full_path
stringlengths 31
232
| filename
stringlengths 4
167
| content
stringlengths 0
48.3M
|
|---|---|---|
combined_dataset/train/non-malicious/sample_63_21.ps1
|
sample_63_21.ps1
|
#
# Module manifest for module 'OCI.PSModules.Integration'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Integration.dll'
# Version number of this module.
ModuleVersion = '85.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '5ec25c15-0aff-44af-9aaa-8441460571eb'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Integration Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Integration.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Enable-OCIIntegrationProcessAutomation',
'Get-OCIIntegrationInstance', 'Get-OCIIntegrationInstancesList',
'Get-OCIIntegrationWorkRequest',
'Get-OCIIntegrationWorkRequestErrorsList',
'Get-OCIIntegrationWorkRequestLogsList',
'Get-OCIIntegrationWorkRequestsList',
'Move-OCIIntegrationInstanceCompartment',
'Move-OCIIntegrationInstanceNetworkEndpoint',
'Move-OCIIntegrationPrivateEndpointOutboundConnection',
'New-OCIIntegrationInstance', 'Remove-OCIIntegrationInstance',
'Start-OCIIntegrationInstance', 'Stop-OCIIntegrationInstance',
'Update-OCIIntegrationInstance'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Integration'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_23_45.ps1
|
sample_23_45.ps1
|
###########################################################
#
# 'ExtensionService' module
#
###########################################################
$ErrorActionPreference = 'Stop'
Set-StrictMode -Version Latest
Import-Module "$PSScriptRoot\ServiceHelper.psm1"
$script:GCInstallPath = "$PSScriptRoot\..\..\.."
$script:GCBinariesFolderName = "GC"
$script:GCBinariesPath = Join-Path $script:GCInstallPath $script:GCBinariesFolderName
$script:OperationRetryCount = 5
<#
.SYNOPSIS
Install Guest Configuration Extension Service.
.Example
Install-ExtensionService
#>
Function Install-ExtensionService {
[CmdletBinding()]
Param()
Write-Verbose -Message "In Install-ExtensionService"
$ServiceType = "Extension"
$gcConfigPath = Join-Path $script:GCBinariesPath 'gc.config'
'{ "ServiceType": "Extension" }' | Out-File $gcConfigPath -Encoding utf8
New-Item $(Get-GuestConfigDataPath) -Force -ItemType Directory
Set-AclPermissions -ServiceType $ServiceType -Path $(Get-GuestConfigDataPath)
$packagesPath = Join-Path $env:SystemDrive 'Packages'
$extensionInstallPath = Join-Path $packagesPath 'Plugins'
if (!(Test-Path -Path $extensionInstallPath))
{
# Create extension install directory if it doesn't exist
New-Item $extensionInstallPath -Force -ItemType Directory
}
Set-AclPermissions -ServiceType $ServiceType -Path $extensionInstallPath
Invoke-ScriptWithRetry -Script {
[CmdletBinding()]
Param()
# Install GC Service and verify it is installed correctly.
Install-ServiceInternal -ServiceType "Extension"
} -RetryCount $script:OperationRetryCount -Verbose:($PSBoundParameters['Verbose'] -eq $true)
}
<#
.SYNOPSIS
Enable and start Guest Configuration Extension Service.
.Example
Enable-ExtensionService
#>
Function Enable-ExtensionService {
[CmdletBinding()]
Param()
Invoke-ScriptWithRetry -Script {
[CmdletBinding()]
Param()
Write-Verbose -Message "In Enable-ExtensionService"
$ServiceType = "Extension"
Start-ServiceInternal -ServiceType $ServiceType
} -RetryCount $script:OperationRetryCount -Verbose:($PSBoundParameters['Verbose'] -eq $true)
}
<#
.SYNOPSIS
Uninstall Guest Configuration Extension Service.
.Example
Uninstall-ExtensionService
#>
Function Uninstall-ExtensionService {
[CmdletBinding()]
Param()
Write-Verbose -Message "In Uninstall-ExtensionService"
$ServiceType = "Extension"
# Unregister GC Service
Uninstall-ServiceInternal -ServiceType $ServiceType
}
<#
.SYNOPSIS
Update Guest Configuration Extension service.
.Example
Update-ExtensionService
#>
Function Update-ExtensionService{
[CmdletBinding()]
Param()
Write-Verbose -Message "In Update-ExtensionService"
}
Export-ModuleMember -Function @(
'Install-ExtensionService',
'Enable-ExtensionService',
'Uninstall-ExtensionService',
'Update-ExtensionService'
)
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCALlNBTkFMvQNzJ
# babyhzSqcfsu9XXh3hKpjS5zPO2U2KCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICd6lDcaMbiGzvIuiPF29+5B
# 15kGK6LA3sYRwkqpr26SMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAX/Z0rRzoMjIK8uSVZqBy0N4z5WzzSSk1K2I37De0Y5BEV4zIx5J9GOwy
# RHQc3PZqC15aHtUnpccsAKT0Jmf4oQeXjmzctbuDvVQzNsA2nXtYenTZgQU5lN+V
# Pv+VVC0KaVCA0AYKbesCQZDjqeo/asiQ+HSqgklqwVVXxPCYRRbz6LUWvDWlppeA
# ZrlrO1UKhvRoxS9LqgpobsYtEWPLWQPfpsVxqZ9szgL9KMUfdfQpL5deH03X1sqw
# klLxF2jk4+5ObmRvjnnoS6CasCnvrwnA0H47mvVWHpbhP7f5pw0sg5j1v9O/ev09
# OSa4Dp4KT5k67dAU6XJfhQ6IHYpCE6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBbgV3hyr+Ds8663VeFbPcQqSKULEy7HvRV+sO+/UuaOQIGZdX8MFKB
# GBMyMDI0MDIyNjAzMDQwOC44MTFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC
# ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9
# aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2
# +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C
# cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH
# +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD
# K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5
# HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD
# kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN
# x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA
# ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS
# +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc
# v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi
# fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk
# EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi
# MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI
# yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU
# OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi
# xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH
# Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71
# RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq
# xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp
# O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR
# NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr
# xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz
# QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOmGaL4wIhgPMjAyNDAyMjYwOTMyNDZaGA8yMDI0MDIyNzA5MzI0NlowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6YZovgIBADAHAgEAAgIQEzAHAgEAAgIRZTAKAgUA
# 6Ye6PgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAGwmKek3XcI95mxvJ/ie
# o7HFtGPU3M2MszGxf0tFYuTnFViTxvNO8DtdgbxciqEp6wkRRsZMenW90IZVhLMC
# FqlMdZ74H9FixCusLU8u5X9wuV4vAikMe2QhQoXbNXleLoAyR+Ep4BSMZdLym9bg
# AfqfqZGp70rQ4zvUyFhToI2RMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgCQ0Smhh2SPJYKU97FMmnWHcm7GgdrqQpzb3Ycon4uu8wgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69
# 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q
# wPM9tAujAAEAAAHlMCIEIGgmCF4LH/m3u4pOGeSXYlC78LfR16hR5SyL2BiKHdIp
# MA0GCSqGSIb3DQEBCwUABIICAJund8Q+QxpC9S2OuAc9N0szO25TNF3WeUDe/ijY
# XbKTasaEG/jHeDA+WNG3khGJYGCZ/LjZiL1nGubaU5Ao8rskk2FUV7MkojQlo4PU
# GZLk0XOSiNCFDaoQ4xM5mgvqnsKJ+rwq7uuJdZfrr/S0cgc2xNkkk3Ic8pv6a/5i
# O4PX/lEU3lO8ctywX2JlBxbpA0Pdi/HwM9CyT5Es2VHKTh5wGQ83IkatZ98cbqNA
# F+zHRX8IEgkPXFqVC0DEL4g05JmSd4T4SOK/etkxTn4g70e5FG7fk4bCnR+2Qy+s
# OqBy7zOq1TfGzTgC1YrS/JNwCoZZphZKMyx3Z0Gsx8Fr/C8r5A5EBn/hVOvM20nD
# 7IwHAX8UMB1QS2JkSFWrH5tM7skDQ8LN6B2lkk+5YF9Hh4z27ga+TBhqIj2rsyK1
# 3mKhmoHjSrXjzVM8eswWQMG4G+xntmZkJ8F99MHsWfWLUsC84KjTUFgRk/S+eSH7
# g9hOzxhGYGaw6KB3ciWmfo0KR/I4amv0qiSpdwmQTRUZEslslhNUgGocVpfEi70Z
# 2e92A/p5GCWkrNG0Y6Ms5Mhj+WBHJ6HYz8O8Y3EoNb5Pwg1vUrWwB5W2JJVz1vJA
# ahgerfs9Db04HoKskejoQojlCw01cQmmudZi/X5sS0sWhf+QDOvotIsmf73kKpsx
# NoMG
# SIG # End signature block
|
combined_dataset/train/non-malicious/Protect-Variable.ps1
|
Protect-Variable.ps1
|
function Protect-Variable {
param(
[Parameter(Mandatory=$true,Position=0)][String]$Name, [Int]$Scope = 1,
[Parameter(ParameterSetName="ValidateScriptBlock")][ScriptBlock]$ScriptBlock,
[Parameter(ParameterSetName="ValidateCount")][Int]$MinCount,
[Parameter(ParameterSetName="ValidateCount")][Int]$MaxCount,
[Parameter(ParameterSetName="ValidateLength")][Int]$MinLength,
[Parameter(ParameterSetName="ValidateLength")][Int]$MaxLength,
[Parameter(ParameterSetName="ValidatePattern")][Regex]$Pattern,
[Parameter(ParameterSetName="ValidateRange")][Int]$MinValue,
[Parameter(ParameterSetName="ValidateRange")][Int]$MaxValue,
[Parameter(ParameterSetName="ValidateSet")][String[]]$Set,
[Parameter(ParameterSetName="ValidateNotNull")][Switch]$NotNull,
[Parameter(ParameterSetName="ValidateNotNullOrEmpty")][Switch]$NotEmpty
)
$Variable = Get-Variable $Name -Scope 1
if($ScriptBlock) {
$Attribute = new-object System.Management.Automation.ValidateScriptAttribute $ScriptBlock
$Variable.Attributes.Add($Attribute)
}
if($MinCount -or $MaxCount) {
if(!$MinCount) { $MinCount = [Int]::MinValue }
if(!$MaxCount) { $MaxCount = [Int]::MaxValue }
$Attribute = new-object System.Management.Automation.ValidateCountAttribute $MinCount, $MaxCount
$Variable.Attributes.Add($Attribute)
}
if($MinLength -or $MaxLength) {
$Attribute = new-object System.Management.Automation.ValidateLengthAttribute $MinLength, $MaxLength
$Variable.Attributes.Add($Attribute)
}
if($Pattern) {
$Attribute = new-object System.Management.Automation.ValidatePatternAttribute $Pattern
$Variable.Attributes.Add($Attribute)
}
if($MinValue -or $MaxValue) {
$Attribute = new-object System.Management.Automation.ValidateRangeAttribute $MinValue, $MaxValue
$Variable.Attributes.Add($Attribute)
}
if($Set) {
$Attribute = new-object System.Management.Automation.ValidateSetAttribute $Set
$Variable.Attributes.Add($Attribute)
}
if($NotNull) {
$Attribute = new-object System.Management.Automation.ValidateNotNullAttribute
$Variable.Attributes.Add($Attribute)
}
if($NotEmpty) {
$Attribute = new-object System.Management.Automation.ValidateNotNullOrEmptyAttribute
$Variable.Attributes.Add($Attribute)
}
}
|
combined_dataset/train/non-malicious/sample_20_99.ps1
|
sample_20_99.ps1
|
#
# Module manifest for module 'OCI.PSModules.Ocvp'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Ocvp.dll'
# Version number of this module.
ModuleVersion = '77.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '05a069dc-62d0-41ee-b47b-3fe73fff277d'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Ocvp Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Ocvp.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIOcvpCluster', 'Get-OCIOcvpClustersList',
'Get-OCIOcvpEsxiHost', 'Get-OCIOcvpEsxiHostsList', 'Get-OCIOcvpSddc',
'Get-OCIOcvpSddcsList', 'Get-OCIOcvpSupportedCommitmentsList',
'Get-OCIOcvpSupportedHostShapesList',
'Get-OCIOcvpSupportedVmwareSoftwareVersionsList',
'Get-OCIOcvpWorkRequest', 'Get-OCIOcvpWorkRequestErrorsList',
'Get-OCIOcvpWorkRequestLogsList', 'Get-OCIOcvpWorkRequestsList',
'Invoke-OCIOcvpDowngradeHcx', 'Invoke-OCIOcvpInplaceUpgrade',
'Invoke-OCIOcvpRefreshHcxLicenseStatus',
'Invoke-OCIOcvpReplaceHost', 'Invoke-OCIOcvpRetrievePassword',
'Invoke-OCIOcvpSwapBilling', 'Invoke-OCIOcvpUpgradeHcx',
'Move-OCIOcvpSddcCompartment', 'New-OCIOcvpCluster',
'New-OCIOcvpEsxiHost', 'New-OCIOcvpSddc', 'Remove-OCIOcvpCluster',
'Remove-OCIOcvpEsxiHost', 'Remove-OCIOcvpSddc',
'Stop-OCIOcvpDowngradeHcx', 'Update-OCIOcvpCluster',
'Update-OCIOcvpEsxiHost', 'Update-OCIOcvpSddc'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Ocvp'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_11_12.ps1
|
sample_11_12.ps1
|
#************************************************
# TS_UnableToAddNetworkPrintersErrorCheck.ps1
# Version 1.0.1
# Date: 7/19/2013
# Author: v-kaw
# Description: [KSE Rule] [ Windows V3] Presence of lots of folders inside \spool\prtprocs\ causes failure to install print queues
# Rule number: d4047602-196c-443f-934c-75bd2ee855c1
# Rule URL: https://kse.microsoft.com/Contribute/Idea/cf91ba77-df0b-4b11-8c0c-9df9bff5c1e7
#************************************************
Import-LocalizedData -BindingVariable ScriptStrings
Display-DefaultActivity -Rule -RuleNumber d4047602-196c-443f-934c-75bd2ee855c1
$RuleApplicable = $false
$RootCauseDetected = $false
$RootCauseName = "RC_PrtprocsSubfolderBloat"
$InformationCollected = new-object PSObject
# ***************************
# Data Gathering
# ***************************
Function AppliesToSystem
{
#Windows server 2008 \2008 r2
if(($OSVersion.Major -eq 6) -and (($OSVersion.Minor -eq 0)-or ($OSVersion.Minor -eq 1)))
{
if((Get-CimInstance Win32_OperatingSystem).ProductType -gt 1)
{
return $true
}
}
return $false
}
# **************
# Detection Logic
# **************
Function CheckEventAndRecordEventInfo($EventLogName,$EventId)
{
trap [Exception]
{
WriteTo-ErrorDebugReport -ErrorRecord $_ -ScriptErrorText "Error occurs while querying event log"
$Error.Clear()
continue
}
$EventInfo = ""
if(($null -ne $EventLogName) -and ($null -ne $EventId))
{
$strQuery = "*[System[(EventID=$EventId) and TimeCreated[timediff(@SystemTime) <= 604800000]]]"
$CommandToRun = "wevtutil.exe qe `"$EventLogName`" /q:`"$strQuery`" /c:1"
$EventInfo = Invoke-Expression $CommandToRun -ErrorAction Continue
}
if (($Error.Count -eq 0) -and ($null -ne $EventInfo))
{
add-member -inputobject $InformationCollected -membertype noteproperty -name "Event Log Name" -value $EventLogName
add-member -inputobject $InformationCollected -membertype noteproperty -name "Event Number" -value $EventId
$EventDate = ([xml]$EventInfo).Event.System.TimeCreated.SystemTime
add-member -inputobject $InformationCollected -membertype noteproperty -name "Event Date" -value ([DateTime]::Parse($EventDate).ToLocalTime())
return $true
}
return $false
}
Function CheckNumberOfSubFolderForPrtprocs
{
if($OSArchitecture.EndsWith("64"))
{
$FolderToBeCheck = Join-Path -Path $Env:windir "System32\spool\prtprocs\x64"
}
else
{
$FolderToBeCheck = Join-Path -Path $Env:windir "System32\spool\prtprocs\w32x86"
}
if(Test-Path $FolderToBeCheck)
{
$numberOfSubforders = ([System.IO.Directory]::GetDirectories($FolderToBeCheck)).Count
if($numberOfSubforders -gt 10)
{
add-member -inputobject $InformationCollected -membertype noteproperty -name "Folder Name" -value ($FolderToBeCheck.Substring($FolderToBeCheck.IndexOf("\spool")))
add-member -inputobject $InformationCollected -membertype noteproperty -name "Number of Subfolder" -value $numberOfSubforders
return $true
}
}
return $false
}
#Check to see if rule is applicable to this computer
if (AppliesToSystem)
{
$RuleApplicable = $true
if (CheckNumberOfSubFolderForPrtprocs)
{
if(CheckEventAndRecordEventInfo -EventId 215 -EventLogName "Microsoft-Windows-PrintService/Admin")
{
$RootCauseDetected = $true
}
else
{
if(CheckEventAndRecordEventInfo -EventId 213 -EventLogName "Microsoft-Windows-PrintService/Operational")
{
$RootCauseDetected = $true
}
}
}
}
# *********************
# Root Cause processing
# *********************
if ($RuleApplicable)
{
if ($RootCauseDetected)
{
# Red/ Yellow Light
Update-DiagRootCause -id $RootCauseName -Detected $true
Add-GenericMessage -Id $RootCauseName -InformationCollected $InformationCollected
}
else
{
# Green Light
Update-DiagRootCause -id $RootCauseName -Detected $false
}
}
# SIG # Begin signature block
# MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCARy7+rSmqlv5If
# zGjWiMqKJZ1pUwOPLLy0GjMP8oi1A6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEQRcDbBuVmc6Q7xiNV4BYYv
# VOFbBTxBvzj8QtcWjAYTMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAXwyHJGPH4e1xIfdLdEPEM0tuMUW+1i2rCYowpiflj13zUbMaysMoxDCy
# FDHxt6GBFBoFmNNf8c3l311Xc4TAFSssxJtFqfqj60Xv5iKjNtsgAsAnlpDvgUsk
# czpe7pZHiNv2S252pT295gmocFfu1gHJX8cUarB3n/0E6HQn3twn6JV2Wyq+61zj
# cLSaosQqUnlt6DQKcB0nlp8YBTyLlqhqPXwckUAydWMXosspQnfsCtUufhgrp0cd
# uGG13HzWWmm1dR34vb/CabWAfI26pw/T291tvVA2HSNKgtaz/G//dxl0RV7XlUUz
# 9N8tw2W28c/Lrao6/E5e2wEGpStv0aGCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC
# F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDoHKQk8/PEsMkhxrqOpRKt0GYcNFDrLF0yj8f2MuWOVgIGZut+oGFF
# GBMyMDI0MTAyODExNDAzOS43ODlaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/Bigr8xpWoc6AAEAAAH8MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzExNFoXDTI1MTAyMjE4MzExNFowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjZGMUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAp1DAKLxpbQcPVYPHlJHy
# W7W5lBZjJWWDjMfl5WyhuAylP/LDm2hb4ymUmSymV0EFRQcmM8BypwjhWP8F7x4i
# O88d+9GZ9MQmNh3jSDohhXXgf8rONEAyfCPVmJzM7ytsurZ9xocbuEL7+P7EkIwo
# OuMFlTF2G/zuqx1E+wANslpPqPpb8PC56BQxgJCI1LOF5lk3AePJ78OL3aw/Ndlk
# vdVl3VgBSPX4Nawt3UgUofuPn/cp9vwKKBwuIWQEFZ837GXXITshd2Mfs6oYfxXE
# tmj2SBGEhxVs7xERuWGb0cK6afy7naKkbZI2v1UqsxuZt94rn/ey2ynvunlx0R6/
# b6nNkC1rOTAfWlpsAj/QlzyM6uYTSxYZC2YWzLbbRl0lRtSz+4TdpUU/oAZSB+Y+
# s12Rqmgzi7RVxNcI2lm//sCEm6A63nCJCgYtM+LLe9pTshl/Wf8OOuPQRiA+stTs
# g89BOG9tblaz2kfeOkYf5hdH8phAbuOuDQfr6s5Ya6W+vZz6E0Zsenzi0OtMf5RC
# a2hADYVgUxD+grC8EptfWeVAWgYCaQFheNN/ZGNQMkk78V63yoPBffJEAu+B5xlT
# PYoijUdo9NXovJmoGXj6R8Tgso+QPaAGHKxCbHa1QL9ASMF3Os1jrogCHGiykfp1
# dKGnmA5wJT6Nx7BedlSDsAkCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSY8aUrsUaz
# hxByH79dhiQCL/7QdjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAT7ss/ZAZ0bTa
# FsrsiJYd//LQ6ImKb9JZSKiRw9xs8hwk5Y/7zign9gGtweRChC2lJ8GVRHgrFkBx
# ACjuuPprSz/UYX7n522JKcudnWuIeE1p30BZrqPTOnscD98DZi6WNTAymnaS7it5
# qAgNInreAJbTU2cAosJoeXAHr50YgSGlmJM+cN6mYLAL6TTFMtFYJrpK9TM5Ryh5
# eZmm6UTJnGg0jt1pF/2u8PSdz3dDy7DF7KDJad2qHxZORvM3k9V8Yn3JI5YLPuLs
# o2J5s3fpXyCVgR/hq86g5zjd9bRRyyiC8iLIm/N95q6HWVsCeySetrqfsDyYWStw
# L96hy7DIyLL5ih8YFMd0AdmvTRoylmADuKwE2TQCTvPnjnLk7ypJW29t17Yya4V+
# Jlz54sBnPU7kIeYZsvUT+YKgykP1QB+p+uUdRH6e79Vaiz+iewWrIJZ4tXkDMmL2
# 1nh0j+58E1ecAYDvT6B4yFIeonxA/6Gl9Xs7JLciPCIC6hGdliiEBpyYeUF0ohZF
# n7NKQu80IZ0jd511WA2bq6x9aUq/zFyf8Egw+dunUj1KtNoWpq7VuJqapckYsmvm
# mYHZXCjK1Eus7V1I+aXjrBYuqyM9QpeFZU4U01YG15uWwUCaj0uZlah/RGSYMd84
# y9DCqOpfeKE6PLMk7hLnhvcOQrnxP6kwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUATkEpJXOaqI2wfqBsw4NLVwqYqqqggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJZP4wIhgPMjAyNDEwMjgwMTE4NTRaGA8yMDI0MTAyOTAxMTg1NFowdzA9
# BgorBgEEAYRZCgQBMS8wLTAKAgUA6slk/gIBADAKAgEAAgIj+QIB/zAHAgEAAgIV
# OjAKAgUA6sq2fgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow
# CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAqtLGFlstr
# sb+SvUvbr1hLCetkINEwDxfniiboUQVt4GeQLoY14M6leM9y61oAgIF33fHJalc0
# m6hRYHUUukHmnf8OOSaTiiX/nslEh3oTsZMRPqzR1k5LfvMp3a2pIDntcYlMbl2o
# yGD7wib38kMuMk5xFDVhvCk9VkAOFUb8IsBonqOwm32MCwxu4PiML3KP595ks9mt
# 6PxX1auBQ1gIcLfYEno+8vVKQpYBwZyizAA8LlxCwE+atWpPKH7AHBCaUnoWAwdk
# m5NtHKLBGrmDUjlyWtaRXvWXYJdFC3R4GSvWAAdmbfao2+coyd9IdOXkz3f7u7vY
# B3P4HYG5NEz1MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAH8GKCvzGlahzoAAQAAAfwwDQYJYIZIAWUDBAIBBQCgggFKMBoG
# CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgLkGH28AS
# BLUqRks+VPEzIoIQyEcQFo1GzeUbQRFLK3kwgfoGCyqGSIb3DQEJEAIvMYHqMIHn
# MIHkMIG9BCCVQq+Qu+/h/BOVP4wweUwbHuCUhh+T7hq3d5MCaNEtYjCBmDCBgKR+
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB/Bigr8xpWoc6AAEA
# AAH8MCIEINOFZp4mWvilNmu2oP8JaiDsbYhML+c3SwBUR/vJ4UAWMA0GCSqGSIb3
# DQEBCwUABIICAEtmId4d+pKAuxsnnoHcDpoWxmRCpyxtcIOld3ZPthhLaOxqt8C9
# fi1wb7wANkMTH62cDKDimsdzNin8ddMHfOY1yW1d/0/mZBvX3wto3YwfBgei/ACW
# e/EQRTss5lsFzf/Tde2PbhZr6bAsqyr8n6vktU/CVn3K75nmV0+t3S4gpz+zm+Zj
# 2jxPBF2ubbKQlXwfTg6+WdllBKjxIoP3XKjllA11d31ibkv4z64HlVtMHs+YlOqk
# 6EpqJLtrqpza8MuZ2EWhw3v8uddlccpTzlTXJo7z4QCBC80e+iWMmymfRCDykvyu
# aDSTUIzoR5GF0iiq9kfuWP9mXoH8uUFuodVq/8IWeu9+MjgEIhvUsOBsU4MGJlDm
# mcXfj8U/I1K1RgFtDnA/LNIMfA86Uh23I+6fiRBSYte3r7+hpihVit296KEOJJus
# gPKeae/ngX69RPbQ3z7QaE4N23rR2POkzyVZLwl0/Fw3Kvozxxdodz2NHd5xRovL
# vaTSwHo7Y7tzhCgcsvAXZo3o7W21NNJkg4DgJ6Xq0oPl1A7jmWPiYJpiC0+KK/um
# KUkH9FKyX9SkwYDlVt3ZO/4iFgBOHz+wjDjf8tf6jH0VQ2h7tUtFlONoswXcE9oW
# nRk2BFhGUPS5sY/IfiqqAIA5FizjdTw4YnKz7IRLn2kXMqIkq4uOtdnx
# SIG # End signature block
|
combined_dataset/train/non-malicious/Get-FailingDrive.ps1
|
Get-FailingDrive.ps1
|
Function Get-FailingDrive {
<#
.SYNOPSIS
Checks for any potentially failing drives and reports back drive information.
.DESCRIPTION
Checks for any potentially failing drives and reports back drive information. This only works
against local hard drives using SMART technology. Reason values and their meanings can be found
here: http://en.wikipedia.org/wiki/S.M.A.R.T#Known_ATA_S.M.A.R.T._attributes
.PARAMETER Computer
Remote or local computer to check for possible failed hard drive.
.PARAMETER Credential
Provide alternate credential to perform query.
.NOTES
Author: Boe Prox
Version: 1.0
http://learn-powershell.net
.EXAMPLE
Get-FailingDrive
WARNING: ST9320320AS ATA Device may fail!
MediaType : Fixed hard disk media
InterFace : IDE
DriveName : ST9320320AS ATA Device
Reason : 1
SerialNumber : 202020202020202020202020533531584e5a4d50
FailureImminent : True
Description
-----------
Command ran against the local computer to check for potential failed hard drive.
#>
[cmdletbinding()]
Param (
[parameter(ValueFromPipeline=$True,ValueFromPipelineByPropertyName=$True)]
[string[]]$Computername,
[parameter()]
[System.Management.Automation.PSCredential]$Credential
)
Begin {
$queryhash = @{}
$BadDriveHash = @{}
}
Process {
ForEach ($Computer in $Computername) {
If ($PSBoundParameters['Computer']) {
$queryhash['Computername'] = $Computer
$BadDriveHash['Computername'] = $Computer
} Else {
$queryhash['Computername'] = $Env:Computername
$BadDriveHash['Computername'] = $Env:Computername
}
If ($PSBoundParameters['Credential']) {
$queryhash['Credential'] = $Credential
$BadDriveHash['Credential'] = $Credential
}
Write-Verbose "Creating SplatTable"
$queryhash['NameSpace'] = 'root\\wmi'
$queryhash['Class'] = 'MSStorageDriver_FailurePredictStatus'
$queryhash['Filter'] = "PredictFailure='False'"
$queryhash['ErrorAction'] = 'Stop'
$BadDriveHash['Class'] = 'win32_diskdrive'
$BadDriveHash['ErrorAction'] = 'Stop'
[regex]$regex = "(?<DriveName>\\w+\\\\[A-Za-z0-9_]*)\\w+"
Try {
Write-Verbose "Checking for failed drives"
Get-WmiObject @queryhash | ForEach {
$drive = $regex.Matches($_.InstanceName) | ForEach {$_.Groups['DriveName'].value}
Write-Verbose "Gathering more information about failing drive"
$BadDrive = gwmi @BadDriveHash | Where {$_.PNPDeviceID -like "$drive*"}
If ($BadDrive) {
Write-Warning "$($BadDriveHash['Computername']): $($BadDrive.Model) may fail!"
New-Object PSObject -Property @{
DriveName = $BadDrive.Model
FailureImminent = $_.PredictFailure
Reason = $_.Reason
MediaType = $BadDrive.MediaType
SerialNumber = $BadDrive.SerialNumber
InterFace = $BadDrive.InterfaceType
Partitions = $BadDrive.Partitions
Size = $BadDrive.Size
Computer = $BadDriveHash['Computername']
}
}
}
} Catch {
Write-Warning "$($Error[0])"
}
}
}
}
|
combined_dataset/train/non-malicious/sample_13_39.ps1
|
sample_13_39.ps1
|
#
# Module manifest for module 'OCI.PSModules.Loggingingestion'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Loggingingestion.dll'
# Version number of this module.
ModuleVersion = '75.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'ed6ebc41-8c84-4a4f-aaec-c687cb3245b5'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Loggingingestion Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Loggingingestion.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Write-OCILoggingingestionLogs'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Loggingingestion'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_55_4.ps1
|
sample_55_4.ps1
|
import{T as s}from"./index-DktkJoV1.js";/*!-----------------------------------------------------------------------------
* Copyright (c) Microsoft Corporation. All rights reserved.
* Version: 0.47.0(69991d66135e4a1fc1cf0b1ac4ad25d429866a0d)
* Released under the MIT license
* https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt
*-----------------------------------------------------------------------------*/var c=Object.defineProperty,l=Object.getOwnPropertyDescriptor,d=Object.getOwnPropertyNames,p=Object.prototype.hasOwnProperty,i=(t,e,o,n)=>{if(e&&typeof e=="object"||typeof e=="function")for(let r of d(e))!p.call(t,r)&&r!==o&&c(t,r,{get:()=>e[r],enumerable:!(n=l(e,r))||n.enumerable});return t},h=(t,e,o)=>(i(t,e,"default"),o&&i(o,e,"default")),a={};h(a,s);var m=["area","base","br","col","embed","hr","img","input","keygen","link","menuitem","meta","param","source","track","wbr"],b={wordPattern:/(-?\d*\.\d\w*)|([^\`\~\!\@\$\^\&\*\(\)\-\=\+\[\{\]\}\\\|\;\:\'\"\,\.\<\>\/\s]+)/g,comments:{blockComment:["<!--","-->"]},brackets:[["<!--","-->"],["<",">"],["{","}"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}],surroundingPairs:[{open:'"',close:'"'},{open:"'",close:"'"},{open:"<",close:">"}],onEnterRules:[{beforeText:new RegExp(`<(?!(?:${m.join("|")}))(\\w[\\w\\d]*)([^/>]*(?!/)>)[^<]*$`,"i"),afterText:/^<\/(\w[\w\d]*)\s*>$/i,action:{indentAction:a.languages.IndentAction.IndentOutdent}},{beforeText:new RegExp(`<(?!(?:${m.join("|")}))(\\w[\\w\\d]*)([^/>]*(?!/)>)[^<]*$`,"i"),action:{indentAction:a.languages.IndentAction.Indent}}]},y={defaultToken:"",tokenPostfix:"",tokenizer:{root:[[/@@@@/],[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.root"}],[/<!DOCTYPE/,"metatag.html","@doctype"],[/<!--/,"comment.html","@comment"],[/(<)([\w\-]+)(\/>)/,["delimiter.html","tag.html","delimiter.html"]],[/(<)(script)/,["delimiter.html",{token:"tag.html",next:"@script"}]],[/(<)(style)/,["delimiter.html",{token:"tag.html",next:"@style"}]],[/(<)([:\w\-]+)/,["delimiter.html",{token:"tag.html",next:"@otherTag"}]],[/(<\/)([\w\-]+)/,["delimiter.html",{token:"tag.html",next:"@otherTag"}]],[/</,"delimiter.html"],[/[ \t\r\n]+/],[/[^<@]+/]],doctype:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.comment"}],[/[^>]+/,"metatag.content.html"],[/>/,"metatag.html","@pop"]],comment:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.comment"}],[/-->/,"comment.html","@pop"],[/[^-]+/,"comment.content.html"],[/./,"comment.content.html"]],otherTag:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.otherTag"}],[/\/?>/,"delimiter.html","@pop"],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/[ \t\r\n]+/]],script:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.script"}],[/type/,"attribute.name","@scriptAfterType"],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.text/javascript",nextEmbedded:"text/javascript"}],[/[ \t\r\n]+/],[/(<\/)(script\s*)(>)/,["delimiter.html","tag.html",{token:"delimiter.html",next:"@pop"}]]],scriptAfterType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.scriptAfterType"}],[/=/,"delimiter","@scriptAfterTypeEquals"],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.text/javascript",nextEmbedded:"text/javascript"}],[/[ \t\r\n]+/],[/<\/script\s*>/,{token:"@rematch",next:"@pop"}]],scriptAfterTypeEquals:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.scriptAfterTypeEquals"}],[/"([^"]*)"/,{token:"attribute.value",switchTo:"@scriptWithCustomType.$1"}],[/'([^']*)'/,{token:"attribute.value",switchTo:"@scriptWithCustomType.$1"}],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.text/javascript",nextEmbedded:"text/javascript"}],[/[ \t\r\n]+/],[/<\/script\s*>/,{token:"@rematch",next:"@pop"}]],scriptWithCustomType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.scriptWithCustomType.$S2"}],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.$S2",nextEmbedded:"$S2"}],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/[ \t\r\n]+/],[/<\/script\s*>/,{token:"@rematch",next:"@pop"}]],scriptEmbedded:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInEmbeddedState.scriptEmbedded.$S2",nextEmbedded:"@pop"}],[/<\/script/,{token:"@rematch",next:"@pop",nextEmbedded:"@pop"}]],style:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.style"}],[/type/,"attribute.name","@styleAfterType"],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/>/,{token:"delimiter.html",next:"@styleEmbedded.text/css",nextEmbedded:"text/css"}],[/[ \t\r\n]+/],[/(<\/)(style\s*)(>)/,["delimiter.html","tag.html",{token:"delimiter.html",next:"@pop"}]]],styleAfterType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.styleAfterType"}],[/=/,"delimiter","@styleAfterTypeEquals"],[/>/,{token:"delimiter.html",next:"@styleEmbedded.text/css",nextEmbedded:"text/css"}],[/[ \t\r\n]+/],[/<\/style\s*>/,{token:"@rematch",next:"@pop"}]],styleAfterTypeEquals:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.styleAfterTypeEquals"}],[/"([^"]*)"/,{token:"attribute.value",switchTo:"@styleWithCustomType.$1"}],[/'([^']*)'/,{token:"attribute.value",switchTo:"@styleWithCustomType.$1"}],[/>/,{token:"delimiter.html",next:"@styleEmbedded.text/css",nextEmbedded:"text/css"}],[/[ \t\r\n]+/],[/<\/style\s*>/,{token:"@rematch",next:"@pop"}]],styleWithCustomType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.styleWithCustomType.$S2"}],[/>/,{token:"delimiter.html",next:"@styleEmbedded.$S2",nextEmbedded:"$S2"}],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/[ \t\r\n]+/],[/<\/style\s*>/,{token:"@rematch",next:"@pop"}]],styleEmbedded:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInEmbeddedState.styleEmbedded.$S2",nextEmbedded:"@pop"}],[/<\/style/,{token:"@rematch",next:"@pop",nextEmbedded:"@pop"}]],razorInSimpleState:[[/@\*/,"comment.cs","@razorBlockCommentTopLevel"],[/@[{(]/,"metatag.cs","@razorRootTopLevel"],[/(@)(\s*[\w]+)/,["metatag.cs",{token:"identifier.cs",switchTo:"@$S2.$S3"}]],[/[})]/,{token:"metatag.cs",switchTo:"@$S2.$S3"}],[/\*@/,{token:"comment.cs",switchTo:"@$S2.$S3"}]],razorInEmbeddedState:[[/@\*/,"comment.cs","@razorBlockCommentTopLevel"],[/@[{(]/,"metatag.cs","@razorRootTopLevel"],[/(@)(\s*[\w]+)/,["metatag.cs",{token:"identifier.cs",switchTo:"@$S2.$S3",nextEmbedded:"$S3"}]],[/[})]/,{token:"metatag.cs",switchTo:"@$S2.$S3",nextEmbedded:"$S3"}],[/\*@/,{token:"comment.cs",switchTo:"@$S2.$S3",nextEmbedded:"$S3"}]],razorBlockCommentTopLevel:[[/\*@/,"@rematch","@pop"],[/[^*]+/,"comment.cs"],[/./,"comment.cs"]],razorBlockComment:[[/\*@/,"comment.cs","@pop"],[/[^*]+/,"comment.cs"],[/./,"comment.cs"]],razorRootTopLevel:[[/\{/,"delimiter.bracket.cs","@razorRoot"],[/\(/,"delimiter.parenthesis.cs","@razorRoot"],[/[})]/,"@rematch","@pop"],{include:"razorCommon"}],razorRoot:[[/\{/,"delimiter.bracket.cs","@razorRoot"],[/\(/,"delimiter.parenthesis.cs","@razorRoot"],[/\}/,"delimiter.bracket.cs","@pop"],[/\)/,"delimiter.parenthesis.cs","@pop"],{include:"razorCommon"}],razorCommon:[[/[a-zA-Z_]\w*/,{cases:{"@razorKeywords":{token:"keyword.cs"},"@default":"identifier.cs"}}],[/[\[\]]/,"delimiter.array.cs"],[/[ \t\r\n]+/],[/\/\/.*$/,"comment.cs"],[/@\*/,"comment.cs","@razorBlockComment"],[/"([^"]*)"/,"string.cs"],[/'([^']*)'/,"string.cs"],[/(<)([\w\-]+)(\/>)/,["delimiter.html","tag.html","delimiter.html"]],[/(<)([\w\-]+)(>)/,["delimiter.html","tag.html","delimiter.html"]],[/(<\/)([\w\-]+)(>)/,["delimiter.html","tag.html","delimiter.html"]],[/[\+\-\*\%\&\|\^\~\!\=\<\>\/\?\;\:\.\,]/,"delimiter.cs"],[/\d*\d+[eE]([\-+]?\d+)?/,"number.float.cs"],[/\d*\.\d+([eE][\-+]?\d+)?/,"number.float.cs"],[/0[xX][0-9a-fA-F']*[0-9a-fA-F]/,"number.hex.cs"],[/0[0-7']*[0-7]/,"number.octal.cs"],[/0[bB][0-1']*[0-1]/,"number.binary.cs"],[/\d[\d']*/,"number.cs"],[/\d/,"number.cs"]]},razorKeywords:["abstract","as","async","await","base","bool","break","by","byte","case","catch","char","checked","class","const","continue","decimal","default","delegate","do","double","descending","explicit","event","extern","else","enum","false","finally","fixed","float","for","foreach","from","goto","group","if","implicit","in","int","interface","internal","into","is","lock","long","nameof","new","null","namespace","object","operator","out","override","orderby","params","private","protected","public","readonly","ref","return","switch","struct","sbyte","sealed","short","sizeof","stackalloc","static","string","select","this","throw","true","try","typeof","uint","ulong","unchecked","unsafe","ushort","using","var","virtual","volatile","void","when","while","where","yield","model","inject"],escapes:/\\(?:[abfnrtv\\"']|x[0-9A-Fa-f]{1,4}|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})/};export{b as conf,y as language};
|
combined_dataset/train/non-malicious/sample_47_50.ps1
|
sample_47_50.ps1
|
#
# Module manifest for module 'Az.LoadTesting'
#
# Generated by: Microsoft Corporation
#
# Generated on: 23/04/2024
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'Az.LoadTesting.psm1'
# Version number of this module.
ModuleVersion = '1.0.1'
# Supported PSEditions
CompatiblePSEditions = 'Core', 'Desktop'
# ID used to uniquely identify this module
GUID = '739ddedf-3d49-40e0-bc84-00bedfe6b2ec'
# Author of this module
Author = 'Microsoft Corporation'
# Company or vendor of this module
CompanyName = 'Microsoft Corporation'
# Copyright statement for this module
Copyright = 'Microsoft Corporation. All rights reserved.'
# Description of the functionality provided by this module
Description = 'Microsoft Azure PowerShell: LoadTesting cmdlets'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '5.1'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
DotNetFrameworkVersion = '4.7.2'
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'LoadTesting.Autorest/bin/Az.LoadTesting.private.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
FormatsToProcess = 'LoadTesting.Autorest\Az.LoadTesting.format.ps1xml'
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
NestedModules = @('LoadTesting.Autorest/Az.LoadTesting.psm1')
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = 'Get-AzLoad', 'New-AzLoad', 'Remove-AzLoad', 'Update-AzLoad'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = @()
# Variables to export from this module
# VariablesToExport = @()
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = @()
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'Azure','ResourceManager','ARM','PSModule','LoadTesting'
# A URL to the license for this module.
LicenseUri = 'https://aka.ms/azps-license'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/Azure/azure-powershell'
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
ReleaseNotes = '* Introduced secrets detection feature to safeguard sensitive data.'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
# SIG # Begin signature block
# MIIn0QYJKoZIhvcNAQcCoIInwjCCJ74CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDQgNNTuw9q4wDK
# lEEpvnsXIJ47dxLPh4/FyVVWJoSD0KCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOxc
# RVlNPnp4370AN65v4NVPKROMg+wdqwZeTII+Z2/7MEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEA713PSMfx7LLdBIUebykyQ2/TIIKPMJ4TBLEs
# a/yEIYBGiJkg4NCzmHFXhdynBLl3bLU3wi5GD1liG2Ag75vRXZjn1XGN04cMS4/3
# ACW+utV5Ee42p1AGOc0s5a5ujXpzilGuA1RG7v+S+WJG1nrivPPnv2QbxJ3EY8Sf
# USPZxf8wsLVN96cOBnIuH902U1B1MRX6tKoV7K6DS4Xxgg2ie3WRIXJX5V1ZglR2
# uAd7dQxUxqjVOZOrzvTOxTm8cFTyNNoXFOpvcYJTwDQAFZLzrqI1XFLJsBFOBohi
# U+Jge7/f+t7A0GTP5Wa0b+tK6zIa10nQDV8zQwGrfgcEvtqnQqGCFywwghcoBgor
# BgEEAYI3AwMBMYIXGDCCFxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCC03/0heEdE5nyjdbUPEDEoW0yYg1M1LJvc
# 2gtZ+sFxEQIGZiAgt1OxGBMyMDI0MDQyMzE0MTExNy40ODNaMASAAgH0oIHYpIHV
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHimZmV
# 8dzjIOsAAQAAAeIwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjpGQzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVj
# tZhV+kFmb8cKQpg2mzisDlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC
# 7jS03JkcrPsWi9WpVwsIckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJ
# bsE3wMmpmJasPWpgF05zZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmU
# Xs7ICxDJr5a39SSePAJRIyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwne
# tSePg88EmRezr2T3HTFElneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfF
# cS4XElf3GSERnlzJsK7s/ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4
# eQszYxq4c4HqPnUu4hT4aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdth
# FCBepxfb6nbsp3fcZaPBfTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCW
# ACoj78XUwYqy1HyYnStTme4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKv
# NNsTVm4QbqphCyknrwByqorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3u
# fASdPrgPhsQIRFkHZGuihL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNV
# HQ4EFgQURIQOEdq+7QdslptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D
# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l
# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD
# ggIBAORURDGrVRTbnulfsg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3
# ka76Yz0t/6lxuczI6w7tXq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwL
# hP1PGC5tvXK0xYomU1nU+lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrX
# a2daCOGnxuaD1IO+65E7qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0gan
# hFzzHAnWjtNWneU11WQ6Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVl
# UE3zIikoSed+8s61NDP+x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIo
# ycVTvBQpv/drRJD68eo401mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iO
# aKZ75vuQg7hCiBA5xIm5ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqv
# E8Aq38QmKgTiBnWSS/uVPcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhS
# gCIGJUZDA7336nQD8fn4y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv
# 1ug7dS/Dfrcd1sn2E4gk4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIB
# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1
# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O
# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn
# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t
# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq
# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP
# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW
# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv
# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb
# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc
# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a
# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB
# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw
# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E
# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB
# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/
# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ
# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v
# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h
# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x
# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p
# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A
# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC
# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB
# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt
# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3
# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV
# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw
# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB
# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjpGQzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhf
# iB1d8pTohm+ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAOnR3vgwIhgPMjAyNDA0MjMxNTE3MTJaGA8yMDI0MDQy
# NDE1MTcxMlowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6dHe+AIBADAKAgEAAgID
# FQIB/zAHAgEAAgITGDAKAgUA6dMweAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUA
# A4GBANIiA17LpM6vqyo+h2Gy7jS/plK5btuepzPH69HaSSLQgmyHGJti3T4/40Qv
# /pD1kqx4aZmxSYhfghQxG6+5xQrMjXUGVkvkHlGDaCB5PkTFkhEadoG/M8OiSF2z
# 6t1t+B5+UpZHn/ZqMCje0hGMGpF+It3BhOadbdLMLmv1S+e5MYIEDTCCBAkCAQEw
# gZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsA
# AQAAAeIwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0B
# CRABBDAvBgkqhkiG9w0BCQQxIgQgmwggiDzTDKvROVR0aP21eYt1UxZSRYY1Mun9
# LWUXbYQwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETO
# DoL4d5LU6I/bjucIZkOJCI9//zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwAhMzAAAB4pmZlfHc4yDrAAEAAAHiMCIEIFI9jHTsM+FSP6FMwP2O
# 6Yu7/zJ0dHmtmWF4o2meBeYsMA0GCSqGSIb3DQEBCwUABIICAJA+0oYSfROpflb6
# oW0iOATrgr6RoMB2i4SpktN/X2V0r7e6BFwiLs3bA1H3j6FpVilb6QTl7UHYZ1CH
# yj0TjYqoUvFdVdxWJIpOE4wtprLkCfJYf94blhDJghdRzyWJmCr4MVXcZptJ0D9N
# kwfKR/yJrk2r81IwIDzpf9d/YEVCAKD0z2lChZCq+oqxGINyR3CPmo79R0/S42EN
# 0uUVJvMOkfSZ8KrPNzMk6sDqYO5Nw9LRWkmEYTSm8dtOcfnVOGr1coo92XU7t2mn
# b9r8q7f7kq1G78UFM29ZB3SoIquxcfeQu2yhypQR1xpZgBjTKM9KKeUarB3YGnfN
# Qwj44Pkrs3y9mrPBUALT0f3ftaebISOcKRyCdr3qwRTNKyBhfsZRrpFGt1jRZmi6
# HfePdDFKiKo6GXmPo/D6qSNBmnzXOrf/8WZpXok0ZBc6dPb4kr2JyECARgt7dd2i
# U112RQJTvDcTaCC8uun5NnPCN5Mr7JD/T/gmSE3+IU740pFDt1Y1W5hAT1scYHHM
# wgtnJ9WEIJ+68aW8OzbrtnuYmzH7cajRwGhr2B9DpagDgo44gn6hA9UMz2IReRbi
# 0uyOjuXX/A7vnUcCsZjE0V2kKh4s7V4P8MXEcawdNlQIvShv8u2IAM0jugN9qQKy
# mqZevwHmelL6X3rW6yeRnyT+Dtxv
# SIG # End signature block
|
combined_dataset/train/non-malicious/387.ps1
|
387.ps1
|
function BeTrueForAny
{
[CmdletBinding()]
param (
$ActualValue,
[scriptblock]
$TestScript,
[switch]
$Negate
)
end
{
$succeeded = $false
foreach ($value in $ActualValue)
{
$variables = [System.Collections.Generic.List[psvariable]](
[psvariable]::new('_', $value))
$succeeded = $TestScript.InvokeWithContext(
@{ },
$variables,
$value)
if ($Negate.IsPresent)
{
$succeeded = -not $succeeded
}
if ($succeeded)
{
break
}
}
if (-not $succeeded)
{
if ($Negate.IsPresent)
{
$failureMessage =
'Expected: Any value to fail the evaluation script, ' +
'but no value returned false. (ActualValue: {0})' -f ($ActualValue -join ', ')
}
else
{
$failureMessage =
'Expected: Any value to pass the evaluation script, ' +
'but no value returned true. (ActualValue: {0})' -f ($ActualValue -join ', ')
}
}
[PSCustomObject]@{
Succeeded = $succeeded
FailureMessage = $failureMessage
}
}
}
Add-AssertionOperator -Name BeTrueForAny -Test $function:BeTrueForAny -Alias Any -SupportsArrayInput
|
combined_dataset/train/non-malicious/2633.ps1
|
2633.ps1
|
function Restore-SqlDbWithMove{
[cmdletbinding()]
param([string]$ServerInstance = 'localhost'
,[string]$BackupFile
,[string]$NewDataPath
,[string]$NewLogPath = $NewDataPath
,[string]$OutputPath = 'NoPath'
)
$relocate = @()
$dbname = (Invoke-Sqlcmd -ServerInstance $ServerInstance -Database tempdb -Query "RESTORE HEADERONLY FROM DISK='$BackupFile';").DatabaseName
$dbfiles = Invoke-Sqlcmd -ServerInstance $ServerInstance -Database tempdb -Query "RESTORE FILELISTONLY FROM DISK='$BackupFile';"
foreach($dbfile in $dbfiles){
$DbFileName = $dbfile.PhysicalName | Split-Path -Leaf
if($dbfile.Type -eq 'L'){
$newfile = Join-Path -Path $NewLogPath -ChildPath $DbFileName
} else {
$newfile = Join-Path -Path $NewDataPath -ChildPath $DbFileName
}
$relocate += New-Object Microsoft.SqlServer.Management.Smo.RelocateFile ($dbfile.LogicalName,$newfile)
}
If($OutputPath -ne 'NoPath'){
$OutputFile = Join-Path $OutputPath -ChildPath "$dbname`_restore.sql"
Restore-SqlDatabase -ServerInstance $ServerInstance -Database $dbname -RelocateFile $relocate -BackupFile "$BackupFile" -RestoreAction Database -Script | Out-File $OutputFile
} else {
Restore-SqlDatabase -ServerInstance $ServerInstance -Database $dbname -RelocateFile $relocate -BackupFile "$BackupFile" -RestoreAction Database
}
}
|
combined_dataset/train/non-malicious/Re-IP VMs.ps1
|
Re-IP VMs.ps1
|
foreach ($entry in (import-csv "spreadsheet.csv")) {
$ipScript = @"
`$NetworkConfig = Get-WmiObject -Class Win32_NetworkAdapterConfiguration
`$NicAdapter = `$NetworkConfig | where {`$_.DHCPEnabled -eq "True"}
`$NicAdapter.EnableStatic('$entry.IP','$entry.Netmask')
`$NicAdapter.SetGateways('$entry.Gateway')
"@
Get-VM $entry.VMName | Invoke-VMScript -HostUser $entry.HU -HostPassword $entry.HP -GuestUser $gu -GuestPassword $gp $ipScript
}
|
combined_dataset/train/non-malicious/Compare-TwitterNames_2.ps1
|
Compare-TwitterNames_2.ps1
|
#This script will compare the names of the people you follow on Twitter
#and the people following you. It returns a comparison object consisting
#of the Twitter name of a subject and a side indicator -
#"<=" means that you are following a subject who is not following you,
#"=>" means that you are followed by someone who you are not following.
function GetTwitterNames([string]$query)
{
$wc = new-object System.Net.WebClient
$wc.Credentials = $script:credential.GetNetworkCredential()
$nbrofpeople = 0
$page = "&page="
$names = @()
do
{
$url = $query
if ($nbrofpeople -gt 0)
{
$url = $url+$page+($nbrofpeople/100 +1)
}
[xml]$nameslist = $wc.DownloadString($url)
$names += $nameslist.users.user | select name
$nbrofpeople += 100
} while ($names.count -eq $nbrofpeople)
return $names
}
$twitter = "http://twitter.com/statuses/"
$friends = $twitter + "friends.xml?lite=true"
$followers = $twitter + "followers.xml?lite=true"
$credential = Get-Credential
$friendslist = GetTwitterNames($friends)
$followerslist = GetTwitterNames($followers)
$sync = 0
if ($friendslist.count -gt $followerslist.count)
{
$sync = ($friendslist.count)/2
}
else
{
$sync = ($followerslist.count)/2
}
$Status = @{Name='Status';Expression={if ($_.sideindicator -like '=>') {'Followed By'} else {'Following'}}}
compare-object $friendslist $followerslist -SyncWindow ($sync) -Property name | Select-Object Name, $Status
|
combined_dataset/train/non-malicious/3543.ps1
|
3543.ps1
|
function Test-MabGetContainers
{
$vault = Get-AzRecoveryServicesVault -ResourceGroupName "pstestrg" -Name "pstestrsvault";
$containers = Get-AzRecoveryServicesBackupContainer `
-VaultId $vault.ID `
-ContainerType "Windows" `
-BackupManagementType "MARS";
Assert-AreEqual $containers[0].FriendlyName "ADIT-PC.FAREAST.CORP.MICROSOFT.COM";
$namedContainer = Get-AzRecoveryServicesBackupContainer `
-VaultId $vault.ID `
-ContainerType "Windows" `
-BackupManagementType "MARS" `
-FriendlyName "ADIT-PC.FAREAST.CORP.MICROSOFT.COM";
Assert-AreEqual $namedContainer.FriendlyName "ADIT-PC.FAREAST.CORP.MICROSOFT.COM";
}
function Test-MabUnregisterContainer
{
$vault = Get-AzRecoveryServicesVault -ResourceGroupName "pstestrg" -Name "pstestrsvault";
$container = Get-AzRecoveryServicesBackupContainer `
-VaultId $vault.ID `
-ContainerType "Windows" `
-BackupManagementType "MARS" `
-FriendlyName "ADIT-PC.FAREAST.CORP.MICROSOFT.COM";
Assert-AreEqual $container.FriendlyName "ADIT-PC.FAREAST.CORP.MICROSOFT.COM";
Unregister-AzRecoveryServicesBackupContainer -VaultId $vault.ID -Container $container;
$container = Get-AzRecoveryServicesBackupContainer `
-VaultId $vault.ID `
-ContainerType "Windows" `
-BackupManagementType "MARS" `
-FriendlyName "ADIT-PC.FAREAST.CORP.MICROSOFT.COM";
Assert-Null $container;
}
|
combined_dataset/train/non-malicious/2302.ps1
|
2302.ps1
|
[CmdletBinding()]
param (
[Parameter(Mandatory)]
[ValidateScript({Test-Connection -ComputerName $_ -Quiet -Count 1 })]
[string[]]$Computername,
[string]$LogFilePath = 'C:\MyLog.log',
[string]$SmtpServer = 'mail.domain.com',
[string]$EmailFrom = 'notifications@domain.local',
[string]$EmailSubject = 'New Local Administrator Detected',
[string]$EmailRecipient = 'securityguy@domain.local'
)
begin {
function Write-Log ($Computer,$Members,$NewMembers) {
$MyDateTime = Get-Date -Format 'MM-dd-yyyy H:mm:ss'
[pscustomobject]@{ 'Computer' = $Computer; 'Date' = $MyDateTime; 'Members' = ($Members -join ','); 'NewMembers' = $NewMembers } | Export-Csv -Path $LogFilePath -Append -NoTypeInformation
}
}
process {
try {
foreach ($Computer in $Computername) {
Write-Verbose "Finding members of local administrators group on computer '$Computer'"
$Group = [ADSI]"WinNT://$Computer/Administrators"
$Members = $Group.Invoke("Members") | foreach {
$_.GetType().InvokeMember("Name", 'GetProperty', $null, $_, $null)
}
if (!(Test-Path -Path $LogFilePath)) {
Write-Verbose "The log file '$LogFilePath' does not exist on computer '$Computer'. Creating and appending member list"
Write-Log -Computer $Computer -Members $Members
} else {
Write-Verbose 'Comparing last local administrator members with most current administrator members'
$LastMembers = Import-Csv -Path $LogFilePath | Where-Object { $_.Computer -eq $Computer }
if (!$LastMembers) {
Write-Verbose "No members exist in log file on computer '$Computer'. Appending new results"
Write-Log -Computer $Computer -Members $Members
} else {
$LastMembers = ($LastMembers | Select-Object -Last 1).Members.Split(',')
Write-Verbose "Found $($LastMembers.Count) total local administrator members last time"
$Diff = Compare-Object -ReferenceObject $LastMembers -DifferenceObject $Members | Where-Object { $_.SideIndicator -eq '=>' }
if ($Diff) {
$NewMembers = $Diff.InputObject
Write-Log -Computer $Computer -Members $Members -NewMembers $NewMembers
Write-Verbose "Found $($NewMembers.Count) new members in the local administrator group on computer '$Computer'. Emailing notification."
$Params = @{
'From' = $EmailFrom
'To' = $EmailRecipient
'Subject' = $EmailSubject
'SmtpServer' = $SmtpServer
'Body' = "The following new local administrator accounts were found on the computer $Computer`: $($NewMembers -join ',')"
}
} else {
Write-Verbose "No additional members added to administrator group membership detected for computer '$Computer'"
Write-Log -Computer $Computer -Members $Members
}
}
}
}
} catch {
Write-Error $_.Exception.Message
}
}
end {
try {
} catch {
Write-Error $_.Exception.Message
}
}
|
combined_dataset/train/non-malicious/sample_40_26.ps1
|
sample_40_26.ps1
|
#
# Module manifest for module 'OCI.PSModules.Dataflow'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Dataflow.dll'
# Version number of this module.
ModuleVersion = '83.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '60441277-1663-4d77-af11-39ab99c7ac41'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Dataflow Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dataflow.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIDataflowApplication', 'Get-OCIDataflowApplicationsList',
'Get-OCIDataflowPool', 'Get-OCIDataflowPoolsList',
'Get-OCIDataflowPrivateEndpoint',
'Get-OCIDataflowPrivateEndpointsList', 'Get-OCIDataflowRun',
'Get-OCIDataflowRunLog', 'Get-OCIDataflowRunLogsList',
'Get-OCIDataflowRunsList', 'Get-OCIDataflowSqlEndpoint',
'Get-OCIDataflowSqlEndpointsList', 'Get-OCIDataflowStatement',
'Get-OCIDataflowStatementsList', 'Get-OCIDataflowWorkRequest',
'Get-OCIDataflowWorkRequestErrorsList',
'Get-OCIDataflowWorkRequestLogsList',
'Get-OCIDataflowWorkRequestsList',
'Move-OCIDataflowApplicationCompartment',
'Move-OCIDataflowPoolCompartment',
'Move-OCIDataflowPrivateEndpointCompartment',
'Move-OCIDataflowRunCompartment',
'Move-OCIDataflowSqlEndpointCompartment',
'New-OCIDataflowApplication', 'New-OCIDataflowPool',
'New-OCIDataflowPrivateEndpoint', 'New-OCIDataflowRun',
'New-OCIDataflowSqlEndpoint', 'New-OCIDataflowStatement',
'Remove-OCIDataflowApplication', 'Remove-OCIDataflowPool',
'Remove-OCIDataflowPrivateEndpoint', 'Remove-OCIDataflowRun',
'Remove-OCIDataflowSqlEndpoint', 'Remove-OCIDataflowStatement',
'Start-OCIDataflowPool', 'Stop-OCIDataflowPool',
'Update-OCIDataflowApplication', 'Update-OCIDataflowPool',
'Update-OCIDataflowPrivateEndpoint', 'Update-OCIDataflowRun',
'Update-OCIDataflowSqlEndpoint'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dataflow'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/sample_56_67.ps1
|
sample_56_67.ps1
|
# ---------------------------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License. See License.txt in the project root for license information.
# ---------------------------------------------------------------------------------------------
# Prevent installing more than once per session
if (Test-Path variable:global:__VSCodeOriginalPrompt) {
return;
}
# Disable shell integration when the language mode is restricted
if ($ExecutionContext.SessionState.LanguageMode -ne "FullLanguage") {
return;
}
$Global:__VSCodeOriginalPrompt = $function:Prompt
$Global:__LastHistoryId = -1
# Store the nonce in script scope and unset the global
$Nonce = $env:VSCODE_NONCE
$env:VSCODE_NONCE = $null
$isStable = $env:VSCODE_STABLE
$env:VSCODE_STABLE = $null
$osVersion = [System.Environment]::OSVersion.Version
$isWindows10 = $IsWindows -and $osVersion.Major -eq 10 -and $osVersion.Minor -eq 0 -and $osVersion.Build -lt 22000
if ($env:VSCODE_ENV_REPLACE) {
$Split = $env:VSCODE_ENV_REPLACE.Split(":")
foreach ($Item in $Split) {
$Inner = $Item.Split('=', 2)
[Environment]::SetEnvironmentVariable($Inner[0], $Inner[1].Replace('\x3a', ':'))
}
$env:VSCODE_ENV_REPLACE = $null
}
if ($env:VSCODE_ENV_PREPEND) {
$Split = $env:VSCODE_ENV_PREPEND.Split(":")
foreach ($Item in $Split) {
$Inner = $Item.Split('=', 2)
[Environment]::SetEnvironmentVariable($Inner[0], $Inner[1].Replace('\x3a', ':') + [Environment]::GetEnvironmentVariable($Inner[0]))
}
$env:VSCODE_ENV_PREPEND = $null
}
if ($env:VSCODE_ENV_APPEND) {
$Split = $env:VSCODE_ENV_APPEND.Split(":")
foreach ($Item in $Split) {
$Inner = $Item.Split('=', 2)
[Environment]::SetEnvironmentVariable($Inner[0], [Environment]::GetEnvironmentVariable($Inner[0]) + $Inner[1].Replace('\x3a', ':'))
}
$env:VSCODE_ENV_APPEND = $null
}
function Global:__VSCode-Escape-Value([string]$value) {
# NOTE: In PowerShell v6.1+, this can be written `$value -replace '…', { … }` instead of `[regex]::Replace`.
# Replace any non-alphanumeric characters.
[regex]::Replace($value, "[$([char]0x00)-$([char]0x1f)\\\n;]", { param($match)
# Encode the (ascii) matches as `\x<hex>`
-Join (
[System.Text.Encoding]::UTF8.GetBytes($match.Value) | ForEach-Object { '\x{0:x2}' -f $_ }
)
})
}
function Global:Prompt() {
$FakeCode = [int]!$global:?
# NOTE: We disable strict mode for the scope of this function because it unhelpfully throws an
# error when $LastHistoryEntry is null, and is not otherwise useful.
Set-StrictMode -Off
$LastHistoryEntry = Get-History -Count 1
$Result = ""
# Skip finishing the command if the first command has not yet started
if ($Global:__LastHistoryId -ne -1) {
if ($LastHistoryEntry.Id -eq $Global:__LastHistoryId) {
# Don't provide a command line or exit code if there was no history entry (eg. ctrl+c, enter on no command)
$Result += "$([char]0x1b)]633;D`a"
}
else {
# Command finished exit code
# OSC 633 ; D [; <ExitCode>] ST
$Result += "$([char]0x1b)]633;D;$FakeCode`a"
}
}
# Prompt started
# OSC 633 ; A ST
$Result += "$([char]0x1b)]633;A`a"
# Current working directory
# OSC 633 ; <Property>=<Value> ST
$Result += if ($pwd.Provider.Name -eq 'FileSystem') { "$([char]0x1b)]633;P;Cwd=$(__VSCode-Escape-Value $pwd.ProviderPath)`a" }
# Before running the original prompt, put $? back to what it was:
if ($FakeCode -ne 0) {
Write-Error "failure" -ea ignore
}
# Run the original prompt
$OriginalPrompt += $Global:__VSCodeOriginalPrompt.Invoke()
$Result += $OriginalPrompt
# Prompt
# OSC 633 ; <Property>=<Value> ST
if ($isStable -eq "0") {
$Result += "$([char]0x1b)]633;P;Prompt=$(__VSCode-Escape-Value $OriginalPrompt)`a"
}
# Write command started
$Result += "$([char]0x1b)]633;B`a"
$Global:__LastHistoryId = $LastHistoryEntry.Id
return $Result
}
# Only send the command executed sequence when PSReadLine is loaded, if not shell integration should
# still work thanks to the command line sequence
if (Get-Module -Name PSReadLine) {
$__VSCodeOriginalPSConsoleHostReadLine = $function:PSConsoleHostReadLine
function Global:PSConsoleHostReadLine {
$CommandLine = $__VSCodeOriginalPSConsoleHostReadLine.Invoke()
# Command line
# OSC 633 ; E ; <CommandLine?> ; <Nonce?> ST
$Result = "$([char]0x1b)]633;E;"
$Result += $(__VSCode-Escape-Value $CommandLine)
# Only send the nonce if the OS is not Windows 10 as it seems to echo to the terminal
# sometimes
if ($IsWindows10 -eq $false) {
$Result += ";$Nonce"
}
$Result += "`a"
# Command executed
# OSC 633 ; C ST
$Result += "$([char]0x1b)]633;C`a"
# Write command executed sequence directly to Console to avoid the new line from Write-Host
[Console]::Write($Result)
$CommandLine
}
}
# Set IsWindows property
if ($PSVersionTable.PSVersion -lt "6.0") {
# Windows PowerShell is only available on Windows
[Console]::Write("$([char]0x1b)]633;P;IsWindows=$true`a")
}
else {
[Console]::Write("$([char]0x1b)]633;P;IsWindows=$IsWindows`a")
}
# Set ContinuationPrompt property
if ($isStable -eq "0") {
$ContinuationPrompt = (Get-PSReadLineOption).ContinuationPrompt
if ($ContinuationPrompt) {
[Console]::Write("$([char]0x1b)]633;P;ContinuationPrompt=$(__VSCode-Escape-Value $ContinuationPrompt)`a")
}
}
# Set always on key handlers which map to default VS Code keybindings
function Set-MappedKeyHandler {
param ([string[]] $Chord, [string[]]$Sequence)
try {
$Handler = Get-PSReadLineKeyHandler -Chord $Chord | Select-Object -First 1
}
catch [System.Management.Automation.ParameterBindingException] {
# PowerShell 5.1 ships with PSReadLine 2.0.0 which does not have -Chord,
# so we check what's bound and filter it.
$Handler = Get-PSReadLineKeyHandler -Bound | Where-Object -FilterScript { $_.Key -eq $Chord } | Select-Object -First 1
}
if ($Handler) {
Set-PSReadLineKeyHandler -Chord $Sequence -Function $Handler.Function
}
}
function Set-MappedKeyHandlers {
Set-MappedKeyHandler -Chord Ctrl+Spacebar -Sequence 'F12,a'
Set-MappedKeyHandler -Chord Alt+Spacebar -Sequence 'F12,b'
Set-MappedKeyHandler -Chord Shift+Enter -Sequence 'F12,c'
Set-MappedKeyHandler -Chord Shift+End -Sequence 'F12,d'
# Enable suggestions if the environment variable is set and Windows PowerShell is not being used
# as APIs are not available to support this feature
if ($env:VSCODE_SUGGEST -eq '1' -and $PSVersionTable.PSVersion -ge "6.0") {
Remove-Item Env:VSCODE_SUGGEST
# VS Code send completions request (may override Ctrl+Spacebar)
Set-PSReadLineKeyHandler -Chord 'F12,e' -ScriptBlock {
Send-Completions
}
# TODO: When does this invalidate? Installing a new module could add new commands. We could expose a command to update? Track `(Get-Module).Count`?
# Get commands, convert to string array to reduce the payload size and send as JSON
$commands = [System.Management.Automation.CompletionCompleters]::CompleteCommand('')
$mappedCommands = $commands | ForEach-Object { ,@($_.CompletionText, $_.listItemText, $_.ResultType, $_.tooltip) }
$result = "$([char]0x1b)]633;CompletionsPwshCommands;commands;"
$result += $mappedCommands | ConvertTo-Json -Compress
$result += "`a"
Write-Host -NoNewLine $result
}
}
function Send-Completions {
$commandLine = ""
$cursorIndex = 0
[Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$commandLine, [ref]$cursorIndex)
$completionPrefix = $commandLine
# Start completions sequence
$result = "$([char]0x1b)]633;Completions"
# If there is a space in the input, defer to TabExpansion2 as it's more complicated to
# determine what type of completions to use
# `[` is included here as namespace commands are not included in CompleteCommand(''),
# additionally for some reason CompleteVariable('[') causes the prompt to clear and reprint
# multiple times
if ($completionPrefix.Contains(' ') -or $completionPrefix.Contains('[') -or $PSVersionTable.PSVersion -lt "6.0") {
$completions = TabExpansion2 -inputScript $completionPrefix -cursorColumn $cursorIndex
if ($null -ne $completions.CompletionMatches) {
$result += ";$($completions.ReplacementIndex);$($completions.ReplacementLength);$($cursorIndex);"
if ($completions.CompletionMatches.Count -gt 0 -and $completions.CompletionMatches.Where({ $_.ResultType -eq 3 -or $_.ResultType -eq 4 })) {
$json = [System.Collections.ArrayList]@($completions.CompletionMatches)
# Add . and .. to the completions list
$json.Add([System.Management.Automation.CompletionResult]::new(
'.', '.', [System.Management.Automation.CompletionResultType]::ProviderContainer, (Get-Location).Path)
)
$json.Add([System.Management.Automation.CompletionResult]::new(
'..', '..', [System.Management.Automation.CompletionResultType]::ProviderContainer, (Split-Path (Get-Location) -Parent))
)
$mappedCommands = $json | ForEach-Object { ,@($_.CompletionText, $_.listItemText, $_.ResultType, $_.tooltip) }
$result += $mappedCommands | ConvertTo-Json -Compress
} else {
$mappedCommands = $completions.CompletionMatches | ForEach-Object { ,@($_.CompletionText, $_.listItemText, $_.ResultType, $_.tooltip) }
$result += $mappedCommands | ConvertTo-Json -Compress
}
}
}
# If there is no space, get completions using CompletionCompleters as it gives us more
# control and works on the empty string
else {
# Note that CompleteCommand isn't included here as it's expensive
$completions = $(
([System.Management.Automation.CompletionCompleters]::CompleteFilename($completionPrefix));
([System.Management.Automation.CompletionCompleters]::CompleteVariable($completionPrefix));
)
if ($null -ne $completions) {
$result += ";$($completions.ReplacementIndex);$($completions.ReplacementLength);$($cursorIndex);"
$mappedCommands = $completions | ForEach-Object { ,@($_.CompletionText, $_.listItemText, $_.ResultType, $_.tooltip) }
$result += $mappedCommands | ConvertTo-Json -Compress
} else {
$result += ";0;$($completionPrefix.Length);$($completionPrefix.Length);[]"
}
}
# End completions sequence
$result += "`a"
Write-Host -NoNewLine $result
}
# Register key handlers if PSReadLine is available
if (Get-Module -Name PSReadLine) {
Set-MappedKeyHandlers
}
|
combined_dataset/train/non-malicious/Get-PDC09Videos_1.ps1
|
Get-PDC09Videos_1.ps1
|
#requires -version 2.0
PARAM (
[Parameter(Position=1, Mandatory=$true)]
[ValidateSet("wmv","wmvhigh","ppt")] # the "mp4" files aren't there yet
[String]$MediaType,
[string]$Destination = $PWD
)
Import-Module BitsTransfer
Push-Location $Destination
$Extension = $(switch -wildcard($MediaType){"wmv*"{"wmv"} "mp4"{"mp4"} "ppt"{"pptx"}})
$BaseUrl = "http://ecn.channel9.msdn.com/o9/pdc09/{0}/{2}.{1}"
Start-BitsTransfer -TransferType Download -Source @(
"CL09","CL18","FT02","FT06","FT11","PR05","SVC01","SVC10","SVC20","SVR03","CL30","CL33","FT30",
"FT31","PR31","SVC30","SVC37","SVR33","VTL30","VTL32","CL04","CL14","CL25","FT18","FT19","FT25",
"PR02","SVC13","SVR01","SVR14","CL13","CL29","FT10","FT28","FT57","PR11","SVC52","SVR15","SVR17",
"CL11","CL17","CL23","FT03","FT08","PR10","SVR16","VTL01","CL01","FT50","FT52","FT55","FT59","PR13",
"SVC02","SVC03","SVC15","CL31","CL34","FT32","FT34","FT36","SVC31","SVC32","SVR31","VTL31","CL15",
"FT12","FT17","FT58","SVC16","SVC28","SVC53","SVR11","VTL05","CL06","FT04","FT07","FT29","PR06",
"SVC09","SVC17","SVR13","VTL04","CL12","CL22","FT22","FT23","FT26","SVC04","SVC14","SVC19","SVC54",
"SVR12","CL02","CL05","CL16","FT21","FT56","PR03","SVC08","SVC18","SVR10","VTL03","CL10","FT13",
"FT53","FT60","PR07","SVC06","SVC25","SVR07","SVR18","VTL02","CL03","CL21","CL27","FT14","FT20",
"FT24","PR09","SVC12","SVR09","SVR19","CL32","CL35","CL36","FT33","FT35","PR30","PR33","SVC33",
"SVC36","SVR32","CL07","CL24","CL28","FT09","FT16","FT27","PR12","SVC27","SVR02","SVR06","CL26",
"FT05","FT54","PR01","PR14","SVC23","SVC26","SVR08","KYN01-PGM","KYN02-PGM" |
ForEach { $BaseUrl -f $MediaType, $Extension, $_ }
)
Pop-Location
|
combined_dataset/train/non-malicious/4375.ps1
|
4375.ps1
|
function Resolve-Location
{
[CmdletBinding()]
[OutputType([string])]
Param
(
[Parameter(Mandatory=$true)]
[string]
$Location,
[Parameter(Mandatory=$true)]
[string]
$LocationParameterName,
[Parameter()]
$Credential,
[Parameter()]
$Proxy,
[Parameter()]
$ProxyCredential,
[Parameter()]
[System.Management.Automation.PSCmdlet]
$CallerPSCmdlet
)
if(-not (Test-WebUri -uri $Location))
{
if(Microsoft.PowerShell.Management\Test-Path -LiteralPath $Location)
{
return $Location
}
elseif($CallerPSCmdlet)
{
$message = $LocalizedData.PathNotFound -f ($Location)
ThrowError -ExceptionName "System.ArgumentException" `
-ExceptionMessage $message `
-ErrorId "PathNotFound" `
-CallerPSCmdlet $CallerPSCmdlet `
-ErrorCategory InvalidArgument `
-ExceptionObject $Location
}
}
else
{
$pingResult = Ping-Endpoint -Endpoint $Location -Credential $Credential -Proxy $Proxy -ProxyCredential $ProxyCredential
$statusCode = $null
$exception = $null
$resolvedLocation = $null
if($pingResult -and $pingResult.ContainsKey($Script:ResponseUri))
{
$resolvedLocation = $pingResult[$Script:ResponseUri]
}
if($pingResult -and $pingResult.ContainsKey($Script:StatusCode))
{
$statusCode = $pingResult[$Script:StatusCode]
}
Write-Debug -Message "Ping-Endpoint: location=$Location, statuscode=$statusCode, resolvedLocation=$resolvedLocation"
if((($statusCode -eq 200) -or ($statusCode -eq 401) -or ($statusCode -eq 407)) -and $resolvedLocation)
{
return $resolvedLocation
}
elseif($CallerPSCmdlet)
{
$message = $LocalizedData.InvalidWebUri -f ($Location, $LocationParameterName)
ThrowError -ExceptionName "System.ArgumentException" `
-ExceptionMessage $message `
-ErrorId "InvalidWebUri" `
-CallerPSCmdlet $CallerPSCmdlet `
-ErrorCategory InvalidArgument `
-ExceptionObject $Location
}
}
}
|
combined_dataset/train/non-malicious/sophos_mrupdate.ps1
|
sophos_mrupdate.ps1
|
<#
.SYNOPSIS
Updates the Sophos Message Relay configuration.
.DESCRIPTION
Points the local Message Router service to a new parent relay server.
.PARAMETER mrinit
The mrinit.conf file to use.
.PARAMETER loglevel
The current loglevel (used by the Log function).
Defaults to 'information' (debug messages will not be printed).
Valid values are 'debug', 'information', 'warning', and 'error'.
.EXAMPLE
# Update settings using the configuration in the file AMW_mrinit.conf
sophos_mrupdate.ps1 -mrinit AMW_mrinit.conf
#>
param([Parameter(Mandatory=$true)][string]$mrinit,
[Parameter(Mandatory=$false)][string]$loglevel=1)
# LOGGING #####################################################################
# Set severity constants
$MSG_DEBUG = 0
$MSG_INFORMATION = 1
$MSG_WARNING = 2
$MSG_ERROR = 3
$MSG_SEVERITY = @('debug', 'information', 'warning', 'error')
if ($MSG_SEVERITY -notcontains $loglevel.ToLower()) {
Write-Error ('Invalid loglevel! ' +
'Must be debug, information, warning, or error.')
exit 1
} else {
foreach ($index in (0..($MSG_SEVERITY.Count - 1))) {
if ($MSG_SEVERITY[$index] -eq $loglevel) {
$loglevel = $index
}
}
}
# Set configurable settings for logging
$LOG_FILE = 'c:\\windows\\temp\\sophos_mrupdate.log'
$SMTP_TO = 'sophos-virusalerts@company.com'
$SMTP_SERVER = 'smtp.company.com'
$SMTP_SUBJECT = 'Sophos MRUpdate Error'
$SMTP_FROM = 'sophos-mrupdate@company.com'
function Log {
<#
.SYNOPSIS
Writes a message to the Log.
.DESCRIPTION
Logs a message to the logfile if the severity is higher than $loglevel.
.PARAMETER severity
The severity of the message. Can be Information, Warning, or Error.
Use the $MSG_XXXX constants.
Note that Error will halt the script and send an email.
.PARAMETER message
A string to be printed to the log.
.EXAMPLE
Log $MSG_ERROR "Something has gone terribly wrong!"
#>
param([Parameter(Mandatory=$true)][int]$severity,
[Parameter(Mandatory=$true)][string]$message,
[Parameter()][switch]$sendmail)
if ($severity -ge $loglevel) {
$timestamp = Get-Date -Format 'yyyy-MM-dd hh:mm:ss'
$output = ("$timestamp`t$($env:computername)`t" +
"$($MSG_SEVERITY[$severity])`t$message")
Write-Output $output >> $LOG_FILE
if (($severity -ge $MSG_ERROR) -or $sendmail) {
Send-MailMessage -To $SMTP_TO `
-SmtpServer $SMTP_SERVER `
-Subject "$SMTP_SUBJECT on $($env:computername)" `
-Body $output `
-From $SMTP_FROM
exit 1
}
}
}
# MAIN ########################################################################
# The path to the Remote Management System files
$CURRENT_PATH = $pwd
$RMS_PATH = 'C:\\Program Files (x86)\\Sophos\\Remote Management System\\'
if (-not (Test-Path $RMS_PATH)) {
$RMS_PATH = 'C:\\Program Files\\Sophos\\Remote Management System\\'
if (-not (Test-Path $RMS_PATH)) {
Log $MSG_ERROR "The path '$RMS_PATH' could not be found!"
}
}
#Copy over the new mrinit.conf file
Log $MSG_DEBUG "Copying file '$mrinit'..."
if (Test-Path ".\\$mrinit") {
try {
Copy-Item -Path ".\\$mrinit" -Destination ($RMS_PATH + 'mrinit.conf') -Force
} catch {
LOG $MSG_ERROR "Unable to copy $mrinit to the RMS directory!"
}
} else {
LOG $MSG_ERROR "File '$mrinit' missing! Check the SCCM package."
exit 1
}
Log $MSG_DEBUG "Changing directory to $RMS_PATH..."
cd $RMS_PATH
# Get the backup copies of mrinit.conf out of the way. For some reason
# RMS will inexplicably use the backup copy instead of the new one if you don't
Log $MSG_DEBUG 'Renaming mrinit.conf.orig to mrinit.conf.orig.old'
try {
Rename-Item '.\\mrinit.conf.orig' '.\\mrinit.conf.orig.old' `
-Force `
-ea SilentlyContinue
} catch {
Log $MSG_ERROR "Unable to rename the file 'mrinit.orig'!"
}
# This is the command that actually grabs the new mrinit.conf file and makes
# the important updates to the system.
.\\ClientMRInit.exe
# Let's restart the Message Router
net stop "Sophos Message Router"
net start "Sophos Message Router"
cd $CURRENT_PATH
# Voila! We're done.
|
combined_dataset/train/non-malicious/sample_58_62.ps1
|
sample_58_62.ps1
|
# ------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License (MIT). See License.txt in the repo root for license information.
# ------------------------------------------------------------
[CmdletBinding(DefaultParametersetName="Unsecure")]
param (
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $NodeName,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $NodeType,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $NodeIpAddressOrFQDN,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $ExistingClientConnectionEndpoint,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $UpgradeDomain,
[Parameter(ParameterSetName="Unsecure", Mandatory=$true)]
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[string] $FaultDomain,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[switch] $AcceptEULA,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[switch] $Force,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[switch] $NoCleanupOnFailure,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[switch] $BypassUpgradeStateValidation,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[switch] $FabricIsPreInstalled,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[string] $FabricRuntimePackagePath,
[Parameter(ParameterSetName="Unsecure", Mandatory=$false)]
[Parameter(ParameterSetName="Certificate", Mandatory=$false)]
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)]
[int] $TimeoutInSeconds,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[switch] $X509Credential,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[string] $ServerCertThumbprint,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[string] $StoreLocation,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[string] $StoreName,
[Parameter(ParameterSetName="Certificate", Mandatory=$true)]
[string] $FindValueThumbprint,
[Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)]
[switch] $WindowsCredential
)
$Identity = [System.Security.Principal.WindowsIdentity]::GetCurrent()
$Principal = New-Object System.Security.Principal.WindowsPrincipal($Identity)
$IsAdmin = $Principal.IsInRole([System.Security.Principal.WindowsBuiltInRole]::Administrator)
if(!$IsAdmin)
{
Write-Host "Please run the script with administrative privileges." -ForegroundColor "Red"
exit 1
}
if(!$AcceptEULA.IsPresent)
{
$EulaAccepted = Read-Host 'Do you accept the license terms for using Microsoft Azure Service Fabric located in the root of your package download? If you do not accept the license terms you may not use the software.
[Y] Yes [N] No [?] Help (default is "N")'
if($EulaAccepted -ne "y" -and $EulaAccepted -ne "Y")
{
Write-host "You need to accept the license terms for using Microsoft Azure Service Fabric located in the root of your package download before you can use the software." -ForegroundColor "Red"
exit 1
}
}
$ThisScriptPath = $(Split-Path -parent $MyInvocation.MyCommand.Definition)
$DeployerBinPath = Join-Path $ThisScriptPath -ChildPath "DeploymentComponents"
if(!(Test-Path $DeployerBinPath))
{
$DCAutoExtractorPath = Join-Path $ThisScriptPath "DeploymentComponentsAutoextractor.exe"
if(!(Test-Path $DCAutoExtractorPath))
{
Write-Host "Standalone package DeploymentComponents and DeploymentComponentsAutoextractor.exe are not present local to the script location."
exit 1
}
#Extract DeploymentComponents
$DCAutoExtractorCommand = "`"$DCAutoExtractorPath`" /E /Y /L `"$ThisScriptPath`""
# special case for older powershell versions < 5
if ($PSVersionTable.PSVersion.Major -lt 5)
{
$DCAutoExtractorCommand = "`"`"$DCAutoExtractorPath`" /E /Y /L `"$ThisScriptPath`"`""
}
Write-Host "running autoextractor command: $DCAutoExtractorCommand"
$DCExtractOutput = cmd.exe /c "$DCAutoExtractorCommand && exit 0 || exit 1"
if($LASTEXITCODE -eq 1)
{
Write-Host "Extracting DeploymentComponents Cab ran into an issue."
Write-Host $DCExtractOutput
exit 1
}
else
{
Write-Host "DeploymentComponents extracted."
}
}
$SystemFabricModulePath = Join-Path $DeployerBinPath -ChildPath "System.Fabric.dll"
if(!(Test-Path $SystemFabricModulePath))
{
Write-Host "Run the script local to the Standalone package directory."
exit 1
}
$MicrosoftServiceFabricCabFileAbsolutePath = $null
if ((Test-Path variable:FabricRuntimePackagePath) `
-and ![string]::IsNullOrEmpty($FabricRuntimePackagePath))
{
$MicrosoftServiceFabricCabFileAbsolutePath = Resolve-Path $FabricRuntimePackagePath
if(!(Test-Path $MicrosoftServiceFabricCabFileAbsolutePath))
{
Write-Host "Microsoft Service Fabric Runtime package not found in the specified directory : $FabricRuntimePackagePath"
exit 1
}
Write-Verbose "Using runtime package $MicrosoftServiceFabricCabFileAbsolutePath"
}
else
{
$RuntimeBinPath = Join-Path $ThisScriptPath -ChildPath "DeploymentRuntimePackages"
if(!(Test-Path $RuntimeBinPath))
{
Write-Host "No directory exists for Runtime packages. Creating a new directory."
md $RuntimeBinPath | Out-Null
Write-Host "Done creating $RuntimeBinPath"
}
Write-Verbose "Will use downloaded runtime package for deployment from $RuntimeBinPath"
}
$ServiceFabricPowershellModulePath = Join-Path $DeployerBinPath -ChildPath "ServiceFabric.psd1"
if (!(Test-Path variable:TimeoutInSeconds) `
-or ($TimeoutInSeconds -le 0))
{
$TimeoutInSeconds = 300
Write-Verbose "TimeoutInSeconds was not set. Defaulting to $TimeoutInSeconds seconds."
}
$parentVerbosePreference = $VerbosePreference
# Invoke in separate AppDomain
if($X509Credential)
{
Write-Verbose "X509Credential: $X509Credential"
$argList = @{
"DeployerBinPath" = $DeployerBinPath;
"ExistingClientConnectionEndpoint" = $ExistingClientConnectionEndpoint;
"ServiceFabricPowershellModulePath" = $ServiceFabricPowershellModulePath;
"NodeName" = $NodeName;
"NodeType" = $NodeType;
"NodeIpAddressOrFQDN" = $NodeIpAddressOrFQDN;
"UpgradeDomain" = $UpgradeDomain;
"FaultDomain" = $FaultDomain;
"Force" = $Force.IsPresent;
"NoCleanupOnFailure" = $NoCleanupOnFailure.IsPresent;
"BypassUpgradeStateValidation" = $BypassUpgradeStateValidation.IsPresent;
"FabricIsPreInstalled" = $FabricIsPreInstalled.IsPresent;
"MicrosoftServiceFabricCabFileAbsolutePath" = $MicrosoftServiceFabricCabFileAbsolutePath;
"TimeoutInSeconds" = $TimeoutInSeconds;
"parentVerbosePreference" = $parentVerbosePreference;
"WindowsCredential" = $false;
"X509Credential" = $true;
"ServerCertThumbprint" = $ServerCertThumbprint;
"StoreLocation" = $StoreLocation;
"StoreName" = $StoreName;
"FindValueThumbprint" = $FindValueThumbprint;
}
}
else
{
if($WindowsCredential)
{
Write-Verbose "WindowsCredential: $WindowsCredential"
$argList = @{
"DeployerBinPath" = $DeployerBinPath;
"ExistingClientConnectionEndpoint" = $ExistingClientConnectionEndpoint;
"ServiceFabricPowershellModulePath" = $ServiceFabricPowershellModulePath;
"NodeName" = $NodeName;
"NodeType" = $NodeType;
"NodeIpAddressOrFQDN" = $NodeIpAddressOrFQDN;
"UpgradeDomain" = $UpgradeDomain;
"FaultDomain" = $FaultDomain;
"Force" = $Force.IsPresent;
"NoCleanupOnFailure" = $NoCleanupOnFailure.IsPresent;
"BypassUpgradeStateValidation" = $BypassUpgradeStateValidation.IsPresent;
"FabricIsPreInstalled" = $FabricIsPreInstalled.IsPresent;
"MicrosoftServiceFabricCabFileAbsolutePath" = $MicrosoftServiceFabricCabFileAbsolutePath;
"TimeoutInSeconds" = $TimeoutInSeconds;
"parentVerbosePreference" = $parentVerbosePreference;
"WindowsCredential" = $true;
}
}
else
{
Write-Verbose "Not X509Credential nor WindowsCredential."
