAccount = True AND SID LIKE ""S-1-5-21-%-500""").Caption'
$CredFilenam = Join-Path -Path:$CredDir -ChildPath:$($env:COMPUTERNAME+"_S-1-5-21--500")
}
"EMA" {
$CredUsrExpr = '$env:UserDomain + "\\" + $env:UserName[0] + "ema" + $env:UserName.Remove(0,1)'
$CredFilenam = Join-Path -Path:$CredDir -ChildPath:$($env:UserDomain+"_S-1-5-21--ema")
}
default {
$CredUsrExpr = '$UserName'
$CredFilenam = Join-Path -Path:$CredDir -ChildPath:$UserName.Replace("\\","_")
}
}
#Test Credential Directory
if ( -not(Test-Path $CredDir) ) {
New-Item "$CredDir" -Type:Directory -Force -Confirm -Verbose
if ( -not(Test-Path $CredDir) ) {
Write-Warning "Credential directory ""$CredDir"" doesn't exist. Exiting..."
exit 82; # 82 The directory or file cannot be created.
}
}
if ( $DeleteCredential ) {
if ( Test-Path $CredFilenam) {
Write-Host "Deleting credential:""$CredFilenam"" ..." -ForegroundColor:Yellow
Remove-Item -Path $CredFilenam -Force -Confirm -Verbose
if ( -not(Test-Path $CredFilenam) ) {
Write-Host -ForegroundColor:Green "$CredFilenam is deleted."
} else {
Write-Host -ForegroundColor:Yellow "$CredFilenam has not been deleted."
}
exit 0;
} else {
Write-Warning "Credential does not exist:$CredFilenam"
exit 2; # 2 The system cannot find the file specified.
}
}
if ( $SaveCredential -or !(Test-Path $CredFilenam) ) {
try {
$PsCred = Get-Credential -Credential:(Invoke-Expression $CredUsrExpr)
}
catch {
"$($Error[0])"
}
} else {
#Import Credential from encrypted file (if exists).
if (Test-Path $CredFilenam) {
$PsCred = Import-PSCredential -Path:"$CredFilenam"
}
}
if ( !$PsCred ) {
Write-Warning "Credential is not defined. Exiting..."
exit 1326; # 1326 Logon failure: unknown user name or bad password.
}
try {
#Setup arguments of Start-Process based on Script parameters
if ( $FilePath ) {
if ( $ScriptUnbArgs ) {
if ( ( ".exe",".com",".bat",".cmd" | Foreach-Object { $FilePath.EndsWith($_) } ) -contains $True ) {
Start-Process -LoadUserProfile -Credential:$PsCred -FilePath:$FilePath -ArgumentList:$ScriptUnbArgs
} else {
Start-Process -LoadUserProfile -Credential:$PsCred -FilePath:Cmd.exe -ArgumentList:"/C start ""PS_Process_Starter"" /B ""$FilePath"" $ScriptUnbArgs"
}
} else { # No args
if ( ( ".exe",".com",".bat",".cmd" | Foreach-Object { $FilePath.EndsWith($_) } ) -contains $True ) {
Start-Process -LoadUserProfile -Credential:$PsCred -FilePath:$FilePath
} else {
Start-Process -LoadUserProfile -Credential:$PsCred -FilePath:Cmd.exe -ArgumentList:"/C start ""PS_Process_Starter"" /B ""$FilePath"""
}
}
} else {
Start-Process -LoadUserProfile -Credential:$PsCred -FilePath:Cmd.exe -ArgumentList:"/K Title $($PsCred.UserName): $($MyInvocation.Line)"
}
}
catch {
#Error handling...
Write-Host -ForegroundColor:Red "runas:$($PsCred.UserName):`t $($MyInvocation.Line)"
"$($Error[0])"
#Password has been changed...
if ( ($Error[0] -match "Logon failure: unknown user name or bad password") -and !$SaveCredential ) {
if ( Test-Path $CredFilenam ) {
Write-Host -ForegroundColor:Yellow "Deleting invalid credential. Use -SaveCredential next time to save it again."
Remove-Item -Path $CredFilenam -Force -Confirm -Verbose
if ( -not(Test-Path $CredFilenam) ) {
Write-Host -ForegroundColor:Green "$CredFilenam is deleted. Exiting..."