$argList = @{
"DeployerBinPath" = $DeployerBinPath;
"ExistingClientConnectionEndpoint" = $ExistingClientConnectionEndpoint;
"ServiceFabricPowershellModulePath" = $ServiceFabricPowershellModulePath;
"NodeName" = $NodeName;
"NodeType" = $NodeType;
"NodeIpAddressOrFQDN" = $NodeIpAddressOrFQDN;
"UpgradeDomain" = $UpgradeDomain;
"FaultDomain" = $FaultDomain;
"Force" = $Force.IsPresent;
"NoCleanupOnFailure" = $NoCleanupOnFailure.IsPresent;
"BypassUpgradeStateValidation" = $BypassUpgradeStateValidation.IsPresent;
"FabricIsPreInstalled" = $FabricIsPreInstalled.IsPresent;
"MicrosoftServiceFabricCabFileAbsolutePath" = $MicrosoftServiceFabricCabFileAbsolutePath;
"TimeoutInSeconds" = $TimeoutInSeconds;
"parentVerbosePreference" = $parentVerbosePreference;
}
}
}
if ($parentVerbosePreference -ne "SilentlyContinue")
{
$argList.Keys | ForEach-Object { Write-Verbose "$($_)=$($argList.$_)" }
}
$standaloneArgsFilepath=Join-Path $([System.IO.Path]::GetTempPath()) "SFStandaloneArgs.txt"
if (Test-Path $standaloneArgsFilepath)
{
Remove-Item $standaloneArgsFilepath -Force 2> $null
}
$argList.Keys | ForEach-Object { Add-Content $standaloneArgsFilepath "$($_)=$($argList.$_)" }
$standaloneArgsFilepath = Resolve-Path $standaloneArgsFilepath
$shelloutArgs = @( $standaloneArgsFilepath )
Powershell -Command {
param (
[Parameter(Mandatory=$true)]
[string] $ParamFilepath
)
Get-Content $ParamFilepath | Where-Object {$_.length -gt 0} | Where-Object {!$_.StartsWith("#")} | ForEach-Object {
$var = $_.Split('=')
if ($var.Length -eq 2)
{
New-Variable -Name $var[0] -Value $var[1] -Force
}
}
Remove-Item $ParamFilepath -Force 2> $null
if (![string]::IsNullOrEmpty($Force)) { $Force = [Convert]::ToBoolean($Force); } else { $Force = $false}
if (![string]::IsNullOrEmpty($NoCleanupOnFailure)) { $NoCleanupOnFailure = [Convert]::ToBoolean($NoCleanupOnFailure); } else { $NoCleanupOnFailure = $false}
if (![string]::IsNullOrEmpty($BypassUpgradeStateValidation)) { $BypassUpgradeStateValidation = [Convert]::ToBoolean($BypassUpgradeStateValidation); } else { $BypassUpgradeStateValidation = $false}
if (![string]::IsNullOrEmpty($FabricIsPreInstalled)) { $FabricIsPreInstalled = [Convert]::ToBoolean($FabricIsPreInstalled); } else { $FabricIsPreInstalled = $false}
if (![string]::IsNullOrEmpty($WindowsCredential)) { $WindowsCredential = [Convert]::ToBoolean($WindowsCredential); } else { $WindowsCredential = $false}
if (![string]::IsNullOrEmpty($X509Credential)) { $X509Credential = [Convert]::ToBoolean($X509Credential); } else { $X509Credential = $false}
if (![string]::IsNullOrEmpty($TimeoutInSeconds)) { $TimeoutInSeconds = [Convert]::ToInt32($TimeoutInSeconds); }
#Add FabricCodePath Environment Path
$env:path = "$($DeployerBinPath);" + $env:path
#Import Service Fabric Powershell Module
Import-Module $ServiceFabricPowershellModulePath
Try
{
# Connect to the existing cluster
Write-Verbose "Connecting to the cluster at $ExistingClientConnectionEndpoint"
if($X509Credential)
{
Connect-ServiceFabricCluster -ConnectionEndpoint $ExistingClientConnectionEndpoint -X509Credential -ServerCertThumbprint $ServerCertThumbprint -StoreLocation $StoreLocation -StoreName $StoreName -FindValue $FindValueThumbprint -FindType FindByThumbprint
}
else
{
if($WindowsCredential)
{
Connect-ServiceFabricCluster $ExistingClientConnectionEndpoint -WindowsCredential
}
else
{
Connect-ServiceFabricCluster $ExistingClientConnectionEndpoint
}
}
}
Catch
{
Write-Host "Cannot form client connection to cluster. Check your ClientConnectionEndpoint and security credentials. Exception thrown : $($_.Exception.ToString())" -ForegroundColor Red
exit 1
}
if ($ClusterConnection -eq $null) {
Write-Host "Could not form client connection to cluster. Check your ClientConnectionEndpoint and security credentials." -ForegroundColor Red
exit 1
}
if ($FabricIsPreInstalled)
{
Write-Host "Switch FabricIsPreInstalled is set, so assuming Fabric runtime is already installed on the machine."
}
elseif (!(Test-Path variable:MicrosoftServiceFabricCabFileAbsolutePath) `
-or [string]::IsNullOrEmpty($MicrosoftServiceFabricCabFileAbsolutePath))
{
Try
{
# Get runtime package details
$UpgradeStatus = Get-ServiceFabricClusterUpgrade
}
Catch
{
Write-Host "Could not query current cluster version. Check your ClientConnectionEndpoint and security credentials." -ForegroundColor Red
exit 1
}
if ($UpgradeStatus.UpgradeState -ne "RollingForwardCompleted" -And $UpgradeStatus.UpgradeState -ne "RollingBackCompleted")
{
if ($BypassUpgradeStateValidation)
{
Write-Host "BypassUpgradeStateValidation is set but cannot be used without FabricRuntimePackagePath when cluster version cannot be automatically inferred from the upgrade state." -ForegroundColor Red
}
Write-Host "New node cannot be added to the cluster while upgrade is in progress or before cluster has finished bootstrapping. To monitor upgrade state run Get-ServiceFabricClusterUpgrade and wait until UpgradeState switches to either RollingForwardCompleted or RollingBackCompleted." -ForegroundColor Red
exit 1
}
Try
{
$RuntimeCabFilename = "MicrosoftAzureServiceFabric." + $UpgradeStatus.TargetCodeVersion + ".cab"
$DeploymentPackageRoot = Split-Path -parent $DeployerBinPath
$RuntimeBinPath = Join-Path $DeploymentPackageRoot -ChildPath "DeploymentRuntimePackages"
$MicrosoftServiceFabricCabFilePath = Join-Path $RuntimeBinPath -ChildPath $RuntimeCabFilename
if (!(Test-Path $MicrosoftServiceFabricCabFilePath))
{
$RuntimePackageDetails = Get-ServiceFabricRuntimeSupportedVersion
$RequiredPackage = $RuntimePackageDetails.RuntimePackages | where { $_.Version -eq $UpgradeStatus.TargetCodeVersion }
if ($RequiredPackage -eq $null)
{
Write-Host "The required runtime version is no longer supported. Please upgrade your cluster to the latest version before adding a node." -ForegroundColor Red
exit 1
}
$Version = $UpgradeStatus.TargetCodeVersion
Write-Host "Runtime package version $Version was not found in DeploymentRuntimePackages folder and needed to be downloaded."
(New-Object System.Net.WebClient).DownloadFile($RuntimePackageDetails.GoalRuntimeLocation, $MicrosoftServiceFabricCabFilePath)
Write-Host "Runtime package has been successfully downloaded to $MicrosoftServiceFabricCabFilePath."
}
$MicrosoftServiceFabricCabFileAbsolutePath = Resolve-Path $MicrosoftServiceFabricCabFilePath
}
Catch
{
Write-Host "Runtime package cannot be downloaded. Check your internet connectivity. If the cluster is not connected to the internet run Get-ServiceFabricClusterUpgrade and note the TargetCodeVersion. Run Get-ServiceFabricRuntimeSupportedVersion from a machine connected to the internet to get the download links for all supported fabric versions. Download the package corresponding to your TargetCodeVersion. Pass -FabricRuntimePackageOutputDirectory <Path to runtime package> to AddNode.ps1 in addition to other parameters. Exception thrown : $($_.Exception.ToString())" -ForegroundColor Red
exit 1
}
}
#Add Node to an existing cluster
Try
{
$AddNodeTimeoutDuration=[System.TimeSpan]::FromSeconds($TimeoutInSeconds)
$AddNodeTimeout=[System.DateTime]::UtcNow + $AddNodeTimeoutDuration
Get-ServiceFabricNode | ft
$VerbosePreference = $parentVerbosePreference
$params = @{
'NodeName' = $NodeName;
'NodeType' = $NodeType;
'IpAddressOrFQDN' = $NodeIpAddressOrFQDN;
'UpgradeDomain' = $UpgradeDomain;
'FaultDomain' = $FaultDomain;
'FabricRuntimePackagePath' = $MicrosoftServiceFabricCabFileAbsolutePath;
'NoCleanupOnFailure' = $NoCleanupOnFailure;
'Force' = $Force;
'BypassUpgradeStateValidation' = $BypassUpgradeStateValidation;
'FabricIsPreInstalled' = $FabricIsPreInstalled;
}
if ((Test-Path variable:TimeoutInSeconds) `
-and ($TimeoutInSeconds -gt 0))
{
$params += @{'TimeoutSec' = $TimeoutInSeconds;}
}
Write-Host "Adding Node $NodeName"
Add-ServiceFabricNode @params
Write-Host "Waiting for node to join cluster." -NoNewline
$nodeJoined=$false
$firstRun=$true
do
{
if (!$nodeJoined -and !$firstRun)
{
Write-Host "." -NoNewline
Start-Sleep -s 10
}
$result=Get-ServiceFabricNode | Where-Object { [System.String]::Compare($_.NodeName, $NodeName, [System.StringComparison]::InvariantCulture) -eq 0 }
$nodeJoined=$result.Count -gt 0
$firstRun=$false
} while(!$nodeJoined -and ([System.DateTime]::UtcNow -lt $AddNodeTimeout))
Write-Host "" # Newline
if(-not $nodeJoined)
{
Write-Host "Node did not join within timeout of $TimeoutInSeconds seconds." -ForegroundColor Red
exit 1
}
Get-ServiceFabricNode | ft
Write-Host "Node $NodeName joined the cluster!" -ForegroundColor Green
}
Catch
{
if($VerbosePreference -eq "SilentlyContinue")
{
Write-Host "Add Node failed. Call with -Verbose for more details" -ForegroundColor Red
}
Write-Host "Add node to existing cluster failed with exception: $($_.Exception.ToString())" -ForegroundColor Red
exit 1
}
} -args $shelloutArgs -OutputFormat Text
$env:Path = [System.Environment]::GetEnvironmentVariable("path","Machine")
# SIG # Begin signature block
# MIInoQYJKoZIhvcNAQcCoIInkjCCJ44CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAaWS1eDTImCPqr
# XkXx+JOiU509Id8D94uRE9I3NDASNqCCDXYwggX0MIID3KADAgECAhMzAAACURR2
# zMWFg24LAAAAAAJRMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjEwOTAyMTgzMjU5WhcNMjIwOTAxMTgzMjU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDBIpXR3b1IYAMunV9ZYBVYsaA7S64mqacKy/OJUf0Lr/LW/tWlJDzJH9nFAhs0
# zzSdQQcLhShOSTUxtlwZD9dnfIcx4pZgu0VHkqQw2dVc8Ob21GBo5sVrXgEAQxZo
# rlEuAl20KpSIFLUBwoZFGFSQNSMcqPudXOw+Mhvn6rXYv/pjXIjgBntn6p1f+0+C
# 2NXuFrIwjJIJd0erGefwMg//VqUTcRaj6SiCXSY6kjO1J9P8oaRQBHIOFEfLlXQ3
# a1ATlM7evCUvg3iBprpL+j1JMAUVv+87NRApprPyV75U/FKLlO2ioDbb69e3S725
# XQLW+/nJM4ihVQ0BHadh74/lAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUMLgM7NX5EnpPfK5uU6FPvn2g/Ekw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzQ2NzU5NjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIVJlff+Fp0ylEJhmvap
# NVv1bYLSWf58OqRRIDnXbHQ+FobsOwL83/ncPC3xl8ySR5uK/af4ZDy7DcDw0yEd
# mKbRLzHIfcztZVSrlsg0GKwZuaB2MEI1VizNCoZlN+HlFZa4DNm3J0LhTWrZjVR0
# M6V57cFW0GsV4NlqmtelT9JFEae7PomwgAV9xOScz8HzvbZeERcoSRp9eRsQwOw7
# 8XeCLeglqjUnz9gFM7RliCYP58Fgphtkht9LNEcErLOVW17m6/Dj75zg/IS+//6G
# FEK2oXnw5EIIWZraFHqSaee+NMgOw/R6bwB8qLv5ClOJEpGKA3XPJvS9YgOpF920
# Vu4Afqa5Rv5UJKrsxA7HOiuH4TwpkP3XQ801YLMp4LavXnvqNkX5lhFcITvb01GQ
# lcC5h+XfCv0L4hUum/QrFLavQXJ/vtirCnte5Bediqmjx3lswaTRbr/j+KX833A1
# l9NIJmdGFcVLXp1en3IWG/fjLIuP7BqPPaN7A1tzhWxL+xx9yw5vQiT1Yn14YGmw
# OzBYYLX0H9dKRLWMxMXGvo0PWEuXzYyrdDQExPf66Fq/EiRpZv2EYl2gbl9fxc3s
# qoIkyNlL1BCrvmzunkwt4cwvqWremUtqTJ2B53MbBHlf4RfvKz9NVuh5KHdr82AS
# MMjU4C8KNTqzgisqQdCy8unTMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGYEwghl9AgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAJRFHbMxYWDbgsAAAAAAlEwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFV94myVv8uodI4+8m0NDbyF
# cRyY34Apv8ogTu5v5GZjMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAkDPnC9UfuakL3K8pvfxYlJaFuGA5eBzL1Spo7vr/lLOJrRD3T15/qkg2
# hXyWykPUCAli/V5Nw1TmC4WUpkQA9RfTM6/lDaB1ZeQoCnOU4pLrR+ovPvmCTe/7
# g+TCsvZyIvfd283RMGelrClyB/3OMzleHu6KZq3+G568Hw8xgKAq/7/33iEc2Fqb
# Ns7BSCdTGMsQUhsDFbCxw0oksYx0LpCwkXuXnLH4YcDCQ0LElSwMUm6cdTWq5hnG
# eFaeW5iwkVy3iX82VheBFXCcHl1ruTN5Ma0IfbdirAA1V5RuFVlmGlm+kRJv/SxR
# G6x+ylYpmZrxhyr0d+PdfkfECY5fLKGCFwswghcHBgorBgEEAYI3AwMBMYIW9zCC
# FvMGCSqGSIb3DQEHAqCCFuQwghbgAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFUBgsq
# hkiG9w0BCRABBKCCAUMEggE/MIIBOwIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCD8ee+6HDFvmyKVlVjCdI+H08B8Dp/kni6leOHySHOxKAIGYrG4lRsX
# GBIyMDIyMDYyNjIxMTAxMS4yOVowBIACAfSggdSkgdEwgc4xCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVy
# YXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowQTU2
# LUUzMjktNEQ0RDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vydmlj
# ZaCCEV8wggcQMIIE+KADAgECAhMzAAABpzW7LsJkhVApAAEAAAGnMA0GCSqGSIb3
# DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYD
# VQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAk
# BgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIyMDMwMjE4
# NTEyMloXDTIzMDUxMTE4NTEyMlowgc4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX
# YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg
# Q29ycG9yYXRpb24xKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1ZXJ0
# byBSaWNvMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowQTU2LUUzMjktNEQ0RDEl
# MCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZI
# hvcNAQEBBQADggIPADCCAgoCggIBAO0jOMYdUAXecCWm5V6TRoQZ4hsPLe0Vp6Cw
# xFiTA5l867fAbDyxnKzdfBsf/0XJVXzIkcvzCESXoklvMDBDa97SEv+CuLEIooMb
# FBH1WeYgmLVO9TbbLStJilNITmQQQ4FB5qzMEsDfpmaZZMWWgdOjoSQed9Urjjmc
# uWsSskntiaUD/VQdQcLMnpeUGc7CQsAYo9HcIMb1H8DTcZ7yAe3aOYf766P2OT55
# 3/4hdnJ9Kbp/FfDeUAVYuEc1wZlmbPdRa/uCx4iKXpt80/5woAGSDl8vSNFxi4um
# XKCkwWHm8GeDZ3tOKzMIcIY/64FtpdqpNwbqGa3GkJToEFPR6D6XJ0WyqebZvOZj
# MQEeLCJIrSnF4LbkkfkX4D4scjKz92lI9LRurhMPTBEQ6pw3iGsEPY+Jrcx/DJmy
# QWqbpN3FskWu9xhgzYoYsRuisCb5FIMShiallzEzum5xLE4U5fuxEbwk0uY9ZVDN
# VfEhgiQedcSAd3GWvVM36gtYy6QJfixD7ltwjSm5sVa1voBf2WZgCC3r4RE7Vnov
# lqbCd3nHyXv5+8UGTLq7qRdRQQaBQXekT9UjUubcNS8ZYeZwK8d2etD98mSI4MqX
# cMySRKUJ9OZVQNWzI3LyS5+CjIssBHdv19aM6CjXQuZkkmlZOtMqkLRg1tmhgI61
# yFC+jxB3AgMBAAGjggE2MIIBMjAdBgNVHQ4EFgQUH2y4fwWYLjCFb+EOQgPz9Ppa
# RYMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBU
# oFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9z
# b2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEB
# BGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9w
# cy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5j
# cnQwDAYDVR0TAQH/BAIwADATBgNVHSUEDDAKBggrBgEFBQcDCDANBgkqhkiG9w0B
# AQsFAAOCAgEATxL6MfPZOhR91DHShlzal7B8vOCUvzlvbVha0UzhZfvIcZA/bT3X
# TXbQPLnIDWlRdjQX7PGkORhX/mpjZCC5J7fD3TJMn9ZQQ8MXnJ0sx3/QJIlNgPVa
# Opk9Yk1YEqyItOyPHr3Om3v/q9h5f5qDk0IMV2taosze0JGlM3M5z7bGkDly+Tfh
# H9lI03D/FzLjjzW8EtvcqmmH68QHdTsl84NWGkd2dUlVF2aBWMUprb8H9EhPUQcB
# cpf11IAj+f04yB3ncQLh+P+PSS2kxNLLeRg9CWbmsugplYP1D5wW+aH2mdyBlPXZ
# MIaERJFvZUZyD8RfJ8AsE3uU3JSd408QBDaXDUf94Ki3wEXTtl8JQItGc3ixRYWN
# IghraI4h3d/+266OB6d0UM2iBXSqwz8tdj+xSST6G7ZYqxatEzt806T1BBHe9tZ/
# mr2S52UjJgAVQBgCQiiiixNO27g5Qy4CDS94vT4nfC2lXwLlhrAcNqnAJKmRqK8e
# hI50TTIZGONhdhGcM5xUVeHmeRy9G6ufU6B6Ob0rW6LXY2qTLXvgt9/x/XEh1Crn
# uWeBWa9E307AbePaBopu8+WnXjXy6N01j/AVBq1TyKnQX1nSMjU9gZ3EaG8oS/zN
# M59HK/IhnAzWeVcdBYrq/hsu9JMvBpF+ZEQY2ZWpbEJm7ELl/CuRIPAwggdxMIIF
# WaADAgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNy
# b3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAx
# ODIyMjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX
# YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg
# Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy
# MDEwMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL
# 1yR5vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5K
# Wv64NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTeg
# Cjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv62
# 6GIl3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SH
# JMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss25
# 4o2I5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/Nme
# Rd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afo
# mXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLi
# Mxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb
# 0f2y1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W2
# 9R6HXtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQF
# AgMBAAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1Ud
# DgQWBBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdM
# g30BATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtp
# b3BzL0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJ
# KwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQF
# MAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8w
# TTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj
# dHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBK
# BggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9N
# aWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1V
# ffwqreEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1
# OW27DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce57
# 32pvvinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihV
# J9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZ
# UnWKNsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW
# 9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k
# +SS+c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pF
# EUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L
# +DvktxW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1
# ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6
# CGJ/2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIC0jCCAjsCAQEwgfyhgdSk
# gdEwgc4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNV
# BAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjowQTU2LUUzMjktNEQ0RDElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAwH7vHimSAzeDLN0q
# zWNb2p2vRH+ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAOZizmUwIhgPMjAyMjA2MjYxNjI0MDVaGA8yMDIyMDYy
# NzE2MjQwNVowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA5mLOZQIBADAKAgEAAgIW
# wgIB/zAHAgEAAgIRWzAKAgUA5mQf5QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUA
# A4GBAG8PWgPcg3Vf1TJMpEiItFNUYT9u87Wr413yCWNJDhIyDps/LnxBJTbcoXcK
# vxtubeoqM/SLAEGxsBhrZRz5zyZiaXRqA8Po0WSbcQwduN9IZ9BV7b8k/9ZaSa5r
# 5BtGb97W5ceR90k4iM0w0rmT12K2+9SPi4Or645ArVjwwsivMYIEDTCCBAkCAQEw
# gZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAGnNbsuwmSFUCkA
# AQAAAacwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0B
# CRABBDAvBgkqhkiG9w0BCQQxIgQgsrrhup5PXRnsRDFM7QIv/nqb3+S7TFWLWAIc
# bGJ8P9YwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBH8H/nCZUC4L0Yqbz3
# sH3w5kzhwJ4RqCkXXKxNPtqOGzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwAhMzAAABpzW7LsJkhVApAAEAAAGnMCIEIDJ1j7HQ/YntCFG6CdAM
# 4/ddjCJu/EswnXCRGiWIUaoaMA0GCSqGSIb3DQEBCwUABIICAE/YeyxPajq5PUOd
# GYXBg3Tf5tTvtv7H7h7ShYi6Pji11JB8e9KOketae2qPVtvxl518fI9atD2ybLrg
# tNT5ei35VWDQU0/2jXBjVeVHSx/miAHF5JNeERdmgTKqgT8IKE2x0qnA6+VyRvcM
# yLdzy0zdwLBZlGvG4itUcOiJiy6BadKehMOYvCKwEeaNWpAKlyxm2bVctGktjvU0
# OzJ9kE58IFqgZ/aHtENszL2EzOwHsu7KYbC+nybClW2VOimRPRmjANEtRf+4GYJt
# 00F+8Oycy9mWf2oT0uHjn7iWTG810ApmrD5WJTsckMfx9c5qISw+BwnEkHJrMcio
# OHyFlotY6rkI2TJFd90w6+pnNhI+P/USc1DBoOcpdajji4NZQy3HNuyA0K6zHArF
# mQrTclwrERG7PKu+aPPUv6xnLUGFqECMOTA4LGH2ZejDGvu60BNnc4LXU2DW9C/U
# FBfb1jLPEJeaP7Zbx+TbvrQTzqHdadP7a1BI9Mc+iam2/PetqBfHpIXq66nKAE35
# g/wjDDy+tGc0CyZmzvsU/5paseO3yXq8TcaS+x67mBl9yCEk2fRnPTIXFZxMhjN7
# PdPT18GqnK3a36j8qF2t3k9KaN0S7GmjeASdkicK6ek4HYtENEzu4RryYRJiY0tg
# gR2wCB/7cVS33YhZ3UqE5q2k/tw+
# SIG # End signature block
|
combined_dataset/train/non-malicious/4338.ps1
|
4338.ps1
|
function Get-ScriptSourceLocation
{
[CmdletBinding()]
Param
(
[Parameter()]
[String]
$Location,
[Parameter()]
$Credential,
[Parameter()]
$Proxy,
[Parameter()]
$ProxyCredential
)
$scriptLocation = $null
if($Location)
{
if(Microsoft.PowerShell.Management\Test-Path -Path $Location)
{
$scriptLocation = $Location
}
else
{
$tempScriptLocation = $null
if($Location.EndsWith('/api/v2', [System.StringComparison]::OrdinalIgnoreCase))
{
$tempScriptLocation = $Location + '/items/psscript/'
}
elseif($Location.EndsWith('/api/v2/', [System.StringComparison]::OrdinalIgnoreCase))
{
$tempScriptLocation = $Location + 'items/psscript/'
}
if($tempScriptLocation)
{
$scriptLocation = Resolve-Location -Location $tempScriptLocation `
-LocationParameterName 'ScriptSourceLocation' `
-Credential $Credential `
-Proxy $Proxy `
-ProxyCredential $ProxyCredential `
-ErrorAction SilentlyContinue `
-WarningAction SilentlyContinue
}
}
}
return $scriptLocation
}
|
combined_dataset/train/non-malicious/sample_10_66.ps1
|
sample_10_66.ps1
|
#************************************************
# TS_SDPHTTPTests.ps1
# Version 1.0.1
# Date: 01/18/2013
# Author: andret
# Description: Test HTTP connectivity to URLs used in SDP Workflow
#************************************************
Import-LocalizedData -BindingVariable ScriptStrings
#Networking Information - NIC Cards
$NIC_Configs = Get-CimInstance Win32_NetworkAdapterConfiguration -Filter "IPEnabled = true"
$NetworkAdapter_Summary = New-Object PSObject
Foreach ($NIC_Config in $NIC_Configs)
{
$NIC_Config_Summary = New-Object PSObject
$NetworkAdapter = Get-CimInstance Win32_NetworkAdapter -Filter ("DeviceID = " + $NIC_Config.Index)
if ($null -ne $NetworkAdapter)
{
$NIC_Config_Summary | Add-Member -MemberType NoteProperty -Name $ScriptStrings.ID_MATS_NetworkAdapter -Value $NetworkAdapter.Name
#$NIC_Config_Summary | Add-Member -MemberType NoteProperty -Name $ScriptStrings.ID_MATS_NetworkAdapterType -Value ($NetworkAdapter.AdapterType)
$NIC_Config_Summary | Add-Member -MemberType NoteProperty -Name $ScriptStrings.ID_MATS_NetworkAdapterSpeed -Value ("{0:N0}" -f $NetworkAdapter.Speed)
$ConnectionID = $NetworkAdapter.NetConnectionID
}
else
{
$ConnectionID = $NIC_Config.Description
}
$NIC_Config_Summary | Add-Member -MemberType NoteProperty -Name $ScriptStrings.ID_MATS_IPAddresses -Value ([string]::Join("<br/>", $NIC_Config.IPAddress))
$NIC_Config_Summary | Add-Member -MemberType NoteProperty -Name $ScriptStrings.ID_MATS_DefaultGateway -Value ([string]::Join("<br/>", $NIC_Config.DefaultIPGateway))
$NIC_Config_Summary | Add-Member -MemberType NoteProperty -Name $ScriptStrings.ID_MATS_DNSServers -Value ([string]::Join("<br/>", $NIC_Config.DNSServerSearchOrder))
$NetworkAdapter_Summary | Add-Member -MemberType NoteProperty -Name $ConnectionID -Value (Convert-PSObjectToHTMLTable -PSObject $NIC_Config_Summary)
}
$NetworkAdapter_Summary | ConvertTo-Xml2 | update-diagreport -id 11_Nic -name "Network Adapter Configuration" -verbosity informational
$IESettings_Summary = New-Object PSObject
$IESettings = (get-itemproperty 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet Settings')
if ($IESettings.ProxyEnable -eq 1)
{
$IESettings_Summary | Add-Member -MemberType NoteProperty -Name $ScriptStrings.ID_MATS_ProxyEnabled -Value $ScriptStrings.ID_Enabled
$IESettings_Summary | Add-Member -MemberType NoteProperty -Name $ScriptStrings.ID_MATS_ProxyServerAdd -Value $IESettings.ProxyServer
if ($null -ne $IESettings.ProxyOverride)
{
$IESettings_Summary | Add-Member -MemberType NoteProperty -Name $ScriptStrings.ID_MATS_ProxyOverride -Value (Replace-XMLChars $IESettings.ProxyOverride)
}
}
else
{
$IESettings_Summary | Add-Member -MemberType NoteProperty -Name $ScriptStrings.ID_MATS_ProxyEnabled -Value $ScriptStrings.ID_Disabled
}
$IESettingsConnections = (get-itemproperty 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections')
if ($null -ne $IESettingsConnections.DefaultConnectionSettings)
{
#Possible Values
#01 - neither of those 2 auto config boxes are checked
#05 - just the Use automatic configuration script is checked
#09 - just the Automatically detect settings is checked
#0d - both of them are checked
$DefaultConnectionSetting = $IESettingsConnections.DefaultConnectionSettings[8]
$AutoEnabledValues = @(9, 11, 13, 15)
if ($AutoEnabledValues -contains $DefaultConnectionSetting)
{
$IESettings_Summary | Add-Member -MemberType NoteProperty -Name $ScriptStrings.ID_MATS_ProxyAutoSettings -Value $ScriptStrings.ID_Enabled
}
elseif ($DefaultConnectionSetting -eq 1)
{
$IESettings_Summary | Add-Member -MemberType NoteProperty -Name $ScriptStrings.ID_MATS_ProxyAutoSettings -Value $ScriptStrings.ID_Disabled
}
}
if ($null -ne $IESettings.AutoConfigURL)
{
$IESettings_Summary | Add-Member -MemberType NoteProperty -Name $ScriptStrings.ID_MATS_ProxyAutoScript -Value $IESettings.AutoConfigURL
}
$IESettings_Summary | ConvertTo-Xml2 | update-diagreport -id 11_IE -name "Internet Explorer Configuration" -verbosity informational
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBfAK46K7IR+1jz
# 9ocEOyYkhbE5plHhm+NlQ0o25MD0bqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKfTp0NRx4Er5opLqECkkj6p
# nZdUuYj3asJho6sFenNOMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAHVnGABid6l3nDwBN61MpbWP9Ij1Hgj5ww2wTCEdtvRRzTyglTSmN19iF
# 5O3kppngYUDZd2xgkpKlQVbPb2QXFDrnMwTA9bZmJ6HRkr7LGU+jMf838gAdbPYW
# HUQc1uMyLywwIlhu3uC8Jeng0hTnLq9vOkTmMB55NTWJBzUhWZq8njiih2CYl5VF
# b4c2t+sRxtAex7B/IE0VfHuT5tpEd4JUgDgI5yf2PTnI6cGA7fWUtf+lTmbt7diI
# kQftXnYZGi3FnjuJVG73zI8tmc5F4XbOEVdR1MjYiI0JoufSy1oqE+7M9cwDK9q3
# 5mb1YPYaYPQsgx330zt+hXH/VwSJY6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAjAEBhbu8PArzB0L1hULPtU0hBa385fS/1tdBLJ0Bh9QIGZxp1kNxf
# GBMyMDI0MTAyODExNDA0NS41MzJaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w
# M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgABAAAB6TANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yrAPJnV6A7aZYnTw/yx90u
# 1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZY5O8PCBu7Gq+x5Xe6plQ
# t4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7LMpKwIKQMwXDctYKvCyQy
# 6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5MxylRdTS7E1Jocl30NgcBi
# JfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9dxsyvng0lUVY+urq/G8QR
# FoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTpw2I6ZWaIhPwMu5DvdkEG
# zV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0VJBSGV+h66ZcaUJOxpbS
# IjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDCxHG4mW3mpNQopM/U1WJn
# jssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOamGfwvkIe7dkylzm8BeAU
# QC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKFI30u9YlxDTzAuLDK073c
# ndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022+yPwclmykssk30a4Rp3v
# 9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYjuIj0Wuv+jcjtB+xOMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe61AE90Ken2XPgQHJDiS4S
# bLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz/HciZooyeoAvkHQaHmLh
# wBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20QpHDEukwKR8kfaBEX83A
# yvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQgeEBr8E4K2wQ2WXI/ZJxZ
# S/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/JnjXMChnm9bLDD1waJ7TPp5
# wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6QjegHzndX/tZrY792dfR
# AXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWGXYJL5H6LNnKyXJVEw/1F
# bO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsHptAvREqCc+/YxzhIKkA8
# 8Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFvNRhh8ZBAenn1pW+5UBGY
# z2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMlPG3YjuqFxidiIsoAw2+M
# hI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2jJWgq7VlBuP1BuXjZ3qgy
# m9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCr
# aYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smRDzAiGA8yMDI0MTAyODA0MjY1
# NVoYDzIwMjQxMDI5MDQyNjU1WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyZEP
# AgEAMAcCAQACAhTEMAcCAQACAhPHMAoCBQDqyuKPAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAHKM99UwoPSM+XhXj9JQE0j3fiHtBHop/3nnFpjQj8V83hqU
# 5S4zNupqga4qWf4ER6xtR+I8qqmZvqZ6vV8e+IqzOJ9xvEgbrAR5K6X+m/0UulYt
# n4mNtjFswU0pnvvDMRJ0z5k68F8c0jh94jLA5XDWpS9MpP5gv2jcKAx6bUdU1GWp
# un+uoXQ2wajPrQVTjdnnIihSkPFnaSAZ9v5Wl5peuAnC5l3l2pWNTP/uI425dd/q
# lyg95Ug5B1eiceCbJS5ASgJyIA//msCuwJM8p5HX4cRcvA2b/9gGyJGQQ0VcBEld
# HI8hfTAAtAbbG76IFJa/SubdiXplDokIkex/GRIxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAekPcTB+XfESNgABAAAB6TAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCAqO5fPON/oQnn2+st5mnc3s0a/RgInOWBfYglsciZP9TCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQkniXaTcmj1TKQWF+x2U4riVo
# rGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQgSBS8Q6r5BbZ0l6HNgYtnviUBT9Vn
# cdigzcIj/qNKQaIwDQYJKoZIhvcNAQELBQAEggIADUOnXIPYPTw5MI60eAzt0/nT
# 5jGC4X2+tSarRBMoS8+rFcEN/PEeTF/epUvxg4wEPTf5UOjIkCxqFCfMK9RjUglp
# Lw0NNJ24iKG0uS1NTHNq74HxBHvEKzhc6j9/6RXIpXrhWPP391kJhTOcFw02Ybwc
# sbSjyVpoMKsZ5Nnn8NW+ngrqgr1JMKpz8LgQoUGCe8SRTiwSETw22tgtMUptbphn
# hCCpeb5pMtohSL2zvER5OpuaoTWXuVubKS9uhlZjufzG+1G2rb5XM8b2V0vagkrJ
# kOhKVqNA4MGLxzAmH9i7cTcrqL4GxEETPI12oUSD3c63eq0V6/tCFR0fl+oBPHUO
# wGZ6SuCDEjFavi6zqyUYVzYkmrWX3T7yl8lh3uyje6Fe36xArPuphk6GHMGTQrKJ
# P6BwKP5xVKEvXFsx/X89s+/zWnfrxMLFLzc02oKB1tx0/13ZShSzlm8Vyl8dTh75
# 13Eg2sh06LFssw2+0JBNeGijmHokShEBod+CynSebuN1n73qqOuJHp0DpTUQNUYv
# PTk0l1kqDOxDvyJ5FT6BccH2UVm2wNA39I+6o5bbLOpD4fHuIbxXCKyHtgzA6pJn
# u9S59zmcze7hp99Bk56aDMTx7NSSyAS/5Vi4ujHTcnBVQFRQ+EyaIfm626j7KviK
# gz3yOz+gcglP5wwpdEo=
# SIG # End signature block
|
combined_dataset/train/non-malicious/List AD Computers XLS.ps1
|
List AD Computers XLS.ps1
|
# Create a new Excel object using COM
$Excel = New-Object -ComObject Excel.Application
$Excel.visible = $True
# WMI Class variables
$WMI_CSP = "Win32_ComputerSystemProduct"
$WMI_CS = "Win32_ComputerSystem"
$WMI_Disk = "Win32_LogicalDisk"
$WMI_OS = "Win32_OperatingSystem"
$WMI_Proc = "Win32_Processor"
# Set up a directory search for all computer objects in the current domain
$objDomain = New-Object System.DirectoryServices.DirectoryEntry
[string]$DomainName = $objDomain.name
$objSearcher = New-Object System.DirectoryServices.DirectorySearcher
$objSearcher.SearchRoot = $objDomain
$objSearcher.Filter = ("(objectCategory=computer)")
$Results = $objSearcher.FindAll()
# Counter variable for rows
$intRow = 1
$Excel = $Excel.Workbooks.Add()
$Sheet = $Excel.Worksheets.Item(1)
#Create column headers
$Sheet.Cells.Item($intRow,1) = "UUID"
$Sheet.Cells.Item($intRow,1).Font.Bold = $True
$Sheet.Columns.Item('a').ColumnWidth = 42
$Sheet.Cells.Item($intRow,2) = "Hostname"
$Sheet.Cells.Item($intRow,2).Font.Bold = $True
$Sheet.Columns.Item('b').ColumnWidth = 14
$Sheet.Cells.Item($intRow,3) = "IP Address"
$Sheet.Cells.Item($intRow,3).Font.Bold = $True
$Sheet.Columns.Item('c').ColumnWidth = 11
$Sheet.Cells.Item($intRow,4) = "Domain"
$Sheet.Cells.Item($intRow,4).Font.Bold = $True
$Sheet.Columns.Item('d').ColumnWidth = 10
$Sheet.Cells.Item($intRow,5) = "OS"
$Sheet.Cells.Item($intRow,5).Font.Bold = $True
$Sheet.Columns.Item('e').ColumnWidth = 42
$Sheet.Cells.Item($intRow,6) = "OS Version"
$Sheet.Cells.Item($intRow,6).Font.Bold = $True
$Sheet.Columns.Item('f').ColumnWidth = 13
$Sheet.Cells.Item($intRow,7) = "OS Release"
$Sheet.Cells.Item($intRow,7).Font.Bold = $True
$Sheet.Columns.Item('g').ColumnWidth = 11
$Sheet.Cells.Item($intRow,8) = "Manufacturer"
$Sheet.Cells.Item($intRow,8).Font.Bold = $True
$Sheet.Columns.Item('h').ColumnWidth = 17
$Sheet.Cells.Item($intRow,9) = "Model"
$Sheet.Cells.Item($intRow,9).Font.Bold = $True
$Sheet.Columns.Item('i').ColumnWidth = 34
$Sheet.Cells.Item($intRow,10) = "Platform"
$Sheet.Cells.Item($intRow,10).Font.Bold = $True
$Sheet.Columns.Item('j').ColumnWidth = 12
$Sheet.Cells.Item($intRow,11) = "Memory (MB)"
$Sheet.Cells.Item($intRow,11).Font.Bold = $True
$Sheet.Columns.Item('k').ColumnWidth = 13
$Sheet.Cells.Item($intRow,12) = "Processors"
$Sheet.Cells.Item($intRow,12).Font.Bold = $True
$Sheet.Columns.Item('l').ColumnWidth = 10
$Sheet.Cells.Item($intRow,13) = "Disk Usage (KB)"
$Sheet.Cells.Item($intRow,13).Font.Bold = $True
$Sheet.Columns.Item('m').ColumnWidth = 15
foreach ($objResult in $Results) {
$intRow++
$objComputer = $objResult.Properties
[string]$computer = $objComputer.name
$pingStatus = Get-WMIObject Win32_PingStatus -Filter "Address = '$computer'"
$ipAddress = $pingStatus.ProtocolAddress
if($pingStatus.StatusCode -eq 0) {
$UUID = Get-WMIObject $WMI_CSP -ComputerName $computer | Select UUID
$_UUID = $UUID.UUID
$OS = Get-WMIObject $WMI_OS -ComputerName $computer | Select Caption
$_OS = $OS.Caption
if($_OS)
{if($_OS.Contains(",")) {$_OS = $_OS.Replace(",","")} if($_OS.Contains("(R)")) {$_OS = $_OS.Replace("(R)","")}}
$CSDVer = Get-WMIObject $WMI_OS -ComputerName $computer | Select CSDVersion
$_CSDVer = $CSDVer.CSDVersion
$Ver = Get-WMIObject $WMI_OS -ComputerName $computer | Select Version
$_Ver = $Ver.Version
$Mfr = Get-WMIObject $WMI_CSP -ComputerName $computer | Select Vendor
$_Mfr = $Mfr.Vendor
if($_Mfr)
{if($_Mfr.Contains("HP")) {$_Mfr = $_Mfr.Replace("HP","Hewlett-Packard")}}
$HW = Get-WMIObject $WMI_CSP -ComputerName $computer | Select Name
$_HW = $HW.Name
$Platform = Get-WMIObject $WMI_Proc -ComputerName $computer -filter "DeviceID = 'CPU0'" | Select Manufacturer
$_Platform = $Platform.Manufacturer
$RAMKB = Get-WMIObject $WMI_CS -ComputerName $computer | Select TotalPhysicalMemory
[int64]$_RAMKB = $RAMKB.TotalPhysicalMemory
[int64]$_RAMMB = $_RAMKB / 1kb
$Processors = Get-WMIObject $WMI_CS -ComputerName $computer | Select NumberOfProcessors
[int64]$NumOfProcs = $Processors.NumberOfProcessors
$Space = Get-WMIObject $WMI_Disk -ComputerName $computer -filter "DeviceID = 'c:'" | Select FreeSpace
[int64]$DiskFree = $Space.FreeSpace
$Size = Get-WMIObject $WMI_Disk -ComputerName $computer -filter "DeviceID = 'c:'" | Select Size
[int64]$DiskSize = $Size.Size
[int64]$DiskUsage = ($DiskSize - $DiskFree) / 1kb
# Output minimal information to Console & Complete information to XLS file (Successful Ping)
Write-Host -ForegroundColor Green "Reply received from $computer ($ipAddress)"
$Sheet.Cells.Item($intRow,1) = $_UUID
$Sheet.Cells.Item($intRow,2) = $computer
$Sheet.Cells.Item($intRow,3) = $ipAddress
$Sheet.Cells.Item($intRow,4) = $DomainName
$Sheet.Cells.Item($intRow,5) = $_OS
$Sheet.Cells.Item($intRow,6) = $_CSDVer
$Sheet.Cells.Item($intRow,7) = $_Ver
$Sheet.Cells.Item($intRow,8) = $_Mfr
$Sheet.Cells.Item($intRow,9) = $_HW
$Sheet.Cells.Item($intRow,10) = $_Platform
$Sheet.Cells.Item($intRow,11) = $_RAMMB
$Sheet.Cells.Item($intRow,12) = $NumOfProcs
$Sheet.Cells.Item($intRow,13) = $DiskUsage
}
else {
# Output minimal information to Console & Minimal information to XLS file (Unsucccessful Ping)
Write-Host -ForegroundColor Red "No Reply received from $computer ....................[SKIPPED]"
$Sheet.Cells.Item($intRow, 1) = "HOST NOT ONLINE"
$Sheet.Cells.Item($intRow, 2) = $computer
$Sheet.Cells.Item($intRow, 3) = "---"
$Sheet.Cells.Item($intRow, 4) = $DomainName
$Sheet.Cells.Item($intRow, 5) = "---"
$Sheet.Cells.Item($intRow, 6) = "---"
$Sheet.Cells.Item($intRow, 7) = "---"
$Sheet.Cells.Item($intRow, 8) = "---"
$Sheet.Cells.Item($intRow, 9) = "---"
$Sheet.Cells.Item($intRow, 10) = "---"
$Sheet.Cells.Item($intRow, 11) = "---"
$Sheet.Cells.Item($intRow, 12) = "---"
$Sheet.Cells.Item($intRow, 13) = "---"
}
}
$Sheet.UsedRange.EntireColumn.AutoFit()
Clear
|
combined_dataset/train/non-malicious/sample_59_59.ps1
|
sample_59_59.ps1
|
##########################################################################
# DELL PROPRIETARY INFORMATION
#
# This software is confidential. Dell Inc., or one of its subsidiaries, has supplied this
# software to you under the terms of a license agreement,nondisclosure agreement or both.
# You may not copy, disclose, or use this software except in accordance with those terms.
#
# Copyright 2020 Dell Inc. or its subsidiaries. All Rights Reserved.
#
# DELL INC. MAKES NO REPRESENTATIONS OR WARRANTIES ABOUT THE SUITABILITY OF THE SOFTWARE,
# EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF
# MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT.
# DELL SHALL NOT BE LIABLE FOR ANY DAMAGES SUFFERED BY LICENSEE AS A RESULT OF USING,
# MODIFYING OR DISTRIBUTING THIS SOFTWARE OR ITS DERIVATIVES.
#
#
#
##########################################################################
<#
This is a Resource designer script which generates a mof schema for DCPP_POSTBehavior resource in DellBIOSProvider module.
#>
$category = New-xDscResourceProperty -name Category -Type String -Attribute Key
$assettag = New-xDscResourceProperty -name AssetTag -Type String -Attribute Write
$ownershiptag = New-xDscResourceProperty -name OwnershipTag -Type String -Attribute Write
$Password = New-xDscResourceProperty -Name Password -Type string -Attribute Write -Description "Password"
$SecurePassword = New-xDscResourceProperty -Name SecurePassword -Type string -Attribute Write -Description "SecurePassword"
$PathToKey = New-xDscResourceProperty -Name PathToKey -Type string -Attribute Write
$properties = @($category,$assettag,$ownershiptag,$Password,$SecurePassword,$PathToKey)
New-xDscResource -ModuleName DellBIOSProviderX86 -Name DCPP_SystemInformation -Property $properties -Path 'C:\Program Files\WindowsPowerShell\Modules' -FriendlyName "SystemInformation" -Force -Verbose
# SIG # Begin signature block
# MIIutAYJKoZIhvcNAQcCoIIupTCCLqECAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDa1j+fdJrywx7k
# tNLjufTkt9PO68sU9kQZlNRDjr+4zaCCEugwggXfMIIEx6ADAgECAhBOQOQ3VO3m
# jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE
# ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s
# ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv
# ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy
# dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx
# MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu
# MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp
# b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK
# AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq
# gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l
# OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr
# +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d
# vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1
# HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn
# DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig
# nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z
# HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK
# Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u
# DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC
# AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw
# FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG
# AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn
# MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp
# MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O
# BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp
# UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7
# BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+
# LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv
# 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF
# VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX
# bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG
# ejCCBGKgAwIBAgIQXppEwdVMjAFyZoUhC+DGojANBgkqhkiG9w0BAQsFADBjMQsw
# CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjE8MDoGA1UEAxMzRW50
# cnVzdCBFeHRlbmRlZCBWYWxpZGF0aW9uIENvZGUgU2lnbmluZyBDQSAtIEVWQ1My
# MB4XDTI0MDIxNDIwNTQ0MloXDTI1MDIyNzIwNTQ0MVowgdUxCzAJBgNVBAYTAlVT
# MQ4wDAYDVQQIEwVUZXhhczETMBEGA1UEBxMKUm91bmQgUm9jazETMBEGCysGAQQB
# gjc8AgEDEwJVUzEZMBcGCysGAQQBgjc8AgECEwhEZWxhd2FyZTEfMB0GA1UEChMW
# RGVsbCBUZWNobm9sb2dpZXMgSW5jLjEdMBsGA1UEDxMUUHJpdmF0ZSBPcmdhbml6
# YXRpb24xEDAOBgNVBAUTBzUyODAzOTQxHzAdBgNVBAMTFkRlbGwgVGVjaG5vbG9n
# aWVzIEluYy4wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDDo1XKkZwW
# xJ2HF9BoBTYk8SHvDp3z2FVdLQay6VKOSz+Xrohhe56UrKQOW/pePeBC+bj+GM0j
# R7bCZCx0X26sh6SKz3RgIRgc+QP3TRKu6disqSWIjIMKFmNegyQPJbDLaDMhvrVk
# j7qobtphs0OB/8N+hSkcTRmiphzDvjwTiYh6Bgt37pPDEvhz1tkZ/fhWWhp355lW
# FWYBPmxVS2vTKDRSQnLtJ31dltNBXalMW0ougqtJNVJTm1m9m8ZgkBtm2a2Ydgdg
# tYbgye5A0udl0HwcImgiDG1eAKNR1W4eG353UsS7n6IWG93QpF5L++2o7DDcDtBr
# 9qtVy3RjzWuzgYW5/wIvLkWS7UolX65tFfwKai617FikhrrqcgWcwfbKVrUA4nL3
# i4OL4718Y9T/8N39Knwp1+ZJx9hMiFVVCr6XteO0LQg18/NFjDzbuRXzX2adEzxm
# Fdbw3ZGLUfCYN2LQTa+ssOc2hAEumaiVRdntd2d5TaOHwXhsSaBMnh8CAwEAAaOC
# ATUwggExMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFHcDtMS/dbtrhMpavR1yYhFn
# +k1vMB8GA1UdIwQYMBaAFM6JT4JRqhWihGLKMSNh0mH7+P54MGcGCCsGAQUFBwEB
# BFswWTAjBggrBgEFBQcwAYYXaHR0cDovL29jc3AuZW50cnVzdC5uZXQwMgYIKwYB
# BQUHMAKGJmh0dHA6Ly9haWEuZW50cnVzdC5uZXQvZXZjczItY2hhaW4ucDdjMDEG
# A1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZXZjczIuY3Js
# MA4GA1UdDwEB/wQEAwIHgDATBgNVHSUEDDAKBggrBgEFBQcDAzAgBgNVHSAEGTAX
# MAcGBWeBDAEDMAwGCmCGSAGG+mwKAQIwDQYJKoZIhvcNAQELBQADggIBABB9FgN1
# YzMm05EhuGuTIEQNOwq4VoETYArSR88RLDN9Dr8lu45+WghxE7MigaGKF8AEi6Z3
# diDeN+5TJOiBd6Zv2LDa3UfMpqf8GZm/L1pd5TF19s44NLbxlIad/yq/NbXFcWsc
# VNu4TtM/PdCg7E0ggh044pNllpR/Ofqqu2D/kV6TBMw2cgL24l5YZxat+hxfWBuw
# Rhtwu/kWiSIe0ad/vB4ChVPY7PvNuU/jCU7PlgXOUiIsPbLsheAoWjxAK+Vl/NYX
# 91T/eXBZ7A4McMoprqPeVkKti0OpC2zhb+3NFHjR/gSkVLkmwEh48ebsip6uqEBY
# KS9zj6P6g0P8HHlwNZMkQ4llOzjIsQriORfayBAmjDpsgHr0r3Q362+svyI//k1V
# HjX3WTTYO1tFfOl0LYVzcfOUj5OY04kH35Y+yi30DGJy2mG0qwlRSAfiDr1a8OpL
# eaxkwvN2R2Ml0s6Oiqq0lTuLNFRnl/tCxahaT8liOzFd2WU7I3L5IL0ufRMlbezA
# S453qkkX4Xtd7KtRDQnWU5IbzBg8Yswwv+DLNm2Ep7PHTU3t4GiF0O+oaDq83QaM
# ovN80wPcCce1PkUB9iSvOuBbbrODjlSFa6OVpLHnvDesW1L99YS8sOitcRnXoNXw
# HST4XAO+86tKYUw2XtjBapV1ND20AMhuaZ5KMIIGgzCCBGugAwIBAgIQNa+3e500
# H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UE
# CgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcg
# Um9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5
# MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVu
# dHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlv
# biBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQADggIP
# ADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4JEIP
# RtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvEjXxG
# 9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bWcJL7
# 1IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2fNSKv
# 1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ414+Xs
# 5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u+o29
# p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7JaWUu
# 7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHRh3vH
# yCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBePLQ2
# +ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcVcDt7
# AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMBAAGj
# ggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoVooRi
# yjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAzBggr
# BgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0
# MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3NicjEu
# Y3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNVHSAE
# PTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0Lm5l
# dC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EWxFiT
# ZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE85rh
# 13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsqjFHj
# xALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3XqgwCu
# AHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8fgk1c
# QqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B7wrb
# fZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHtoeUdq
# 6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctAPiAS
# zghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/gLGQ
# 1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFRBqqm
# DDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9dBmSF
# A3d/YNjCvHTJlZFot7d+YRl1MYIbIjCCGx4CAQEwdzBjMQswCQYDVQQGEwJVUzEW
# MBQGA1UEChMNRW50cnVzdCwgSW5jLjE8MDoGA1UEAxMzRW50cnVzdCBFeHRlbmRl
# ZCBWYWxpZGF0aW9uIENvZGUgU2lnbmluZyBDQSAtIEVWQ1MyAhBemkTB1UyMAXJm
# hSEL4MaiMA0GCWCGSAFlAwQCAQUAoIGaMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3
# AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC4GCisGAQQBgjcCAQwx
# IDAeoByAGgBEAGUAbABsACAAUwBvAGwAdQB0AGkAbwBuMC8GCSqGSIb3DQEJBDEi
# BCCtnUhQINstuosFBGMy2R6b/JhiXFFkzxpca/LWwwzp7TANBgkqhkiG9w0BAQEF
# AASCAYC35SjdxDwU6xemBByuuKTJqM9zbiD/051BxvlD4knEaRfoPmmie4Z51alR
# ItTg4yJLYIzOy1RTUBBULu63rx5is0G1IE8qaJBwTvp3yIsuHKBzZy0okWrdIfve
# sXvK+gyumJ0wQ8mDz4ARPYmXPSyyORZJ9hOZh+CghlOd1RfLPl0sRuk+aegGpalC
# Ue/Xbue40TFMc+Yx26ZvD9QmyKfdTjliFaiDQhyyiCgPb1tIs+adq23yZqM6huIf
# YkYmjvBjIdMMsohrrnRRsBGM/+ogNiAVtL0WqHh+mlK9oZqY2L3TVBTqzdl2ewcM
# JmAp6yqx8/Pncmhgm9Dm5IO27FyTIEsjEK3qK55OqRxaGzqIXn1NO0XPyttQQh97
# 0iRVx4LUMuozSneMmaYHF2TbtyW2Cgj7e0EXyRBflTFsGfXq+VMGDadKMiIoTmJ9
# nHd2Dep/Lhp22sDQPf/KrA0nN1yLR6XJ/z/hL5BJ2Z4hP5sICp4jty2F6ZGLngY5
# z5p+olqhghhfMIIYWwYKKwYBBAGCNwMDATGCGEswghhHBgkqhkiG9w0BBwKgghg4
# MIIYNAIBAzENMAsGCWCGSAFlAwQCAzCB8wYLKoZIhvcNAQkQAQSggeMEgeAwgd0C
# AQEGCmCGSAGG+mwKAwUwMTANBglghkgBZQMEAgEFAAQgdO34B/J2+7d6IiMgzLgb
# isDZsRe50bDr40ukXZptjR8CCG877yVlGAE7GA8yMDI0MDQxODA3MzI0OVowAwIB
# AaB5pHcwdTELMAkGA1UEBhMCQ0ExEDAOBgNVBAgTB09udGFyaW8xDzANBgNVBAcT
# Bk90dGF3YTEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjErMCkGA1UEAxMiRW50cnVz
# dCBUaW1lc3RhbXAgQXV0aG9yaXR5IC0gVFNBMqCCEw4wggXfMIIEx6ADAgECAhBO
# QOQ3VO3mjAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEW
# MBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0
# Lm5ldC9sZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5j
# LiAtIGZvciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJv
# b3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVa
# Fw0zMDExMDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0
# LCBJbmMuMUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRp
# ZmljYXRpb24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4IC
# DwAwggIKAoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSm
# Gl33VFFqgCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHcc
# Uk15iF+lOhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBN
# CFYVb5Cr+0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoT
# SeOQm3/dvfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpV
# EoScRCV1HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUf
# e5SmS1dnDH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM
# 4OEAwjignPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7I
# H9Vybu5ZHFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHAp
# OBGAYGuKQ6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FL
# XxLq/f0uDodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQAB
# o4IBKzCCAScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYD
# VR0lBBYwFAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAo
# MCYGCCsGAQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEF
# BQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAG
# A1UdHwQpMCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmww
# HQYDVR0OBBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQ
# Hu995ztpUdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMd
# ZTrA7LR7BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU
# +5J+Nzg+LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chql
# z3t57jpv3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1G
# w87kVlHFVuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFi
# e1jpUJuXbheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6
# yK81MIIGbzCCBFegAwIBAgIQJbwr8ynKEH8eqbqIhdSdOzANBgkqhkiG9w0BAQ0F
# ADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UE
# Aww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhv
# cml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjIxNFoXDTQwMTIyOTIzNTkwMFowTjEL
# MAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xJzAlBgNVBAMTHkVu
# dHJ1c3QgVGltZSBTdGFtcGluZyBDQSAtIFRTMjCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBALUDKga2hE80zJ4xvuqOxntuICQPA9e9gTYz5m/SPrvEnqqg
# zGZdQmA0UeItYYO6PJ5ouEvDZo6l3iu6my1Bpd7Qy1cFLYjZwEaIbTw1DRmQrLgM
# GfBMxdtFW9w7wryNRADgOP//XcjPCJo91LLre5XDxKUA4GIBZFlfjON7i6n5RbfG
# sKIKN0O4RoGrhn5/L97wX+vNIMylLTHjqC6Zm+B43fTbXYJjfTA5iH4kBuZ8YIR4
# yFwp5ZXL9XtPz1jckM+nonsUVMTgN5gwwZu2rpwp9mslQ+cSaj4Zi77A54HXSjAI
# fnyN3zzzSJMh3oGDap0APtdgutGzYgiW6bZJADj0XHYN2ndqPaCV3h6hzFl6Xp/P
# 6XZdQPK1FbVgaCzzWskjg9j1GmtpKKS21K5iBt4mRb3e6VZ3qtxksEHNzBPxXXF0
# spQIS08ybn5wuHfp1TI3wnreQhLocRzi2GK/qmtBhgZb5mm+Jgn0l8L+TPSAcoRu
# 297FB6mOFaJt4RvgCQ/1oAegu8R3cwk8B5ONAbUSZy1NGbW4xckQq3DPQv+lJx3W
# EtbkGERg+zldhLtmtVMSnQMUgmUptOxJcv2zQ+XDAikkuh/4uL5do7cuqfzPYtn6
# l8QTeONVuVp6hOv/u89piMC2+YtghUEQUMcFENJedp0+Nez2T4r5Ens/rws3AgMB
# AAGjggEsMIIBKDASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBQmD/DESAgb
# zd2R9VRUtrOz/JnxCDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz
# BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu
# bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni
# cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDCDBFBgNV
# HSAEPjA8MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0
# Lm5ldC9ycGEwCAYGZ4EMAQQCMA0GCSqGSIb3DQEBDQUAA4ICAQB2PUZohV8JwM7J
# +Me4136nXDsLRnPOIlOLOPYRunfEwochjyfZDJXr6EvlXNeQFW+oKiyKauAiETR5
# +r2Wech2Fs2xROpxUQ+bVckYfNWCeZzzpreTqQU4cgIGl6Gosnl+Xgjibmx5mqiH
# lM5/j1U2QA+fP1HVZr57q4bmboe6TmNdsdiOH8tnww1w2nrrk7IUhNI+fZM/Fgw2
# oFx5AJ8LbuWEKtiIwW0Etzfzkppw4DsD/c27J4LOL/yN5LLKvvglhcbtdMg9NV84
# CT15T+sb4EFepXSBP1EVwPhJiI+6uwXUrUWCM3nBJY1fVD2R5LifF5gAXa0o5U9f
# G/v4VLWlxCT88HY7+A1ezEewyqq7blHfU7VJGvFgh7f5/WkGdV9z1hGQ8oBYjuXD
# DwOYjARTsymH3z/3sOlMV4EkRHlo/hs2B9ZlPexv1sK1qmF8Zgbs0uVpgPhxki5c
# 4hFGGEVL1voFZO+73gbKQyW9343JAXRhiNvwx6Y94wxxvH9L58jgbuDagPkAnsBr
# JdWjulwr/sRgIBRKByMx5RrLkUSymntD8VuYtSFLuDE7IlTueWH3mpQbZicqxt/h
# ZV3vcTnmUCX9hzS5rl18JzvnZZP4KISxb4aTLJOTtnCvoe7IpGGphDv7Crf4uG0m
# 7kdO9V4F+pwPEX3Xy5GuQyD3FVljvDCCBrQwggScoAMCAQICEFtwJsyW9ngau4X2
# EfVtu24wDQYJKoZIhvcNAQENBQAwTjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVu
# dHJ1c3QsIEluYy4xJzAlBgNVBAMTHkVudHJ1c3QgVGltZSBTdGFtcGluZyBDQSAt
# IFRTMjAeFw0yNDAxMTkxNjQ3NDdaFw0zNTA0MTgwMDAwMDBaMHUxCzAJBgNVBAYT
# AkNBMRAwDgYDVQQIEwdPbnRhcmlvMQ8wDQYDVQQHEwZPdHRhd2ExFjAUBgNVBAoT
# DUVudHJ1c3QsIEluYy4xKzApBgNVBAMTIkVudHJ1c3QgVGltZXN0YW1wIEF1dGhv
# cml0eSAtIFRTQTIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCqhgQ4
# Xo9ov4P1Wv1Um8V9OnWdxKctT23p0AUfUeMzuy9fOrGWVIrpCHw0rYmDVaSfAswj
# C9gbekCkzJ9C6hN/fLjgt0oCBeKDSQRvBobNc0Gpg9SYZ/r0Uhl640pZKIdWF11I
# 8YaRC7giZNtB+V1UtTWkbjjcCA0aVhhAw36YPEIzhA3FpWFRziBtTwDLQvCodRvb
# Rv4p3Bue1/gYBVF2MJt0vZUfGVNlFUcsVmNr6bpIrAo4tsFy/SAKo3Qaawd/0d2s
# F861HMd6iQzsbRwwjQXwrz2XzDW0tQUDZrqedvw52sia1hIS5EHChSJA8Mu6iOnS
# h8KrxjQ75asNAAYOBrWLe9ELIto8qMlWe/A1BJbqWUaMj9SgtamDsM6E+0tE5UGo
# FvOv2tGgJ3DfB+83866RztQhf4aY3F7uj8DaR9tpyhC5kZWAFWPxKxrClqEfwvc8
# 1PZ9JAclqFSUbwpV29skQ24uO6J7Sbu11hiP2QSzvurHtWSaS85SYR4rBR5jN0ad
# scnVXoek6tc0siFCF7g6KDpepe0+/TcXf2Mg8nvWX8rzFD/hzv+Kd5RmbYnB4Ox/
# BHA4ZCf1pxd9TcoMgRvF5fE2xXqufSmkRzU4+g30UwMpBfxvoYvJzfG4iEDT0tue
# JTGt1+Za2AS0hLsERmFm/10y3vzTPnxOGO9+3wIDAQABo4IBZTCCAWEwDAYDVR0T
# AQH/BAIwADAdBgNVHQ4EFgQU9XYa+BCYkqEbd6kALPGVYgILeScwHwYDVR0jBBgw
# FoAUJg/wxEgIG83dkfVUVLazs/yZ8QgwaAYIKwYBBQUHAQEEXDBaMCMGCCsGAQUF
# BzABhhdodHRwOi8vb2NzcC5lbnRydXN0Lm5ldDAzBggrBgEFBQcwAoYnaHR0cDov
# L2FpYS5lbnRydXN0Lm5ldC90czItY2hhaW4yNTYucDdjMDEGA1UdHwQqMCgwJqAk
# oCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvdHMyY2EuY3JsMA4GA1UdDwEB/wQE
# AwIHgDAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDBMBgNVHSAERTBDMDcGCmCGSAGG
# +mwKAQcwKTAnBggrBgEFBQcCARYbaHR0cHM6Ly93d3cuZW50cnVzdC5uZXQvcnBh
# MAgGBmeBDAEEAjANBgkqhkiG9w0BAQ0FAAOCAgEAqat9vxoAhVvc7XEmXpSCr1yC
# S/ocOcVTtcMG3QNgfvlhmkEgwq5BFy6lQgiRCV6XMJiBRdaytYQ9i+mHB9oBP+AI
# WGcRIJQewBaOY3e9m2wFjT21y5oxqUpcYjKiE86QnA3HkE9nw+Cof4eES9fywSEP
# EOcXufu9Ccy+iqYB/k2CT2kgmnVr5A33UCZT/DP3/huup2rAqOseryLTPWAVn7rk
# 1SmktVefsWX2sUxh1dLI2resqhgfIBiKpvj1B/lyK/Zj2CWcFv77lN+GdKIgtPII
# 3xbvOYB2OpKx0JaDatp8U4lZGw1c8bsp8iFPYSwkifh2CX/ZaJCOVwxk1XYAcVnz
# 1ITIPKGIf6hv871uf7CojuaTbOkUxXUcDCvO8gf7ta7UQTG/wcxpmBiuWwiPq1xk
# uYRqvVw4od9PQrdLW1LT3vc7y59vwllCIk4LGLciyC/8agmF7VApUXrElEu2cWWK
# SoaaS3hLVoqh3i+Lk1syzKG576m2DNgGCxcwvw1vj5OsyxH18ccAntAZ15xfjlR8
# a6lDO2PcwUSrvYw6Q/ByPySVzYSRXSEADXhrDVwjJJ9MrzTLFFreseRFUP2vb6cF
# gqdzz8/pkupzKrHh3aID5iC8HWcaVsIu9qxfyk6BsOZaHXPP0hTzUHgoBU4VboUk
# +DOoiK90bfRSzoyohJ4xggQWMIIEEgIBATBiME4xCzAJBgNVBAYTAlVTMRYwFAYD
# VQQKEw1FbnRydXN0LCBJbmMuMScwJQYDVQQDEx5FbnRydXN0IFRpbWUgU3RhbXBp
# bmcgQ0EgLSBUUzICEFtwJsyW9ngau4X2EfVtu24wCwYJYIZIAWUDBAIDoIIBiTAa
# BgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkFMQ8XDTI0MDQx
# ODA3MzI0OVowKQYJKoZIhvcNAQk0MRwwGjALBglghkgBZQMEAgOhCwYJKoZIhvcN
# AQENME8GCSqGSIb3DQEJBDFCBEDuWsOI0c334RH7yIUPV1ywBokFFzYz2vwBvHt6
# 41FakPhVqIsgQjmjBGUGD9RJEJBOrHQ+805Kf1aZjOmovXd2MIHQBgsqhkiG9w0B
# CRACLzGBwDCBvTCBujCBtzALBglghkgBZQMEAgMEQDkRQi4XAj6qmSSZdA4OyOjS
# ctNV/Fz2bPkRVq+XVTTkgK/TvHxMW1fv0f+823UUZeDUBVqFTpsROdn37FXV/iQw
# ZjBSpFAwTjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xJzAl
# BgNVBAMTHkVudHJ1c3QgVGltZSBTdGFtcGluZyBDQSAtIFRTMgIQW3AmzJb2eBq7
# hfYR9W27bjALBgkqhkiG9w0BAQ0EggIAWq6WT5a6RrJsGwXI1TgtIIPsaAo+oLD7
# DjnLlH+vj57qZ8fEy7FJJZz0DxLHEOsXGrK//lhJnM5Z2RWB63muQeAyAeR4cWrJ
# Lz4JgsxrkP3FI9XbreXaUOXk1NgJdkYliEtPzri/a9uR+xO+Z5NClSAP317H5KZm
# wWjOs0oCkmUITCBvv5NO/w0/jHoFI7JQiKGP8UdaJGc+LPk4l7WMQXH5/+1XZwFH
# cT5i06tLBdybdtGHXI3oxCx4tIrSwaMLNxyaQNqOTnxUEvPB1W29kN8uH7tcQ1Y/
# atqpOlpu0T2fsK8czJbqTSV2LC/cIWDGZoy2KXIkaEbYzKxsqoDfDiF4ENib+qDm
# Ku0rdqEGjQMuJ0JWTOeoARHDb5TdozyIMfCIWkb0O+p71X38wY/BL8cQcp7e649F
# miuAD0Rn58Z+yQiyfXfNVdXsLNQOcWragrmZz/tPv8ZXCPuGbQOl2lCoLoY62aoK
# 9i37lqlKKKfwLpsqbCBWti5s6r91k5CeYLHbm1l3TjcWs472KYFhLeOS7pHN6heL
# Oyq/D7R2PKhPKUHegen075e7lAULoPkaJ0bOOUclOtyjRCd7GxhPUgcZGy7QfUzO
# jRo2BMwV+QGCdarP9doTGlZX47vXN8EY+piiTWbnSaREASXrOixPUzm5rYGMbUFn
# DErcUmAkLyQ=
# SIG # End signature block
|
combined_dataset/train/non-malicious/4444.ps1
|
4444.ps1
|
function Get-DynamicOptions
{
param
(
[Microsoft.PackageManagement.MetaProvider.PowerShell.OptionCategory]
$category
)
Write-Debug ($LocalizedData.ProviderApiDebugMessage -f ('Get-DynamicOptions'))
Write-Output -InputObject (New-DynamicOption -Category $category -Name $script:PackageManagementProviderParam -ExpectedType String -IsRequired $false)
switch($category)
{
Package {
Write-Output -InputObject (New-DynamicOption -Category $category `
-Name $script:PSArtifactType `
-ExpectedType String `
-IsRequired $false `
-PermittedValues @($script:PSArtifactTypeModule,$script:PSArtifactTypeScript, $script:All))
Write-Output -InputObject (New-DynamicOption -Category $category -Name $script:Filter -ExpectedType String -IsRequired $false)
Write-Output -InputObject (New-DynamicOption -Category $category -Name $script:Tag -ExpectedType StringArray -IsRequired $false)
Write-Output -InputObject (New-DynamicOption -Category $category -Name Includes -ExpectedType StringArray -IsRequired $false -PermittedValues $script:IncludeValidSet)
Write-Output -InputObject (New-DynamicOption -Category $category -Name DscResource -ExpectedType StringArray -IsRequired $false)
Write-Output -InputObject (New-DynamicOption -Category $category -Name RoleCapability -ExpectedType StringArray -IsRequired $false)
Write-Output -InputObject (New-DynamicOption -Category $category -Name 'AllowPrereleaseVersions' -ExpectedType Switch -IsRequired $false)
Write-Output -InputObject (New-DynamicOption -Category $category -Name Command -ExpectedType StringArray -IsRequired $false)
Write-Output -InputObject (New-DynamicOption -Category $category -Name 'AcceptLicense' -ExpectedType Switch -IsRequired $false)
}
Source {
Write-Output -InputObject (New-DynamicOption -Category $category -Name $script:PublishLocation -ExpectedType String -IsRequired $false)
Write-Output -InputObject (New-DynamicOption -Category $category -Name $script:ScriptSourceLocation -ExpectedType String -IsRequired $false)
Write-Output -InputObject (New-DynamicOption -Category $category -Name $script:ScriptPublishLocation -ExpectedType String -IsRequired $false)
}
Install
{
Write-Output -InputObject (New-DynamicOption -Category $category `
-Name $script:PSArtifactType `
-ExpectedType String `
-IsRequired $false `
-PermittedValues @($script:PSArtifactTypeModule,$script:PSArtifactTypeScript, $script:All))
Write-Output -InputObject (New-DynamicOption -Category $category -Name "Scope" -ExpectedType String -IsRequired $false -PermittedValues @("CurrentUser","AllUsers"))
Write-Output -InputObject (New-DynamicOption -Category $category -Name 'AllowClobber' -ExpectedType Switch -IsRequired $false)
Write-Output -InputObject (New-DynamicOption -Category $category -Name 'SkipPublisherCheck' -ExpectedType Switch -IsRequired $false)
Write-Output -InputObject (New-DynamicOption -Category $category -Name "InstallUpdate" -ExpectedType Switch -IsRequired $false)
Write-Output -InputObject (New-DynamicOption -Category $category -Name 'NoPathUpdate' -ExpectedType Switch -IsRequired $false)
Write-Output -InputObject (New-DynamicOption -Category $category -Name 'AllowPrereleaseVersions' -ExpectedType Switch -IsRequired $false)
}
}
}
|
combined_dataset/train/non-malicious/sample_30_64.ps1
|
sample_30_64.ps1
|
# Copyright (c) Microsoft Corporation.
# Licensed under the MIT License.
function ConvertTo-ScriptExtent {
<#
.EXTERNALHELP ..\PowerShellEditorServices.Commands-help.xml
#>
[CmdletBinding()]
[OutputType([System.Management.Automation.Language.IScriptExtent])]
param(
[Parameter(Mandatory, ValueFromPipelineByPropertyName, ParameterSetName = 'ByOffset')]
[Alias('StartOffset', 'Offset')]
[int] $StartOffsetNumber,
[Parameter(ValueFromPipelineByPropertyName, ParameterSetName = 'ByOffset')]
[Alias('EndOffset')]
[int] $EndOffsetNumber,
[Parameter(ValueFromPipelineByPropertyName, ParameterSetName = 'ByPosition')]
[Alias('StartLine', 'Line')]
[int] $StartLineNumber,
[Parameter(ValueFromPipelineByPropertyName, ParameterSetName = 'ByPosition')]
[Alias('StartColumn', 'Column')]
[int] $StartColumnNumber,
[Parameter(ValueFromPipelineByPropertyName, ParameterSetName = 'ByPosition')]
[Alias('EndLine')]
[int] $EndLineNumber,
[Parameter(ValueFromPipelineByPropertyName, ParameterSetName = 'ByPosition')]
[Alias('EndColumn')]
[int] $EndColumnNumber,
[Parameter(ValueFromPipelineByPropertyName, ParameterSetName = 'ByPosition')]
[Parameter(ValueFromPipelineByPropertyName, ParameterSetName = 'ByOffset')]
[Parameter(ValueFromPipelineByPropertyName, ParameterSetName = 'ByBuffer')]
[Alias('File', 'FileName')]
[string] $FilePath = $psEditor.GetEditorContext().CurrentFile.Path,
[Parameter(ValueFromPipelineByPropertyName, ParameterSetName = 'ByBuffer')]
[Alias('Start')]
[Microsoft.PowerShell.EditorServices.Extensions.IFilePosition, Microsoft.PowerShell.EditorServices] $StartBuffer,
[Parameter(ValueFromPipelineByPropertyName, ParameterSetName = 'ByBuffer')]
[Alias('End')]
[Microsoft.PowerShell.EditorServices.Extensions.IFilePosition, Microsoft.PowerShell.EditorServices] $EndBuffer,
[Parameter(Mandatory, ValueFromPipeline, ValueFromPipelineByPropertyName, ParameterSetName = 'ByExtent')]
[System.Management.Automation.Language.IScriptExtent] $Extent
)
begin {
$fileContext = $psEditor.GetEditorContext().CurrentFile
$emptyExtent = [Microsoft.PowerShell.EditorServices.Extensions.FileScriptExtent, Microsoft.PowerShell.EditorServices]::Empty
}
process {
# Already a InternalScriptExtent, FileScriptExtent or is empty.
$returnAsIs = $Extent -and
($Extent.StartOffset -or $Extent.EndOffset -or $Extent -eq $emptyExtent)
if ($returnAsIs) {
return $Extent
}
if ($StartOffsetNumber) {
$startOffset = $StartOffsetNumber
$endOffset = $EndOffsetNumber
# Allow creating a single position extent with just the offset parameter.
if (-not $EndOffsetNumber) {
$endOffset = $startOffset
}
return [Microsoft.PowerShell.EditorServices.Extensions.FileScriptExtent, Microsoft.PowerShell.EditorServices]::FromOffsets(
$fileContext,
$startOffset,
$endOffset)
}
if ($StartBuffer) {
if (-not $EndBuffer) {
$EndBuffer = $StartBuffer
}
return [Microsoft.PowerShell.EditorServices.Extensions.FileScriptExtent, Microsoft.PowerShell.EditorServices]::FromPositions(
$fileContext,
$StartBuffer.Line,
$StartBuffer.Column,
$EndBuffer.Line,
$EndBuffer.Column)
}
# Allow piping a single line and column to get a zero length script extent.
if ($PSBoundParameters.ContainsKey('StartColumnNumber') -and -not $PSBoundParameters.ContainsKey('EndColumnNumber')) {
$EndColumnNumber = $StartColumnNumber
}
if ($PSBoundParameters.ContainsKey('StartLineNumber') -and -not $PSBoundParameters.ContainsKey('EndLineNumber')) {
$EndLineNumber = $StartLineNumber
}
# Protect against zero as a value since lines and columns start at 1
if (-not $StartColumnNumber) {
$StartColumnNumber = 1
}
if (-not $StartLineNumber) {
$StartLineNumber = 1
}
if (-not $EndLineNumber) {
$EndLineNumber = 1
}
if (-not $EndColumnNumber) {
$EndColumnNumber = 1
}
return [Microsoft.PowerShell.EditorServices.Extensions.FileScriptExtent, Microsoft.PowerShell.EditorServices]::FromPositions(
$fileContext,
$StartLineNumber,
$StartColumnNumber,
$EndLineNumber,
$EndColumnNumber)
}
}
# SIG # Begin signature block
# MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCArNi6HQ5eMUAz9
# cXhU8YSv7SRI9434IV7YYDMjrPkUZaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPdDfua2HoHSC+WsA9Kd4vwx
# /69pMrly3wNqXl3Q9Zb6MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAQscY9ZMmaRPyU7Cq7OYqjIIeCFPcvIGo7XEzxIsFNxnClICRRrRboivn
# U55fmYMWp4N2/2mM0d/E0ImuOaVIbcZpVIL+suejQR3MHzaEqbGNq4U1Op/OQnfh
# dsWZ5/IfX3U4bv+ZNoOiyNRLSxNRwOQWFIfWTP9cyIsdcsNnnsPeZgsd3zATqTpQ
# JCiN0ynTxrr7MhYqkSLgPjMmhS6UHRJqxABwgb7+mWSfTmr/YAFIW+fSGsoQz4SD
# 4qXs+JCKDmEQ68Xid7MeuWi505WRZ1cr0IgMVfN90L6SEB4QXqYT8TJpnlUGaxPN
# GwuELS+kxOE7I/+WLDdRUgkRYoqMQKGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC
# FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCArZE4XtxXT+JpwqBzkv+HHobKmDxj1V+pEBZ20/8WG8gIGZfye1OkJ
# GBMyMDI0MDQxNjIxMDg0My4yNTZaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC
# RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis
# DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI
# ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z
# ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR
# IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE
# lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s
# /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4
# aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB
# fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT
# me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy
# qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui
# hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds
# lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf
# sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t
# Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU
# +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7
# qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6
# Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+
# x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4
# 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5
# ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV
# PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4
# y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk
# 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG
# QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnIuFAwIhgPMjAyNDA0MTYxNjQxNTJaGA8yMDI0MDQxNzE2NDE1MlowdzA9Bgor
# BgEEAYRZCgQBMS8wLTAKAgUA6ci4UAIBADAKAgEAAgIQpQIB/zAHAgEAAgIUHDAK
# AgUA6coJ0AIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAAX5Od8BudZPJpLu
# QqGaEsE0zQsYcOEXVwO6MArilcyRwMNodtffyq32QXJSP7gw1Ol9v8n5vx6IL0Xd
# PV7c+ndDjia3J9jqOGaxonTLVyNJew5XLi4SQGPWl0p/7PLKZ2SLNjWjUMm7+sh9
# aJfgHFNdSkEEnnGRGXYcPamteduMMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgtdrW2tOwlZUj1Pyc/uC0Oj6rkJOOBNnajcKJkekYEhEwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJ
# CI9//zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 4pmZlfHc4yDrAAEAAAHiMCIEIH+NMGISrYh2rIJ0NX9sTkqjrTeMVIPR2ZGuPcoo
# cNiZMA0GCSqGSIb3DQEBCwUABIICAAQKn5wL6Gi2ofXRfLA26D7yCdUaRvraVRKD
# 8Z+ai8vXNAXAznDV9JROh/iozNuB8X23z+tqrtEtr3NEimJzVMwFVvHpzdT0LSRM
# IuoO1KSSaUGNMqN0rjD1euAbxLEaNXDV5oJniNJ55kOIS5M80wJ8JIhTly2zoI8c
# 7bEg2gxcswoD/bWT70aVqE5d+RbYwX5FO/pIuPs+1RcPk0+G0q4b+BsVmJpR5CrP
# PuCrHbfOZLSu5P0IyqXFBtGDjOv5ee0RELaQG0oPf8HkLVbCA3S2UGNpIJIvD/OO
# w8UKU3pZL8gFReYOHdrfehKSFIJs0PDBn7ffZXCHXI3rfKadUuzrvAx8Nt7+4Tu6
# WVGODmhP3uud6NFX+nY0ZvY2gWGV6d5ibe6m/25ty/bRzNtgRjwCYD41hNTF0WSb
# gQ0KL5KHo1N/p1/qb5oAFaRCBFrIWt8gQ4GujYu2/3H5kbK2JQf2jsE3yq/EMUYK
# QBjXOg+5EJbCtuaQfVwgVMEpigwwFJcAH1nRj6WcvIJlmZxLUakXWNN0nkAlvXmc
# skbUhBfTAGvf1QzsJLO7Ngqi9h0igWFcBaMBbEGDou0QoGNg4PBBlpcibBz6R7d+
# NjJ50P1/vZXhCs12dADpnMd41UVKY/w1OJpi0tFoJwGgaTtWFr9bBOV0jgs1qlZS
# 35AQflBD
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_1_29.ps1
|
sample_1_29.ps1
|
[dynamic, provider("dcismprovider"),
Description(
"DCIM_PresenceAndStatusSensor is a derivation of "
"CIM_Sensor, and represents a sensor.")]
class DCIM_PresenceAndStatusSensor : CIM_Sensor
{
[
Description ("The current state indicated by the Sensor. This is always one of the \"PossibleStates\"."),
Maxlen (128),
Override ("CurrentState"),
Required
]
string CurrentState;
[
Description ("The user-friendly name for the class instance. This value does not have to be unique within its namespace."),
Override ("ElementName"),
Required
]
string ElementName;
[
Description ("This property represents the type of the sensor, for example Voltage or Temperature Sensor. If the type is set to \"Other\", the OtherSensorType Description can be used to further identify the type. If the sensor has numeric readings, the type of the sensor can be implicitly determined by the Units. A description of the different Sensor types is as follows: A Temperature Sensor measures the environmental temperature. Voltage and Current Sensors measure electrical voltage and current readings. A Tachometer measures the speed or revolutions of a device. For example, a Fan Device can have an associated Tachometer which measures its speed. A Counter is a general-purpose Sensor that measures some numerical property of a Device. A Counter value can be cleared but it never decreases. A Switch Sensor has states like Open/Close, On/Off, or Up/Down. A Lock has states of Locked/Unlocked. Humidity, Smoke Detection, and Air Flow Sensors measure the equivalent environmental characteristics. A Presence Sensor detects the presence of a PhysicalElement. A Power Consumption Sensor measures the instantaneous power consumed by a managed element. A Power Production Sensor measures the instantaneous power produced by a managed element such as a power supply or a voltage regulator. A pressure sensor is used to report pressure. Intrusion sensor reports an intrusion of an enclosure regardless whether it was authorized or not."),
Modelcorrespondence { "CIM_Sensor.OtherSensorTypeDescription" },
Override ("SensorType"),
Valuemap { "0", "1", "2", "3", "4", "5", "6", "7", "8", "9", "10", "11", "12", "13", "14",
"15", "16" },
Values { "Unknown", "Other", "Temperature", "Voltage", "Current", "Tachometer", "Counter",
"Switch", "Lock", "Humidity", "Smoke Detection", "Presence", "Air Flow",
"Power Consumption", "Power Production", "Pressure", "Intrusion" }
]
uint16 SensorType;
[
Description ("A string that describes the sensor type. This property is used when the SensorType property is set to \"Other\"."),
Maxlen (128),
Modelcorrespondence { "CIM_Sensor.SensorType" },
Override ("OtherSensorTypeDescription")
]
string OtherSensorTypeDescription;
[
Description ("PossibleStates enumerates the string outputs of the Sensor. For example, a \"Switch\" Sensor may output the states \"On\", or \"Off\"."),
Maxlen (128),
Override ("PossibleStates[]")
]
string PossibleStates[];
[
Description ("CreationClassName indicates the name of the class or the subclass that is used while creating an instance. When used with the other key properties of this class, this property uniquely identifies all instances of this class and its subclasses."),
Key,
Maxlen (256),
Override ("CreationClassName")
]
string CreationClassName;
[
Description ("An address or other identifying information to uniquely name the LogicalDevice."),
Key,
Maxlen (64),
Override ("DeviceID")
]
string DeviceID;
[
Description ("The CreationClassName of the scoping System."),
Key,
Maxlen (256),
Override ("SystemCreationClassName"),
Propagated ("CIM_System.CreationClassName")
]
string SystemCreationClassName;
[
Description ("The Name of the scoping System."),
Key,
Maxlen (256),
Override ("SystemName"),
Propagated ("CIM_System.Name")
]
string SystemName;
};
/* SIG # Begin signature block */
/* MIItDgYJKoZIhvcNAQcCoIIs/zCCLPsCAQExDzANBglghkgBZQMEAgEFADB5Bgor */
/* BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG */
/* KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDmjsf890R2gXOR */
/* h+SPHrDivj74snP9cHuHWpCH/QwNOaCCEmMwggXfMIIEx6ADAgECAhBOQOQ3VO3m */
/* jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE */
/* ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s */
/* ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv */
/* ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy */
/* dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx */
/* MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu */
/* MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp */
/* b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK */
/* AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq */
/* gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l */
/* OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr */
/* +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d */
/* vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 */
/* HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn */
/* DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig */
/* nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z */
/* HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK */
/* Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u */
/* DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC */
/* AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw */
/* FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG */
/* AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn */
/* MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp */
/* MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O */
/* BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp */
/* UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 */
/* BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ */
/* LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv */
/* 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF */
/* VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX */
/* bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG */
/* CDCCA/CgAwIBAgIQBu9mzEaGqLK0hNoZKy1rYTANBgkqhkiG9w0BAQ0FADBPMQsw */
/* CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 */
/* cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yNDA0MTkwOTE2MDlaFw0y */
/* NTA1MTIwOTE2MDhaMIGEMQswCQYDVQQGEwJVUzEOMAwGA1UECBMFVGV4YXMxEzAR */
/* BgNVBAcTClJvdW5kIFJvY2sxEjAQBgNVBAoTCURlbGwgSW5jLjEoMCYGA1UECxMf */
/* U2VydmVyIFN5c3RlbXMgTWdtdCBFbmdpbmVlcmluZzESMBAGA1UEAxMJRGVsbCBJ */
/* bmMuMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAvFatHoJS1lbvBD4U */
/* x/jt6hrhOHlGpntV/TPJbKwAdvG6SCT6MfdFasEGShyzypfx8adv3v+sFWo84yYB */
/* GqnqH/Kkj48BTKNREXjN3x/jLZrv+rVRQJYG79us7u3vQVSBX0ds0Jcd9f7u2REE */
/* aLBKrd7ZwxmsHoiAaqKYBm8nMo4kmH4xOw6cOXxUW6mkYxNQxn60nxV5A2ZJvUKn */
/* YvanuULo5jGrl+t2A5jInOLyxSmNU62DdLbyhtE3B6cEhe5yQ54hi7d6c5IM2fNH */
/* FNrQkRavAWUyAxPPBpTSsR0g/IkNymbNPCTjgvDQOIJBcMp0C+q158RIBiE+IMwq */
/* QGi7aUvUUhzTQG9NcSDQan3hMmYfevU3RLQMw4OcoGIT/jOSYmgtcLHiB6lnOG/h */
/* iJ8EsQgW1s2yJ7vG2Fo/IHvQjbfFxefO+gluw4UjcLZgIqACIlFNYGaq4rzKtTeF */
/* 1NNy6DjjbJV2nt/JlD68YlFg0pU9rGDKglZFWvfWiLId8IJnAgMBAAGjggEoMIIB */
/* JDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRFrXrMchlvXUnwqKV0rQOPRSgzqzAf */
/* BgNVHSMEGDAWgBTvn7p5sHPyJR54nANSnBtThN6N7TBnBggrBgEFBQcBAQRbMFkw */
/* IwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAC */
/* hiZodHRwOi8vYWlhLmVudHJ1c3QubmV0L292Y3MyLWNoYWluLnA3YzAxBgNVHR8E */
/* KjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L292Y3MyLmNybDAOBgNV */
/* HQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwEwYDVR0gBAwwCjAIBgZn */
/* gQwBBAEwDQYJKoZIhvcNAQENBQADggIBACoeAWs2aV9gf+TF4AGOKc454/E55mVR */
/* Yz42M1ksqASl2j+ulObFIWcuy/paLjWhMSulehEA8Zb+YQ89fR6Y0TgJ0Eh09aK5 */
/* +GARB7q/+a+gRIw7nfrwmjMkXAwL+9lmbc1X64fEUuKY2NVdksjKC7xRKNMb5i50 */
/* NQyVN9neCJKIVSQDiBMXGgtDkAqPe1sH7/NGGQZKCXhIg3f3caq7dr/mZoiVAIOB */
/* XtHr++65DqG61aWyZV5tCfzSvXFvLpL0dbu14gH6gEo5Zvlp226Vk+HKr/cQ2Ynj */
/* /xXw/5UWHvmKwDOAkA/ld64jA4m466aoP2tKse8z1kSa/zw1wRSp0bwPn23gj2IO */
/* NmEG9dM9Lv3c5FH+oBKNuqJ2Vj5viCHVZEcw40UDQqdfboVK+Y1XSkNfa1CUjzCu */
/* Q2J3XMrfVK9ZCecopoCAXzYem7e/G/Md3rTQky2PTf7Z1hgYlqxisPoGEV3nguIg */
/* ooMbBkHbl/4iWAB237woZFlX0imdO5se7el67/nx58CSLYjNmj82Y4cthnFOrwP4 */
/* mUW7zVXlq9sZP9fCcrdrNMUF4KYS2x7/IIgHURKvOTjyT6f+ZRedEfwOlM1D12/l */
/* eL1OX+dPZq5BGGHal3r1xbLdLxHUlMg+IJJk0wmMwmSF3kzbqbMUTaM1FX9x0+E8 */
/* 4YVlsJB1ttLHMIIGcDCCBFigAwIBAgIQce9VdK81VMNaLGn2b0trzTANBgkqhkiG */
/* 9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFC */
/* MEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9u */
/* IEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjA0NVoXDTQwMTIyOTIzNTkw */
/* MFowTzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNV */
/* BAMTH0VudHJ1c3QgQ29kZSBTaWduaW5nIENBIC0gT1ZDUzIwggIiMA0GCSqGSIb3 */
/* DQEBAQUAA4ICDwAwggIKAoICAQCemXYXGp5WFwhjLJNNg2GEMzQCttlioN7CDrkg */
/* TMhXnQ/dVFsNDNYB3S9I4ZEJ4dvIFQSCtnvw2NYwOxlxcPuoppf2KV2kDKn0Uz5X */
/* 2wxObvx2218k6apfQ+OT5w7PyiW8xEwwC1oP5gb05W4MmWZYT4NhwnN8XCJvAUXF */
/* D/dAT2RL0BcKqQ4eAi+hj0zyZ1DbPuSfwk8/dOsxpNCU0Jm8MJIJasskzaLYdlLQ */
/* TnWYT2Ra0l6D9FjAXWp1xNg/ZDqLFA3YduHquWvnEXBJEThjE27xxvq9EEU1B+Z2 */
/* FdB1FqrCQ1f+q/5jc0YioLjz5MdwRgn5qTdBmrNLbB9wcqMH9jWSdBFkbvkC1cCS */
/* lfGXWX4N7qIl8nFVuJuNv83urt37DOeuMk5QjaHf0XO/wc5/ddqrv9CtgjjF54jt */
/* om06hhG317DhqIs7DEEXml/kW5jInQCf93PSw+mfBYd5IYPWC+3RzAif4PHFyVi6 */
/* U1/Uh7GLWajSXs1p0D76xDkJr7S17ec8+iKH1nP5F5Vqwxz1VXhf1PoLwFs/jHgV */
/* DlpMOm7lJpjQJ8wg38CGO3qNZUZ+2WFeqfSuPtT8r0XHOrOFBEqLyAlds3sCKFnj */
/* hn2AolhAZmLgOFWDq58pQSa6u+nYZPi2uyhzzRVK155z42ZMsVGdgSOLyIZ3srYs */
/* NyJwIQIDAQABo4IBLDCCASgwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU */
/* 75+6ebBz8iUeeJwDUpwbU4Teje0wHwYDVR0jBBgwFoAUgrrWPZfOn89x6JI3r/2z */
/* tWk1V88wMwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5l */
/* bnRydXN0Lm5ldDAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3Qu */
/* bmV0L2NzYnIxLmNybDAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUH */
/* AwMwRQYDVR0gBD4wPDAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cu */
/* ZW50cnVzdC5uZXQvcnBhMAgGBmeBDAEEATANBgkqhkiG9w0BAQ0FAAOCAgEAXvOG */
/* mTXBee7wEK/XkkPShdBb4Jig4HFRyRTLUJpgDrAEJkmxz+m6mwih2kNd1G8jorn4 */
/* QMdH/k0BC0iQP8jcarQ+UzUovkBKR4VqHndAzIB/YbQ8T3mo5qOmoH5EhnG/EhuV */
/* gXL3DaXQ3mefxqK48Wr5/P50ZsZk5nk9agNhTksfzCBiywIY7GPtfnE/lroLXmgi */
/* Z+wfwNIFFmaxsqTq/MWVo40SpfWN7xsgzZn35zLzWXEf3ZTmeeVSIxBWKvxZOL+/ */
/* eSWSasf9q2d3cbEEfTWtFME+qPwjF1YIGHzXeiJrkWrMNUVtTzudQ50FuJ3z/DQh */
/* XAQYMlc4NMHKgyNGpogjIcZ+FICrse+7C6wJP+5TkTGz4lREqrV9MDwsI5zoP6NY */
/* 6kAIF6MgX3rADNuq/wMWAw10ZCKalF4wNXYT9dPh4+AHytnqRYhGnFTVEOLzMglA */
/* tudcFzL+zK/rbc9gPHXz7lxgQFUbtVmvciNoTZx0BAwQya9QW6cNZg+W5ZqV4CCi */
/* GtCw7jhJnipnnpGWbJjbxBBtYHwebkjntn6vMwcSce+9lTu+qYPUQn23pzTXX4aR */
/* ta9WWNpVfRe927zNZEEVjTFRBk+0LrKLPZzzTeNYA1TMrIj4UjxOS0YJJRn/Feen */
/* mEYufbrq4+N8//m5GZW+drkNebICURpKyJ+IwkMxghoBMIIZ/QIBATBjME8xCzAJ */
/* BgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQDEx9FbnRy */
/* dXN0IENvZGUgU2lnbmluZyBDQSAtIE9WQ1MyAhAG72bMRoaosrSE2hkrLWthMA0G */
/* CWCGSAFlAwQCAQUAoIGsMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG */
/* AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCDVcVx7N2Kj */
/* NlR2wp+VRPJy1Buj1JGTKY40Nb1AfH/BSjBABgorBgEEAYI3AgEMMTIwMKAWgBQA */
/* RABlAGwAbAAsACAASQBuAGMALqEWgBRodHRwOi8vd3d3LmRlbGwuY29tIDANBgkq */
/* hkiG9w0BAQEFAASCAYCUA5rQOcTUyfwQT/H+3hPVFXAgtTlpZrGwd2M3q0LFTxHV */
/* gg92FFhw09HFUolcX9HHOO/w9i/kYD9T2/7ynSWhqjF/AIDb1dD1qjBTIeoz7j1D */
/* KT5Asrb6gqkc7Ct7W4+DSDcru43J2AAKlLFKkCeg1OQ+L5JFEuzim9KtxSZfotTh */
/* P+kKEeK299GJ8OflIuVNwM2LzpJx/kJRuqSUzF4IM5FA6nuVgjFIQlyz2bxEMWv5 */
/* MfFEvDoIp3Zn8mf9/LEBhTzSw6x2nHrd+seNzJT3T24iD81eXzkOOCKBMi42njIS */
/* LlvsFS8wNKw94A6WAQQL2dFvPyAcuf2iNCWGsn1b4lT+EMvZoBJtoG+F2w3DUFJB */
/* BxLU5BqaXrVTEvigKQHXw+nLOwls/BoRKqmD7lntNBjLmK4T6rRIiATGmhuyyMH2 */
/* Jj+NH4pX0XC5kmWTuC/XPVs3UGiLjXrVNPUBpdps39NkxZlZhq1xW4O0HkHzPMdP */
/* 2dllKow2A6SmZPtnah6hghdAMIIXPAYKKwYBBAGCNwMDATGCFywwghcoBgkqhkiG */
/* 9w0BBwKgghcZMIIXFQIBAzEPMA0GCWCGSAFlAwQCAQUAMHgGCyqGSIb3DQEJEAEE */
/* oGkEZzBlAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgeLZ5hEv2lBzr */
/* Fl16wYl/nJ2AAwDDXz2fES/UWtXWJEUCEQDWCIzwkNKXUmRli93FWx0RGA8yMDI0 */
/* MDkyMDA3MDEyNVqgghMJMIIGwjCCBKqgAwIBAgIQBUSv85SdCDmmv9s/X+VhFjAN */
/* BgkqhkiG9w0BAQsFADBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQs */
/* IEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEy */
/* NTYgVGltZVN0YW1waW5nIENBMB4XDTIzMDcxNDAwMDAwMFoXDTM0MTAxMzIzNTk1 */
/* OVowSDELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMSAwHgYD */
/* VQQDExdEaWdpQ2VydCBUaW1lc3RhbXAgMjAyMzCCAiIwDQYJKoZIhvcNAQEBBQAD */
/* ggIPADCCAgoCggIBAKNTRYcdg45brD5UsyPgz5/X5dLnXaEOCdwvSKOXejsqnGfc */
/* YhVYwamTEafNqrJq3RApih5iY2nTWJw1cb86l+uUUI8cIOrHmjsvlmbjaedp/lvD */
/* 1isgHMGXlLSlUIHyz8sHpjBoyoNC2vx/CSSUpIIa2mq62DvKXd4ZGIX7ReoNYWyd */
/* /nFexAaaPPDFLnkPG2ZS48jWPl/aQ9OE9dDH9kgtXkV1lnX+3RChG4PBuOZSlbVH */
/* 13gpOWvgeFmX40QrStWVzu8IF+qCZE3/I+PKhu60pCFkcOvV5aDaY7Mu6QXuqvYk */
/* 9R28mxyyt1/f8O52fTGZZUdVnUokL6wrl76f5P17cz4y7lI0+9S769SgLDSb495u */
/* ZBkHNwGRDxy1Uc2qTGaDiGhiu7xBG3gZbeTZD+BYQfvYsSzhUa+0rRUGFOpiCBPT */
/* aR58ZE2dD9/O0V6MqqtQFcmzyrzXxDtoRKOlO0L9c33u3Qr/eTQQfqZcClhMAD6F */
/* aXXHg2TWdc2PEnZWpST618RrIbroHzSYLzrqawGw9/sqhux7UjipmAmhcbJsca8+ */
/* uG+W1eEQE/5hRwqM/vC2x9XH3mwk8L9CgsqgcT2ckpMEtGlwJw1Pt7U20clfCKRw */
/* o+wK8REuZODLIivK8SgTIUlRfgZm0zu++uuRONhRB8qUt+JQofM604qDy0B7AgMB */
/* AAGjggGLMIIBhzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADAWBgNVHSUB */
/* Af8EDDAKBggrBgEFBQcDCDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s */
/* BwEwHwYDVR0jBBgwFoAUuhbZbU2FL3MpdpovdYxqII+eyG8wHQYDVR0OBBYEFKW2 */
/* 7xPn783QZKHVVqllMaPe1eNJMFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwz */
/* LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZUaW1l */
/* U3RhbXBpbmdDQS5jcmwwgZAGCCsGAQUFBwEBBIGDMIGAMCQGCCsGAQUFBzABhhho */
/* dHRwOi8vb2NzcC5kaWdpY2VydC5jb20wWAYIKwYBBQUHMAKGTGh0dHA6Ly9jYWNl */
/* cnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZU */
/* aW1lU3RhbXBpbmdDQS5jcnQwDQYJKoZIhvcNAQELBQADggIBAIEa1t6gqbWYF7xw */
/* jU+KPGic2CX/yyzkzepdIpLsjCICqbjPgKjZ5+PF7SaCinEvGN1Ott5s1+FgnCvt */
/* 7T1IjrhrunxdvcJhN2hJd6PrkKoS1yeF844ektrCQDifXcigLiV4JZ0qBXqEKZi2 */
/* V3mP2yZWK7Dzp703DNiYdk9WuVLCtp04qYHnbUFcjGnRuSvExnvPnPp44pMadqJp */
/* ddNQ5EQSviANnqlE0PjlSXcIWiHFtM+YlRpUurm8wWkZus8W8oM3NG6wQSbd3lqX */
/* TzON1I13fXVFoaVYJmoDRd7ZULVQjK9WvUzF4UbFKNOt50MAcN7MmJ4ZiQPq1JE3 */
/* 701S88lgIcRWR+3aEUuMMsOI5ljitts++V+wQtaP4xeR0arAVeOGv6wnLEHQmjNK */
/* qDbUuXKWfpd5OEhfysLcPTLfddY2Z1qJ+Panx+VPNTwAvb6cKmx5AdzaROY63jg7 */
/* B145WPR8czFVoIARyxQMfq68/qTreWWqaNYiyjvrmoI1VygWy2nyMpqy0tg6uLFG */
/* hmu6F/3Ed2wVbK6rr3M66ElGt9V/zLY4wNjsHPW2obhDLN9OTH0eaHDAdwrUAuBc */
/* YLso/zjlUlrWrBciI0707NMX+1Br/wd3H3GXREHJuEbTbDJ8WC9nR2XlG3O2mflr */
/* LAZG70Ee8PBf4NvZrZCARK+AEEGKMIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o */
/* ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln */
/* aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE */
/* aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy */
/* MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x */
/* OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt */
/* ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1 */
/* BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z */
/* nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ */
/* Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6 */
/* 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk */
/* psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn */
/* LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq */
/* x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd */
/* OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ */
/* TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR */
/* k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo */
/* AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud */
/* EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G */
/* A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT */
/* BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG */
/* GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh */
/* Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD */
/* VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0 */
/* VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9 */
/* bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T */
/* zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS */
/* lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq */
/* T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl */
/* 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y */
/* r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05 */
/* et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um */
/* AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe */
/* Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr */
/* 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC */
/* JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga */
/* oSv27dZ8/DCCBY0wggR1oAMCAQICEA6bGI750C3n79tQ4ghAGFowDQYJKoZIhvcN */
/* AQEMBQAwZTELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcG */
/* A1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEkMCIGA1UEAxMbRGlnaUNlcnQgQXNzdXJl */
/* ZCBJRCBSb290IENBMB4XDTIyMDgwMTAwMDAwMFoXDTMxMTEwOTIzNTk1OVowYjEL */
/* MAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3 */
/* LmRpZ2ljZXJ0LmNvbTEhMB8GA1UEAxMYRGlnaUNlcnQgVHJ1c3RlZCBSb290IEc0 */
/* MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAv+aQc2jeu+RdSjwwIjBp */
/* M+zCpyUuySE98orYWcLhKac9WKt2ms2uexuEDcQwH/MbpDgW61bGl20dq7J58soR */
/* 0uRf1gU8Ug9SH8aeFaV+vp+pVxZZVXKvaJNwwrK6dZlqczKU0RBEEC7fgvMHhOZ0 */
/* O21x4i0MG+4g1ckgHWMpLc7sXk7Ik/ghYZs06wXGXuxbGrzryc/NrDRAX7F6Zu53 */
/* yEioZldXn1RYjgwrt0+nMNlW7sp7XeOtyU9e5TXnMcvak17cjo+A2raRmECQecN4 */
/* x7axxLVqGDgDEI3Y1DekLgV9iPWCPhCRcKtVgkEy19sEcypukQF8IUzUvK4bA3Vd */
/* eGbZOjFEmjNAvwjXWkmkwuapoGfdpCe8oU85tRFYF/ckXEaPZPfBaYh2mHY9WV1C */
/* doeJl2l6SPDgohIbZpp0yt5LHucOY67m1O+SkjqePdwA5EUlibaaRBkrfsCUtNJh */
/* besz2cXfSwQAzH0clcOP9yGyshG3u3/y1YxwLEFgqrFjGESVGnZifvaAsPvoZKYz */
/* 0YkH4b235kOkGLimdwHhD5QMIR2yVCkliWzlDlJRR3S+Jqy2QXXeeqxfjT/JvNNB */
/* ERJb5RBQ6zHFynIWIgnffEx1P2PsIV/EIFFrb7GrhotPwtZFX50g/KEexcCPorF+ */
/* CiaZ9eRpL5gdLfXZqbId5RsCAwEAAaOCATowggE2MA8GA1UdEwEB/wQFMAMBAf8w */
/* HQYDVR0OBBYEFOzX44LScV1kTN8uZz/nupiuHA9PMB8GA1UdIwQYMBaAFEXroq/0 */
/* ksuCMS1Ri6enIZ3zbcgPMA4GA1UdDwEB/wQEAwIBhjB5BggrBgEFBQcBAQRtMGsw */
/* JAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBDBggrBgEFBQcw */
/* AoY3aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElE */
/* Um9vdENBLmNydDBFBgNVHR8EPjA8MDqgOKA2hjRodHRwOi8vY3JsMy5kaWdpY2Vy */
/* dC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3JsMBEGA1UdIAQKMAgwBgYE */
/* VR0gADANBgkqhkiG9w0BAQwFAAOCAQEAcKC/Q1xV5zhfoKN0Gz22Ftf3v1cHvZqs */
/* oYcs7IVeqRq7IviHGmlUIu2kiHdtvRoU9BNKei8ttzjv9P+Aufih9/Jy3iS8UgPI */
/* TtAq3votVs/59PesMHqai7Je1M/RQ0SbQyHrlnKhSLSZy51PpwYDE3cnRNTnf+hZ */
/* qPC/Lwum6fI0POz3A8eHqNJMQBk1RmppVLC4oVaO7KTVPeix3P0c2PR3WlxUjG/v */
/* oVA9/HYJaISfb8rbII01YBwCA8sgsKxYoA5AY8WYIsGyWfVVa88nq2x2zm8jLfR+ */
/* cWojayL/ErhULSd+2DrZ8LaHlv1b0VysGMNNn3O3AamfV6peKOK5lDGCA3YwggNy */
/* AgEBMHcwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw */
/* OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT */
/* dGFtcGluZyBDQQIQBUSv85SdCDmmv9s/X+VhFjANBglghkgBZQMEAgEFAKCB0TAa */
/* BgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkFMQ8XDTI0MDky */
/* MDA3MDEyNVowKwYLKoZIhvcNAQkQAgwxHDAaMBgwFgQUZvArMsLCyQ+CXc6qisnG */
/* Txmcz0AwLwYJKoZIhvcNAQkEMSIEIEBRDchhHSXH1Ea5ProamxykhukHRtCQfhVK */
/* sxEbETLlMDcGCyqGSIb3DQEJEAIvMSgwJjAkMCIEINL25G3tdCLM0dRAV2hBNm+C */
/* itpVmq4zFq9NGprUDHgoMA0GCSqGSIb3DQEBAQUABIICABr5kuHuv33fyjRfVdZe */
/* ZkaNvOI/uQ27E1ZeYsdtsrCnnrisQh5dfahWG5Ym6ekk4VUdbQrHfegbyR3VkDmL */
/* DNTn0H2kz3NM/LkLTuqmqTexfkHJAMaNa/Rq+kErag3jTZt2AyhJxL8mqwB7VunW */
/* ao476OAsSuUBqR4NOpI0EoGoOO1zUdN+dyHLhKesomAj16rL14Pdw5EIXaTBLimK */
/* 3XDFiqFe/aVFmEtlf/PRlaHKBYUXNOC/NHFg0RZlhXzU4Aberbvq66iePtvnUMub */
/* 9aM1ebxa1BcTlRMcqItA9Kld+ig6dNRIeSLXhm3H0rWFlyJ9JJNs4amWyi21hkjp */
/* DCLaSOasr99b7uZLgR4IPqXL367WjQupMo8LvlrVKrm+NAfj/sEZkJwwAx41d8xn */
/* 1eXwtFLjiSuAtoqlgHiyfXQNtZby93zn37vOYVtqd7wtzNE5DeSC/3v0D/KyI/DI */
/* IIy1Tf46PuhTavjy0zm3YyzoiGN0S36VPAgDnqInejqJG1iS4+50XvMy0qHxCIiU */
/* T0A4wCxbBUwEShp/WjDimopen73H2lHlXz3W8nv81LDVxW2yW6SaJEfikBGznt49 */
/* LyYAjUg4BeDU9TyoiRYg+2FBEfURfsqCsgJTJTV92zrIHKToLS+SifTvVVy7KBDz */
/* ckm5jBtd4pnol/CwnwVpfpsU */
/* SIG # End signature block */
|
combined_dataset/train/non-malicious/1c3a8f71-b8a5-455c-bc04-31657019f3d5.ps1
|
1c3a8f71-b8a5-455c-bc04-31657019f3d5.ps1
|
#Params is file or folder
param([string] $PSUnitTestFile, [string] $Category ="All", [switch] $ShowReportInBrowser)
Write-Debug "PSUnit.Run.ps1: Parameter `$PSUnitTestFile=`"$PSUnitTestFile`""
Write-Debug "PSUnit.Run.ps1: Parameter `$Category=`"$Category`""
#Don't run the script with an empty path to test file
if ([String]::IsNullOrEmpty($PSUnitTestFile))
{
Throw "The `$PSUnitTestFile parameter is required!"
}
#Make sure the test file exists
if( ! (Test-Path -Path $PSUnitTestFile) )
{
Throw "`$PSUnitTestFile: $PSUnitTestFile is not a valid file!"
}
#This is there to prevent this script from running itself as a test
$PSUnitTestFileInfo = Get-Item -Path $PSUnitTestFile
if ($PSUnitTestFileInfo.Name -eq "PSUnit.Run.ps1")
{
Throw "This script can't run itself as a test!"
}
#Data Model for the test result report
$TestEnvironment = @{}
$TestStatistics = @{}
$TestResults = New-Object -TypeName "System.Collections.ArrayList"
$Statistics = @{}
$TestStartTime = [DateTime]::Now
$TestEndTime = [DateTime]::Now
#Deleting test functions from global scope
$TestFunctions = Get-Item function:Test.*
If ($TestFunctions)
{
Write-Debug "PSUnit.Run.ps1: Deleting test functions from global scope!"
$TestFunctions | Remove-Item
}
#Loading test functions into global scope
$ScriptLines = Get-Content -Path $PSUnitTestFile -Encoding "UTF8"
$ScriptText = [String]::Join("`n`r", $ScriptLines)
Invoke-Expression $ScriptText
#Make sure that the $PSTestScript has tests defined
if (! (Test-Path -Path function:Test.*))
{
Throw "Script `"$PSUnitTestFile`" doesn't have any test functions defined!"
}
#Get all Test. functions. This will get every function in global scope, even the ones that we didn't explicitly load
$TestFunctions = Get-Item function:Test.*
function Execute-Test([System.Management.Automation.FunctionInfo] $Test)
{
Try
{
Write-Debug "Execute-Test: Executing: $($Test.Name)"
& $Test
}
Catch
{
Write-Debug "Execute-Test: Caught exception: $($_.Exception.GetType().FullName)"
Throw $_
}
}
function Report-TestResult([System.Management.Automation.FunctionInfo] $Test, [string] $Result, [System.Management.Automation.ErrorRecord] $Reason)
{
#Creating test results object collection
$TestResult = New-Object -TypeName "System.Management.Automation.PSObject"
$TestResult = Add-Member -passthru -InputObject $TestResult -MemberType NoteProperty -Name "Test" -Value $Test
$TestResult = Add-Member -passthru -InputObject $TestResult -MemberType NoteProperty -Name "Result" -Value $Result
$TestResult = Add-Member -passthru -InputObject $TestResult -MemberType NoteProperty -Name "Reason" -Value $Reason
$null = $TestResults.Add($TestResult);
#Writing Console output
if($Test.Name.Length -ge 99)
{
$TestNameString = $Test.Name.Substring(0, 95) + "..."
}
else
{
$TestNameString = $Test.Name
}
switch ($Result)
{
"PASS"
{
Write-Host "$($TestNameString.PadRight(100, ' '))" -foregroundcolor "blue" -backgroundcolor "white" -nonewline
Write-Host "PASS" -foregroundcolor "black" -backgroundcolor "green" -nonewline
Write-Host $(" N/A".PadRight(100, ' ')) -foregroundcolor "blue" -backgroundcolor "white"
}
"FAIL"
{
if($Reason.ToString().Length -ge 99)
{
$ReasonString = $Reason.ToString().Substring(0, 95) + "..."
}
else
{
$ReasonString = $Reason.ToString()
}
Write-Host "$($TestNameString.PadRight(100, ' '))" -foregroundcolor "blue" -backgroundcolor "white" -nonewline
Write-Host "FAIL" -foregroundcolor "white" -backgroundcolor "red" -nonewline
Write-Host $(" $ReasonString".PadRight(100, ' ')) -foregroundcolor "red" -backgroundcolor "white"
}
"SKIP"
{
Write-Host "$($TestNameString.PadRight(100, ' '))" -foregroundcolor "blue" -backgroundcolor "white" -nonewline
Write-Host "SKIP" -foregroundcolor "black" -backgroundcolor "yellow" -nonewline
Write-Host $(" N/A".PadRight(100, ' ')) -foregroundcolor "blue" -backgroundcolor "white"
}
}
}
function Get-ExpectedExceptionTypeName([System.Management.Automation.FunctionInfo] $Test)
{
$ExpectedExceptionTypeName = "ExpectedException Parameter is not defined in function $($Test.Name)"
$ExpectedExceptionParameter = $Test.Parameters["ExpectedException"]
if( $ExpectedExceptionParameter -ne $Null)
{
$ExpectedExceptionTypeName = $ExpectedExceptionParameter.ParameterType.FullName
}
else
{
Write-Debug "Get-ExpectedExceptionTypeName: $($Test.Name) doesn't use ExpectedException parameter"
}
return $ExpectedExceptionTypeName
}
function Get-TestFunctionCategory([System.Management.Automation.FunctionInfo] $Test)
{
$TestFunctionCategory = "All"
$Test.Parameters.GetEnumerator() | ForEach-Object `
{
if($_.Key -match '^Category_(?<CATEGORY>.*)$')
{
$TestFunctionCategory = $Matches["CATEGORY"]
}
}
Write-Debug "Get-TestFunctionCategory: Found Category=`"$TestFunctionCategory`""
return $TestFunctionCategory
}
function Get-TestFunctionSkip([System.Management.Automation.FunctionInfo] $Test)
{
$IsSkipSet = $false
$SkipParameter = $Test.Parameters["Skip"]
if( $SkipParameter -ne $Null)
{
$IsSkipSet = $true
Write-Debug "Get-TestFunctionSkip: $($Test.Name) uses Skip parameter"
}
else
{
Write-Debug "Get-TestFunctionSkip: $($Test.Name) doesn't use Skip parameter"
}
return $IsSkipSet
}
if ($TestFunctions -eq $Null)
{
Write-Error "No function that starts with test.* was found in function: drive. Make sure that $PSUnitTestFile is in the correct path."
}
else
{
$TestStartTime = [DateTime]::Now
#Execute each function
$TestFunctions | ForEach-Object `
{
$CurrentFunction = $_
$ExpectedExceptionTypeName = Get-ExpectedExceptionTypeName -Test $CurrentFunction
$TestFunctionCategory = Get-TestFunctionCategory -Test $CurrentFunction
$TestFunctionSkip = Get-TestFunctionSkip -Test $CurrentFunction
if ($TestFunctionSkip)
{
Report-TestResult -Test $CurrentFunction -Result "SKIP"
return
}
if (($TestFunctionCategory -ne $Category) -and ($Category -ne "All"))
{
Write-Debug "PSUnit.Run.ps1: Not running `"$($CurrentFunction.Name)`". Its category is `"$TestFunctionCategory`", but the required category is `"$Category`""
return
}
Try
{
$FunctionOutput = Execute-Test $_
Report-TestResult -Test $CurrentFunction -Result "PASS"
}
Catch
{
$ActualExceptionTypeName = $_.Exception.GetType().FullName
Write-Debug "PSUnit.Run.ps1: Execution of `"$CurrentFunction`" caused following Exception `"$($_.Exception.GetType().FullName)`""
Write-Debug "PSUnit.Run.ps1: ExpectedException = `"$ExpectedExceptionTypeName`""
if ($ActualExceptionTypeName -eq $ExpectedExceptionTypeName)
{
Report-TestResult -Test $CurrentFunction -Result "PASS"
}
else
{
Report-TestResult -Test $CurrentFunction -Result "FAIL" -Reason $_
}
}
}
$TestEndTime = [DateTime]::Now
}
function Get-TestResultStatistics([System.Collections.ArrayList] $Results)
{
$Stats = @{}
$Stats["Total"] =0
$Stats["Passed"] = 0
$Stats["Failed"] = 0
$Stats["Skipped"] = 0
if(!$Results -or $Results.Count -eq 0)
{
return $Stats
}
$Stats["Total"] = $Results.Count
$Results | Foreach-Object `
{
switch ( $_.Result )
{
"PASS" {$Stats["Passed"]++}
"FAIL" {$Stats["Failed"]++}
"SKIP" {$Stats["Skipped"]++}
}
}
return $Stats
}
function Get-TestReportFileName([System.Collections.HashTable] $EnvironmentData, [System.Collections.HashTable] $Stats )
{
$StatsTotal = 0
$StatsPassed = 0
$StatsFailed = 0
$StatsSkipped = 0
If($Stats.Total) {$StatsTotal = $Stats.Total}
If($Stats.Passed) {$StatsPassed = $Stats.Passed}
If($Stats.Failed) {$StatsFailed = $Stats.Failed}
If($Stats.Skipped) {$StatsSkipped = $Stats.Skipped}
$StatsFileNamePart = "T{0}P{1}F{2}S{3}" -f $StatsTotal, $StatsPassed, $StatsFailed, $StatsSkipped
$StartDateString = $EnvironmentData.StartTime.ToString("yyyy-MM-dd-HH-mm-ss")
$TestFile = dir $($EnvironmentData.TestFilename)
$FileName = $TestFile.Name
$TestReportFileName = "PSUnitTestReport_{0}_{1}_{2}.html" -f $FileName, $StartDateString, $StatsFileNamePart
Write-Debug "Get-TestReportFileName: `$TestReportFileName = $TestReportFileName"
return $TestReportFileName
}
function Get-TestReportTitleAsHtml([System.Collections.HashTable] $EnvironmentData)
{
$TestReportTitle = "PSUnit Test Report - {0} - {1}" -f $EnvironmentData.TestFilename, $EnvironmentData.StartTime
$TestReportTitle = Encode-Html -StringToEncode $TestReportTitle
return $TestReportTitle
}
function Compile-TestResultReport()
{
$TestFile = dir $PSUnitTestFile
$TestEnvironment["TestFileName"] = $TestFile.FullName
$TestEnvironment["SourceCodeRevision"] = "Not yet implemeted!"
$TestEnvironment["Category"] = $Category
$TestEnvironment["StartTime"] = $TestEndTime
$TestEnvironment["EndTime"] = $TestEndTime
$TestEnvironment["Duration"] = ($TestEnvironment.EndTime - $TestEnvironment.StartTime).TotalSeconds
$TestEnvironment["UserName"] = $env:username
$TestEnvironment["MachineName"] = $env:computername
$TestEnvironment["PowerShellVersion"] = $host.version.ToString()
$OSProperties = get-wmiobject -class "Win32_OperatingSystem" -namespace "root\\CIMV2" -computername $env:computername
$OperatingSystem = "{0} {1} Build {2}" -f $OSProperties.Caption, $OSProperties.CSDVersion, $OSProperties.BuildNumber
$TestEnvironment["OperatingSystem"] = $OperatingSystem
$Statistics = Get-TestResultStatistics -Results $TestResults
$TestReportFileName = Get-TestReportFileName -EnvironmentData $TestEnvironment -Stats $Statistics
$TestEnvironment["TestReportFileName"] = $TestReportFileName
$TestReportTitle = Get-TestReportTitleAsHtml -EnvironmentData $TestEnvironment
$TestEnvironment["TestReportTitle"] = $TestReportTitle
$ReportHtml = Render-TestResultReport -Results $TestResults -HeaderData $TestEnvironment -Statistics $Statistics
#Get PSUNIT_HOME folder
$PSUnitHome = dir env:PSUNIT_HOME
Write-Debug "PSUNIT_HOME: $PSUnitHome"
$TestReportFile = Join-Path -Path $($PSUnitHome.Value) -ChildPath $TestReportFileName
#Save report as file in PSUnit Home folder
$ReportHtml > $TestReportFile
if ($ShowReportInBrowser)
{#Open Report File
& ($TestReportFile)
}
}
Compile-TestResultReport
|
combined_dataset/train/non-malicious/Get-MailAttachment.ps1
|
Get-MailAttachment.ps1
|
param([Microsoft.Exchange.WebServices.Data.FileAttachment]$attachment)
"Downloading Attachment"
$attachment.Load()
"Done"
$path = "C:\\temp\\"+$attachment.Name
"Writing to $path"
set-content -value $mm[1].Attachments[0].Content -enc byte -path $path
"Done"
ii $path
|
combined_dataset/train/non-malicious/3272.ps1
|
3272.ps1
|
class BotConfiguration {
[string]$Name = 'PoshBot'
[string]$ConfigurationDirectory = $script:defaultPoshBotDir
[string]$LogDirectory = $script:defaultPoshBotDir
[string]$PluginDirectory = $script:defaultPoshBotDir
[string[]]$PluginRepository = @('PSGallery')
[string[]]$ModuleManifestsToLoad = @()
[LogLevel]$LogLevel = [LogLevel]::Verbose
[int]$MaxLogSizeMB = 10
[int]$MaxLogsToKeep = 5
[bool]$LogCommandHistory = $true
[int]$CommandHistoryMaxLogSizeMB = 10
[int]$CommandHistoryMaxLogsToKeep = 5
[hashtable]$BackendConfiguration = @{}
[hashtable]$PluginConfiguration = @{}
[string[]]$BotAdmins = @()
[char]$CommandPrefix = '!'
[string[]]$AlternateCommandPrefixes = @('poshbot')
[char[]]$AlternateCommandPrefixSeperators = @(':', ',', ';')
[string[]]$SendCommandResponseToPrivate = @()
[bool]$MuteUnknownCommand = $false
[bool]$AddCommandReactions = $true
[bool]$DisallowDMs = $false
[int]$FormatEnumerationLimitOverride = -1
[ChannelRule[]]$ChannelRules = @([ChannelRule]::new())
[ApprovalConfiguration]$ApprovalConfiguration = [ApprovalConfiguration]::new()
[MiddlewareConfiguration]$MiddlewareConfiguration = [MiddlewareConfiguration]::new()
[BotConfiguration] SerializeInstance([PSObject]$DeserializedObject) {
return [BotConfiguration]::Serialize($DeserializedObject)
}
[hashtable] ToHash() {
$propertyNames = $this | Get-Member -MemberType Property | Select-Object -ExpandProperty Name
$hash = @{}
foreach ($property in $propertyNames) {
if ($this.$property | Get-Member -MemberType Method -Name ToHash) {
$hash.$property = $this.$property.ToHash()
} else {
$hash.$property = $this.$property
}
}
return $hash
}
[BotConfiguration] Serialize([hashtable]$Hash) {
$propertyNames = $this | Get-Member -MemberType Property | Select-Object -ExpandProperty Name
$bc = [BotConfiguration]::new()
foreach ($key in $Hash.keys) {
if ($key -in $propertyNames) {
$bc.Name = $hash.Name
$bc.ConfigurationDirectory = $hash.ConfigurationDirectory
$bc.LogDirectory = $hash.LogDirectory
$bc.PluginDirectory = $hash.PluginDirectory
$bc.PluginRepository = $hash.PluginRepository
$bc.ModuleManifestsToLoad = $hash.ModuleManifestsToLoad
$bc.LogLevel = $hash.LogLevel
$bc.MaxLogSizeMB = $hash.MaxLogSizeMB
$bc.MaxLogsToKeep = $hash.MaxLogsToKeep
$bc.LogCommandHistory = $hash.LogCommandHistory
$bc.CommandHistoryMaxLogSizeMB = $hash.CommandHistoryMaxLogSizeMB
$bc.CommandHistoryMaxLogsToKeep = $hash.CommandHistoryMaxLogsToKeep
$bc.BackendConfiguration = $hash.BackendConfiguration
$bc.PluginConfiguration = $hash.PluginConfiguration
$bc.BotAdmins = $hash.BotAdmins
$bc.CommandPrefix = $hash.CommandPrefix
$bc.AlternateCommandPrefixes = $hash.AlternateCommandPrefixes
$bc.AlternateCommandPrefixSeperators = $hash.AlternateCommandPrefixSeperators
$bc.SendCommandResponseToPrivate = $hash.SendCommandResponseToPrivate
$bc.MuteUnknownCommand = $hash.MuteUnknownCommand
$bc.AddCommandReactions = $hash.AddCommandReactions
$bc.DisallowDMs = $hash.DisallowDMs
$bc.FormatEnumerationLimitOverride = $hash.FormatEnumerationLimitOverride
$bc.ChannelRules = $hash.ChannelRules.ForEach({[ChannelRule]::Serialize($_)})
$bc.ApprovalConfiguration = [ApprovalConfiguration]::Serialize($hash.ApprovalConfiguration)
$bc.MiddlewareConfiguration = [MiddlewareConfiguration]::Serialize($hash.MiddlewareConfiguration)
} else {
throw "Hash key [$key] is not a property in BotConfiguration"
}
}
return $bc
}
static [BotConfiguration] Serialize([PSObject]$DeserializedObject) {
$bc = [BotConfiguration]::new()
$bc.Name = $DeserializedObject.Name
$bc.ConfigurationDirectory = $DeserializedObject.ConfigurationDirectory
$bc.LogDirectory = $DeserializedObject.LogDirectory
$bc.PluginDirectory = $DeserializedObject.PluginDirectory
$bc.PluginRepository = $DeserializedObject.PluginRepository
$bc.ModuleManifestsToLoad = $DeserializedObject.ModuleManifestsToLoad
$bc.LogLevel = $DeserializedObject.LogLevel
$bc.MaxLogSizeMB = $DeserializedObject.MaxLogSizeMB
$bc.MaxLogsToKeep = $DeserializedObject.MaxLogsToKeep
$bc.LogCommandHistory = $DeserializedObject.LogCommandHistory
$bc.CommandHistoryMaxLogSizeMB = $DeserializedObject.CommandHistoryMaxLogSizeMB
$bc.CommandHistoryMaxLogsToKeep = $DeserializedObject.CommandHistoryMaxLogsToKeep
$bc.BackendConfiguration = $DeserializedObject.BackendConfiguration
$bc.PluginConfiguration = $DeserializedObject.PluginConfiguration
$bc.BotAdmins = $DeserializedObject.BotAdmins
$bc.CommandPrefix = $DeserializedObject.CommandPrefix
$bc.AlternateCommandPrefixes = $DeserializedObject.AlternateCommandPrefixes
$bc.AlternateCommandPrefixSeperators = $DeserializedObject.AlternateCommandPrefixSeperators
$bc.SendCommandResponseToPrivate = $DeserializedObject.SendCommandResponseToPrivate
$bc.MuteUnknownCommand = $DeserializedObject.MuteUnknownCommand
$bc.AddCommandReactions = $DeserializedObject.AddCommandReactions
$bc.DisallowDMs = $DeserializedObject.DisallowDMs
$bc.FormatEnumerationLimitOverride = $DeserializedObject.FormatEnumerationLimitOverride
$bc.ChannelRules = $DeserializedObject.ChannelRules.Foreach({[ChannelRule]::Serialize($_)})
$bc.ApprovalConfiguration = [ApprovalConfiguration]::Serialize($DeserializedObject.ApprovalConfiguration)
$bc.MiddlewareConfiguration = [MiddlewareConfiguration]::Serialize($DeserializedObject.MiddlewareConfiguration)
return $bc
}
}
|
combined_dataset/train/non-malicious/2861.ps1
|
2861.ps1
|
function Invoke-Task {
[CmdletBinding()]
param(
[Parameter(Mandatory = $true)]
[string]$taskName
)
Assert $taskName ($msgs.error_invalid_task_name)
$taskKey = $taskName.ToLower()
$currentContext = $psake.context.Peek()
if ($currentContext.aliases.Contains($taskKey)) {
$taskName = $currentContext.aliases.$taskKey.Name
$taskKey = $taskName.ToLower()
}
Assert ($currentContext.tasks.Contains($taskKey)) ($msgs.error_task_name_does_not_exist -f $taskName)
if ($currentContext.executedTasks.Contains($taskKey)) { return }
Assert (!$currentContext.callStack.Contains($taskKey)) ($msgs.error_circular_reference -f $taskName)
$currentContext.callStack.Push($taskKey)
$task = $currentContext.tasks.$taskKey
$precondition_is_valid = & $task.Precondition
if (!$precondition_is_valid) {
WriteColoredOutput ($msgs.precondition_was_false -f $taskName) -foregroundcolor Cyan
} else {
if ($taskKey -ne 'default') {
if ($task.PreAction -or $task.PostAction) {
Assert ($null -ne $task.Action) ($msgs.error_missing_action_parameter -f $taskName)
}
if ($task.Action) {
$stopwatch = new-object System.Diagnostics.Stopwatch
try {
foreach($childTask in $task.DependsOn) {
Invoke-Task $childTask
}
$stopwatch.Start()
$currentContext.currentTaskName = $taskName
try {
& $currentContext.taskSetupScriptBlock @($task)
try {
if ($task.PreAction) {
& $task.PreAction
}
if ($currentContext.config.taskNameFormat -is [ScriptBlock]) {
$taskHeader = & $currentContext.config.taskNameFormat $taskName
} else {
$taskHeader = $currentContext.config.taskNameFormat -f $taskName
}
WriteColoredOutput $taskHeader -foregroundcolor Cyan
foreach ($variable in $task.requiredVariables) {
Assert ((Test-Path "variable:$variable") -and ($null -ne (Get-Variable $variable).Value)) ($msgs.required_variable_not_set -f $variable, $taskName)
}
& $task.Action
} finally {
if ($task.PostAction) {
& $task.PostAction
}
}
} catch {
$task.Success = $false
$task.ErrorMessage = $_
$task.ErrorDetail = $_ | Out-String
$task.ErrorFormatted = FormatErrorMessage $_
throw $_
} finally {
& $currentContext.taskTearDownScriptBlock $task
}
} catch {
if ($task.ContinueOnError) {
"-"*70
WriteColoredOutput ($msgs.continue_on_error -f $taskName,$_) -foregroundcolor Yellow
"-"*70
[void]$currentContext.callStack.Pop()
} else {
throw $_
}
} finally {
$task.Duration = $stopwatch.Elapsed
}
} else {
foreach($childTask in $task.DependsOn) {
Invoke-Task $childTask
}
}
} else {
foreach($childTask in $task.DependsOn) {
Invoke-Task $childTask
}
}
Assert (& $task.Postcondition) ($msgs.postcondition_failed -f $taskName)
}
$poppedTaskKey = $currentContext.callStack.Pop()
Assert ($poppedTaskKey -eq $taskKey) ($msgs.error_corrupt_callstack -f $taskKey,$poppedTaskKey)
$currentContext.executedTasks.Push($taskKey)
}
|
combined_dataset/train/non-malicious/sample_40_64.ps1
|
sample_40_64.ps1
|
# ----------------------------------------------------------------------------------
#
# Copyright Microsoft Corporation
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
# http://www.apache.org/licenses/LICENSE-2.0
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ----------------------------------------------------------------------------------
<#
.Synopsis
Regenerates an access key for a Redis Enterprise database.
.Description
Regenerates an access key for a Redis Enterprise database.
.Example
PS C:\> New-AzRedisEnterpriseCacheKey -Name "MyCache" -ResourceGroupName "MyGroup" -KeyType "Primary"
PrimaryKey SecondaryKey
---------- ------------
new-primary-key secondary-key
.Example
PS C:\> New-AzRedisEnterpriseCacheKey -Name "MyCache" -ResourceGroupName "MyGroup" -KeyType "Secondary"
PrimaryKey SecondaryKey
---------- ------------
primary-key new-secondary-key
.Outputs
Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Models.Api20230301Preview.IAccessKeys
.Link
https://learn.microsoft.com/powershell/module/az.redisenterprisecache/new-azredisenterprisecachekey
#>
function New-AzRedisEnterpriseCacheKey {
[Alias('New-AzRedisEnterpriseCacheDatabaseKey', 'New-AzRedisEnterpriseCacheAccessKey')]
[OutputType([Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Models.Api20230301Preview.IAccessKeys])]
[CmdletBinding(DefaultParameterSetName='RegenerateExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')]
param(
[Parameter(Mandatory)]
[Alias('Name')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Path')]
[System.String]
# The name of the Redis Enterprise cluster.
${ClusterName},
[Parameter(Mandatory)]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Path')]
[System.String]
# The name of the resource group.
# The name is case insensitive.
${ResourceGroupName},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Path')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')]
[System.String]
# The ID of the target subscription.
${SubscriptionId},
[Parameter(Mandatory)]
[ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Support.AccessKeyType])]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Body')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Support.AccessKeyType]
# Which access key to regenerate.
${KeyType},
[Parameter()]
[Alias('AzureRMContext', 'AzureCredential')]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Azure')]
[System.Management.Automation.PSObject]
# The credentials, account, tenant, and subscription used for communication with Azure.
${DefaultProfile},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command as a job
${AsJob},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Wait for .NET debugger to attach
${Break},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be appended to the front of the pipeline
${HttpPipelineAppend},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Runtime.SendAsyncStep[]]
# SendAsync Pipeline Steps to be prepended to the front of the pipeline
${HttpPipelinePrepend},
[Parameter()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Run the command asynchronously
${NoWait},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[System.Uri]
# The URI for the proxy server to use
${Proxy},
[Parameter(DontShow)]
[ValidateNotNull()]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[System.Management.Automation.PSCredential]
# Credentials for a proxy server to use for the remote call
${ProxyCredential},
[Parameter(DontShow)]
[Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')]
[System.Management.Automation.SwitchParameter]
# Use the default credentials for the proxy
${ProxyUseDefaultCredentials}
)
process {
$null = $PSBoundParameters.Add("DatabaseName", "default")
Az.RedisEnterpriseCache.internal\New-AzRedisEnterpriseCacheKey @PSBoundParameters
}
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDuL+IXizJgr/gy
# VBQ+4ZRMqNHyi0b7OGSpoHC2lJTXwaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIG9R0yKbeuZH9MXJzWEe5DzO
# WVOf2VD/mvqZf3uS29WqMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAYAG7zctAuzNsFfnoJYw6fda7sBnlgk8Q8HbMRhNad4CV3E5iax2GYFxE
# UgegilL1z77MWnSx5heRqJUSQxiueDw7aoH5VmhYK6K2QN+b8xkDmdDeizVJpvHU
# ky/qg+5DDVfTqRdPPYIhfhk0kMQM4IUkiHi6osf4BIapm6Xf4YUpFZqMGYbIopA+
# upw9uOiTGp2rRngb+s2Q9Pt0FWm1552k8oPba1KDWgr/wd0ZEaT7fCVP3xqLMU3y
# wKw6siRac9IDvgCITL2SA2q5B8SGbxT+3bqPcI19egYVBTfhIHvYRRGmzCz77Xr9
# jKQ1d99gGt4mzZUAOrZ5mMWAcp7deaGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCNGVEQ/3Dm+2MvNRcaq9U6pN+p3iUGestR/Ti8c8hoSAIGZhfNGBDz
# GBMyMDI0MDQyMzEzMTUxMi4xNThaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w
# M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgABAAAB6TANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yrAPJnV6A7aZYnTw/yx90u
# 1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZY5O8PCBu7Gq+x5Xe6plQ
# t4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7LMpKwIKQMwXDctYKvCyQy
# 6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5MxylRdTS7E1Jocl30NgcBi
# JfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9dxsyvng0lUVY+urq/G8QR
# FoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTpw2I6ZWaIhPwMu5DvdkEG
# zV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0VJBSGV+h66ZcaUJOxpbS
# IjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDCxHG4mW3mpNQopM/U1WJn
# jssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOamGfwvkIe7dkylzm8BeAU
# QC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKFI30u9YlxDTzAuLDK073c
# ndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022+yPwclmykssk30a4Rp3v
# 9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYjuIj0Wuv+jcjtB+xOMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe61AE90Ken2XPgQHJDiS4S
# bLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz/HciZooyeoAvkHQaHmLh
# wBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20QpHDEukwKR8kfaBEX83A
# yvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQgeEBr8E4K2wQ2WXI/ZJxZ
# S/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/JnjXMChnm9bLDD1waJ7TPp5
# wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6QjegHzndX/tZrY792dfR
# AXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWGXYJL5H6LNnKyXJVEw/1F
# bO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsHptAvREqCc+/YxzhIKkA8
# 8Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFvNRhh8ZBAenn1pW+5UBGY
# z2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMlPG3YjuqFxidiIsoAw2+M
# hI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2jJWgq7VlBuP1BuXjZ3qgy
# m9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCr
# aYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dIcTDAiGA8yMDI0MDQyMzExMzg1
# MloYDzIwMjQwNDI0MTEzODUyWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp0hxM
# AgEAMAoCAQACAghFAgH/MAcCAQACAhNpMAoCBQDp023MAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAK8eH3rZdn1zSVWz/62/4QXWc469a0821JsUCszUNQE7
# zofGTI2pXfcLRkid5HDMoyzHaxFyQd7BlB9RiWflQDCbmJDXi+gQvIkxjCTCRBlC
# ur00RnLzUEmS1uJPOLOL/bOqar9Ef8dldb6m5FXynuOMavaqfurd40q4GBqB6frP
# +NXQ2XPKm+yNQ9eFgWq4QfuetnD8+P6G4T+Mv6nxbUeZURvBPR5FA9fsJpjoKDc9
# w9ekBTznBDZfbQ5BcayMyUd+K0eOSstGOQ0kwrQkFJUjB+EDHoNJVO3T4Migd36w
# R6XnZTD4GG7mwxX0i8EYxg0lKounpH1hw7E6P5VgX74xggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAekPcTB+XfESNgABAAAB
# 6TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCB6RhFtX+dO/I6n3H5EHy3gTMKxqEOa6Hp0X5e6qNmx
# iDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQkniXaTcmj1TKQWF+x2U4
# riVorGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQgfEHm2ExKtPF0slQuA53nCHBP
# mRCZtnL9CXNnAqBr+34wDQYJKoZIhvcNAQELBQAEggIAo4E0l+WSXsa1pStuDz/e
# iBURaUGeDfK69QzymWKchW0OYD8XxvHU4XGTgqUA/gDnF5/oBjcdqDVqWFvfM0UO
# 5T4TqrlzbGVY2cAfzo8WcKZfE1275KCB2dadVveMjWRK0aBj/3AIoMai5zX7v318
# 8ZqmZv4SmcnkeJ1brKkysayXZ0g/MFUEnzdg8dKb5jMQBqMd18xt0wSloHt8FSuV
# EtPL2tMVNF4WVE+PHOXg6COuDv0NhdVmRivku9A0NsKxiRtuWAi40v2kxDw7N1f2
# f/RshFq0zxRA4DT7T3u7nOLL2LJQEoRn8E0KnAH3eAE9man21r2BVgAwxRWY6SVA
# SVgxXxFa65DahzatweVHW1ef3tIDbSVwi1hAzSz81LhggTQr0W5ZU80IXTu0ulAx
# 2Z03Z879asyoXbkJOUDEBh0GpZSdRBNwZxaGzcbSdmxa4l6kiQguTOxtsHT/lcYJ
# aq+q7/+FKF1Imz6+REc8gfBomCjuzcpSzUPOXxPEBseIS85XJgFcWm6+mNCLqqkE
# j2lwvUkZkzUBDJoMyqXwCPhWzQBG97E/RtKO4QU1KJ5EChCb9bxI6x2Qt5UF08mW
# VomiZ51BsHADDUaaMHc0LoEE/oNX9ZhJYUYUe4wqHdxV2iKX4XCv1pUDCn/1W1yx
# oGwp7jSbU/4wWXfYdZN4uMM=
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_47_77.ps1
|
sample_47_77.ps1
|
try {
$ScriptsFolder = "$env:SystemDrive\CloudDeployment\Setup\Common"
Set-Location -Path $ScriptsFolder
Import-Module "$env:SystemDrive\CloudDeployment\Setup\Common\RegistrationHelpers.psm1"
$registrationParameters = Get-RegistrationParametersFromEce
Validate-GetAccessToken -TokenCacheCred $registrationParameters.RegistrationTokenCacheCred -ClientId $registrationParameters.RegistrationClientId -AzureEnvironment $registrationParameters.RegistrationCloudName -TenantId $registrationParameters.RegistrationTenantId
} catch {
Write-Error $_.Exception.message
}
# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDd4xtsO0OuxtJw
# uFkF2DRD9uIL5gzi5gVACE3fntr+VqCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIML/
# dG/5dC7Ysht8Da5eVMfBAfr/3Zgr2z/DlY5etK+SMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAuSgJKr80yKaaWw+lDDZ58TuJH/3PHv/YhGUz
# z5xQhoh+pXW3wJCakPLOvIqqwdtkY+t5IfLUNm1MC3r39BeDg8/6KRJ/irZSh0h6
# cWwo+i1Ny8YrYBwbWVEcDdO/uTNifr54847WcaDZOml1soilc2eQgb/ZJmI3Ez62
# ynLs/l4UKah0W4eLgyli2RfzFdT93e00X3qwIlTiQ8LVys+sUhKrJBkBZYl2o1d4
# iy3lAqaT9pdZsR5a3eACuf2BJPrTV3t1sMKJpw5C4DD6DcHArdAd0XsvLibqSWLu
# fI/ZMjh39RVef5nBA3CTRHbMsGjiQPF4mp73Y4tVzKKcwf13BqGCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCBhsjbJbySYSLHJ0YqOgo3UXpdvPvKJxSnX
# fGDQ0uD2rwIGZeen5BngGBMyMDI0MDMwODEwMDMxNy42NjZaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwAB
# AAAB6jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rW
# b2ksqaF65QtJkbQpmsc6G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T
# 0KfylTulrzKtgxnxZh7q1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGo
# n/4VDHnZhdas22svSC5GHywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB
# +KHCy08ds36an7IcOGfRmhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjA
# lsBBHD1TdGBucrGC3TQXSTp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1f
# xYk2nY6SCKsV+VmtV5aiPzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEU
# TBPXME/ia+t8jrT2y3ug15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM
# 3HPVJJ19vOSvrCP9lsEcEwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp
# 081X5RQ6HGVUz6ZdgQ0jcT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc
# 9KHKTWfXpAVj1Syqt5X4nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8
# HUVMp+mAA4rXjOw42vkHfQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebp
# F0BU1MTIcosFblleMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxV
# bX3G37KgvyoNAnuu2w3HoWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI5
# 3kOWSaWCaV3xCznpRt3c4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqe
# kZb4ivMR6LoPb5HNlq0WbBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8Cx
# iAg2KlbPyMwBOPcr9hJT8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzE
# GafPUwLmoETihOGLqIQlCpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3Qd
# iNS8u9ujYh1B7NLr6t3IglfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2
# JG5BYu/XitRE8cdzaJmDVBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dix
# UxE4qlfUPMixGr0Ft4/S0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi
# 5auiqB6xQBADUf+F7hSKZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Q
# bt45Cz/QMa7EmMGNn7a8MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5D
# r5m3T4bDj9WTNLgP8SFe3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQCJ2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6ZTJPjAi
# GA8yMDI0MDMwNzIzMTYxNFoYDzIwMjQwMzA4MjMxNjE0WjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDplMk+AgEAMAcCAQACAiFwMAcCAQACAhPwMAoCBQDplhq+AgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAEcZqCgNi5wrNAaiwoKb+12iNpWP
# koUm2/W5e3DhU8YMisoO5TdwKkGlVYpy6NmWHAzIbo9AB6w9iB3fxOmAVsowep66
# EyPeG0rOauJQIshVQ8HSz1NJL0V7g7c9WFssNMOEnHcUHF/4mn1o8GiWeO85Q+Tw
# pf6fV+kQtVrXyf6wckmrGrCI4RWjX894KL+H6yUWtpl5ZWFPXbHvfeccpJkaJzgj
# fB1Be4LA8C1Hms1OkgxPIestKpbDpVj7japBnbBosd1wvFkH0r1e5mJYqGJp8zSW
# M5Vk/k7jG1BYy9MjY4KrZzQ1bkpzE07ROxjdWNdP8SzaDktQZrFrebnAonYxggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqa
# JHLVWT9hYwABAAAB6jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCBI0cnun95s7O81HUyzt6aG60Px
# 0OLeWc7pWWjNUyVNBTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXj
# ZDR4iwg0ltLANXBh5G1uKqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQgqE5KOWzg
# bvK/SZFcAoEfJ2NR3UdSgbM2mODux/iF2+EwDQYJKoZIhvcNAQELBQAEggIATWh8
# wvnzRnCxJF+d7ctDLnf57aBUmsFAKveyvpPFCPSMIJIafgxY8WkyT6VRElCE8XNe
# uBeQJXcLMbev/1NVRhFhpl6h15CEjbyxkNNaV8KgGrYSOEc2Ikj8UYey/KcJhuEr
# 2V5JRSOYkMST9DtGX8SzFr/B+8q9Qy5zC4MdqcSWz+xqJ7BTSC2GMTH3n6jz5SAY
# UCQuGsfufSRRuDiDLBt+BaBBf9Rb0XqZFOfmYsRYZW8v5Im3JvqTYYmSgqF15XwB
# BwiVIq9Y0wiVQr+0DjkwTFNW+vuAMV5/HTsCpM0R0Ac6i0IBoIwpSl8554rKhAQt
# 1tclVZE8ZIpeLsR1cAL1oRCUXxPL+Z6U2HptsrOgTY88q1i4+dQngkJvqqXtOyhg
# L4kJIZe6cgw8NADZm0kyFp2jNwjlqOgrUrqHUkcUc+q6CL2LAStkxyKjxyNwHrHZ
# FwiZ7D7F7ubY8JvL6+TCGsrd8x09lMlZ7tYM//GBs0W+C310bT/MXM+T2WrEM4fu
# OdzMlCi/MePnbV2NyTOuSspkS7XcLfCE0jp9gU7AmOfeW0O1iQTUda0DqYt80L3n
# dXmxIZaFB9EdF44EF3FwoutXV/YZ0vJ/uViZ5zzjRT4aikqSDtvAE198EVP7vQRT
# P2XHp3kB2hmtsfGyHx9lJ3WjpzUTGuv/9v0xQ3U=
# SIG # End signature block
|
combined_dataset/train/non-malicious/2801.ps1
|
2801.ps1
|
if (Get-Command logparser.exe) {
$lpquery = @"
SELECT
COUNT(CommandLine) as Cnt,
CommandLine,
Hash
FROM
*ProcsWMI.tsv
GROUP BY
CommandLine,
Hash
ORDER BY
Cnt ASC
"@
& logparser -stats:off -i:csv -dtlines:0 -fixedsep:on -rtp:-1 "$lpquery"
} else {
$ScriptName = [System.IO.Path]::GetFileName($MyInvocation.ScriptName)
"${ScriptName} requires logparser.exe in the path."
}
|
combined_dataset/train/non-malicious/3194.ps1
|
3194.ps1
|
Function Wait-Path {
[cmdletbinding()]
param (
[string[]]$Path,
[int]$Timeout = 5,
[int]$Interval = 1,
[switch]$Passthru
)
$StartDate = Get-Date
$First = $True
Do
{
if($First -eq $True)
{
$First = $False
}
else
{
Start-Sleep -Seconds $Interval
}
[bool[]]$Tests = foreach($PathItem in $Path)
{
Try
{
if(Test-Path $PathItem -ErrorAction stop)
{
Write-Verbose "'$PathItem' exists"
$True
}
else
{
Write-Verbose "Waiting for '$PathItem'"
$False
}
}
Catch
{
Write-Error "Error testing path '$PathItem': $_"
$False
}
}
$Return = $Tests -notcontains $False -and $Tests -contains $True
if ( ((Get-Date) - $StartDate).TotalSeconds -gt $Timeout)
{
if( $Passthru )
{
$False
break
}
else
{
Throw "Timed out waiting for paths $($Path -join ", ")"
}
}
elseif($Return)
{
if( $Passthru )
{
$True
}
break
}
}
Until( $False )
}
|
combined_dataset/train/non-malicious/sample_65_86.ps1
|
sample_65_86.ps1
|
#
# Module manifest for module 'OCI.PSModules.Globallydistributeddatabase'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Globallydistributeddatabase.dll'
# Version number of this module.
ModuleVersion = '88.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '31a94d9b-5cc3-4808-88f0-6b82ed090ffe'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Globallydistributeddatabase Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '88.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Globallydistributeddatabase.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Confirm-OCIGloballydistributeddatabaseNetwork',
'Get-OCIGloballydistributeddatabasePrivateEndpoint',
'Get-OCIGloballydistributeddatabasePrivateEndpointsList',
'Get-OCIGloballydistributeddatabaseShardedDatabase',
'Get-OCIGloballydistributeddatabaseShardedDatabasesList',
'Get-OCIGloballydistributeddatabaseWorkRequest',
'Get-OCIGloballydistributeddatabaseWorkRequestErrorsList',
'Get-OCIGloballydistributeddatabaseWorkRequestLogsList',
'Get-OCIGloballydistributeddatabaseWorkRequestsList',
'Invoke-OCIGloballydistributeddatabaseConfigureShardedDatabaseGsms',
'Invoke-OCIGloballydistributeddatabaseConfigureSharding',
'Invoke-OCIGloballydistributeddatabaseDownloadGsmCertificateSigningRequest',
'Invoke-OCIGloballydistributeddatabaseFetchConnectionString',
'Invoke-OCIGloballydistributeddatabaseFetchShardableCloudAutonomousVmClusters',
'Invoke-OCIGloballydistributeddatabasePatchShardedDatabase',
'Invoke-OCIGloballydistributeddatabasePrevalidateShardedDatabase',
'Invoke-OCIGloballydistributeddatabaseReinstateProxyInstance',
'Move-OCIGloballydistributeddatabasePrivateEndpointCompartment',
'Move-OCIGloballydistributeddatabaseShardedDatabaseCompartment',
'New-OCIGloballydistributeddatabaseGsmCertificateSigningRequest',
'New-OCIGloballydistributeddatabasePrivateEndpoint',
'New-OCIGloballydistributeddatabaseShardedDatabase',
'New-OCIGloballydistributeddatabaseWallet',
'Remove-OCIGloballydistributeddatabasePrivateEndpoint',
'Remove-OCIGloballydistributeddatabaseShardedDatabase',
'Start-OCIGloballydistributeddatabaseShardedDatabase',
'Stop-OCIGloballydistributeddatabaseShardedDatabase',
'Update-OCIGloballydistributeddatabasePrivateEndpoint',
'Update-OCIGloballydistributeddatabaseShardedDatabase',
'Write-OCIGloballydistributeddatabaseSignedCertificateAndGenerateWallet'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Globallydistributeddatabase'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/Hostprofile Update GUI.ps1
|
Hostprofile Update GUI.ps1
|
################################################################################################################
#
# Purpose: Host Profile Update
# Author: David Chung
#
# Ver 1.0 - 09/22/2011 Initial Script
# Ver 1.1 - 09/26/2011 Added Full GUI support (Primal Forms)
# Ver 1.2 - 09/26/2011 Enabled User and Password Field
# Added Login Fail-safe feature.
# Added Compliance Check Only Box
# Search for Powered On Hosts only
# Windows Resize Disabled
# Removed Progress Bar
# Ver 1.3 - 09/28/2011 Added hosts in maintenace mode in cluster check
# -stops host profile update if any host in the cluster is in mainteance mode prior to the update
# Ver 1.4 09/29/2011 Added checks that if the cluster is not selected, the script does not proceed.
#
################################################################################################################
#Generated Form Function
function GenerateForm {
#region Import the Assemblies
[reflection.assembly]::loadwithpartialname("System.Drawing") | Out-Null
[reflection.assembly]::loadwithpartialname("System.Windows.Forms") | Out-Null
#endregion
#region Generated Form Objects
$form1 = New-Object System.Windows.Forms.Form
$button4 = New-Object System.Windows.Forms.Button
$groupBox3 = New-Object System.Windows.Forms.GroupBox
$ComplianceBox1 = New-Object System.Windows.Forms.CheckBox
$label4 = New-Object System.Windows.Forms.Label
$ClusterName = New-Object System.Windows.Forms.ListBox
$BeginButton = New-Object System.Windows.Forms.Button
$CloseButton = New-Object System.Windows.Forms.Button
$groupBox2 = New-Object System.Windows.Forms.GroupBox
$ProgressLog = New-Object System.Windows.Forms.ListBox
$groupBox1 = New-Object System.Windows.Forms.GroupBox
$LoginButton = New-Object System.Windows.Forms.Button
$Password = New-Object System.Windows.Forms.TextBox
$User = New-Object System.Windows.Forms.TextBox
$vCenter = New-Object System.Windows.Forms.TextBox
$label3 = New-Object System.Windows.Forms.Label
$label2 = New-Object System.Windows.Forms.Label
$label1 = New-Object System.Windows.Forms.Label
$InitialFormWindowState = New-Object System.Windows.Forms.FormWindowState
#endregion Generated Form Objects
#----------------------------------------------
#Generated Event Script Blocks
#----------------------------------------------
#Provide Custom Code for events specified in PrimalForms.
$BeginButton_OnClick=
{
#TODO: Place custom script here
$scluster = $ClusterName.SelectedItem
if ($scluster -eq $null) {
$ProgressLog.items.add("")
$ProgressLog.items.add("Please select a cluster from the cluster list")
[Windows.Forms.Application]::DoEvents()
}
Else {
$vcluster = Get-Cluster $scluster
$ProgressLog.items.add("Collecting Powered On Hosts in $vcluster...")
[Windows.Forms.Application]::DoEvents()
$VMhosts = $vcluster| Get-VMHost | where {$_.PowerState -eq "PoweredOn"} | sort name
$ProgressLog.items.add("....completed")
$ProgressLog.items.add("")
[Windows.Forms.Application]::DoEvents()
If ($ComplianceBox1.Checked) {
$ProgressLog.items.add("Checking Hosts in $vcluster...")
[Windows.Forms.Application]::DoEvents()
ForEach ($VMhost in $VMhosts) {
$profile = Test-VMHostProfileCompliance -VMHost $VMhost
If ($PROFILE -ne $null) {
$hostprofile = Get-vmhostprofile -entity $VMhost
$ProgressLog.items.add("$VMHost is NOT Compliant.")
[Windows.Forms.Application]::DoEvents()
}
Else {
$ProgressLog.items.add("$vmhost is Compliant.")
[Windows.Forms.Application]::DoEvents()
}
}
$ProgressLog.items.add("")
$ProgressLog.items.add("Compliance Check is Completed")
$ProgressLog.items.add("")
}
Else {
$ProgressLog.items.add("Checking Hosts in $vcluster...")
[Windows.Forms.Application]::DoEvents()
$VMhosts = $vcluster| Get-VMHost | where {$_.PowerState -eq "PoweredOn"} | sort name
$ClusterHostCount = @($VMhosts).Count
$ClusterConnectedCount = @($VMhosts | where {$_.ConnectionState -eq "Connected"}).Count
If ($ClusterHostCount -ne $ClusterConnectedCount){
$ProgressLog.items.add("WARNING: One or more hosts in $vcluster in Maint. mode.")
$ProgressLog.items.add("Please try to remediate before updating the host profile.")
[Windows.Forms.Application]::DoEvents()
}
Else {
ForEach ($VMhost in $VMhosts) {
$profile = Test-VMHostProfileCompliance -VMHost $VMhost
If ($PROFILE -ne $null) {
$hostprofile = Get-vmhostprofile -entity $VMhost
$ProgressLog.items.add("$VMHost is NOT Compliant.")
[Windows.Forms.Application]::DoEvents()
if ($vcluster.DrsAutomationLevel -ne "FullyAutomated"){
$ProgressLog.items.add("WARNING: DRS FullyAutomated not set on $vcluster")
$ProgressLog.items.add("WARNING: Enabling DRS FullyAutomated")
[Windows.Forms.Application]::DoEvents()
Set-Cluster -Cluster $vcluster -DrsAutomationLevel FullyAutomated -Confirm:$false
}
foreach ($vm in ($VMHost | get-vm)){
if ((get-cddrive -VM $vm).ConnectionState.Connected -eq "true"){
$ProgressLog.items.add("WARNING: $VM has a CDROM drive attached, detaching.")
$ProgressLog.items.add("WARNING: Detaching CDROM.")
[Windows.Forms.Application]::DoEvents()
Set-CDDrive -CD (get-cddrive -VM $vm) -StartConnected:$false -Connected:$False -Confirm:$false
}
}
$ProgressLog.items.add("Setting $VMhost to Maintenance Mode...")
[Windows.Forms.Application]::DoEvents()
Set-VMHost -State 'Maintenance' -VMHost $VMhost -Evacuate:$true -Confirm:$false
$ProgressLog.items.add("Applying Host Profilie...")
[Windows.Forms.Application]::DoEvents()
Apply-VMHostProfile -Entity $VMHost -Profile $hostprofile -ErrorAction SilentlyContinue -Confirm:$false
$ProgressLog.items.add("Taking the Host out of maintenance mode....")
[Windows.Forms.Application]::DoEvents()
Set-VMHost -VMHost $VMhost -State 'Connected'
Test-VMHostProfileCompliance -VMHost $VMhost
}
Else {
$ProgressLog.items.add("$vmhost is Compliant.")
$ProgressLog.items.add("")
[Windows.Forms.Application]::DoEvents()
}
}
$ProgressLog.items.add("Compliance Update is Completed")
}
}
}
}
$CloseButton_OnClick=
{
#TODO: Place custom script here
$form1.Close()
}
$LoginButton_OnClick=
{
#TODO: Place custom script here
if ($VCenter.text -like "" -or $Password.text -like "" -or $User.text -like "") {
$ProgressLog.items.add("Field can not be empty. Try Again")
[Windows.Forms.Application]::DoEvents()
}
Else {
$LoginButton.Enabled = $false
$V = $vCenter.text
$PSW = $Password.text
$iUser = $User.text
#$BSTR = [System.Runtime.InteropServices.marshal]::SecureStringToBSTR($PSW)
#$PSW = [System.Runtime.InteropServices.marshal]::PtrToStringAuto($BSTR)
$ProgressLog.items.add("Connecting to $V...")
[Windows.Forms.Application]::DoEvents()
#Connect-VIServer -Server $V -User $iUser -Password $PSW -WarningAction:SilentlyContinue
$connection = Connect-VIServer $V -User $iuser -Password $PSW -WarningAction:SilentlyContinue
if ($connection.Port -notlike "*443*") {
$ProgressLog.items.add("....Failed!")
$ProgressLog.items.add("Failed to connect. Check vCenter and credentials.")
$LoginButton.Enabled = $true
[Windows.Forms.Application]::DoEvents()
}
Else {
$ProgressLog.items.add("....connected")
$ProgressLog.items.add("")
$ProgressLog.items.add("Getting Cluster Name from $V...")