} else {
Write-Host -ForegroundColor:Yellow "$CredFilenam has not been deleted."
}
exit 1326; # Logon failure: unknown user name or bad password.
}
} else {
exit 1;
}
}
if ( !$Error ) { # There were not errors:
Write-Host -ForegroundColor:Green "runas:$($PsCred.UserName):`t $($MyInvocation.Line)"
#Export credential:
if ( $SaveCredential ) {
Write-Host "Saving credential:""$CredFilenam"" ..."
Export-PSCredential -Credential $PsCred -Path "$CredFilenam"
try { (Get-Item -Force $CredFilenam).Encrypt() }
catch {
"$($Error[0])"
}
if ((Get-Item -Force $CredFilenam).Attributes -match "Encrypted") {
Write-Host -ForegroundColor:Green "$((Get-Item -Force $CredFilenam).Attributes)"
} else {
Write-Warning "$CredFilenam is not encrypted. Deleting..."
Remove-Item -Path "$CredFilenam" -Force -Confirm -Verbose
}
}
if ( $RdpSaveCredential ) {
if (Test-Path $RdpFilenam) {
Write-Host "Saving credential:""$RdpFilenam"" $((Get-Item -Force $RdpFilenam).Attributes) ..."
if ( (Get-Item -Force $RdpFilenam).Attributes -notmatch "Encrypted" ) { # ReadOnly, Archive, Encrypted
(Get-Item -Force $RdpFilenam).Attributes = "Archive"
try {
(Get-Item -Force $RdpFilenam).Encrypt()
}
catch {
"$($Error[0])"
}
} # if $RdpFilenam not Encrypted
(Get-Item -Force $RdpFilenam).Attributes = "ReadOnly, Archive, Encrypted"
if ( (Get-Item -Force $RdpFilenam).Attributes -notmatch "Encrypted" ) {
Write-Warning "$RdpFilenam is not encrypted!"
}
Write-Host "Creating backup:"
$RdpFileBak = $RdpFilenam + $(Get-Date -Format:_yyyyMMdd_HHmmss)
Copy-Item $RdpFilenam $RdpFileBak -Force -Confirm
if ( Test-Path $RdpFileBak ) {
if ( !$PsCred.GetNetworkCredential().Domain ) { $PsCred.GetNetworkCredential().Domain = $env:ComputerName }
$RdpFileLines = switch -regex -File:"$RdpFilenam" {
"username:s:*" { }
"domain:s:*" { }
"password 51:b:*" { }
default { $_ }
}
[array] $RdpFileLines += "username:s:" + $($PsCred.GetNetworkCredential().UserName)
$RdpFileLines += "domain:s:" + $($PsCred.GetNetworkCredential().Domain)
$RdpFileLines += "password 51:b:" + $($PsCred.Password | ConvertFrom-SecureString)
Set-Content -Value:$RdpFileLines -Path:$RdpFilenam -Force
Write-Host "Credential saved:""$RdpFilenam""`t $((Get-Item -Force $RdpFilenam).Attributes)" -ForegroundColor:Green
$RdpFileLines | Select-Object -Last:3
} # if ( Test-Path $RdpFileBak )
} else {
Write-Warning "File does not exist:""$RdpFilenam"". Generate an RDP profile first."
exit 2; # 2 The system cannot find the file specified.
} # if (Test-Path $RdpFilenam)
} # if ( $RdpSaveCredential )
Start-Sleep -Milliseconds 2000
} else {
exit 1;
} # if ( !$Error )
# su.ps1 runs on powershell 2.0 only! http://connect.microsoft.com/PowerShell
# Put su.ps1 and su.bat to a directory listed in PATH environment variables.
# content of su.bat: (without hashmarks of course :)
#
#@echo off
#PowerShell.exe -ExecutionPolicy RemoteSigned su.ps1 %*
#if NOT [%ErrorLevel%] == [0] (
# if [%ErrorLevel%] == [9009] (
# echo PowerShell.exe is not under %%Path%% or Poweshell 2.0 has not been installed.
# echo http://www.microsoft.com/powershell
# )
#
# if NOT [%1] == [] ( echo For usage type su -Help )
# pause
#)
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.