[Windows.Forms.Application]::DoEvents()
$Clusters = Get-Cluster | sort name
Foreach ($Cluster in $Clusters){
$ClusterName.items.add($Cluster.Name)
[Windows.Forms.Application]::DoEvents()
}
$ProgressLog.items.add("....completed")
[Windows.Forms.Application]::DoEvents()
$BeginButton.Enabled = $True
}
}
}
$button4_OnClick=
{
#TODO: Place custom script here
$vCenter.Text = $null
$User.Text = $null
$Password.Text = $null
$ClusterName.items.clear()
$ProgressLog.items.clear()
[Windows.Forms.Application]::DoEvents()
$BeginButton.Enabled = $false
$LoginButton.Enabled = $true
Disconnect-VIServer * -ErrorAction:SilentlyContinue -Confirm:$false
}
$OnLoadForm_StateCorrection=
{#Correct the initial state of the form to prevent the .Net maximized form issue
$form1.WindowState = $InitialFormWindowState
}
#region Generated Form Code
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 583
$System_Drawing_Size.Width = 452
$form1.ClientSize = $System_Drawing_Size
$form1.DataBindings.DefaultDataSourceUpdateMode = 0
$form1.FormBorderStyle = 1
$form1.Name = "form1"
$form1.Text = "Host Profile Update by David Chung"
$button4.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 277
$System_Drawing_Point.Y = 548
$button4.Location = $System_Drawing_Point
$button4.Name = "button4"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 23
$System_Drawing_Size.Width = 75
$button4.Size = $System_Drawing_Size
$button4.TabIndex = 5
$button4.Text = "Reset Form"
$button4.UseVisualStyleBackColor = $True
$button4.add_Click($button4_OnClick)
$form1.Controls.Add($button4)
$groupBox3.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 13
$System_Drawing_Point.Y = 124
$groupBox3.Location = $System_Drawing_Point
$groupBox3.Name = "groupBox3"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 66
$System_Drawing_Size.Width = 427
$groupBox3.Size = $System_Drawing_Size
$groupBox3.TabIndex = 4
$groupBox3.TabStop = $False
$groupBox3.Text = "Profile Update"
$form1.Controls.Add($groupBox3)
$ComplianceBox1.CheckAlign = 64
$ComplianceBox1.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 262
$System_Drawing_Point.Y = 42
$ComplianceBox1.Location = $System_Drawing_Point
$ComplianceBox1.Name = "ComplianceBox1"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 18
$System_Drawing_Size.Width = 150
$ComplianceBox1.Size = $System_Drawing_Size
$ComplianceBox1.TabIndex = 3
$ComplianceBox1.Text = "Compliance Check Only"
$ComplianceBox1.UseVisualStyleBackColor = $True
$groupBox3.Controls.Add($ComplianceBox1)
$label4.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 7
$System_Drawing_Point.Y = 29
$label4.Location = $System_Drawing_Point
$label4.Name = "label4"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 23
$System_Drawing_Size.Width = 100
$label4.Size = $System_Drawing_Size
$label4.TabIndex = 2
$label4.Text = "Select Cluster"
$groupBox3.Controls.Add($label4)
$ClusterName.DataBindings.DefaultDataSourceUpdateMode = 0
$ClusterName.FormattingEnabled = $True
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 113
$System_Drawing_Point.Y = 19
$ClusterName.Location = $System_Drawing_Point
$ClusterName.Name = "ClusterName"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 30
$System_Drawing_Size.Width = 122
$ClusterName.Size = $System_Drawing_Size
$ClusterName.Sorted = $True
$ClusterName.TabIndex = 0
$groupBox3.Controls.Add($ClusterName)
$BeginButton.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 345
$System_Drawing_Point.Y = 13
$BeginButton.Location = $System_Drawing_Point
$BeginButton.Name = "BeginButton"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 23
$System_Drawing_Size.Width = 75
$BeginButton.Size = $System_Drawing_Size
$BeginButton.TabIndex = 2
$BeginButton.Text = "Begin"
$BeginButton.UseVisualStyleBackColor = $True
$BeginButton.add_Click($BeginButton_OnClick)
$BeginButton.Enabled = $False
#
$groupBox3.Controls.Add($BeginButton)
$CloseButton.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 358
$System_Drawing_Point.Y = 548
$CloseButton.Location = $System_Drawing_Point
$CloseButton.Name = "CloseButton"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 23
$System_Drawing_Size.Width = 75
$CloseButton.Size = $System_Drawing_Size
$CloseButton.TabIndex = 3
$CloseButton.Text = "Close"
$CloseButton.UseVisualStyleBackColor = $True
$CloseButton.add_Click($CloseButton_OnClick)
$form1.Controls.Add($CloseButton)
$groupBox2.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 13
$System_Drawing_Point.Y = 196
$groupBox2.Location = $System_Drawing_Point
$groupBox2.Name = "groupBox2"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 345
$System_Drawing_Size.Width = 427
$groupBox2.Size = $System_Drawing_Size
$groupBox2.TabIndex = 1
$groupBox2.TabStop = $False
$groupBox2.Text = "Progress Log"
$form1.Controls.Add($groupBox2)
$ProgressLog.DataBindings.DefaultDataSourceUpdateMode = 0
$ProgressLog.FormattingEnabled = $True
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 6
$System_Drawing_Point.Y = 20
$ProgressLog.Location = $System_Drawing_Point
$ProgressLog.Name = "ProgressLog"
$ProgressLog.SelectionMode = 0
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 316
$System_Drawing_Size.Width = 414
$ProgressLog.Size = $System_Drawing_Size
$ProgressLog.TabIndex = 3
$groupBox2.Controls.Add($ProgressLog)
$groupBox1.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 13
$System_Drawing_Point.Y = 12
$groupBox1.Location = $System_Drawing_Point
$groupBox1.Name = "groupBox1"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 106
$System_Drawing_Size.Width = 427
$groupBox1.Size = $System_Drawing_Size
$groupBox1.TabIndex = 0
$groupBox1.TabStop = $False
$groupBox1.Text = "vCenter Login"
$form1.Controls.Add($groupBox1)
$LoginButton.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 345
$System_Drawing_Point.Y = 41
$LoginButton.Location = $System_Drawing_Point
$LoginButton.Name = "LoginButton"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 23
$System_Drawing_Size.Width = 75
$LoginButton.Size = $System_Drawing_Size
$LoginButton.TabIndex = 6
$LoginButton.Text = "Login"
$LoginButton.UseVisualStyleBackColor = $True
$LoginButton.add_Click($LoginButton_OnClick)
$groupBox1.Controls.Add($LoginButton)
$Password.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 113
$System_Drawing_Point.Y = 71
$Password.Location = $System_Drawing_Point
$Password.Name = "Password"
$Password.PasswordChar = '*'
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 20
$System_Drawing_Size.Width = 122
$Password.Size = $System_Drawing_Size
$Password.TabIndex = 5
$groupBox1.Controls.Add($Password)
$User.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 113
$System_Drawing_Point.Y = 44
$User.Location = $System_Drawing_Point
$User.Name = "User"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 20
$System_Drawing_Size.Width = 122
$User.Size = $System_Drawing_Size
$User.TabIndex = 4
$groupBox1.Controls.Add($User)
$vCenter.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 113
$System_Drawing_Point.Y = 17
$vCenter.Location = $System_Drawing_Point
$vCenter.Name = "vCenter"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 20
$System_Drawing_Size.Width = 122
$vCenter.Size = $System_Drawing_Size
$vCenter.TabIndex = 3
$groupBox1.Controls.Add($vCenter)
$label3.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 7
$System_Drawing_Point.Y = 74
$label3.Location = $System_Drawing_Point
$label3.Name = "label3"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 23
$System_Drawing_Size.Width = 100
$label3.Size = $System_Drawing_Size
$label3.TabIndex = 2
$label3.Text = "Password"
$groupBox1.Controls.Add($label3)
$label2.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 7
$System_Drawing_Point.Y = 47
$label2.Location = $System_Drawing_Point
$label2.Name = "label2"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 23
$System_Drawing_Size.Width = 100
$label2.Size = $System_Drawing_Size
$label2.TabIndex = 1
$label2.Text = "User Name"
$groupBox1.Controls.Add($label2)
$label1.DataBindings.DefaultDataSourceUpdateMode = 0
$System_Drawing_Point = New-Object System.Drawing.Point
$System_Drawing_Point.X = 7
$System_Drawing_Point.Y = 20
$label1.Location = $System_Drawing_Point
$label1.Name = "label1"
$System_Drawing_Size = New-Object System.Drawing.Size
$System_Drawing_Size.Height = 23
$System_Drawing_Size.Width = 100
$label1.Size = $System_Drawing_Size
$label1.TabIndex = 0
$label1.Text = "VI Server"
$groupBox1.Controls.Add($label1)
#endregion Generated Form Code
#Save the initial state of the form
$InitialFormWindowState = $form1.WindowState
#Init the OnLoad event to correct the initial state of the form
$form1.add_Load($OnLoadForm_StateCorrection)
#Show the Form
$form1.ShowDialog()| Out-Null
} #End Function
#Call the Function
GenerateForm
|
combined_dataset/train/non-malicious/1036.ps1
|
1036.ps1
|
[CmdletBinding()]
param(
)
$silkJsonPath = Join-Path -Path $PSScriptRoot -ChildPath 'silk.json' -Resolve
$silkJson = Get-Content -Path $silkJsonPath -Raw | ConvertFrom-Json
if( -not (Get-Member -InputObject $silkJson -Name 'Navigation') )
{
Add-Member -InputObject $silkJson -MemberType NoteProperty -Name 'Navigation' -Value @{ }
}
$silkJson.Navigation = [ordered]@{ }
$moduleRoot = Join-Path -Path $PSScriptRoot -ChildPath 'Carbon'
$categories = Get-ChildItem -Path $moduleRoot -Directory -Exclude 'bin' |
Sort-Object -Property 'BaseName'
$dirNameTitleNameMap = @{
'ActiveDirectory' = 'Active Directory';
'DotNet' = '.NET';
'FileSystem' = 'File System';
'HostsFile' = 'Hosts File';
'InternetExplorer' = 'Internet Explorer';
'PerformanceCounters' = 'Performance Counters';
'UsersAndGroups' = 'Users and Groups';
'WindowsFeatures' = 'Windows Features';
}
foreach( $category in $categories )
{
$categoryName = $category.Name
if( $dirNameTitleNameMap.ContainsKey($categoryName) )
{
$categoryName = $dirNameTitleNameMap.$categoryName
}
[object[]]$categoryTopics = Get-ChildItem -Path $category.FullName -Filter '*.ps1' |
Sort-Object -Property BaseName |
Select-Object -ExpandProperty BaseName
$silkJson.Navigation.$categoryName = $categoryTopics
}
$silkJson | ConvertTo-Json | Set-Content -Path $silkJsonPath
|
combined_dataset/train/non-malicious/3936.ps1
|
3936.ps1
|
function Test-LoadBalancerCRUD-Public
{
$rgname = Get-ResourceGroupName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$domainNameLabel = Get-ResourceName
$lbName = Get-ResourceName
$frontendName = Get-ResourceName
$backendAddressPoolName = Get-ResourceName
$probeName = Get-ResourceName
$inboundNatRuleName = Get-ResourceName
$lbruleName = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/loadBalancers"
$location = Get-ProviderLocation $resourceTypeParent
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"}
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel
$frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -PublicIpAddress $publicip
$backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName
$probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2
$inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP
$lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP
$job = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule -AsJob
$job | Wait-Job
$actualLb = $job | Receive-Job
$expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName
Assert-AreEqual $expectedLb.Name $actualLb.Name
Assert-AreEqual $expectedLb.Location $actualLb.Location
Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState
Assert-NotNull $expectedLb.ResourceGuid
Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count
Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name
Assert-AreEqual $publicip.Id $expectedLb.FrontendIPConfigurations[0].PublicIpAddress.Id
Assert-Null $expectedLb.FrontendIPConfigurations[0].PrivateIpAddress
Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name
Assert-AreEqual $probeName $expectedLb.Probes[0].Name
Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath
Assert-AreEqual $inboundNatRuleName $expectedLb.InboundNatRules[0].Name
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.InboundNatRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $lbruleName $expectedLb.LoadBalancingRules[0].Name
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.LoadBalancingRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $expectedLb.BackendAddressPools[0].Id $expectedLb.LoadBalancingRules[0].BackendAddressPool.Id
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 1 @($list).Count
Assert-AreEqual $expectedLb.Etag $list[0].Etag
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Etag $list[0].FrontendIPConfigurations[0].Etag
Assert-AreEqual $expectedLb.BackendAddressPools[0].Etag $list[0].BackendAddressPools[0].Etag
Assert-AreEqual $expectedLb.InboundNatRules[0].Etag $list[0].InboundNatRules[0].Etag
Assert-AreEqual $expectedLb.Probes[0].Etag $list[0].Probes[0].Etag
Assert-AreEqual $expectedLb.LoadBalancingRules[0].Etag $list[0].LoadBalancingRules[0].Etag
$list = Get-AzLoadBalancer -ResourceGroupName "*"
Assert-True { @($list).Count -ge 0 }
$list = Get-AzLoadBalancer -Name "*"
Assert-True { @($list).Count -ge 0 }
$list = Get-AzLoadBalancer -ResourceGroupName "*" -Name "*"
Assert-True { @($list).Count -ge 0 }
$job = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force -AsJob
$job | Wait-Job
$deleteLb = $job | Receive-Job
Assert-AreEqual true $deleteLb
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-LoadBalancerCRUD-PublicTcpReset
{
$rgname = Get-ResourceGroupName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$domainNameLabel = Get-ResourceName
$lbName = Get-ResourceName
$frontendName = Get-ResourceName
$backendAddressPoolName = Get-ResourceName
$probeName = Get-ResourceName
$inboundNatRuleName = Get-ResourceName
$lbruleName = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/loadBalancers"
$location = Get-ProviderLocation $resourceTypeParent
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"}
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Static -DomainNameLabel $domainNameLabel -Sku Standard
$frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -PublicIpAddress $publicip
$backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName
$probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol https -Port 80 -IntervalInSeconds 15 -ProbeCount 2
$inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP -EnableTcpReset
$lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -EnableTcpReset -LoadDistribution SourceIP -DisableOutboundSNAT
$actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule -Sku Standard
$expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName
Assert-AreEqual $expectedLb.Name $actualLb.Name
Assert-AreEqual $expectedLb.Location $actualLb.Location
Assert-AreEqualObjectProperties $expectedLb.Sku $actualLb.Sku
Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState
Assert-NotNull $expectedLb.ResourceGuid
Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count
Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name
Assert-AreEqual $publicip.Id $expectedLb.FrontendIPConfigurations[0].PublicIpAddress.Id
Assert-Null $expectedLb.FrontendIPConfigurations[0].PrivateIpAddress
Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name
Assert-AreEqual $probeName $expectedLb.Probes[0].Name
Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath
Assert-AreEqual "https" $expectedLb.Probes[0].Protocol
Assert-AreEqual $inboundNatRuleName $expectedLb.InboundNatRules[0].Name
Assert-AreEqual true $expectedLb.InboundNatRules[0].EnableTcpReset
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.InboundNatRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $lbruleName $expectedLb.LoadBalancingRules[0].Name
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.LoadBalancingRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $expectedLb.BackendAddressPools[0].Id $expectedLb.LoadBalancingRules[0].BackendAddressPool.Id
Assert-AreEqual true $expectedLb.LoadBalancingRules[0].EnableTcpReset
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 1 @($list).Count
Assert-AreEqual $expectedLb.Etag $list[0].Etag
Assert-AreEqualObjectProperties $expectedLb.Sku $list[0].Sku
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Etag $list[0].FrontendIPConfigurations[0].Etag
Assert-AreEqual $expectedLb.BackendAddressPools[0].Etag $list[0].BackendAddressPools[0].Etag
Assert-AreEqual $expectedLb.InboundNatRules[0].Etag $list[0].InboundNatRules[0].Etag
Assert-AreEqual $expectedLb.Probes[0].Etag $list[0].Probes[0].Etag
Assert-AreEqual $expectedLb.LoadBalancingRules[0].Etag $list[0].LoadBalancingRules[0].Etag
$deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force
Assert-AreEqual true $deleteLb
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-LoadBalancerCRUD-InternalDynamic
{
$rgname = Get-ResourceGroupName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$domainNameLabel = Get-ResourceName
$lbName = Get-ResourceName
$frontendName = Get-ResourceName
$backendAddressPoolName = Get-ResourceName
$probeName = Get-ResourceName
$inboundNatRuleName = Get-ResourceName
$lbruleName = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/loadBalancers"
$location = Get-ProviderLocation $resourceTypeParent
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"}
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel
$frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -Subnet $vnet.Subnets[0]
$backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName
$probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2
$inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP
$lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP
$actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule
$expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName
Assert-AreEqual $expectedLb.Name $actualLb.Name
Assert-AreEqual $expectedLb.Location $actualLb.Location
Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState
Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count
Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name
Assert-AreEqual $vnet.Subnets[0].Id $expectedLb.FrontendIPConfigurations[0].Subnet.Id
Assert-NotNull $expectedLb.FrontendIPConfigurations[0].PrivateIpAddress
Assert-AreEqual "IPv4" $expectedLb.FrontendIPConfigurations[0].PrivateIpAddressVersion
Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name
Assert-AreEqual $probeName $expectedLb.Probes[0].Name
Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath
Assert-AreEqual $inboundNatRuleName $expectedLb.InboundNatRules[0].Name
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.InboundNatRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $lbruleName $expectedLb.LoadBalancingRules[0].Name
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.LoadBalancingRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $expectedLb.BackendAddressPools[0].Id $expectedLb.LoadBalancingRules[0].BackendAddressPool.Id
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 1 @($list).Count
Assert-AreEqual $expectedLb.Etag $list[0].Etag
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Etag $list[0].FrontendIPConfigurations[0].Etag
Assert-AreEqual $expectedLb.BackendAddressPools[0].Etag $list[0].BackendAddressPools[0].Etag
Assert-AreEqual $expectedLb.InboundNatRules[0].Etag $list[0].InboundNatRules[0].Etag
Assert-AreEqual $expectedLb.Probes[0].Etag $list[0].Probes[0].Etag
Assert-AreEqual $expectedLb.LoadBalancingRules[0].Etag $list[0].LoadBalancingRules[0].Etag
$deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force
Assert-AreEqual true $deleteLb
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-LoadBalancerCRUD-InternalStatic
{
$rgname = Get-ResourceGroupName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$domainNameLabel = Get-ResourceName
$lbName = Get-ResourceName
$frontendName = Get-ResourceName
$backendAddressPoolName = Get-ResourceName
$probeName = Get-ResourceName
$inboundNatRuleName = Get-ResourceName
$lbruleName = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/loadBalancers"
$location = Get-ProviderLocation $resourceTypeParent
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"}
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel
$frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -Subnet $vnet.Subnets[0] -PrivateIpAddress "10.0.1.5" -PrivateIpAddressVersion "IPv4"
$backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName
$probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2
$inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP
$lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP
$actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule
$expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName
Assert-AreEqual $expectedLb.Name $actualLb.Name
Assert-AreEqual $expectedLb.Location $actualLb.Location
Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState
Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count
Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name
Assert-AreEqual $vnet.Subnets[0].Id $expectedLb.FrontendIPConfigurations[0].Subnet.Id
Assert-AreEqual "10.0.1.5" $expectedLb.FrontendIPConfigurations[0].PrivateIpAddress
Assert-AreEqual "IPv4" $expectedLb.FrontendIPConfigurations[0].PrivateIpAddressVersion
Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name
Assert-AreEqual $probeName $expectedLb.Probes[0].Name
Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath
Assert-AreEqual $inboundNatRuleName $expectedLb.InboundNatRules[0].Name
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.InboundNatRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $lbruleName $expectedLb.LoadBalancingRules[0].Name
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.LoadBalancingRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $expectedLb.BackendAddressPools[0].Id $expectedLb.LoadBalancingRules[0].BackendAddressPool.Id
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 1 @($list).Count
Assert-AreEqual $expectedLb.Etag $list[0].Etag
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Etag $list[0].FrontendIPConfigurations[0].Etag
Assert-AreEqual $expectedLb.BackendAddressPools[0].Etag $list[0].BackendAddressPools[0].Etag
Assert-AreEqual $expectedLb.InboundNatRules[0].Etag $list[0].InboundNatRules[0].Etag
Assert-AreEqual $expectedLb.Probes[0].Etag $list[0].Probes[0].Etag
Assert-AreEqual $expectedLb.LoadBalancingRules[0].Etag $list[0].LoadBalancingRules[0].Etag
$deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force
Assert-AreEqual true $deleteLb
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-LoadBalancerCRUD-InternalHighlyAvailableBasicSku
{
$rgname = Get-ResourceGroupName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$domainNameLabel = Get-ResourceName
$lbName = Get-ResourceName
$frontendName = Get-ResourceName
$backendAddressPoolName = Get-ResourceName
$probeName = Get-ResourceName
$inboundNatRuleName = Get-ResourceName
$lbruleName = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/loadBalancers"
$location = Get-ProviderLocation $resourceTypeParent
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"}
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel
$frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -Subnet $vnet.Subnets[0]
$backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName
$probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2
$lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol All -FrontendPort 0 -BackendPort 0 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP
$actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -LoadBalancingRule $lbrule -Sku Basic
$expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName
Assert-AreEqual $expectedLb.Name $actualLb.Name
Assert-AreEqual $expectedLb.Location $actualLb.Location
Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState
Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count
Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name
Assert-AreEqual $vnet.Subnets[0].Id $expectedLb.FrontendIPConfigurations[0].Subnet.Id
Assert-NotNull $expectedLb.FrontendIPConfigurations[0].PrivateIpAddress
Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name
Assert-AreEqual $probeName $expectedLb.Probes[0].Name
Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath
Assert-AreEqual $lbruleName $expectedLb.LoadBalancingRules[0].Name
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.LoadBalancingRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $expectedLb.BackendAddressPools[0].Id $expectedLb.LoadBalancingRules[0].BackendAddressPool.Id
Assert-AreEqual 0 $expectedLb.LoadBalancingRules[0].FrontendPort
Assert-AreEqual 0 $expectedLb.LoadBalancingRules[0].BackendPort
Assert-AreEqual All $expectedLb.LoadBalancingRules[0].Protocol
$deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force
Assert-AreEqual true $deleteLb
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-LoadBalancerCRUD-InternalHighlyAvailableStandardSku
{
$rgname = Get-ResourceGroupName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$domainNameLabel = Get-ResourceName
$lbName = Get-ResourceName
$frontendName = Get-ResourceName
$backendAddressPoolName = Get-ResourceName
$probeName = Get-ResourceName
$inboundNatRuleName = Get-ResourceName
$lbruleName = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/loadBalancers"
$location = Get-ProviderLocation $resourceTypeParent
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"}
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel
$frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -Subnet $vnet.Subnets[0]
$backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName
$probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2
$lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol All -FrontendPort 0 -BackendPort 0 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP
$actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -LoadBalancingRule $lbrule -Sku Standard
$expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName
Assert-AreEqual $expectedLb.Name $actualLb.Name
Assert-AreEqual $expectedLb.Location $actualLb.Location
Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState
Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count
Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name
Assert-AreEqual $vnet.Subnets[0].Id $expectedLb.FrontendIPConfigurations[0].Subnet.Id
Assert-NotNull $expectedLb.FrontendIPConfigurations[0].PrivateIpAddress
Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name
Assert-AreEqual $probeName $expectedLb.Probes[0].Name
Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath
Assert-AreEqual $lbruleName $expectedLb.LoadBalancingRules[0].Name
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.LoadBalancingRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $expectedLb.BackendAddressPools[0].Id $expectedLb.LoadBalancingRules[0].BackendAddressPool.Id
Assert-AreEqual 0 $expectedLb.LoadBalancingRules[0].FrontendPort
Assert-AreEqual 0 $expectedLb.LoadBalancingRules[0].BackendPort
Assert-AreEqual All $expectedLb.LoadBalancingRules[0].Protocol
$deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force
Assert-AreEqual true $deleteLb
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-LoadBalancerCRUD-PublicNoInboundNATRule
{
$rgname = Get-ResourceGroupName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$domainNameLabel = Get-ResourceName
$lbName = Get-ResourceName
$frontendName = Get-ResourceName
$backendAddressPoolName = Get-ResourceName
$probeName = Get-ResourceName
$inboundNatRuleName = Get-ResourceName
$lbruleName = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/loadBalancers"
$location = Get-ProviderLocation $resourceTypeParent
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"}
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel
$frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -PublicIpAddress $publicip
$backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName
$probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2
$lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP
$actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -LoadBalancingRule $lbrule
$expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName
Assert-AreEqual $expectedLb.Name $actualLb.Name
Assert-AreEqual $expectedLb.Location $actualLb.Location
Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState
Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count
Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name
Assert-AreEqual $publicip.Id $expectedLb.FrontendIPConfigurations[0].PublicIpAddress.Id
Assert-Null $expectedLb.FrontendIPConfigurations[0].PrivateIpAddress
Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name
Assert-AreEqual $probeName $expectedLb.Probes[0].Name
Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath
Assert-AreEqual $lbruleName $expectedLb.LoadBalancingRules[0].Name
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.LoadBalancingRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $expectedLb.BackendAddressPools[0].Id $expectedLb.LoadBalancingRules[0].BackendAddressPool.Id
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 1 @($list).Count
Assert-AreEqual $expectedLb.Etag $list[0].Etag
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Etag $list[0].FrontendIPConfigurations[0].Etag
Assert-AreEqual $expectedLb.BackendAddressPools[0].Etag $list[0].BackendAddressPools[0].Etag
Assert-AreEqual $expectedLb.Probes[0].Etag $list[0].Probes[0].Etag
Assert-AreEqual $expectedLb.LoadBalancingRules[0].Etag $list[0].LoadBalancingRules[0].Etag
$deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force
Assert-AreEqual true $deleteLb
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-LoadBalancerCRUD-InternalUsingId
{
$rgname = Get-ResourceGroupName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$domainNameLabel = Get-ResourceName
$lbName = Get-ResourceName
$frontendName = Get-ResourceName
$backendAddressPoolName = Get-ResourceName
$probeName = Get-ResourceName
$inboundNatRuleName = Get-ResourceName
$lbruleName = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/loadBalancers"
$location = Get-ProviderLocation $resourceTypeParent
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"}
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel
$frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -SubnetId $vnet.Subnets[0].Id
$backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName
$probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2
$inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfigurationId $frontend.Id -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP
$lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfigurationId $frontend.Id -BackendAddressPoolId $backendAddressPool.Id -ProbeId $probe.Id -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP
$actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule
$expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName
Assert-AreEqual $expectedLb.Name $actualLb.Name
Assert-AreEqual $expectedLb.Location $actualLb.Location
Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState
Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count
Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name
Assert-AreEqual $vnet.Subnets[0].Id $expectedLb.FrontendIPConfigurations[0].Subnet.Id
Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name
Assert-AreEqual $probeName $expectedLb.Probes[0].Name
Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath
Assert-AreEqual $inboundNatRuleName $expectedLb.InboundNatRules[0].Name
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.InboundNatRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $lbruleName $expectedLb.LoadBalancingRules[0].Name
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.LoadBalancingRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $expectedLb.BackendAddressPools[0].Id $expectedLb.LoadBalancingRules[0].BackendAddressPool.Id
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 1 @($list).Count
Assert-AreEqual $expectedLb.Etag $list[0].Etag
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Etag $list[0].FrontendIPConfigurations[0].Etag
Assert-AreEqual $expectedLb.BackendAddressPools[0].Etag $list[0].BackendAddressPools[0].Etag
Assert-AreEqual $expectedLb.InboundNatRules[0].Etag $list[0].InboundNatRules[0].Etag
Assert-AreEqual $expectedLb.Probes[0].Etag $list[0].Probes[0].Etag
Assert-AreEqual $expectedLb.LoadBalancingRules[0].Etag $list[0].LoadBalancingRules[0].Etag
$deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force
Assert-AreEqual true $deleteLb
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-LoadBalancerCRUD-PublicUsingId
{
$rgname = Get-ResourceGroupName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$domainNameLabel = Get-ResourceName
$lbName = Get-ResourceName
$frontendName = Get-ResourceName
$backendAddressPoolName = Get-ResourceName
$probeName = Get-ResourceName
$inboundNatRuleName = Get-ResourceName
$lbruleName = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/loadBalancers"
$location = Get-ProviderLocation $resourceTypeParent
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"}
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel
$frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -PublicIpAddressId $publicip.Id
$backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName
$probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2
$inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfigurationId $frontend.Id -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP
$lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfigurationId $frontend.Id -BackendAddressPoolId $backendAddressPool.Id -ProbeId $probe.Id -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP
$actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule
$expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName
Assert-AreEqual $expectedLb.Name $actualLb.Name
Assert-AreEqual $expectedLb.Location $actualLb.Location
Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState
Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count
Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name
Assert-AreEqual $publicip.Id $expectedLb.FrontendIPConfigurations[0].PublicIpAddress.Id
Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name
Assert-AreEqual $probeName $expectedLb.Probes[0].Name
Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath
Assert-AreEqual $inboundNatRuleName $expectedLb.InboundNatRules[0].Name
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.InboundNatRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $lbruleName $expectedLb.LoadBalancingRules[0].Name
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.LoadBalancingRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $expectedLb.BackendAddressPools[0].Id $expectedLb.LoadBalancingRules[0].BackendAddressPool.Id
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 1 @($list).Count
Assert-AreEqual $expectedLb.Etag $list[0].Etag
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Etag $list[0].FrontendIPConfigurations[0].Etag
Assert-AreEqual $expectedLb.BackendAddressPools[0].Etag $list[0].BackendAddressPools[0].Etag
Assert-AreEqual $expectedLb.InboundNatRules[0].Etag $list[0].InboundNatRules[0].Etag
Assert-AreEqual $expectedLb.Probes[0].Etag $list[0].Probes[0].Etag
Assert-AreEqual $expectedLb.LoadBalancingRules[0].Etag $list[0].LoadBalancingRules[0].Etag
$deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force
Assert-AreEqual true $deleteLb
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-LoadBalancerCRUD-PublicNoLbRule
{
$rgname = Get-ResourceGroupName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$domainNameLabel = Get-ResourceName
$lbName = Get-ResourceName
$frontendName = Get-ResourceName
$backendAddressPoolName = Get-ResourceName
$probeName = Get-ResourceName
$inboundNatRuleName = Get-ResourceName
$lbruleName = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/loadBalancers"
$location = Get-ProviderLocation $resourceTypeParent
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"}
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel
$frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -PublicIpAddress $publicip
$backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName
$probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2
$inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP
$actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule
$expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName
Assert-AreEqual $expectedLb.Name $actualLb.Name
Assert-AreEqual $expectedLb.Location $actualLb.Location
Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState
Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count
Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name
Assert-AreEqual $publicip.Id $expectedLb.FrontendIPConfigurations[0].PublicIpAddress.Id
Assert-Null $expectedLb.FrontendIPConfigurations[0].PrivateIpAddress
Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name
Assert-AreEqual $probeName $expectedLb.Probes[0].Name
Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath
Assert-AreEqual $inboundNatRuleName $expectedLb.InboundNatRules[0].Name
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.InboundNatRules[0].FrontendIPConfiguration.Id
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 1 @($list).Count
Assert-AreEqual $expectedLb.Etag $list[0].Etag
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Etag $list[0].FrontendIPConfigurations[0].Etag
Assert-AreEqual $expectedLb.BackendAddressPools[0].Etag $list[0].BackendAddressPools[0].Etag
Assert-AreEqual $expectedLb.InboundNatRules[0].Etag $list[0].InboundNatRules[0].Etag
Assert-AreEqual $expectedLb.Probes[0].Etag $list[0].Probes[0].Etag
$deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force
Assert-AreEqual true $deleteLb
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-LoadBalancerChildResource
{
$rgname = Get-ResourceGroupName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$domainNameLabel = Get-ResourceName
$lbName = Get-ResourceName
$frontendName = Get-ResourceName
$backendAddressPoolName = Get-ResourceName
$probeName = Get-ResourceName
$inboundNatRuleName = Get-ResourceName
$lbruleName = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/loadBalancers"
$location = Get-ProviderLocation $resourceTypeParent
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"}
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel
$frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -SubnetId $vnet.Subnets[0].Id
$backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName
$probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2
$inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfigurationId $frontend.Id -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP
$lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfigurationId $frontend.Id -BackendAddressPoolId $backendAddressPool.Id -ProbeId $probe.Id -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP
New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
$frontendName2 = Get-ResourceName
$lb = $lb | Add-AzLoadBalancerFrontendIpConfig -Name $frontendName2 -Subnet $vnet.Subnets[0]
Assert-AreEqual 2 @($lb.FrontendIPConfigurations).Count
Assert-AreEqual $frontendName2 $lb.FrontendIPConfigurations[1].Name
Assert-AreEqual "Dynamic" $lb.FrontendIPConfigurations[1].PrivateIPAllocationMethod
Assert-AreEqual $vnet.Subnets[0].Id $lb.FrontendIPConfigurations[1].Subnet.Id
$lb = $lb | Set-AzLoadBalancerFrontendIpConfig -Name $frontendName2 -Subnet $vnet.Subnets[0] -PrivateIpAddress "10.0.1.5"
Assert-AreEqual 2 @($lb.FrontendIPConfigurations).Count
Assert-AreEqual $frontendName2 $lb.FrontendIPConfigurations[1].Name
Assert-AreEqual "Static" $lb.FrontendIPConfigurations[1].PrivateIPAllocationMethod
Assert-AreEqual $vnet.Subnets[0].Id $lb.FrontendIPConfigurations[1].Subnet.Id
Assert-AreEqual "10.0.1.5" $lb.FrontendIPConfigurations[1].PrivateIpAddress
$frontendIpconfig = $lb | Get-AzLoadBalancerFrontendIpConfig -Name $frontendName2
$frontendIpconfigList = $lb | Get-AzLoadBalancerFrontendIpConfig
Assert-AreEqual 2 @($frontendIpconfigList).Count
Assert-AreEqual $frontendName $frontendIpconfigList[0].Name
Assert-AreEqual $frontendName2 $frontendIpconfigList[1].Name
Assert-AreEqual $frontendIpconfig.Name $frontendIpconfigList[1].Name
$lb = $lb | Remove-AzLoadBalancerFrontendIpConfig -Name $frontendName2
Assert-AreEqual 1 @($lb.FrontendIPConfigurations).Count
Assert-AreEqual $frontendName $lb.FrontendIPConfigurations[0].Name
$backendAddressPoolName2 = Get-ResourceName
$job = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Add-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName2 | Set-AzLoadBalancer -AsJob
$job | Wait-Job
$lb = $job | Receive-Job
Assert-AreEqual 2 @($lb.BackendAddressPools).Count
Assert-AreEqual $backendAddressPoolName2 $lb.BackendAddressPools[1].Name
$backendAddressPoolConfig = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname| Get-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName2
$backendAddressPoolConfigList = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerBackendAddressPoolConfig
Assert-AreEqual 2 @($backendAddressPoolconfigList).Count
Assert-AreEqual $backendAddressPoolName $backendAddressPoolConfigList[0].Name
Assert-AreEqual $backendAddressPoolName2 $backendAddressPoolConfigList[1].Name
Assert-AreEqual $backendAddressPoolConfig.Name $backendAddressPoolConfigList[1].Name
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Remove-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName2 | Set-AzLoadBalancer
Assert-AreEqual 1 @($lb.BackendAddressPools).Count
Assert-AreEqual $backendAddressPoolName $lb.BackendAddressPools[0].Name
$probeName2 = Get-ResourceName
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Add-AzLoadBalancerProbeConfig -Name $probeName2 -RequestPath healthcheck2.aspx -Protocol http -Port 81 -IntervalInSeconds 16 -ProbeCount 3 | Set-AzLoadBalancer
Assert-AreEqual 2 @($lb.Probes).Count
Assert-AreEqual $probeName2 $lb.Probes[1].Name
Assert-AreEqual "healthcheck2.aspx" $lb.Probes[1].RequestPath
Assert-AreEqual 81 $lb.Probes[1].Port
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Set-AzLoadBalancerProbeConfig -Name $probeName2 -RequestPath healthcheck2.aspx -Protocol http -Port 85 -IntervalInSeconds 16 -ProbeCount 3 | Set-AzLoadBalancer
Assert-AreEqual 2 @($lb.Probes).Count
Assert-AreEqual $probeName2 $lb.Probes[1].Name
Assert-AreEqual "healthcheck2.aspx" $lb.Probes[1].RequestPath
Assert-AreEqual 85 $lb.Probes[1].Port
$probeConfig = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerProbeConfig -Name $probeName2
$probeConfigList = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerProbeConfig
Assert-AreEqual 2 @($probeConfigList).Count
Assert-AreEqual $probeName $probeConfigList[0].Name
Assert-AreEqual $probeName2 $probeConfigList[1].Name
Assert-AreEqual $probeConfig.Name $probeConfigList[1].Name
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Remove-AzLoadBalancerProbeConfig -Name $probeName2 | Set-AzLoadBalancer
Assert-AreEqual 1 @($lb.Probes).Count
Assert-AreEqual $probeName $lb.Probes[0].Name
$inboundNatRuleName2 = Get-ResourceName
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Add-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName2 -FrontendIPConfigurationId $lb.FrontendIPConfigurations[0].Id -Protocol Tcp -FrontendPort 3350 -BackendPort 3350 -IdleTimeoutInMinutes 17 -EnableFloatingIP | Set-AzLoadBalancer
Assert-AreEqual 2 @($lb.InboundNatRules).Count
Assert-AreEqual $inboundNatRuleName2 $lb.InboundNatRules[1].Name
Assert-AreEqual 3350 $lb.InboundNatRules[1].FrontendPort
Assert-AreEqual 3350 $lb.InboundNatRules[1].BackendPort
Assert-AreEqual true $lb.InboundNatRules[1].EnableFloatingIP
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Set-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName2 -FrontendIPConfigurationId $lb.FrontendIPConfigurations[0].Id -Protocol Tcp -FrontendPort 3352 -BackendPort 3351 -IdleTimeoutInMinutes 17 | Set-AzLoadBalancer
Assert-AreEqual 2 @($lb.InboundNatRules).Count
Assert-AreEqual $inboundNatRuleName2 $lb.InboundNatRules[1].Name
Assert-AreEqual 3352 $lb.InboundNatRules[1].FrontendPort
Assert-AreEqual 3351 $lb.InboundNatRules[1].BackendPort
Assert-AreEqual false $lb.InboundNatRules[1].EnableFloatingIP
$inboundNatRuleConfig = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName2
$inboundNatRuleConfigList = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerInboundNatRuleConfig
Assert-AreEqual 2 @($inboundNatRuleConfigList).Count
Assert-AreEqual $inboundNatRuleName $inboundNatRuleConfigList[0].Name
Assert-AreEqual $inboundNatRuleName2 $inboundNatRuleConfigList[1].Name
Assert-AreEqual $inboundNatRuleConfig.Name $inboundNatRuleConfigList[1].Name
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Remove-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName2 | Set-AzLoadBalancer
Assert-AreEqual 1 @($lb.InboundNatRules).Count
Assert-AreEqual $inboundNatRuleName $lb.InboundNatRules[0].Name
$lbruleName2 = Get-ResourceName
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Add-AzLoadBalancerRuleConfig -Name $lbruleName2 -FrontendIPConfigurationId $lb.FrontendIPConfigurations[0].Id -BackendAddressPoolId $lb.BackendAddressPools[0].Id -ProbeId $lb.Probes[0].Id -Protocol Tcp -FrontendPort 82 -BackendPort 83 -IdleTimeoutInMinutes 15 -LoadDistribution SourceIP| Set-AzLoadBalancer
Assert-AreEqual 2 @($lb.LoadBalancingRules).Count
Assert-AreEqual $lbruleName2 $lb.LoadBalancingRules[1].Name
Assert-AreEqual 82 $lb.LoadBalancingRules[1].FrontendPort
Assert-AreEqual 83 $lb.LoadBalancingRules[1].BackendPort
Assert-AreEqual false $lb.LoadBalancingRules[1].EnableFloatingIP
Assert-AreEqual "SourceIP" $lb.LoadBalancingRules[1].LoadDistribution
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Set-AzLoadBalancerRuleConfig -Name $lbruleName2 -FrontendIPConfigurationId $lb.FrontendIPConfigurations[0].Id -BackendAddressPoolId $lb.BackendAddressPools[0].Id -ProbeId $lb.Probes[0].Id -Protocol Tcp -FrontendPort 84 -BackendPort 84 -IdleTimeoutInMinutes 17 -EnableFloatingIP | Set-AzLoadBalancer
Assert-AreEqual 2 @($lb.LoadBalancingRules).Count
Assert-AreEqual $lbruleName2 $lb.LoadBalancingRules[1].Name
Assert-AreEqual 84 $lb.LoadBalancingRules[1].FrontendPort
Assert-AreEqual 84 $lb.LoadBalancingRules[1].BackendPort
Assert-AreEqual true $lb.LoadBalancingRules[1].EnableFloatingIP
Assert-AreEqual "Default" $lb.LoadBalancingRules[1].LoadDistribution
$lbruleConfig = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerRuleConfig -Name $lbruleName2
$lbruleConfigList = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerRuleConfig
Assert-AreEqual 2 @($inboundNatRuleConfigList).Count
Assert-AreEqual $lbruleName $lbruleConfigList[0].Name
Assert-AreEqual $lbruleName2 $lbruleConfigList[1].Name
Assert-AreEqual $lbruleConfig.Name $lbruleConfigList[1].Name
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Remove-AzLoadBalancerRuleConfig -Name $lbruleName2 | Set-AzLoadBalancer
Assert-AreEqual 1 @($lb.LoadBalancingRules).Count
Assert-AreEqual $lbruleName $lb.LoadBalancingRules[0].Name
$deleteLb = $lb | Remove-AzLoadBalancer -PassThru -Force
Assert-AreEqual true $deleteLb
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-LoadBalancerSet
{
$rgname = Get-ResourceGroupName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$domainNameLabel = Get-ResourceName
$lbName = Get-ResourceName
$frontendName = Get-ResourceName
$backendAddressPoolName = Get-ResourceName
$probeName = Get-ResourceName
$inboundNatRuleName = Get-ResourceName
$lbruleName = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/loadBalancers"
$location = Get-ProviderLocation $resourceTypeParent
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"}
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel
$frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -SubnetId $vnet.Subnets[0].Id
$backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName
$probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2
$inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfigurationId $frontend.Id -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP
$lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfigurationId $frontend.Id -BackendAddressPoolId $backendAddressPool.Id -ProbeId $probe.Id -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP
New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
$probeName2 = Get-ResourceName
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Add-AzLoadBalancerProbeConfig -Name $probeName2 -RequestPath healthcheck2.aspx -Protocol http -Port 81 -IntervalInSeconds 16 -ProbeCount 3 | Set-AzLoadBalancer
Assert-AreEqual 2 @($lb.Probes).Count
Assert-AreEqual $probeName2 $lb.Probes[1].Name
Assert-AreEqual "healthcheck2.aspx" $lb.Probes[1].RequestPath
Assert-AreEqual 81 $lb.Probes[1].Port
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Set-AzLoadBalancer
Assert-AreEqual 2 @($lb.Probes).Count
Assert-AreEqual $probeName2 $lb.Probes[1].Name
Assert-AreEqual "healthcheck2.aspx" $lb.Probes[1].RequestPath
Assert-AreEqual 81 $lb.Probes[1].Port
$deleteLb = $lb | Remove-AzLoadBalancer -PassThru -Force
Assert-AreEqual true $deleteLb
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-CreateEmptyLoadBalancer
{
$rgname = Get-ResourceGroupName
$lbName = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/loadBalancers"
$location = Get-ProviderLocation $resourceTypeParent
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"}
New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
Assert-AreEqual $lbName $lb.Name
Assert-AreEqual 0 @($lb.FrontendIpConfigurations).Count
Assert-AreEqual 0 @($lb.BackendAddressPools).Count
Assert-AreEqual 0 @($lb.Probes).Count
Assert-AreEqual 0 @($lb.InboundNatRules).Count
Assert-AreEqual 0 @($lb.LoadBalancingRules).Count
$deleteLb = $lb | Remove-AzLoadBalancer -PassThru -Force
Assert-AreEqual true $deleteLb
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-LoadBalancer-NicAssociation
{
$rgname = Get-ResourceGroupName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$lbName = Get-ResourceName
$frontendName = Get-ResourceName
$backendAddressPoolName = Get-ResourceName
$probeName = Get-ResourceName
$inboundNatRuleName1 = Get-ResourceName
$inboundNatRuleName2 = Get-ResourceName
$lbruleName = Get-ResourceName
$nicname1 = Get-ResourceName
$nicname2 = Get-ResourceName
$nicname3 = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/loadBalancers"
$location = Get-ProviderLocation $resourceTypeParent
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" }
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic
$frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -PublicIpAddress $publicip
$backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName
$probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2
$inboundNatRule1 = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName1 -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP
$inboundNatRule2 = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName2 -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3391 -BackendPort 3392
$lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP
$lb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule1,$inboundNatRule2 -LoadBalancingRule $lbrule
Assert-AreEqual $rgname $lb.ResourceGroupName
Assert-AreEqual $lbName $lb.Name
Assert-NotNull $lb.Location
Assert-AreEqual "Succeeded" $lb.ProvisioningState
Assert-AreEqual 1 @($lb.FrontendIPConfigurations).Count
Assert-Null $lb.InboundNatRules[0].BackendIPConfiguration
Assert-Null $lb.InboundNatRules[1].BackendIPConfiguration
Assert-AreEqual 0 @($lb.BackendAddressPools[0].BackendIpConfigurations).Count
$nic1 = New-AzNetworkInterface -Name $nicname1 -ResourceGroupName $rgname -Location $location -Subnet $vnet.Subnets[0]
$nic2 = New-AzNetworkInterface -Name $nicname2 -ResourceGroupName $rgname -Location $location -Subnet $vnet.Subnets[0]
$nic3 = New-AzNetworkInterface -Name $nicname3 -ResourceGroupName $rgname -Location $location -Subnet $vnet.Subnets[0]
$nic1.IpConfigurations[0].LoadBalancerBackendAddressPools.Add($lb.BackendAddressPools[0]);
$nic1.IpConfigurations[0].LoadBalancerInboundNatRules.Add($lb.InboundNatRules[0]);
$nic2.IpConfigurations[0].LoadBalancerBackendAddressPools.Add($lb.BackendAddressPools[0]);
$nic3.IpConfigurations[0].LoadBalancerInboundNatRules.Add($lb.InboundNatRules[1]);
$nic1 = $nic1 | Set-AzNetworkInterface
$nic2 = $nic2 | Set-AzNetworkInterface
$nic3 = $nic3 | Set-AzNetworkInterface
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
Assert-AreEqual $nic1.IpConfigurations[0].Id $lb.InboundNatRules[0].BackendIPConfiguration.Id
Assert-AreEqual $nic3.IpConfigurations[0].Id $lb.InboundNatRules[1].BackendIPConfiguration.Id
Assert-AreEqual 2 @($lb.BackendAddressPools[0].BackendIpConfigurations).Count
$deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force
Assert-AreEqual true $deleteLb
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-LoadBalancer-NicAssociationDuringCreate
{
$rgname = Get-ResourceGroupName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$lbName = Get-ResourceName
$frontendName = Get-ResourceName
$backendAddressPoolName = Get-ResourceName
$probeName = Get-ResourceName
$inboundNatRuleName1 = Get-ResourceName
$inboundNatRuleName2 = Get-ResourceName
$lbruleName = Get-ResourceName
$nicname1 = Get-ResourceName
$nicname2 = Get-ResourceName
$nicname3 = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/loadBalancers"
$location = Get-ProviderLocation $resourceTypeParent
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" }
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic
$frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -PublicIpAddress $publicip
$backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName
$probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2
$inboundNatRule1 = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName1 -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP
$inboundNatRule2 = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName2 -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3391 -BackendPort 3392
$lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP
$lb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule1,$inboundNatRule2 -LoadBalancingRule $lbrule
Assert-AreEqual $rgname $lb.ResourceGroupName
Assert-AreEqual $lbName $lb.Name
Assert-NotNull $lb.Location
Assert-AreEqual "Succeeded" $lb.ProvisioningState
Assert-AreEqual 1 @($lb.FrontendIPConfigurations).Count
Assert-Null $lb.InboundNatRules[0].BackendIPConfiguration
Assert-Null $lb.InboundNatRules[1].BackendIPConfiguration
Assert-AreEqual 0 @($lb.BackendAddressPools[0].BackendIpConfigurations).Count
$nic1 = New-AzNetworkInterface -Name $nicname1 -ResourceGroupName $rgname -Location $location -Subnet $vnet.Subnets[0] -LoadBalancerBackendAddressPool $lb.BackendAddressPools[0] -LoadBalancerInboundNatRule $lb.InboundNatRules[0]
$nic2 = New-AzNetworkInterface -Name $nicname2 -ResourceGroupName $rgname -Location $location -SubnetId $vnet.Subnets[0].Id -LoadBalancerBackendAddressPoolId $lb.BackendAddressPools[0].Id
$nic3 = New-AzNetworkInterface -Name $nicname3 -ResourceGroupName $rgname -Location $location -SubnetId $vnet.Subnets[0].Id -LoadBalancerInboundNatRuleId $lb.InboundNatRules[1].Id
$nic1 = $nic1 | Set-AzNetworkInterface
$nic2 = $nic2 | Set-AzNetworkInterface
$nic3 = $nic3 | Set-AzNetworkInterface
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
Assert-AreEqual $nic1.IpConfigurations[0].Id $lb.InboundNatRules[0].BackendIPConfiguration.Id
Assert-AreEqual $nic3.IpConfigurations[0].Id $lb.InboundNatRules[1].BackendIPConfiguration.Id
Assert-AreEqual 2 @($lb.BackendAddressPools[0].BackendIpConfigurations).Count
$deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force
Assert-AreEqual true $deleteLb
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-LoadBalancerInboundNatPoolConfigCRUD-InternalLB
{
$rgname = Get-ResourceGroupName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$domainNameLabel = Get-ResourceName
$lbName = Get-ResourceName
$frontendName = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement "West US"
$location = Get-ProviderLocation "Microsoft.Network/loadBalancers" "West US"
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" }
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel
$frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -SubnetId $vnet.Subnets[0].Id
New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
$inboundNatPoolName = Get-ResourceName
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
$lb = $lb | Add-AzLoadBalancerInboundNatPoolConfig -Name $inboundNatPoolName -FrontendIPConfigurationId $lb.FrontendIPConfigurations[0].Id -Protocol Tcp -FrontendPortRangeStart 3360 -FrontendPortRangeEnd 3362 -BackendPort 3370 | Set-AzLoadBalancer
Assert-AreEqual 1 @($lb.InboundNatPools).Count
Assert-AreEqual $inboundNatPoolName $lb.InboundNatPools[0].Name
Assert-AreEqual 3360 $lb.InboundNatPools[0].FrontendPortRangeStart
Assert-AreEqual 3362 $lb.InboundNatPools[0].FrontendPortRangeEnd
Assert-AreEqual 3370 $lb.InboundNatPools[0].BackendPort
Assert-AreEqual Tcp $lb.InboundNatPools[0].Protocol
$inboundNatPoolName2 = Get-ResourceName
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Add-AzLoadBalancerInboundNatPoolConfig -Name $inboundNatPoolName2 -FrontendIPConfigurationId $lb.FrontendIPConfigurations[0].Id -Protocol Udp -FrontendPortRangeStart 3366 -FrontendPortRangeEnd 3368 -BackendPort 3376 | Set-AzLoadBalancer
Assert-AreEqual 2 @($lb.InboundNatPools).Count
Assert-AreEqual $inboundNatPoolName2 $lb.InboundNatPools[1].Name
Assert-AreEqual 3366 $lb.InboundNatPools[1].FrontendPortRangeStart
Assert-AreEqual 3368 $lb.InboundNatPools[1].FrontendPortRangeEnd
Assert-AreEqual 3376 $lb.InboundNatPools[1].BackendPort
Assert-AreEqual Udp $lb.InboundNatPools[1].Protocol
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Set-AzLoadBalancerInboundNatPoolConfig -Name $inboundNatPoolName2 -FrontendIPConfigurationId $lb.FrontendIPConfigurations[0].Id -Protocol Tcp -FrontendPortRangeStart 3363 -FrontendPortRangeEnd 3364 -BackendPort 3373 | Set-AzLoadBalancer
Assert-AreEqual 2 @($lb.InboundNatPools).Count
Assert-AreEqual $inboundNatPoolName2 $lb.InboundNatPools[1].Name
Assert-AreEqual 3363 $lb.InboundNatPools[1].FrontendPortRangeStart
Assert-AreEqual 3364 $lb.InboundNatPools[1].FrontendPortRangeEnd
Assert-AreEqual 3373 $lb.InboundNatPools[1].BackendPort
Assert-AreEqual Tcp $lb.InboundNatPools[1].Protocol
$inboundNatPoolConfig = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerInboundNatPoolConfig -Name $inboundNatPoolName2
$inboundNatPoolConfigList = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerInboundNatPoolConfig
Assert-AreEqual 2 @($inboundNatPoolConfigList).Count
Assert-AreEqual $inboundNatPoolName $inboundNatPoolConfigList[0].Name
Assert-AreEqual $inboundNatPoolName2 $inboundNatPoolConfigList[1].Name
Assert-AreEqual $inboundNatPoolConfig.Name $inboundNatPoolConfigList[1].Name
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Remove-AzLoadBalancerInboundNatPoolConfig -Name $inboundNatPoolName2 | Set-AzLoadBalancer
Assert-AreEqual 1 @($lb.InboundNatPools).Count
Assert-AreEqual $inboundNatPoolName $lb.InboundNatPools[0].Name
$deleteLb = $lb | Remove-AzLoadBalancer -PassThru -Force
Assert-AreEqual true $deleteLb
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-LoadBalancerInboundNatPoolConfigCRUD-PublicLB
{
$rgname = Get-ResourceGroupName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$domainNameLabel = Get-ResourceName
$lbName = Get-ResourceName
$frontendName = Get-ResourceName
$inboundNatPoolName = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement "West US"
$location = Get-ProviderLocation "Microsoft.Network/loadBalancers" "West US"
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" }
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel
$frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -PublicIpAddress $publicip
$inboundNatPool = New-AzLoadBalancerInboundNatPoolConfig -Name $inboundNatPoolName -FrontendIPConfigurationId $frontend.Id -Protocol Tcp -FrontendPortRangeStart 3360 -FrontendPortRangeEnd 3362 -BackendPort 3370
$actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -InboundNatPool $inboundNatPool
$expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName
Assert-AreEqual $expectedLb.Name $actualLb.Name
Assert-AreEqual $expectedLb.Location $actualLb.Location
Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState
Assert-NotNull $expectedLb.ResourceGuid
Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count
Assert-AreEqual 1 @($expectedLb.InboundNatPools).Count
Assert-AreEqual $inboundNatPoolName $expectedLb.InboundNatPools[0].Name
Assert-AreEqual 3360 $expectedLb.InboundNatPools[0].FrontendPortRangeStart
Assert-AreEqual 3362 $expectedLb.InboundNatPools[0].FrontendPortRangeEnd
Assert-AreEqual 3370 $expectedLb.InboundNatPools[0].BackendPort
Assert-AreEqual Tcp $expectedLb.InboundNatPools[0].Protocol
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.InboundNatPools[0].FrontendIPConfiguration.Id
$inboundNatPoolName2 = Get-ResourceName
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
$lb = Add-AzLoadBalancerInboundNatPoolConfig -LoadBalancer $lb -Name $inboundNatPoolName2 -FrontendIPConfiguration $lb.FrontendIPConfigurations[0] -Protocol Udp -FrontendPortRangeStart 3366 -FrontendPortRangeEnd 3368 -BackendPort 3376 | Set-AzLoadBalancer
Assert-AreEqual 2 @($lb.InboundNatPools).Count
Assert-AreEqual $inboundNatPoolName2 $lb.InboundNatPools[1].Name
Assert-AreEqual 3366 $lb.InboundNatPools[1].FrontendPortRangeStart
Assert-AreEqual 3368 $lb.InboundNatPools[1].FrontendPortRangeEnd
Assert-AreEqual 3376 $lb.InboundNatPools[1].BackendPort
Assert-AreEqual Udp $lb.InboundNatPools[1].Protocol
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Set-AzLoadBalancerInboundNatPoolConfig -Name $inboundNatPoolName2 -FrontendIPConfigurationId $lb.FrontendIPConfigurations[0].Id -Protocol Tcp -FrontendPortRangeStart 3363 -FrontendPortRangeEnd 3364 -BackendPort 3373 | Set-AzLoadBalancer
Assert-AreEqual 2 @($lb.InboundNatPools).Count
Assert-AreEqual $inboundNatPoolName2 $lb.InboundNatPools[1].Name
Assert-AreEqual 3363 $lb.InboundNatPools[1].FrontendPortRangeStart
Assert-AreEqual 3364 $lb.InboundNatPools[1].FrontendPortRangeEnd
Assert-AreEqual 3373 $lb.InboundNatPools[1].BackendPort
Assert-AreEqual Tcp $lb.InboundNatPools[1].Protocol
$inboundNatPoolConfig = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerInboundNatPoolConfig -Name $inboundNatPoolName2
$inboundNatPoolConfigList = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerInboundNatPoolConfig
Assert-AreEqual 2 @($inboundNatPoolConfigList).Count
Assert-AreEqual $inboundNatPoolName $inboundNatPoolConfigList[0].Name
Assert-AreEqual $inboundNatPoolName2 $inboundNatPoolConfigList[1].Name
Assert-AreEqual $inboundNatPoolConfig.Name $inboundNatPoolConfigList[1].Name
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Remove-AzLoadBalancerInboundNatPoolConfig -Name $inboundNatPoolName2 | Set-AzLoadBalancer
Assert-AreEqual 1 @($lb.InboundNatPools).Count
Assert-AreEqual $inboundNatPoolName $lb.InboundNatPools[0].Name
$deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force
Assert-AreEqual true $deleteLb
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-LoadBalancerMultiVip-Public
{
$rgname = Get-ResourceGroupName
$publicIp1Name = Get-ResourceName
$publicIp2Name = Get-ResourceName
$publicIp3Name = Get-ResourceName
$publicIp4Name = Get-ResourceName
$lbName = Get-ResourceName
$frontend1Name = Get-ResourceName
$frontend2Name = Get-ResourceName
$frontend3Name = Get-ResourceName
$frontend4Name = Get-ResourceName
$backendAddressPoolName = Get-ResourceName
$probeName = Get-ResourceName
$inboundNatRuleName = Get-ResourceName
$lbruleName = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/loadBalancers"
$location = Get-ProviderLocation $resourceTypeParent
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" }
$publicip1 = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIp1Name -location $location -AllocationMethod Dynamic
$publicip2 = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIp2Name -location $location -AllocationMethod Dynamic
$publicip3 = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIp3Name -location $location -AllocationMethod Dynamic
$publicip4 = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIp4Name -location $location -AllocationMethod Dynamic
$frontend1 = New-AzLoadBalancerFrontendIpConfig -Name $frontend1Name -PublicIpAddress $publicip1
$frontend2 = New-AzLoadBalancerFrontendIpConfig -Name $frontend2Name -PublicIpAddressId $publicip2.Id
$backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName
$probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2
$inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfiguration $frontend1 -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP
$lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend2 -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP
$lb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend1,$frontend2 -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule
Assert-AreEqual $rgname $lb.ResourceGroupName
Assert-AreEqual $lbName $lb.Name
Assert-NotNull $lb.Location
Assert-AreEqual "Succeeded" $lb.ProvisioningState
Assert-NotNull $lb.ResourceGuid
Assert-AreEqual 2 @($lb.FrontendIPConfigurations).Count
Assert-AreEqual $frontend1Name $lb.FrontendIPConfigurations[0].Name
Assert-AreEqual $publicip1.Id $lb.FrontendIPConfigurations[0].PublicIpAddress.Id
Assert-Null $lb.FrontendIPConfigurations[0].Subnet
Assert-AreEqual $frontend2Name $lb.FrontendIPConfigurations[1].Name
Assert-AreEqual $publicip2.Id $lb.FrontendIPConfigurations[1].PublicIpAddress.Id
Assert-Null $lb.FrontendIPConfigurations[1].Subnet
Assert-AreEqual $backendAddressPoolName $lb.BackendAddressPools[0].Name
Assert-AreEqual $probeName $lb.Probes[0].Name
Assert-NotNull $lb.Probes[0].RequestPath
Assert-AreEqual $inboundNatRuleName $lb.InboundNatRules[0].Name
Assert-AreEqual $lb.FrontendIPConfigurations[0].Id $lb.InboundNatRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $lbruleName $lb.LoadBalancingRules[0].Name
Assert-AreEqual $lb.FrontendIPConfigurations[1].Id $lb.LoadBalancingRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $lb.BackendAddressPools[0].Id $lb.LoadBalancingRules[0].BackendAddressPool.Id
$publicip1 = Get-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIp1Name
Assert-AreEqual $lb.FrontendIPConfigurations[0].Id $publicip1.IpConfiguration.Id
$publicip2 = Get-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIp2Name
Assert-AreEqual $lb.FrontendIPConfigurations[1].Id $publicip2.IpConfiguration.Id
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Add-AzLoadBalancerFrontendIpConfig -Name $frontend3Name -PublicIpAddress $publicip3 | Set-AzLoadBalancer
Assert-AreEqual 3 @($lb.FrontendIPConfigurations).Count
Assert-AreEqual $frontend3Name $lb.FrontendIPConfigurations[2].Name
Assert-AreEqual $publicip3.Id $lb.FrontendIPConfigurations[2].PublicIpAddress.Id
Assert-Null $lb.FrontendIPConfigurations[2].Subnet
$publicip3 = Get-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIp3Name
Assert-AreEqual $lb.FrontendIPConfigurations[2].Id $publicip3.IpConfiguration.Id
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Set-AzLoadBalancerFrontendIpConfig -Name $frontend3Name -PublicIpAddress $publicip4 | Set-AzLoadBalancer
Assert-AreEqual 3 @($lb.FrontendIPConfigurations).Count
Assert-AreEqual $frontend3Name $lb.FrontendIPConfigurations[2].Name
Assert-AreEqual $publicip4.Id $lb.FrontendIPConfigurations[2].PublicIpAddress.Id
Assert-Null $lb.FrontendIPConfigurations[2].Subnet
$publicip3 = Get-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIp3Name
Assert-Null $publicip3.IpConfiguration
$publicip4 = Get-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIp4Name
Assert-AreEqual $lb.FrontendIPConfigurations[2].Id $publicip4.IpConfiguration.Id
$frontendip = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerFrontendIpConfig -Name $frontend3Name
Assert-AreEqual $frontend3Name $frontendip.Name
Assert-AreEqual $publicip4.Id $frontendip.PublicIpAddress.Id
Assert-Null $frontendip.Subnet
$frontendips = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerFrontendIpConfig
Assert-AreEqual 3 @($frontendips).Count
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Remove-AzLoadBalancerFrontendIpConfig -Name $frontend3Name | Set-AzLoadBalancer
Assert-AreEqual 2 @($lb.FrontendIPConfigurations).Count
Assert-AreEqual $frontend1Name $lb.FrontendIPConfigurations[0].Name
Assert-AreEqual $publicip1.Id $lb.FrontendIPConfigurations[0].PublicIpAddress.Id
Assert-Null $lb.FrontendIPConfigurations[0].Subnet
Assert-AreEqual $frontend2Name $lb.FrontendIPConfigurations[1].Name
Assert-AreEqual $publicip2.Id $lb.FrontendIPConfigurations[1].PublicIpAddress.Id
Assert-Null $lb.FrontendIPConfigurations[1].Subnet
$deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force
Assert-AreEqual true $deleteLb
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
$publicip1 = Get-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIp1Name
Assert-Null $publicip1.IpConfiguration
$publicip2 = Get-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIp2Name
Assert-Null $publicip2.IpConfiguration
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-LoadBalancerMultiVip-Internal
{
$rgname = Get-ResourceGroupName
$subnet1Name = Get-ResourceName
$subnet2Name = Get-ResourceName
$vnetName = Get-ResourceName
$lbName = Get-ResourceName
$frontend1Name = Get-ResourceName
$frontend2Name = Get-ResourceName
$frontend3Name = Get-ResourceName
$frontend4Name = Get-ResourceName
$backendAddressPoolName = Get-ResourceName
$probeName = Get-ResourceName
$inboundNatRuleName = Get-ResourceName
$lbruleName = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/loadBalancers"
$location = Get-ProviderLocation $resourceTypeParent
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation
$subnet1 = New-AzVirtualNetworkSubnetConfig -Name $subnet1Name -AddressPrefix 10.0.0.0/24
$subnet2 = New-AzVirtualNetworkSubnetConfig -Name $subnet2Name -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet1,$subnet2
$frontend1 = New-AzLoadBalancerFrontendIpConfig -Name $frontend1Name -Subnet $vnet.Subnets[0]
$frontend2 = New-AzLoadBalancerFrontendIpConfig -Name $frontend2Name -SubnetId $vnet.Subnets[1].Id
$backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName
$probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2
$inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfiguration $frontend1 -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP
$lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend2 -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP
$lb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend1,$frontend2 -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule
Assert-AreEqual $rgname $lb.ResourceGroupName
Assert-AreEqual $lbName $lb.Name
Assert-NotNull $lb.Location
Assert-AreEqual "Succeeded" $lb.ProvisioningState
Assert-NotNull $lb.ResourceGuid
Assert-AreEqual 2 @($lb.FrontendIPConfigurations).Count
Assert-AreEqual $frontend1Name $lb.FrontendIPConfigurations[0].Name
Assert-AreEqual $vnet.Subnets[0].Id $lb.FrontendIPConfigurations[0].Subnet.Id
Assert-Null $lb.FrontendIPConfigurations[0].PublicIpAddress
Assert-AreEqual $frontend2Name $lb.FrontendIPConfigurations[1].Name
Assert-AreEqual $vnet.Subnets[1].Id $lb.FrontendIPConfigurations[1].Subnet.Id
Assert-Null $lb.FrontendIPConfigurations[1].PublicIpAddress
Assert-AreEqual $backendAddressPoolName $lb.BackendAddressPools[0].Name
Assert-AreEqual $probeName $lb.Probes[0].Name
Assert-NotNull $lb.Probes[0].RequestPath
Assert-AreEqual $inboundNatRuleName $lb.InboundNatRules[0].Name
Assert-AreEqual $lb.FrontendIPConfigurations[0].Id $lb.InboundNatRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $lbruleName $lb.LoadBalancingRules[0].Name
Assert-AreEqual $lb.FrontendIPConfigurations[1].Id $lb.LoadBalancingRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $lb.BackendAddressPools[0].Id $lb.LoadBalancingRules[0].BackendAddressPool.Id
$vnet = Get-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname
Assert-AreEqual 1 @($vnet.Subnets[0].IpConfigurations).Count
Assert-AreEqual $lb.FrontendIPConfigurations[0].Id $vnet.Subnets[0].IpConfigurations[0].Id
Assert-AreEqual 1 @($vnet.Subnets[1].IpConfigurations).Count
Assert-AreEqual $lb.FrontendIPConfigurations[1].Id $vnet.Subnets[1].IpConfigurations[0].Id
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Add-AzLoadBalancerFrontendIpConfig -Name $frontend3Name -Subnet $vnet.Subnets[1] | Set-AzLoadBalancer
Assert-AreEqual 3 @($lb.FrontendIPConfigurations).Count
Assert-AreEqual $frontend3Name $lb.FrontendIPConfigurations[2].Name
Assert-AreEqual $vnet.Subnets[1].Id $lb.FrontendIPConfigurations[2].Subnet.Id
Assert-Null $lb.FrontendIPConfigurations[2].PublicIpAddress
$vnet = Get-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname
Assert-AreEqual 1 @($vnet.Subnets[0].IpConfigurations).Count
Assert-AreEqual $lb.FrontendIPConfigurations[0].Id $vnet.Subnets[0].IpConfigurations[0].Id
Assert-AreEqual 2 @($vnet.Subnets[1].IpConfigurations).Count
Assert-AreEqual $lb.FrontendIPConfigurations[1].Id $vnet.Subnets[1].IpConfigurations[0].Id
Assert-AreEqual $lb.FrontendIPConfigurations[2].Id $vnet.Subnets[1].IpConfigurations[1].Id
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Set-AzLoadBalancerFrontendIpConfig -Name $frontend3Name -SubnetId $vnet.Subnets[0].Id | Set-AzLoadBalancer
Assert-AreEqual 3 @($lb.FrontendIPConfigurations).Count
Assert-AreEqual $frontend3Name $lb.FrontendIPConfigurations[2].Name
Assert-AreEqual $vnet.Subnets[0].Id $lb.FrontendIPConfigurations[2].Subnet.Id
Assert-Null $lb.FrontendIPConfigurations[2].PublicIpAddress
$vnet = Get-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname
Assert-AreEqual 2 @($vnet.Subnets[0].IpConfigurations).Count
Assert-AreEqual $lb.FrontendIPConfigurations[0].Id $vnet.Subnets[0].IpConfigurations[0].Id
Assert-AreEqual $lb.FrontendIPConfigurations[2].Id $vnet.Subnets[0].IpConfigurations[1].Id
Assert-AreEqual 1 @($vnet.Subnets[1].IpConfigurations).Count
Assert-AreEqual $lb.FrontendIPConfigurations[1].Id $vnet.Subnets[1].IpConfigurations[0].Id
$frontendip = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerFrontendIpConfig -Name $frontend3Name
Assert-AreEqual $frontend3Name $frontendip.Name
Assert-AreEqual $vnet.Subnets[0].Id $frontendip.Subnet.Id
Assert-Null $frontendip.PublicIpAddress
$frontendips = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerFrontendIpConfig
Assert-AreEqual 3 @($frontendips).Count
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Remove-AzLoadBalancerFrontendIpConfig -Name $frontend3Name | Set-AzLoadBalancer
Assert-AreEqual 2 @($lb.FrontendIPConfigurations).Count
Assert-AreEqual $frontend1Name $lb.FrontendIPConfigurations[0].Name
Assert-AreEqual $vnet.Subnets[0].Id $lb.FrontendIPConfigurations[0].Subnet.Id
Assert-Null $lb.FrontendIPConfigurations[0].PublicIpAddress
Assert-AreEqual $frontend2Name $lb.FrontendIPConfigurations[1].Name
Assert-AreEqual $vnet.Subnets[1].Id $lb.FrontendIPConfigurations[1].Subnet.Id
Assert-Null $lb.FrontendIPConfigurations[1].PublicIpAddress
$deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force
Assert-AreEqual true $deleteLb
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
$vnet = Get-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname
Assert-AreEqual 0 @($vnet.Subnets[0].IpConfigurations).Count
Assert-AreEqual 0 @($vnet.Subnets[1].IpConfigurations).Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-SetLoadBalancerObjectAssignment
{
$rgname = Get-ResourceGroupName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$domainNameLabel = Get-ResourceName
$lbName = Get-ResourceName
$frontendName = Get-ResourceName
$backendAddressPoolName = Get-ResourceName
$probeName = Get-ResourceName
$inboundNatRuleName = Get-ResourceName
$lbruleName = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/loadBalancers"
$location = Get-ProviderLocation $resourceTypeParent
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" }
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel
$frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -PublicIpAddress $publicip
$backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName
$probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2
$inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP
$lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP
$lb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule
Assert-AreEqual $rgname $lb.ResourceGroupName
Assert-AreEqual $lbName $lb.Name
Assert-NotNull $lb.Location
Assert-AreEqual "Succeeded" $lb.ProvisioningState
Assert-NotNull $lb.ResourceGuid
Assert-AreEqual 1 @($lb.FrontendIPConfigurations).Count
Assert-AreEqual $frontendName $lb.FrontendIPConfigurations[0].Name
Assert-AreEqual $publicip.Id $lb.FrontendIPConfigurations[0].PublicIpAddress.Id
Assert-Null $lb.FrontendIPConfigurations[0].PrivateIpAddress
Assert-AreEqual $backendAddressPoolName $lb.BackendAddressPools[0].Name
Assert-AreEqual $probeName $lb.Probes[0].Name
Assert-AreEqual $probe.RequestPath $lb.Probes[0].RequestPath
Assert-AreEqual $inboundNatRuleName $lb.InboundNatRules[0].Name
Assert-AreEqual $lb.FrontendIPConfigurations[0].Id $lb.InboundNatRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $lbruleName $lb.LoadBalancingRules[0].Name
Assert-AreEqual $lb.FrontendIPConfigurations[0].Id $lb.LoadBalancingRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $lb.BackendAddressPools[0].Id $lb.LoadBalancingRules[0].BackendAddressPool.Id
Assert-Null $lb.LoadBalancingRules[0].Probe
$lb.LoadBalancingRules[0].Probe = $lb.Probes[0]
$lb = $lb | Set-AzLoadBalancer
Assert-NotNull $lb.LoadBalancingRules[0].Probe
Assert-AreEqual $lb.LoadBalancingRules[0].Probe.Id $lb.Probes[0].Id
$deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force
Assert-AreEqual true $deleteLb
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-LoadBalancerCRUD-PublicBasicSku
{
$rgname = Get-ResourceGroupName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$domainNameLabel = Get-ResourceName
$lbName = Get-ResourceName
$frontendName = Get-ResourceName
$backendAddressPoolName = Get-ResourceName
$probeName = Get-ResourceName
$inboundNatRuleName = Get-ResourceName
$lbruleName = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/loadBalancers"
$location = Get-ProviderLocation $resourceTypeParent
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"}
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel
$frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -PublicIpAddress $publicip
$backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName
$probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2
$inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP
$lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP
$actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule -Sku Basic
$expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName
Assert-AreEqual $expectedLb.Name $actualLb.Name
Assert-AreEqual $expectedLb.Location $actualLb.Location
Assert-AreEqualObjectProperties $expectedLb.Sku $actualLb.Sku
Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState
Assert-NotNull $expectedLb.ResourceGuid
Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count
Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name
Assert-AreEqual $publicip.Id $expectedLb.FrontendIPConfigurations[0].PublicIpAddress.Id
Assert-Null $expectedLb.FrontendIPConfigurations[0].PrivateIpAddress
Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name
Assert-AreEqual $probeName $expectedLb.Probes[0].Name
Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath
Assert-AreEqual $inboundNatRuleName $expectedLb.InboundNatRules[0].Name
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.InboundNatRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $lbruleName $expectedLb.LoadBalancingRules[0].Name
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.LoadBalancingRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $expectedLb.BackendAddressPools[0].Id $expectedLb.LoadBalancingRules[0].BackendAddressPool.Id
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 1 @($list).Count
Assert-AreEqual $expectedLb.Etag $list[0].Etag
Assert-AreEqualObjectProperties $expectedLb.Sku $list[0].Sku
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Etag $list[0].FrontendIPConfigurations[0].Etag
Assert-AreEqual $expectedLb.BackendAddressPools[0].Etag $list[0].BackendAddressPools[0].Etag
Assert-AreEqual $expectedLb.InboundNatRules[0].Etag $list[0].InboundNatRules[0].Etag
Assert-AreEqual $expectedLb.Probes[0].Etag $list[0].Probes[0].Etag
Assert-AreEqual $expectedLb.LoadBalancingRules[0].Etag $list[0].LoadBalancingRules[0].Etag
$deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force
Assert-AreEqual true $deleteLb
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-LoadBalancerCRUD-InternalBasicSku
{
$rgname = Get-ResourceGroupName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$domainNameLabel = Get-ResourceName
$lbName = Get-ResourceName
$frontendName = Get-ResourceName
$backendAddressPoolName = Get-ResourceName
$probeName = Get-ResourceName
$inboundNatRuleName = Get-ResourceName
$lbruleName = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/loadBalancers"
$location = Get-ProviderLocation $resourceTypeParent
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"}
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel
$frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -Subnet $vnet.Subnets[0]
$backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName
$probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2
$inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP
$lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP
$actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule -Sku Basic
$expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName
Assert-AreEqual $expectedLb.Name $actualLb.Name
Assert-AreEqual $expectedLb.Location $actualLb.Location
Assert-AreEqualObjectProperties $expectedLb.Sku $actualLb.Sku
Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState
Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count
Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name
Assert-AreEqual $vnet.Subnets[0].Id $expectedLb.FrontendIPConfigurations[0].Subnet.Id
Assert-NotNull $expectedLb.FrontendIPConfigurations[0].PrivateIpAddress
Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name
Assert-AreEqual $probeName $expectedLb.Probes[0].Name
Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath
Assert-AreEqual $inboundNatRuleName $expectedLb.InboundNatRules[0].Name
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.InboundNatRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $lbruleName $expectedLb.LoadBalancingRules[0].Name
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.LoadBalancingRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $expectedLb.BackendAddressPools[0].Id $expectedLb.LoadBalancingRules[0].BackendAddressPool.Id
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 1 @($list).Count
Assert-AreEqual $expectedLb.Etag $list[0].Etag
Assert-AreEqualObjectProperties $expectedLb.Sku $list[0].Sku
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Etag $list[0].FrontendIPConfigurations[0].Etag
Assert-AreEqual $expectedLb.BackendAddressPools[0].Etag $list[0].BackendAddressPools[0].Etag
Assert-AreEqual $expectedLb.InboundNatRules[0].Etag $list[0].InboundNatRules[0].Etag
Assert-AreEqual $expectedLb.Probes[0].Etag $list[0].Probes[0].Etag
Assert-AreEqual $expectedLb.LoadBalancingRules[0].Etag $list[0].LoadBalancingRules[0].Etag
$deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force
Assert-AreEqual true $deleteLb
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-LoadBalancerCRUD-PublicStandardSku
{
$rgname = Get-ResourceGroupName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$publicIpName = Get-ResourceName
$domainNameLabel = Get-ResourceName
$lbName = Get-ResourceName
$frontendName = Get-ResourceName
$backendAddressPoolName = Get-ResourceName
$probeName = Get-ResourceName
$inboundNatRuleName = Get-ResourceName
$lbruleName = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/loadBalancers"
$location = Get-ProviderLocation $resourceTypeParent
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"}
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet
$publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Static -DomainNameLabel $domainNameLabel -Sku Standard
$frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -PublicIpAddress $publicip
$backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName
$probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2
$inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP
$lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP -DisableOutboundSNAT
$actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule -Sku Standard
$expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName
Assert-AreEqual $expectedLb.Name $actualLb.Name
Assert-AreEqual $expectedLb.Location $actualLb.Location
Assert-AreEqualObjectProperties $expectedLb.Sku $actualLb.Sku
Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState
Assert-NotNull $expectedLb.ResourceGuid
Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count
Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name
Assert-AreEqual $publicip.Id $expectedLb.FrontendIPConfigurations[0].PublicIpAddress.Id
Assert-Null $expectedLb.FrontendIPConfigurations[0].PrivateIpAddress
Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name
Assert-AreEqual $probeName $expectedLb.Probes[0].Name
Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath
Assert-AreEqual $inboundNatRuleName $expectedLb.InboundNatRules[0].Name
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.InboundNatRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $lbruleName $expectedLb.LoadBalancingRules[0].Name
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.LoadBalancingRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $expectedLb.BackendAddressPools[0].Id $expectedLb.LoadBalancingRules[0].BackendAddressPool.Id
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 1 @($list).Count
Assert-AreEqual $expectedLb.Etag $list[0].Etag
Assert-AreEqualObjectProperties $expectedLb.Sku $list[0].Sku
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Etag $list[0].FrontendIPConfigurations[0].Etag
Assert-AreEqual $expectedLb.BackendAddressPools[0].Etag $list[0].BackendAddressPools[0].Etag
Assert-AreEqual $expectedLb.InboundNatRules[0].Etag $list[0].InboundNatRules[0].Etag
Assert-AreEqual $expectedLb.Probes[0].Etag $list[0].Probes[0].Etag
Assert-AreEqual $expectedLb.LoadBalancingRules[0].Etag $list[0].LoadBalancingRules[0].Etag
$deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force
Assert-AreEqual true $deleteLb
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-LoadBalancerCRUD-InternalStandardSku
{
$rgname = Get-ResourceGroupName
$vnetName = Get-ResourceName
$subnetName = Get-ResourceName
$lbName = Get-ResourceName
$frontendName = Get-ResourceName
$backendAddressPoolName = Get-ResourceName
$probeName = Get-ResourceName
$inboundNatRuleName = Get-ResourceName
$lbruleName = Get-ResourceName
$rglocation = Get-ProviderLocation ResourceManagement
$resourceTypeParent = "Microsoft.Network/loadBalancers"
$location = Get-ProviderLocation $resourceTypeParent
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"}
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet
$frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -Subnet $vnet.Subnets[0]
$backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName
$probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2
$inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP
$lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP -DisableOutboundSNAT
$actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule -Sku Standard
$expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName
Assert-AreEqual $expectedLb.Name $actualLb.Name
Assert-AreEqual $expectedLb.Location $actualLb.Location
Assert-AreEqualObjectProperties $expectedLb.Sku $actualLb.Sku
Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState
Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count
Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name
Assert-AreEqual $vnet.Subnets[0].Id $expectedLb.FrontendIPConfigurations[0].Subnet.Id
Assert-NotNull $expectedLb.FrontendIPConfigurations[0].PrivateIpAddress
Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name
Assert-AreEqual $probeName $expectedLb.Probes[0].Name
Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath
Assert-AreEqual $inboundNatRuleName $expectedLb.InboundNatRules[0].Name
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.InboundNatRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $lbruleName $expectedLb.LoadBalancingRules[0].Name
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.LoadBalancingRules[0].FrontendIPConfiguration.Id
Assert-AreEqual $expectedLb.BackendAddressPools[0].Id $expectedLb.LoadBalancingRules[0].BackendAddressPool.Id
Assert-AreEqual true $expectedlb.LoadBalancingRules[0].DisableOutboundSNAT
Assert-AreEqual true $actualLb.LoadBalancingRules[0].DisableOutboundSNAT
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 1 @($list).Count
Assert-AreEqual $expectedLb.Etag $list[0].Etag
Assert-AreEqualObjectProperties $expectedLb.Sku $list[0].Sku
Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Etag $list[0].FrontendIPConfigurations[0].Etag
Assert-AreEqual $expectedLb.BackendAddressPools[0].Etag $list[0].BackendAddressPools[0].Etag
Assert-AreEqual $expectedLb.InboundNatRules[0].Etag $list[0].InboundNatRules[0].Etag
Assert-AreEqual $expectedLb.Probes[0].Etag $list[0].Probes[0].Etag
Assert-AreEqual $expectedLb.LoadBalancingRules[0].Etag $list[0].LoadBalancingRules[0].Etag
Assert-AreEqual $expectedlb.LoadBalancingRules[0].DisableOutboundSNAT $actualLb.LoadBalancingRules[0].DisableOutboundSNAT
$deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force
Assert-AreEqual true $deleteLb
$list = Get-AzLoadBalancer -ResourceGroupName $rgname
Assert-AreEqual 0 @($list).Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-LoadBalancerZones
{
$rgname = Get-ResourceGroupName
$rname = Get-ResourceName
$subnetName = Get-ResourceName
$vnetName = Get-ResourceName
$frontendName = Get-ResourceName
$zones = "1";
$rglocation = Get-ProviderLocation ResourceManagement
$location = Get-ProviderLocation "Microsoft.Network/loadBalancers" "Central US"
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" }
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/8 -Subnet $subnet
$subnet = Get-AzVirtualNetworkSubnetConfig -Name $subnetName -VirtualNetwork $vnet
$frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -Subnet $subnet -Zone $zones
$actual = New-AzLoadBalancer -ResourceGroupName $rgname -name $rname -location $location -frontendIpConfiguration $frontend;
$expected = Get-AzLoadBalancer -ResourceGroupName $rgname -name $rname
Assert-AreEqual $expected.ResourceGroupName $actual.ResourceGroupName
Assert-AreEqual $expected.Name $actual.Name
Assert-AreEqual $expected.Location $actual.Location
Assert-NotNull $expected.ResourceGuid
Assert-AreEqual "Succeeded" $expected.ProvisioningState
Assert-NotNull $expected.frontendIpConfigurations
Assert-NotNull $expected.frontendIpConfigurations[0]
Assert-NotNull $expected.frontendIpConfigurations[0].zones
Assert-AreEqual $zones $expected.frontendIpConfigurations[0].zones[0]
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-CreateSubresourcesOnEmptyLoadBalancer
{
$rgname = Get-ResourceGroupName
$lbName = Get-ResourceName
$location = Get-ProviderLocation "Microsoft.Network/loadBalancers"
$poolName = Get-ResourceName
$ipConfigName = Get-ResourceName
$natPoolName = Get-ResourceName
$natRuleName = Get-ResourceName
$probeName = Get-ResourceName
$ruleName = Get-ResourceName
$subnetName = Get-ResourceName
$vnetName = Get-ResourceName
try
{
$resourceGroup = New-AzResourceGroup -Name $rgname -Location $location
$subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24
$vnet = New-AzVirtualNetwork -ResourceGroupName $rgname -Location $location -Name $vnetName -Subnet $subnet -AddressPrefix 10.0.0.0/8
$subnet = Get-AzVirtualNetworkSubnetConfig -Name $subnetName -VirtualNetwork $vnet
New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
Assert-AreEqual $lbName $lb.Name
Assert-AreEqual 0 @($lb.FrontendIpConfigurations).Count
Assert-AreEqual 0 @($lb.BackendAddressPools).Count
Assert-AreEqual 0 @($lb.Probes).Count
Assert-AreEqual 0 @($lb.LoadBalancingRules).Count
Assert-AreEqual 0 @($lb.InboundNatRules).Count
Assert-AreEqual 0 @($lb.InboundNatPools).Count
Assert-AreEqual 0 @($lb.OutboundRules).Count
$lb = Add-AzLoadBalancerFrontendIpConfig -Name $ipConfigName -LoadBalancer $lb -Subnet $subnet
$ipConfig = $lb.FrontendIpConfigurations[0]
Assert-NotNull $ipConfig
$lb = Add-AzLoadBalancerBackendAddressPoolConfig -Name $poolName -LoadBalancer $lb
$lb = Add-AzLoadBalancerProbeConfig -Name $probeName -LoadBalancer $lb -Port 2000 -IntervalInSeconds 60 -ProbeCount 3
$lb = Add-AzLoadBalancerRuleConfig -Name $ruleName -LoadBalancer $lb -FrontendIpConfiguration $ipConfig -Protocol Tcp -FrontendPort 1024 -BackendPort 2048
$lb = Add-AzLoadBalancerInboundNatRuleConfig -Name $natRuleName -LoadBalancer $lb -FrontendIpConfiguration $ipConfig -FrontendPort 128 -BackendPort 256
$lb = Set-AzLoadBalancer -LoadBalancer $lb
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
Assert-AreEqual 1 @($lb.FrontendIpConfigurations).Count
Assert-AreEqual 1 @($lb.BackendAddressPools).Count
Assert-AreEqual 1 @($lb.Probes).Count
Assert-AreEqual 1 @($lb.LoadBalancingRules).Count
Assert-AreEqual 1 @($lb.InboundNatRules).Count
$lb = Remove-AzLoadBalancerInboundNatRuleConfig -LoadBalancer $lb -Name $natRuleName
$lb = Add-AzLoadBalancerInboundNatPoolConfig -Name $natPoolName -LoadBalancer $lb -FrontendIpConfiguration $ipConfig -Protocol Tcp -FrontendPortRangeStart 444 -FrontendPortRangeEnd 445 -BackendPort 8080
$lb = Set-AzLoadBalancer -LoadBalancer $lb
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
Assert-AreEqual 0 @($lb.InboundNatRules).Count
Assert-AreEqual 1 @($lb.InboundNatPools).Count
$lb = Remove-AzLoadBalancerBackendAddressPoolConfig -LoadBalancer $lb -Name $poolName
$lb = Remove-AzLoadBalancerProbeConfig -LoadBalancer $lb -Name $probeName
$lb = Remove-AzLoadBalancerRuleConfig -LoadBalancer $lb -Name $ruleName
$lb = Remove-AzLoadBalancerInboundNatPoolConfig -LoadBalancer $lb -Name $natPoolName
$lb = Set-AzLoadBalancer -LoadBalancer $lb
$lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname
Assert-AreEqual 1 @($lb.FrontendIpConfigurations).Count
Assert-AreEqual 0 @($lb.BackendAddressPools).Count
Assert-AreEqual 0 @($lb.Probes).Count
Assert-AreEqual 0 @($lb.LoadBalancingRules).Count
Assert-AreEqual 0 @($lb.InboundNatRules).Count
Assert-AreEqual 0 @($lb.InboundNatPools).Count
Assert-AreEqual 0 @($lb.OutboundRules).Count
$lb = Remove-AzLoadBalancerFrontendIpConfig -LoadBalancer $lb -Name $ipConfigName
$lb = Remove-AzLoadBalancerFrontendIpConfig -LoadBalancer $lb -Name $ipConfigName
Assert-ThrowsContains { Set-AzLoadBalancer -LoadBalancer $lb } "Deleting all frontendIPConfigs"
$deleteLb = $lb | Remove-AzLoadBalancer -PassThru -Force
Assert-AreEqual true $deleteLb
$list = Get-AzLoadBalancer | Where-Object { $_.ResourceGroupName -eq $rgname }
Assert-AreEqual 0 @($list).Count
}
finally
{
Clean-ResourceGroup $rgname
}
}
|
combined_dataset/train/non-malicious/sample_63_26.ps1
|
sample_63_26.ps1
|
#
# Module manifest for module 'OCI.PSModules.Opensearch'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Opensearch.dll'
# Version number of this module.
ModuleVersion = '84.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'b54b41d9-dd21-465f-ac14-72727ada540b'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Opensearch Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '84.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Opensearch.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Backup-OCIOpensearchCluster', 'Get-OCIOpensearchCluster',
'Get-OCIOpensearchClusterBackup',
'Get-OCIOpensearchClusterBackupsList',
'Get-OCIOpensearchClustersList', 'Get-OCIOpensearchVersionsList',
'Get-OCIOpensearchWorkRequest',
'Get-OCIOpensearchWorkRequestErrorsList',
'Get-OCIOpensearchWorkRequestLogsList',
'Get-OCIOpensearchWorkRequestsList',
'Invoke-OCIOpensearchOpensearchClusterRestore',
'Invoke-OCIOpensearchResizeOpensearchClusterHorizontal',
'Invoke-OCIOpensearchResizeOpensearchClusterVertical',
'New-OCIOpensearchCluster', 'Remove-OCIOpensearchCluster',
'Remove-OCIOpensearchClusterBackup', 'Update-OCIOpensearchCluster',
'Update-OCIOpensearchClusterBackup'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Opensearch'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/1598.ps1
|
1598.ps1
|
filter propmatch ([string]$match='') {
$props = @()
$obj = $_
$obj | gm -m *property | % { if ($obj.$($_.name) -match $match) {$props += [string]$_.name} }
$obj | select $props
}
|
combined_dataset/train/non-malicious/Get-Scope_1.ps1
|
Get-Scope_1.ps1
|
function Get-Scope{
$rtnScope = 0
$global:scope = $false
$scope = $true
while($($ErrorActionPreference = "silentlycontinue"; switch((get-Variable -Name scope -Scope $rtnScope).value){$null{$true} $true{$true} $false{$ErrorActionPreference = "continue"; return ($rtnScope - 1)}})){
$rtnScope++
}
}
Example.
function gg{
Get-Scope
};
function iii{
gg
};
iii ==> result is 2
|
combined_dataset/train/non-malicious/sample_38_2.ps1
|
sample_38_2.ps1
|
#
# Module manifest for module 'OCI.PSModules.Usage'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Usage.dll'
# Version number of this module.
ModuleVersion = '81.0.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = '9ad21498-2007-42f7-9492-bacc9b5b532f'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Usage Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Usage.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIUsageLimitsList', 'Get-OCIUsageProductsList',
'Get-OCIUsageRedeemableUsersList', 'Get-OCIUsageRedemptionsList',
'Get-OCIUsageResourceQuotaList', 'Get-OCIUsageResourcesList',
'Get-OCIUsageRewardsList', 'New-OCIUsageRedeemableUser',
'Remove-OCIUsageRedeemableUser'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Usage'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/4194.ps1
|
4194.ps1
|
Set-Variable -Name Body -Force
Set-Variable -Name EmailAddress -Force
Set-Variable -Name EmailAddresses -Force
Set-Variable -Name Exclusions -Force
Set-Variable -Name LocalAdmin -Force
Set-Variable -Name LocalAdmins -Force
Set-Variable -Name LogFile -Value $env:windir"\Logs\LocalAdministrators.log" -Force
Set-Variable -Name LogFileEmailed -Value $env:windir"\Logs\LocalAdministrators_Emailed.log" -Force
Set-Variable -Name Member -Force
Set-Variable -Name Members -Force
Set-Variable -Name Output -Force
Set-Variable -Name Prof -Force
Set-Variable -Name Profiles -Force
Set-Variable -Name RelativePath -Force
cls
$RelativePath = (split-path $SCRIPT:MyInvocation.MyCommand.Path -parent) + "\"
$Body = "Local Administrator(s)" + [char]13 + "---------------------------" + [char]13
$EmailAddresses = @()
$EmailAddresses = Get-Content -Path $RelativePath"EmailAddresses.txt"
$LocalAdmins = @()
$Members = net localgroup administrators | where { $_ -AND $_ -notmatch "command completed successfully" } | select -skip 4
$Profiles = Get-ChildItem -Path $env:SystemDrive"\users" -Force
$Exclusions = Get-Content -Path $RelativePath"Exclusions.txt"
Foreach ($Member in $Members) {
$Member = $Member.Split("\")
If ($Member.Count -gt 1) {
[string]$Member = $Member[1]
If ($Member -notin $Exclusions) {
Foreach ($Prof in $Profiles) {
If ($Member -eq $Prof) {
$LocalAdmins += $Member
}
}
}
}
Remove-Variable -Name Member
}
if ((Test-Path $LogFileEmailed) -eq $true) {
Remove-Item -Path $LogFileEmailed -Force
}
if ((Test-Path $LogFile) -eq $true) {
Remove-Item -Path $LogFile -Force
}
if ($LocalAdmins.Count -gt 0) {
if ((Test-Path $LogFile) -eq $false) {
New-Item -Path $LogFile -ItemType file -Force
}
foreach ($LocalAdmin in $LocalAdmins) {
Add-Content -Path $LogFile -Value $LocalAdmin -Force
$Body = $Body + $LocalAdmin + [char]13
}
}
If ($LocalAdmins.count -eq 1) {
$Output = $LocalAdmin + [char]32 + "is a local administrator on" + [char]32 + $env:COMPUTERNAME
foreach ($EmailAddress in $EmailAddresses) {
Send-MailMessage -To $EmailAddress -From "IT@acme.com" -Subject "Local Administrator Report" -Body $Output -SmtpServer "smtp.acme.com"
}
Rename-Item -Path $LogFile -NewName $LogFileEmailed -Force
} else {
$Output = "The attached file lists all local administrators on" + [char]32 + $env:COMPUTERNAME
foreach ($EmailAddress in $EmailAddresses) {
Send-MailMessage -To $EmailAddress -From "IT@acme.com" -Subject "Local Administrator Report" -Body $Output -Attachments $LogFile -SmtpServer "smtp.acme.com"
}
Rename-Item -Path $LogFile -NewName $LogFileEmailed -Force
}
$LocalAdmins = $null
Remove-Variable -Name Body -Force
Remove-Variable -Name EmailAddress -Force
Remove-Variable -Name EmailAddresses -Force
Remove-Variable -Name Exclusions -Force
Remove-Variable -Name LocalAdmin -Force
Remove-Variable -Name LocalAdmins -Force
Remove-Variable -Name LogFile -Force
Remove-Variable -Name LogFileEmailed -Force
Remove-Variable -Name Members -Force
Remove-Variable -Name Output -Force
Remove-Variable -Name Prof -Force
Remove-Variable -Name Profiles -Force
|
combined_dataset/train/non-malicious/sample_33_85.ps1
|
sample_33_85.ps1
|
#
# Script module for module 'Az.HealthcareApis' that is executed when 'Az.HealthcareApis' is imported in a PowerShell session.
#
# Generated by: Microsoft Corporation
#
# Generated on: 04/23/2024 13:01:41
#
$PSDefaultParameterValues.Clear()
Set-StrictMode -Version Latest
function Test-DotNet
{
try
{
if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 })))
{
throw ".NET Framework versions lower than 4.7.2 are not supported in Az. Please upgrade to .NET Framework 4.7.2 or higher."
}
}
catch [System.Management.Automation.DriveNotFoundException]
{
Write-Verbose ".NET Framework version check failed."
}
}
function Preload-Assembly {
param (
[string]
$AssemblyDirectory
)
if($PSEdition -eq 'Desktop' -and (Test-Path $AssemblyDirectory -ErrorAction Ignore))
{
try
{
Get-ChildItem -ErrorAction Stop -Path $AssemblyDirectory -Filter "*.dll" | ForEach-Object {
try
{
Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null
}
catch {
Write-Verbose $_
}
}
}
catch {}
}
}
if ($true -and ($PSEdition -eq 'Desktop'))
{
if ($PSVersionTable.PSVersion -lt [Version]'5.1')
{
throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher."
}
Test-DotNet
}
if ($true -and ($PSEdition -eq 'Core'))
{
if ($PSVersionTable.PSVersion -lt [Version]'6.2.4')
{
throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher."
}
}
if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore)
{
Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object {
. $_.FullName
}
}
# [windows powershell] preload assemblies
# [windows powershell] preload module alc assemblies
$preloadPath = (Join-Path $PSScriptRoot -ChildPath "ModuleAlcAssemblies")
Preload-Assembly -AssemblyDirectory $preloadPath
if (Get-Module AzureRM.profile -ErrorAction Ignore)
{
Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +
"If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")
throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " +
"If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.")
}
$module = Get-Module Az.Accounts
if ($module -ne $null -and $module.Version -lt [System.Version]"2.19.0")
{
Write-Error "This module requires Az.Accounts version 2.19.0. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop
}
elseif ($module -eq $null)
{
Import-Module Az.Accounts -MinimumVersion 2.19.0 -Scope Global
}
if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore)
{
Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object {
. $_.FullName
}
}
$FilteredCommands = @()
if ($Env:ACC_CLOUD -eq $null)
{
$FilteredCommands | ForEach-Object {
$existingDefault = $false
foreach ($key in $global:PSDefaultParameterValues.Keys)
{
if ($_ -like "$key")
{
$existingDefault = $true
}
}
if (!$existingDefault)
{
$global:PSDefaultParameterValues.Add($_,
{
if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null)
{
$context = Get-AzureRmContext
}
else
{
$context = Get-AzContext
}
if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) {
$context.ExtendedProperties["Default Resource Group"]
}
})
}
}
}
# SIG # Begin signature block
# MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDP7OdMwKL8acL9
# T9e/GFDBGWlI6U1Ph17PVLS76dG46KCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEII8PTYR1p32i/sEcL8+eUS9D
# 4qaRwPX+tWPXoLoJMp+DMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAyaI050WYQcQI83eisqwmWIyiJ+5dOBX4sMd0tG/mz75K6G4Wwu+/aFwy
# C/ZbB2mTHsMMZAbtzoOe6M+BZgwrMbu/oJthAI7u4hWag3vKrhrpe2QBTeGiQ4xI
# 5ZoeWS7Zc8L80sVPwY/hZZ93Th80A8mK/f66rBs53dTMeoTRI5MJI/jpkfl6Qogc
# F4eVL8VA4j/88A1iWkTiBJfmVLytxvqCoy7C9I2BuQZG/lwHhQwmDoTIJO//2/+y
# PvkA5ah1Gsg+ve+XDtKk5eLKEF5x66AZGP+sVw6cwtxEx5i4ko/dp92cPfEcZ+LF
# GUdRGq/5s7WVf/hnaTQnI9Sf467iFKGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC
# FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCD4BQCk1zoqyaTihirbL/6emVEythplLbdNpFvkHDrWGQIGZiAgthUM
# GBMyMDI0MDQyMzEzMTUyMi40ODVaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC
# RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis
# DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI
# ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z
# ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR
# IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE
# lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s
# /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4
# aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB
# fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT
# me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy
# qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui
# hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds
# lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf
# sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t
# Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU
# +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7
# qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6
# Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+
# x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4
# 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5
# ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV
# PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4
# y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk
# 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG
# QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnR3vgwIhgPMjAyNDA0MjMxNTE3MTJaGA8yMDI0MDQyNDE1MTcxMlowdzA9Bgor
# BgEEAYRZCgQBMS8wLTAKAgUA6dHe+AIBADAKAgEAAgIDFQIB/zAHAgEAAgITGDAK
# AgUA6dMweAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBANIiA17LpM6vqyo+
# h2Gy7jS/plK5btuepzPH69HaSSLQgmyHGJti3T4/40Qv/pD1kqx4aZmxSYhfghQx
# G6+5xQrMjXUGVkvkHlGDaCB5PkTFkhEadoG/M8OiSF2z6t1t+B5+UpZHn/ZqMCje
# 0hGMGpF+It3BhOadbdLMLmv1S+e5MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgI+IHGeoHYkUXTZQoKYzp+wPOlYTqk5KFy3IOqjhJ5OEwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJ
# CI9//zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 4pmZlfHc4yDrAAEAAAHiMCIEIFI9jHTsM+FSP6FMwP2O6Yu7/zJ0dHmtmWF4o2me
# BeYsMA0GCSqGSIb3DQEBCwUABIICAGwfiWBwLFVQjHuABe5MBTP82FLM9nDfiOd2
# ZCT1vatU/es0Pe7MesExgxG10YPDa3AKjZ6oz9pD/fJp4MeQW+vu8gUG5dVEpA31
# soSaCxSMQyeoQ6hJfsZVTJqiY4yhe44BMUHwy0sgcdg4FhQmSPmesQB4Ng3nZDJ/
# 7xBb1wii7TJiuNC40eXmXdy58vSpSrXawPSgI+EEEF+KZR6Jt+ywcuZTHjVxElqr
# ckaiP8Q/Cbf97qMwwIBkoIBBtD+DWWvfvSmSWYaMEdhIN8sms8+opkfYMG+S5g6N
# zXYvSzJ6YtMS7gA4nLwiSJ/VIkxEyGMq/R+P3iWlEN0IVcTkWH4tE8McmIVClhdZ
# GQP5UcrwdqEppONmMkUQMJmRq/YSEZRNIMyZ6EybPHiqdkjfn90Ln0MA2C7sKKst
# AvTQzE5Mjl4YB939pX+oece1b9Fw6ZF2aOi3wmMMumKA9GvZ11gNl3ca9/Co18OC
# gNyNnqwpjddONC+fsQDnBqomG1/6DlkphNjV463FkcX4gXz/YgVlGAjA05FtsDXR
# O6Qqmfgl20UaiVPhGL0hBvADCk/6F5uuQApQNjdOGPldJXaZ9JD7yWYxcwgB2WFF
# OJxDosF72eiCu15o1gMniPsdDz8YTT1nfXQFYOIlxJEfVBYVcUkQNrFQrk4o01A+
# yqCkMfoC
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_20_43.ps1
|
sample_20_43.ps1
|
#************************************************
# TS_SelectClusterNodes.ps1
# Version 1.0.1
# Date: 02-09-2011
# Author: Andre Teixeira - andret@microsoft.com
# Description: This script asks customer to select the cluster nodes on which the diagnostic will obtain data from
#************************************************
Import-LocalizedData -BindingVariable ScriptStrings
Function GetWin32OSFromRemoteSystem([string] $RemoteMachine)
{
$Error.Clear()
trap [Exception]
{
WriteTo-ErrorDebugReport -ErrorRecord $Error[0] -ScriptErrorText ("[GetWin32OSFromRemoteSystem] Remote Machine: $RemoteMachine")
continue
}
Write-DiagProgress -Activity ($ScriptStrings.ID_EPSConnectingTo.Replace("%Machine%", $RemoteMachine)) -Status $ScriptStrings.ID_EPSConnectingToDesc
$Win32OS = Get-CimInstance -Class Win32_OperatingSystem -ComputerName $RemoteMachine -ErrorAction SilentlyContinue
if ($Error.Count -gt 0)
{
if ($Error[0].Exception.ErrorCode -eq -2147023174) #The RPC server is unavailable. (Exception from HRESULT: 0x800706BA)
{
get-diaginput -id "ErrorContactingNode" -Parameter @{"Machine"=$RemoteMachine; "Error"=$ScriptStrings.ID_EPSConnectingRCPError}
$Error.Clear()
}
else
{
get-diaginput -id "ErrorContactingNode" -Parameter @{"Machine"=$RemoteMachine; "Error"= $Error[0].Exception.Message}
$Error.Clear()
}
return $null
}
else
{
Return $Win32OS
}
}
Function isClusterNode([string] $RemoteMachine)
{
$Error.Clear()
trap [Exception]
{
WriteTo-ErrorDebugReport -ErrorRecord $_ -ScriptErrorText ("[isClusterNode] Check if machine $RemoteMachine has ClusSvc service")
continue
}
Write-DiagProgress -Activity ($ScriptStrings.ID_EPSConnectingTo.Replace("%Machine%", $RemoteMachine)) -Status $ScriptStrings.ID_EPSSelectNodesObtainingCluster
"[isClusterNode] Detecting if $RemoteMachine is a cluster node..." | WriteTo-StdOut -ShortFormat
$CluSvc = Get-Service -ComputerName $RemoteMachine | Where-Object {$_.Name -eq "ClusSvc"}
if ($null -ne $CluSvc.Status)
{
"[isClusterNode] $RemoteMachine is a cluster node. Cluster Service is currently " + $CluSvc.Status.ToString() | WriteTo-StdOut -ShortFormat
return $true
}
else
{
"[isClusterNode] Error obtaining status of cluster service of machine $RemoteMachine" | WriteTo-StdOut -ShortFormat
get-diaginput -id "ErrorContactingNode" -Parameter @{"Machine"=$RemoteMachine; "Error"= $ScriptStrings.ID_EPSSelectNodesUnableService}
return $false
}
}
#Step 1: Check if machine is a cluster machine - fastest way: Check if HKLM\Cluster exists
trap [Exception]
{
WriteTo-ErrorDebugReport -ErrorRecord $Error[0] -ScriptErrorText ("[isClusterNode] Remote Machine: $RemoteMachine")
$Error.Clear()
continue
}
$ClusterKey = "HKLM:\SYSTEM\CurrentControlSet\services\ClusSvc"
$RemoteScriptExecuted = $false
do
{
$IsClusterNode = $false
$NodeName = $null
if (Test-Path -Path $ClusterKey)
{
"Machine is cluster node: True" | WriteTo-StdOut -ShortFormat
$IsClusterNode = $true
$NodeName = $COMPUTERNAME
}
else
{
"Machine is cluster node: False" | WriteTo-StdOut -ShortFormat
#$NodeName = $COMPUTERNAME #_#
$NodeName = Get-DiagInput -Id ClusterNode -Parameter @{"Machine"=$COMPUTERNAME}
if (-not (($NodeName[0] -eq 0) -or ($null -eq $NodeName[0])))
{
$NodeName = $NodeName[0].ToUpper()
}
else
{
$NodeName = $null
}
if ($null -ne $NodeName)
{
"Customer selected cluster node: $NodeName" | WriteTo-StdOut -ShortFormat
$RemoteMachineOS = GetWin32OSFromRemoteSystem $NodeName
"Remote Machine OS Build: " + $RemoteMachineOS.BuildNumber | WriteTo-StdOut -ShortFormat
if ($null -ne $RemoteMachineOS)
{
if (($RemoteMachineOS.BuildNumber -lt 3790) -or ($RemoteMachineOS.ProductType -eq 1))
{
"Error: $NodeName is not a supported OS version. OS version of $NodeName is " + $RemoteMachineOS.Caption | WriteTo-StdOut
get-diaginput -id "ErrorContactingNode" -Parameter @{"Machine"=$NodeName; "Error"=($ScriptStrings.ID_EPSSelectNodesNotSupported.Replace("%Machine%",$NodeName).Replace("%OSName%",$RemoteMachineOS.Caption))}
}
else
{
if (isClusterNode $NodeName)
{
$IsClusterNode = $true
}
else
{
"Error: $NodeName is not a cluster node." | WriteTo-StdOut
get-diaginput -id "ErrorContactingNode" -Parameter @{"Machine"=$NodeName; "Error"=$ScriptStrings.ID_MachineIsNotaCluster.Replace("%Machine%", $NodeName)}
$IsClusterNode = $false
}
}
}
}
}
} while (-not $IsClusterNode)
#Now obtain the names of nodes by querying the cluster key
if ($IsClusterNode)
{
$Error.Clear()
trap [Exception]
{
WriteTo-ErrorDebugReport -ErrorRecord $_ -ScriptErrorText ("Querying remote registry on [" + $NodeName + "]")
continue
}
#Connect to remote Registry
$RemoteReg = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey('LocalMachine', $NodeName)
if ($Error.Count -eq 0)
{
trap [Exception]
{
WriteTo-ErrorDebugReport -ErrorRecord $_ -ScriptErrorText ("Querying cluster information [" + $NodeName + "]")
continue
}
$RemoteNodesKey = $RemoteReg.OpenSubKey("Cluster\Nodes")
if ($RemoteNodesKey.SubKeyCount -gt 0)
{
$ClusterName = $RemoteReg.OpenSubKey("Cluster", $false).GetValue("ClusterName").ToUpper()
$Choices = @()
foreach ($SubKey in $RemoteNodesKey.GetSubKeyNames())
{
$NodeMachineName = $RemoteReg.OpenSubKey("Cluster\Nodes\$SubKey", $false).GetValue("NodeName").ToUpper()
if ($NodeName -ne $NodeMachineName)
{
$ExtensionPoint = ""
} else {
#Set the node local machine (or machine indicated by customer) the default
$ExtensionPoint = "<Default/>"
}
$Choices += @{"Name"=$NodeMachineName;"Value"=$NodeMachineName;"Description"=$NodeMachineName;"ExtensionPoint"=$ExtensionPoint}
}
$TroubleshootingNodeNames = @()
"ClusterName: $ClusterName - Choices: " | WriteTo-StdOut
$Choices | WriteTo-StdOut
if ($Choices.Count -gt 0)
{
do
{
$TroubleshootingNodeNames += Get-DiagInput -Id "SelectNodes" -Parameter (@{"Cluster"=$ClusterName}) -Choice $Choices
} while ($TroubleshootingNodeNames.Count -eq 0)
if (($TroubleshootingNodeNames[0] -ne 0) -and ($TroubleshootingNodeNames.Count -ne 0))
{
if ($TroubleshootingNodeNames -contains "All")
{
foreach ($MachinName in $ClusterValues)
{
$MachineNames = $MachinName.Value
}
}
else
{
$MachineNames = $TroubleshootingNodeNames
}
Return $MachineNames
}
}
else
{
get-diaginput -id "ErrorContactingNode" -Parameter @{"Machine"=$NodeName; "Error"=$ScriptStrings.ID_EPSSelectNodesUnableObtainNames}
}
}
else
{
#Machine is a cluster node, but HKLM\Cluster does not exist. In this case proceed collecting information only from local machine.
return @($Env:COMPUTERNAME)
}
} else {
get-diaginput -id "ErrorContactingNode" -Parameter @{"Machine"=$NodeName; "Error"=$ScriptStrings.ID_UnableQueryRegistry.Replace("%ErrorMessage%", $Error[0].Exception.Message).Replace("%NodeName%", $NodeName)}
}
}
# SIG # Begin signature block
# MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAGsOR8IAyxIk+/
# gazI8LyUT19m2SUiCPADBXfOw2MoFqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKR8
# t459TPYtRIGkkQOD44aq/W+pF9mkPIm3cW9B3d6KMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAjTkN/m98UIbZy5x2KdxjB6yQNDpF/+xpFTLD
# 7hYgQN3neBxTktnl+RM5yUPGtY9sNZWvbElWXMrfaDlvn6+YGX3trwHS5Bq8X2WI
# UiqUigxRm4jKHvQypJHQiSy1fCBCn/g8uouapdEMnU6q1uEnxHpl3loTvISCuied
# c2hRRMQM1QUEwmCZPHABhMXNG+Wgmrry0evfZXjXbV1nD7sW3a8jsWR/AyxbJx/q
# J07Sm2RZKp2Z0X436wt493shjw2at55GEa3UXukKbLPwWyAsYRo57445AVfIBe4W
# c0Ih9iNjyozCZofM9rYrdOQeKVibAbut8+MOppPTvUAJ1zpqVqGCF60wghepBgor
# BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCD1F539drT1O+I7o8rL6mpIO+1o0FTUtAij
# c+RapMoVwwIGZv8ZfhGCGBMyMDI0MTAyODExNDAzOS41MTdaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9oMv
# JmpUXSLBAAEAAAH2MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwNFoXDTI1MTAyMjE4MzEwNFowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjZCMDUtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# 0UJeLMR/N9WPBZhuKVFF+eWJZ68Wujdj4X6JR05cxO5CepNXo17rVazwWLkm5Aja
# Vh19ZVjDChHzimxsoaXxNu8IDggKwpXvpAAItv4Ux50e9S2uVwfKv57p9JKG+Q7V
# ONShujl1NCMkcgSrPdmd/8zcsmhzcNobLomrCAIORZ8IwhYy4siVQlf1NKhlyAzm
# kWJD0N+60IiogFBzg3yISsvroOx0x1xSi2PiRIQlTXE74MggZDIDKqH/hb9FT2kK
# /nV/aXjuo9LMrrRmn44oYYADe/rO95F+SG3uuuhf+H4IriXr0h9ptA6SwHJPS2Vm
# bNWCjQWq5G4YkrcqbPMax7vNXUwu7T65E8fFPd1IuE9RsG4TMAV7XkXBopmPNfvL
# 0hjxg44kpQn384V46o+zdQqy5K9dDlWm/J6vZtp5yA1PyD3w+HbGubS0niEQ1L6w
# GOrPfzIm0FdOn+xFo48ERl+Fxw/3OvXM5CY1EqnzEznPjzJc7OJwhJVR3VQDHjBc
# EFTOvS9E0diNu1eocw+ZCkz4Pu/oQv+gqU+bfxL8e7PFktfRDlM6FyOzjP4zuI25
# gD8tO9zJg6g6fRpaZc439mAbkl3zCVzTLDgchv6SxQajJtvvoQaZxQf0tRiPcbr2
# HWfMoqqd9uiQ0hTUEhG44FBSTeUPZeEenRCWadCW4G8CAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBRIwZsJuOcJfScPWcXZuBA4B89K8jAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEA13kBirH1cHu1WYR1ysj125omGtQ0PaQkEzwGb70xtqSoI+svQihsgdTY
# xaPfp2IVFdgjaMaBi81wB8/nu866FfFKKdhdp3wnMZ91PpP4Ooe7Ncf6qICkgSuw
# gdIdQvqE0h8VQ5QW5sDV4Q0Jnj4f7KHYx4NiM8C4jTw8SQtsuxWiTH2Hikf3QYB7
# 1a7dB9zgHOkW0hgUEeWO9mh2wWqYS/Q48ASjOqYw/ha54oVOff22WaoH+/Hxd9NT
# EU/4vlvsRIMWT0jsnNI71jVArT4Q9Bt6VShWzyqraE6SKUoZrEwBpVsI0LMg2X3h
# OLblC1vxM3+wMyOh97aFOs7sFnuemtI2Mfj8qg16BZTJxXlpPurWrG+OBj4BoTDk
# C9AxXYB3yEtuwMs7pRWLyxIxw/wV9THKUGm+x+VE0POLwkrSMgjulSXkpfELHWWi
# CVslJbFIIB/4Alv+jQJSKAJuo9CErbm2qeDk/zjJYlYaVGMyKuYZ+uSRVKB2qkEP
# cEzG1dO9zIa1Mp32J+zzW3P7suJfjw62s3hDOLk+6lMQOR04x+2o17G3LceLkkxJ
# m41ErdiTjAmdClen9yl6HgMpGS4okjFCJX+CpOFX7gBA3PVxQWubisAQbL5HgTFB
# tQNEzcCdh1GYw/6nzzNNt+0GQnnobBddfOAiqkzvItqXjvGyK1QwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFU9eSpdxs0a0
# 6JFIuGFHIj/I+36ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJ4u8wIhgPMjAyNDEwMjgxMDE2MTVaGA8yMDI0
# MTAyOTEwMTYxNVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sni7wIBADAHAgEA
# AgIV+jAHAgEAAgISoDAKAgUA6ss0bwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA
# A4IBAQBpUFU4+vZJFyUmVb+WZWIYm85wWkaqUQMIXDa89AJRdEINZBYYuKJZHwGX
# evIycaqI5McGg28UnXlT85+VLHcRb2BqTBqlUDfyWMDDSi4/Ny1o+ihFohhs/ujQ
# uxkh2lsfu3f8RO+rHyvyoc6aVYoXpbsYsPsvWhlP5VIY3yXO7ztB9TdvoXXfsSMI
# GgIOURNjC5+mH+r4R0gkgrO/9ZkBSWax/DoAQGEOAQy9s6WfhPW9PTxIBkjbYnEx
# w84j1PW/7aPVhavzoHfT0fP7eh9eCNY9ax+AXoa/pOOruFzpjML3/3o9VRglqy6j
# vcBxO0h6Uf9FkqnHwg7BsMcIWiqvMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAH2gy8malRdIsEAAQAAAfYwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgJkLqoPMJmuH/grzTxsEQYLdwH+7Zhtv8FCkk4Or2+EQwgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCArYUzxlF6m5USLS4f8NXL/8aoNEVdsCZRmF+Ll
# QjG2ojCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 9oMvJmpUXSLBAAEAAAH2MCIEIFraBgk4xXajMAI68rUQCySUOKGDReEAQUOAuvhI
# wwAlMA0GCSqGSIb3DQEBCwUABIICAHY2QaSxLf8oXONTCIVQ+zG7tXo1tmk8/4yF
# EIdF5ZN4xBh/E18R7IKMOuNl59JjJArmFH2EhP3dwXamPauOo566AARN8muVWGoP
# K6f8cd6JGuDAGOGC0TlFclltLYuZROFPAgge1sbSLZzZKV/wgAuA1FxV9UFfsaAu
# fSxqAUE6vf6unJKWh965c77GyVvSNBF5cnW59NJHDupw13PjHqpty9LtpEGmJcli
# tZE/x13E5Wil+HC+C0lUyL5CM/Rg3xKwtViKE+CXQ9Og+SUaLuZ0LG/ZlIbh9KDs
# a3URIvbhZrC7geQrnEkylZ0dZH9hTj53uN8bjsIu/QQyW999NSue+EOZPttsyFwz
# 9mXAIOkL4UCz+f0SStjlMXVVjdOnixt0tl7KUGqSSWuOy+fuPIoFp0ILE6DUxzEE
# g2LSaeYwaJSrDNQsClKNsUHQi6zrCtEC/XqvfytjJ9BnzWoANaI2PFPESinrjwNO
# EG2yYYf8hdk1PLrK1vpf/d/GKObHcbwJ/LHYPBQ0aCkw1im+g2oqKS49UhFq+yCu
# kGFbBJI+o+MfVlFQDCI+EaaHNZaf+SrXx1lbKree+2AdXcfxSf8p7MYTM+o2a+qF
# xfgpGAIbV1aaRTxZIs69SXZzHk/g/N/YjU8mVUhsMrYAeF5UIB8bFHmSovE6ztlM
# fMFvFfU3
# SIG # End signature block
|
combined_dataset/train/non-malicious/Get-DatastoreMostFree.ps1
|
Get-DatastoreMostFree.ps1
|
#Parameter- Name of the VMware cluster the VM will be assigned to
function Get-DatastoreMostFree ($Cluster, [switch] $Second)
{
<#
.SYNOPSIS
Return the datastore in the cluster with the most unprovisioned disk space. This takes thin provisioning into account.
.DESCRIPTION
Queries all the datastores in the cluster and returns the datastore with the most free disk space. Used in conjunction with a mass cloning of virtual machines script. (Clone_Template_fromCSV.ps1)
.NOTES
1- You will need to modify the 2nd to last line's with criteria for your own environment. I'm filtering out anything that's designed to hold guest VMs, like any datastores hosting ISO files and template VMs.
2- Error and constraint checking need to be added. If you try to put a VM a full LUN it will fail.
.LINK
.EXAMPLE
Get-DatastoreMostFree.ps1 clustername
#>
# Prep
Set-Variable -Name ScriptDir -Value "\\\\vmscripthost201\\repo" -Scope Local
. $ScriptDir\\Get-mDataStoreList.ps1
# Amount of free space on a LUN for it to be an eligible target
$LUNSizeFreeMB = 300*1024
$DSTs = Get-mDataStoreList $Cluster
if (!$Second) {
$DST = $DSTs | Where-Object { $_.FreeSpaceMB -gt $LUNSizeFreeMB } | Select Name,@{n="Provisioned";e={($_.extensiondata.summary.capacity - $_.extensiondata.summary.freespace + $_.extensiondata.summary.Uncommitted)}} | Sort Provisioned -Descending | Select-Object -Last 1 -Property Name }
else {
$DST = $DSTs | Where-Object { $_.FreeSpaceMB -gt $LUNSizeFreeMB } | Select Name,@{n="Provisioned";e={($_.extensiondata.summary.capacity - $_.extensiondata.summary.freespace + $_.extensiondata.summary.Uncommitted)}} | Sort Provisioned -Descending | Select-Object -Last 2 | Select-Object -First 1 -Property Name }
write-output $dst
}
|
combined_dataset/train/non-malicious/1454.ps1
|
1454.ps1
|
function Install-CFileShare
{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[string]
$Name,
[Parameter(Mandatory=$true)]
[string]
$Path,
[string]
$Description = '',
[string[]]
$FullAccess = @(),
[string[]]
$ChangeAccess = @(),
[string[]]
$ReadAccess = @(),
[Switch]
$Force
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
function New-ShareAce
{
param(
[Parameter(Mandatory=$true)]
[AllowEmptyCollection()]
[string[]]
$Identity,
[Carbon.Security.ShareRights]
$ShareRight
)
Set-StrictMode -Version 'Latest'
foreach( $identityName in $Identity )
{
$trustee = ([wmiclass]'Win32_Trustee').CreateInstance()
[Security.Principal.SecurityIdentifier]$sid = Resolve-CIdentity -Name $identityName | Select-Object -ExpandProperty 'Sid'
if( -not $sid )
{
continue
}
$sidBytes = New-Object 'byte[]' $sid.BinaryLength
$sid.GetBinaryForm( $sidBytes, 0)
$trustee.Sid = $sidBytes
$ace = ([wmiclass]'Win32_Ace').CreateInstance()
$ace.AccessMask = $ShareRight
$ace.AceFlags = 0
$ace.AceType = 0
$ace.Trustee = $trustee
$ace
}
}
$errors = @{
[uint32]2 = 'Access Denied';
[uint32]8 = 'Unknown Failure';
[uint32]9 = 'Invalid Name';
[uint32]10 = 'Invalid Level';
[uint32]21 = 'Invalid Parameter';
[uint32]22 = 'Duplicate Share';
[uint32]23 = 'Restricted Path';
[uint32]24 = 'Unknown Device or Directory';
[uint32]25 = 'Net Name Not Found';
}
$Path = Resolve-CFullPath -Path $Path
$Path = $Path.Trim('\\')
if( $Path -eq (Split-Path -Qualifier -Path $Path ) )
{
$Path = Join-Path -Path $Path -ChildPath '\'
}
if( (Test-CFileShare -Name $Name) )
{
$share = Get-CFileShare -Name $Name
[bool]$delete = $false
if( $Force )
{
$delete = $true
}
if( $share.Path -ne $Path )
{
Write-Verbose -Message ('[SHARE] [{0}] Path {1} -> {2}.' -f $Name,$share.Path,$Path)
$delete = $true
}
if( $delete )
{
Uninstall-CFileShare -Name $Name
}
}
$shareAces = Invoke-Command -ScriptBlock {
New-ShareAce -Identity $FullAccess -ShareRight FullControl
New-ShareAce -Identity $ChangeAccess -ShareRight Change
New-ShareAce -Identity $ReadAccess -ShareRight Read
}
if( -not $shareAces )
{
$shareAces = New-ShareAce -Identity 'Everyone' -ShareRight Read
}
$shareSecurityDescriptor = ([wmiclass] "Win32_SecurityDescriptor").CreateInstance()
$shareSecurityDescriptor.DACL = $shareAces
$shareSecurityDescriptor.ControlFlags = "0x4"
if( -not (Test-CFileShare -Name $Name) )
{
if( -not (Test-Path -Path $Path -PathType Container) )
{
New-Item -Path $Path -ItemType Directory -Force | Out-String | Write-Verbose
}
$shareClass = Get-WmiObject -Class 'Win32_Share' -List
Write-Verbose -Message ('[SHARE] [{0}] Sharing {1}' -f $Name,$Path)
$result = $shareClass.Create( $Path, $Name, 0, $null, $Description, $null, $shareSecurityDescriptor )
if( $result.ReturnValue )
{
Write-Error ('Failed to create share ''{0}'' (Path: {1}). WMI returned error code {2} which means: {3}.' -f $Name,$Path,$result.ReturnValue,$errors[$result.ReturnValue])
return
}
}
else
{
$share = Get-CFileShare -Name $Name
$updateShare = $false
if( $share.Description -ne $Description )
{
Write-Verbose -Message ('[SHARE] [{0}] Description {1} -> {2}' -f $Name,$share.Description,$Description)
$updateShare = $true
}
foreach( $ace in $shareAces )
{
$identityName = Resolve-CIdentityName -SID $ace.Trustee.SID
$permission = Get-CFileSharePermission -Name $Name -Identity $identityName
if( -not $permission )
{
Write-Verbose -Message ('[SHARE] [{0}] Access {1}: -> {2}' -f $Name,$identityName,([Carbon.Security.ShareRights]$ace.AccessMask))
$updateShare = $true
}
elseif( [int]$permission.ShareRights -ne $ace.AccessMask )
{
Write-Verbose -Message ('[SHARE] [{0}] Access {1}: {2} -> {3}' -f $Name,$identityName,$permission.ShareRights,([Carbon.Security.ShareRights]$ace.AccessMask))
$updateShare = $true
}
}
$existingAces = Get-CFileSharePermission -Name $Name
foreach( $ace in $existingAces )
{
$identityName = $ace.IdentityReference.Value
$existingAce = $ace
if( $shareAces )
{
$existingAce = $shareAces | Where-Object {
$newIdentityName = Resolve-CIdentityName -SID $_.Trustee.SID
return ( $newIdentityName -eq $ace.IdentityReference.Value )
}
}
if( -not $existingAce )
{
Write-Verbose -Message ('[SHARE] [{0}] Access {1}: {2} ->' -f $Name,$identityName,$ace.ShareRights)
$updateShare = $true
}
}
if( $updateShare )
{
$result = $share.SetShareInfo( $share.MaximumAllowed, $Description, $shareSecurityDescriptor )
if( $result.ReturnValue )
{
Write-Error ('Failed to create share ''{0}'' (Path: {1}). WMI returned error code {2} which means: {3}' -f $Name,$Path,$result.ReturnValue,$errors[$result.ReturnValue])
return
}
}
}
}
Set-Alias -Name 'Install-SmbShare' -Value 'Install-CFileShare'
|
combined_dataset/train/non-malicious/Out-Html_2.ps1
|
Out-Html_2.ps1
|
################################################################################
# Out-HTML - converts cmdlets help to HTML format
# Based on Out-wiki by Dimitry Sotnikov (http://dmitrysotnikov.wordpress.com/2008/08/18/out-wiki-convert-powershell-help-to-wiki-format/)
#
# Modify the invocation line at the bottom of the script if you want to document
# fewer command, subsets or snapins
# Open default.htm to view in frameset or index.htm for index page with links.
################################################################################
# Created By: Vegard Hamar
################################################################################
param($outputDir = "./help")
function FixString {
param($in = "")
if ($in -eq $null) {
$in = ""
}
return $in.Replace("&", "&").Replace("<", "<").Replace(">", ">")
}
function Out-HTML {
param($commands = $null, $outputDir = "./help")
$commandsHelp = $commands | sort-object PSSnapIn, noun | get-help -full
#create an output directory
if ( -not (Test-Path $outputDir)) {
md $outputDir | Out-Null
}
#Generate frame page
$indexFileName = $outputDir + "/index.htm"
#Generate frameset
@'
<html>
<head>
<title>PowerShell Help</title>
</head>
<frameset cols="250,*">
<frame src="./index.htm" />
<frame src="" name="display"/>
</frameset>
</html>
'@ | Out-File "$outputDir/default.htm"
#Generate index
@'
<html>
<head>
<title>PowerShell Help</title>
</head>
<body>
'@ | out-file $indexFileName
$SnapIn = ""
foreach ($c in $commandsHelp) {
if ($SnapIn -ne $c.PSSnapIn.Name) {
"<a href='#" + $c.PSSnapIn.name + "'>* " + $c.PSSnapIn.Name.Replace(".", " ") + "</a></br>" | out-file $indexFileName -Append
$SnapIn = $c.PSSnapIn.Name
}
}
$SnapIn = ""
foreach ($c in $commandsHelp) {
if ($SnapIn -ne $c.PSSnapIn.Name) {
"<h3><a name='$($c.PSSnapIn.Name)'>" +$c.PSSnapIn.Name.Replace(".", " ") + "</a></h3>" | Out-File $indexFileName -Append
$SnapIn = $c.PSSnapIn.Name
}
"<a href='" + $c.name + ".htm' target='display'>* $($c.Name)</a></br>" | out-file $indexFileName -Append
}
#Generate all single help files
$outputText = $null
foreach ($c in $commandsHelp) {
$fileName = ( $outputDir + "/" + $c.Name + ".htm" )
@"
<html>
<head>
<title>$($c.Name)</title>
</head>
<body>
<h1>$($c.Name)</h1>
<div>$($c.synopsis)</div>
<h2> Syntax </h2>
<code>$(FixString($c.syntax | out-string -width 2000).Trim())</code>
<h2> Detailed Description </h2>
<div>$(FixString($c.Description | out-string -width 2000))</div>
<h2> Related Commands </h2>
<div>
"@ | out-file $fileName
foreach ($relatedLink in $c.relatedLinks.navigationLink) {
if($relatedLink.linkText -ne $null -and $relatedLink.linkText.StartsWith("about") -eq $false){
" * <a href='$($relatedLink.linkText).htm'>$($relatedLink.linkText)</a><br/>" | out-file $fileName -Append
}
}
@"
</div>
<h2> Parameters </h2>
<table border='1'>
<tr>
<th>Name</th>
<th>Description</th>
<th>Required?</th>
<th>Pipeline Input</th>
<th>Default Value</th>
</tr>
"@ | out-file $fileName -Append
$paramNum = 0
foreach ($param in $c.parameters.parameter ) {
@"
<tr valign='top'>
<td>$($param.Name) </td>
<td>$(FixString(($param.Description | out-string -width 2000).Trim())) </td>
<td>$(FixString($param.Required)) </td>
<td>$(FixString($param.PipelineInput)) </td>
<td>$(FixString($param.DefaultValue)) </td>
</tr>
"@ | out-file $fileName -Append
}
" </table>}" | out-file $fileName -Append
# Input Type
if (($c.inputTypes | Out-String ).Trim().Length -gt 0) {
@"
<h2> Input Type </h2>
<div>$(FixString($c.inputTypes | out-string -width 2000).Trim())</div>
"@ | out-file $fileName -Append
}
# Return Type
if (($c.returnValues | Out-String ).Trim().Length -gt 0) {
@"
<h2> Return Values </h2>
<div>$(FixString($c.returnValues | out-string -width 2000).Trim())</div>
"@ | out-file $fileName -Append
}
# Notes
if (($c.alertSet | Out-String).Trim().Length -gt 0) {
@"
<h2> Notes </h2>
"<div>$(FixString($c.alertSet | out-string -Width 2000).Trim())</div>
"@ | out-file $fileName -Append
}
# Examples
if (($c.examples | Out-String).Trim().Length -gt 0) {
" <h2> Examples </h2>" | out-file $fileName -Append
foreach ($example in $c.examples.example) {
@"
<h3> $(FixString($example.title.Trim(('-',' '))))</h3>
<pre>$(FixString($example.code | out-string ).Trim())</pre>
<div>$(FixString($example.remarks | out-string -Width 2000).Trim())</div>
"@ | out-file $fileName -Append
}
}
@"
</body>
</html>
"@ | out-file $fileName -Append
}
@"
</body>
</html>
"@ | out-file $indexFileName -Append
}
Out-HTML (Get-Command ) $outputDir
|
combined_dataset/train/non-malicious/sample_65_77.ps1
|
sample_65_77.ps1
|
# Input plugin to collect Windows Event Log messages
# This plugin ONLY supports Windows
[[inputs.win_eventlog]]
## Telegraf should have Administrator permissions to subscribe for some
## Windows Events channels (e.g. System log)
## LCID (Locale ID) for event rendering
## 1033 to force English language
## 0 to use default Windows locale
# locale = 0
## Name of eventlog, used only if xpath_query is empty
## Example: "Application"
# eventlog_name = ""
## xpath_query can be in defined short form like "Event/System[EventID=999]"
## or you can form a XML Query. Refer to the Consuming Events article:
## https://docs.microsoft.com/en-us/windows/win32/wes/consuming-events
## XML query is the recommended form, because it is most flexible
## You can create or debug XML Query by creating Custom View in Windows Event Viewer
## and then copying resulting XML here
xpath_query = '''
<QueryList>
<Query Id="0" Path="Security">
<Select Path="Security">*</Select>
<Suppress Path="Security">*[System[( (EventID >= 5152 and EventID <= 5158) or EventID=5379 or EventID=4672)]]</Suppress>
</Query>
<Query Id="1" Path="Application">
<Select Path="Application">*[System[(Level < 4)]]</Select>
</Query>
<Query Id="2" Path="Windows PowerShell">
<Select Path="Windows PowerShell">*[System[(Level < 4)]]</Select>
</Query>
<Query Id="3" Path="System">
<Select Path="System">*</Select>
</Query>
<Query Id="4" Path="Setup">
<Select Path="Setup">*</Select>
</Query>
</QueryList>
'''
## When true, event logs are read from the beginning; otherwise only future
## events will be logged.
# from_beginning = false
## Number of events to fetch in one batch
# event_batch_size = 5
# Process UserData XML to fields, if this node exists in Event XML
# process_userdata = true
# Process EventData XML to fields, if this node exists in Event XML
# process_eventdata = true
## Separator character to use for unrolled XML Data field names
# separator = "_"
## Get only first line of Message field. For most events first line is
## usually more than enough
# only_first_line_of_message = true
## Parse timestamp from TimeCreated.SystemTime event field.
## Will default to current time of telegraf processing on parsing error or if
## set to false
# timestamp_from_event = true
## System field names:
## "Source", "EventID", "Version", "Level", "Task", "Opcode", "Keywords",
## "TimeCreated", "EventRecordID", "ActivityID", "RelatedActivityID",
## "ProcessID", "ThreadID", "ProcessName", "Channel", "Computer", "UserID",
## "UserName", "Message", "LevelText", "TaskText", "OpcodeText"
##
## In addition to System, Data fields can be unrolled from additional XML
## nodes in event. Human-readable representation of those nodes is formatted
## into event Message field, but XML is more machine-parsable
## Event fields to include as tags
## The values below are included by default.
## Globbing supported (e.g. "Level*" matches both "Level" and "LevelText")
# event_tags = ["Source", "EventID", "Level", "LevelText", "Task", "TaskText", "Opcode", "OpcodeText", "Keywords", "Channel", "Computer"]
## Event fields to include
## All fields are sent by default.
## Globbing supported (e.g. "Level*" matches both "Level" and "LevelText")
# event_fields = ["*"]
## Event fields to exclude
## Note that if you exclude all fields then no metrics are produced. A valid
## metric includes at least one field.
## Globbing supported (e.g. "Level*" matches both "Level" and "LevelText")
# exclude_fields = []
## Event fields to exclude if their value is empty or equals to zero
## The values below are included by default.
## Globbing supported (e.g. "Level*" matches both "Level" and "LevelText")
# exclude_empty = ["Task", "Opcode", "*ActivityID", "UserID"]
|
combined_dataset/train/non-malicious/sample_13_9.ps1
|
sample_13_9.ps1
|
PARAM ( [string] $SiteToCheck = $null )
#************************************************
# DCSiteInfo.ps1
# Version 1.0
# Date: 1/14/2014
# Author: Tim Springston [MS]
# Description: This script queries for the computers domain
# and returns details about all domain controllers which are in
# the same site.
#************************************************
Trap [Exception]
{
# Handle exception and throw it to the stdout log file. Then continue with function and script.
$Script:ExceptionMessage = $_
"[info]: Exception occurred." | WriteTo-StdOut
"[info]: Exception.Message $ExceptionMessage." | WriteTo-StdOut
$Error.Clear()
continue
}
Import-LocalizedData -BindingVariable ADInfoStrings
Write-DiagProgress -Activity $AdInfoStrings.ID_ADInfo_Status -Status $AdInfoStrings.ID_ADInfo_Wait
#| WriteTo-StdOut -shortformat
$global:FormatEnumerationLimit = -1
#Define output file.
if ($SiteToCheck.Length -eq 0)
{$FileDescription = "Text File containing a list of domain controllers in the Active Directory site of the computer."}
else
{$FileDescription = "Text File containing a list of domain controllers in the Active Directory site of $SiteToCheck."}
$SectionDescription = "Active Directory Site Domain Controller List (TXT)"
$ExportFile = Join-Path $Pwd.Path ($ComputerName + "_SiteDCList.txt")
$SiteName = [System.DirectoryServices.ActiveDirectory.ActiveDirectorySite]::GetComputerSite()
"Listing domain controllers in site." | Out-File $ExportFile -Append
"AD Site for the computer is $SiteName" | Out-File $ExportFile -Append
"*********************************************************"| Out-File $ExportFile -Append
$DCCounter = 0
if ($SiteToCheck.Length -eq 0)
{
$SiteName = [System.DirectoryServices.ActiveDirectory.ActiveDirectorySite]::GetComputerSite()
$SiteName = $SiteName.ToString()
"Checking the computer's current Active Directory site of $SiteName" | Out-File $ExportFile -Append
$ForestInfo = [System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()
$Domains = $ForestInfo.get_Domains()
$SiteDCs = New-Object PSObject
ForEach ($Domain in $Domains)
{
$DCsInSite = $Domain.FindAllDomainControllers($SiteName)
ForEach ($DCInSite in $DCsInSite)
{
$DCObject = New-object PSObject
Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'DC Name' -Value $DCInSite.Name
Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'SiteName' -Value $DCInSite.SiteName
Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'Domain' -Value $DCInSite.Domain
Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'Forest' -Value $DCInSite.Forest
Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'IP Address' -Value $DCInSite.IPAddress
Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'Roles' -Value $DCInSite.Roles
Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'HighestCommittedUSN' -Value $DCInSite.HighestCommittedUSN
Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'OSVersion' -Value $DCInSite.OSVersion
"DC details found for $DCInSite.Name" | Out-File $ExportFile -Append
$DCObject | Out-File $ExportFile -Append
$DCObject = $null
$DCCounter++
}
}
}
else
{
"Checking the user specified Active Directory site of $SiteToCheck" | Out-File $ExportFile -Append
$ForestInfo = [System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()
$Domains = $ForestInfo.get_Domains()
#$SiteDCs = New-Object PSObject
ForEach ($Domain in $Domains)
{
$DCsInSite = $Domain.FindAllDomainControllers($SiteToCheck)
ForEach ($DCInSite in $DCsInSite)
{
$DCObject = New-object PSObject
Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'DC Name' -Value $DCInSite.Name
Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'SiteName' -Value $DCInSite.SiteName
Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'Domain' -Value $DCInSite.Domain
Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'Forest' -Value $DCInSite.Forest
Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'IP Address' -Value $DCInSite.IPAddress
Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'Roles' -Value $DCInSite.Roles
Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'HighestCommittedUSN' -Value $DCInSite.HighestCommittedUSN
Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'OSVersion' -Value $DCInSite.OSVersion
"DC details found for $DCInSite.Name" | Out-File $ExportFile -Append
$DCObject | Out-File $ExportFile -Append
$DCObject = $null
$DCCounter++
}
}
}
if ($DCCounter -eq 0)
{
"The local site $SiteName does not have local domain controllers." | Out-File $ExportFile -Append
}
CollectFiles -filesToCollect $ExportFile -fileDescription $FileDescription -sectionDescription $SectionDescription -renameOutput $false
# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCEPGrnoWQ8QXC2
# 8+IrQCeO863gz4uBKR0w1SgHUXS2/KCCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHmH
# jHuiLbFQVCru3hOTWjQDTIYydawXMZU00f8TW5RDMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAMRy3bvukrmUkielELNoGaFfsBJC6ESy2QatS
# mbm0TQDT2dLcUWx00Z2tkk1/Z790HM8A/aptn8MicyMW45guWl+B9+GgYEEcX6zK
# oeoo0H9KwN6FL8r8r2FSKxUuGfnM8RZ41kG/2UlOLpeUqSakP6EgJc58VF5vTjyL
# ALd6Dd7uOEqnDvJ9m4z/pJ7ZZ0KmavOxQzT1b4j81YZ9CKsZWQ6z91T2uhH1+FfS
# WHRcQFl2FNnGVbO7K0Tr4YkvaLtdbUJcK2C2YcDvT2UWevi4+dBnHuLghMI0OVvZ
# 7PwBcNoDceb9d2ka8KXe0ajza8qXYzwUPc8TBIKWTsOSgGURkKGCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCAQ10W83xX47WR7N299cAt968Db72X7s9iJ
# V6CfYjsg0gIGZxp+Oc3xGBMyMDI0MTAyODExNDA0NS41MTlaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAfGzRfUn6MAW1gAB
# AAAB8TANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1NTVaFw0yNTAzMDUxODQ1NTVaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCxulCZttIf8X97rW9/J+Q4
# Vg9PiugB1ya1/DRxxLW2hwy4QgtU3j5fV75ZKa6XTTQhW5ClkGl6gp1nd5VBsx4J
# b+oU4PsMA2foe8gP9bQNPVxIHMJu6TYcrrn39Hddet2xkdqUhzzySXaPFqFMk2Vi
# fEfj+HR6JheNs2LLzm8FDJm+pBddPDLag/R+APIWHyftq9itwM0WP5Z0dfQyI4Wl
# VeUS+votsPbWm+RKsH4FQNhzb0t/D4iutcfCK3/LK+xLmS6dmAh7AMKuEUl8i2kd
# WBDRcc+JWa21SCefx5SPhJEFgYhdGPAop3G1l8T33cqrbLtcFJqww4TQiYiCkdys
# CcnIF0ZqSNAHcfI9SAv3gfkyxqQNJJ3sTsg5GPRF95mqgbfQbkFnU17iYbRIPJqw
# gSLhyB833ZDgmzxbKmJmdDabbzS0yGhngHa6+gwVaOUqcHf9w6kwxMo+OqG3QZIc
# wd5wHECs5rAJZ6PIyFM7Ad2hRUFHRTi353I7V4xEgYGuZb6qFx6Pf44i7AjXbptU
# olDcVzYEdgLQSWiuFajS6Xg3k7Cy8TiM5HPUK9LZInloTxuULSxJmJ7nTjUjOj5x
# wRmC7x2S/mxql8nvHSCN1OED2/wECOot6MEe9bL3nzoKwO8TNlEStq5scd25GA0g
# MQO+qNXV/xTDOBTJ8zBcGQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLy2xe59sCE0
# SjycqE5Erb4YrS1gMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDhSEjSBFSCbJyl
# 3U/QmFMW2eLPBknnlsfID/7gTMvANEnhq08I9HHbbqiwqDEHSvARvKtL7j0znICY
# BbMrVSmvgDxU8jAGqMyiLoM80788So3+T6IZV//UZRJqBl4oM3bCIQgFGo0VTeQ6
# RzYL+t1zCUXmmpPmM4xcScVFATXj5Tx7By4ShWUC7Vhm7picDiU5igGjuivRhxPv
# bpflbh/bsiE5tx5cuOJEJSG+uWcqByR7TC4cGvuavHSjk1iRXT/QjaOEeJoOnfes
# bOdvJrJdbm+leYLRI67N3cd8B/suU21tRdgwOnTk2hOuZKs/kLwaX6NsAbUy9pKs
# DmTyoWnGmyTWBPiTb2rp5ogo8Y8hMU1YQs7rHR5hqilEq88jF+9H8Kccb/1ismJT
# GnBnRMv68Ud2l5LFhOZ4nRtl4lHri+N1L8EBg7aE8EvPe8Ca9gz8sh2F4COTYd1P
# Hce1ugLvvWW1+aOSpd8NnwEid4zgD79ZQxisJqyO4lMWMzAgEeFhUm40FshtzXud
# AsX5LoCil4rLbHfwYtGOpw9DVX3jXAV90tG9iRbcqjtt3vhW9T+L3fAZlMeraWfh
# 7eUmPltMU8lEQOMelo/1ehkIGO7YZOHxUqeKpmF9QaW8LXTT090AHZ4k6g+tdpZF
# fCMotyG+E4XqN6ZWtKEBQiE3xL27BDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQD7n7Bk4gsM2tbU/i+M3BtRnLj096CBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smZujAi
# GA8yMDI0MTAyODA1MDM1NFoYDzIwMjQxMDI5MDUwMzU0WjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDqyZm6AgEAMAcCAQACAgaxMAcCAQACAhPGMAoCBQDqyus6AgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAA0BaKsAtdDQTH1mQ1AYUo/KxlS4
# RtFuuuP4gPyvI62JGK76KDo1S6HM+ctaAw8utdUJxDxdBIT7YVtf3EsB6ahF9dyV
# II0TJFjSP8cCJOTC5jRGlCifOuJzCDhxwQQAhSXeWAkO4VhE7gDZPP8iKAQ1S6eX
# o0xnFmuVzKYGWRGUrO7HxP5nS8g4cZRiZaQEiMHRdB8GJDJLV2TUfd6Hut03mT2z
# +RLogrNkAFxK/6rNsuyXu+FFy81XbveHgyGjD6chYE3AuUByswKrW/SRVmzMrGVD
# /QhwaIDDpkpr3XNM9N/LMrmVoP4y9JQ4hhbVj5wZ6XL5rCe5OY1v86QJAdwxggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfGz
# RfUn6MAW1gABAAAB8TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCeWWBJ62A+xx0ukflXQvf2nHrH
# gKd+8+6vu+OqOuREnDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINV3/T5h
# S7ijwao466RosB7wwEibt0a1P5EqIwEj9hF4MIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHxs0X1J+jAFtYAAQAAAfEwIgQg8PuciiVY
# Q85s2ehb7/+SpISkahbpSB/VJgG8R7IGdAkwDQYJKoZIhvcNAQELBQAEggIAXL4e
# wH14cyZ/yqPiZDrQ+kaUYEQ8f6csHR6GS5du9JaHC3cOm1iXvSbffEJS2lwV4xXw
# oXtqPOR3StnnZWkRffUPy2SP3uA2wLGBSYV4C8LqaByKvjkPbs8uShNFCfO/daXR
# tC4bunQlkXIHUkMXXUfuQ0Jli0p7074HoWH443OoqG3P5y6sg34gXYnjx0jzzX0G
# /PtxZfYt8oAVCIGbl3kLbwQqXe+c5E45St/BZm5aAonRcx3WZp17e5/m6jhHEvJu
# NA4fm6fkcnp2IxUpNCCOUOAu1Mb2EX6svgXYrwvbtdrV9llGNaBZRZnvbLgPj/Ko
# YeZX9ULEz9rKOuVon+y9T2QatgMAYtbU7EFZ5l9KyubtwlsRLUViwwRHg9pawb0k
# 12AzzSQc3YiLL4/VhaV8969+Dvla8F14QOYyL8cLKQL4yWUWrCDmVvN3e1H33fke
# 4064bHsYonlBrNOk6UemYkB1haZkx0AYNY+UQu7F7umuWwRPSAIYJSOWe5PSE17x
# L9yz83hJa2hwj9RLcTd/k6XfeyfOD7Gisoy7fVVFWeclm6+eMCa6XdvD6IE6PjZV
# ze7UZwQ0bI9CgMjLqX+l1Ald8CTTAjhoC0V+7gZaABtJwjRcpXM6NUqwWbNgxvpe
# nP28DYwCDHJYNkb4sDJQOPQkyluJQkN1FLacWYc=
# SIG # End signature block
|
combined_dataset/train/non-malicious/3915.ps1
|
3915.ps1
|
function Test-ListPriceSheets
{
$priceSheets = Get-AzConsumptionPriceSheet -Top 5
Assert-NotNull $priceSheets
Assert-NotNull $priceSheets.Id
Assert-NotNull $priceSheets.Name
Assert-NotNull $priceSheets.Type
$priceSheetProperties = $priceSheets.PriceSheets
Assert-NotNull $priceSheetProperties
Assert-AreEqual 5 $priceSheetProperties.Count
Foreach($psp in $priceSheetProperties)
{
Assert-NotNull $psp.BillingPeriodId
Assert-NotNull $psp.CurrencyCode
Assert-NotNull $psp.IncludedQuantity
Assert-Null $psp.MeterDetails
Assert-NotNull $psp.MeterId
Assert-NotNull $psp.PartNumber
Assert-NotNull $psp.UnitOfMeasure
Assert-NotNull $psp.UnitPrice
}
}
function Test-ListPriceSheetsWithMeterDetailsExpand
{
$priceSheets = Get-AzConsumptionPriceSheet -ExpandMeterDetail -Top 5
Assert-NotNull $priceSheets
Assert-NotNull $priceSheets.Id
Assert-NotNull $priceSheets.Name
Assert-NotNull $priceSheets.Type
$priceSheetProperties = $priceSheets.PriceSheets
Assert-NotNull $priceSheetProperties
Assert-AreEqual 5 $priceSheetProperties.Count
Foreach($psp in $priceSheetProperties)
{
Assert-NotNull $psp.BillingPeriodId
Assert-NotNull $psp.CurrencyCode
Assert-NotNull $psp.IncludedQuantity
Assert-NotNull $psp.MeterDetails
Assert-NotNull $psp.MeterId
Assert-NotNull $psp.PartNumber
Assert-NotNull $psp.UnitOfMeasure
Assert-NotNull $psp.UnitPrice
}
}
function Test-ListBillingPeriodPriceSheets
{
$priceSheets = Get-AzConsumptionPriceSheet -BillingPeriodName 201712 -Top 5
Assert-NotNull $priceSheets
Assert-NotNull $priceSheets.Id
Assert-NotNull $priceSheets.Name
Assert-NotNull $priceSheets.Type
$priceSheetProperties = $priceSheets.PriceSheets
Assert-NotNull $priceSheetProperties
Assert-AreEqual 5 $priceSheetProperties.Count
Foreach($psp in $priceSheetProperties)
{
Assert-NotNull $psp.BillingPeriodId
Assert-NotNull $psp.CurrencyCode
Assert-NotNull $psp.IncludedQuantity
Assert-Null $psp.MeterDetails
Assert-NotNull $psp.MeterId
Assert-NotNull $psp.PartNumber
Assert-NotNull $psp.UnitOfMeasure
Assert-NotNull $psp.UnitPrice
}
}
|
combined_dataset/train/non-malicious/sample_20_40.ps1
|
sample_20_40.ps1
|
ConvertFrom-StringData @'
id_printsettmpsystem32check_st=One or more TMP file found under system32 folder and this may cause problems to install printer drivers
'@
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDEpubIm4uv9qRj
# 9OskpCl82R8YrNVkyhclnRFJKZJZMqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKwGPUJjR0X/U8VVRx366vuB
# wYQnxucX/KB2tSt+//fKMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAHUt2s1BB/I/ngAwjwDxqcHCOw+uhE8BsajNZEvjpBQdIU9hk2YHU2JCJ
# MhAnNfYLINmENW5+4WBdVwGOUrwydzfpOY1i+xTyTBIruxzMSjtYnNzxl2a900Kn
# DTBbknTmF5kQgX+LqKVqb3pzX7jHRjdnalk0Dc/wjixpqUr6HDGEWgPecSI70uLL
# 9DjcNvZ02VZ/pDhbfvYDYULasgYYeVvXVDPQ4tGRPj9BHnAINTvXbro37lNTFIg+
# aDOB6Axs2I5I0KwY0cFJ+RrtszigBVRZMdyomkbOsfPkFKLsqBpEv76KqUjbEQgG
# WFFKHU8LYBfAqvMB6nN8Pn+TUDHa46GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCRi14LBaeQVmJ/3BuUDVvarJ6UFxg9kXHR9AYek4+y5wIGZxp9zsoL
# GBMyMDI0MTAyODExNDA0MS4wNzVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2
# MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfX
# hlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjH
# tivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQ
# SmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56x
# YPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhb
# w+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvni
# P7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+s
# yO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E4
# 1j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA
# 7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj
# 8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+X
# xwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w6
# 1FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4
# Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEB
# PJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRAB
# TUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxe
# wCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1r
# gReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3
# ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QT
# STtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRi
# KsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8
# nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCAL
# t0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu
# +gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smZTzAiGA8yMDI0MTAyODA1MDIw
# N1oYDzIwMjQxMDI5MDUwMjA3WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqyZlP
# AgEAMAoCAQACAgMdAgH/MAcCAQACAhM2MAoCBQDqyurPAgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAKdpPIdnmDurw1W3KjddEyaQMnw+EyRSLq+zprTP8t/0
# ieGI79w2e6dpTuLIeBbTED1C/5vFaZhn3mit4LVJEIdMu9b2d8cWo3hrWDMqssZA
# AGH3NNXRuQwPBIwzaTXVg8edpOImVomm0IlTA6TpSFjiSAij1Vxwohz3Men9w/M4
# fV0H5QtmVhWsq9bthffWvfyFz7mf6eSXX6VsSUsp/U8wwe3Z+xy/ccjeORHi3Um6
# IgANr2SLaO4c8JKNi9YyCO450ksm8NLZx2wEh8rG5dOylqGX8SZTVNxQg8uGM0FR
# AEmTVQHT+Dvp3RsLMVX2f+49GvWR4VL26Voga63vAFkxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfPFCkOuA8wdMQABAAAB
# 8zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCDWRV5Y2YBvs9I/nz+EfkgmqL6JOqQU5c73J87sljrz
# OjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi82TSLtuG4Vkp8wBmJk/T+
# RAh841sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQg9GCVSbXiruUvANYshaHmkS8a
# AUtp4TeTu/csllVDepIwDQYJKoZIhvcNAQELBQAEggIAOWSP3oGj9DZbX8IFhUkW
# 2t3dmwokPHDNN0nCFgX3q+TWiToNsb5o5ageSSKY5FXlexwX/paFqy+7qFG2B88M
# 7WtB1kxLZLNa8SKRWinMuxV+9JZpBasdxGpWHm7xVBFXMHcXS4eA9Kx4zANKB8pF
# sqVvBUg/DnEo5UUYXB0os0XkzJ6LTULhf90sUtgK6Gynht7NuKf6EGKhGcBiKrce
# OsHtAMpkeLqazZeBWnOmn8KhDOcSNC7xGflVE+l09JhhQRfiz2tyf+AswNIQ3gIa
# LUSmJHx2a51l02vR9JQ+LXghS3OZaPSOHgHK2QchOHN1tRi2oKG/c8jQby7HlWj1
# nYZ4yOUCZkMX5yKm2Ydzd4ttSIBsEHCGz48QKpvJTM1SbognIV8H5gO4vAZi0+AL
# PEyEuZQn+amhQ+TsDKcMLw4CKXqIlYwwGqr7M7JGjvXGH80zxA4gr+FRMeHyPT6m
# GxxeTk63spTQbPPezsyhNR3IzFzzEiEGJddoTiaSn2XOD+hRe/UaYcmXqCLwO7vX
# iR7/zTJjK0YUjWmnzeeO3fJiqqAdetZvyS7Xi1NYL8bJNyqILSq9htqU/K6J+aff
# O1owdolUElw+Xb2mFkXeRMQWWu18wirptUr8VVOH8I+4S0WkBDP8AdifYgIg1CZS
# /+/fbHFAmdKFP+3KNRtmWLQ=
# SIG # End signature block
|
combined_dataset/train/non-malicious/ISE-CopyOutPutToEditor_1.ps1
|
ISE-CopyOutPutToEditor_1.ps1
|
function ISE-CopyOutPutToEditor () {
$count = $psise.CurrentOpenedRunspace.OpenedFiles.count
$psIse.CurrentOpenedRunspace.OpenedFiles.Add()
$Newfile = $psIse.CurrentOpenedRunspace.OpenedFiles[$count]
$Newfile.Editor.Text = $psIse.CurrentOpenedRunspace.output.Text
$Newfile.Editor.Focus()
}
$null = $psIse.CustomMenu.Submenus.Add("Copy Output to Editor", {ISE-CopyOutPutToEditor}, 'Ctrl+O')
|
combined_dataset/train/non-malicious/sample_15_51.ps1
|
sample_15_51.ps1
|
# Copyright (c) Microsoft Corporation.
# Licensed under the MIT License.
Microsoft.PowerShell.Management\Get-Item function:Clear-Host | Microsoft.PowerShell.Management\Set-Item function:__clearhost
function Clear-Host {
[Alias('cls')]
param()
__clearhost
if ($host.Runspace.LanguageMode -eq [System.Management.Automation.PSLanguageMode]::FullLanguage) {
$psEditor.Window.Terminal.Clear()
}
}
if (!$IsMacOS -or $IsLinux) {
Microsoft.PowerShell.Utility\Set-Alias -Name clear -Value Clear-Host -Option AllScope
}
# SIG # Begin signature block
# MIIr5wYJKoZIhvcNAQcCoIIr2DCCK9QCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAbovJceGZv5iie
# oFeWBCUcylf9xUhhSdEO8vRtO0aojKCCEW4wggh+MIIHZqADAgECAhM2AAAB33OB
# lxa+Mv0NAAIAAAHfMA0GCSqGSIb3DQEBCwUAMEExEzARBgoJkiaJk/IsZAEZFgNH
# QkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxFTATBgNVBAMTDEFNRSBDUyBDQSAwMTAe
# Fw0yNDAxMjAwMTMzNDRaFw0yNTAxMTkwMTMzNDRaMCQxIjAgBgNVBAMTGU1pY3Jv
# c29mdCBBenVyZSBDb2RlIFNpZ24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
# AoIBAQDVucAmkbIWpspYysyydQyyRh2L8q5igYFcy2vDk8xGvVMRBhxwbOsJIEd0
# wY8N7WU/xgkYMnSsM4vmc2B49DGdrAjSJqbsx0zf+DLFjrBITUecdRhlq0VKGX8U
# bVOkg0aIfFNLRs4DSrCZYh26zyB8qkL/jUmB7DhcBEhhgOlXRQ4LHnUv7qf+iXqD
# uwFz9tUTAh8JGsgLRBK0oSsRfUB+FJF2KyUxzmeFXJKiEynsWz4kqoM91ag1Yw0U
# 8d0e+RgAKi3Ft1cXA+3qKM6I1H11e/NdIjh7oThvrBtfEngwlwbTF3KZOHdhLBFZ
# 18U4v8VeTlb4r94346CY2+SKnQa7AgMBAAGjggWKMIIFhjApBgkrBgEEAYI3FQoE
# HDAaMAwGCisGAQQBgjdbAQEwCgYIKwYBBQUHAwMwPQYJKwYBBAGCNxUHBDAwLgYm
# KwYBBAGCNxUIhpDjDYTVtHiE8Ys+hZvdFs6dEoFgg93NZoaUjDICAWQCAQ4wggJ2
# BggrBgEFBQcBAQSCAmgwggJkMGIGCCsGAQUFBzAChlZodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F
# JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDEu
# YW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUy
# MDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDIuYW1lLmdibC9haWEv
# QlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBS
# BggrBgEFBQcwAoZGaHR0cDovL2NybDMuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAx
# LkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZG
# aHR0cDovL2NybDQuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F
# JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDCBrQYIKwYBBQUHMAKGgaBsZGFwOi8vL0NO
# PUFNRSUyMENTJTIwQ0ElMjAwMSxDTj1BSUEsQ049UHVibGljJTIwS2V5JTIwU2Vy
# dmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1BTUUsREM9R0JM
# P2NBQ2VydGlmaWNhdGU/YmFzZT9vYmplY3RDbGFzcz1jZXJ0aWZpY2F0aW9uQXV0
# aG9yaXR5MB0GA1UdDgQWBBSO7i0qme7tjtjFjyuIjlmGM6cbCTAOBgNVHQ8BAf8E
# BAMCB4AwRQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3Jh
# dGlvbjEWMBQGA1UEBRMNMjM2MTY3KzUwMTk3MDCCAeYGA1UdHwSCAd0wggHZMIIB
# 1aCCAdGgggHNhj9odHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ1JM
# L0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwxLmFtZS5nYmwv
# Y3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwyLmFtZS5n
# YmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwzLmFt
# ZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmw0
# LmFtZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGgb1sZGFwOi8v
# L0NOPUFNRSUyMENTJTIwQ0ElMjAwMSgyKSxDTj1CWTJQS0lDU0NBMDEsQ049Q0RQ
# LENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZp
# Z3VyYXRpb24sREM9QU1FLERDPUdCTD9jZXJ0aWZpY2F0ZVJldm9jYXRpb25MaXN0
# P2Jhc2U/b2JqZWN0Q2xhc3M9Y1JMRGlzdHJpYnV0aW9uUG9pbnQwHwYDVR0jBBgw
# FoAUllGE4Gtve/7YBqvD8oXmKa5q+dQwHwYDVR0lBBgwFgYKKwYBBAGCN1sBAQYI
# KwYBBQUHAwMwDQYJKoZIhvcNAQELBQADggEBAJe/YXNSCoXitLf/X5pfJZpep3cs
# jdqmBgg+8Kr++8XMjWwdm4tiLasJMUPCgmp5NYn3wC4GefGYwfF7Xm2FMSR2i6QU
# HjigGu6BjdWQh4EwGaNqXLkXlUM7Ww2Z0KrRtpCL16DCOTNZuCFPAytSHFskPWrr
# 6q3EBuiM6P5VLgFSKiAxcunldJorbrBrvZSZib1OINzFGAQszUR0ytovW6FOp+uo
# VhiQCqnOheC1ppnZPss7vnXoogyO0xgSW40bRlltGfwnlOd3IZ/43ZOj5XeeShg5
# 2SzVEiyYrZjD17MSNzQM1JKI07+mtAC7D+eZ/+g2pM/91oHcrDq9Nq4QrS0wggjo
# MIIG0KADAgECAhMfAAAAUeqP9pxzDKg7AAAAAABRMA0GCSqGSIb3DQEBCwUAMDwx
# EzARBgoJkiaJk/IsZAEZFgNHQkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxEDAOBgNV
# BAMTB2FtZXJvb3QwHhcNMjEwNTIxMTg0NDE0WhcNMjYwNTIxMTg1NDE0WjBBMRMw
# EQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQD
# EwxBTUUgQ1MgQ0EgMDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDJ
# mlIJfQGejVbXKpcyFPoFSUllalrinfEV6JMc7i+bZDoL9rNHnHDGfJgeuRIYO1LY
# /1f4oMTrhXbSaYRCS5vGc8145WcTZG908bGDCWr4GFLc411WxA+Pv2rteAcz0eHM
# H36qTQ8L0o3XOb2n+x7KJFLokXV1s6pF/WlSXsUBXGaCIIWBXyEchv+sM9eKDsUO
# LdLTITHYJQNWkiryMSEbxqdQUTVZjEz6eLRLkofDAo8pXirIYOgM770CYOiZrcKH
# K7lYOVblx22pdNawY8Te6a2dfoCaWV1QUuazg5VHiC4p/6fksgEILptOKhx9c+ia
# piNhMrHsAYx9pUtppeaFAgMBAAGjggTcMIIE2DASBgkrBgEEAYI3FQEEBQIDAgAC
# MCMGCSsGAQQBgjcVAgQWBBQSaCRCIUfL1Gu+Mc8gpMALI38/RzAdBgNVHQ4EFgQU
# llGE4Gtve/7YBqvD8oXmKa5q+dQwggEEBgNVHSUEgfwwgfkGBysGAQUCAwUGCCsG
# AQUFBwMBBggrBgEFBQcDAgYKKwYBBAGCNxQCAQYJKwYBBAGCNxUGBgorBgEEAYI3
# CgMMBgkrBgEEAYI3FQYGCCsGAQUFBwMJBggrBgEFBQgCAgYKKwYBBAGCN0ABAQYL
# KwYBBAGCNwoDBAEGCisGAQQBgjcKAwQGCSsGAQQBgjcVBQYKKwYBBAGCNxQCAgYK
# KwYBBAGCNxQCAwYIKwYBBQUHAwMGCisGAQQBgjdbAQEGCisGAQQBgjdbAgEGCisG
# AQQBgjdbAwEGCisGAQQBgjdbBQEGCisGAQQBgjdbBAEGCisGAQQBgjdbBAIwGQYJ
# KwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMBIGA1UdEwEB/wQI
# MAYBAf8CAQAwHwYDVR0jBBgwFoAUKV5RXmSuNLnrrJwNp4x1AdEJCygwggFoBgNV
# HR8EggFfMIIBWzCCAVegggFToIIBT4YxaHR0cDovL2NybC5taWNyb3NvZnQuY29t
# L3BraWluZnJhL2NybC9hbWVyb290LmNybIYjaHR0cDovL2NybDIuYW1lLmdibC9j
# cmwvYW1lcm9vdC5jcmyGI2h0dHA6Ly9jcmwzLmFtZS5nYmwvY3JsL2FtZXJvb3Qu
# Y3JshiNodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9hbWVyb290LmNybIaBqmxkYXA6
# Ly8vQ049YW1lcm9vdCxDTj1BTUVSb290LENOPUNEUCxDTj1QdWJsaWMlMjBLZXkl
# MjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPUFNRSxE
# Qz1HQkw/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNz
# PWNSTERpc3RyaWJ1dGlvblBvaW50MIIBqwYIKwYBBQUHAQEEggGdMIIBmTBHBggr
# BgEFBQcwAoY7aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL2NlcnRz
# L0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6Ly9jcmwyLmFt
# ZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6
# Ly9jcmwzLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUH
# MAKGK2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQw
# gaIGCCsGAQUFBzAChoGVbGRhcDovLy9DTj1hbWVyb290LENOPUFJQSxDTj1QdWJs
# aWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9u
# LERDPUFNRSxEQz1HQkw/Y0FDZXJ0aWZpY2F0ZT9iYXNlP29iamVjdENsYXNzPWNl
# cnRpZmljYXRpb25BdXRob3JpdHkwDQYJKoZIhvcNAQELBQADggIBAFAQI7dPD+jf
# XtGt3vJp2pyzA/HUu8hjKaRpM3opya5G3ocprRd7vdTHb8BDfRN+AD0YEmeDB5HK
# QoG6xHPI5TXuIi5sm/LeADbV3C2q0HQOygS/VT+m1W7a/752hMIn+L4ZuyxVeSBp
# fwf7oQ4YSZPh6+ngZvBHgfBaVz4O9/wcfw91QDZnTgK9zAh9yRKKls2bziPEnxeO
# ZMVNaxyV0v152PY2xjqIafIkUjK6vY9LtVFjJXenVUAmn3WCPWNFC1YTIIHw/mD2
# cTfPy7QA1pT+GPARAKt0bKtq9aCd/Ym0b5tPbpgCiRtzyb7fbNS1dE740re0COE6
# 7YV2wbeo2sXixzvLftH8L7s9xv9wV+G22qyKt6lmKLjFK1yMw4Ni5fMabcgmzRvS
# jAcbqgp3tk4a8emaaH0rz8MuuIP+yrxtREPXSqL/C5bzMzsikuDW9xH10graZzSm
# PjilzpRfRdu20/9UQmC7eVPZ4j1WNa1oqPHfzET3ChIzJ6Q9G3NPCB+7KwX0OQmK
# yv7IDimj8U/GlsHD1z+EF/fYMf8YXG15LamaOAohsw/ywO6SYSreVW+5Y0mzJutn
# BC9Cm9ozj1+/4kqksrlhZgR/CSxhFH3BTweH8gP2FEISRtShDZbuYymynY1un+Ry
# fiK9+iVTLdD1h/SxyxDpZMtimb4CgJQlMYIZzzCCGcsCAQEwWDBBMRMwEQYKCZIm
# iZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQDEwxBTUUg
# Q1MgQ0EgMDECEzYAAAHfc4GXFr4y/Q0AAgAAAd8wDQYJYIZIAWUDBAIBBQCgga4w
# GQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisG
# AQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIANJ0YnRQMG0nOCoBWeq736xqzn1ybGz
# lb/yzwInv3qpMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYA
# dKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEA
# pkbr1yTMO3bjKvXcXS1tIThjxOyAXN33x367JOEf+v5BN8/Wi0dqb2l2sBPKcDQl
# uDhxv+047cfn1AUwcExCmoIRTKoE65HHLOdllkTeqmx6a+GRHfv8lxIq3dLuvVWf
# FM/0DjFvNOUzyQpYkmKvh0dGGlaIVY6KYpJ8q5PiO7iTt/0ocHmVG4BsqS+24AXm
# VStsi6n6/3zqghC+TQkZg6FJER9qGfK7AZDnRjVdONyU6xJshxB3yidoZyu0LuVX
# OLeKRyRvNWuTbKSSKE3RdtJ1fSnSOqWVfbGIv5riKr0T7yOzQNdJLPEsWgetdonM
# 7yjzGDWFCq6HjTOu3KXJz6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCCF38GCSqG
# SIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0B
# CRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUA
# BCAy5fjQM+2rNKT/xtjyy2gRqFKB1wDkSOGKJPV5wQwFrwIGZfxpJR9WGBMyMDI0
# MDQwMzIxMzM0MC4wNTlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEG
# A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj
# cm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBP
# cGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0wNUUwLUQ5
# NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHtMIIH
# IDCCBQigAwIBAgITMwAAAe3hX8vV96VdcwABAAAB7TANBgkqhkiG9w0BAQsFADB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1NDFaFw0y
# NTAzMDUxODQ1NDFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
# bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0
# aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYD
# VQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4IC
# DwAwggIKAoICAQCoMMJskrrqapycLxPC1H7zD7g88NpbEaQ6SjcTIRbzCVyYQNsz
# 8TaL1pqFTEAPL1X7ojL4/EaEW+UjNqZs/ayMyW4YIpFPZP2x4FBMVCddseF2i+aM
# MjDHi0LcTQZxM2s3mFMrCZAWSfLYXYDIimFBz8j0oLWGy3VgLmBTKM4xLqv7DZUz
# 8B2SoAmbEtp62ngSl0hOoN73SFwE+Y24SvGQMWhykpG+vXDwcpWvwDe+TgnrLR7A
# TRFXN5JS26dm2yy6SYFMRYnME3dMHCQ/UQIQQNC8nLmIvdKkAoWEMXtJsGEo3QrM
# 2S2SBv4PpHRzRukzTtP+UAceGxM9JyrwUQP5OCEmW6YchEyRDSwP4hU9f7B0Ayh1
# 4Pw9vJo7jewNjeMPIkmneyLSi0ruv2ox/xRGtcJ9yBNC5BaRktjz7stPaojR+PDA
# 2fuBtCo8xKlkt53mUb7AY+CZHHqhLm76pdMF6BHv2TvwlVBeQRN22XjaVVRwCgjg
# JnNewt7PejcrpUn0qHLgLq+1BN1DzYukWkTr7wT0zl0iXr+NtqUkWSOnWRfe8N21
# tB6uv3VkW8nFdChtbbZZz24peLtJEZuNrN8Xf9PTPMzZXDJBI1EciR/91QcGoZFm
# VbFVb2rUIAs01+ZkewvbhmGVDefX9oZG4/K4gGUsTvTW+r1JZMxUT2MwqQIDAQAB
# o4IBSTCCAUUwHQYDVR0OBBYEFM4b8Oz33hAqBEfKlAZf0NKh4CIZMB8GA1UdIwQY
# MBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6
# Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUt
# U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYB
# BQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj
# cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB
# /wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0G
# CSqGSIb3DQEBCwUAA4ICAQCd1gK2Rd+eGL0eHi+iE6/qDY8sbbsO4emancp6KPN+
# xq5ZAatiBR4jmRRhm+9Vik0Fo0DLWi/N28bFI7dXYw09p3vCipbjy4Eoifm0Nud7
# /4U30i9+7RvW7XOQ3rx37+U7vq9lk6yYpGCNp0jlJ188/CuRPgqJnfq5EdeafH2A
# oG46hKWTeB7DuXasGt6spJOenGedSre34MWZqeTIQ0raOItZnFuGDy4+xoD1qRz2
# QW+u2gCHaG8AQjhYUM4uTi9t6kttj6c7Xamr2zrWuceDhz7sKLttLTJ7ws5YrA2I
# 8cTlbMAf2KW0GVjKbYGd+LZGduEK7/7fs4GUkMqc51FsNdG1n+zgc7zHu2oGGeCB
# g4s8ZR0ZFyx7jsgm9sSFCKQ5CsbAvlr/60Ndk5TeMR8Js2kNUicu2CqZ03833Tsv
# Tgk7iD1KLgfS16HEvjN6m4VKJKgjJ7OJJzabtS4JQgUnJrIZfyosk4D18rZni9pU
# wN03WgTmd10WTwiZOu4g8Un6iKcPMY/iFqTu4ntkzFUxBBpbFG6k1CINZmoirEWm
# CtG3lyZ2IddmjtIefTkIvGWb4Jxzz7l2m/E2kGOixDJHsahZVmwsoNvhy5ku/inU
# ++dXHzw+hlvqTSFT89rIFVhcmsWPDJPNRSSpMhoJ33V2Za/lkKcbkUM0SbQgS9qs
# dzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQEL
# BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNV
# BAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4X
# DTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzAR
# BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p
# Y3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3Rh
# bXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM
# 57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm
# 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzB
# RMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBb
# fowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCO
# Mcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYw
# XE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW
# /aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/w
# EPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPK
# Z6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2
# BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfH
# CBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYB
# BAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v
# BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYM
# KwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEF
# BQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBW
# BgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUH
# AQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtp
# L2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsF
# AAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518Jx
# Nj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+
# iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2
# pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefw
# C2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7
# T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFO
# Ry3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhL
# mm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3L
# wUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5
# m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE
# 0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQMIICOAIB
# ATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UE
# CxMeblNoaWVsZCBUU1MgRVNOOjg5MDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNy
# b3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDuHayKTCaY
# sYxJh+oWTx6uVPFw+aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX
# YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg
# Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy
# MDEwMA0GCSqGSIb3DQEBCwUAAgUA6bgJ9jAiGA8yMDI0MDQwMzE3MDE0MloYDzIw
# MjQwNDA0MTcwMTQyWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpuAn2AgEAMAoC
# AQACAgSUAgH/MAcCAQACAhQ5MAoCBQDpuVt2AgEAMDYGCisGAQQBhFkKBAIxKDAm
# MAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcN
# AQELBQADggEBAD3Vla1jFcZVCUHeWybFSR/TXbfm6GGYLdMNaxcaZ4g4lneuf/Eq
# Ep4fbwb8sWEF73tQFDTADNU5B/MXQ+Mi07oORkY4eXZfneDPAfcAJ1R5WFAmRzsF
# EGJrz83IWcDF/fQnhIBN1glqCKxmckocX6+++QXWX04P5Tx9B+Pj9VZcayYbFH6e
# F7l0BE9K+OKjNNtFYXE5RlmRTEy89btw82vdsUttKbqKwUda6W+9kpgCCUJipFxM
# kGALgaRLvBTAUHfC7luPHhE2LNYj9ccBGKpzeJx5GaBeBeB8uptkYMlyO64bMmrq
# XJatodVYkRR3A4Se6Tqm8LVw4KeZMB1U7VMxggQNMIIECQIBATCBkzB8MQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe3hX8vV96VdcwABAAAB7TANBglg
# hkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqG
# SIb3DQEJBDEiBCCT7L7ttL6PSwtv1BbUouZKsBxY+SNxiCCzK1VFFOG2UTCB+gYL
# KoZIhvcNAQkQAi8xgeowgecwgeQwgb0EII0uDWg0CFseKxK3A16l1wrIwrsSDrXZ
# 6xSf0F4xbMo5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAC
# EzMAAAHt4V/L1felXXMAAQAAAe0wIgQgdGoqzWxBTvwHvsTIxYqr5oiVCTGJOeKF
# nbWbhY8yNTgwDQYJKoZIhvcNAQELBQAEggIAKOcgfdFXK9XKSW9YVtxpEjlByvGp
# tzT/p+J5vjo2YiFlHjclZTMG0L/FDHLPSIkrm9BCDb8WORTifxeiyEKYM/GPtMLp
# XV95d3qKwY97XKkY1Zj9rObMxgYvEUeg2cgFw7RiEiE+CMijekYMbLdE7RTkMKvf
# /usPjwxF1cSShGEi8ScpgwQwP0yKGbXWobnOmab1h6pn21Ri96tIl+ez/I+NYEjB
# s2H90IzZXXtX91J6l8fgl6GK1LAlqdbv6FCUlCYIGsxdkfVjPNLcvJhZ+K0KARI3
# 7mKsTVK0hM0ElrczLldLK4SpO0dy2touGrz+XaLICcPB6h1NFZZt6Vpty02egLpm
# y7ThvTh544exf543XDkc8btOSb4ld9hERz2yKtJFQnMRXCbiowoURXV3xfdZETwI
# t2dMLwyeqPO7CsAseNVxnyMT82NcsnC9TrWE1nPCNLKGbQAs9nxZJY5JSPbpJhYg
# wu9TDlL35bF9WUqsHOfjd1yNm137gwNg9fLfqt1ETuDKWINdxwOAEJm93+52I9JW
# zIGIS+1u+62kQf5o1DZjmB5+23hjnwuIv4JOYG9lqr8arHu2h3qc2OnKNnEAAVM1
# CjYO3myVgv9wkaVOzY4zmHSZz0Qdg4d+f65vgrOfgYO1gpGNGuPNp5kOxtQoVRdJ
# aIofI4da1vRsjwA=
# SIG # End signature block
|
combined_dataset/train/non-malicious/264.ps1
|
264.ps1
|
Function Get-HashTableEmptyValue
{
PARAM([System.Collections.Hashtable]$HashTable)
$HashTable.GetEnumerator().name |
ForEach-Object -Process {
if($HashTable[$_] -eq "" -or $HashTable[$_] -eq $null)
{
Write-Output $_
}
}
}
|
combined_dataset/train/non-malicious/count-object_1.ps1
|
count-object_1.ps1
|
#a function to count how many items there are, whether its an array, a collection, or actually just
# a single no array/non list/non collection object in which case it would be 1
function count-object ($InputObject)
{
if ($inputobject -eq $Null ) { return 0}
if ($inputobject -is [system.array]) { return $inputobject.length }
if ($inputobject -is [system.collections.ICollection] -or
$inputobject -is [system.collections.IList] -or
$inputobject -is [system.collections.IDictionary] ) { return $inputobject.count }
#strings are ienumerable, they also have a length, but i think we want to treat 1 string as one object
if ($inputobject -is [string]) { return 1 }
#-1 to show that it is enumerable, but we can't know its length, it could be infinate,
#or take a long time even to enumerate without going over
if ($inputobject -is [system.collections.IEnumerable]) { return -1 }
#otherwise just return 1
return 1
}
set-alias count count-object
count (get-process)
count (1,2,3)
count "hello"
count 3
count @{first = 1; second = 2 }
$a = new-object system.collections.arraylist
[void] $a.add(4);
[void] $a.add("yo");
count $a
|
combined_dataset/train/non-malicious/sample_21_40.ps1
|
sample_21_40.ps1
|
ConvertFrom-StringData @'
id_ctsgrouppolicyclient=GroupPolicy Client
id_ctsgrouppolicyclientdescription=Collects information about GroupPolicy Client.
'@
# SIG # Begin signature block
# MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAcJGsbRBXcM0ro
# vTCkDXKZWmJOiQO/aT/fV9iyzCHRl6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOY4
# 88o1nCIOQgiAZ1gO1Kwjl2rtpmIVTzGqxHMdp5jjMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAgy8K5MEl0/ormVPrY3OOqeTm3mLv4QEzTB0s
# Wl33QhbLVDYypg+IEXuynE3FYo/6FifM1SdLMB7TWKP7nt0C9VO2mUDDjlqWP07n
# SVWZi4lgi1hH5GilVt6e/+ZQwz6sr6tprf5rFVxpRtqecZ5lL0m0jRM4wbklY1cB
# afrp5ayvbk1/MCF1AfTxVvCHx5lSYnSmBarMkM486LaJMaQPsEQeHlwElz4KcBFU
# +S3lv+qIM4OvSyp7qRP75zZ81VtQK1ixNlVFfwiYMTeb0ZNnMCaPrN5iw5fev6h/
# uNGFaRwomyTpgrfQHT+otjrCFA0wHJAyUNQRSs13w6uxkNU2/KGCF60wghepBgor
# BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCCPu8MvZJErFGBywH2bzn219VD+U8eiJbvT
# 2+FawpmUiwIGZutgsUnxGBMyMDI0MTAyODExNDA0Mi4wODlaMASAAgH0oIHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo1OTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9BdG
# hcDLPznlAAEAAAH0MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzA1OVoXDTI1MTAyMjE4MzA1OVowgdMxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv
# c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs
# ZCBUU1MgRVNOOjU5MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt
# ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# pwhOE6bQgC9qq4jJGX2A1yoObfk0qetQ8kkj+5m37WBxDlsZ5oJnjfzHspqPiOEV
# zZ2y2ygGgNZ3/xdZQN7f9A1Wp1Adh5qHXZZh3SBX8ABuc69Tb3cJ5KCZcXDsufwm
# XeCj81EzJEIZquVdV8STlQueB/b1MIYt5RKis3uwzdlfSl0ckHbGzoO91YTKg6IE
# xqKYojGreCopnIKxOvkr5VZsj2f95Bb1LGEvuhBIm/C7JysvJvBZWNtrspzyXVnu
# o+kDEyZwpkphsR8Zvdi+s/pQiofmdbW1UqzWlqXQVgoYXbaYkEyaSh/heBtwj1tu
# e+LcuOcHAPgbwZvQLksKaK46oktregOR4e0icsGiAWR9IL+ny4mlCUNA84F7GEEW
# OEvibig7wsrTa6ZbzuMsyTi2Az4qPV3QRkFgxSbp4R4OEKnin8Jz4XLI1wXhBhIp
# MGfA3BT850nqamzSiD5L5px+VtfCi0MJTS2LDF1PaVZwlyVZIVjVHK8oh2HYG9T2
# 6FjR9/I85i5ExxmhHpxM2Z+UhJeZA6Lz452m/+xrA4xrdYas5cm7FUhy24rPLVH+
# Fy+ZywHAp9c9oWTrtjfIKqLIvYtgJc41Q8WxbZPR7B1uft8BFsvz2dOSLkxPDLcX
# Wy16ANy73v0ipCxAwUEC9hssi0LdB8ThiNf/4A+RZ8sCAwEAAaOCAUkwggFFMB0G
# A1UdDgQWBBQrdGWhCtEsPid1LJzsTaLTKQbfmzAfBgNVHSMEGDAWgBSfpxVdAF5i
# XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp
# bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud
# JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF
# AAOCAgEA3cHSDxJKUDsgacIfRX60ugODShsBqwtEURUbUXeDmYYSa5oFj34RujW3
# gOeCt/ObDO45vfpnYG5OS5YowwsFw19giCI6JV+ccG/qqM08nxASbzwWtqtorzQi
# Jh9upsE4TVZeKYXmbyx7WN9tdbVIrCelVj7P6ifMHTSLt6BmyoS2xlC2cfgKPPA1
# 3vS3euqUl6zwe7GAhjfjNXjKlE4SNWJvdqgrv0GURKjqmamNvhmSJane6TYzpdDC
# egq8adlGH85I1EWKmfERb1lzKy5OMO2e9IkAlvydpUun0C3sNEtp0ehliT0Sraq8
# jcYVDH4A2C/MbLBIwikjwiFGQ4SlFLT2Tgb4GvvpcWVzBxwDo9IRBwpzngbyzbhh
# 95UVOrQL2rbWHrHDSE3dgdL2yuaHRgY7HYYLs5Lts30wU9Ouh8N54RUta6GFZFx5
# A4uITgyJcVdWVaN0qjs0eEjwEyNUv0cRLuHWJBejkMe3qRAhvCjnhro7DGRWaIld
# yfzZqln6FsnLQ3bl+ZvVJWTYJuL+IZLI2Si3IrIRfjccn29X2BX/vz2KcYubIjK6
# XfYvrZQN4XKbnvSqBNAwIPY2xJeB4o9PDEFI2rcPaLUyz5IV7JP3JRpgg3xsUqvF
# HlSG6uMIWjwH0GQIIwrC2zRy+lNZsOKnruyyHMQTP7jy5U92qEEwggdxMIIFWaAD
# AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD
# VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe
# MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv
# ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy
# MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5
# vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64
# NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu
# je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl
# 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg
# yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I
# 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2
# ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/
# TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy
# 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y
# 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H
# XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB
# AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW
# BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B
# ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB
# BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB
# Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL
# oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv
# TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr
# BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS
# b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq
# reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27
# DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv
# vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak
# vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK
# NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2
# kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+
# c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep
# 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk
# txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg
# DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/
# 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW
# MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT
# Hm5TaGllbGQgVFNTIEVTTjo1OTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z
# b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAv+LZ/Vg0s17X
# ek4iG9R9c/7+AI6ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDANBgkqhkiG9w0BAQsFAAIFAOrJ784wIhgPMjAyNDEwMjgxMTExMTBaGA8yMDI0
# MTAyOTExMTExMFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6snvzgIBADAHAgEA
# AgIRQTAHAgEAAgITcjAKAgUA6stBTgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor
# BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA
# A4IBAQAhvpi0fcwW36VjkxJvXWTKNHB3jvDpp2sJGsfeVTvr0wqWqBrbYtmbUuVe
# 97LNopMBBaWBVq2RlfPasIxDtxHDTn5LPhbHb5DWH/NZWb+28zXE1+Y5sevsEdvs
# FxcDLB5CurWs+Z+iXqcdrGqWwlcV+WX6dpuy3/dPiBzA5ZYhHiQgBr6+GCyDGjEB
# 9T76pHsFqwSZHJ4+hXZB9EMgikB45MhUWxkF4tLdq1JMiZWtZmjsOTbveG4Y338S
# 6Qpt3I6sMkaFL+Dn9fLJwn4WwMtfXG/6gRGDUIlgE+If7xvhMCC+iUcbAyLLjXkn
# +yis2mNx8vI42scFI8SUP7qoQ0p/MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAH0F0aFwMs/OeUAAQAAAfQwDQYJYIZIAWUD
# BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B
# CQQxIgQgVb3xVISiD6MGEZvcX9GlR95pJoDCcJ5dtJQXMMX19M8wgfoGCyqGSIb3
# DQEJEAIvMYHqMIHnMIHkMIG9BCA/WMJ8biaT6njvkknB8Q7hSQIi8ys6vIBvZg60
# RBjWazCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB
# 9BdGhcDLPznlAAEAAAH0MCIEIGm6buvOuOZ0hj0c+A3dmkblkgOGsbCdq3o77OaN
# J5IJMA0GCSqGSIb3DQEBCwUABIICAElgrUEt5Ba005bXKPsUNnMqjSaCLJaca1O5
# Z0qTeFZ3WIQrCcuKdFgU4452/WBcff23+hq5m+tzj1cBumweB5+M2Bic/ciZxPf6
# +NI+PKHeUs3+41fL6rWHmtBmgLqgrD+zm1do1gzL+yf6j0+zlyI8xeWERq/3SyTd
# oDq0kBXSmoT8qSbxyQaS5AuOsXi2EKFjRYFmqNxNkG47qKZes1RGQ7XUmN8G0vxt
# zNYGBZJuG+I32Yz4kZYRa/NFW5PBjROyge02NQSGscU0Hxs/QbY2LBm9H6YsVL1G
# ErUHh6GTzTdMdkz+U4VIUOIaWvZ6GJIANKPxIuUCGBLPo6n6dc2hQdKqTVBDJZtA
# SY+lT9LXEYgLTfa0nD4m0Lr/6/PcHjcRKuzdHIVk7M3cQhkfjF/BJfdZ8OD4jLck
# uYRA0+mCBQlGWe3wWXYl0nfs177XPTPdf6ThWf3/CEJa2LELkD4IIj1fZ1h/ej97
# +SapgP4kZZDb5x6oRDeXCRQT3CmxJnhm5h2StBtIsgevIG8HvR3rGKm1QMpw4/8g
# RlvUOTYD6sdUL595porAyCjL2dXDso42UCnrQGM3ZOt/i5j3RDI7c9bmWqc2MH4U
# AuoU0Msv0mF1niaA311hk4u/3aMnGsFCvL3xaheMKML5SFlYQpQsM178OBDiharI
# DFM6jGXx
# SIG # End signature block
|
combined_dataset/train/non-malicious/Get-DellWarranty_2.ps1
|
Get-DellWarranty_2.ps1
|
function Get-DellWarranty {
<#
.Synopsis
Provides warranty information for one or more Dell service tags.
.Description
Queries the Dell Website for a list of service tags and returns the warranty information as a custom object.
If a service tag has multiple warranties, they are returned as multiple separate objects.
If no service tag is specified, it will attempt to retrieve and lookup the local system's service tag.
The service tag can be provided to the command in several ways:
1. Using the -servicetag parameter
2. By passing one or more Service Tags via the pipeline
3. By passing objects that have either servicetag or serialnumber defined as a property, such as win32_bios WMI objects
See examples for details.
.Parameter ServiceTag
ALIAS: serialnumber
The Dell service tag you wish to query. Example: XYZ12A3
.Example
C:\\PS> Get-DellWarranty
Service Tag : XXXX123
Description : 4 Hour On-Site Service
Provider : UNY
Warranty Extension Notice * : No
Start Date : 6/19/2009
End Date : 6/20/2011
Days Left : 140
Description
-----------
If no service tags are provided, the script retrieves the local computer's serial number from WMI and queries for it.
.Example
C:\\PS> Get-DellWarranty -ServiceTag XXXX123
Service Tag : XXXX123
Description : 4 Hour On-Site Service
Provider : UNY
Warranty Extension Notice * : No
Start Date : 6/19/2009
End Date : 6/20/2011
Days Left : 140
Description
-----------
You can pass the service tag as a parameter, or as the first positional parameter (e.g. Get-DellWarranty XXXX123)
.Example
C:\\PS> "XXXX123","XXXX124","XXXX125" | get-dellwarranty
Service Tag : XXXX123
Description : 4 Hour On-Site Service
Provider : UNY
Warranty Extension Notice * : No
Start Date : 6/19/2009
End Date : 6/20/2011
Days Left : 140
Service Tag : XXXX124
Description : 4 Hour On-Site Service
Provider : UNY
Warranty Extension Notice * : No
Start Date : 6/14/2009
End Date : 6/15/2011
Days Left : 145
Service Tag : XXXX125
Description : NBD On-Site Service
Provider : DELL
Warranty Extension Notice * : No
Start Date : 6/14/2008
End Date : 6/15/2010
Days Left : 0
Description
-----------
You can pass serial numbers via the pipeline either directly or as a variable.
.Example
C:\\PS> get-wmiobject win32_bios -computername "computer1","computer2","1.2.3.4" | get-dellwarranty
Service Tag : XXXX123
Description : 4 Hour On-Site Service
Provider : UNY
Warranty Extension Notice * : No
Start Date : 6/19/2009
End Date : 6/20/2011
Days Left : 140
Service Tag : XXXX124
Description : 4 Hour On-Site Service
Provider : UNY
Warranty Extension Notice * : No
Start Date : 6/14/2009
End Date : 6/15/2011
Days Left : 145
Service Tag : XXXX125
Description : NBD On-Site Service
Provider : DELL
Warranty Extension Notice * : No
Start Date : 6/14/2008
End Date : 6/15/2010
Days Left : 0
Description
-----------
You can also pass any object that has a "serialnumber" or "servicetag" property. In this example, we query computers directly for their serial numbers,
and pass those results (which are WMI objects that have a serialnumber property) via pipeline directly to the command to obtain warranty information.
.Notes
AUTHOR: Justin Grote <jgrote NOSPAM-AT allieddigital NOSPAM-DOT net>
WARNING: Since Dell does not provide a formal API, this script works by screen-scraping the HTML from the Dell product support site.
Any future change to the layout or logic of this site will break the script or cause unpredictable results.
HISTORY: v1.0 [31 Jan 2011] - Initial Module Creatio
.Link
http://support.dell.com/support/topics/global.aspx/support/my_systems_info
#>
[CmdletBinding()]
param(
[Parameter(Mandatory=$False,Position=0,ValueFromPipeline=$True,ValueFromPipelineByPropertyName=$True)]
[alias("serialnumber")]
[string[]]$ServiceTag
)
PROCESS {
# If nothing was passed, retrieve the local system service tag
if ($ServiceTag -eq $null) {
write-verbose "No Service Tags provided. Using Local Computer's Service Tag"
write-verbose "START Obtaining Serial number via WMI for localhost"
$ServiceTag = (get-wmiobject win32_bios).SerialNumber
write-verbose "SUCCESS Obtaining Serial number via WMI for localhost - $ServiceTag"
}
# Detect if an array of service tags were passed via parameter and unwind them.
foreach ($strServicetag in $servicetag) {
write-verbose "START Querying Dell for Service Tag $_"
Get-DellWarrantyWorker $strServicetag
write-verbose "SUCCESS Querying Dell for Service Tag $_"
}
}
}
Function Get-DellWarrantyWorker {
Param(
[String]$serviceTag
)
#Dell Warranty URL Path
$URL = "http://support.dell.com/support/topics/global.aspx/support/my_systems_info/details?c=us&l=en&s=gen&ServiceTag=$serviceTag"
trap [System.FormatException] {
write-error -category invalidresult "The service tag $serviceTag was not found. This is either because you entered the tag incorrectly, it is not present in Dell's database, or Dell changed the format of their website causing this search to fail." -recommendedaction "Please check that you entered the service tag correctly"
return;
}
#Screenscrape the HTML for the warranty Table
$HTML = (New-Object Net.WebClient).DownloadString($URL)
If ($HTML -Match '<table[\\w\\s\\d"=%]*contract_table">.+?</table>') {
$htmltable = $Matches[0]
} else {
throw (New-Object System.FormatException)
}
$HtmlLines = $htmltable -Split "<tr" | Where-Object { $_ -Match '<td' }
$Header = ($HtmlLines[0] -Split '<td') -Replace '[\\w\\s\\d"=%:;\\-]*>|</.*' | Where-Object { $_ -ne '' }
#Convert the warranty table fields into a powershell object
For ($i = 1; $i -lt $HtmlLines.Count; $i++) {
$Output = New-Object PSObject
$Output | Add-Member NoteProperty "Service Tag" -value $serviceTag
$Values = ($HtmlLines[$i] -Split '<td') -Replace '[\\w\\s\\d"=%:;\\-]*>|</.*|<a.+?>'
For ($j = 1; $j -lt $Values.Count; $j++) {
$Output | Add-Member NoteProperty $Header[$j - 1] -Value $Values[$j]
}
#Minor formatting fix if days remaining on warranty is zero
if ($output.'Days Left' -match '<<0') {write-host -fore darkgreen "match!";$output.'Days Left' = 0}
return $Output
}
}
|
combined_dataset/train/non-malicious/4103.ps1
|
4103.ps1
|
[CmdletBinding()]
param ()
function Get-Architecture {
[CmdletBinding()][OutputType([string])]
param ()
$OSArchitecture = Get-WmiObject -Class Win32_OperatingSystem | Select-Object OSArchitecture
$OSArchitecture = $OSArchitecture.OSArchitecture
Return $OSArchitecture
}
function Get-MSIInformation {
[CmdletBinding()]
param
(
[ValidateNotNullOrEmpty()][System.IO.FileInfo]$MSI,
[ValidateSet('ProductCode', 'ProductVersion', 'ProductName', 'Manufacturer', 'ProductLanguage', 'FullVersion')][string]$Property
)
$WindowsInstaller = New-Object -ComObject WindowsInstaller.Installer
$MSIDatabase = $WindowsInstaller.GetType().InvokeMember("OpenDatabase", "InvokeMethod", $null, $WindowsInstaller, @($MSI.FullName, 0))
$Query = "SELECT Value FROM Property WHERE Property = '$($Property)'"
$View = $MSIDatabase.GetType().InvokeMember("OpenView", "InvokeMethod", $null, $MSIDatabase, ($Query))
$View.GetType().InvokeMember("Execute", "InvokeMethod", $null, $View, $null)
$Record = $View.GetType().InvokeMember("Fetch", "InvokeMethod", $null, $View, $null)
$Value = $Record.GetType().InvokeMember("StringData", "GetProperty", $null, $Record, 1)
$MSIDatabase.GetType().InvokeMember("Commit", "InvokeMethod", $null, $MSIDatabase, $null)
$View.GetType().InvokeMember("Close", "InvokeMethod", $null, $View, $null)
$MSIDatabase = $null
$View = $null
return $Value
}
function Get-RelativePath {
[CmdletBinding()][OutputType([string])]
param ()
$Path = (split-path $SCRIPT:MyInvocation.MyCommand.Path -parent) + "\"
Return $Path
}
function Install-MSI {
[CmdletBinding()]
param
(
[ValidateNotNullOrEmpty()][string]$MSI,
[ValidateNotNullOrEmpty()][string]$Switches
)
[string]$DisplayName = Get-MSIInformation -MSI $MSI -Property 'ProductName'
$Executable = $Env:windir + "\system32\msiexec.exe"
$Parameters = "/i" + [char]32 + [char]34 + $MSI + [char]34 + [char]32 + $Switches
Write-Host "Install"$DisplayName.Trim()"....." -NoNewline
$ErrCode = (Start-Process -FilePath $Executable -ArgumentList $Parameters -Wait -Passthru).ExitCode
If (($ErrCode -eq 0) -or ($ErrCode -eq 3010)) {
Write-Host "Success" -ForegroundColor Yellow
} else {
Write-Host "Failed with error code "$ErrCode -ForegroundColor Red
Exit $ErrCode
}
}
function Uninstall-MSIByName {
[CmdletBinding()]
param
(
[ValidateNotNullOrEmpty()][String]$ApplicationName,
[ValidateNotNullOrEmpty()][String]$Switches
)
$Executable = $Env:windir + "\system32\msiexec.exe"
$Uninstall = Get-ChildItem HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall -Recurse -ErrorAction SilentlyContinue
If (((Get-WmiObject -Class Win32_OperatingSystem | Select-Object OSArchitecture).OSArchitecture) -eq "64-Bit") {
$Uninstall += Get-ChildItem HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall -Recurse -ErrorAction SilentlyContinue
}
$Key = $uninstall | foreach-object { Get-ItemProperty REGISTRY::$_ } | where-object { $_.DisplayName -like "*$ApplicationName*" }
If ($Key -ne $null) {
Write-Host "Uninstall"$Key.DisplayName"....." -NoNewline
$Parameters = "/x " + $Key.PSChildName + [char]32 + $Switches
$ErrCode = (Start-Process -FilePath $Executable -ArgumentList $Parameters -Wait -Passthru).ExitCode
If (($ErrCode -eq 0) -or ($ErrCode -eq 3010) -or ($ErrCode -eq 1605)) {
Write-Host "Success" -ForegroundColor Yellow
} else {
Write-Host "Failed with error code "$ErrCode -ForegroundColor Red
Exit $ErrCode
}
}
}
$RelativePath = Get-RelativePath
Uninstall-MSIByName -ApplicationName "Google Chrome" -Switches "/qb- /norestart"
Install-MSI -MSI $RelativePath"GoogleChromeStandaloneEnterprise.msi" -Switches "/qb- /norestart ALLUSERS=1"
|
combined_dataset/train/non-malicious/NTFS ACLs Folder Tree.ps1
|
NTFS ACLs Folder Tree.ps1
|
#######################################
# TITLE: listACL.ps1 #
# AUTHOR: Santiago Fernandez Mu±oz #
# #
# DESC: This script generate a HTML #
# report show all ACLs asociated with #
# a Folder tree structure starting in #
# root specified by the user #
#######################################
param ([string] $computer = 'localhost',
[string] $path = $(if ($help -eq $false) {Throw "A path is needed."}),
[int] $level = 0,
[string] $scope = 'administrator',
[switch] $help = $false,
[switch] $debug = $false
)
#region Initializations and previous checkings
#region Initialization
$allowedLevels = 10
$Stamp = get-date -uformat "%Y%m%d"
$report = "$PWD\\$computer.html"
$comparison = ""
$UNCPath = "\\\\" + $computer + "\\" + $path + "\\"
#endregion
#region Previou chekings
if ($level -gt $allowedLevels -or $level -lt 0) {Throw "Level out of range."}
if ($computer -eq 'localhost' -or $computer -ieq $env:COMPUTERNAME) { $UNCPath = $path }
switch ($scope) {
micro {
$comparison = '($acl -notlike "*administrator*" -and $acl -notlike "*BUILTIN*" -and $acl -notlike "*NT AUTHORITY*")'
}
user {
$comparison = '($acl -notlike "*administrator*" -and $acl -notlike "*BUILTIN*" -and $acl -notlike "*IT*" -and $acl -notlike "*NT AUTHORITY*" -and $acl -notlike "*All*")'
}
}
#endregion
#endregion
#region Function definitions
function drawDirectory([ref] $directory) {
$dirHTML = '
<div class="'
if ($directory.value.level -eq 0) { $dirHTML += 'he0_expanded' } else { $dirHTML += 'he' + $directory.value.level }
$dirHTML += '"><span class="sectionTitle" tabindex="0">Folder ' + $directory.value.Folder.FullName + '</span></div>
<div class="container"><div class="he' + ($directory.value.level + 1) + '"><span class="sectionTitle" tabindex="0">Access Control List</span></div>
<div class="container">
<div class="heACL">
<table class="info3" cellpadding="0" cellspacing="0">
<thead>
<th scope="col"><b>Owner</b></th>
<th scope="col"><b>Privileges</b></th>
</thead>
<tbody>'
foreach ($itemACL in $directory.value.ACL) {
$acls = $null
if ($itemACL.AccessToString -ne $null) {
$acls = $itemACL.AccessToString.split("`n")
}
$dirHTML += '<tr><td>' + $itemACL.Owner + '</td>
<td>
<table>
<thead>
<th>User</th>
<th>Control</th>
<th>Privilege</th>
</thead>
<tbody>'
foreach ($acl in $acls) {
$temp = [regex]::split($acl, "(?<!(,|NT))\\s{1,}")
if ($debug) {
write-host "ACL(" $temp.gettype().name ")[" $temp.length "]: " $temp
}
if ($temp.count -eq 1) {
continue
}
if ($scope -ne 'administrator') {
if ( Invoke-Expression $comparison ) {
$dirHTML += "<tr><td>" + $temp[0] + "</td><td>" + $temp[1] + "</td><td>" + $temp[2] + "</td></tr>"
}
} else {
$dirHTML += "<tr><td>" + $temp[0] + "</td><td>" + $temp[1] + "</td><td>" + $temp[2] + "</td></tr>"
}
}
$dirHTML += '</tbody>
</table>
</td>
</tr>'
}
$dirHTML += '
</tbody>
</table>
</div>
</div>
</div>'
return $dirHTML
}
#endregion
#region Printing help message
if ($help) {
Write-Host @"
/ĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘ\\
Ę Script gather access control lists per directory Ę
\\ĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘ/
USAGE: ./listACL -computer <machine or IP>
-path <path>
-level <0-10>
-help:[$false]
PARAMETERS:
computer [OPTIONAL] - Computer name or IP addres where folder is hosted (Default: localhost)
path [REQUIRED] - Folder's path to query.
level [OPTIONAL] - Level of folders to go down in the query. Allowd values are between 0 and $allowedLevels.
0 show that there's no limit in the going down (Default: 0)
scope [OPTIONAL] - Sets the amount of information showd in the report. Allowd values are:
Ę user, show important information to the user.
Ę micro, show user scope information plus important information for the IT Department.
Ę administrator, show all information.
help [OPTIONAL] - This help.
"@
exit 0
}
#endregion
if (Test-Path $report)
{
Remove-item $report
}
#To normalize I check if last character in the path is the folder separator character
if ($path.Substring($path.Length - 1,1) -eq "\\") { $path = $path.Substring(0,$path.Length - 1) }
#region Header, style and javascript functions needed by the html report
@"
<html dir="ltr" xmlns:v="urn:schemas-microsoft-com:vml" gpmc_reportInitialized="false">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-16" />
<title>Access Control List for $path in $computer</title>
<!-- Styles -->
<style type="text/css">
body{ background-color:#FFFFFF; border:1px solid #666666; color:#000000; font-size:68%; font-family:MS Shell Dlg; margin:0px 0px 10px 0px; }
table{ font-size:100%; table-layout:fixed; width:100%; }
td,th{ overflow:visible; text-align:left; vertical-align:top; white-space:normal; }
.title{ background:#FFFFFF; border:none; color:#333333; display:block; height:24px; margin:0px 0px -1px 0px; padding-top:4px; position:relative; table-layout:fixed; width:100%; z-index:5; }
.he0_expanded{ background-color:#FEF7D6; border:1px solid #BBBBBB; color:#3333CC; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:0px; margin-right:0px; padding-left:8px; padding-right:5em; padding-top:4px; position:relative; width:100%; }
.he1_expanded{ background-color:#A0BACB; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:10px; margin-right:0px; padding-left:8px; padding-right:5em; padding-top:4px; position:relative; width:100%; }
.he1{ background-color:#A0BACB; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:10px; margin-right:0px; padding-left:8px; padding-right:5em; padding-top:4px; position:relative; width:100%; }
.he2{ background-color:#C0D2DE; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:20px; margin-right:0px; padding-left:8px; padding-right:5em; padding-top:4px; position:relative; width:100%; }
.he3{ background-color:#D9E3EA; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:30px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; }
.he4{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:40px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; }
.he4h{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:45px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; }
.he4i{ background-color:#F9F9F9; border:1px solid #BBBBBB; color:#000000; display:block; font-family:MS Shell Dlg; font-size:100%; margin-bottom:-1px; margin-left:45px; margin-right:0px; padding-bottom:5px; padding-left:21px; padding-top:4px; position:relative; width:100%; }
.he5{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:50px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; }
.he5h{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; padding-left:11px; padding-right:5em; padding-top:4px; margin-bottom:-1px; margin-left:55px; margin-right:0px; position:relative; width:100%; }
.he5i{ background-color:#F9F9F9; border:1px solid #BBBBBB; color:#000000; display:block; font-family:MS Shell Dlg; font-size:100%; margin-bottom:-1px; margin-left:55px; margin-right:0px; padding-left:21px; padding-bottom:5px; padding-top: 4px; position:relative; width:100%; }
.he6{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:55px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; }
.he7{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:60px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; }
.he8{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:65px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; }
.he9{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:70px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; }
.he10{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:75px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; }
.he11{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:80px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; }
.heACL { background-color:#ECFFD7; border:1px solid #BBBBBB; color:#000000; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:90px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; }
DIV .expando{ color:#000000; text-decoration:none; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:normal; position:absolute; right:10px; text-decoration:underline; z-index: 0; }
.he0 .expando{ font-size:100%; }
.info, .info3, .info4, .disalign{ line-height:1.6em; padding:0px 0px 0px 0px; margin:0px 0px 0px 0px; }
.disalign TD{ padding-bottom:5px; padding-right:10px; }
.info TD{ padding-right:10px; width:50%; }
.info3 TD{ padding-right:10px; width:33%; }
.info4 TD, .info4 TH{ padding-right:10px; width:25%; }
.info5 TD, .info5 TH{ padding-right:0px; width:20%; }
.info TH, .info3 TH, .info4 TH, .disalign TH{ border-bottom:1px solid #CCCCCC; padding-right:10px; }
.subtable, .subtable3{ border:1px solid #CCCCCC; margin-left:0px; background:#FFFFFF; margin-bottom:10px; }
.subtable TD, .subtable3 TD{ padding-left:10px; padding-right:5px; padding-top:3px; padding-bottom:3px; line-height:1.1em; width:10%; }
.subtable TH, .subtable3 TH{ border-bottom:1px solid #CCCCCC; font-weight:normal; padding-left:10px; line-height:1.6em; }
.subtable .footnote{ border-top:1px solid #CCCCCC; }
.subtable3 .footnote, .subtable .footnote{ border-top:1px solid #CCCCCC; }
.subtable_frame{ background:#D9E3EA; border:1px solid #CCCCCC; margin-bottom:10px; margin-left:15px; }
.subtable_frame TD{ line-height:1.1em; padding-bottom:3px; padding-left:10px; padding-right:15px; padding-top:3px; }
.subtable_frame TH{ border-bottom:1px solid #CCCCCC; font-weight:normal; padding-left:10px; line-height:1.6em; }
.subtableInnerHead{ border-bottom:1px solid #CCCCCC; border-top:1px solid #CCCCCC; }
.explainlink{ color:#000000; text-decoration:none; cursor:pointer; }
.explainlink:hover{ color:#0000FF; text-decoration:underline; }
.spacer{ background:transparent; border:1px solid #BBBBBB; color:#FFFFFF; display:block; font-family:MS Shell Dlg; font-size:100%; height:10px; margin-bottom:-1px; margin-left:43px; margin-right:0px; padding-top: 4px; position:relative; }
.filler{ background:transparent; border:none; color:#FFFFFF; display:block; font:100% MS Shell Dlg; line-height:8px; margin-bottom:-1px; margin-left:43px; margin-right:0px; padding-top:4px; position:relative; }
.container{ display:block; position:relative; }
.rsopheader{ background-color:#A0BACB; border-bottom:1px solid black; color:#333333; font-family:MS Shell Dlg; font-size:130%; font-weight:bold; padding-bottom:5px; text-align:center; }
.rsopname{ color:#333333; font-family:MS Shell Dlg; font-size:130%; font-weight:bold; padding-left:11px; }
.gponame{ color:#333333; font-family:MS Shell Dlg; font-size:130%; font-weight:bold; padding-left:11px; }
.gpotype{ color:#333333; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; padding-left:11px; }
#uri { color:#333333; font-family:MS Shell Dlg; font-size:100%; padding-left:11px; }
#dtstamp{ color:#333333; font-family:MS Shell Dlg; font-size:100%; padding-left:11px; text-align:left; width:30%; }
#objshowhide { color:#000000; cursor:pointer; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; margin-right:0px; padding-right:10px; text-align:right; text-decoration:underline; z-index:2; }
#gposummary { display:block; }
#gpoinformation { display:block; }
</style>
</head>
<body>
<table class="title" cellpadding="0" cellspacing="0">
<tr><td colspan="2" class="gponame">Access Control List for $path on machine $computer</td></tr>
<tr>
<td id="dtstamp">Data obtained on: $(Get-Date)</td>
<td><div id="objshowhide" tabindex="0"></div></td>
</tr>
</table>
<div class="filler"></div>
"@ | Set-Content $report
#endregion
#region Information gathering
$colFiles = Get-ChildItem -path $UNCPath -Filter *. -Recurse -force -Verbose | Sort-Object FullName
$colACLs = @()
#We start going through the path pointed out by the user
foreach($file in $colFiles)
{
#To control the current level in the tree we are in it's needed to count the number of separator characters
#contained in the path. However in order to make the count correctly it's needed to delete the path
#provided by the user (the parent). Once the parent has been deleted, the rest of the full name will be
#string used to do the level count.
#It's needed to use a REGEX object to get ALL separator character matches.
$matches = (([regex]"\\\\").matches($file.FullName.substring($path.length, $file.FullName.length - $path.length))).count
if ($level -ne 0 -and ($matches - 1) -gt $level) {
continue
}
if ($debug) {
Write-Host $file.FullName "->" $file.Mode
}
if ($file.Mode -notlike "d*") {
continue
}
$myobj = "" | Select-Object Folder,ACL,level
$myobj.Folder = $file
$myobj.ACL = Get-Acl $file.FullName
$myobj.level = $matches - 1
$colACLs += $myobj
}
#endregion
#region Setting up the report
'<div class="gposummary">' | Add-Content $report
for ($i = 0; $i -lt $colACLs.count; $i++) {
drawDirectory ([ref] $colACLs[$i]) | Add-Content $report
}
'</div></body></html>' | Add-Content $report
#endregion
|
combined_dataset/train/non-malicious/3076.ps1
|
3076.ps1
|
$global:ValidatorRoot = Split-Path $MyInvocation.MyCommand.Path
BeforeEachFeature {
New-Module -Name ValidatorTestDe {
. $global:ValidatorRoot\ValidatorDe.ps1 -Verbose
} | Import-Module -Global
}
AfterEachFeature {
Remove-Module ValidatorTestDe
}
Given 'MeinValidator gibt vor, True zurückzugeben' {
Mock MeinValidator -Module ValidatorTestDe -MockWith { return $true }
}
When 'jemand etwas aufruft, das MeinValidator benutzt' {
Invoke-SomethingThatUsesMeinValidator "false"
}
Then 'wurde MeinValidator einmal aufgerufen' {
Assert-MockCalled -Module ValidatorTestDe MeinValidator 1
}
When 'MeinValidator mit (?<word>\w+) aufgerufen wird' {
param($word)
$Validation = MeinValidator $word
}
Then 'sollte MeinValidator (?<expected>\w+) zurückgeben' {
param($expected)
$expected = $expected -eq "true"
$Validation | Should -Be $expected
}
|
combined_dataset/train/non-malicious/sample_48_32.ps1
|
sample_48_32.ps1
|
#
# Module manifest for module 'Az.DataBoxEdge'
#
# Generated by: Microsoft Corporation
#
# Generated on: 5/16/2024
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'Az.DataBoxEdge.psm1'
# Version number of this module.
ModuleVersion = '1.1.1'
# Supported PSEditions
CompatiblePSEditions = 'Core', 'Desktop'
# ID used to uniquely identify this module
GUID = '3c11ef12-c79f-45fe-acdf-a2c784d99c97'
# Author of this module
Author = 'Microsoft Corporation'
# Company or vendor of this module
CompanyName = 'Microsoft Corporation'
# Copyright statement for this module
Copyright = 'Microsoft Corporation. All rights reserved.'
# Description of the functionality provided by this module
Description = 'Microsoft Azure PowerShell - DataBoxEdge service cmdlets for Azure Resource Manager in Windows PowerShell and PowerShell Core.
For more information on DataBoxEdge, please visit the following: https://learn.microsoft.com/en-us/azure/databox-online/'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '5.1'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
DotNetFrameworkVersion = '4.7.2'
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @()
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'Microsoft.Azure.Management.DataBoxEdge.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
FormatsToProcess =
'Microsoft.Azure.PowerShell.Cmdlets.DataBoxEdge.generated.format.ps1xml'
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = @()
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-AzDataBoxEdgeBandwidthSchedule', 'Get-AzDataBoxEdgeDevice',
'Get-AzDataBoxEdgeJob', 'Get-AzDataBoxEdgeOrder',
'Get-AzDataBoxEdgeRole', 'Get-AzDataBoxEdgeShare',
'Get-AzDataBoxEdgeStorageAccount',
'Get-AzDataBoxEdgeStorageAccountCredential',
'Get-AzDataBoxEdgeStorageContainer', 'Get-AzDataBoxEdgeTrigger',
'Get-AzDataBoxEdgeUser', 'Invoke-AzDataBoxEdgeDevice',
'Invoke-AzDataBoxEdgeShare', 'Invoke-AzDataBoxEdgeStorageContainer',
'New-AzDataBoxEdgeBandwidthSchedule', 'New-AzDataBoxEdgeDevice',
'New-AzDataBoxEdgeOrder', 'New-AzDataBoxEdgeRole',
'New-AzDataBoxEdgeShare', 'New-AzDataBoxEdgeStorageAccount',
'New-AzDataBoxEdgeStorageAccountCredential',
'New-AzDataBoxEdgeStorageContainer', 'New-AzDataBoxEdgeTrigger',
'New-AzDataBoxEdgeUser', 'Remove-AzDataBoxEdgeBandwidthSchedule',
'Remove-AzDataBoxEdgeDevice', 'Remove-AzDataBoxEdgeOrder',
'Remove-AzDataBoxEdgeRole', 'Remove-AzDataBoxEdgeShare',
'Remove-AzDataBoxEdgeStorageAccount',
'Remove-AzDataBoxEdgeStorageAccountCredential',
'Remove-AzDataBoxEdgeStorageContainer',
'Remove-AzDataBoxEdgeTrigger', 'Remove-AzDataBoxEdgeUser',
'Set-AzDataBoxEdgeBandwidthSchedule', 'Set-AzDataBoxEdgeRole',
'Set-AzDataBoxEdgeShare',
'Set-AzDataBoxEdgeStorageAccountCredential',
'Set-AzDataBoxEdgeUser'
# Variables to export from this module
# VariablesToExport = @()
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = @()
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'Azure','ResourceManager','ARM','DataBoxEdge'
# A URL to the license for this module.
LicenseUri = 'https://aka.ms/azps-license'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/Azure/azure-powershell'
# A URL to an icon representing this module.
# IconUri = ''
# ReleaseNotes of this module
ReleaseNotes = '* Removed the outdated deps.json file.'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
# SIG # Begin signature block
# MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDgeSCBHi8PdRD4
# Gf76KvDSkDiFLujVrD5m+9GDlmaYlaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIH/o9MhE5TgAyM2XfSYdPrVs
# fwU/T7cwp4rxCzL5zyDEMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAOrOc9GYVwZwgSTCOzHYy9vjMqJCyteP2Gl/mLma72XUm+vAPZ0lW6N+P
# uueKDRmVoa3zWJH9xzRyN9+xHpWeFvphXZ1t1/IInzD80sfroXd/Yw/qOmRoMwGo
# LKQZYhRtleGFk0izrcLVMFc7k6xssJ2crWBb3aYJt50xizcTIub2AW85cUkL5DVX
# 3GI5XhhNPsRATDUpLuSpC98qrHidv9tezAUQpVuqeuGc9Yo/zDkWgAP9shN2RyLD
# jd/v7HVSEgybqeNFbQq/iAFIqH79xzcIXtpgOftg4xmxVj2d0WibpwoF0ujxll0k
# UyT8CuIVTrbKt+DOeJeIDTkrnhvhZ6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC
# F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCZ5q8ByS3MfuVM21sF32YIW8d1u2FIZbYdfBTkn2NcGwIGZjOaebNz
# GBMyMDI0MDUxNjA3MjMzMy42MTFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHtMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAABAAAB8jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYvQBtnYJTtKKj2FKxzHx0f
# gV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29edzGdlWbCj1Qyx5HUHNY8y
# u9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv29h1ttNWsSc/KPOeuhzS
# AXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRYcINfXDhURvUfD70jioE9
# 2rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycTEOBdGVmf1HCD7WOaz5EE
# cQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZUzN+BzcLj96ixC7wJGQM
# BixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7b8M7vvwhEL0xCOvb7WFM
# sstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHDoYhgj9uqPLP7vnoXf7j6
# +LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoeh/r3fShL6CHgPoTB7oYU
# /d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69mL8BRtSZ6dG/GFEVE+fV
# mgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2t5DAoDkuKCbC+3VdPmlY
# VQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAxBM5cH8Bg0+Y64oZ5MB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00XpOgPabcN3QZeyipgilcQ
# SDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/taPnobF+8CkAdkcLQhLdk
# Shfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5tuvirFaUWzUWVDFOpo/O5
# zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRMiJMzxpUlvdfWGUtCvnW3
# eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmwpsCtUh7tR6whCrVYkb6F
# udBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xLzk0bNxsAj0uhd6QdWr6T
# T39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpURJ6YiDKQd5YVgxsuZCWv4
# Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB8iQ5W8ZLM5PwT8vtsKEB
# wHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cXWOMJUJzyEH4WSKZHOx53
# qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gVPplqNPDIvQ8DkZ3lvbQs
# Yqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspEK8hllq3IYcyX0v897+X9
# YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ
# MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBr
# i943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e/kdzAiGA8yMDI0MDUxNjAxNDgz
# OVoYDzIwMjQwNTE3MDE0ODM5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp7+R3
# AgEAMAoCAQACAhdjAgH/MAcCAQACAhPkMAoCBQDp8TX3AgEAMDYGCisGAQQBhFkK
# BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ
# KoZIhvcNAQELBQADggEBAGgUSBK7uVURyU4HK/dJr1vVD5ZLQF2IVTBpgme2LkAy
# RNPOKxKPE5Ryfb8O9qjgD8qFoiA1ozsu7EFE0Z9/Rqk84cbeSEfs3ona7Atp4Vjb
# 6SxQgYFjGDlB43H0tjt6UrRKDp7ulM/Hpx9N96oEvr+sFS9/5M9THX/JkjED/UJ+
# Ow3mjJ+TZHdAn+/N0bYvK61QpGQeV3lgEa7Xx8hzYx0VaMYL7Zwea7M7OuTf1U0J
# tHqhpE4iAMv/UePbfUzs3zF3kt0adYNWzXmf1pdu4KO2ssdUPFHWHCJ3gTkcOB6y
# FOZidY/WZAQAG5gZWAUqBxPDLoUWk+QuDrzBDwv9igUxggQNMIIECQIBATCBkzB8
# MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk
# bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N
# aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+MtdkrHCRlAABAAAB
# 8jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MC8GCSqGSIb3DQEJBDEiBCBaeIPzg34wD4RO8ZLeHahRy2GxoTi/BB7pheidSFQm
# XDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPjaPh0uMVJc04+Y4Ru5BUUb
# HE4suZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQggJX3U7IzUMEK7mnRzIEEZ3gJ
# GNt/5ZfESO4QGjDmG2swDQYJKoZIhvcNAQELBQAEggIAlpAoc4PJ79VEE5WTUgqH
# Kccc7bpDHK8L+htjkQK2s1SSurmMuYM//iJmOGmOx9iieRW3dKo0DjHdmu1XfuyL
# pktuWJAEPvh/MF7I7x5HAWRc+2YoHbN+q/249eVDs1K5SxbXXrRJHiUPw6snRdfj
# 0QNX1StRUkCGYExN6lD+r9ekQTU4q6ybdJ5qIV/F+eitE3p/g5Bh4aWkvnSlbZlN
# Mqf57gs4N12hI2XAamfebiLP3oL08fADx9OMLb7WWy6C/n1eHx+U36SMt1bjTxEk
# e9XA5qFlGnnfnuc/GqJA7NJKh5earCGWeTj9g21hOa13l0hwR/jn8GhRIy/5/OdI
# D1gwJ/XWIk0OKjjjFXuokmwA4wkpP46NIct7G8JjOLNE4sx/hQmnYD0vYd7quXQQ
# rAgTJDJirZpRoJ+Wkcx/dEcXhzmYCUiatpNGB8bRAIiZfrMerqhlQy5dxxBoB0Rn
# 7J7zXAH8u52AZ1EvxlWX1U+fHwxhW1jVyf1UVvslL/9bIa4DRdB6QsfIiL6FIwi0
# HLU6mF+Db7qgL3QZiAO0rUV56EOgE/qTFwYbqKUuQ8irvhrPWD1tHGom834kkON0
# 6JPSxFNF4yKYL9Fv4f3ZjbYkZCK0gwZ971/4+c2HU8ETbBOCwUsNa/daCjB30H5l
# LKBDSvYu2ovMZHNmsNR3Yjg=
# SIG # End signature block
|
combined_dataset/train/non-malicious/New-SelfRestartingTask_1.ps1
|
New-SelfRestartingTask_1.ps1
|
function New-SelfRestartingTask {
<#
.Notes
For production use you should consider investigating more specific matching in the Query clause.
There are many possibilities here: you could watch for instances of a process with specific command-line parameters, or a certain caption, etc. Or, you could match against one process, but fire off a different one when it crashes.
Have a look at the Win32_Process class to see all the properties available for matching.
.Link
Win32_Process Class http://msdn.microsoft.com/en-us/library/aa394372%28VS.85%29.aspx
.Link
__InstanceDeletionEvent http://msdn.microsoft.com/en-us/library/aa394652%28VS.85%29.aspx
.Link
ScriptCenter article on Events http://www.microsoft.com/technet/scriptcenter/topics/winpsh/events.mspx
.Synopsis
Restarts an application when it exits or crashes
.Description
Create a WMIEvent handler to watch for the termination of a specific executable and restart it.
.Parameter Application
The path to an application you want to restart when it crashes
.Parameter Parameters
Parameters to be passed to the application when we (re)start it
.Parameter Start
Automatically start the process (even if it's already running)
.Parameter Interval
Polling interval to check whether the application has exited or not
.Example
New-SelfRestartingTask notepad -Start
Description
-----------
Starts notepad right away and monitors for crash or exit and restarts it.
.Example
New-SelfRestartingTask C:\\Program` Files\\Internet` Explorer\\IExplore.exe http://HuddledMasses.org
Description
-----------
Monitors for the termination of Internet Explorer and restarts it pointed at my blog.
Note that this does NOT start IE, so it could already be running, or you should start it by hand later...
#>
param(
[Parameter(Mandatory=$true, Position=0)]
[string]$Application
,
[Parameter(Mandatory=$false)]
[double]$Interval = 5.0
,
[Parameter(Mandatory=$false)]
[switch]$Start
,
[Parameter(ValueFromRemainingArguments=$true)]
[string[]]$Parameters
)
$ExecutablePath = gcm $Application -type application | select -expand definition -first 1 | %{ $_ -replace '\\\\','\\\\' }
if($Parameters) {
$Parameters = "-ArgumentList `"$($Parameters -join '", "')`""
}
$sb = Invoke-Expression "{ Start-Process `"$ExecutablePath`" $Parameters }"
Register-WMIEvent -Action $sb -Query "Select * From __InstanceDeletionEvent Within $Interval Where TargetInstance ISA 'Win32_Process' And TargetInstance.ExecutablePath='$ExecutablePath'" | Out-Null
if($Start){
sleep -milli 500
&$sb
}
}
|
combined_dataset/train/non-malicious/sample_21_57.ps1
|
sample_21_57.ps1
|
ConvertFrom-StringData @'
id_kb2655998_inactivetsportstitle=Checking for Inactive TS Ports
id_kb2655998_inactivetsportsdesc=Checking for the presence of a large number of inactive Terminal Server ports.
id_kb2655998_inactivetsportsst=Large number of Inactive Terminal Services ports detected
'@
# SIG # Begin signature block
# MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDIJ082Hg1gwOnt
# f/B2bxPudXEfuXh2Wtp1gu/6KpqZ/6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEII20XO+oNonDKQ/3JNbo4drI
# lZiZRi37cmU0AAiNuhuSMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAQ3NysGa2cBAaExcllD6GgMvaD3OldYiodoAPeIxkElrlCXPPzCEgSfr/
# sZKVP1Tc7DQPbq6CGY2rchfDBcluKbv4qU896v3VSVwfVL1mbmkvqmI9bPEkhAAZ
# 4F9F6aukqgdTXutz4p5QjJxdCdiVotlMgonLqaRtywLzxoB4DhOLNxRLAA6xLnrJ
# mEK7pyzbK0/Y6SRn/7NXOuJPP+/2FJKzia6EE+y7MPVxgbSoxZDCvEV8bHGFEjPF
# hl7nHt8AacislqR3jQtfa+fh2siK935f1nI9rh5gXnwQRymus+wUcQdjnBC0s6bc
# mhfo5XnpzPNIY1ZD+yUbCGZrrv+LQaGCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC
# F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAJCvYnIr4RaWOS5KXfyVCk5sUEr0PeGcwO7MI45kx/BwIGZuto66IJ
# GBMyMDI0MTAyODExNDAzOS43MjZaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB+8vLbDdn5TCVAAEAAAH7MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzExM1oXDTI1MTAyMjE4MzExM1owgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjU3MUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqMJWQeWAq4LwvSjYsjP0
# Uvhvm0j0aAOJiMLg0sLfxKoTXAdKD6oMuq5rF5oEiOxV+9ox0H95Q8fhoZq3x9lx
# guZyTOK4l2xtcgtJCtjXRllM2bTpjOg35RUrBy0cAloBU9GJBs7LBNrcbH6rBiOv
# qDQNicPRZwq16xyjMidU1J1AJuat9yLn7taifoD58blYEcBvkj5dH1la9zU846QD
# eOoRO6NcqHLsDx8/zVKZxP30mW6Y7RMsqtB8cGCgGwVVurOnaNLXs31qTRTyVHX8
# ppOdoSihCXeqebgJCRzG8zG/e/k0oaBjFFGl+8uFELwCyh4wK9Z5+azTzfa2GD4p
# 6ihtskXs3lnW05UKfDJhAADt6viOc0Rk/c8zOiqzh0lKpf/eWUY2o/hvcDPZNgLa
# HvyfDqb8AWaKvO36iRZSXqhSw8SxJo0TCpsbCjmtx0LpHnqbb1UF7cq09kCcfWTD
# PcN12pbYLqck0bIIfPKbc7HnrkNQks/mSbVZTnDyT3O8zF9q4DCfWesSr1akycDd
# uGxCdKBvgtJh1YxDq1skTweYx5iAWXnB7KMyls3WQZbTubTCLLt8Xn8t+slcKm5D
# kvobubmHSriuTA3wTyIy4FxamTKm0VDu9mWds8MtjUSJVwNVVlBXaQ3ZMcVjijyV
# oUNVuBY9McwYcIQK62wQ20ECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRHVSGYUNQ3
# RwOl71zIAuUjIKg1KjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAwzoIKOY2dnUj
# fWuMiGoz/ovoc1e86VwWaZNFdgRmOoQuRe4nLdtZONtTHNk3Sj3nkyBszzxSbZEQ
# 0DduyKHHI5P8V87jFttGnlR0wPP22FAebbvAbutkMMVQMFzhVBWiWD0VAnu9x0fj
# ifLKDAVXLwoun5rCFqwbasXFc7H/0DPiC+DBn3tUxefvcxUCys4+DC3s8CYp7WWX
# pZ8Wb/vdBhDliHmB7pWcmsB83uc4/P2GmAI3HMkOEu7fCaSYoQhouWOr07l/KM4T
# ndylIirm8f2WwXQcFEzmUvISM6ludUwGlVNfTTJUq2bTDEd3tlDKtV9AUY3rrnFw
# HTwJryLtT4IFhvgBfND3mL1eeSakKf7xTII4Jyt15SXhHd5oI/XGjSgykgJrWA57
# rGnAC7ru3/ZbFNCMK/Jj6X8X4L6mBOYa2NGKwH4A37YGDrecJ/qXXWUYvfLYqHGf
# 8ThYl12Yg1rwSKpWLolA/B1eqBw4TRcvVY0IvNNi5sm+//HJ9Aw6NJuR/uDR7X7v
# DXicpXMlRNgFMyADb8AFIvQPdHqcRpRorY+YUGlvzeJx/2gNYyezAokbrFhACsJ2
# BfyeLyCEo6AuwEHn511PKE8dK4JvlmLSoHj7VFR3NHDk3zRkx0ExkmF8aOdpvoKh
# uwBCxoZ/JhbzSzrvZ74GVjKKIyt5FA0wggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUABHHn7NCGusZz2RfVbyuwYwPykBWggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOrJT0swIhgPMjAyNDEwMjcyMzQ2MTlaGA8yMDI0MTAyODIzNDYxOVowdzA9
# BgorBgEEAYRZCgQBMS8wLTAKAgUA6slPSwIBADAKAgEAAgINvAIB/zAHAgEAAgIU
# vzAKAgUA6sqgywIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow
# CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQCt9+78tOBk
# 3G7InFWNeSnv+gNf7827NofcCXCIrLQa834+WZOE6YjVcA8B4zRZWYQt61ryjsP7
# nO4QK9AT7twzBe+cVhqFCO+umtt9HILo/02fBvZqGhC0aABNMEKKtN5mHLc0RqyR
# jYVeyJJgW3o+AuIAomNefMMnMlPFbCzeVx+VWfowu6aZGIf20olcJr1Udx5TxmnY
# dsKjQyDDl6Lmtl54TbeWFF6Uai0RRHKqDZXeiYK0nnazQchF9LlhnVpwArQ160lu
# nLrYsrAoYdqLC+X0Bz+PmzShMHudHvUpm9HSYaJSjBDw/SBZA3RVy2I0EMGwb608
# ErihFwOktb8UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAH7y8tsN2flMJUAAQAAAfswDQYJYIZIAWUDBAIBBQCgggFKMBoG
# CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgUVG21Z9T
# 1Y+xXWng7vz9lR1mq7kN4A+RHOqy4dRxAvcwgfoGCyqGSIb3DQEJEAIvMYHqMIHn
# MIHkMIG9BCA52wKr/KCFlVNYiWsCLsB4qhjEYEP3xHqYqDu1SSTlGDCBmDCBgKR+
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+8vLbDdn5TCVAAEA
# AAH7MCIEIOcOJM95z1rtLRPImI9GcCxcLV/lXPRviSc4qDRq2ZeFMA0GCSqGSIb3
# DQEBCwUABIICAHhFiB4wN1naj9odUdmt8cL8esBqMPCLxkQp5LPcdwvK7WJWqjBK
# atNyZSHGt70eG/taWZAOH2zWbS1SePvH/0fJxgfJvY4bXWDYW1RQ5D1MtJxzZQyb
# Crll/nJ7j9tD/PS4TLGit9D69iLcCSPUJF8sAgzORKtrgIbvjFGvPi1HF/NzKBmC
# 8hauqw40FzVEfD61f0dlwD34b+YWkikcG55pyXH3pEVsxayFxRcLWv7t6YygO0Wh
# EmdcwvDfom3uY8BMnTWzoaI/8To/TzNeUUcC3ymCmXt1nysYK0rLIbZBScpIMPCM
# eUFpbpjBWN+aGqYD7DJciDJzslz12SGUBJljTaunS9/fyCjMlhs3wul8GTqt/wNS
# 7kgtCd2Vf+/9nHodgQDtBl1bUHUMswSi0iy55K3vu/Ut/K6boRyGum6BSrgH45KO
# APIpAMVSQbDwIkCI/syl5BjKgvFQzpkqrV9o907EXAKd/Vlemd79kaSCc27X4BF/
# OzGXyZgltjCxVBqOfl2ccOgew5Oqgk+dIpwHjqTVTxwVgMoi5M6yvieO7ecual6C
# CQisntv1G880ESKwOzAoPkMtQA1R8awn2Z7g9vI4QKjcysbnBQGe/PDKSCcDkqYn
# Fbpea/4JwZkS3Xh6qwGzcZZAfeU2yyi3RMC2Q2vDheCDl4NgvtzWHRlL
# SIG # End signature block
|
combined_dataset/train/non-malicious/3515.ps1
|
3515.ps1
|
function Get-ResourceGroupName
{
return getAssetName
}
function Get-ResourceName
{
return getAssetName
}
function Get-VirtualNetworkName
{
return getAssetName
}
function TestSetup-CreateResourceGroup
{
$resourceGroupName = Get-ResourceGroupName
$rglocation = "West US"
$resourceGroup = New-AzResourceGroup -Name $resourceGroupName -location $rglocation
return $resourceGroup
}
function TestSetup-CreateVirtualNetwork($resourceGroup)
{
$virtualNetworkName = Get-VirtualNetworkName
$location = Get-Location -ProviderNamespace "microsoft.network" -ResourceType "virtualNetworks" -PreferredLocation "West US"
$virtualNetwork = New-AzVirtualNetwork -Name $virtualNetworkName -ResourceGroupName $resourceGroup.ResourceGroupName -Location $location -AddressPrefix "10.0.0.0/8"
return $virtualNetwork
}
function Get-RandomZoneName
{
$prefix = getAssetName;
return $prefix + ".pstest.test" ;
}
function Get-RandomLinkName
{
$prefix = getAssetName;
return $prefix + ".testlink" ;
}
function Get-TxtOfSpecifiedLength([int] $length)
{
$returnValue = "";
for ($i = 0; $i -lt $length ; $i++)
{
$returnValue += "a";
}
return $returnValue;
}
function Create-VirtualNetworkLink([bool] $registrationEnabled)
{
$zoneName = Get-RandomZoneName
$linkName = Get-RandomLinkName
$resourceGroup = TestSetup-CreateResourceGroup
$createdZone = New-AzPrivateDnsZone -Name $zoneName -ResourceGroupName $resourceGroup.ResourceGroupName -Tag @{tag1="value1"}
$createdVirtualNetwork = TestSetup-CreateVirtualNetwork $resourceGroup
if($registrationEnabled)
{
$createdLink = New-AzPrivateDnsVirtualNetworkLink -ZoneName $zoneName -ResourceGroupName $resourceGroup.ResourceGroupName -Name $linkName -Tag @{tag1="value1"} -VirtualNetworkId $createdVirtualNetwork.Id -EnableRegistration
}
else
{
$createdLink = New-AzPrivateDnsVirtualNetworkLink -ZoneName $zoneName -ResourceGroupName $resourceGroup.ResourceGroupName -Name $linkName -Tag @{tag1="value1"} -VirtualNetworkId $createdVirtualNetwork.Id
}
return $createdLink
}
|
combined_dataset/train/non-malicious/sample_66_70.ps1
|
sample_66_70.ps1
|
# Web Deploy: Powershell script which contains common functionality for other scripts to reference.
# Copyright (C) Microsoft Corp. 2010
#
# Requirements: IIS 7, Windows Server 2008 (or higher)
#
Import-LocalizedData -BindingVariable Resources -FileName Resources.psd1
#constants
$Global:ScriptError = 0
$Global:Warning = 1
$Global:Info = 2
$Global:RegistryPath = "HKLM:\SOFTWARE\Microsoft\IIS Extensions\MSDeploy"
# this function does logging
function write-log([int]$type, [string]$info)
{
$message = $info -f $args
$logMessage = get-date -format HH:mm:ss
Switch($type){
$Global:ScriptError{
$logMessage = $logMessage + "`t" + $Resources.Error + "`t" + $message
write-host -foregroundcolor white -backgroundcolor red $logMessage
}
$Global:Warning{
$logMessage = $logMessage + "`t" + $Resources.Warning + "`t" + $message
write-host -foregroundcolor black -backgroundcolor yellow $logMessage
}
default{
$logMessage = $logMessage + "`t" + $Resources.Info + "`t" + $message
write-host -foregroundcolor black -backgroundcolor green $logMessage
}
}
}
function Initialize
{
try
{
[System.Reflection.Assembly]::LoadFrom( ${env:windir} + "\system32\inetsrv\Microsoft.Web.Administration.dll" ) > $null
}
catch [System.Reflection.Assembly]
{
write-log $Global:ScriptError $Resources.CheckIIS7Installed
throw
}
LoadLatestDeploymentDll
}
# Loads latest Web Deploy into session
function LoadLatestDeploymentDll
{
try
{
push-location .
set-location "HKLM:"
$vers = @(Get-ChildItem $Global:RegistryPath)
$i = $vers.Count-1
$ver = $null
for($i; $i -ge 0; $i--)
{
$regPath = $vers[$i].Name
$properties = Get-ItemProperty -LiteralPath $regPath
if(($properties.Install -ne $null) -and $properties.Install -eq 1)
{
$v = New-Object Version -ArgumentList $properties.Version
$ver = "$($v.Major).$($v.Minor).0.0"
break
}
}
if($ver -ne $null)
{
Add-Type -AssemblyName "microsoft.web.deployment, Version=$ver, Culture=neutral, PublicKeyToken=31bf3856ad364e35"
}
else
{
write-log $Global:ScriptError $Resources.CouldNotLoadDeploymentDll
}
}
catch [Exception]
{
write-log $Global:ScriptError $Resources.CouldNotLoadDeploymentDll
throw
}
finally
{
pop-location
}
if($e -ne $null)
{
throw $e
}
}
# Verifies ExcludedProviders with providers that are installed.
function VerifyAndDeleteExcludedProviders
{
param(
[string] $SiteName,
[System.Collections.ArrayList] $ExcludedProviders = $null,
[Parameter(Mandatory=$true)]
[string] $SectionName
)
try
{
$serverManager = New-Object Microsoft.Web.Administration.ServerManager
$appHostConfig = $serverManager.GetApplicationHostConfiguration()
if($null -ne $ExcludedProviders)
{
if([string]::IsNullOrEmpty($SiteName))
{
$configSection = $appHostConfig.GetSection($BackupSectionName)
}
else
{
$configSection = $appHostConfig.GetSection($BackupSectionName, $SiteName)
}
# Find the ExcludedProviders Element
$configSection.ChildElements | out-null
foreach($child in $configSection.ChildElements)
{
$excludedProvidersElem = $null
if($child.Schema -is [Microsoft.Web.Administration.ConfigurationCollectionSchema] -and `
$child.Schema.AddElementNames -eq "provider")
{
$excludedProvidersElem = $child
break
}
}
$factories = [microsoft.web.deployment.deploymentmanager]::AvailableProviderFactories
$duplicateProviders = @()
$globalProviders = @(GetGlobalExcludedProviders -AppHostConfig $appHostConfig -SectionName $sectionName)
$existingProvCollection = $excludedProvidersElem.GetCollection()
$existingProviders = @()
foreach($provider in $existingProvCollection)
{
$existingProviders += $provider.GetAttributeValue("name")
}
foreach($provider in $ExcludedProviders)
{
# Checking to see if provider is a valid provider that exists on this server
$factory = $null
foreach($f in $factories)
{
if($f.Name -like $provider)
{
$factory = $f
break
}
}
if($factory -eq $null)
{
$mesg = $Resources.ProviderDoesNotExist -f $provider
write-log $Global:ScriptError $mesg
throw new-object System.ArgumentException -ArgumentList $mesg
}
# Figure out if you should add the provider or not
$globalOccurancesOfProvider = CountOccurancesOfStringInList -List $globalProviders -StringToCheck $provider
# Check to see if the provider already exists at the global level
if([string]::IsNullOrEmpty($SiteName))
{
if($globalOccurancesOfProvider -gt 0)
{
$duplicateProviders += $provider
}
}
else
{
# Check to see if the global list is the same as site list. Need to do this because config API's only
# return the entire inherited list of providers. So we compare the list of global providers against the
# list of site providers and figure out the difference.
$siteOccurancesOfProvider = CountOccurancesOfStringInList -List $existingProviders -StringToCheck $provider
if($siteOccurancesOfProvider -gt $globalOccurancesOfProvider)
{
$duplicateProviders += $provider
}
}
}
# Remove duplicate providers if necessary
foreach($provider in $duplicateProviders)
{
$ExcludedProviders.Remove($provider)
}
}
}
finally
{
if($serverManager -ne $null)
{
$serverManager.Dispose()
}
}
return $ExcludedProviders
}
function GetGlobalExcludedProviders
{
param(
$appHostConfig,
$sectionName
)
$configSection = $appHostConfig.GetSection($sectionName)
$existingProvCollection = @(GetExcludedProvidersColletion -configSection $configSection)
$existingProviders = @()
foreach($provider in $existingProvCollection)
{
$existingProviders += $provider.GetAttributeValue("name")
}
return $existingProviders
}
function RemoveDuplicatesFromList
{
param(
[string[]] $list
)
$hash = @{}
foreach($s in $list)
{
$hash[$s] = $null
}
$arrayList = new-object -Type System.Collections.ArrayList -ArgumentList $hash.Keys
return $arrayList
}
function CountOccurancesOfStringInList
{
param(
[string[]] $list,
[string] $stringToCheck
)
$num = 0
foreach($s in $list)
{
if($s -like $stringToCheck)
{
$num++
}
}
return $num
}
function GetExcludedProvidersColletion
{
param(
[Microsoft.Web.Administration.ConfigurationSection] $configSection
)
# Find the ExcludedProviders Element
$configSection.ChildElements | out-null
foreach($child in $configSection.ChildElements)
{
$excludedProvidersElem = $null
if($child.Schema -is [Microsoft.Web.Administration.ConfigurationCollectionSchema] -and `
$child.Schema.AddElementNames -eq "provider")
{
$excludedProvidersElem = $child
break
}
}
return $excludedProvidersElem.GetCollection()
}
function GetBackupSettingsProviderElem
{
param(
[Microsoft.Web.Administration.ConfigurationSection] $configSection
)
# Find the backupSettingsProvider Element
$configSection.ChildElements | out-null
foreach($child in $configSection.ChildElements)
{
if($child.Schema.Name -like $BackupSettingsProviderElemName)
{
$backupProviderElem = $child
break
}
}
return $backupProviderElem
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA9sy+QDs9w1sqR
# UQaShDSMfeF9fS+amxsYhGclB0vLLqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHXdm8Gf5RHQmPtKJOAqEgGk
# r/6+rmV9Y2eAgZW6OZ8/MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAg2zczBP+mm6h2N+jqZECzrG+xLkqbEVdwE1r8LMB4l/O5TUr+NG/BF9g
# ULCzN1HsroRPN2Trt0V97S98DtVOmHYS4dv69Pp0VZoymVYiZGVaDZhH+mHoRHk5
# REceUk43HhZuOJPuf25VBiHX76TFFOxENcCUSFP28+GIVWRCviVrPc3DiXwlQBBu
# OyRFPpxJQchimBsxNkIV4PDAYC6R1BRnKkSh6bSn6/tp2+hbJC55EF2Gl7E/tV+C
# nJlP8BcAIw9aN8ZHFv5mOGiHrCvaHfx3j78J/P5PHRBeCfp5K5BcsyzsB4qMVYjy
# 9hVbcTv0UnbGzW+9EaLwR1ar8/a6d6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCFew/yxZF8TG/eU3vd9oLl8QDaoKPCeVG5XZ5r56yLygIGZc4cJzPz
# GBMyMDI0MDIyODIxMTAzOC44MDRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAehQsIDPK3KZTQABAAAB6DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MjJaFw0yNTAzMDUxODQ1MjJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDhQXdE0WzXG7wzeC9SGdH6eVwdGlF6YgpU7weOFBkp
# W9yuEmJSDE1ADBx/0DTuRBaplSD8CR1QqyQmxRDD/CdvDyeZFAcZ6l2+nlMssmZy
# C8TPt1GTWAUt3GXUU6g0F0tIrFNLgofCjOvm3G0j482VutKS4wZT6bNVnBVsChr2
# AjmVbGDN/6Qs/EqakL5cwpGel1te7UO13dUwaPjOy0Wi1qYNmR8i7T1luj2JdFdf
# ZhMPyqyq/NDnZuONSbj8FM5xKBoar12ragC8/1CXaL1OMXBwGaRoJTYtksi9njuq
# 4wDkcAwitCZ5BtQ2NqPZ0lLiQB7O10Bm9zpHWn9x1/HmdAn4koMWKUDwH5sd/zDu
# 4vi887FWxm54kkWNvk8FeQ7ZZ0Q5gqGKW4g6revV2IdAxBobWdorqwvzqL70Wdsg
# DU/P5c0L8vYIskUJZedCGHM2hHIsNRyw9EFoSolDM+yCedkz69787s8nIp55icLf
# DoKw5hak5G6MWF6d71tcNzV9+v9RQKMa6Uwfyquredd5sqXWCXv++hek4A15WybI
# c6ufT0ilazKYZvDvoaswgjP0SeLW7mvmcw0FELzF1/uWaXElLHOXIlieKF2i/YzQ
# 6U50K9dbhnMaDcJSsG0hXLRTy/LQbsOD0hw7FuK0nmzotSx/5fo9g7fCzoFjk3tD
# EwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPo5W8o980kMfRVQba6T34HwelLaMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCWfcJm2rwXtPi74km6PKAkni9+BWotq+Qt
# DGgeT5F3ro7PsIUNKRkUytuGqI8thL3Jcrb03x6DOppYJEA+pb6o2qPjFddO1TLq
# vSXrYm+OgCLL+7+3FmRmfkRu8rHvprab0O19wDbukgO8I5Oi1RegMJl8t5k/UtE0
# Wb3zAlOHnCjLGSzP/Do3ptwhXokk02IvD7SZEBbPboGbtw4LCHsT2pFakpGOBh+I
# SUMXBf835CuVNfddwxmyGvNSzyEyEk5h1Vh7tpwP7z7rJ+HsiP4sdqBjj6Avopuf
# 4rxUAfrEbV6aj8twFs7WVHNiIgrHNna/55kyrAG9Yt19CPvkUwxYK0uZvPl2WC39
# nfc0jOTjivC7s/IUozE4tfy3JNkyQ1cNtvZftiX3j5Dt+eLOeuGDjvhJvYMIEkpk
# V68XLNH7+ZBfYa+PmfRYaoFFHCJKEoRSZ3PbDJPBiEhZ9yuxMddoMMQ19Tkyftot
# 6Ez0XhSmwjYBq39DvBFWhlyDGBhrU3GteDWiVd9YGSB2WnxuFMy5fbAK6o8PWz8Q
# RMiptXHK3HDBr2wWWEcrrgcTuHZIJTqepNoYlx9VRFvj/vCXaAFcmkW1nk7VE+ow
# aXr5RJjryDq9ubkyDq1mdrF/geaRALXcNZbfNXIkhXzXA6a8CiamcQW/DgmLJpiV
# QNriZYCHIDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCM
# JG4vg0juMOVn2BuKACUvP80FuqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6Ym9yTAiGA8yMDI0MDIyODE0MTIy
# NVoYDzIwMjQwMjI5MTQxMjI1WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpib3J
# AgEAMAcCAQACAgGBMAcCAQACAhKzMAoCBQDpiw9JAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAGXv4vlLO8gzWrOxDmbfTaiLQdoUzc54XV1m12w3DdLflfXI
# UQ/ipLh6j0CPVroo2rQAUJM/zt+UoYMna6gA53YAth/8qwSODwNMVbDBvLo5Ausv
# 8YqOdAVby4zB3f9gCyl1FO3BWeAH8jvOhoQI2hZ7+MtstJLPSLlMEsUAcYnaDUcR
# GAzhDpv8h3xjwjY0sdnL/mR9bfXbGvYHipfodCqYFH2vLz1xFysAGnb3thuOxv4M
# gynG96bXn9+SAthPn+iDad7DyHb+D/QfpRfi6Ry7+GLWS6AVvwFAvKms8WuIzWF2
# Yxk0tmoFAHDHuB225n8j/nQ8x6vK9Xeot5Dsb8ExggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAehQsIDPK3KZTQABAAAB6DAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCBCS8U61uBx4mjdaQ+zGdjGmgNqFVmh0i8EvmzPhLYnsDCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICrS2sTVAoQggkHR59pNqige0xfJ
# T2J3U8W1Sc8H+OsdMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHoULCAzytymU0AAQAAAegwIgQgI/4QSxpcLlAnZ/i2tkiLuo2UWAAO
# NNtqaQGv/b8JbO4wDQYJKoZIhvcNAQELBQAEggIAJW1rTTwQt9x/8/At6RjiH4uZ
# UyUQR80GBgy8oKEUHkFIc7iGqSKqket+mmNwWk8nJtcvs0zGbHdc7tRB3J+Uxt9i
# eMNjcI/Zea0cJwtrSi2eCb3uGW/nipFsdAQozDAy0YzOoy3gnQ/fNmrhT4rVaW6Y
# da2awQkQnaQzJFMMZr6tSTigL+/tR6iMFgk1Z/WQNJiM5VT9b0UjhNZcUGr5aG7F
# Q/PjSHvRsf8o8Hv/qWnu1WVwhjhqcL5dQllNzhaQoMqb0bozDscqiDpIObAAdZLQ
# BqO9evMpGhuCnMPXtqYdaO1CCarzv59gJae1G15WB/Rk778/g0Umoml03sY9MIwu
# /wHY2Df7CclMkFqXAI0rmPPp7s3TZDRBO3Tp1zaDUOUQdiW4LRi+1ZYNz8OwCsBX
# yPtI71OhsvKkIS4Xq3sA30OHIPysWWVzJJ2C5L2y130/nDyNhquPULTkaRSSvypK
# p9SGJcmgxLH0Hiu4bY2NZ4dq4l22Z0d3TDMafwKcNiEnFJVD/terjz8q1aEAcTFj
# /dw6eWQr/F/ahpr8VAy8TfIrFQYSC1zEFiWL4nBrelLQT0SiHoJxOWZ0KLhhue64
# 5FrE2T86juKxYT0U5kBlqJZTSA6hXjnxiYWna+9GKc9hjSu6YFF6iQOK/aFosVc1
# 43a1on3vaRoF6hWn/q0=
# SIG # End signature block
|
combined_dataset/train/non-malicious/2147.ps1
|
2147.ps1
|
Describe 'conversion syntax' -Tags "CI" {
It 'converts array of single enum to bool' {
[bool]@([ConsoleColor]::Black) | Should -BeFalse
[bool]@([ConsoleColor]::Yellow) | Should -BeTrue
}
It 'calls virtual method non-virtually' {
([object]"abc").ToString() | Should -Be "System.String"
$r = [guid]::NewGuid().Guid
([object]($r + "a")).Equals(($r + "a")) | Should -BeFalse
}
It 'calls method on a super-type, when conversion syntax used' {
([System.Management.Automation.ActionPreference]"Stop").ToString() | Should -Be "Stop"
}
Context "Cast object[] to more narrow generic collection" {
BeforeAll {
$testCases1 = @(
@{ Command = {$result = [Collections.Generic.List[int]]@(1)}; CollectionType = 'List`1'; ElementType = "Int32"; Elements = @(1) }
@{ Command = {$result = [Collections.Generic.List[int]]@(1,2)}; CollectionType = 'List`1'; ElementType = "Int32"; Elements = @(1,2) }
@{ Command = {$result = [Collections.Generic.List[int]]"4"}; CollectionType = 'List`1'; ElementType = "Int32"; Elements = @(4) }
@{ Command = {$result = [Collections.Generic.List[int]]@("4","5")}; CollectionType = 'List`1'; ElementType = "Int32"; Elements = @(4,5) }
@{ Command = {$result = [Collections.Generic.List[string]]@(1)}; CollectionType = 'List`1'; ElementType = "String"; Elements = @("1") }
@{ Command = {$result = [Collections.Generic.List[string]]@(1,2)}; CollectionType = 'List`1'; ElementType = "String"; Elements = @("1","2") }
@{ Command = {$result = [Collections.Generic.List[string]]1}; CollectionType = 'List`1'; ElementType = "String"; Elements = @("1") }
@{ Command = {$result = [Collections.Generic.List[string]]@("4")}; CollectionType = 'List`1'; ElementType = "String"; Elements = @("4") }
@{ Command = {$result = [System.Collections.ObjectModel.Collection[int]]@(1)}; CollectionType = 'Collection`1'; ElementType = "Int32"; Elements = @(1) }
@{ Command = {$result = [System.Collections.ObjectModel.Collection[int]]@(1,2)}; CollectionType = 'Collection`1'; ElementType = "Int32"; Elements = @(1,2) }
@{ Command = {$result = [System.Collections.ObjectModel.Collection[int]]"4"}; CollectionType = 'Collection`1'; ElementType = "Int32"; Elements = @(4) }
@{ Command = {$result = [System.Collections.ObjectModel.Collection[int]]@("4","5")}; CollectionType = 'Collection`1'; ElementType = "Int32"; Elements = @(4,5) }
@{ Command = {$result = [Collections.Generic.List[System.IO.FileInfo]]@('TestFile')};
CollectionType = 'List`1'; ElementType = "FileInfo"; Elements = @('TestFile') }
@{ Command = {$result = [Collections.Generic.List[System.IO.FileInfo]]@('TestFile1', 'TestFile2')};
CollectionType = 'List`1'; ElementType = "FileInfo"; Elements = @('TestFile1', 'TestFile2') }
@{ Command = {$result = [Collections.Generic.List[System.IO.FileInfo]]'TestFile'};
CollectionType = 'List`1'; ElementType = "FileInfo"; Elements = @('TestFile') }
)
}
It "<Command>" -TestCases $testCases1 {
param($Command, $CollectionType, $ElementType, $Elements)
$result = $null
. $Command
$result | Should -Not -BeNullOrEmpty
$result.GetType().Name | Should -Be $CollectionType
$genericArgs = $result.GetType().GetGenericArguments()
$genericArgs.Length | Should -Be 1
$genericArgs[0].Name | Should -Be $ElementType
$result.Count | Should -Be $Elements.Length
$result -join ";" | Should -Be ($Elements -join ";")
}
}
}
Describe "Type resolution should prefer assemblies in powershell assembly cache" -Tags "Feature" {
BeforeAll {
$cmdletCode = @'
namespace TestTypeResolution {
using System.Management.Automation;
[Cmdlet("Test", "TypeResolution")]
public class TestTypeResolutionCommand : PSCmdlet {
[Parameter()]
public string Name { get; set; }
protected override void BeginProcessing() {
WriteObject(Name);
}
}
public class TestTypeFoo {
public string Foo { get; set; }
}
}
'@
$dupTypeCode = @'
namespace TestTypeResolution {
public class TestTypeFoo {
public string Bar { get; set; }
}
}
'@
$cmdletDllDir = Join-Path $TestDrive "cmdlet"
$dupTypeDllDir = Join-Path $TestDrive "dupType"
$null = New-Item -Path $cmdletDllDir, $dupTypeDllDir -ItemType Directory -Force
$cmdletDllPath = Join-Path $cmdletDllDir "TestCmdlet.dll"
$dupTypeDllPath = Join-Path $dupTypeDllDir "TestType.dll"
Add-Type $cmdletCode -OutputAssembly $cmdletDllPath
Add-Type $dupTypeCode -OutputAssembly $dupTypeDllPath
$powershell = Join-Path $PSHOME "pwsh"
}
It "validate Type resolution should prefer the assembly loaded by Import-Module" {
$command = @"
Add-Type -Path $dupTypeDllPath
Import-Module $cmdletDllPath
[TestTypeResolution.TestTypeFoo].Assembly.Location
"@
$location = & $powershell -noprofile -command $command
$location | Should -Be $cmdletDllPath
}
}
Describe 'method conversion' -Tags 'CI' {
class M {
[int] Twice([int] $value) { return 2 * $value }
[int] ThriceInstance([int] $value) { return 3 * $value }
static [int] Thrice([int] $value) { return 3 * $value }
static [int] Add([int] $i, [int16] $j) { return $i + $j }
static [int] Apply([int] $value, [Func[int, int]] $function) {
return $function.Invoke($value)
}
static [int] Apply([int] $v1, [Int16] $v2, [Func[int, int16, int]] $function) {
return $function.Invoke($v1, $v2)
}
static [char] Foo([char] $i) {return $i}
static [char] Foo([char] $i, [char] $j) {return $i}
static [char] Foo([char] $i, [char] $j, [char] $k) {return $i}
static [char] Foo([char] $i, [char] $j, [char] $k, [char] $l) {return $i}
static [char] Foo([char] $i, [char] $j, [char] $k, [char] $l, [char] $m) {return $i}
static [char] Foo([char] $i, [char] $j, [char] $k, [char] $l, [char] $m, [char] $n) {return $i}
static [char] Foo([char] $i, [char] $j, [char] $k, [char] $l, [char] $m, [char] $n, [char] $o) {return $i}
static [char] Foo([char] $i, [char] $j, [char] $k, [char] $l, [char] $m, [char] $n, [char] $o, [char] $p) {return $i}
static [int16] Foo([int16] $i) {return $i}
static [int16] Foo([int16] $i, [int16] $j) {return $i}
static [int16] Foo([int16] $i, [int16] $j, [int16] $k) {return $i}
static [int16] Foo([int16] $i, [int16] $j, [int16] $k, [int16] $l) {return $i}
static [int16] Foo([int16] $i, [int16] $j, [int16] $k, [int16] $l, [int16] $m) {return $i}
static [int16] Foo([int16] $i, [int16] $j, [int16] $k, [int16] $l, [int16] $m, [int16] $n) {return $i}
static [int16] Foo([int16] $i, [int16] $j, [int16] $k, [int16] $l, [int16] $m, [int16] $n, [int16] $o) {return $i}
static [int16] Foo([int16] $i, [int16] $j, [int16] $k, [int16] $l, [int16] $m, [int16] $n, [int16] $o, [int16] $p) {return $i}
static [int] Foo([int] $i) {return $i}
static [int] Foo([int] $i, [int] $j) {return $i}
static [int] Foo([int] $i, [int] $j, [int] $k) {return $i}
static [int] Foo([int] $i, [int] $j, [int] $k, [int] $l) {return $i}
static [int] Foo([int] $i, [int] $j, [int] $k, [int] $l, [int] $m) {return $i}
static [int] Foo([int] $i, [int] $j, [int] $k, [int] $l, [int] $m, [int] $n) {return $i}
static [int] Foo([int] $i, [int] $j, [int] $k, [int] $l, [int] $m, [int] $n, [int] $o) {return $i}
static [int] Foo([int] $i, [int] $j, [int] $k, [int] $l, [int] $m, [int] $n, [int] $o, [int] $p) {return $i}
static [UInt32] Foo([UInt32] $i) {return $i}
static [UInt32] Foo([UInt32] $i, [UInt32] $j) {return $i}
static [UInt32] Foo([UInt32] $i, [UInt32] $j, [UInt32] $k) {return $i}
static [UInt32] Foo([UInt32] $i, [UInt32] $j, [UInt32] $k, [UInt32] $l) {return $i}
static [UInt32] Foo([UInt32] $i, [UInt32] $j, [UInt32] $k, [UInt32] $l, [UInt32] $m) {return $i}
static [UInt32] Foo([UInt32] $i, [UInt32] $j, [UInt32] $k, [UInt32] $l, [UInt32] $m, [UInt32] $n) {return $i}
static [UInt32] Foo([UInt32] $i, [UInt32] $j, [UInt32] $k, [UInt32] $l, [UInt32] $m, [UInt32] $n, [UInt32] $o) {return $i}
static [UInt32] Foo([UInt32] $i, [UInt32] $j, [UInt32] $k, [UInt32] $l, [UInt32] $m, [UInt32] $n, [UInt32] $o, [UInt32] $p) {return $i}
static [UInt64] Foo([UInt64] $i) {return $i}
static [UInt64] Foo([UInt64] $i, [UInt64] $j) {return $i}
static [UInt64] Foo([UInt64] $i, [UInt64] $j, [UInt64] $k) {return $i}
static [UInt64] Foo([UInt64] $i, [UInt64] $j, [UInt64] $k, [UInt64] $l) {return $i}
static [UInt64] Foo([UInt64] $i, [UInt64] $j, [UInt64] $k, [UInt64] $l, [UInt64] $m) {return $i}
static [UInt64] Foo([UInt64] $i, [UInt64] $j, [UInt64] $k, [UInt64] $l, [UInt64] $m, [UInt64] $n) {return $i}
static [UInt64] Foo([UInt64] $i, [UInt64] $j, [UInt64] $k, [UInt64] $l, [UInt64] $m, [UInt64] $n, [UInt64] $o) {return $i}
static [UInt64] Foo([UInt64] $i, [UInt64] $j, [UInt64] $k, [UInt64] $l, [UInt64] $m, [UInt64] $n, [UInt64] $o, [UInt64] $p) {return $i}
static [float] Foo([float] $i) {return $i}
static [float] Foo([float] $i, [float] $j) {return $i}
static [float] Foo([float] $i, [float] $j, [float] $k) {return $i}
static [float] Foo([float] $i, [float] $j, [float] $k, [float] $l) {return $i}
static [float] Foo([float] $i, [float] $j, [float] $k, [float] $l, [float] $m) {return $i}
static [float] Foo([float] $i, [float] $j, [float] $k, [float] $l, [float] $m, [float] $n) {return $i}
static [float] Foo([float] $i, [float] $j, [float] $k, [float] $l, [float] $m, [float] $n, [float] $o) {return $i}
static [float] Foo([float] $i, [float] $j, [float] $k, [float] $l, [float] $m, [float] $n, [float] $o, [float] $p) {return $i}
static [double] Foo([double] $i) {return $i}
static [double] Foo([double] $i, [double] $j) {return $i}
static [double] Foo([double] $i, [double] $j, [double] $k) {return $i}
static [double] Foo([double] $i, [double] $j, [double] $k, [double] $l) {return $i}
static [double] Foo([double] $i, [double] $j, [double] $k, [double] $l, [double] $m) {return $i}
static [double] Foo([double] $i, [double] $j, [double] $k, [double] $l, [double] $m, [double] $n) {return $i}
static [double] Foo([double] $i, [double] $j, [double] $k, [double] $l, [double] $m, [double] $n, [double] $o) {return $i}
static [double] Foo([double] $i, [double] $j, [double] $k, [double] $l, [double] $m, [double] $n, [double] $o, [double] $p) {return $i}
static [IntPtr] Foo([IntPtr] $i) {return $i}
static [IntPtr] Foo([IntPtr] $i, [IntPtr] $j) {return $i}
static [IntPtr] Foo([IntPtr] $i, [IntPtr] $j, [IntPtr] $k) {return $i}
static [IntPtr] Foo([IntPtr] $i, [IntPtr] $j, [IntPtr] $k, [IntPtr] $l) {return $i}
static [IntPtr] Foo([IntPtr] $i, [IntPtr] $j, [IntPtr] $k, [IntPtr] $l, [IntPtr] $m) {return $i}
static [IntPtr] Foo([IntPtr] $i, [IntPtr] $j, [IntPtr] $k, [IntPtr] $l, [IntPtr] $m, [IntPtr] $n) {return $i}
static [IntPtr] Foo([IntPtr] $i, [IntPtr] $j, [IntPtr] $k, [IntPtr] $l, [IntPtr] $m, [IntPtr] $n, [IntPtr] $o) {return $i}
static [IntPtr] Foo([IntPtr] $i, [IntPtr] $j, [IntPtr] $k, [IntPtr] $l, [IntPtr] $m, [IntPtr] $n, [IntPtr] $o, [IntPtr] $p) {return $i}
static [timespan] Foo([timespan] $i) {return $i}
static [timespan] Foo([timespan] $i, [timespan] $j) {return $i}
static [timespan] Foo([timespan] $i, [timespan] $j, [timespan] $k) {return $i}
static [timespan] Foo([timespan] $i, [timespan] $j, [timespan] $k, [timespan] $l) {return $i}
static [timespan] Foo([timespan] $i, [timespan] $j, [timespan] $k, [timespan] $l, [timespan] $m) {return $i}
static [timespan] Foo([timespan] $i, [timespan] $j, [timespan] $k, [timespan] $l, [timespan] $m, [timespan] $n) {return $i}
static [timespan] Foo([timespan] $i, [timespan] $j, [timespan] $k, [timespan] $l, [timespan] $m, [timespan] $n, [timespan] $o) {return $i}
static [timespan] Foo([timespan] $i, [timespan] $j, [timespan] $k, [timespan] $l, [timespan] $m, [timespan] $n, [timespan] $o, [timespan] $p) {return $i}
}
It 'converts static method as Func does not throw' {
{[Func[int, int]] [M]::Thrice} | Should -Not -Throw
}
It 'converts static method as Func is non null' {
([Func[int, int]] [M]::Thrice) | Should -Not -BeNullOrEmpty
}
It 'calls static method as Func' {
$f = [Func[int, int]] [M]::Thrice
[M]::Apply(1, $f) | Should -Be 3
}
It 'calls static method as Func' {
$f = [Func[int, int16, int]] [M]::Add
[M]::Apply(3, 4, $f) | Should -Be 7
}
It 'calls static method as Func no cast' {
[M]::Apply(3, 4, [M]::Add) | Should -Be 7
}
It 'converts instance psmethodinfo to Func' {
$m = [M]::new()
{[Func[int, int]] $m.Twice} | Should -Not -Throw
$f = [Func[int, int16, int]] [M]::Add
$f.Invoke(2, 6) | Should -Be 8
}
It "can call all overloads of M::Foo" {
[Func[char, char]] $f1 = [M]::Foo
$f1.Invoke(10) | Should -Be 10
[Func[char, char, char]] $f2 = [M]::Foo
$f2.Invoke(10, 1) | Should -Be 10
[Func[char, char, char, char]] $f3 = [M]::Foo
$f3.Invoke(10, 1, 2) | Should -Be 10
[Func[char, char, char, char, char]] $f4 = [M]::Foo
$f4.Invoke(10, 1, 2, 3) | Should -Be 10
[Func[char, char, char, char, char, char]] $f5 = [M]::Foo
$f5.Invoke(10, 1, 2, 3, 4) | Should -Be 10
[Func[char, char, char, char, char, char, char]] $f6 = [M]::Foo
$f6.Invoke(10, 1, 2, 3, 4, 5) | Should -Be 10
[Func[char, char, char, char, char, char, char, char]] $f7 = [M]::Foo
$f7.Invoke(10, 1, 2, 3, 4, 5, 6) | Should -Be 10
[Func[char, char, char, char, char, char, char, char, char]] $f8 = [M]::Foo
$f8.Invoke(10, 1, 2, 3, 4, 5, 6, 7) | Should -Be 10
[Func[int16, int16]] $f9 = [M]::Foo
$f9.Invoke(10) | Should -Be 10
[Func[int16, int16, int16]] $f10 = [M]::Foo
$f10.Invoke(10, 1) | Should -Be 10
[Func[int16, int16, int16, int16]] $f11 = [M]::Foo
$f11.Invoke(10, 1, 2) | Should -Be 10
[Func[int16, int16, int16, int16, int16]] $f12 = [M]::Foo
$f12.Invoke(10, 1, 2, 3) | Should -Be 10
[Func[int16, int16, int16, int16, int16, int16]] $f13 = [M]::Foo
$f13.Invoke(10, 1, 2, 3, 4) | Should -Be 10
[Func[int16, int16, int16, int16, int16, int16, int16]] $f14 = [M]::Foo
$f14.Invoke(10, 1, 2, 3, 4, 5) | Should -Be 10
[Func[int16, int16, int16, int16, int16, int16, int16, int16]] $f15 = [M]::Foo
$f15.Invoke(10, 1, 2, 3, 4, 5, 6) | Should -Be 10
[Func[int16, int16, int16, int16, int16, int16, int16, int16, int16]] $f16 = [M]::Foo
$f16.Invoke(10, 1, 2, 3, 4, 5, 6, 7) | Should -Be 10
[Func[int, int]] $f17 = [M]::Foo
$f17.Invoke(10) | Should -Be 10
[Func[int, int, int]] $f18 = [M]::Foo
$f18.Invoke(10, 1) | Should -Be 10
[Func[int, int, int, int]] $f19 = [M]::Foo
$f19.Invoke(10, 1, 2) | Should -Be 10
[Func[int, int, int, int, int]] $f20 = [M]::Foo
$f20.Invoke(10, 1, 2, 3) | Should -Be 10
[Func[int, int, int, int, int, int]] $f21 = [M]::Foo
$f21.Invoke(10, 1, 2, 3, 4) | Should -Be 10
[Func[int, int, int, int, int, int, int]] $f22 = [M]::Foo
$f22.Invoke(10, 1, 2, 3, 4, 5) | Should -Be 10
[Func[int, int, int, int, int, int, int, int]] $f23 = [M]::Foo
$f23.Invoke(10, 1, 2, 3, 4, 5, 6) | Should -Be 10
[Func[int, int, int, int, int, int, int, int, int]] $f24 = [M]::Foo
$f24.Invoke(10, 1, 2, 3, 4, 5, 6, 7) | Should -Be 10
[Func[UInt32, UInt32]] $f25 = [M]::Foo
$f25.Invoke(10) | Should -Be 10
[Func[UInt32, UInt32, UInt32]] $f26 = [M]::Foo
$f26.Invoke(10, 1) | Should -Be 10
[Func[UInt32, UInt32, UInt32, UInt32]] $f27 = [M]::Foo
$f27.Invoke(10, 1, 2) | Should -Be 10
[Func[UInt32, UInt32, UInt32, UInt32, UInt32]] $f28 = [M]::Foo
$f28.Invoke(10, 1, 2, 3) | Should -Be 10
[Func[UInt32, UInt32, UInt32, UInt32, UInt32, UInt32]] $f29 = [M]::Foo
$f29.Invoke(10, 1, 2, 3, 4) | Should -Be 10
[Func[UInt32, UInt32, UInt32, UInt32, UInt32, UInt32, UInt32]] $f30 = [M]::Foo
$f30.Invoke(10, 1, 2, 3, 4, 5) | Should -Be 10
[Func[UInt32, UInt32, UInt32, UInt32, UInt32, UInt32, UInt32, UInt32]] $f31 = [M]::Foo
$f31.Invoke(10, 1, 2, 3, 4, 5, 6) | Should -Be 10
[Func[UInt32, UInt32, UInt32, UInt32, UInt32, UInt32, UInt32, UInt32, UInt32]] $f32 = [M]::Foo
$f32.Invoke(10, 1, 2, 3, 4, 5, 6, 7) | Should -Be 10
[Func[UInt64, UInt64]] $f33 = [M]::Foo
$f33.Invoke(10) | Should -Be 10
[Func[UInt64, UInt64, UInt64]] $f34 = [M]::Foo
$f34.Invoke(10, 1) | Should -Be 10
[Func[UInt64, UInt64, UInt64, UInt64]] $f35 = [M]::Foo
$f35.Invoke(10, 1, 2) | Should -Be 10
[Func[UInt64, UInt64, UInt64, UInt64, UInt64]] $f36 = [M]::Foo
$f36.Invoke(10, 1, 2, 3) | Should -Be 10
[Func[UInt64, UInt64, UInt64, UInt64, UInt64, UInt64]] $f37 = [M]::Foo
$f37.Invoke(10, 1, 2, 3, 4) | Should -Be 10
[Func[UInt64, UInt64, UInt64, UInt64, UInt64, UInt64, UInt64]] $f38 = [M]::Foo
$f38.Invoke(10, 1, 2, 3, 4, 5) | Should -Be 10
[Func[UInt64, UInt64, UInt64, UInt64, UInt64, UInt64, UInt64, UInt64]] $f39 = [M]::Foo
$f39.Invoke(10, 1, 2, 3, 4, 5, 6) | Should -Be 10
[Func[UInt64, UInt64, UInt64, UInt64, UInt64, UInt64, UInt64, UInt64, UInt64]] $f40 = [M]::Foo
$f40.Invoke(10, 1, 2, 3, 4, 5, 6, 7) | Should -Be 10
[Func[float, float]] $f41 = [M]::Foo
$f41.Invoke(10) | Should -Be 10
[Func[float, float, float]] $f42 = [M]::Foo
$f42.Invoke(10, 1) | Should -Be 10
[Func[float, float, float, float]] $f43 = [M]::Foo
$f43.Invoke(10, 1, 2) | Should -Be 10
[Func[float, float, float, float, float]] $f44 = [M]::Foo
$f44.Invoke(10, 1, 2, 3) | Should -Be 10
[Func[float, float, float, float, float, float]] $f45 = [M]::Foo
$f45.Invoke(10, 1, 2, 3, 4) | Should -Be 10
[Func[float, float, float, float, float, float, float]] $f46 = [M]::Foo
$f46.Invoke(10, 1, 2, 3, 4, 5) | Should -Be 10
[Func[float, float, float, float, float, float, float, float]] $f47 = [M]::Foo
$f47.Invoke(10, 1, 2, 3, 4, 5, 6) | Should -Be 10
[Func[float, float, float, float, float, float, float, float, float]] $f48 = [M]::Foo
$f48.Invoke(10, 1, 2, 3, 4, 5, 6, 7) | Should -Be 10
[Func[double, double]] $f49 = [M]::Foo
$f49.Invoke(10) | Should -Be 10
[Func[double, double, double]] $f50 = [M]::Foo
$f50.Invoke(10, 1) | Should -Be 10
[Func[double, double, double, double]] $f51 = [M]::Foo
$f51.Invoke(10, 1, 2) | Should -Be 10
[Func[double, double, double, double, double]] $f52 = [M]::Foo
$f52.Invoke(10, 1, 2, 3) | Should -Be 10
[Func[double, double, double, double, double, double]] $f53 = [M]::Foo
$f53.Invoke(10, 1, 2, 3, 4) | Should -Be 10
[Func[double, double, double, double, double, double, double]] $f54 = [M]::Foo
$f54.Invoke(10, 1, 2, 3, 4, 5) | Should -Be 10
[Func[double, double, double, double, double, double, double, double]] $f55 = [M]::Foo
$f55.Invoke(10, 1, 2, 3, 4, 5, 6) | Should -Be 10
[Func[double, double, double, double, double, double, double, double, double]] $f56 = [M]::Foo
$f56.Invoke(10, 1, 2, 3, 4, 5, 6, 7) | Should -Be 10
[Func[IntPtr, IntPtr]] $f57 = [M]::Foo
$f57.Invoke(10) | Should -Be 10
[Func[IntPtr, IntPtr, IntPtr]] $f58 = [M]::Foo
$f58.Invoke(10, 1) | Should -Be 10
[Func[IntPtr, IntPtr, IntPtr, IntPtr]] $f59 = [M]::Foo
$f59.Invoke(10, 1, 2) | Should -Be 10
[Func[IntPtr, IntPtr, IntPtr, IntPtr, IntPtr]] $f60 = [M]::Foo
$f60.Invoke(10, 1, 2, 3) | Should -Be 10
[Func[IntPtr, IntPtr, IntPtr, IntPtr, IntPtr, IntPtr]] $f61 = [M]::Foo
$f61.Invoke(10, 1, 2, 3, 4) | Should -Be 10
[Func[IntPtr, IntPtr, IntPtr, IntPtr, IntPtr, IntPtr, IntPtr]] $f62 = [M]::Foo
$f62.Invoke(10, 1, 2, 3, 4, 5) | Should -Be 10
[Func[IntPtr, IntPtr, IntPtr, IntPtr, IntPtr, IntPtr, IntPtr, IntPtr]] $f63 = [M]::Foo
$f63.Invoke(10, 1, 2, 3, 4, 5, 6) | Should -Be 10
[Func[IntPtr, IntPtr, IntPtr, IntPtr, IntPtr, IntPtr, IntPtr, IntPtr, IntPtr]] $f64 = [M]::Foo
$f64.Invoke(10, 1, 2, 3, 4, 5, 6, 7) | Should -Be 10
$timespan = [timespan]::FromMinutes(62)
[Func[timespan, timespan]] $f65 = [M]::Foo
$f65.Invoke($timeSpan) | Should -Be $timeSpan
[Func[timespan, timespan, timespan]] $f66 = [M]::Foo
$f66.Invoke($timeSpan, [Timespan]::Zero) | Should -Be $timeSpan
[Func[timespan, timespan, timespan, timespan]] $f67 = [M]::Foo
$f67.Invoke($timeSpan, [Timespan]::Zero, [Timespan]::Zero) | Should -Be $timeSpan
[Func[timespan, timespan, timespan, timespan, timespan]] $f68 = [M]::Foo
$f68.Invoke($timeSpan, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero) | Should -Be $timeSpan
[Func[timespan, timespan, timespan, timespan, timespan, timespan]] $f69 = [M]::Foo
$f69.Invoke($timeSpan, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero) | Should -Be $timeSpan
[Func[timespan, timespan, timespan, timespan, timespan, timespan, timespan]] $f70 = [M]::Foo
$f70.Invoke($timeSpan, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero) | Should -Be $timeSpan
[Func[timespan, timespan, timespan, timespan, timespan, timespan, timespan, timespan]] $f71 = [M]::Foo
$f71.Invoke($timeSpan, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero) | Should -Be $timeSpan
[Func[timespan, timespan, timespan, timespan, timespan, timespan, timespan, timespan, timespan]] $f72 = [M]::Foo
$f72.Invoke($timeSpan, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero) | Should -Be $timeSpan
}
enum E {
Day;
Week;
Year;
}
class N {
[string] GetA([int] $i, [string] $s) { return "GetA-int-string-string" }
[string] GetA([System.IO.FileSystemInfo] $fsinfo, [object] $o) { return "GetA-filesysteminfo-object-string" }
[string] GetA([System.IO.FileInfo] $finfo, [object] $o) { return "GetA-fileinfo-object-string" }
[string] GetAPrime([int] $i, [string] $s) { return "GetAPrime-int-string-string" }
[string] GetAPrime([System.IO.FileSystemInfo] $fsinfo, [object] $o) { return "GetAPrime-filesysteminfo-object-string" }
[string] GetAPrime([System.IO.FileInfo] $finfo, [object] $o) { return "GetAPrime-fileinfo-object-string" }
static [string] GetAStatic([int] $i, [string] $s) { return "GetAStatic-int-string-string" }
static [string] GetAStatic([System.IO.FileSystemInfo] $fsinfo, [object] $o) { return "GetAStatic-filesysteminfo-object-string" }
static [string] GetAStatic([System.IO.FileInfo] $finfo, [object] $o) { return "GetAStatic-fileinfo-object-string" }
[string] GetB([System.IO.FileSystemInfo] $fsinfo, [object] $o) { return "GetB-filesysteminfo-object-string" }
[object] GetB([System.IO.FileInfo] $finfo, [string] $s) { return "GetB-fileinfo-string-object" }
[string] GetB([datetime] $d) { return "GetB-datetime-string" }
[string] GetBPrime([System.IO.FileSystemInfo] $fsinfo, [object] $o) { return "GetBPrime-filesysteminfo-object-string" }
[object] GetBPrime([System.IO.FileInfo] $finfo, [string] $s) { return "GetBPrime-fileinfo-string-object" }
[string] GetBPrime([datetime] $d) { return "GetBPrime-datetime-string" }
static [string] GetBStatic([System.IO.FileSystemInfo] $fsinfo, [object] $o) { return "GetBStatic-filesysteminfo-object-string" }
static [object] GetBStatic([System.IO.FileInfo] $finfo, [string] $s) { return "GetBStatic-fileinfo-string-object" }
static [string] GetBStatic([datetime] $d) { return "GetBStatic-datetime-string" }
[object] GetC([E] $e) { return $e.ToString() }
}
It "Different method overloads with same signatures/orders should have same PSMethod type" {
$n = [N]::new()
$n.GetA.GetType() | Should -Be ($n.GetAPrime.GetType())
$n.GetA.GetType() | Should -Be ([N]::GetAStatic.GetType())
$n.GetB.GetType() | Should -Be ($n.GetBPrime.GetType())
$n.GetB.GetType() | Should -Be ([N]::GetBStatic.GetType())
}
It "Match signature with variance and use the first match when there is no exact match" {
$n = [N]::new()
[Func[[System.IO.FileInfo], [string], [object]]] $f = $n.GetA
$f.Invoke($null, $null) | Should -BeExactly "GetA-filesysteminfo-object-string"
$f = $n.GetAPrime
$f.Invoke([System.IO.FileInfo]::new("aaa"), "bbb") | Should -BeExactly "GetAPrime-filesysteminfo-object-string"
$f = [N]::GetAStatic
$f.Invoke($null, "") | Should -BeExactly "GetAStatic-filesysteminfo-object-string"
}
It "Exact match is preferred over match with variance" {
$n = [N]::new()
[Func[[System.IO.FileInfo], [string], [object]]] $f = $n.GetB
$f.Invoke($null, $null) | Should -BeExactly "GetB-fileinfo-string-object"
$f = $n.GetBPrime
$f.Invoke([System.IO.FileInfo]::new("ccc"), "ddd") | Should -BeExactly "GetBPrime-fileinfo-string-object"
$f = [N]::GetBStatic
$f.Invoke($null, "") | Should -BeExactly "GetBStatic-fileinfo-string-object"
}
It "Test enum type parameter" {
$n = [N]::new()
[Func[[E], [object]]] $f = $n.GetC
$f.Invoke([E]::Week) | Should -BeExactly "Week"
}
It "Test fail-to-convert code path" {
$n = [N]::new()
{ [System.Management.Automation.LanguagePrimitives]::ConvertTo($n.GetC, [Func[[int], [object]]]) } | Should -Throw -ErrorId "PSInvalidCastException"
}
$TestCases = @(
@{ Number = "100y"; Value = "100"; Type = [int] }
@{ Number = "100uy"; Value = "100"; Type = [double] }
@{ Number = "1200u"; Value = "1200"; Type = [short] }
@{ Number = "1200L"; Value = "1200"; Type = [int] }
@{ Number = "127ul"; Value = "127"; Type = [ulong] }
@{ Number = "127d"; Value = "127"; Type = [byte] }
@{ Number = "127s"; Value = "127"; Type = [sbyte] }
@{ Number = "127y"; Value = "127"; Type = [uint] }
)
It "Correctly casts <Number> to value <Value> as type <Type>" -TestCases $TestCases {
param($Number, $Value, $Type)
$Result = $Number -as $Type
$Result | Should -Be $Value
$Result | Should -BeOfType $Type
}
$TestCases = @(
@{ Number = "200y" }
@{ Number = "300uy" }
@{ Number = "70000us" }
@{ Number = "40000s" }
)
It "Fails to cast invalid PowerShell-Style suffixed numeral <Number>" -TestCases $TestCases {
param($Number)
$Result = $Number -as [int]
$Result | Should -BeNullOrEmpty
}
}
Describe 'float/double precision when converting to string' -Tags "CI" {
It "<SourceType>-to-[string] conversion in PowerShell should use the precision specifier <Format>" -TestCases @(
@{ SourceType = [double]; Format = "G15"; ValueScript = { 1.1 * 3 }; StringConversionResult = "3.3"; ToStringResult = "3.3000000000000003" }
@{ SourceType = [double]; Format = "G15"; ValueScript = { 1.1 * 6 }; StringConversionResult = "6.6"; ToStringResult = "6.6000000000000005" }
@{ SourceType = [double]; Format = "G15"; ValueScript = { [System.Math]::E }; StringConversionResult = [System.Math]::E.ToString("G15"); ToStringResult = [System.Math]::E.ToString() }
@{ SourceType = [double]; Format = "G15"; ValueScript = { [System.Math]::PI }; StringConversionResult = [System.Math]::PI.ToString("G15"); ToStringResult = [System.Math]::PI.ToString() }
@{ SourceType = [float]; Format = "G7"; ValueScript = { [float]$f = 1.1; ($f * 3).ToSingle([cultureinfo]::InvariantCulture) }; StringConversionResult = "3.3"; ToStringResult = "3.3000002" }
@{ SourceType = [float]; Format = "G7"; ValueScript = { [float]$f = 1.1; ($f * 6).ToSingle([cultureinfo]::InvariantCulture) }; StringConversionResult = "6.6"; ToStringResult = "6.6000004" }
@{ SourceType = [float]; Format = "G7"; ValueScript = { [float]::MaxValue }; StringConversionResult = [float]::MaxValue.ToString("G7"); ToStringResult = [float]::MaxValue.ToString() }
@{ SourceType = [float]; Format = "G7"; ValueScript = { [float]::MinValue }; StringConversionResult = [float]::MinValue.ToString("G7"); ToStringResult = [float]::MinValue.ToString() }
) {
param($SourceType, $ValueScript, $StringConversionResult, $ToStringResult)
$value = & $ValueScript
$value | Should -BeOfType $SourceType
$value.ToString() | Should -BeExactly $ToStringResult
$value -as [string] | Should -BeExactly $StringConversionResult
[string]$value | Should -BeExactly $StringConversionResult
[System.Management.Automation.LanguagePrimitives]::ConvertTo($value, [string]) | Should -BeExactly $StringConversionResult
"$value" | Should -BeExactly $StringConversionResult
$value | Out-String | ForEach-Object -MemberName Trim | Should -BeExactly $StringConversionResult
}
}
|
combined_dataset/train/non-malicious/3107.ps1
|
3107.ps1
|
"^(254|252|248|240|224|192|128).0.0.0$|^255.(254|252|248|240|224|192|128|0).0.0$|^255.255.(254|252|248|240|224|192|128|0).0$|^255.255.255.(255|254|252|248|240|224|192|128|0)$"
|
combined_dataset/train/non-malicious/3747.ps1
|
3747.ps1
|
function Test_SetAzureKeyVaultManagedStorageAccountAndRawSasDefinition
{
$managedStorageSasDefinitionName = Get-ManagedStorageSasDefinitionName 'mngsas1'
$paramatersSubCommand = '-Name $($managedStorageSasDefinitionName) -Parameter @{"sasType"="service";"serviceSasType"="blob";"signedResourceTypes"="b";"signedVersion"="2016-05-31";"signedProtocols"="https";"signedIp"="168.1.5.60-168.1.5.70";"validityPeriod"="P30D";"signedPermissions"="ra";"blobName"="blob1";"containerName"="container1";"rscd"="";"rscc"=""}'
Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinition $paramatersSubCommand
}
function Test_SetAzureKeyVaultManagedStorageAccountAndBlobSasDefinition
{
$managedStorageSasDefinitionName = Get-ManagedStorageSasDefinitionName 'mngsas2'
$paramatersSubCommand = "-Name $($managedStorageSasDefinitionName) -Blob 'blob1' -Container 'container1' -ValidityPeriod ([System.Timespan]::FromDays(30)) -Permission Read,Add -SharedAccessHeader CacheControl,ContentDisposition -Protocol HttpsOnly -IPAddressOrRange '168.1.5.60-168.1.5.70'"
Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinition $paramatersSubCommand
}
function Test_SetAzureKeyVaultManagedStorageAccountAndBlobStoredPolicySasDefinition
{
$managedStorageSasDefinitionName = Get-ManagedStorageSasDefinitionName 'mngsas2'
$paramatersSubCommand = "-Name $($managedStorageSasDefinitionName) -Blob 'blob1' -Container 'container1' -Policy 'policy1' -SharedAccessHeader CacheControl,ContentDisposition -Protocol HttpsOnly -IPAddressOrRange '168.1.5.60-168.1.5.70'"
Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinition $paramatersSubCommand
}
function Test_SetAzureKeyVaultManagedStorageAccountAndContainerSasDefinition
{
$managedStorageSasDefinitionName = Get-ManagedStorageSasDefinitionName 'mngsas3'
$paramatersSubCommand = "-Name $($managedStorageSasDefinitionName) -Container 'container1' -ValidityPeriod ([System.Timespan]::FromDays(30)) -Permission Read,Add -SharedAccessHeader CacheControl,ContentDisposition -Protocol HttpsOnly -IPAddressOrRange '168.1.5.60-168.1.5.70'"
Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinition $paramatersSubCommand
}
function Test_SetAzureKeyVaultManagedStorageAccountAndShareSasDefinition
{
$managedStorageSasDefinitionName = Get-ManagedStorageSasDefinitionName 'mngsas4'
$paramatersSubCommand = "-Name $($managedStorageSasDefinitionName) -Share 'share1' -ValidityPeriod ([System.Timespan]::FromDays(30)) -Permission Read,Add -SharedAccessHeader CacheControl,ContentDisposition -Protocol HttpsOnly -IPAddressOrRange '168.1.5.60-168.1.5.70'"
Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinition $paramatersSubCommand
}
function Test_SetAzureKeyVaultManagedStorageAccountAndFileSasDefinition
{
$managedStorageSasDefinitionName = Get-ManagedStorageSasDefinitionName 'mngsas5'
$paramatersSubCommand = "-Name $($managedStorageSasDefinitionName) -Share 'share1' -Path 'path1' -ValidityPeriod ([System.Timespan]::FromDays(30)) -Permission Read,Add -SharedAccessHeader CacheControl,ContentDisposition -Protocol HttpsOnly -IPAddressOrRange '168.1.5.60-168.1.5.70'"
Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinition $paramatersSubCommand
}
function Test_SetAzureKeyVaultManagedStorageAccountAndQueueSasDefinition
{
$managedStorageSasDefinitionName = Get-ManagedStorageSasDefinitionName 'mngsas6'
$paramatersSubCommand = "-Name $($managedStorageSasDefinitionName) -Queue 'queue1' -ValidityPeriod ([System.Timespan]::FromDays(30)) -Permission Read,Add -Protocol HttpsOnly -IPAddressOrRange '168.1.5.60-168.1.5.70'"
Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinition $paramatersSubCommand
}
function Test_SetAzureKeyVaultManagedStorageAccountAndTableSasDefinition
{
$managedStorageSasDefinitionName = Get-ManagedStorageSasDefinitionName 'mngsas6'
$paramatersSubCommand = "-Name $($managedStorageSasDefinitionName) -Table 'table' -ValidityPeriod ([System.Timespan]::FromDays(30)) -Permission Read,Add -Protocol HttpsOnly -IPAddressOrRange '168.1.5.60-168.1.5.70' -StartPartitionKey 'spk1' -EndPartitionKey 'epk1'"
Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinition $paramatersSubCommand
}
function Test_SetAzureKeyVaultManagedStorageAccountAndAccountSasDefinition
{
$managedStorageSasDefinitionName = Get-ManagedStorageSasDefinitionName 'mngsas7'
$paramatersSubCommand = "-Name $($managedStorageSasDefinitionName) -Service Queue,Blob -ResourceType Container,Object -Protocol HttpsOnly -IPAddressOrRange '168.1.5.60-168.1.5.70' -ValidityPeriod ([System.Timespan]::FromDays(30)) -Permission Add,Create"
Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinition $paramatersSubCommand
}
function Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinition
{
param([string] $paramatersSubCommand)
$keyVault = Get-KeyVault
$managedStorageAccountName = Get-ManagedStorageAccountName 'mngSt1'
$global:createdManagedStorageAccounts += $managedStorageAccountName
$storageAccountResourceId = Get-KeyVaultManagedStorageResourceId
$managedStorageAccount = Add-AzKeyVaultManagedStorageAccount -VaultName $keyVault -AccountName $managedStorageAccountName -AccountResourceId $storageAccountResourceId -ActiveKeyName 'key1' -DisableAutoRegenerateKey
Assert-NotNull $managedStorageAccount
$command = "Set-AzKeyVaultManagedStorageSasDefinition -VaultName $($keyVault) -AccountName $($managedStorageAccountName) $($paramatersSubCommand)"
Write-Host $command
$createdManagedStorageSasDefinition = Invoke-Expression $command
Assert-NotNull $createdManagedStorageSasDefinition
Assert-NotNull $managedStorageAccount.AccountName
Assert-NotNull $createdManagedStorageSasDefinition.Name
$secretName = "$($managedStorageAccount.AccountName)-$($createdManagedStorageSasDefinition.Name)"
$secret = Get-AzKeyVaultSecret $keyVault $secretName
Assert-NotNull $secret
Assert-NotNull $secret.SecretValueText
}
function Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinitionPipeTest
{
$keyVault = Get-KeyVault
$managedStorageAccountName1 = Get-ManagedStorageAccountName 'mngSt1'
$managedStorageAccountName2 = Get-ManagedStorageAccountName 'mngSt2'
$global:createdManagedStorageAccounts += $managedStorageAccountName1
$global:createdManagedStorageAccounts += $managedStorageAccountName2
$storageAccountResourceId = Get-KeyVaultManagedStorageResourceId
$managedStorageAccount1 = Add-AzKeyVaultManagedStorageAccount -VaultName $keyVault -AccountName $managedStorageAccountName1 -AccountResourceId $storageAccountResourceId -ActiveKeyName 'key1' -DisableAutoRegenerateKey
Assert-NotNull $managedStorageAccount1
$managedStorageAccount2 = Get-AzKeyVaultManagedStorageAccount -VaultName $keyVault -AccountName $managedStorageAccountName1 | Add-AzKeyVaultManagedStorageAccount -AccountName $managedStorageAccountName2
Assert-NotNull $managedStorageAccount2
$managedStorageSasDefinitionName1 = Get-ManagedStorageSasDefinitionName 'mngsas8'
$managedStorageSasDefinitionName2 = Get-ManagedStorageSasDefinitionName 'mngsas9'
$paramatersSubCommand = "-Name $($managedStorageSasDefinitionName1) -Service Queue,Blob -ResourceType Container,Object -Protocol HttpsOnly -IPAddressOrRange '168.1.5.60-168.1.5.70' -ValidityPeriod ([System.Timespan]::FromDays(30)) -Permission Add,Create"
$command = "Set-AzKeyVaultManagedStorageSasDefinition -VaultName $($keyVault) -AccountName $($managedStorageAccountName1) $($paramatersSubCommand)"
Write-Host $command
$createdManagedStorageSasDefinition1 = Invoke-Expression $command
Assert-NotNull $createdManagedStorageSasDefinition1
$createdManagedStorageSasDefinition2 = Get-AzKeyVaultManagedStorageSasDefinition -VaultName $keyVault -AccountName $managedStorageAccountName1 -Name $managedStorageSasDefinitionName1 | Set-AzKeyVaultManagedStorageSasDefinition -Name $managedStorageSasDefinitionName2
Assert-NotNull $createdManagedStorageSasDefinition2
Assert-NotNull $managedStorageAccount1.AccountName
Assert-NotNull $createdManagedStorageSasDefinition1.Name
Assert-NotNull $managedStorageAccount2.AccountName
Assert-NotNull $createdManagedStorageSasDefinition2.Name
$secretName1 = "$($managedStorageAccount1.AccountName)-$($createdManagedStorageSasDefinition1.Name)"
$secretName2 = "$($managedStorageAccount1.AccountName)-$($createdManagedStorageSasDefinition2.Name)"
$secret1 = Get-AzKeyVaultSecret $keyVault $secretName1
$secret2 = Get-AzKeyVaultSecret $keyVault $secretName2
Assert-NotNull $secret1
Assert-NotNull $secret2
Assert-NotNull $secret1.SecretValueText
Assert-NotNull $secret2.SecretValueText
}
function Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinitionAttribute
{
$keyVault = Get-KeyVault
$managedStorageAccountName1 = Get-ManagedStorageAccountName 'mngSt1'
$managedStorageAccountName2 = Get-ManagedStorageAccountName 'mngSt2'
$global:createdManagedStorageAccounts += $managedStorageAccountName1
$global:createdManagedStorageAccounts += $managedStorageAccountName2
$storageAccountResourceId = Get-KeyVaultManagedStorageResourceId
$managedStorageAccount1 = Add-AzKeyVaultManagedStorageAccount -VaultName $keyVault -AccountName $managedStorageAccountName1 -AccountResourceId $storageAccountResourceId -ActiveKeyName 'key1' -DisableAutoRegenerateKey
Assert-NotNull $managedStorageAccount1
$managedStorageAccount2 = Get-AzKeyVaultManagedStorageAccount -VaultName $keyVault -AccountName $managedStorageAccountName1 | Add-AzKeyVaultManagedStorageAccount -AccountName $managedStorageAccountName2 -Tag @{"tag1"="value1";"tag2"="value2"} -Disable
Assert-NotNull $managedStorageAccount2
Assert-True { $managedStorageAccount1.Attributes.Enabled }
Assert-False { $managedStorageAccount2.Attributes.Enabled }
Assert-True { $managedStorageAccount2.Tags.ContainsKey("tag1") }
$managedStorageSasDefinitionName1 = Get-ManagedStorageSasDefinitionName 'mngsas8'
$paramatersSubCommand = "-Name $($managedStorageSasDefinitionName1) -Service Queue,Blob -ResourceType Container,Object -Protocol HttpsOnly -IPAddressOrRange '168.1.5.60-168.1.5.70' -ValidityPeriod ([System.Timespan]::FromDays(30)) -Permission Add,Create"
$command = "Set-AzKeyVaultManagedStorageSasDefinition -VaultName $($keyVault) -AccountName $($managedStorageAccountName1) $($paramatersSubCommand) -Tag @{'tag3'='value3';'tag4'='value4'}"
Write-Host $command
$createdManagedStorageSasDefinition1 = Invoke-Expression $command
Assert-NotNull $createdManagedStorageSasDefinition1
Assert-True { $createdManagedStorageSasDefinition1.Tags.ContainsKey("tag3") }
}
function Test_UpdateAzureKeyVaultManagedStorageAccount
{
$keyVault = Get-KeyVault
$managedStorageAccountName = Get-ManagedStorageAccountName 'mngSt1'
$global:createdManagedStorageAccounts += $managedStorageAccountName
$storageAccountResourceId = Get-KeyVaultManagedStorageResourceId
$managedStorageAccount = Add-AzKeyVaultManagedStorageAccount -VaultName $keyVault -AccountName $managedStorageAccountName -AccountResourceId $storageAccountResourceId -ActiveKeyName 'key1' -RegenerationPeriod ([System.Timespan]::FromDays(30))
Assert-NotNull $managedStorageAccount
$managedStorageAccountUpdate = Update-AzKeyVaultManagedStorageAccount -VaultName $keyVault -AccountName $managedStorageAccountName -ActiveKeyName 'key2' -Tag @{"tag3"="value3"} -PassThru
Assert-NotNull $managedStorageAccountUpdate
Assert-True { $managedStorageAccountUpdate.ActiveKeyName.Equals("key2") }
Assert-True { $managedStorageAccountUpdate.Tags.ContainsKey("tag3") }
}
function Test_RegenerateAzureKeyVaultManagedStorageAccountAndSasDefinition
{
$keyVault = Get-KeyVault
$managedStorageAccountName = Get-ManagedStorageAccountName 'mngSt1'
$global:createdManagedStorageAccounts += $managedStorageAccountName
$storageAccountResourceId = Get-KeyVaultManagedStorageResourceId
$managedStorageAccount = Add-AzKeyVaultManagedStorageAccount -VaultName $keyVault -AccountName $managedStorageAccountName -AccountResourceId $storageAccountResourceId -ActiveKeyName 'key1' -RegenerationPeriod ([System.Timespan]::FromDays(30))
Assert-NotNull $managedStorageAccount
$managedStorageAccountUpdate = Update-AzKeyVaultManagedStorageAccountKey -VaultName $keyVault -AccountName $managedStorageAccountName -KeyName 'key2' -Force -Confirm:$false -PassThru
Assert-NotNull $managedStorageAccountUpdate
Assert-True { $managedStorageAccountUpdate.ActiveKeyName.Equals("key2") }
}
function Test_ListKeyVaultAzureKeyVaultManagedStorageAccounts
{
$keyVault = Get-KeyVault
$managedStorageAccountName01 = Get-ManagedStorageAccountName 'listmngSt1'
$storageAccountResourceId = Get-KeyVaultManagedStorageResourceId
$createdmanagedStorageAccountName01 = Add-AzKeyVaultManagedStorageAccount -VaultName $keyVault -AccountName $managedStorageAccountName01 -AccountResourceId $storageAccountResourceId -ActiveKeyName 'key1' -RegenerationPeriod ([System.Timespan]::FromDays(30))
Assert-NotNull $createdmanagedStorageAccountName01
$managedStorageAccountName02 = Get-ManagedStorageAccountName 'listmngSt2'
$createdmanagedStorageAccountName02 = Add-AzKeyVaultManagedStorageAccount -VaultName $keyVault -AccountName $managedStorageAccountName02 -AccountResourceId $storageAccountResourceId -ActiveKeyName 'key1' -RegenerationPeriod ([System.Timespan]::FromDays(30))
Assert-NotNull $createdmanagedStorageAccountName02
$managedStorageAccounts = Get-AzKeyVaultManagedStorageAccount $keyVault
Assert-NotNull $managedStorageAccounts
Assert-True { $managedStorageAccounts.Count -ge 2 }
$item01 = $managedStorageAccounts | where { Equal-String $_.AccountName $managedStorageAccountName01 } | Select -First 1
Assert-NotNull $item01
$item02 = $managedStorageAccounts | where { Equal-String $_.AccountName $managedStorageAccountName02 } | Select -First 1
Assert-NotNull $item02
}
|
combined_dataset/train/non-malicious/482.ps1
|
482.ps1
|
function Remove-PPScriptShortcut{
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[String]
$Name
)
$ShortcutToRemove = Get-PPScript -Name $Name -Shortcut
if($ShortcutToRemove){
Get-ChildItem -Path $PSconfigs.Path -Filter $PSconfigs.ScriptShortcut.DataFile -Recurse | %{
Write-Host "Remove script shorcut: $($ShortcutToRemove.Name)"
$Xml = [xml](get-content $_.Fullname)
$RemoveNode = Select-Xml $xml -XPath "//Content/ScriptShortcut[@Name=`"$($ShortcutToRemove.Name)`"]"
$null = $RemoveNode.Node.ParentNode.RemoveChild($RemoveNode.Node)
$Xml.Save($_.Fullname)
}
}
}
|
combined_dataset/train/non-malicious/3816.ps1
|
3816.ps1
|
function Test-ProximityPlacementGroup
{
param ($loc)
$rgname = Get-ComputeTestResourceName
try
{
[string]$loc = Get-ComputeVMLocation;
$loc = $loc.Replace(' ', '');
New-AzResourceGroup -Name $rgname -Location $loc -Force;
$ppgname = $rgname + 'ppg'
New-AzProximityPlacementGroup -ResourceGroupName $rgname -Name $ppgname -Location $loc -ProximityPlacementGroupType "Standard" -Tag @{key1 = "val1"};
$ppg = Get-AzProximityPlacementGroup -ResourceGroupName $rgname -Name $ppgname;
Assert-AreEqual $rgname $ppg.ResourceGroupName;
Assert-AreEqual $ppgname $ppg.Name;
Assert-AreEqual $loc $ppg.Location;
Assert-AreEqual "Standard" $ppg.ProximityPlacementGroupType;
Assert-True { $ppg.Tags.Keys.Contains("key1") };
Assert-AreEqual "val1" $ppg.Tags["key1"];
$ppgs = Get-AzProximityPlacementGroup -ResourceGroupName $rgname;
Assert-AreEqual 1 $ppgs.Count;
$ppgs = Get-AzProximityPlacementGroup;
Assert-True { $ppgs.Count -ge 1 };
Remove-AzProximityPlacementGroup -ResourceGroupName $rgname -Name $ppgname -Force;
$ppgs = Get-AzProximityPlacementGroup -ResourceGroupName $rgname;
Assert-AreEqual 0 $ppgs.Count;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-ProximityPlacementGroupAvSet
{
param ($loc)
$rgname = Get-ComputeTestResourceName
try
{
[string]$loc = Get-ComputeVMLocation;
$loc = $loc.Replace(' ', '');
New-AzResourceGroup -Name $rgname -Location $loc -Force;
$ppgname = $rgname + 'ppg'
New-AzProximityPlacementGroup -ResourceGroupName $rgname -Name $ppgname -Location $loc -ProximityPlacementGroupType "Standard" -Tag @{key1 = "val1"};
$ppg = Get-AzProximityPlacementGroup -ResourceGroupName $rgname -Name $ppgname;
Assert-AreEqual $rgname $ppg.ResourceGroupName;
Assert-AreEqual $ppgname $ppg.Name;
Assert-AreEqual $loc $ppg.Location;
Assert-AreEqual "Standard" $ppg.ProximityPlacementGroupType;
Assert-True { $ppg.Tags.Keys.Contains("key1") };
Assert-AreEqual "val1" $ppg.Tags["key1"];
$asetName = $rgname + 'as';
New-AzAvailabilitySet -ResourceGroupName $rgname -Name $asetName -Location $loc -ProximityPlacementGroupId $ppg.Id -Sku 'Classic';
$av = Get-AzAvailabilitySet -ResourceGroupName $rgname -Name $asetName;
Assert-AreEqual $ppg.Id $av.ProximityPlacementGroup.Id;
$ppg = Get-AzProximityPlacementGroup -ResourceGroupName $rgname -Name $ppgname;
Assert-AreEqual $av.Id $ppg.AvailabilitySets[0].Id;
Remove-AzAvailabilitySet -ResourceGroupName $rgname -Name $asetName -Force;
$ppg = Get-AzProximityPlacementGroup -ResourceGroupName $rgname -Name $ppgname;
Assert-Null $ppg.AvailabilitySets;
Remove-AzProximityPlacementGroup -ResourceGroupName $rgname -Name $ppgname -Force;
}
finally
{
Clean-ResourceGroup $rgname
}
}
function Test-ProximityPlacementGroupVM
{
param ($loc)
$rgname = Get-ComputeTestResourceName
try
{
[string]$loc = Get-ComputeVMLocation;
$loc = $loc.Replace(' ', '');
New-AzResourceGroup -Name $rgname -Location $loc -Force;
$ppgname = $rgname + 'ppg'
New-AzProximityPlacementGroup -ResourceGroupName $rgname -Name $ppgname -Location $loc -ProximityPlacementGroupType "Standard" -Tag @{key1 = "val1"};
$ppg = Get-AzProximityPlacementGroup -ResourceGroupName $rgname -Name $ppgname;
Assert-AreEqual $rgname $ppg.ResourceGroupName;
Assert-AreEqual $ppgname $ppg.Name;
Assert-AreEqual $loc $ppg.Location;
Assert-AreEqual "Standard" $ppg.ProximityPlacementGroupType;
Assert-True { $ppg.Tags.Keys.Contains("key1") };
Assert-AreEqual "val1" $ppg.Tags["key1"];
$subnet = New-AzVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix 192.168.1.0/24;
$vnet = New-AzVirtualNetwork -ResourceGroupName $rgname -Location $loc -Name ('vnet' + $rgname) -AddressPrefix 192.168.0.0/16 -Subnet $subnet;
$pip = New-AzPublicIpAddress -ResourceGroupName $rgname -Location $loc -Name ('pubip' + $rgname) -AllocationMethod Static -IdleTimeoutInMinutes 4;
$nsg = New-AzNetworkSecurityGroup -ResourceGroupName $rgname -Location $loc -Name ('netsg' + $rgname);
$nic = New-AzNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc `
-SubnetId $vnet.Subnets[0].Id -PublicIpAddressId $pip.Id -NetworkSecurityGroupId $nsg.Id;
$vmname = 'vm' + $rgname;
$user = "Foo12";
$password = $PLACEHOLDER;
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force;
$cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword);
$p = New-AzVMConfig -VMName $vmName -VMSize Standard_A1 -ProximityPlacementGroupId $ppg.Id `
| Set-AzVMOperatingSystem -Windows -ComputerName $vmName -Credential $cred `
| Add-AzVMNetworkInterface -Id $nic.Id;
$imgRef = Get-DefaultCRPImage -loc $loc;
$p = ($imgRef | Set-AzVMSourceImage -VM $p);
New-AzVM -ResourceGroupName $rgname -Location $loc -VM $p;
$vm = Get-AzVM -ResourceGroupName $rgname -Name $vmName;
Assert-AreEqual $ppg.Id $vm.ProximityPlacementGroup.Id;
$ppg = Get-AzProximityPlacementGroup -ResourceGroupName $rgname -Name $ppgname;
Assert-AreEqual $vm.Id $ppg.VirtualMachines[0].Id;
Remove-AzVM -ResourceGroupName $rgname -Name $vmName -Force;
$ppg = Get-AzProximityPlacementGroup -ResourceGroupName $rgname -Name $ppgname;
Assert-Null $ppg.VirtualMachines;
Remove-AzProximityPlacementGroup -ResourceGroupName $rgname -Name $ppgname -Force;
}
finally
{
Clean-ResourceGroup $rgname
}
}
|
combined_dataset/train/non-malicious/Import-Asup.ps1
|
Import-Asup.ps1
|
Function Import-ASUP
{
param(
[string]
$Path
)
Begin {
Function ConvertTo-Bool($bool) {
switch ($bool) {
"yes" {return $true}
"true" {return $true}
"enabled" {return $true}
"no" {return $False}
"false" {return $False}
"disabled" {return $False}
}
}
}
Process {
$asup = Get-Content $Path
$Storage = New-Object PSObject -Property @{SysInfo=@{};HostAdapters=@{};Disks=@();Shelves=@();SES=@{}}
$process = 0
$subprocess=0
$AggrHold = @{}
Foreach ($line in $asup) {
switch -regex ($line)
{
"====="
{
$Process = 0
}
"===== SYSCONFIG-A ====="
{
$process = 1
$subprocess = 0
}
"===== ENVIRONMENT ====="
{
$process = 2
$subprocess = 0
}
"===== SYSCONFIG-R ====="
{
$process = 3
$subprocess = 0
}
"===== STORAGE ====="
{
$process = 4
$subprocess = 0
}
}
switch ($process)
{
1
{
switch -regex ($Line)
{
"\\s+System\\sID\\:\\s(?<SystemID>\\S+)\\s\\((?<SystemName>\\S+)\\)\\;\\spartner\\sID\\:\\s(?<PartnerID>\\S+)\\s\\((?<PartnerName>\\S+)\\)"
{
$Storage.SysInfo.Add("SystemID",$Matches.SystemID)
$Storage.SysInfo.Add("SystemName",$Matches.SystemName)
$Storage.SysInfo.Add("PartnerID",$Matches.PartnerID)
$Storage.SysInfo.Add("PartnerName",$Matches.PartnerName)
}
"\\s+System\\sSerial\\sNumber\\:\\s(?<SN>\\S+)"
{
$Storage.SysInfo.Add("SerialNumber",$Matches.SN)
}
"\\s+System\\sRev\\:\\s(?<Rev>\\S+)"
{
$Storage.SysInfo.Add("Rev",$Matches.Rev)
}
"\\s+System\\sStorage\\sConfiguration\\:\\s(?<config>.+)"
{
$Storage.SysInfo.Add("StorageConfiguration",$Matches.config)
}
"System\\sACP\\sConnectivity\\:\\s(?<ACP>.+)"
{
$Storage.SysInfo.Add("ACP",$Matches.ACP)
}
"slot\\s0\\:\\sSystem\\sBoard\\s(?<board>.+)"
{
$subProcess=1
$Slot = New-Object PSObject -Property @{
"Board"=$Matches.board
"ModelName"=""
"PartNumber"=""
"Revision"=""
"SerialNumber"=""
"BIOSversion"=""
"LoaderVersion"=""
"AgentFWversion"=""
"Processors"=""
"ProcessorID"=""
"MicrocodeVersion"=""
"MemorySize"=""
"CMOSRAMStatus"=""
"Controller"=""
}
}
}
switch ($subProcess)
{
1
{
switch -regex ($Line)
{
"\\s+Model\\sName\\:\\s+(?<Model>.+)"
{
$Slot.ModelName = $Matches.Model
}
"\\s+Part\\sNumber\\:\\s+(?<Part>.+)"
{
$Slot.PartNumber = $Matches.Part
}
"\\s+Revision\\:\\s+(?<REV>.+)"
{
$Slot.Revision = $Matches.REV
}
"\\s+Serial\\sNumber\\:\\s+(?<SN>.+)"
{
$Slot.SerialNumber = $Matches.SN
}
"\\s+BIOS\\sversion\\:\\s+(?<BIOS>.+)"
{
$Slot.BIOSversion = $Matches.BIOS
}
"\\s+Loader\\sversion\\:\\s+(?<LV>.+)"
{
$Slot.LoaderVersion = $Matches.LV
}
"\\s+Agent\\sFW\\sversion\\:\\s+(?<FW>.+)"
{
$Slot.AgentFWversion = $Matches.FW
}
"\\s+Processors\\:\\s+(?<proc>.+)"
{
$Slot.Processors = $Matches.proc
}
"\\s+Processor\\sID\\:\\s+(?<procID>.+)"
{
$Slot.ProcessorID = $matches.procId
}
"\\s+Microcode\\sVersion\\:\\s+(?<microcode>.+)"
{
$Slot.MicrocodeVersion = $Matches.microcode
}
"\\s+Memory\\sSize\\:\\s+(?<memory>.+)"
{
$Slot.MemorySize = $Matches.memory
}
"\\s+CMOS\\sRAM\\sStatus\\:\\s+(?<CMOS>.+)"
{
$Slot.CMOSRAMStatus = $Matches.CMOS
}
"\\s+Controller\\:\\s+(?<Controller>.+)"
{
$Slot.Controller = $Matches.Controller
$Storage.SysInfo.Add("SystemBoard",$slot)
$subprocess = 0
}
}
}
}
}
2
{
switch -regex ($Line)
{
"^Channel\\:\\s+(?<Channel>\\d\\w)\\sShelf\\:\\s+(?<Shelf>\\d)\\sShelf\\sSerial\\sNumber:\\s+(?<ShelfSN>.+)"
{
$Shelf = New-Object PSObject -Property @{
"Channel"=$Matches.Channel
"Shelf"=$Matches.Shelf
"SerialNumber"=$Matches.ShelfSN
"ShelfVendor"=""
"ShelfModel"=""
"ShelfRevisionLevel"=""
"ModelName"=""
"ModuleASerialNumber"=""
"ModuleAFirmware"=""
"ModuleBSerialNumber"=""
"ModuleBFirmware"=""
"LocalAcessID"=""
}
}
"^Shelf\\sproduct\\sid\\:\\s(?<model>.+)"
{
$Shelf.ModelName = $Matches.model
}
"Module\\sA\\sSerial\\sNumber\\:\\s(?<SN>\\S+)\\s+Firmware\\srev\\:\\s(?<Rev>\\S+)"
{
$Shelf.ModuleASerialNumber = $Matches.SN
$Shelf.ModuleAFirmware = $Matches.Rev
}
"Module\\sB\\sSerial\\sNumber\\:\\s(?<SN>\\S+)\\s+Firmware\\srev\\:\\s(?<Rev>\\S+)"
{
$Shelf.ModuleBSerialNumber = $Matches.SN
$Shelf.ModuleBFirmware = $Matches.Rev
if (!$Storage.SES.Contains($Shelf.Channel))
{
$Storage.SES.Add($Shelf.Channel,@{})
}
($Storage.SES[$Shelf.Channel]).add($shelf.Shelf, $shelf)
}
"\\s+Channel\\:\\s+(?<channel>\\d\\w)"
{
$_channel = $matches.channel
}
"\\s+shelf\\:\\s+(?<channel>\\d)$"
{
$_Shelf = $matches.channel
$subprocess = 1
}
}
switch ($subProcess)
{
1
{
switch -regex ($Line)
{
"local\\saccess\\:\\s(?<Port>\\d\\w\\.\\d{2,3})$"
{
$Storage.SES[$_channel][$_Shelf].LocalAcessID = $Matches.Port
}
"^\\s+Module\\stype\\:\\s(?<Module>\\S+)\\;"
{
$Storage.SES[$_channel][$_Shelf].ModelName = $Matches.Module
}
"SES\\sConfiguration"
{
$subProcess = 2
}
}
}
2
{
switch -regex ($Line)
{
"\\s+vendor\\sidentification\\=(?<Vendor>.+)"
{
$Storage.SES[$_channel][$_Shelf].ShelfVendor=$Matches.Vendor
}
"\\s+product\\sidentification\\=(?<ShelfModel>.+)"
{
$Storage.SES[$_channel][$_Shelf].ShelfModel = $Matches.ShelfModel
}
"\\s+product\\srevision\\slevel\\=(?<ShelfRevisionLevel>.+)"
{
$Storage.SES[$_channel][$_Shelf].ShelfRevisionLevel = $Matches.ShelfRevisionLevel
$subprocess = 0
}
}
}
}
}
3
{
Switch -regex ($line)
{
"^Aggregate\\s(?<aggr>\\S+)\\s"
{
$subprocess =1
$aggr=$matches.aggr
}
"^Spare\\sdisks$|^Partner\\sdisks$"
{
$subprocess =1
$aggr=$null
}
}
switch -regex ($line)
{
"^\\s{6}(?<R>\\S+)\\s+(?<D>\\S+)(\\s+\\S+){5}\\s+(?<T>\\S+)\\s+\\S+\\s+(?<UMB>\\d+)\\/(?<UB>\\d+)\\s+(?<PMB>\\d+)\\/(?<PB>\\d+)"
{
$aggrHold.Add($Matches.D, @{
Aggregate=$aggr
RaidType=$Matches.R
DiskType=$Matches.T
UsedMB=$Matches.UMB
UsedBlocks=$Matches.UB
PhysicalMB=$Matches.PMB
PhysicalBlocks=$Matches.PB
})
}
"^(?<R>\\S+)\\s+(?<D>\\S+)(\\s+\\S+){5}\\s+(?<T>\\S+)\\s+\\S+\\s+(?<UMB>\\d+)\\/(?<UB>\\d+)\\s+(?<PMB>\\d+)\\/(?<PB>\\d+)"
{
$aggrHold.Add($Matches.D, @{
Aggregate=""
RaidType=$Matches.R
DiskType=$Matches.T
UsedMB=$Matches.UMB
UsedBlocks=$Matches.UB
PhysicalMB=$Matches.PMB
PhysicalBlocks=$Matches.PB
})
}
}
}
4
{
switch -regex ($line)
{
"^Slot\\:\\s+(?<slot>\\d\\w)$"
{
$subprocess = 1
$Adapter = New-Object PSObject -Property @{
Name=""
Description=""
FirmwareRev=""
FCNodeName=""
FCPacketSize=""
LinkDataRate=""
SRAMParity=$false
ExternalGBIC=$false
State=""
InUse=$false
Redundant=$false
}
}
"^Shelf\\sname\\:\\s+(?<Shelf>.+)"
{
$subprocess = 2
$shelf = New-Object PSObject -Property @{
Name=""
Channel=""
Module=""
ShelfID=0
ShelfUID=""
ShelfSN=""
TermSwitch=""
ShelfState=""
ModuleState=""
SerialNumber=""
ShelfVendor=""
ShelfModel=""
ShelfRevisionLevel=""
ModelName=""
ModuleASerialNumber=""
ModuleAFirmware=""
ModuleBSerialNumber=""
ModuleBFirmware=""
LocalAcessID=""
}
}
"^Disk\\:\\s+(?<Shelf>.+)"
{
$subprocess = 3
$disk = New-Object PSObject -Property @{
"Name"=""
"shelf"=0
"Bay"=0
"RaidType"=""
"Aggregate"=""
"DiskType"=""
"SN"=""
"Vendor"=""
"Model"=""
"Firmware"=""
"RPM"=0
"WWN"=""
"UID"=""
"DownRev"=""
"PrimaryPort"=""
"Secondaryname"=""
"SecondaryPort"=""
"PowerOnHours"=0
"UsedMB"=""
"UsedBlocks"=""
"PhysicalMB"=""
"PhysicalBlocks"=""
"BlocksRead"=[int64]0
"BlocksWritten"=[int64]0
"TimeInterval"=""
"GlistCount"=0
"ScrubLastDone"=""
"ScrubCount"=0
"LipCount"=0
"DynamicallyQualified"=$false
"PowerCycleCount"=0
"PowerCycleError"=0
"CurrentOwner"=""
"HomeOwner"=""
"ReservationOwner"=""
}
}
"SHARED\\sSTORAGE\\sHOSTNAME\\s+SYSTEM\\sID"
{
$subprocess = 4
}
}
switch ($subprocess)
{
1
{
switch -regex ($line)
{
"^Slot\\:\\s+(?<name>\\d\\w)$"
{
$Adapter.name = $matches.name
break
}
"^Description\\:\\s+(?<Description>.+)"
{
$Adapter.Description = $matches.Description;
break
}
"^Firmware\\sRev\\:\\s+(?<FirmwareRev>.+)"
{
$Adapter.FirmwareRev = $matches.FirmwareRev
break
}
"^FC\\sNode\\sName\\:\\s+(?<FCNodeName>.+)"
{
$Adapter.FCNodeName = $matches.FCNodeName
break
}
"^FC\\sPacket\\sSize\\:\\s+(?<FCPacketSize>.+)"
{
$Adapter.FCPacketSize = $matches.FCPacketSize
break
}
"^Link\\sData\\sRate\\:\\s+(?<LinkDataRate>.+)"
{
$Adapter.LinkDataRate = $matches.LinkDataRate
break
}
"^SRAM\\sParity\\:\\s+(?<SRAMParity>.+)"
{
$Adapter.SRAMParity = ConvertTo-Bool $matches.SRAMParity
break
}
"^External\\sGBIC\\:\\s+(?<ExternalGBIC>.+)"
{
$Adapter.ExternalGBIC = ConvertTo-Bool $matches.ExternalGBIC
break
}
"^State\\:\\s+(?<State>.+)"
{
$Adapter.State = $matches.State
break
}
"^In\\sUse\\:\\s+(?<InUse>.+)"
{
$Adapter.InUse = ConvertTo-Bool $matches.InUse
break
}
"^Redundant\\:\\s+(?<Redundant>.+)"
{
$Adapter.Redundant = ConvertTo-Bool $matches.Redundant
break
}
Default
{
if ($Adapter)
{
$Storage.HostAdapters.Add($Adapter.Name,$Adapter)
}
}
}
}
2
{
switch -regex ($line)
{
"^Shelf\\sname\\:\\s+(?<name>.+)"
{
$Shelf.Name = $matches.name
break
}
"^Channel\\:\\s+(?<Channel>.+)"
{
$Shelf.Channel = $matches.Channel
break
}
"^Module\\:\\s+(?<Module>.+)"
{
$Shelf.Module = $matches.Module
break
}
"Shelf\\sid\\:\\s+(?<ShelfID>.+)"
{
$Shelf.ShelfID = $matches.ShelfID
break
}
"Shelf\\sUID\\:\\s+(?<ShelfUID>.+)"
{
$shelf.ShelfUID = $Matches.ShelfUID
break
}
"Shelf\\sS\\/N\\:\\s+(?<ShelfSN>.+)"
{
$shelf.ShelfSN = $Matches.ShelfSN
break
}
"Term\\sswitch\\:\\s+(?<TermSwitch>.+)"
{
$Shelf.TermSwitch = $Matches.TermSwitch
break
}
"Shelf\\sstate\\:\\s+(?<ShelfState>.+)"
{
$shelf.ShelfState = $Matches.ShelfState
break
}
"Module\\sstate\\:\\s+(?<ModuleState>.+)"
{
$shelf.ModuleState = $matches.ModuleState
$Storage.shelves += $shelf
break
}
}
}
3
{
switch -regex ($line)
{
"^Disk\\:\\s+(?<Name>.+)"
{
$Disk.name = $matches.name
break
}
"^Shelf\\:\\s+(?<shelf>.+)"
{
$Disk.shelf = $matches.shelf
break
}
"^Bay\\:\\s+(?<Bay>.+)"
{
$Disk.Bay = $matches.Bay
break
}
"^Serial\\:\\s+(?<SN>.+)"
{
$Disk.SN = $matches.SN
break
}
"^Vendor\\:\\s+(?<Vendor>.+)"
{
$Disk.Vendor = $matches.Vendor
break
}
"^Model\\:\\s+(?<Model>.+)"
{
$Disk.Model = $matches.Model
break
}
"^Rev\\:\\s+(?<Firmware>.+)"
{
$Disk.Firmware = $matches.Firmware
break
}
"^RPM\\:\\s+(?<RPM>.+)"
{
$Disk.RPM = $matches.RPM
break
}
"^WWN\\:\\s+(?<WWN>.+)"
{
$Disk.WWN = $matches.WWN
break
}
"^UID\\:\\s+(?<UID>.+)"
{
$Disk.UID = $matches.UID
break
}
"^Downrev\\:\\s+(?<DownRev>.+)"
{
$Disk.DownRev = $matches.DownRev
break
}
"^Pri\\sPort\\:\\s+(?<PrimaryPort>.+)"
{
$Disk.PrimaryPort = $matches.PrimaryPort
break
}
"^Sec\\sName\\:\\s+(?<Secondaryname>.+)"
{
$Disk.Secondaryname = $matches.Secondaryname
break
}
"^Sec Port\\:\\s+(?<SecondaryPort>.+)"
{
$Disk.SecondaryPort = $matches.SecondaryPort
break
}
"^Power-on Hours\\:\\s+(?<PowerOnHours>.+)"
{
$Disk.PowerOnHours = $matches.PowerOnHours
break
}
"^Blocks read\\:\\s+(?<BlocksRead>.+)"
{
$Disk.BlocksRead = $matches.BlocksRead
break
}
"^Blocks written\\:\\s+(?<BlocksWritten>.+)"
{
$Disk.BlocksWritten = $matches.BlocksWritten
break
}
"^Time interval\\:\\s+(?<TimeInterval>.+)"
{
$Disk.TimeInterval = $matches.TimeInterval
break
}
"^Glist count\\:\\s+(?<GlistCount>.+)"
{
$Disk.GlistCount = $matches.GlistCount
break
}
"^Scrub last done\\:\\s+(?<ScrubLastDone>.+)"
{
$Disk.ScrubLastDone = $matches.ScrubLastDone
break
}
"^Scrub count\\:\\s+(?<ScrubCount>.+)"
{
$Disk.ScrubCount = $matches.ScrubCount
break
}
"^LIP count\\:\\s+(?<LipCount>.+)"
{
$Disk.LipCount = $matches.LipCount
break
}
"^Dynamically qualified\\:\\s+(?<DynamicallyQualified>.+)"
{
$Disk.DynamicallyQualified = $matches.DynamicallyQualified
break
}
"^Power\\scycle\\scount\\:\\s+(?<PowerCycleCount>.+)"
{
$Disk.PowerCycleCount = $matches.PowerCycleCount
break
}
"^Power\\scycle\\son\\serror\\:\\s+(?<PowerCycleError>.+)"
{
$Disk.PowerCycleError = $matches.PowerCycleError
break
}
"^Current owner\\:\\s+(?<CurrentOwner>.+)"
{
$Disk.CurrentOwner = $matches.CurrentOwner
break
}
"^Home owner\\:\\s+(?<HomeOwner>.+)"
{
$Disk.HomeOwner = $matches.HomeOwner
break
}
"^Reservation owner\\:\\s+(?<ReservationOwner>.+)"
{
$Disk.ReservationOwner = $matches.ReservationOwner
break
}
Default
{
if ($Disk)
{
#merge this data with what we scrapped from sysconfig-r
$Disk.RaidType = $aggrHold[$Disk.Name].RaidType
$Disk.Aggregate = $aggrHold[$Disk.Name].Aggregate
$Disk.DiskType = $aggrHold[$Disk.Name].DiskType
$Disk.UsedMB = $aggrHold[$Disk.Name].UsedMB
$Disk.UsedBlocks = $aggrHold[$Disk.Name].UsedBlocks
$Disk.PhysicalMB = $aggrHold[$Disk.Name].PhysicalMB
$Disk.PhysicalBlocks = $aggrHold[$Disk.Name].PhysicalBlocks
$Storage.Disks +=$Disk
}
}
}
}
}
}
}
}
Write-output $Storage
}
}
|
combined_dataset/train/non-malicious/sample_47_15.ps1
|
sample_47_15.ps1
|
#
# Module manifest for module 'OCI.PSModules.Osuborganizationsubscription'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Osuborganizationsubscription.dll'
# Version number of this module.
ModuleVersion = '83.1.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'e98d9d2f-0e34-4cf5-b62f-660dcfdc3e34'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Osuborganizationsubscription Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Osuborganizationsubscription.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport =
'Get-OCIOsuborganizationsubscriptionOrganizationSubscriptionsList'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Osuborganizationsubscription'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/AnalizeScript.ps1
|
AnalizeScript.ps1
|
<#
.SYNOPSIS
Analyzes script and gives starting lines & columns of script components
.DESCRIPTION
AnalizeScript opens a dialog box for user selection; checks that input is
a powershell script; parses and agrigates the script components into the
following tokens:
Unknown(s)
Command(s)
CommandParameter(s)
CommandArgument(s)
Variable(s)
Member(s)
LoopLabel(s)
Attribute(s)
Keyword(s)
LineContinuation(s)
.LINK
None
.NOTES
Name: AnalizeScript.ps1
Author: Paul A. Drinnon
Date Created: 03/24/2011
Date Revised: - (New Release)
Version: 1.0
History: 1.0
This script can be altered to output other "Types" of tokenized content
Below is a complete list
Types
______________________________________
Name Example / Value
Comment
__________________ ___________ _____
Unknown 0
Command 1
CommandParameter 2
CommandArgument 3
Number 4
String 5
Variable -$! 6
Member 7
LoopLabel 8
Attribute 9
Type 10
Operator (-+*/=|...) 11
GroupStart ({ 12
GroupEnd )} 13
Keyword 14
Comment 15
StatementSeparator 16
NewLine 17
LineContinuation 18
Position 19
requires -Version 2.0
** Licensed under a Creative Commons Attribution 3.0 License **
#>
Add-Type -TypeDefinition @"
using System;
using System.Windows.Forms;
public class WindowWrapper : IWin32Window {
private IntPtr _hWnd;
public WindowWrapper(IntPtr handle) {
_hWnd = handle;
}
public IntPtr Handle {
get { return _hWnd; }
}
}
"@ -ReferencedAssemblies "System.Windows.Forms.dll"
[System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms") | Out-Null
$handle = [System.Diagnostics.Process]::GetCurrentProcess().MainWindowHandle
$owner = New-Object WindowWrapper -ArgumentList $handle
function Select-File
{
param (
[String]$Title = "Enter a Windows PowerShell script",
[String]$InitialDirectory = $home,
[String]$Filter = "All Files(*.*)|*.*"
)
$dialog = New-Object System.Windows.Forms.OpenFileDialog
$dialog.Filter = $filter
$dialog.InitialDirectory = $initialDirectory
$dialog.ShowHelp = $true
$dialog.Title = $title
$result = $dialog.ShowDialog($owner)
if ($result -eq "OK") {
return $dialog.FileName
}
else {
Write-Error "Operation cancelled by user."
}
}
function TokenName-Count ($file, $str)
{
$content = gc $file
$a = [System.Management.Automation.PsParser]::Tokenize($content, [ref] $null) |
? { $_.Type -eq $str } | Measure-Object | select Count
$su = $str.ToUpper() + "S"
"$su`t`t$a"
}
function CustomTable ($file, $str)
{
$content = gc $file
[System.Management.Automation.PsParser]::Tokenize($content, [ref] $null) |
? { $_.Type -eq $str } | ft content, startline, startcolumn -auto
}
$selectPSfile = ""
while (-!($selectPSfile -match ".ps1|.psm1|.psd1|.ps1xml")) {
$selectPSfile = Select-File
}
$TokenNames = `
"Unknown", `
"Command", `
"CommandParameter", `
"CommandArgument", `
"Variable", `
"Member", `
"LoopLabel",`
"Attribute",`
"Keyword", `
"LineContinuation"
$date = (Get-Date).ToShortDateString()
"`n$selectPSfile`t`t`t`t$date`n"
$TokenNames | foreach {
[string]$s = $_
TokenName-Count $selectPSfile $s
CustomTable $selectPSfile $s
}
|
combined_dataset/train/non-malicious/Get-NestedGroups_2.ps1
|
Get-NestedGroups_2.ps1
|
<#
.SYNOPSIS
Enumerate all AD group memberships of an account (including nested membership).
.DESCRIPTION
This script will return all the AD groups an account is member of.
.PARAMETER UserName
The username whose group memberships to find.
.EXAMPLE
.\\Get-NestedGroups.ps1 'johndoe'
Name DistinguishedName
---- -----------------
Domain Users CN=Domain Users,CN=Users,DC=contoso,DC=com
Finance CN=Finance,OU=Department,OU=Groups,DC=contos...
.NOTES
ScriptName : Get-NestedGroups
Created By : Gilbert van Griensven
Date Coded : 06/17/2012
The script iterates through all nested groups and skips circular nested groups.
.LINK
#>
Param
(
[Parameter(Mandatory=$true)]$UserName
)
Begin
{
Function LoadADModule {
If (!(Get-Module ActiveDirectory)) {
If (Get-Module -ListAvailable | ? {$_.Name -eq "ActiveDirectory"}) {
Import-Module ActiveDirectory
Return $True
} Else {
Return $False
}
} Else {
Return $True
}
}
Function GetNestedGroups ($strGroupDN) {
$currentGroupmemberships = (Get-ADGroup $strGroupDN -Properties MemberOf | Select-Object MemberOf).MemberOf
foreach ($groupDN in $currentGroupmemberships) {
if (!(($Script:UserGroupMembership | Select-Object -ExpandProperty DistinguishedName) -contains $groupDN)) {
$arrProps = @{
Name = (Get-ADGroup $groupDN).Name
DistinguishedName = $groupDN
}
$Script:UserGroupMembership += (New-Object psobject -Property $arrProps)
GetNestedGroups $groupDN
}
}
}
Function FindGroupMembership ($strUsername) {
$Script:UserGroupMembership = @()
$arrProps = @{
Name = "Domain Users"
DistinguishedName = (Get-ADGroup "Domain Users").DistinguishedName
}
$Script:UserGroupMembership += (New-Object psobject -Property $arrProps)
GetNestedGroups (Get-ADGroup "Domain Users").DistinguishedName
$directMembershipGroups = (Get-ADUser $strUsername -Properties MemberOf | Select-Object MemberOf).MemberOf
foreach ($groupDN in $directMembershipGroups) {
$arrProps = @{
Name = (Get-ADGroup $groupDN).Name
DistinguishedName = $groupDN
}
$Script:UserGroupMembership += (New-Object psobject -Property $arrProps)
GetNestedGroups $groupDN
}
}
}
Process
{
If (!(LoadADModule)) {
Write-Host "Could not load module ActiveDirectory!"
Return
}
If ($UserName) {
FindGroupMembership $UserName
Return $Script:UserGroupMembership
}
}
End
{
Remove-Module ActiveDirectory -ErrorAction SilentlyContinue
}
|
combined_dataset/train/non-malicious/sample_0_68.ps1
|
sample_0_68.ps1
|
# <copyright>
# INTEL CONFIDENTIAL
#
# Copyright 2021 Intel Corporation
#
# This software and the related documents are Intel copyrighted materials, and your use of
# them is governed by the express license under which they were provided to you ("License").
# Unless the License provides otherwise, you may not use, modify, copy, publish, distribute,
# disclose or transmit this software or the related documents without Intel's prior written
# permission.
#
# This software and the related documents are provided as is, with no express or implied
# warranties, other than those that are expressly stated in the License.
#
# <copyright>
#.ExternalHelp IntelEthernetCmdlets.dll-Help.xml
function Get-IntelEthernet
{
[CmdletBinding()]
Param(
[parameter(Mandatory = $false)]
[SupportsWildcards()]
[ValidateNotNullOrEmpty()]
[String[]]
$Name = '',
[parameter(Mandatory = $false, Position = 0, ValueFromPipeline = $true)]
[ValidateNotNullOrEmpty()]
[object[]]
$Adapter = $null
)
Begin
{
$AdapterName = $Name
$script:ErrorMessagesGet = @()
$script:WarningMessagesGet = @()
$FinalObject = @()
GetIntelEthernetDevices @('icei*', 'i40ei*')
if ($script:SupportedAdapters)
{
$script:MSNetAdapters = @(Get-NetAdapter -InterfaceDescription $script:SupportedAdapters.Name -ErrorAction SilentlyContinue)
}
GetIntelDriverInfo
$script:MSNetHwInfo = @(Get-NetAdapterHardwareInfo -ErrorAction SilentlyContinue)
$script:MSNetAdvProperty = @(Get-NetAdapterAdvancedProperty -ErrorAction SilentlyContinue)
}
Process
{
$Adapters = $Adapter
$PreProcessedAdapterNames = ValidateGetAdapterNameParams $AdapterName $Adapters ([ref]$script:ErrorMessagesGet)
$AdapterNamesArray = @(GetSupportedAdapters $PreProcessedAdapterNames ([ref]$script:WarningMessagesGet))
foreach ($a in $AdapterNamesArray)
{
$TmpStatusMsg = CheckDeviceError $a
if (-not [string]::IsNullOrEmpty($TmpStatusMsg))
{
$script:WarningMessagesGet += $TmpStatusMsg
}
$SupportedSpeeds = GetAdapterSupportedSpeeds $a
$AdapterStatuses = GetAdapterStatus $a
$BusTypes = GetAdapterBusType $a
$Capabilities = GetAdapterCapabilities $a $SupportedSpeeds
$ConnectionNames = GetAdapterConnectionName $a
$DDPPackageNameAndVersions = GetAdapterDDPPackageNameAndVersion $a
$DDPPackageTrackIds = GetAdapterDDPPackageTrackId $a
$DeviceStatuses = GetAdapterDeviceStatus $a $SupportedSpeeds
$DriverVersion = GetDriverVersion $a
$EEEStatuses = GetAdapterEEEStatus $a
$ETrackIDs = GetAdapterETrackId $a
$FullDuplex = GetFullDuplex $a
$LinkSpeedDuplex = GetLinkSpeedDuplex $a
$MaxSpeeds = GetAdapterMaxSpeed $a $SupportedSpeeds
$MediaTypes = GetAdapterMediaType $a
$MiniPortNames = GetAdapterMiniPortName $a
$NVMVersions = GetAdapterNVMVersion $a
$NegotiatedLinkSpeed = GetAdapterNegotiatedLinkSpeed $a
$NegotiatedLinkWidth = GetAdapterNegotiatedLinkWidth $a
$NetlistVersions = GetAdapterNetlistVersion $a
$OemFwVersions = GetOemFwVersion $a
$OriginalDisplayNames = GetOriginalDisplayName $a
$PCIDeviceIDs = GetAdapterPCIDeviceID $a
$PartNumbers = GetAdapterPartNumber $a
$PciLocations = GetAdapterPCILocation $a
$AdapterPort = GetAdapterPort $a
$SanMacAddresses = GetAdapterSanMacAddress $a
# Assemble it all together in PSCustomObject
$FinalObject += [PsCustomObject] @{
PSTypeName = 'IntelEthernetAdapter'
AdapterStatus = $AdapterStatuses
BusType = $BusTypes.BusType
BusTypeString = $BusTypes.BusTypeString
Capabilities = $Capabilities
ConnectionName = $ConnectionNames
DDPPackageName = $DDPPackageNameAndVersions.Name
DDPPackageTrackId = $DDPPackageTrackIds
DDPPackageVersion = $DDPPackageNameAndVersions.Version
DeviceStatus = $DeviceStatuses.DeviceStatus
DeviceStatusString = $DeviceStatuses.DeviceStatusString
DriverVersion = $DriverVersion
EEE = $EEEStatuses.EEEStatus
EEEString = $EEEStatuses.EEEStatusString
ETrackID = $ETrackIDs
FWVersion = $OemFwVersions
FullDuplex = $FullDuplex
Location = $PciLocations
MaxSpeed = $MaxSpeeds
MediaType = $MediaTypes.MediaType
MediaTypeString = $MediaTypes.MediaTypeString
MiniPortInstance = $MiniPortNames.Instance
MiniPortName = $MiniPortNames.Name
NVMVersion = $NVMVersions
Name = $a
NegotiatedLinkSpeed = $NegotiatedLinkSpeed.NegotiatedLinkSpeed
NegotiatedLinkSpeedString = $NegotiatedLinkSpeed.NegotiatedLinkSpeedString
NegotiatedLinkWidth = $NegotiatedLinkWidth.NegotiatedLinkWidth
NegotiatedLinkWidthString = $NegotiatedLinkWidth.NegotiatedLinkWidthString
NetlistVersion = $NetlistVersions
OriginalDisplayName = $OriginalDisplayNames
PCIDeviceID = $PCIDeviceIDs
PartNumber = $PartNumbers
PortNumber = $AdapterPort.Port
PortNumberString = $AdapterPort.PortString
SANMacAddress = $SanMacAddresses
Speed = $LinkSpeedDuplex.Speed
SpeedString = $LinkSpeedDuplex.SpeedString
}
}
}
End
{
$FinalObject | Sort-Object -Property Location
foreach ($WarningMessage in $script:WarningMessagesGet)
{
Write-Warning $WarningMessage
}
foreach ($ErrorMessage in $script:ErrorMessagesGet)
{
Write-Error $ErrorMessage
}
}
}
function GetAdapterBusType($AdapterName)
{
$BusType = 0
$BusTypeString = $Messages.Unknown
foreach ($Bus in $script:BusTypesArray)
{
if (($null -ne $Bus) -and ($Bus.InstanceName -eq $AdapterName))
{
$BusType = [int]$Bus.BusType
$BusTypeString = $BusTypeMap[[int]$Bus.BusType]
break
}
}
return [PsCustomObject] @{
BusType = $BusType
BusTypeString = $BusTypeString }
}
function GetAdapterConnectionName($AdapterName)
{
return ($script:MSNetAdapters.Where({$_.InterfaceDescription -eq $AdapterName})).InterfaceAlias
}
function GetAdapterDDPPackageNameAndVersion($AdapterName)
{
$Name = $Messages.NotSupported
$Version = $Messages.NotSupported
foreach ($DDPPkgName in $script:DDPPkgNamesArray)
{
if (($null -ne $DDPPkgName) -and ($DDPPkgName.InstanceName -eq $AdapterName))
{
if ($DDPPkgName.Name -and ($null -ne $DDPPkgName.Major) -and ($null -ne $DDPPkgName.Minor))
{
$Name = [System.Text.Encoding]::ASCII.GetString($DDPPkgName.Name).Trim(0)
$Version = $DDPPkgName.Major.ToString() + "." + $DDPPkgName.Minor.ToString()
}
break
}
}
return [PsCustomObject] @{
Name = $Name
Version = $Version }
}
function GetAdapterDDPPackageTrackId($AdapterName)
{
$TrackId = $Messages.NotSupported
$Params = @{Version = [uint32]1; Size = [uint32]12; Type = [uint32]1;}
$Result = InvokeCimMethod "IntlLan_GetTrackId" $AdapterName "WmiGetTrackId" $Params
if (($null -ne $Result) -and ($Result.ReturnValue -eq $true) -and ($Result.Track_Id))
{
$TrackId = '0x{0:X}' -f $Result.Track_Id
}
return $TrackId
}
function GetAdapterDeviceStatus($AdapterName, $SupportedSpeeds)
{
$DeviceStatus = 0
$DeviceStatusString = $Messages.Unknown
$AdapterNames = $script:MSNetAdapters.Where({$_.InterfaceDescription -eq $AdapterName})
foreach($TmpAdapter in $AdapterNames)
{
if ("Up" -eq $TmpAdapter.Status)
{
$MaxSpeed = GetAdapterMaxSpeed $AdapterName $SupportedSpeeds
$CurrentSpeed = (GetLinkSpeedDuplex $AdapterName).Speed
if ($CurrentSpeed -lt $MaxSpeed)
{
$DeviceStatus = 4
$DeviceStatusString = $Messages.LinkUpNotMax
}
else
{
$DeviceStatus = 1
$DeviceStatusString = $Messages.LinkUp
}
}
elseif ("Disconnected" -eq $TmpAdapter.Status)
{
$DeviceStatus = 2
$DeviceStatusString = $Messages.LinkDown
}
elseif ("Disabled" -eq $TmpAdapter.Status)
{
$DeviceStatus = 0
$DeviceStatusString = $Messages.Disabled
}
}
return [PsCustomObject] @{
DeviceStatus = $DeviceStatus
DeviceStatusString = $DeviceStatusString}
}
function GetAdapterETrackId($AdapterName)
{
$strETrackId = $Messages.NotSupported
foreach ($ETrackId in $script:ETrackIdsArray)
{
if (($null -ne $ETrackId) -and ($ETrackId.InstanceName -eq $AdapterName))
{
if ($ETrackId.Id)
{
$strETrackId = '0x{0:X}' -f $ETrackId.Id
}
break
}
}
return $strETrackId
}
function GetAdapterNVMVersion($AdapterName)
{
$Version = $Messages.NotSupported
foreach ($NVMVersion in $script:NVMVersionsArray)
{
if (($null -ne $NVMVersion) -and ($NVMVersion.InstanceName -eq $AdapterName))
{
if ($NVMVersion.Version)
{
$Version = (($NVMVersion.Version -band 0xffff) -shr 8).ToString() + "." + (($NVMVersion.Version -band 0xff)).ToString("X2")
}
break
}
}
return $Version
}
function GetAdapterNetlistVersion($AdapterName)
{
$NetlistVersion = $Messages.NotSupported
$Params = @{Version = [uint32]1; Size = [uint32]12; Type = [uint32]1;}
$Result = InvokeCimMethod "IntlLan_GetNVMNetlistInfo" $AdapterName "WmiGetNVMNetlistInfo" $params
if (($null -ne $Result) -and ($Result.ReturnValue -eq $true) -and ($Result.VersionStr))
{
$NetlistVersion = [System.Text.Encoding]::ASCII.GetString($Result.VersionStr).Trim(0)
}
return $NetlistVersion
}
function GetAdapterPartNumber($AdapterName)
{
$PartNumberString = $Messages.NotSupported
foreach ($PartNumber in $script:PartNumbersArray)
{
if (($null -ne $PartNumber) -and ($PartNumber.InstanceName -eq $AdapterName))
{
if ($PartNumber.PartNumberString)
{
$PartNumberString = [System.Text.Encoding]::ASCII.GetString($PartNumber.PartNumberString).Trim(0)
}
break
}
}
return $PartNumberString
}
function GetAdapterSanMacAddress($AdapterName)
{
$MacAddress = $Messages.NotSupported
foreach ($SanMacAddress in $script:SanMacAddressesArray)
{
if (($null -ne $SanMacAddress) -and ($SanMacAddress.InstanceName -eq $AdapterName))
{
if ($SanMacAddress.SanMacAddr)
{
$MacAddress = ""
for ($i = 0; $i -lt 6; $i++)
{
# convert to string hex representation; X - hex, 2 - add leading zeroes if needed
$MacAddress += $SanMacAddress.SanMacAddr[$i].ToString("X2")
}
}
break
}
}
return $MacAddress
}
function GetAdapterMediaType($AdapterName)
{
$MediaType = [PsCustomObject] @{
MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_UNKNOWN
MediaTypeString = $Messages.Unknown }
$Service = ($script:SupportedAdapters.Where({$_.Name -eq $AdapterName})).Service
switch ($Service)
{
{$_ -in @('icea', 'iceb', 'scea', 'sceb')} { $MediaType = GetAdapterMediaTypeIce $AdapterName; break }
{$_ -in @('i40ea', 'i40eb')} { $MediaType = GetAdapterMediaTypeI40e $AdapterName; break }
}
return $MediaType
}
function GetAdapterMediaTypeIce($AdapterName)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Unknown
$MediaTypeString = $Messages.Unknown
foreach ($PhyInfo in $script:PhyInfoArray)
{
if (($null -ne $PhyInfo) -and ($PhyInfo.InstanceName -eq $AdapterName) -and ($PhyInfo.PhyInfo.Length -ge 8))
{
# Interpreting PhyInfo array values:
# 0 == PHY type
# 1 == link info <-- Bit 0 (value of 1 means has link)
# 2 == an_info
# 3 == ext_info
# 4 == module type [0]
# 5 == module type [1]
# 6 == module type [2]
# 7 == media interface <-- 1=Backplane, 2=QSFP, 3=SFP
$PhyType = $PhyInfo.PhyInfo[0];
$LinkInfo = $PhyInfo.PhyInfo[1];
$MediaInterface = $PhyInfo.PhyInfo[7];
if ($LinkInfo -band 0x01)
{
switch ($PhyType)
{
{$_ -in [int][CVL_PHY_TYPE]::CVL10GSFIAOC_ACC,
[int][CVL_PHY_TYPE]::CVL25GAUIAOC_ACC,
[int][CVL_PHY_TYPE]::CVL40GXLAUIAOC_ACC,
[int][CVL_PHY_TYPE]::CVL50GLAUI2AOC_ACC,
[int][CVL_PHY_TYPE]::CVL50GAUI2AOC_ACC,
[int][CVL_PHY_TYPE]::CVL50GAUI1AOC_ACC,
[int][CVL_PHY_TYPE]::CVL100GCAUI4AOC_ACC,
[int][CVL_PHY_TYPE]::CVL100GAUI4AOC_ACC,
[int][CVL_PHY_TYPE]::CVL100GAUI2AOC_ACC}
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_AOC_ACC
$MediaTypeString = $Messages.AOCACC
break
}
{$_ -in [int][CVL_PHY_TYPE]::CVL5GBaseKR,
[int][CVL_PHY_TYPE]::CVL10GBaseKR,
[int][CVL_PHY_TYPE]::CVL25GBaseKR}
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Backplane_KR
$MediaTypeString = $Messages.BackplaneKR
break
}
([int][CVL_PHY_TYPE]::CVL25GBaseKR1)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Backplane_KR1
$MediaTypeString = $Messages.BackplaneKR1
break
}
([int][CVL_PHY_TYPE]::CVL50GBaseKR2)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Backplane_KR2
$MediaTypeString = $Messages.BackplaneKR2
break
}
([int][CVL_PHY_TYPE]::CVL100GBaseKR2PAM4)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Backplane_KR2_PAM4
$MediaTypeString = $Messages.BackplaneKR2PAM4
break
}
{$_ -in [int][CVL_PHY_TYPE]::CVL40GBaseKR4,
[int][CVL_PHY_TYPE]::CVL100GBaseKR4}
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Backplane_KR4
$MediaTypeString = $Messages.BackplaneKR4
break
}
([int][CVL_PHY_TYPE]::CVL100GBaseKR4PAM4)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Backplane_KR4_PAM4
$MediaTypeString = $Messages.BackplaneKR4PAM4
break
}
([int][CVL_PHY_TYPE]::CVL50GBaseKRPAM4)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Backplane_KR_PAM4
$MediaTypeString = $Messages.BackplaneKRPAM4
break
}
([int][CVL_PHY_TYPE]::CVL25GBaseKRS)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Backplane_KR_S
$MediaTypeString = $Messages.BackplaneKRS
break
}
{$_ -in [int][CVL_PHY_TYPE]::CVL1000BaseKX,
[int][CVL_PHY_TYPE]::CVL2Point5GBaseKX}
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Backplane_KX
$MediaTypeString = $Messages.BackplaneKX
break
}
{$_ -in [int][CVL_PHY_TYPE]::CVL10GSFIC2C,
[int][CVL_PHY_TYPE]::CVL25GAUIC2C,
[int][CVL_PHY_TYPE]::CVL40GXLAUI,
[int][CVL_PHY_TYPE]::CVL50GLAUI2,
[int][CVL_PHY_TYPE]::CVL50GAUI2,
[int][CVL_PHY_TYPE]::CVL50GAUI1,
[int][CVL_PHY_TYPE]::CVL100GCAUI4,
[int][CVL_PHY_TYPE]::CVL100GAUI4,
[int][CVL_PHY_TYPE]::CVL100GAUI2}
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Chip_to_Chip
$MediaTypeString = $Messages.ChiptoChip
break
}
{$_ -in [int][CVL_PHY_TYPE]::CVL1000BaseT,
[int][CVL_PHY_TYPE]::CVL2Point5GBaseT,
[int][CVL_PHY_TYPE]::CVL5GBaseT,
[int][CVL_PHY_TYPE]::CVL10GBaseT,
[int][CVL_PHY_TYPE]::CVL25GBaseT}
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Copper_T
$MediaTypeString = $Messages.CopperT
break
}
([int][CVL_PHY_TYPE]::CVL100BaseTX)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Copper_TX
$MediaTypeString = $Messages.CopperTX
break
}
([int][CVL_PHY_TYPE]::CVL10GSFIDA)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Direct_Attach
$MediaTypeString = $Messages.DirectAttach
break
}
([int][CVL_PHY_TYPE]::CVL100GBaseCP2)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Direct_Attach_CP2
$MediaTypeString = $Messages.DirectAttachCP2
break
}
([int][CVL_PHY_TYPE]::CVL25GBaseCR)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Direct_Attach_CR
$MediaTypeString = $Messages.DirectAttachCR
break
}
([int][CVL_PHY_TYPE]::CVL25GBaseCR1)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Direct_Attach_CR1
$MediaTypeString = $Messages.DirectAttachCR1
break
}
([int][CVL_PHY_TYPE]::CVL50GBaseCR2)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Direct_Attach_CR2
$MediaTypeString = $Messages.DirectAttachCR2
break
}
{$_ -in [int][CVL_PHY_TYPE]::CVL40GBaseCR4,
[int][CVL_PHY_TYPE]::CVL100GBaseCR4}
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Direct_Attach_CR4
$MediaTypeString = $Messages.DirectAttachCR4
break
}
([int][CVL_PHY_TYPE]::CVL50GBaseCRPAM4)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Direct_Attach_CR_PAM4
$MediaTypeString = $Messages.DirectAttachCRPAM4
break
}
([int][CVL_PHY_TYPE]::CVL25GBaseCRS)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Direct_Attach_CR_S
$MediaTypeString = $Messages.DirectAttachCRS
break
}
([int][CVL_PHY_TYPE]::CVL100GBaseDR)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Fiber_DR
$MediaTypeString = $Messages.FiberDR
break
}
([int][CVL_PHY_TYPE]::CVL50GBaseFR)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Fiber_FR
$MediaTypeString = $Messages.FiberFR
break
}
{$_ -in [int][CVL_PHY_TYPE]::CVL10GBaseLR,
[int][CVL_PHY_TYPE]::CVL25GBaseLR,
[int][CVL_PHY_TYPE]::CVL50GBaseLR}
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Fiber_LR
$MediaTypeString = $Messages.FiberLR
break
}
{$_ -in [int][CVL_PHY_TYPE]::CVL40GBaseLR4,
[int][CVL_PHY_TYPE]::CVL100GBaseLR4}
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Fiber_LR4
$MediaTypeString = $Messages.FiberLR4
break
}
([int][CVL_PHY_TYPE]::CVL1000BaseLX)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Fiber_LX
$MediaTypeString = $Messages.FiberLX
break
}
{$_ -in [int][CVL_PHY_TYPE]::CVL10GBaseSR,
[int][CVL_PHY_TYPE]::CVL25GBaseSR,
[int][CVL_PHY_TYPE]::CVL50GBaseSR}
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Fiber_SR
$MediaTypeString = $Messages.FiberSR
break
}
([int][CVL_PHY_TYPE]::CVL100GBaseSR2)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Fiber_SR2
$MediaTypeString = $Messages.FiberSR2
break
}
{$_ -in [int][CVL_PHY_TYPE]::CVL40GBaseSR4,
[int][CVL_PHY_TYPE]::CVL100GBaseSR4}
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Fiber_SR4
$MediaTypeString = $Messages.FiberSR4
break
}
([int][CVL_PHY_TYPE]::CVL1000BaseSX)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Fiber_SX
$MediaTypeString = $Messages.FiberSX
break
}
([int][CVL_PHY_TYPE]::CVL2Point5gBaseX)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Fiber_X
$MediaTypeString = $Messages.FiberX
break
}
{$_ -in [int][CVL_PHY_TYPE]::CVL100MSGMII,
[int][CVL_PHY_TYPE]::CVL1GSGMII}
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_SGMII
$MediaTypeString = $Messages.SGMII
break
}
default
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Unknown
$MediaTypeString = $Messages.Unknown
break
}
}
}
else
{
switch ($MediaInterface)
{
([int][CPK_PHY_INFO]::CPK_PHYINFO_MEDIA_BACKPLANE)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_INTERFACE_CVL_BACKPLANE
$MediaTypeString = $Messages.Backplane
break
}
([int][CPK_PHY_INFO]::CPK_PHYINFO_MEDIA_QSFP)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_INTERFACE_CVL_QSFP
$MediaTypeString = $Messages.QSFP
break
}
([int][CPK_PHY_INFO]::CPK_PHYINFO_MEDIA_SFP)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_INTERFACE_CVL_SFP
$MediaTypeString = $Messages.SFP
break
}
([int][CPK_PHY_INFO]::CPK_PHYINFO_MEDIA_BASE_T)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_INTERFACE_CVL_BASE_T
$MediaTypeString = $Messages.CopperT
break
}
([int][CPK_PHY_INFO]::CPK_PHYINFO_MEDIA_SGMII)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_INTERFACE_CVL_SGMII
$MediaTypeString = $Messages.SGMII
break
}
([int][CPK_PHY_INFO]::CPK_PHYINFO_MEDIA_FIBER)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_INTERFACE_CVL_FIBER
$MediaTypeString = $Messages.Fiber
break
}
default
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Unknown
$MediaTypeString = $Messages.Unknown
break
}
}
}
}
}
return [PsCustomObject] @{
MediaType = $MediaType
MediaTypeString = $MediaTypeString }
}
function GetAdapterMediaTypeI40e($AdapterName)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_UNKNOWN
$MediaTypeString = $Messages.Unknown
foreach ($PhyInfo in $script:PhyInfoArray)
{
if (($null -ne $PhyInfo) -and ($PhyInfo.InstanceName -eq $AdapterName) -and ($PhyInfo.PhyInfo.Length -ge 13))
{
$PhyType = $PhyInfo.PhyInfo[0];
$LinkType = ([uint32]$PhyInfo.PhyInfo[11] -shl 24) + ([uint32]$PhyInfo.PhyInfo[10] -shl 16) + ([uint32]$PhyInfo.PhyInfo[9] -shl 8) + [uint32]$PhyInfo.PhyInfo[8];
$LinkTypeExt = $PhyInfo.PhyInfo[12];
if ($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_EMPTY)
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_UNKNOWN
}
elseif (($LinkType -band [int][LinkType]::LINK_TYPE_40GBASE_KR4) -or
($LinkType -band [int][LinkType]::LINK_TYPE_10GBASE_KR) -or
($LinkTypeExt -band [int][LinkTypeExt]::LINK_TYPE_25GBase_KR))
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_BACKPLANE
$MediaTypeString = $Messages.Backplane
}
elseif (($LinkType -band [int][LinkType]::LINK_TYPE_10GBASE_SFP_Cu) -or
($LinkType -band [int][LinkType]::LINK_TYPE_10GBASE_CR1))
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_SFPDIRECTATTACH
$MediaTypeString = $Messages.SFPDirectAttach
}
elseif (($LinkType -band [int][LinkType]::LINK_TYPE_40GBASE_LR4) -or
($LinkType -band [int][LinkType]::LINK_TYPE_10GBASE_LR) -or
($LinkTypeExt -band [int][LinkTypeExt]::LINK_TYPE_25GBase_LR))
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_LR_FIBER
$MediaTypeString = $Messages.LRFiber
}
elseif (($LinkType -band [int][LinkType]::LINK_TYPE_10GBASE_SR) -or
($LinkType -band [int][LinkType]::LINK_TYPE_40GBASE_SR4) -or
($LinkTypeExt -band [int][LinkTypeExt]::LINK_TYPE_25GBase_SR))
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_SR_FIBER
$MediaTypeString = $Messages.SRFiber
}
elseif (($LinkType -band [int][LinkType]::LINK_TYPE_10GBASE_T) -or
($LinkType -band [int][LinkType]::LINK_TYPE_1000BASE_T) -or
($LinkType -band [int][LinkType]::LINK_TYPE_100BASE_TX) -or
($LinkTypeExt -band [int][LinkTypeExt]::LINK_TYPE_2_5GBASE_T) -or
($LinkTypeExt -band [int][LinkTypeExt]::LINK_TYPE_5GBASE_T))
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_COPPER
$MediaTypeString = $Messages.Copper
}
elseif (($LinkType -band [int][LinkType]::LINK_TYPE_10GBASE_CR1_CU) -or
($LinkType -band [int][LinkType]::LINK_TYPE_40GBASE_CR4_CU) -or
($LinkType -band [int][LinkType]::LINK_TYPE_40GBASE_CR4))
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_QSFPDIRECTATTACH
$MediaTypeString = $Messages.QSFPDirectAttach
}
elseif (($LinkType -band [int][LinkType]::LINK_TYPE_10GBASE_KX4) -or
($LinkType -band [int][LinkType]::LINK_TYPE_1000BASE_KX))
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_KX4BACKPLANE
$MediaTypeString = $Messages.KXBackplane
}
elseif (($LinkType -band [int][LinkType]::LINK_TYPE_XAUI) -or
($LinkType -band [int][LinkType]::LINK_TYPE_XLAUI))
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_XAUI
$MediaTypeString = $Messages.XAUI
}
elseif (($LinkTypeExt -band [int][LinkTypeExt]::LINK_TYPE_25G_AOC) -or
($LinkTypeExt -band [int][LinkTypeExt]::LINK_TYPE_25G_ACC) -or
($LinkTypeExt -band [int][LinkTypeExt]::LINK_TYPE_25GBase_CR))
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_SFP28DIRECTATTACH
$MediaTypeString = $Messages.SFP28DirectAttach
}
# old FW or HW different than XL710
elseif ($LinkTypeExt -eq 0 -and $LinkType -eq 0)
{
if (($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_40GBASE_KR4) -or
($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_10GBASE_KR) -or
($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_25GBASE_KR))
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_BACKPLANE
$MediaTypeString = $Messages.Backplane
}
elseif (($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_10GBASE_SFPP_CU) -or
($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_10GBASE_CR1))
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_SFPDIRECTATTACH
$MediaTypeString = $Messages.SFPDirectAttach
}
elseif (($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_40GBASE_LR4) -or
($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_10GBASE_LR) -or
($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_25GBASE_LR))
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_LR_FIBER
$MediaTypeString = $Messages.LRFiber
}
elseif (($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_10GBASE_SR) -or
($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_40GBASE_SR4) -or
($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_25GBASE_SR))
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_SR_FIBER
$MediaTypeString = $Messages.SRFiber
}
elseif (($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_10GBASE_T) -or
($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_1000BASE_T) -or
($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_100BASE_TX))
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_COPPER
$MediaTypeString = $Messages.Copper
}
elseif (($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_10GBASE_CR1_CU) -or
($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_40GBASE_CR4_CU) -or
($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_40GBASE_CR4))
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_QSFPDIRECTATTACH
$MediaTypeString = $Messages.QSFPDirectAttach
}
elseif (($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_10GBASE_KX4) -or
($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_1000BASE_KX))
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_KX4BACKPLANE
$MediaTypeString = $Messages.KXBackplane
}
elseif (($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_XAUI) -or
($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_XLAUI))
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_XAUI
$MediaTypeString = $Messages.XAUI
}
elseif (($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_25GBASE_AOC) -or
($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_25GBASE_ACC) -or
($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_25GBASE_CR))
{
$MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_SFP28DIRECTATTACH
$MediaTypeString = $Messages.SFP28DirectAttach
}
}
}
}
return [PsCustomObject] @{
MediaType = $MediaType
MediaTypeString = $MediaTypeString }
}
function GetAdapterPCILocation($AdapterName)
{
$PCILocation = $Messages.NotSupported
foreach ($HwInfo in $script:MSNetHwInfo)
{
if ($AdapterName -eq $HwInfo.ifDesc)
{
$PCILocation = $HwInfo.Bus.ToString() + ":" + $HwInfo.Device.ToString() + ":" + $HwInfo.Function.ToString() + ":" + $HwInfo.Segment.ToString()
break
}
}
return $PCILocation
}
function GetOriginalDisplayName($AdapterName)
{
return ($script:MSNetHwInfo.Where({$_.ifDesc -eq $AdapterName})).ifDesc
}
function GetOemFwVersion($AdapterName)
{
$Version = $Messages.NotSupported
foreach ($FwVersion in $script:FwVersionsArray)
{
if ($FwVersion.InstanceName -eq $AdapterName)
{
# driver can return an array of zeroes - don't attempt to construct a string using it
if (($null -ne $FwVersion.SingleNvmVersion) -and $FwVersion.SingleNvmVersion[0] -ne 0)
{
$Version = [System.Text.Encoding]::ASCII.GetString($FwVersion.SingleNvmVersion).Trim(0)
}
break
}
}
return $Version
}
function GetAdapterPCIDeviceID($AdapterName)
{
return ($script:MSNetAdapters.Where({$_.InterfaceDescription -eq $AdapterName})).PnPDeviceID
}
function GetAdapterNegotiatedLinkWidth($AdapterName)
{
$NegotiatedLinkWidth = 0
$NegotiatedLinkWidthString = $Messages.NotAvailable
$AdapterHWInfo = $script:MSNetHwInfo.Where({$_.ifDesc -eq $AdapterName})
if ($AdapterHWInfo)
{
$NegotiatedLinkWidth = $AdapterHWInfo.PciExpressCurrentLinkWidth
$NegotiatedLinkWidthString = "x" + $NegotiatedLinkWidth.ToString()
}
return [PsCustomObject] @{
NegotiatedLinkWidth = $NegotiatedLinkWidth
NegotiatedLinkWidthString = $NegotiatedLinkWidthString }
}
function GetAdapterNegotiatedLinkSpeed($AdapterName)
{
$NegotiatedLinkSpeed = ($script:MSNetHwInfo.Where({$_.ifDesc -eq $AdapterName})).PciExpressCurrentLinkSpeedEncoded
switch ($NegotiatedLinkSpeed)
{
0 {$NegotiatedLinkSpeedString = $Messages.Unknown; break}
1 {$NegotiatedLinkSpeedString = $Messages.NegLaneSpeed25; break}
2 {$NegotiatedLinkSpeedString = $Messages.NegLaneSpeed50; break}
3 {$NegotiatedLinkSpeedString = $Messages.NegLaneSpeed80; break}
default {$NegotiatedLinkSpeedString = $Messages.Unknown; break}
}
return [PsCustomObject] @{
NegotiatedLinkSpeed = $NegotiatedLinkSpeed
NegotiatedLinkSpeedString = $NegotiatedLinkSpeedString }
}
function GetLinkSpeedDuplex($AdapterName)
{
$AdapterObj = $script:MSNetAdapters.Where({$_.InterfaceDescription -eq $AdapterName})
$Speed = $AdapterObj.Speed
$SpeedString = $AdapterObj.LinkSpeed
$FullDuplex = $AdapterObj.FullDuplex
if ("Up" -ne $AdapterObj.Status)
{
$Speed = 0
$SpeedString = $Messages.NotAvailable
}
elseif ($true -eq $FullDuplex)
{
$SpeedString += " " + $Messages.FullDuplex
}
return [PsCustomObject] @{
Speed = $Speed
SpeedString = $SpeedString }
}
function GetFullDuplex($AdapterName)
{
$FullDuplex = ($script:MSNetAdapters.Where({$_.InterfaceDescription -eq $AdapterName})).FullDuplex
if (-not $FullDuplex)
{
$FullDuplex = ""
}
return $FullDuplex
}
function GetAdapterPort($AdapterName)
{
$AdapterRegKey = GetAdapterPropertiesFromRegistry $AdapterName
switch ($AdapterRegKey.Port)
{
0 {$PortNumberString = $Messages.PortA; break}
1 {$PortNumberString = $Messages.PortB; break}
2 {$PortNumberString = $Messages.PortC; break}
3 {$PortNumberString = $Messages.PortD; break}
default {$PortNumberString = $Messages.NotSupported; break}
}
return [PsCustomObject] @{
Port = $AdapterRegKey.Port
PortString = $PortNumberString }
}
function GetDriverVersion($AdapterName)
{
$DriverVersion = ($script:MSNetAdapters.Where({$_.InterfaceDescription -eq $AdapterName})).DriverVersion
return $DriverVersion
}
function GetAdapterMiniPortName($AdapterName)
{
$Name = ($script:PnpDevice.Where({$_.Name -eq $AdapterName})).Service
$Instance = ($script:MSNetAdapters.Where({$_.InterfaceDescription -eq $AdapterName})).InterfaceGuid
return [PsCustomObject] @{
Name = $Name
Instance = $Instance }
}
function GetAdapterMaxSpeed($AdapterName, $SupportedSpeeds)
{
if ($SupportedSpeeds.Length -gt 0)
{
# array is sorted, so we just return the last element
return $SupportedSpeeds[-1]
}
return 0
}
function GetAdapterSupportedSpeeds($AdapterName)
{
$SpeedDuplex = $script:MSNetAdvProperty.Where({$_.InterfaceDescription -eq $AdapterName -and $_.RegistryKeyword -eq "*SpeedDuplex"})
if ($SpeedDuplex)
{
$RegistryValues = ($SpeedDuplex).ValidRegistryValues
}
$SupportedSpeeds = @()
foreach ($i in $RegistryValues)
{
$SupportedSpeeds += $SupportedSpeedsMap[$i]
}
return $SupportedSpeeds | Sort-Object
}
function GetAdapterEEEStatus($AdapterName)
{
$EEEStatus = 0
$EEEStatusString = $Messages.NotSupported
$Service = ($script:SupportedAdapters.Where({$_.Name -eq $AdapterName})).Service
foreach ($EEE in $script:EEELinkStatusArray)
{
if (($null -ne $EEE) -and ($EEE.InstanceName -eq $AdapterName))
{
if ($EEE.EEELinkStatus -eq $false)
{
$EEELinkAdvertisement = 0
if ($Service -in @("i40ea", "i40eb"))
{
$EEELinkAdvertisement = $script:MSNetAdvProperty.Where({$_.InterfaceDescription -eq $AdapterName -and $_.RegistryKeyword -eq "EEELinkAdvertisement"})
if ($EEELinkAdvertisement -and $EEELinkAdvertisement.RegistryValue)
{
$EEELinkAdvertisement = $EEELinkAdvertisement.RegistryValue
}
else
{
break
}
}
if ($EEELinkAdvertisement -gt 0)
{
$EEEStatus = 3 #Not Negotiated
$EEEStatusString = $Messages.NotNegotiated
}
else
{
$EEEStatus = 1 #Disabled
$EEEStatusString = $Messages.Disabled
}
}
else
{
$EEEStatus = 2 #Active
$EEEStatusString = $Messages.Active
}
}
}
return [PsCustomObject] @{
EEEStatus = $EEEStatus
EEEStatusString = $EEEStatusString }
}
function GetAdapterStatus($AdapterName)
{
$AdapterStatus = [ADAPTER_STATUS]::Installed -bor [ADAPTER_STATUS]::DriverLoaded -bor [ADAPTER_STATUS]::HasDiag
$LinkStatus = ($script:MSNetAdapters.Where({$_.InterfaceDescription -eq $AdapterName})).Status
if ($LinkStatus -eq 'Up')
{
$AdapterStatus = $AdapterStatus -bor [ADAPTER_STATUS]::HasLink
}
return $AdapterStatus
}
function GetAdapterCapabilities($AdapterName, $SupportedSpeeds)
{
$Capabilities = @([int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_VENDOR_INTEL)
foreach ($SupportedSpeed in $SupportedSpeeds)
{
switch ($SupportedSpeed)
{
10000000 {$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_SPEED_10_MBPS; break}
100000000 {$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_SPEED_100_MBPS; break}
1000000000 {$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_SPEED_1000_MBPS; break}
2500000000 {$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_SPEED_2500_MBPS; break}
5000000000 {$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_SPEED_5000_MBPS; break}
10000000000 {$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_SPEED_10000_MBPS; break}
40000000000 {$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_SPEED_40000_MBPS; break}
25000000000 {$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_SPEED_25000_MBPS; break}
50000000000 {$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_SPEED_50000_MBPS; break}
100000000000 {$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_SPEED_100000_MBPS; break}
200000000000 {$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_SPEED_200000_MBPS; break}
}
}
$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_PERFORMANCE_PROFILE
$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_DIAGNOSTIC_SUPPORT
$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_FLASH_SUPPORT
$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_CYPRESS
$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_IDENTIFY_ADAPTER_SUPPORT
$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_NDIS_IOAT
$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_EXTENDED_DMIX_SUPPORT
$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_DCB
$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_JUMBO_FRAMES
return , ($Capabilities | Sort-Object)
}
function GetIntelDriverInfo()
{
$script:BusTypesArray = Get-CimInstance -Namespace "root\wmi" -ClassName IntlLan_BusType -Property BusType -ErrorAction SilentlyContinue
$script:DDPPkgNamesArray = Get-CimInstance -Namespace "root\wmi" -ClassName IntlLan_GetPackageInfo -Property Name, Major, Minor -ErrorAction SilentlyContinue
$script:ETrackIdsArray = Get-CimInstance -Namespace "root\wmi" -ClassName IntlLan_EetrackId -Property Id -ErrorAction SilentlyContinue
$script:NVMVersionsArray = Get-CimInstance -Namespace "root\wmi" -ClassName IntlLan_EepromVersion -Property Version -ErrorAction SilentlyContinue
$script:SanMacAddressesArray = Get-CimInstance -Namespace "root\wmi" -ClassName IntlLan_GetSanMacAddress -Property SanMacAddr -ErrorAction SilentlyContinue
$script:PartNumbersArray = Get-CimInstance -Namespace "root\wmi" -ClassName IntlLan_PartNumberString -Property PartNumberString -ErrorAction SilentlyContinue
$script:PhyInfoArray = Get-CimInstance -Namespace "root\wmi" -ClassName IntlLan_GetPhyInfo -Property PhyInfo -ErrorAction SilentlyContinue
$script:FwVersionsArray = Get-CimInstance -Namespace "root\wmi" -ClassName IntlLan_GetOemProductVer -Property SingleNvmVersion -ErrorAction SilentlyContinue
$script:EEELinkStatusArray = Get-CimInstance -Namespace "root\wmi" -ClassName IntlLan_EEELinkStatus -Property EEELinkStatus -ErrorAction SilentlyContinue
}
# SIG # Begin signature block
# MIIocAYJKoZIhvcNAQcCoIIoYTCCKF0CAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBoaolhvsUId6Pd
# n508OwlgQP8K6/B8uDk7ehJneK92a6CCEfIwggVvMIIEV6ADAgECAhBI/JO0YFWU
# jTanyYqJ1pQWMA0GCSqGSIb3DQEBDAUAMHsxCzAJBgNVBAYTAkdCMRswGQYDVQQI
# DBJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcMB1NhbGZvcmQxGjAYBgNVBAoM
# EUNvbW9kbyBDQSBMaW1pdGVkMSEwHwYDVQQDDBhBQUEgQ2VydGlmaWNhdGUgU2Vy
# dmljZXMwHhcNMjEwNTI1MDAwMDAwWhcNMjgxMjMxMjM1OTU5WjBWMQswCQYDVQQG
# EwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMS0wKwYDVQQDEyRTZWN0aWdv
# IFB1YmxpYyBDb2RlIFNpZ25pbmcgUm9vdCBSNDYwggIiMA0GCSqGSIb3DQEBAQUA
# A4ICDwAwggIKAoICAQCN55QSIgQkdC7/FiMCkoq2rjaFrEfUI5ErPtx94jGgUW+s
# hJHjUoq14pbe0IdjJImK/+8Skzt9u7aKvb0Ffyeba2XTpQxpsbxJOZrxbW6q5KCD
# J9qaDStQ6Utbs7hkNqR+Sj2pcaths3OzPAsM79szV+W+NDfjlxtd/R8SPYIDdub7
# P2bSlDFp+m2zNKzBenjcklDyZMeqLQSrw2rq4C+np9xu1+j/2iGrQL+57g2extme
# me/G3h+pDHazJyCh1rr9gOcB0u/rgimVcI3/uxXP/tEPNqIuTzKQdEZrRzUTdwUz
# T2MuuC3hv2WnBGsY2HH6zAjybYmZELGt2z4s5KoYsMYHAXVn3m3pY2MeNn9pib6q
# RT5uWl+PoVvLnTCGMOgDs0DGDQ84zWeoU4j6uDBl+m/H5x2xg3RpPqzEaDux5mcz
# mrYI4IAFSEDu9oJkRqj1c7AGlfJsZZ+/VVscnFcax3hGfHCqlBuCF6yH6bbJDoEc
# QNYWFyn8XJwYK+pF9e+91WdPKF4F7pBMeufG9ND8+s0+MkYTIDaKBOq3qgdGnA2T
# OglmmVhcKaO5DKYwODzQRjY1fJy67sPV+Qp2+n4FG0DKkjXp1XrRtX8ArqmQqsV/
# AZwQsRb8zG4Y3G9i/qZQp7h7uJ0VP/4gDHXIIloTlRmQAOka1cKG8eOO7F/05QID
# AQABo4IBEjCCAQ4wHwYDVR0jBBgwFoAUoBEKIz6W8Qfs4q8p74Klf9AwpLQwHQYD
# VR0OBBYEFDLrkpr/NZZILyhAQnAgNpFcF4XmMA4GA1UdDwEB/wQEAwIBhjAPBgNV
# HRMBAf8EBTADAQH/MBMGA1UdJQQMMAoGCCsGAQUFBwMDMBsGA1UdIAQUMBIwBgYE
# VR0gADAIBgZngQwBBAEwQwYDVR0fBDwwOjA4oDagNIYyaHR0cDovL2NybC5jb21v
# ZG9jYS5jb20vQUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwNAYIKwYBBQUHAQEE
# KDAmMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20wDQYJKoZI
# hvcNAQEMBQADggEBABK/oe+LdJqYRLhpRrWrJAoMpIpnuDqBv0WKfVIHqI0fTiGF
# OaNrXi0ghr8QuK55O1PNtPvYRL4G2VxjZ9RAFodEhnIq1jIV9RKDwvnhXRFAZ/ZC
# J3LFI+ICOBpMIOLbAffNRk8monxmwFE2tokCVMf8WPtsAO7+mKYulaEMUykfb9gZ
# pk+e96wJ6l2CxouvgKe9gUhShDHaMuwV5KZMPWw5c9QLhTkg4IUaaOGnSDip0TYl
# d8GNGRbFiExmfS9jzpjoad+sPKhdnckcW67Y8y90z7h+9teDnRGWYpquRRPaf9xH
# +9/DUp/mBlXpnYzyOmJRvOwkDynUWICE5EV7WtgwggYcMIIEBKADAgECAhAz1wio
# kUBTGeKlu9M5ua1uMA0GCSqGSIb3DQEBDAUAMFYxCzAJBgNVBAYTAkdCMRgwFgYD
# VQQKEw9TZWN0aWdvIExpbWl0ZWQxLTArBgNVBAMTJFNlY3RpZ28gUHVibGljIENv
# ZGUgU2lnbmluZyBSb290IFI0NjAeFw0yMTAzMjIwMDAwMDBaFw0zNjAzMjEyMzU5
# NTlaMFcxCzAJBgNVBAYTAkdCMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLjAs
# BgNVBAMTJVNlY3RpZ28gUHVibGljIENvZGUgU2lnbmluZyBDQSBFViBSMzYwggGi
# MA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQC70f4et0JbePWQp64sg/GNIdMw
# hoV739PN2RZLrIXFuwHP4owoEXIEdiyBxasSekBKxRDogRQ5G19PB/YwMDB/NSXl
# wHM9QAmU6Kj46zkLVdW2DIseJ/jePiLBv+9l7nPuZd0o3bsffZsyf7eZVReqskmo
# PBBqOsMhspmoQ9c7gqgZYbU+alpduLyeE9AKnvVbj2k4aOqlH1vKI+4L7bzQHkND
# brBTjMJzKkQxbr6PuMYC9ruCBBV5DFIg6JgncWHvL+T4AvszWbX0w1Xn3/YIIq62
# 0QlZ7AGfc4m3Q0/V8tm9VlkJ3bcX9sR0gLqHRqwG29sEDdVOuu6MCTQZlRvmcBME
# Jd+PuNeEM4xspgzraLqVT3xE6NRpjSV5wyHxNXf4T7YSVZXQVugYAtXueciGoWnx
# G06UE2oHYvDQa5mll1CeHDOhHu5hiwVoHI717iaQg9b+cYWnmvINFD42tRKtd3V6
# zOdGNmqQU8vGlHHeBzoh+dYyZ+CcblSGoGSgg8sCAwEAAaOCAWMwggFfMB8GA1Ud
# IwQYMBaAFDLrkpr/NZZILyhAQnAgNpFcF4XmMB0GA1UdDgQWBBSBMpJBKyjNRsjE
# osYqORLsSKk/FDAOBgNVHQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAT
# BgNVHSUEDDAKBggrBgEFBQcDAzAaBgNVHSAEEzARMAYGBFUdIAAwBwYFZ4EMAQMw
# SwYDVR0fBEQwQjBAoD6gPIY6aHR0cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdv
# UHVibGljQ29kZVNpZ25pbmdSb290UjQ2LmNybDB7BggrBgEFBQcBAQRvMG0wRgYI
# KwYBBQUHMAKGOmh0dHA6Ly9jcnQuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0Nv
# ZGVTaWduaW5nUm9vdFI0Ni5wN2MwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLnNl
# Y3RpZ28uY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBfNqz7+fZyWhS38Asd3tj9lwHS
# /QHumS2G6Pa38Dn/1oFKWqdCSgotFZ3mlP3FaUqy10vxFhJM9r6QZmWLLXTUqwj3
# ahEDCHd8vmnhsNufJIkD1t5cpOCy1rTP4zjVuW3MJ9bOZBHoEHJ20/ng6SyJ6UnT
# s5eWBgrh9grIQZqRXYHYNneYyoBBl6j4kT9jn6rNVFRLgOr1F2bTlHH9nv1HMePp
# GoYd074g0j+xUl+yk72MlQmYco+VAfSYQ6VK+xQmqp02v3Kw/Ny9hA3s7TSoXpUr
# OBZjBXXZ9jEuFWvilLIq0nQ1tZiao/74Ky+2F0snbFrmuXZe2obdq2TWauqDGIgb
# MYL1iLOUJcAhLwhpAuNMu0wqETDrgXkG4UGVKtQg9guT5Hx2DJ0dJmtfhAH2KpnN
# r97H8OQYok6bLyoMZqaSdSa+2UA1E2+upjcaeuitHFFjBypWBmztfhj24+xkc6Zt
# CDaLrw+ZrnVrFyvCTWrDUUZBVumPwo3/E3Gb2u2e05+r5UWmEsUUWlJBl6MGAAjF
# 5hzqJ4I8O9vmRsTvLQA1E802fZ3lqicIBczOwDYOSxlP0GOabb/FKVMxItt1UHeG
# 0PL4au5rBhs+hSMrl8h+eplBDN1Yfw6owxI9OjWb4J0sjBeBVESoeh2YnZZ/WVim
# VGX/UUIL+Efrz/jlvzCCBlswggTDoAMCAQICEDB3Np9sRenync55S1/V2zEwDQYJ
# KoZIhvcNAQELBQAwVzELMAkGA1UEBhMCR0IxGDAWBgNVBAoTD1NlY3RpZ28gTGlt
# aXRlZDEuMCwGA1UEAxMlU2VjdGlnbyBQdWJsaWMgQ29kZSBTaWduaW5nIENBIEVW
# IFIzNjAeFw0yNDAxMTYwMDAwMDBaFw0yNTAxMTUyMzU5NTlaMIG7MRAwDgYDVQQF
# EwcyMTg5MDc0MRMwEQYLKwYBBAGCNzwCAQMTAlVTMRkwFwYLKwYBBAGCNzwCAQIT
# CERlbGF3YXJlMR0wGwYDVQQPExRQcml2YXRlIE9yZ2FuaXphdGlvbjELMAkGA1UE
# BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExGjAYBgNVBAoMEUludGVsIENvcnBv
# cmF0aW9uMRowGAYDVQQDDBFJbnRlbCBDb3Jwb3JhdGlvbjCCAaIwDQYJKoZIhvcN
# AQEBBQADggGPADCCAYoCggGBALUx6h43Sbt+ZfuTa/V0GFWgAAfUIWg9ruenPoc8
# FTqJxPdbqYRlGKEK2vCSQyBTn7tGV54Y/hMGvRTBQce4dMFe7R5wL9p92J3R4jkR
# MadZxJ4HuWalG13CpjQZP1Jg61Wx0KjsCPd2VdbBTpTiLRI+PKjokE6I/TLuA2bA
# tqy1phe2/82SRlx/fVGuIzI1BOQCaC9Olao3kJ9JwKt6VZidIgmzXAYLpzZ2VhW9
# HTRLaqTLTKxgO2mtpMTbfqc7RR/oYHG2cbGCoW3KB5Tlgjhm85ZsMEMV48O7JWeB
# wQoNy9admwqsdUzr5HdDbM7/EuiNHvP+sIauOmHEkLtqxM37sSgDBQX3V+vqiR5b
# H6xTcfIceaa4ukwKuVmfWrB35TGSEkWFzZu3ZUYGKRCI9WZ8GixV/5PHm571xSrD
# jbrigtkHtPahVVC8EUojnIGiDXovnm7ZG0FEXKuVybNOSpD3BzE2Pw3j/evKHuIr
# hWCzdPBOkbbEoYFBxts6UtJNFwIDAQABo4IBvDCCAbgwHwYDVR0jBBgwFoAUgTKS
# QSsozUbIxKLGKjkS7EipPxQwHQYDVR0OBBYEFKRLkSq7xH/Ru5kWUgmDt9ZZsJHj
# MA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUF
# BwMDMEkGA1UdIARCMEAwNQYMKwYBBAGyMQECAQYBMCUwIwYIKwYBBQUHAgEWF2h0
# dHBzOi8vc2VjdGlnby5jb20vQ1BTMAcGBWeBDAEDMEsGA1UdHwREMEIwQKA+oDyG
# Omh0dHA6Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0NvZGVTaWduaW5n
# Q0FFVlIzNi5jcmwwewYIKwYBBQUHAQEEbzBtMEYGCCsGAQUFBzAChjpodHRwOi8v
# Y3J0LnNlY3RpZ28uY29tL1NlY3RpZ29QdWJsaWNDb2RlU2lnbmluZ0NBRVZSMzYu
# Y3J0MCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5zZWN0aWdvLmNvbTAuBgNVHREE
# JzAloCMGCCsGAQUFBwgDoBcwFQwTVVMtREVMQVdBUkUtMjE4OTA3NDANBgkqhkiG
# 9w0BAQsFAAOCAYEAI6NvLiKQmXol9qHiDAxrF41RjhawR5g4ZQuWIxU2uMkjL9Eh
# NV16cKJjZ+KSPebFErInVlf/NLvKCfSUpf+2olf7Phu1pbb2p2R1mFtGYIA1Bcwa
# UmIsA/XsQ+ZHYlVdqBcpJCdc/jTzfAQen0gv1hFOIfk0vOKjjAAuTIgQNkG3c5Sw
# FMZjhu+wrSXx9Qvv85BhIX/xF1xYkKN4iBwqqebxAhmaE2tZUI7X/kKDx9QexONP
# Wo5Vw9b3P9I9pP8pWS/Txa4AC8x5AcZ8f6FUkl5Y750Ma6XEeHJZlUGkf1d/Ph9M
# c6bg5/P4wuXceTd4iqu3sK4ZxbiXWiFD+PtZ9UbzDarUNCqskSwudIzEcgwt7glZ
# YUNC+gD64uddohltoXXIasQNs/LK+qzOuqZKhFkRf+v4+Q28EQYuVIcJDHspW1CV
# k3Y4zhEb1dhCAPZ9jyXyz827Uji6HD5dnGO2lPCcEvM/aWEjYYM285g0CZix3LeB
# XQydSyjK95klPc99MYIV1DCCFdACAQEwazBXMQswCQYDVQQGEwJHQjEYMBYGA1UE
# ChMPU2VjdGlnbyBMaW1pdGVkMS4wLAYDVQQDEyVTZWN0aWdvIFB1YmxpYyBDb2Rl
# IFNpZ25pbmcgQ0EgRVYgUjM2AhAwdzafbEXp8p3OeUtf1dsxMA0GCWCGSAFlAwQC
# AQUAoGowGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARYwLwYJKoZIhvcNAQkEMSIEIE9yRx0XTdMrQHje0kAsGOBi
# Yyw0mOEIiCgAyPQopBUaMA0GCSqGSIb3DQEBAQUABIIBgJhvGGepODeV1plLrvxe
# L+Vp2gNj+m8GtXk48tpYznUTtLupXuDEMwSzAPQWMxu6dUQtEJZ0eNEYfRe5EZME
# 30Sb/SxYdZfMbTGeNxYShWmUxuPwP/iyxdi0g4DFMwt++U3VstaoUZrJMnOtU8t5
# sSEebqK0FQNR046eXEdA/1krbvRWU2lqZOcuyS8lHOW8ddqAVo8t6EkthxzF4oGM
# CHlZySD6YHxgBQsuttkM63uaRrjuDqzyMptztQ8vTZbhk8/UaS8W8EZPo2r+h1MK
# GkU959EsTcy6max5SXS1ZI8gqHw8NqbOlhOF+pWMa/BUG3vzkpUzS9BwDd0eGILa
# mPKDE6TGyiXa7KwqPr+WubSRaQFNdlpSr1T8RxeYl1DJTWKBW+JlDn6TEr286L2/
# d9HCVBBPydUNI8TtfJhMtlvYUEgjnQod2T53Db7WdprJVmJ/r8JyfR/C60OcrJbw
# I0/RytgRJCKowqG20RelrVIhzRRZNVdILmBMCv2c8EqHiaGCE04wghNKBgorBgEE
# AYI3AwMBMYITOjCCEzYGCSqGSIb3DQEHAqCCEycwghMjAgEDMQ8wDQYJYIZIAWUD
# BAICBQAwge8GCyqGSIb3DQEJEAEEoIHfBIHcMIHZAgEBBgorBgEEAbIxAgEBMDEw
# DQYJYIZIAWUDBAIBBQAEIMAkjakWALru0B/am774lNzVuGyevYfvMWFhblgwP8Zz
# AhRO+RDPLaXIOVNsBVodrFT2poYGnRgPMjAyNDAzMTgxODIwNDhaoG6kbDBqMQsw
# CQYDVQQGEwJHQjETMBEGA1UECBMKTWFuY2hlc3RlcjEYMBYGA1UEChMPU2VjdGln
# byBMaW1pdGVkMSwwKgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNp
# Z25lciAjNKCCDekwggb1MIIE3aADAgECAhA5TCXhfKBtJ6hl4jvZHSLUMA0GCSqG
# SIb3DQEBDAUAMH0xCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNo
# ZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRl
# ZDElMCMGA1UEAxMcU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTAeFw0yMzA1
# MDMwMDAwMDBaFw0zNDA4MDIyMzU5NTlaMGoxCzAJBgNVBAYTAkdCMRMwEQYDVQQI
# EwpNYW5jaGVzdGVyMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLDAqBgNVBAMM
# I1NlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgU2lnbmVyICM0MIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEApJMoUkvPJ4d2pCkcmTjA5w7U0RzsaMsBZOSK
# zXewcWWCvJ/8i7u7lZj7JRGOWogJZhEUWLK6Ilvm9jLxXS3AeqIO4OBWZO2h5YEg
# ciBkQWzHwwj6831d7yGawn7XLMO6EZge/NMgCEKzX79/iFgyqzCz2Ix6lkoZE1ys
# /Oer6RwWLrCwOJVKz4VQq2cDJaG7OOkPb6lampEoEzW5H/M94STIa7GZ6A3vu03l
# PYxUA5HQ/C3PVTM4egkcB9Ei4GOGp7790oNzEhSbmkwJRr00vOFLUHty4Fv9Gbsf
# PGoZe267LUQqvjxMzKyKBJPGV4agczYrgZf6G5t+iIfYUnmJ/m53N9e7UJ/6GCVP
# E/JefKmxIFopq6NCh3fg9EwCSN1YpVOmo6DtGZZlFSnF7TMwJeaWg4Ga9mBmkFgH
# gM1Cdaz7tJHQxd0BQGq2qBDu9o16t551r9OlSxihDJ9XsF4lR5F0zXUS0Zxv5F4N
# m+x1Ju7+0/WSL1KF6NpEUSqizADKh2ZDoxsA76K1lp1irScL8htKycOUQjeIIISo
# h67DuiNye/hU7/hrJ7CF9adDhdgrOXTbWncC0aT69c2cPcwfrlHQe2zYHS0RQlNx
# dMLlNaotUhLZJc/w09CRQxLXMn2YbON3Qcj/HyRU726txj5Ve/Fchzpk8WBLBU/v
# uS/sCRMCAwEAAaOCAYIwggF+MB8GA1UdIwQYMBaAFBqh+GEZIA/DQXdFKI7RNV8G
# EgRVMB0GA1UdDgQWBBQDDzHIkSqTvWPz0V1NpDQP0pUBGDAOBgNVHQ8BAf8EBAMC
# BsAwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDBKBgNVHSAE
# QzBBMDUGDCsGAQQBsjEBAgEDCDAlMCMGCCsGAQUFBwIBFhdodHRwczovL3NlY3Rp
# Z28uY29tL0NQUzAIBgZngQwBBAIwRAYDVR0fBD0wOzA5oDegNYYzaHR0cDovL2Ny
# bC5zZWN0aWdvLmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3JsMHQGCCsG
# AQUFBwEBBGgwZjA/BggrBgEFBQcwAoYzaHR0cDovL2NydC5zZWN0aWdvLmNvbS9T
# ZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3J0MCMGCCsGAQUFBzABhhdodHRwOi8v
# b2NzcC5zZWN0aWdvLmNvbTANBgkqhkiG9w0BAQwFAAOCAgEATJtlWPrgec/vFcMy
# bd4zket3WOLrvctKPHXefpRtwyLHBJXfZWlhEwz2DJ71iSBewYfHAyTKx6XwJt/4
# +DFlDeDrbVFXpoyEUghGHCrC3vLaikXzvvf2LsR+7fjtaL96VkjpYeWaOXe8vrqR
# ZIh1/12FFjQn0inL/+0t2v++kwzsbaINzMPxbr0hkRojAFKtl9RieCqEeajXPawh
# j3DDJHk6l/ENo6NbU9irALpY+zWAT18ocWwZXsKDcpCu4MbY8pn76rSSZXwHfDVE
# Ha1YGGti+95sxAqpbNMhRnDcL411TCPCQdB6ljvDS93NkiZ0dlw3oJoknk5fTtOP
# D+UTT1lEZUtDZM9I+GdnuU2/zA2xOjDQoT1IrXpl5Ozf4AHwsypKOazBpPmpfTXQ
# MkCgsRkqGCGyyH0FcRpLJzaq4Jgcg3Xnx35LhEPNQ/uQl3YqEqxAwXBbmQpA+oBt
# lGF7yG65yGdnJFxQjQEg3gf3AdT4LhHNnYPl+MolHEQ9J+WwhkcqCxuEdn17aE+N
# t/cTtO2gLe5zD9kQup2ZLHzXdR+PEMSU5n4k5ZVKiIwn1oVmHfmuZHaR6Ej+yFUK
# 7SnDH944psAU+zI9+KmDYjbIw74Ahxyr+kpCHIkD3PVcfHDZXXhO7p9eIOYJanwr
# CKNI9RX8BE/fzSEceuX1jhrUuUAwggbsMIIE1KADAgECAhAwD2+s3WaYdHypRjan
# eC25MA0GCSqGSIb3DQEBDAUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKTmV3
# IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRoZSBVU0VS
# VFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0aWZpY2F0
# aW9uIEF1dGhvcml0eTAeFw0xOTA1MDIwMDAwMDBaFw0zODAxMTgyMzU5NTlaMH0x
# CzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNV
# BAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMGA1UEAxMc
# U2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTCCAiIwDQYJKoZIhvcNAQEBBQAD
# ggIPADCCAgoCggIBAMgbAa/ZLH6ImX0BmD8gkL2cgCFUk7nPoD5T77NawHbWGgSl
# zkeDtevEzEk0y/NFZbn5p2QWJgn71TJSeS7JY8ITm7aGPwEFkmZvIavVcRB5h/RG
# Ks3EWsnb111JTXJWD9zJ41OYOioe/M5YSdO/8zm7uaQjQqzQFcN/nqJc1zjxFrJw
# 06PE37PFcqwuCnf8DZRSt/wflXMkPQEovA8NT7ORAY5unSd1VdEXOzQhe5cBlK9/
# gM/REQpXhMl/VuC9RpyCvpSdv7QgsGB+uE31DT/b0OqFjIpWcdEtlEzIjDzTFKKc
# vSb/01Mgx2Bpm1gKVPQF5/0xrPnIhRfHuCkZpCkvRuPd25Ffnz82Pg4wZytGtzWv
# lr7aTGDMqLufDRTUGMQwmHSCIc9iVrUhcxIe/arKCFiHd6QV6xlV/9A5VC0m7kUa
# Om/N14Tw1/AoxU9kgwLU++Le8bwCKPRt2ieKBtKWh97oaw7wW33pdmmTIBxKlyx3
# GSuTlZicl57rjsF4VsZEJd8GEpoGLZ8DXv2DolNnyrH6jaFkyYiSWcuoRsDJ8qb/
# fVfbEnb6ikEk1Bv8cqUUotStQxykSYtBORQDHin6G6UirqXDTYLQjdprt9v3GEBX
# c/Bxo/tKfUU2wfeNgvq5yQ1TgH36tjlYMu9vGFCJ10+dM70atZ2h3pVBeqeDAgMB
# AAGjggFaMIIBVjAfBgNVHSMEGDAWgBRTeb9aqitKz1SA4dibwJ3ysgNmyzAdBgNV
# HQ4EFgQUGqH4YRkgD8NBd0UojtE1XwYSBFUwDgYDVR0PAQH/BAQDAgGGMBIGA1Ud
# EwEB/wQIMAYBAf8CAQAwEwYDVR0lBAwwCgYIKwYBBQUHAwgwEQYDVR0gBAowCDAG
# BgRVHSAAMFAGA1UdHwRJMEcwRaBDoEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNv
# bS9VU0VSVHJ1c3RSU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEF
# BQcBAQRqMGgwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9V
# U0VSVHJ1c3RSU0FBZGRUcnVzdENBLmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29j
# c3AudXNlcnRydXN0LmNvbTANBgkqhkiG9w0BAQwFAAOCAgEAbVSBpTNdFuG1U4GR
# dd8DejILLSWEEbKw2yp9KgX1vDsn9FqguUlZkClsYcu1UNviffmfAO9Aw63T4uRW
# +VhBz/FC5RB9/7B0H4/GXAn5M17qoBwmWFzztBEP1dXD4rzVWHi/SHbhRGdtj7BD
# EA+N5Pk4Yr8TAcWFo0zFzLJTMJWk1vSWVgi4zVx/AZa+clJqO0I3fBZ4OZOTlJux
# 3LJtQW1nzclvkD1/RXLBGyPWwlWEZuSzxWYG9vPWS16toytCiiGS/qhvWiVwYoFz
# Y16gu9jc10rTPa+DBjgSHSSHLeT8AtY+dwS8BDa153fLnC6NIxi5o8JHHfBd1qFz
# VwVomqfJN2Udvuq82EKDQwWli6YJ/9GhlKZOqj0J9QVst9JkWtgqIsJLnfE5Xkze
# SD2bNJaaCV+O/fexUpHOP4n2HKG1qXUfcb9bQ11lPVCBbqvw0NP8srMftpmWJvQ8
# eYtcZMzN7iea5aDADHKHwW5NWtMe6vBE5jJvHOsXTpTDeGUgOw9Bqh/poUGd/rG4
# oGUqNODeqPk85sEwu8CgYyz8XBYAqNDEf+oRnR4GxqZtMl20OAkrSQeq/eww2vGn
# L8+3/frQo4TZJ577AWZ3uVYQ4SBuxq6x+ba6yDVdM3aO8XwgDCp3rrWiAoa6Ke60
# WgCxjKvj+QrJVF3UuWp0nr1IrpgxggQsMIIEKAIBATCBkTB9MQswCQYDVQQGEwJH
# QjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3Jk
# MRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMTHFNlY3RpZ28gUlNB
# IFRpbWUgU3RhbXBpbmcgQ0ECEDlMJeF8oG0nqGXiO9kdItQwDQYJYIZIAWUDBAIC
# BQCgggFrMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG9w0BCQUx
# DxcNMjQwMzE4MTgyMDQ4WjA/BgkqhkiG9w0BCQQxMgQwOf3K5AoYyXLj7yrxOb3I
# DGNPX5n3nxk7cthLKPiTb+XNiJn3Jt7f4UBEq9nmv2RUMIHtBgsqhkiG9w0BCRAC
# DDGB3TCB2jCB1zAWBBSuYq91Cgy9R9ZGH3Vo4ryM58pPlDCBvAQUAtZbleKDcMFX
# AJX6iPkj3ZN/rY8wgaMwgY6kgYswgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpO
# ZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVT
# RVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmlj
# YXRpb24gQXV0aG9yaXR5AhAwD2+s3WaYdHypRjaneC25MA0GCSqGSIb3DQEBAQUA
# BIICADmFKoVmc4m1cqdm2ezudYQ13aDZvm+pq4bA9cSQ57RGDSjX6kpp8YehW6/v
# l+BSz/GpKdzXyvWf+A5n3r4o1H+5SvabIUBajp0xSZ9s2dQMFkYaS31DoSNTzTwY
# W5CtU/c+pcR91gSijUDnmajXOEup3ImvrLsY3rGEFe6OCIfshjHFEEVwryG8AEVW
# 8hnLL8DiZJE+YOIDsCzarNE/fSzJVsTZ0jBNCYhXpRpI7Q2wvz/s3j6jBQf9fPL/
# TsCQkw/DoLTp24v6kpM/kkgQih/hi2jKbNeq/QgnKG3e7LPm0XfW8FukY8NbvD5X
# evhy72C0p4zXm6YkRhi+L2jpeY1WpXswgMSgLREPk0UZMz7kNwycR81FN2GXfU2P
# 6VM58L3OmXJS9NQS7wH32tR3SqogvhPil73HQjs7I+kYOEExwpjSFEEywfevj4NN
# 0849uNRwNtDIC/NCsVSTtVFXlCilaZbXwF50gDtT/Pk42vAmJSuRyq55pg+4N197
# vBYEXKyyhbbiJSDdjp6UGb+MjxCEdDDCdUsvJQQWi6ly/XyXP4p9QL4euY6PnJwM
# meLz4i0d9ZxXwHZDfEgmqIeC0cuZ9JA1chbavUMajb63zVijHBky0ooO5wHZSahs
# z/6DjBazz0lMchdNmFXkdNx3dMN16EEJO7/eFyeHnSwqkCRa
# SIG # End signature block
|
combined_dataset/train/non-malicious/2995.ps1
|
2995.ps1
|
Set-StrictMode -Version Latest
InModuleScope -ModuleName Pester -ScriptBlock {
Describe 'Has-Flag' -Fixture {
It 'Returns true when setting and value are the same' {
$setting = [Pester.OutputTypes]::Passed
$value = [Pester.OutputTypes]::Passed
$value | Has-Flag $setting | Should -Be $true
}
It 'Returns false when setting and value are the different' {
$setting = [Pester.OutputTypes]::Passed
$value = [Pester.OutputTypes]::Failed
$value | Has-Flag $setting | Should -Be $false
}
It 'Returns true when setting contains value' {
$setting = [Pester.OutputTypes]::Passed -bor [Pester.OutputTypes]::Failed
$value = [Pester.OutputTypes]::Passed
$value | Has-Flag $setting | Should -Be $true
}
It 'Returns false when setting does not contain the value' {
$setting = [Pester.OutputTypes]::Passed -bor [Pester.OutputTypes]::Failed
$value = [Pester.OutputTypes]::Summary
$value | Has-Flag $setting | Should -Be $false
}
It 'Returns true when at least one setting is contained in value' {
$setting = [Pester.OutputTypes]::Passed -bor [Pester.OutputTypes]::Failed
$value = [Pester.OutputTypes]::Summary -bor [Pester.OutputTypes]::Failed
$value | Has-Flag $setting | Should -Be $true
}
It 'Returns false when none of settings is contained in value' {
$setting = [Pester.OutputTypes]::Passed -bor [Pester.OutputTypes]::Failed
$value = [Pester.OutputTypes]::Summary -bor [Pester.OutputTypes]::Describe
$value | Has-Flag $setting | Should -Be $false
}
}
Describe 'Default OutputTypes' -Fixture {
It 'Fails output type contains all except passed' {
$expected = [Pester.OutputTypes]'Default, Failed, Pending, Skipped, Inconclusive, Describe, Context, Summary, Header'
[Pester.OutputTypes]::Fails | Should -Be $expected
}
It 'All output type contains all flags' {
$expected = [Pester.OutputTypes]'Default, Passed, Failed, Pending, Skipped, Inconclusive, Describe, Context, Summary, Header'
[Pester.OutputTypes]::All | Should -Be $expected
}
}
}
$thisScriptRegex = [regex]::Escape($MyInvocation.MyCommand.Path)
Describe 'ConvertTo-PesterResult' {
$getPesterResult = InModuleScope Pester { ${function:ConvertTo-PesterResult} }
Context 'failed tests in Tests file' {
$errorRecord = $null
try {
$script = {}; 'something' | should -be 'nothing'
}
catch {
$errorRecord = $_
}
$result = & $getPesterResult -Time 0 -ErrorRecord $errorRecord
It 'records the correct stack line number' {
$result.StackTrace | should -match "${thisScriptRegex}: line $($script.startPosition.StartLine)"
}
It 'records the correct error record' {
$result.ErrorRecord -is [System.Management.Automation.ErrorRecord] | Should -be $true
$result.ErrorRecord.Exception.Message | Should -match "Expected: 'nothing'"
}
}
It 'Does not modify the error message from the original exception' {
$object = New-Object psobject
$message = 'I am an error.'
Add-Member -InputObject $object -MemberType ScriptMethod -Name ThrowSomething -Value { throw $message }
$errorRecord = $null
try {
$object.ThrowSomething()
}
catch {
$errorRecord = $_
}
$pesterResult = & $getPesterResult -Time 0 -ErrorRecord $errorRecord
$pesterResult.FailureMessage | Should -Be $errorRecord.Exception.Message
}
Context 'failed tests in another file' {
$errorRecord = $null
$testPath = Join-Path $TestDrive test.ps1
$escapedTestPath = [regex]::Escape($testPath)
Set-Content -Path $testPath -Value "$([System.Environment]::NewLine)'One' | Should -Be 'Two'"
try {
& $testPath
}
catch {
$errorRecord = $_
}
$result = & $getPesterResult -Time 0 -ErrorRecord $errorRecord
It 'records the correct stack line number' {
$result.StackTrace | should -match "${escapedTestPath}: line 2"
}
It 'records the correct error record' {
$result.ErrorRecord -is [System.Management.Automation.ErrorRecord] | Should -be $true
$result.ErrorRecord.Exception.Message | Should -match "Expected: 'Two'"
}
}
}
InModuleScope -ModuleName Pester -ScriptBlock {
Describe "Format-PesterPath" {
It "Writes path correctly when it is given `$null" {
Format-PesterPath -Path $null | Should -Be $null
}
If ( (GetPesterOS) -ne 'Windows') {
It "Writes path correctly when it is provided as string" {
Format-PesterPath -Path "/home/username/folder1" | Should -Be "/home/username/folder1"
}
It "Writes path correctly when it is provided as string[]" {
Format-PesterPath -Path @("/home/username/folder1", "/home/username/folder2") -Delimiter ', ' | Should -Be "/home/username/folder1, /home/username/folder2"
}
It "Writes path correctly when provided through hashtable" {
Format-PesterPath -Path @{ Path = "/home/username/folder1" } | Should -Be "/home/username/folder1"
}
It "Writes path correctly when provided through array of hashtable" {
Format-PesterPath -Path @{ Path = "/home/username/folder1" }, @{ Path = "/home/username/folder2" } -Delimiter ', ' | Should -Be "/home/username/folder1, /home/username/folder2"
}
}
Else {
It "Writes path correctly when it is provided as string" {
Format-PesterPath -Path "C:\path" | Should -Be "C:\path"
}
It "Writes path correctly when it is provided as string[]" {
Format-PesterPath -Path @("C:\path1", "C:\path2") -Delimiter ', ' | Should -Be "C:\path1, C:\path2"
}
It "Writes path correctly when provided through hashtable" {
Format-PesterPath -Path @{ Path = "C:\path" } | Should -Be "C:\path"
}
It "Writes path correctly when provided through array of hashtable" {
Format-PesterPath -Path @{ Path = "C:\path1" }, @{ Path = "C:\path2" } -Delimiter ', ' | Should -Be "C:\path1, C:\path2"
}
}
}
Describe "Write-PesterStart" {
It "uses Format-PesterPath with the provided path" {
Mock Format-PesterPath
if ((GetPesterOS) -ne 'Windows') {
$expected = "/tmp"
}
else {
$expected = "C:\temp"
}
Write-PesterStart -PesterState (New-PesterState) -Path $expected
Assert-MockCalled Format-PesterPath -ParameterFilter {$Path -eq $expected}
}
}
Describe ConvertTo-FailureLines {
& {
$global:PesterDebugPreference_ShowFullErrors = $false
$testPath = Join-Path $TestDrive test.ps1
$escapedTestPath = [regex]::Escape($testPath)
It 'produces correct message lines.' {
try {
throw 'message'
}
catch {
$e = $_
}
$r = $e | ConvertTo-FailureLines
$r.Message[0] | Should -be 'RuntimeException: message'
$r.Message.Count | Should -be 1
}
It 'failed should produces correct message lines.' {
try {
'One' | Should -be 'Two'
}
catch {
$e = $_
}
$r = $e | ConvertTo-FailureLines
$r.Message[0] | Should -be 'Expected strings to be the same, but they were different.'
$r.message[1] | Should -be 'String lengths are both 3.'
$r.message[2] | Should -be 'Strings differ at index 0.'
$r.Message[3] | Should -be "Expected: 'Two'"
$r.Message[4] | Should -be "But was: 'One'"
$r.Message[5] | Should -match "'One' | Should -be 'Two'"
$r.Message.Count | Should -be 6
}
Context 'exception thrown in nested functions in file' {
Set-Content -Path $testPath -Value @'
function f1 {
throw 'f1 message'
}
function f2 {
f1
}
f2
'@
try {
& $testPath
}
catch {
$e = $_
}
$r = $e | ConvertTo-FailureLines
It 'produces correct message lines.' {
$r.Message[0] | Should -be 'RuntimeException: f1 message'
}
if ( $e | Get-Member -Name ScriptStackTrace ) {
if ((GetPesterOS) -ne 'Windows') {
It 'produces correct trace lines.' {
$r.Trace[0] | Should -be "at f1, $testPath`: line 2"
$r.Trace[1] | Should -be "at f2, $testPath`: line 5"
$r.Trace[2] | Should -be "at <ScriptBlock>, $testPath`: line 7"
$r.Trace.Count | Should -be 4
}
}
else {
It 'produces correct trace lines.' {
$r.Trace[0] | Should -be "at f1, $testPath`: line 2"
$r.Trace[1] | Should -be "at f2, $testPath`: line 5"
$r.Trace[2] | Should -be "at <ScriptBlock>, $testPath`: line 7"
$r.Trace.Count | Should -be 4
}
}
}
else {
It 'produces correct trace lines.' {
$r.Trace[0] | Should -be "at line: 2 in $testPath"
$r.Trace.Count | Should -be 1
}
}
}
Context 'nested exceptions thrown in file' {
Set-Content -Path $testPath -Value @'
try
{
throw New-Object System.ArgumentException(
'inner message',
'param_name'
)
}
catch
{
throw New-Object System.FormatException(
'outer message',
$_.Exception
)
}
'@
try {
& $testPath
}
catch {
$e = $_
}
$r = $e | ConvertTo-FailureLines
It 'produces correct message lines.' {
$r.Message[0] | Should -be 'ArgumentException: inner message'
$r.Message[1] | Should -be 'Parameter name: param_name'
$r.Message[2] | Should -be 'FormatException: outer message'
}
if ( $e | Get-Member -Name ScriptStackTrace ) {
if ((GetPesterOS) -ne 'Windows') {
It 'produces correct trace line.' {
$r.Trace[0] | Should -be "at <ScriptBlock>, $testPath`: line 10"
$r.Trace.Count | Should -be 2
}
}
else {
It 'produces correct trace line.' {
$r.Trace[0] | Should -be "at <ScriptBlock>, $testPath`: line 10"
$r.Trace.Count | Should -be 2
}
}
}
else {
It 'produces correct trace line.' {
$r.Trace[0] | Should -be "at line: 10 in $testPath"
$r.Trace.Count | Should -be 1
}
}
}
Context 'Exceptions with no error message property set' {
$powershellVersion = $($PSVersionTable.PSVersion.Major)
try {
$exceptionWithNullMessage = New-Object -TypeName "System.Management.Automation.ParentContainsErrorRecordException"
throw $exceptionWithNullMessage
}
catch {
$exception = $_
}
$result = $exception | ConvertTo-FailureLines
if ($powershellVersion -lt 3) {
It 'produces correct message lines' {
$result.Message.Length | Should -Be 2
}
It 'produces correct trace line' {
$result.Trace.Count | Should -Be 1
}
}
else {
It 'produces correct message lines' {
$result.Message.Length | Should -Be 0
}
It 'produces correct trace line' {
$result.Trace.Count | Should -Be 1
}
}
}
}
}
}
|
combined_dataset/train/non-malicious/2095.ps1
|
2095.ps1
|
Describe "Tests for (error, warning, etc) action preference" -Tags "CI" {
$commonActionPreferenceParameterTestCases = foreach ($commonParameterName in [System.Management.Automation.Cmdlet]::CommonParameters | Select-String Action) {
@{
ActionPreferenceParameterName = $commonParameterName
}
}
$actionPreferenceVariableTestCases = foreach ($variable in Get-Variable -Name *Preference -Scope Global | Where-Object Value -Is [System.Management.Automation.ActionPreference]) {
@{
ActionPreferenceVariableName = $variable.Name
StreamName = $variable.Name -replace '(Action)?Preference$'
}
}
$actionPreferenceVariableValueTestCases = @(
@{
Value = [System.Management.Automation.ActionPreference]::Suspend
DisplayValue = '[System.Management.Automation.ActionPreference]::Suspend'
}
@{
Value = 'Suspend'
DisplayValue = '''Suspend'''
}
)
BeforeAll {
$orgin = $GLOBAL:errorActionPreference
function Join-TestCase {
[OutputType([Hashtable[]])]
[CmdletBinding()]
param(
[Hashtable[]]$Set1,
[Hashtable[]]$Set2
)
foreach ($ht1 in $Set1) {
foreach ($ht2 in $Set2) {
$ht1 + $ht2
}
}
}
function Test-ActionPreferenceVariableSuspendValue {
[CmdletBinding()]
param(
$Value
)
if ($DebugPreference -eq $Value) {
Write-Debug -Message 'A debug message'
} elseif ($ErrorActionPreference -eq $Value) {
Write-Error -Message 'An error message'
} elseif ($InformationPreference -eq $Value) {
Write-Information -MessageData 'Some information'
} elseif ($ProgressPreference -eq $Value) {
Write-Progress -Activity 'Some progress'
} elseif ($VerbosePreference -eq $Value) {
Write-Verbose -Message 'A verbose message'
} elseif ($WarningPreference -eq $Value) {
Write-Warning -Message 'A warning message'
}
}
}
AfterAll {
if ($GLOBAL:errorActionPreference -ne $orgin) {
$GLOBAL:errorActionPreference = $orgin
}
}
Context 'Setting ErrorActionPreference to stop prevents user from getting the error exception' {
$err = $null
try {
Get-ChildItem nosuchfile.nosuchextension -ErrorAction stop -ErrorVariable err
} catch { }
It '$err.Count' { $err.Count | Should -Be 1 }
It '$err[0] should not be $null' { $err[0] | Should -Not -BeNullOrEmpty }
It '$err[0].GetType().Name' { $err[0] | Should -BeOfType "System.Management.Automation.ActionPreferenceStopException" }
It '$err[0].ErrorRecord' { $err[0].ErrorRecord | Should -Not -BeNullOrEmpty }
It '$err[0].ErrorRecord.Exception.GetType().Name' { $err[0].ErrorRecord.Exception | Should -BeOfType "System.Management.Automation.ItemNotFoundException" }
}
It 'Action preference of Ignore can be set as a preference variable using a string value' {
try {
Remove-Variable -Name ErrorActionPreference -Scope Global -Force
$GLOBAL:ErrorActionPreference = 'Ignore'
$errorCount = $error.Count
Get-Process -Name asdfasdfasdf
$error.Count | Should -BeExactly $errorCount
} finally {
Remove-Variable -Name ErrorActionPreference -Scope Global
[System.Management.Automation.ActionPreference]$GLOBAL:ErrorActionPreference = $orgin
}
}
It 'Action preference of Ignore can be set as a preference variable using an enumerated value' {
try {
$GLOBAL:ErrorActionPreference = [System.Management.Automation.ActionPreference]::Ignore
$errorCount = $error.Count
Get-Process -Name asdfasdfasdf
$error.Count | Should -BeExactly $errorCount
} finally {
$GLOBAL:ErrorActionPreference = $orgin
}
}
It 'The $global:<ActionPreferenceVariableName> variable does not support Suspend' -TestCases $actionPreferenceVariableTestCases {
param($ActionPreferenceVariableName)
$e = {
Set-Variable -Name $ActionPreferenceVariableName -Scope Global -Value ([System.Management.Automation.ActionPreference]::Suspend)
} | Should -Throw -ErrorId RuntimeException -PassThru
$e.CategoryInfo.Reason | Should -BeExactly 'ArgumentTransformationMetadataException'
}
It 'A local $<ActionPreferenceVariableName> variable does not support <DisplayValue>' -TestCases (Join-TestCase -Set1 $actionPreferenceVariableTestCases -Set2 $actionPreferenceVariableValueTestCases) {
param(
$ActionPreferenceVariableName,
$StreamName,
$Value,
$DisplayValue
)
$e = {
Set-Variable -Name $ActionPreferenceVariableName -Value $Value
Test-ActionPreferenceVariableSuspendValue -Value $Value
} | Should -Throw -ErrorId "System.NotSupportedException$(if ($StreamName -ne 'Error') {",Microsoft.PowerShell.Commands.Write${StreamName}Command"})" -PassThru
$e.CategoryInfo.Reason | Should -BeExactly 'NotSupportedException'
}
It 'enum disambiguation works' {
$errorCount = $error.Count
Get-Process -Name asdfasdfsadfsadf -ErrorAction Ig
$error.Count | Should -BeExactly $errorCount
}
It 'The -<ActionPreferenceParameterName> common parameter does not support Suspend on cmdlets' -TestCases $commonActionPreferenceParameterTestCases {
param($ActionPreferenceParameterName)
$commonParameters = @{
"${ActionPreferenceParameterName}" = [System.Management.Automation.ActionPreference]::Suspend
}
{ Write-Output -InputObject Test @commonParameters } | Should -Throw -ErrorId "ParameterBindingFailed,Microsoft.PowerShell.Commands.WriteOutputCommand"
}
It 'The -<ActionPreferenceParameterName> common parameter does not support Suspend on functions' -TestCases $commonActionPreferenceParameterTestCases {
param($ActionPreferenceParameterName)
function MyHelperFunction {
[CmdletBinding()]
param()
"Hello"
}
$commonParameters = @{
"${ActionPreferenceParameterName}" = [System.Management.Automation.ActionPreference]::Suspend
}
{ MyHelperFunction -ErrorAction Suspend } | Should -Throw -ErrorId "ParameterBindingFailed,MyHelperFunction"
}
It '<switch> does not take precedence over $ErrorActionPreference' -TestCases @(
@{switch = "Verbose" },
@{switch = "Debug" }
) {
param($switch)
$ErrorActionPreference = "SilentlyContinue"
$params = @{
ItemType = "File";
Path = "$testdrive\test.txt";
Confirm = $false
}
New-Item @params > $null
$params += @{$switch = $true }
{ New-Item @params } | Should -Not -Throw
$ErrorActionPreference = "Stop"
{ New-Item @params } | Should -Throw -ErrorId "NewItemIOError,Microsoft.PowerShell.Commands.NewItemCommand"
Remove-Item "$testdrive\test.txt" -Force
}
}
Describe 'ActionPreference.Break tests' -tag 'CI' {
BeforeAll {
Register-DebuggerHandler
}
AfterAll {
Unregister-DebuggerHandler
}
Context '-ErrorAction Break should break on a non-terminating error' {
BeforeAll {
$testScript = {
function Test-Break {
[CmdletBinding()]
param()
try {
Write-Error 'This is a non-terminating error.'
'This should still run'
} catch {
'Do nothing'
} finally {
'This finally runs'
}
}
Test-Break -ErrorAction Break
}
$results = @(Test-Debugger -ScriptBlock $testScript -CommandQueue 'v', 'v')
}
It 'Should show 3 debugger commands were invoked' {
$results.Count | Should -Be 3
}
It 'The breakpoint should be the statement that generated the non-terminating error' {
$results[0] | ShouldHaveExtent -Line 7 -FromColumn 25 -ToColumn 71
}
It 'The second statement should be the statement after that which generated the non-terminating error' {
$results[1] | ShouldHaveExtent -Line 9 -FromColumn 25 -ToColumn 48
}
It 'The third statement should be the statement in the finally block' {
$results[2] | ShouldHaveExtent -Line 13 -FromColumn 25 -ToColumn 44
}
}
Context '-ErrorAction Break should break on a terminating error' {
BeforeAll {
$testScript = {
function Test-Break {
[CmdletBinding()]
param()
try {
Get-Process -TheAnswer 42
'This should not run'
} catch {
'Do nothing'
} finally {
'This finally runs'
}
}
Test-Break -ErrorAction Break
}
$results = @(Test-Debugger -ScriptBlock $testScript -CommandQueue 'v', 'v')
}
It 'Should show 3 debugger commands were invoked' {
$results.Count | Should -Be 3
}
It 'The breakpoint should be the statement that generated the terminating error' {
$results[0] | ShouldHaveExtent -Line 7 -FromColumn 25 -ToColumn 50
}
It 'The second statement should be the statement in the catch block where the terminating error is caught' {
$results[1] | ShouldHaveExtent -Line 11 -FromColumn 25 -ToColumn 37
}
It 'The third statement should be the statement in the finally block' {
$results[2] | ShouldHaveExtent -Line 13 -FromColumn 25 -ToColumn 44
}
}
Context '-ErrorAction Break should not break on a naked rethrow' {
BeforeAll {
$testScript = {
function Test-Break {
[CmdletBinding()]
param()
try {
try {
Get-Process -TheAnswer 42
} catch {
throw
}
} catch {
}
}
Test-Break -ErrorAction Break
}
$results = @(Test-Debugger -ScriptBlock $testScript)
}
It 'Should show 1 debugger command was invoked' {
$results.Count | Should -Be 1
}
It 'The breakpoint should be the statement that generated the terminating error' {
$results[0] | ShouldHaveExtent -Line 8 -FromColumn 29 -ToColumn 54
}
}
Context '-ErrorAction Break should break when throwing a specific error or object' {
BeforeAll {
$testScript = {
function Test-Break {
[CmdletBinding()]
param()
try {
try {
Get-Process -TheAnswer 42
} catch {
throw $_
}
} catch {
}
}
Test-Break -ErrorAction Break
}
$results = @(Test-Debugger -ScriptBlock $testScript)
}
It 'Should show 2 debugger commands were invoked' {
$results.Count | Should -Be 2
}
It 'The first breakpoint should be the statement that generated the terminating error' {
$results[0] | ShouldHaveExtent -Line 8 -FromColumn 29 -ToColumn 54
}
It 'The second breakpoint should be the statement that threw $_' {
$results[1] | ShouldHaveExtent -Line 10 -FromColumn 29 -ToColumn 37
}
}
Context 'Other message types should break on their corresponding messages when requested' {
BeforeAll {
$testScript = {
function Test-Break {
[CmdletBinding()]
param()
Write-Warning -Message 'This is a warning message'
Write-Verbose -Message 'This is a verbose message'
Write-Debug -Message 'This is a debug message'
Write-Information -MessageData 'This is an information message'
Write-Progress -Activity 'This shows progress'
}
Test-Break -WarningAction Break -InformationAction Break *>$null
$WarningPreference = $VerbosePreference = $DebugPreference = $InformationPreference = $ProgressPreference = [System.Management.Automation.ActionPreference]::Break
Test-Break *>$null
}
$results = @(Test-Debugger -ScriptBlock $testScript)
}
It 'Should show 7 debugger commands were invoked' {
$results.Count | Should -Be 7
}
It 'Write-Warning should trigger a breakpoint from -WarningAction Break' {
$results[0] | ShouldHaveExtent -Line 5 -FromColumn 21 -ToColumn 71
}
It 'Write-Information should trigger a breakpoint from -InformationAction Break' {
$results[1] | ShouldHaveExtent -Line 8 -FromColumn 21 -ToColumn 84
}
It 'Write-Warning should trigger a breakpoint from $WarningPreference = [System.Management.Automation.ActionPreference]::Break' {
$results[2] | ShouldHaveExtent -Line 5 -FromColumn 21 -ToColumn 71
}
It 'Write-Verbose should trigger a breakpoint from $VerbosePreference = [System.Management.Automation.ActionPreference]::Break' {
$results[3] | ShouldHaveExtent -Line 6 -FromColumn 21 -ToColumn 71
}
It 'Write-Debug should trigger a breakpoint from $DebugPreference = [System.Management.Automation.ActionPreference]::Break' {
$results[4] | ShouldHaveExtent -Line 7 -FromColumn 21 -ToColumn 67
}
It 'Write-Information should trigger a breakpoint from $InformationPreference = [System.Management.Automation.ActionPreference]::Break' {
$results[5] | ShouldHaveExtent -Line 8 -FromColumn 21 -ToColumn 84
}
It 'Write-Progress should trigger a breakpoint from $ProgressPreference = [System.Management.Automation.ActionPreference]::Break' {
$results[6] | ShouldHaveExtent -Line 9 -FromColumn 21 -ToColumn 67
}
}
Context 'ActionPreference.Break in jobs' {
BeforeAll {
$job = Start-Job {
$ErrorActionPreference = [System.Management.Automation.ActionPreference]::Break
Get-Process -TheAnswer 42
}
}
AfterAll {
Remove-Job -Job $job -Force
}
It 'ActionPreference.Break should break in a running job' {
Wait-UntilTrue -sb { $job.State -eq 'AtBreakpoint' } -TimeoutInMilliseconds (10 * 1000) -IntervalInMilliseconds 100 | Should -BeTrue
}
}
}
|
combined_dataset/train/non-malicious/379.ps1
|
379.ps1
|
Describe "Register-PSFConfig Unit Tests" -Tag "CI", "Pipeline", "Unit" {
BeforeAll {
Get-PSFConfig -Module Register-PSFConfig -Force | ForEach-Object {
$null = [PSFramework.Configuration.ConfigurationHost]::Configurations.Remove($_.FullName)
}
}
AfterAll {
Get-PSFConfig -Module Register-PSFConfig -Force | ForEach-Object {
$null = [PSFramework.Configuration.ConfigurationHost]::Configurations.Remove($_.FullName)
}
}
It "Should have the designed for parameters & sets" {
(Get-Command Register-PSFConfig).ParameterSets.Name | Should -Be 'Default', 'Name'
$properties = 'Config', 'FullName', 'Module', 'Name', 'Scope', 'EnableException', 'Verbose', 'Debug', 'ErrorAction', 'WarningAction', 'InformationAction', 'ErrorVariable', 'WarningVariable', 'InformationVariable', 'OutVariable', 'OutBuffer', 'PipelineVariable'
Compare-Object $properties ((Get-Command Register-PSFConfig).Parameters.Keys | Remove-PSFNull -Enumerate) | Should -BeNullOrEmpty
}
Context "Validating registry persistence" {
$module = Get-Module PSFramework | Sort-Object Version -Descending | Select-Object -First 1
$pathRegistryUserDefault = & $module { $path_RegistryUserDefault }
$pathRegistryUserEnforced = & $module { $path_RegistryUserEnforced }
$pathRegistryMachineDefault = & $module { $path_RegistryMachineDefault }
$pathRegistryMachineEnforced = & $module { $path_RegistryMachineEnforced }
Set-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting1' -Value 24
It "Should correctly persist to the user-default registry location" {
{ Get-ItemPropertyValue -Path $pathRegistryUserDefault -Name 'Register-PSFConfig.Phase1.Setting1' -ErrorAction Stop } | Should -Throw
Register-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting1' -Scope UserDefault
Get-ItemPropertyValue -Path $pathRegistryUserDefault -Name 'Register-PSFConfig.Phase1.Setting1' | Should -Be 'int:24'
Unregister-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting1' -Scope UserDefault
{ Get-ItemPropertyValue -Path $pathRegistryUserDefault -Name 'Register-PSFConfig.Phase1.Setting1' -ErrorAction Stop } | Should -Throw
}
It "Should correctly persist to the user-mandatory registry location" {
{ Get-ItemPropertyValue -Path $pathRegistryUserEnforced -Name 'Register-PSFConfig.Phase1.Setting1' -ErrorAction Stop } | Should -Throw
Register-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting1' -Scope UserMandatory
Get-ItemPropertyValue -Path $pathRegistryUserEnforced -Name 'Register-PSFConfig.Phase1.Setting1' | Should -Be 'int:24'
Unregister-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting1' -Scope UserMandatory
{ Get-ItemPropertyValue -Path $pathRegistryUserEnforced -Name 'Register-PSFConfig.Phase1.Setting1' -ErrorAction Stop } | Should -Throw
}
if (Test-PSFPowerShell -Elevated)
{
It "Should correctly persist to the system-default registry location" {
{ Get-ItemPropertyValue -Path $pathRegistryMachineDefault -Name 'Register-PSFConfig.Phase1.Setting1' -ErrorAction Stop} | Should -Throw
Register-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting1' -Scope SystemDefault
Get-ItemPropertyValue -Path $pathRegistryMachineDefault -Name 'Register-PSFConfig.Phase1.Setting1' | Should -Be 'int:24'
Unregister-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting1' -Scope SystemDefault
{ Get-ItemPropertyValue -Path $pathRegistryMachineDefault -Name 'Register-PSFConfig.Phase1.Setting1' -ErrorAction Stop } | Should -Throw
}
It "Should correctly persist to the system-mandatory registry location" {
{ Get-ItemPropertyValue -Path $pathRegistryMachineEnforced -Name 'Register-PSFConfig.Phase1.Setting1' -ErrorAction Stop } | Should -Throw
Register-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting1' -Scope SystemMandatory
Get-ItemPropertyValue -Path $pathRegistryMachineEnforced -Name 'Register-PSFConfig.Phase1.Setting1' | Should -Be 'int:24'
Unregister-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting1' -Scope SystemMandatory
{ Get-ItemPropertyValue -Path $pathRegistryMachineEnforced -Name 'Register-PSFConfig.Phase1.Setting1' -ErrorAction Stop } | Should -Throw
}
}
}
Context "Validating file persistence" {
$module = Get-Module PSFramework | Sort-Object Version -Descending | Select-Object -First 1
$pathFileUserLocal = & $module { $path_FileUserLocal }
$pathFileUserShared = & $module { $path_FileUserShared }
$pathFileSystem = & $module { $path_FileSystem }
Set-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting2' -Value 32
It "Should correctly persist to the user-local specific file" {
$tempPathRoot = $pathFileUserLocal
$tempPath = Join-Path $tempPathRoot "psf_config.json"
if (Test-Path $tempPath)
{
Rename-Item -Path $tempPath -NewName 'psf_config.json.old'
}
Test-Path $tempPath | Should -Be $false
Register-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting2' -Scope FileUserLocal
Get-Content $tempPath | Select-String 'Register-PSFConfig.Phase1.Setting2' | Should -Not -BeNullOrEmpty
Unregister-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting2' -Scope FileUserLocal
Test-Path $tempPath | Should -Be $false
if (Test-Path (Join-Path $tempPathRoot "psf_config.json.old"))
{
Rename-Item -Path (Join-Path $tempPathRoot "psf_config.json.old") -NewName 'psf_config.json' -Force
}
}
It "Should correctly persist to the user-shared specific file" {
$tempPathRoot = $pathFileUserShared
$tempPath = Join-Path $tempPathRoot "psf_config.json"
if (Test-Path $tempPath)
{
Rename-Item -Path $tempPath -NewName 'psf_config.json.old'
}
Test-Path $tempPath | Should -Be $false
Register-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting2' -Scope FileUserShared
Get-Content $tempPath | Select-String 'Register-PSFConfig.Phase1.Setting2' | Should -Not -BeNullOrEmpty
Unregister-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting2' -Scope FileUserShared
Test-Path $tempPath | Should -Be $false
if (Test-Path (Join-Path $tempPathRoot "psf_config.json.old"))
{
Rename-Item -Path (Join-Path $tempPathRoot "psf_config.json.old") -NewName 'psf_config.json' -Force
}
}
if (Test-PSFPowerShell -Elevated)
{
It "Should correctly persist to the system-wide file" {
$tempPathRoot = $pathFileSystem
$tempPath = Join-Path $tempPathRoot "psf_config.json"
if (Test-Path $tempPath)
{
Rename-Item -Path $tempPath -NewName 'psf_config.json.old'
}
Test-Path $tempPath | Should -Be $false
Register-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting2' -Scope FileSystem
Get-Content $tempPath | Select-String 'Register-PSFConfig.Phase1.Setting2' | Should -Not -BeNullOrEmpty
Unregister-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting2' -Scope FileSystem
Test-Path $tempPath | Should -Be $false
if (Test-Path (Join-Path $tempPathRoot "psf_config.json.old"))
{
Rename-Item -Path (Join-Path $tempPathRoot "psf_config.json.old") -NewName 'psf_config.json' -Force
}
}
}
}
Context "Ensuring Content based Data Integrity" {
$module = Get-Module PSFramework | Sort-Object Version -Descending | Select-Object -First 1
$pathRegistryUserDefault = & $module { $path_RegistryUserDefault }
$pathFileUserLocal = & $module { $path_FileUserLocal }
Set-PSFConfig -FullName 'Register-PSFConfig.Phase2.Setting1' -Value 1
Set-PSFConfig -FullName 'Register-PSFConfig.Phase2.Setting2' -Value 2
Set-PSFConfig -FullName 'Register-PSFConfig.Phase2.Setting3' -Value 3
Set-PSFConfig -FullName 'Register-PSFConfig.Phase2.Setting4' -Value 4
Set-PSFConfig -FullName 'Register-PSFConfig.Phase2.Setting5' -Value 5 -SimpleExport
Set-PSFConfig -FullName 'Register-PSFConfig.Phase2.Setting6' -Value 6
It "should export single and multiple items to registry without issues" {
{ Register-PSFConfig -FullName 'Register-PSFConfig.Phase2.Setting1' } | Should -Not -Throw
{ Register-PSFConfig -FullName 'Register-PSFConfig.Phase2.Setting2', 'Register-PSFConfig.Phase2.Setting3' } | Should -Not -Throw
$hive = Get-ItemProperty -Path $pathRegistryUserDefault
$hive.'Register-PSFConfig.Phase2.Setting1' | Should -Be 'Int:1'
$hive.'Register-PSFConfig.Phase2.Setting2' | Should -Be 'Int:2'
$hive.'Register-PSFConfig.Phase2.Setting3' | Should -Be 'Int:3'
Unregister-PSFConfig -Module Register-PSFConfig
$hive = Get-ItemProperty -Path $pathRegistryUserDefault
$hive.'Register-PSFConfig.Phase2.Setting1' | Should -BeNullOrEmpty
$hive.'Register-PSFConfig.Phase2.Setting2' | Should -BeNullOrEmpty
$hive.'Register-PSFConfig.Phase2.Setting3' | Should -BeNullOrEmpty
}
It "should export single and multiple items to file without issues" {
{ Register-PSFConfig -FullName 'Register-PSFConfig.Phase2.Setting4' -Scope FileUserLocal } | Should -Not -Throw
{ Register-PSFConfig -FullName 'Register-PSFConfig.Phase2.Setting5', 'Register-PSFConfig.Phase2.Setting6' -Scope FileUserLocal } | Should -Not -Throw
$localFile = Join-Path $pathFileUserLocal 'psf_config.json'
Get-Content -Path $localFile | Select-String 'Register-PSFConfig.Phase2.Setting4' | Should -Not -BeNullOrEmpty
Get-Content -Path $localFile | Select-String 'Register-PSFConfig.Phase2.Setting5' | Should -Not -BeNullOrEmpty
Get-Content -Path $localFile | Select-String 'Register-PSFConfig.Phase2.Setting6' | Should -Not -BeNullOrEmpty
Unregister-PSFConfig -Module Register-PSFConfig -Scope FileUserLocal
if (Test-Path $localFile)
{
Get-Content -Path $localFile | Select-String 'Register-PSFConfig.Phase2.Setting4' | Should -BeNullOrEmpty
Get-Content -Path $localFile | Select-String 'Register-PSFConfig.Phase2.Setting5' | Should -BeNullOrEmpty
Get-Content -Path $localFile | Select-String 'Register-PSFConfig.Phase2.Setting6' | Should -BeNullOrEmpty
}
}
}
}
|
combined_dataset/train/non-malicious/sample_10_86.ps1
|
sample_10_86.ps1
|
#************************************************
# DC_DiskInfo.ps1
# Version 1.0
# Date: 09-05-2023
# Author: Edmund Spatariu
# Updated:
# Description: This script obtains Disk Info and associate a drive letter with corresponding LUN, saving output to a
# file named $ComputerName_DC_DiskInfo.txt
#************************************************
#Last Updated Date: 09-05-2023
#Updated By:
#Description:
#************************************************
if($debug -eq $true){[void]$shell.popup("Run DC_DiskInfo.ps1")}
Import-LocalizedData -BindingVariable DiskInfoStrings -FileName DC_DiskInfo -UICulture en-us
Write-DiagProgress -Activity $DiskInfoStrings.ID_DiskInfo -Status $DiskInfoStrings.ID_DiskInfoRunning
$fileDescription = $DiskInfoStrings.ID_DiskInfoOutput
$sectionDescription = $DiskInfoStrings.ID_DiskInfoOutputDesc
$OutputFile = $ComputerName + "_DiskInfo.txt"
"==============================================" | Out-File -FilePath $OutputFile
"Associate Drive Letter with LUN" | Out-File -FilePath $OutputFile -append
"==============================================" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
Get-CimInstance Win32_DiskDrive | ForEach-Object {
$disk = $_
$partitions = "ASSOCIATORS OF " +
"{Win32_DiskDrive.DeviceID='$($disk.DeviceID)'} " +
"WHERE AssocClass = Win32_DiskDriveToDiskPartition"
Get-CimInstance -Query $partitions | ForEach-Object {
$partition = $_
$drives = "ASSOCIATORS OF " +
"{Win32_DiskPartition.DeviceID='$($partition.DeviceID)'} " +
"WHERE AssocClass = Win32_LogicalDiskToPartition"
Get-CimInstance -Query $drives | ForEach-Object {
Write-Host ""
New-Object -Type PSCustomObject -Property @{
DriveLetter = $_.DeviceID
VolumeName = $_.VolumeName
FileSystem = $_.Filesystem
Partition = $partition.Name
Size = $_.Size
FreeSpace = $_.FreeSpace
Disk = $disk.DeviceID
DiskModel = $disk.Model
LUN = $disk.SCSILogicalUnit
Port = $disk.SCSIPort
BUS = $disk.SCSIBus
}
} | Sort-Object -Property DriveLetter |Select-Object DriveLetter, VolumeName, FileSystem, Partition, Size, FreeSpace, Disk, DiskModel, LUN, Port, BUS
}
} | Out-File $OutputFile -append
"`n`n`n`n`n" | Out-File -FilePath $OutputFile -append
"==============================================" | Out-File -FilePath $OutputFile -append
"Get-CimInstance -Class Win32_DiskDrive" | Out-File -FilePath $OutputFile -append
"==============================================" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
Get-CimInstance -Class Win32_DiskDrive -Namespace 'root\CIMV2' | Format-List -Property * | Out-File -Append $OutputFile
"`n`n`n`n`n" | Out-File -FilePath $OutputFile -append
"==============================================" | Out-File -FilePath $OutputFile -append
"Get-CimInstance -Class Win32_LogicalDisk" | Out-File -FilePath $OutputFile -append
"==============================================" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
Get-CimInstance -Class Win32_LogicalDisk -Namespace 'root\CIMV2' | Format-List -Property * | Out-File -Append $OutputFile
"`n`n`n`n`n" | Out-File -FilePath $OutputFile -append
"==============================================" | Out-File -FilePath $OutputFile -append
"Get-CimInstance -Class Win32_DiskPartition" | Out-File -FilePath $OutputFile -append
"==============================================" | Out-File -FilePath $OutputFile -append
"`n" | Out-File -FilePath $OutputFile -append
Get-CimInstance -Class Win32_DiskPartition -Namespace 'root\CIMV2' | Format-List -Property * | Out-File -Append $OutputFile
CollectFiles -filesToCollect $OutputFile -fileDescription $fileDescription -sectionDescription $sectionDescription
# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCEYyWUGOQJapkS
# WT32K2spdXRX9g6KVh+pEYPLkGtU/6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V
# lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV
# LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY
# oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi
# kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/
# /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv
# ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r
# EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV
# NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC
# rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos
# oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB
# +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO
# raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+
# sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W
# +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s
# IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu
# iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA
# BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIQY
# OKJPbbbPczZTbjZrkkpP8UPUQYBnAVL4n0YmtoabMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAYhwklvM3kFpa6hpavY8rt+81UMqiGLS0UoWA
# h+arJ4v1m6eDSdreCkfKOjH+5aeh91Vo+v1s+8IYd08FXzXHmQyaM36rqDev/dHK
# AS68pZrK5TTHsHIlGVsNqE7vJdWSM0J7OjyGXGPeavVUuoSIfxjeoQTk4D2DadDm
# iowU82meC5XZaPyMRyoLowjBznubhqVY++NPMMsZZmfXMgGRVSY+3YQ5eKjhqedv
# 6LRvXVEW2+JueZAHfemIooxUbiKulGdSnnr28SJKXj9uLaNRVhvDBOrfyvyDDsjG
# qSooYm1H0G55kktpOXRIizHv4aHiK3t7YYu/OU01gF8LskfWzqGCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCDDakpCibdx0+QplYvqcgKhkriZCeKL+lqD
# 6StK1DMzswIGZxqPzfEIGBMyMDI0MTAyODExNDA0My41MjVaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046MzMwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAebZQp7qAPh94QAB
# AAAB5jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1MTVaFw0yNTAzMDUxODQ1MTVaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzMwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC9vph84tgluEzm/wpNKlAj
# cElGzflvKADZ1D+2d/ieYYEtF2HKMrKGFDOLpLWWG5DEyiKblYKrE2nt540OGu35
# Zx0gXJBE0zWanZEAjCjt4eGBi+uakZsk70zHTQHHyfP+B3m2BSSNFPhgsVIPp6vo
# /9t6OeNezIwX5E5+VwEG37nZgEexQF2fQZYbxQ1AauqDvRdXsSpK1dh1UBt9EaMs
# zuucaR5nMwQN6sDjG99FzdK9Atzbn4SmlsoLUtRAh/768sKd0Y1hMmKVHwIX8/4J
# uURUBRZ0JWu0NYQBp8khku18Q8CAQ500tFB7VH3pD8zoA4lcA7JkxTGoPKrufm+l
# RZAA4iMgbcLZ2P/xSdnKFxU8vL31RoNlZJiGL5MqTXvvyBLz+MRP4En9Nye1N8x/
# lJD1stdNo5wJG+mgXsE/zfzg2GaVqQczFHg0Nl8bpIqnNFUReQRq3C1jVYMCSceg
# NzHeYtw5OmZ/7eVnRmjXlCsLvdsxOzc1YVn6nZLkQD5y31HYrB9iIHuswhaMv2hJ
# NNjVndkpWy934PIZuWTMk360kjXPFwl2Wv1Tzm9tOrCq8+l408KIL6J+efoGNkR8
# YB3M+u1tYeVDO/TcObGHxaGFB6QZxAUpnfB5N/MmBNxMOqzG1N8QiwW8gtjjMJiF
# Bf6iYYrCjtRwF7IPdQLFtQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFOUEMXntN54+
# 11ZM+Qu7Q5rg3Fc9MB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBhbuogTapRsuwS
# kaFMQ6dyu8ZCYUpWQ8iIrbi40tU2hK6pHgu0hj0z/9zFRRx5DfhukjvbjA/dS5VY
# fxz1EIbPlt897MJ2sBGO2YLYwYelfJpDwbB0XS9Zkrqpzq6X/lmDQDn3G5vcYpYQ
# CJ55LLvyFlJ195AVo4Wy8UX5p7g9W3MgNHQMpM+EV64+cszj4Ho5aQmeKGtKy7w7
# 2eRY/vWDuptrvzruFNmKCIt12UcA5BOsXp1Ptkjx2yRsCj77DSml0zVYjqW/ISWk
# rGjyeVJ+khzctxaLkklVwCxigokD6fkWby0hCEKTOTPMzhugPIAcxcHsR2sx01YR
# a9pH2zvddsuBEfSFG6Cj0QSvEZ/M9mJ+h4miaQSR7AEbVGDbyRKkYn80S+3AmRlh
# 3ZOe+BFqJ57OXdeIDSHbvHzJ7oTqG896l3eUhPsZg69fNgxTxlvRNmRE/+61Yj7Z
# 1uB0XYQP60rsMLdTlVYEyZUl5MLTL5LvqFozZlS2Xoji4BEP6ddVTzmHJ4odOZMW
# TTeQ0IwnWG98vWv/roPegCr1G61FVrdXLE3AXIft4ZN4ZkDTnoAhPw7DZNPRlSW4
# TbVj/Lw0XvnLYNwMUA9ouY/wx9teTaJ8vTkbgYyaOYKFz6rNRXZ4af6e3IXwMCff
# CaspKUXC72YMu5W8L/zyTxsNUEgBbTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjMzMDMtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQDiWNBeFJ9jvaErN64D1G86eL0mu6CBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smrUDAi
# GA8yMDI0MTAyODA2MTg1NloYDzIwMjQxMDI5MDYxODU2WjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDqyatQAgEAMAcCAQACAiZmMAcCAQACAhORMAoCBQDqyvzQAgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAEBxNUvMJ0O0UDu8Og9sWf208vhS
# kFloumMW1RvgFdb92+THK6H4x3VJwAos7fSTrcyd3rBsbPaWsDzEE8lSpQZRl1tT
# +xqJ9FN0+DhU7VbhQzFplSEQLO3ZUNQUMNltvLzXqrbJuEfQiXerQxhkutzT4Ceh
# f10MosdYIq9nQ6IhxL20siq9Nudp03+xjjbZmZjrxvnqZQ1GXhucuPUTYDKdOdHa
# +dU71t77KkdCeO70ybxR1x1yXXr+kaA0X/o61KSn3G2WSmzdwnX2nOuuBi5Wptv9
# NmwZTYfI/s4Qh0GVxQ1vRelr66myMkPQ75xHUd8APnZdEG/h251KOccn5yUxggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAebZ
# Qp7qAPh94QABAAAB5jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCBbeJbxCh+befIzFTMBkJYs0d3G
# IR2Q52+dynzXDiQEjjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM+7o4ao
# HrMJaG8gnLO1q16hIYcRnoy6FnOCbnSD0sZZMIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHm2UKe6gD4feEAAQAAAeYwIgQgTB6qQcMd
# P6fMqtySduFITAgYbREF90zOkmEDwIb58bEwDQYJKoZIhvcNAQELBQAEggIAHyWo
# vCt/qPKQnS9U9KNKd3vZ4nTawdZNUenmh8BiHRS1kzUhnge5wHEMa1PxqLtde0Gp
# u2q7gsevwvjjG+r5sy7I612+dXOyxTZtVySR+D6iCpDbZUKvdX5p68zJm5Y0uuO+
# /RC/X480QLXbWJlcWqrRY3+3Dwm7skEp4gaR99zRDpQDbt7RYdnnNDLEahKa70KO
# 5xlNIjbkKHb5UuMsA0Y3niXSYjDS7wHmw2qWBYEWcNZEFFmPj2b/rnFybRUf1m/L
# M040NwIZoP/WthrT69c0WIk+kD1jCFj57nKhneSyFbzhhp3WOjnuPIUTU099sB7f
# f1ZrJgwCPFpl9fkWAdkQkFwMsnJW8JIYJ8OeBGk99fR0KOoBxI9Sx3kZBb5DAKKt
# t3gN/gc5j+NmkzunlHMFQyh/nOrpP4LHSSwpJQ8g+buEFFpzinVuRRYq/lsGCS8W
# U9b8lAIP0JwKk1RBCX3rEPJXQ202DvSvxtPkAXBLQgD1yr8MgZsYEY8GFawjkEPD
# D3fL+JEYXe5kNDnLTJOl7Syk31rK4uFV2T/erGcOba1K00Bg06L27/GUFaEFTWYp
# pfFpFjaz+5DAGLp0eZmp/kik8G1/F1osuOLvIgG+aDWM1XyVxCjGmBTv3mT1MlDi
# tJOoRgE4m4PpkOtxFq+gBFVdVP7pQWVdSUDJHqE=
# SIG # End signature block
|
combined_dataset/train/non-malicious/ConvertTo-Hex_11.ps1
|
ConvertTo-Hex_11.ps1
|
# Ported from C# technique found here: http://forums.asp.net/p/1298956/2529558.aspx
param ( [string]$SidString )
# Create SID .NET object using SID string provided
$sid = New-Object system.Security.Principal.SecurityIdentifier $sidstring
# Create a byte array of the proper length
$sidBytes = New-Object byte[] $sid.BinaryLength
#Convert to bytes
$sid.GetBinaryForm( $sidBytes, 0 )
# Iterate through bytes, converting each to the hexidecimal equivalent
$hexArr = $sidBytes | ForEach-Object { $_.ToString("X2") }
# Join the hex array into a single string for output
$hexArr -join ''
|
combined_dataset/train/non-malicious/sample_47_23.ps1
|
sample_47_23.ps1
|
# Localized 04/14/2024 08:54 PM (GMT) 303:7.1.41104 Add-AppDevPackage.psd1
# Culture = "en-US"
ConvertFrom-StringData @'
###PSLOC
PromptYesString=&Tak
PromptNoString=&Nie
BundleFound=Znaleziono pakiet: {0}
PackageFound=Znaleziono pakiet: {0}
EncryptedBundleFound=Znaleziono zaszyfrowany zbiór: {0}
EncryptedPackageFound=Znaleziono zaszyfrowany pakiet: {0}
CertificateFound=Znaleziono certyfikat: {0}
DependenciesFound=Znaleziono pakiety zależności:
GettingDeveloperLicense=Trwa uzyskiwanie licencji dewelopera...
InstallingCertificate=Trwa instalowanie certyfikatu...
InstallingPackage=\nTrwa instalowanie aplikacji...
AcquireLicenseSuccessful=Pomyślnie uzyskano licencję dewelopera.
InstallCertificateSuccessful=Pomyślnie zainstalowano certyfikat.
Success=\nPowodzenie: pomyślnie zainstalowano aplikację.
WarningInstallCert=\nZamierzasz zainstalować certyfikat cyfrowy w magazynie zaufanych osób na komputerze. Stanowi to poważne zagrożenie bezpieczeństwa. Należy to robić tylko w sytuacji, gdy ufasz nadawcy certyfikatu cyfrowego.\n\nPo zakończeniu korzystania z aplikacji usuń ręcznie skojarzony certyfikat cyfrowy. Odpowiednie instrukcje są dostępne pod tym adresem: http://go.microsoft.com/fwlink/?LinkId=243053\n\nCzy na pewno chcesz kontynuować?\n\n
ElevateActions=\nPrzed zainstalowaniem tej aplikacji musisz wykonać następujące czynności:
ElevateActionDevLicense=\t- Uzyskaj licencję dewelopera
ElevateActionCertificate=\t- Zainstaluj certyfikat podpisywania
ElevateActionsContinue=Aby móc kontynuować, musisz podać poświadczenia administratora. Zaakceptuj monit kontroli konta użytkownika i podaj hasło administratora, gdy zostanie wyświetlony odpowiedni monit.
ErrorForceElevate=Aby móc kontynuować, musisz podać poświadczenia administratora. Uruchom ten skrypt bez parametru -Force lub w oknie programu PowerShell z podniesionym poziomem uprawnień.
ErrorForceDeveloperLicense=Uzyskanie licencji dewelopera wymaga interakcji użytkownika. Uruchom ponownie skrypt bez parametru -Force.
ErrorLaunchAdminFailed=Błąd: nie można uruchomić nowego procesu jako administrator.
ErrorNoScriptPath=Błąd: musisz uruchomić ten skrypt z pliku.
ErrorNoPackageFound=Błąd: nie znaleziono pakietu w katalogu skryptu. Upewnij się, że w tym samym katalogu co skrypt znajduje się pakiet, który chcesz zainstalować.
ErrorManyPackagesFound=Błąd: znaleziono więcej niż jeden pakiet w katalogu skryptu. Upewnij się, że w tym samym katalogu co skrypt znajduje się tylko pakiet, który chcesz zainstalować.
ErrorPackageUnsigned=Błąd: pakiet nie ma podpisu cyfrowego lub jego podpis jest uszkodzony.
ErrorNoCertificateFound=Błąd: nie znaleziono certyfikatu w katalogu skryptu. Upewnij się, że w tym samym katalogu co skrypt znajduje się certyfikat używany do podpisywania instalowanego pakietu.
ErrorManyCertificatesFound=Błąd: znaleziono więcej niż jeden certyfikat w katalogu skryptu. Upewnij się, że w tym samym katalogu co skrypt znajduje się tylko certyfikat używany do podpisywania instalowanego pakietu.
ErrorBadCertificate=Błąd: plik „{0}” nie jest prawidłowym certyfikatem cyfrowym. Program CertUtil zwrócił kod błędu {1}.
ErrorExpiredCertificate=Błąd: certyfikat dewelopera „{0}” wygasł. Jedną z możliwych przyczyn jest niepoprawna data i godzina zegara systemowego. Jeśli ustawienia systemu są poprawne, skontaktuj się z właścicielem aplikacji w celu ponownego utworzenia pakietu przy użyciu prawidłowego certyfikatu.
ErrorCertificateMismatch=Błąd: certyfikat nie jest zgodny z certyfikatem, za pomocą którego podpisano pakiet.
ErrorCertIsCA=Błąd: certyfikat nie może być urzędem certyfikacji.
ErrorBannedKeyUsage=Błąd: certyfikat nie może mieć następującego rozszerzonego użycia klucza: {0}. Użycie klucza musi być nieokreślone lub mieć wartość „DigitalSignature”.
ErrorBannedEKU=Błąd: certyfikat nie może mieć następującego rozszerzonego użycia klucza: {0}. Dozwolone są tylko rozszerzone użycia klucza podpisywania kodu i okresu istnienia.
ErrorNoBasicConstraints=Błąd: certyfikat nie ma podstawowego rozszerzenia ograniczeń.
ErrorNoCodeSigningEku=Błąd: certyfikat nie ma rozszerzonego klucza użycia na potrzeby podpisywania kodu.
ErrorInstallCertificateCancelled=Błąd: anulowano instalację certyfikatu.
ErrorCertUtilInstallFailed=Błąd: nie można zainstalować certyfikatu. Program CertUtil zwrócił kod błędu {0}.
ErrorGetDeveloperLicenseFailed=Błąd: nie można uzyskać licencji dewelopera. Aby uzyskać więcej informacji, zobacz http://go.microsoft.com/fwlink/?LinkID=252740.
ErrorInstallCertificateFailed=Błąd: nie można zainstalować certyfikatu. Stan: {0}. Aby uzyskać więcej informacji, zobacz http://go.microsoft.com/fwlink/?LinkID=252740.
ErrorAddPackageFailed=Błąd: nie można zainstalować aplikacji.
ErrorAddPackageFailedWithCert=Błąd: nie można zainstalować aplikacji. Aby zapewnić bezpieczeństwo, rozważ odinstalowanie certyfikatu podpisywania do czasu, gdy zainstalowanie aplikacji będzie możliwe. Odpowiednie instrukcje można znaleźć pod tym adresem:\nhttp://go.microsoft.com/fwlink/?LinkId=243053
'@
|
combined_dataset/train/non-malicious/Search-NetworkService.ps1
|
Search-NetworkService.ps1
|
#Define PreReqs
$timeStamp = Get-Date -UFormat "%m-%d-%Y-%H-%M"
$systemVars = Gwmi Win32_ComputerSystem -Comp "."
$userName = $systemVars.UserName
$compName = $systemVars.Name
#User Vars
$serviceName = "Spooler" # Spooler will check the Print Spooler <<< Change To Suit Your needs
$errorLog = "C:\\Temp\\Log_"+$serviceName+"_"+$timeStamp+"_Errors.txt" #Service Not Installed
$fullLog = "C:\\Temp\\Log_"+$serviceName+"_"+$timeStamp+"_All.txt" #Services Needed To Be Started / Running
#Write Some Info To Logs
"Check Service: " + $serviceName > $errorLog; Get-Date >> $errorLog; $compName >> $errorLog; $userName >> $errorLog; "_____________" >> $errorLog; "" >> $errorLog;
"Check Service: " + $serviceName > $fullLog; Get-Date >> $fullLog; $compName >> $fullLog; $userName >> $fullLog; "_____________" >> $fullLog; "" >> $fullLog;
# Define Functions
function Get-NetView {
switch -regex (NET.EXE VIEW) { "^\\\\\\\\(?<Name>\\S+)\\s+" {$matches.Name}}
}
function Process-PCs ($currentName) {
$olStatus = Ping-Address $currentName
If ($olStatus -eq "True") {
Check-Service $currentName
}
#Else {Write-Host "PC Not Online"}
Write-Host " "
}
function Ping-Address ($pingAddress) {
$ping = new-object system.net.networkinformation.ping
$pingReply = $ping.send($pingAddress)
If ($pingReply.status -eq "Success") {
Return "True"
}
Else {
Return "False"
}
}
function Check-Service ($currentName) {
$currentService = Get-Service -ComputerName $currentName -Name $serviceName -ErrorAction SilentlyContinue
If ($currentService.Status -eq $Null){
$currentServiceStatus = "Not Installed"
$currentName >> $errorLog
}
ElseIf ($currentService.Status -eq "Running"){
$currentServiceStatus = "Running"
}
ElseIf ($currentService.Status -eq "Stopped"){
$currentServiceStatus = "Stopped"
}
Else {
$currentServiceStatus = "Unknown"
}
Write-Host $serviceName " is " $currentServiceStatus " on " $currentName
$serviceName + " was " + $currentServiceStatus + " on " + $currentName >> $fullLog
If ($currentService.Status -eq "Stopped"){
Write-Host "Service was stoppped, trying to start it . . ."
$currentService | Start-Service -ErrorAction SilentlyContinue
If ($currentService.Status -eq "Running"){
" Service Successfully Started" >> $fullLog
}
Else {
" Service Could Not Be Started" >> $fullLog
}
}
}
#Run Everything
cls
Get-NetView | %{Process-PCs $_}
# Test a single PC, Uncomment line below change pc name and comment line above
# Process-PCs "localhost" | %{Process-PCs $_}
|
combined_dataset/train/non-malicious/sample_8_26.ps1
|
sample_8_26.ps1
|
#************************************************
# TS_PrintHpzui4wmCheck.ps1
# Version 1.0.1
# Date: 2/29/12
# Author: jasonf
# Description: KB947477 Detect the OEM HP driver hpzui4wm.DLL. This driver is known to cause the print spooler to crash or hang.
#************************************************
#strings
#<!-- 230,214 to 230,217 - 2335.KB947477_HPDLL -->
# <string index="230214" name="ID_KB947477_HPDLLTitle">Checking Spooler Service</string>
# <string index="230215" name="ID_KB947477_HPDLLDescription">Checking loaded modules in Spooler Service.</string>
# <string index="230216" name="ID_KB947477_HPDLLRC" localize="false">The print spooler may crash or hang due to OEM HP print driver</string>
# <string index="230217" name="ID_KB947477_HPDLL1RS" localize="false">The OEM HP driver hpzui4wm.DLL was detected. This driver is known to cause the print spooler to crash or hang. Please contact HP to find an upgrade to this driver or follow steps in KB947477 to rename the driver.</string>
#
Import-LocalizedData -BindingVariable ScriptStrings
Write-DiagProgress -Activity $ScriptStrings.ID_KB947477_HPDLLTitle -Status $ScriptStrings.ID_KB947477_HPDLLDescription
$RootCauseDetected = $false
$RootCauseName = "RC_PrintHpzui4wmCheck"
$PublicContent = "http://support.microsoft.com/kb/KB947477"
# ***************************
# Data Gathering
# ***************************
Function CheckForLoadedModule ($ProcessName, $ModuleFileName, $ModuleProductVersion)
{
#
# .SYNOPSIS
# Checks the modules loaded in a process to see if a specific module and version is loaded
# .DESCRIPTION
# .NOTES
# .LINK
# .EXAMPLE
# CheckForLoadedModule -ProcessName "SpoolSv" -ModuleFileName "spinf.dll" -ModuleProductVersion "6.1.7600.16385"
# .OUTPUTS
# Boolean value: [true] if the module name and version are loaded
# otherwise [false]
# .PARAMETER file
#
if (get-process -name $ProcessName -module | where-object {$_.ModuleName -eq $ModuleFileName})
{
$module = get-process -name $ProcessName -module | where-object {$_.ModuleName -eq $ModuleFileName}
if ($module.ProductVersion -eq $ModuleProductVersion)
{
Return $true
}
else
{
Return $false
}
}
else
{
Return $false
}
}
# **************
# Detection Logic
# **************
#Rule applicability
#spooler service is running
$SpoolerService = get-service spooler
if ($spoolerService.Status -eq "Running") {$RuleApplicable = $true}
#Root cause detection
#hpzui4wm.dll version 61.63.461.42 is loaded in spooler
if ($RuleApplicable)
{
if (CheckForLoadedModule -ProcessName "SpoolSv" -ModuleFileName "hpzui4wm.dll" -ModuleProductVersion "61.63.461.42")
{
$RootCauseDetected = $true
}
}
# *********************
# Root Cause processing
# *********************
if ($RuleApplicable)
{
if ($RootCauseDetected)
{
# Red/ Yellow Light
Update-DiagRootCause -id $RootCauseName -Detected $true
Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL $PublicContent -Verbosity "Error" -Visibility 4
}
else
{
# Green Light
Update-DiagRootCause -id $RootCauseName -Detected $false
}
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDob4vD8gq7fGlb
# FVfEWEOq+EVfe87Wvxc9CCDFd7eHm6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIN5zkw5pU1zhiwOgFIfQFT4C
# u0fLXQU1vjMIAmDDerNWMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAHFn0hrJAiSy5JPd6Iwu0vaZGSijsYUTNJz2xrBTjJJgUZ3z4bmT8Lubh
# 5Z1YHENZ3vdo6GqcMdi6kuYHiH13ENydqKWrdVTSD9XdifsCQBocNx/OmEo1aacZ
# lAAaIPyvcfd3lZxo0TVlf4nw8OAnquS+1ySdpX9KteceR2ShKoEW/aODrREjph7B
# J7a22pJaJFX3M1Kw6UI+VAfuXzBJ0efORGMhKG1HniCXut+I3MrB55H7lvwkITGe
# DjLHh9mnc8bhu35s1xA4ptB1fLCBhkudBRXqqYBFBjFSSca3vcR/u3BTMxa69jjY
# gcxEMYOvKzvc7PjStM4je29Ibcbw16GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCDaCWCWY8f/ALwTsJZeseeCEaXy54725TbPIMj0R4YWlAIGZxpym1vd
# GBMyMDI0MTAyODExNDAzOC4zNTdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAABAAAB7DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MzhaFw0yNTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22uwdEZm0IoAFs6oIr39VK
# /ItP80cn+8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4V
# yHEco/u1QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+
# H77gL4r01TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3
# SEZAq4XIjiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAinb0o+uQ9KtaKNLVVcNf5
# QpS4f6/MsXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5h
# PP6HVRoqBYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZa
# e77homzx6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDHEzGsQnMUQKstS3zjn6SU
# 0NLEFNCetluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQY
# A2Xaz1fK9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu
# 974e9mGW7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgMGJj73CQvr+jqoWwx6Xdy
# eQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1whYQsV8UgEf4TIWGMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0
# UY3FjvPhwGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbFTr+IAnDSeg8TB9zfG/4y
# bknuopklbeGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv
# +y1AXJ5QcLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhBNtu57wPKXZ1EoNToBk8b
# A6839w119b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0
# jeOv5dUGMCYgZjvoTmgd45bqAwundmPlGur7eleWYedLQf7s3L5+qfaY/xEh/9uo
# 17SnM/gHVSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe76iYtL+mhxXPEpzda3bJl
# hPTOQ3KOEZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd071bemnou8A3rUZrdgKIa
# utsH7SHOiOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla7Xad9qrTYdT45VlCYTtB
# SY4oVRsedSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRu
# a3K0xivdtnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJFeW7r29XX+k0e4DnG6iB
# HKQjec6VNzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCO
# HPtgVdz9EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smOGTAiGA8yMDI0MTAyODA0MTQx
# N1oYDzIwMjQxMDI5MDQxNDE3WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyY4Z
# AgEAMAcCAQACAhoOMAcCAQACAhQzMAoCBQDqyt+ZAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAILIYM82Dr6OQATDiRWNUyg2wRlmEUSqsB1JFEW74Yh1oAnU
# ZKTsyjkj69LBZadyOOGYRONFXVrLg2UzYpOybudC6apWF7OLJj+IzfERluG9wFcn
# KZ9nQJX9wRpYQTjI+HOGDzbNDtv/AZsljeI3E8vdDX2JA5g0hP9oaR70WD/wOq0P
# R+x3mN5f1zd+9DKLNdoZln/PAUaAifsQHFa1V2SlrA1vNThkBK0cQg8uhyBgCm7A
# sGaKUPGTfqjRwamualhSXVVcTqzB0lgWaEJSYXahgaHSlmMTGuAFMVHbFFtVtBr3
# X8aXaLyVh40TpbLQLBYIg/b1tbXcNuF8uOw+/uIxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezgK6SC0JFSgAABAAAB7DAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCCvbQVfB+7CAnEVFmU4ujwHne1SHNxAM8LUn+O4mAJ/XDCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVqfTfIhx21QBBbKyo/xciQ
# IXaoMWULejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHs4CukgtCRUoAAAQAAAewwIgQgsLR3G5TmSmMHedwiqAcbeNSpfnby
# e1U8J5bYVqFB6MwwDQYJKoZIhvcNAQELBQAEggIAUaE0WuN/Rphw4IdHmcFvduDl
# +1JMGnrMCDl07Wunuy8nSuWXJlcbrgAKJ6jwITbszPgiTeFdm8Yw9M5NdBqGeIF8
# MD5IpgV17Vp1E+NjfttMGnPt1BohBuOWAk3fLHVvVg40sUEmfW5/10EixrbTn0B4
# FaOOvBc4vtBFusB73bUFvNLIN8NPxPUU5xcdNBNcy44PtDZ5Ebphh2lSkbi0jrF6
# i8zwhKspUBgqvtKr1Bc+DRgmYDVEhL/lPY1YJ//ntXiVXW1IBbC+zfcRNBV66yzN
# MZXt4KO/bTnFcpYHsFJdSh5n0MTm09Bh02LQOyDfP64pl9H6OMck3E94NEoboLyx
# ihkOefx/IorKw/UscrPoHkEL8OZ29w/mMhrb4e6V6lKOdMcX02UQiF5N41AiFAwR
# ADd+IOLvn0RJC526V9HjpSYe0anbKRb3EbVClJYYJa8OSTSozbv1yq0zJgeRFZs4
# Nxe7LuNaLFbgnyWCEnqfrO76UcXkvh84XtT/Iimuy8krn243jMveNYBGbttl990B
# uY6zIdtEcCXHXeuFsAzuYzvZ5VYjOMkgsdl4onI0AzglU6suhStHWYXhFjb7D8ep
# ylliIsGsItPRKoLkdEShpQuMZ+UlOAnhELapeti3I/9tBm5pd+spmXYVIG0uUFD6
# A0YgcTsCGEvEpGRyHzY=
# SIG # End signature block
|
combined_dataset/train/non-malicious/529.ps1
|
529.ps1
|
function Backup-AllSPSites{
[CmdletBinding()]
param(
[Parameter(Position=0, Mandatory=$true)]
[String]
$Path
)
if(-not (Get-PSSnapin "Microsoft.SharePoint.PowerShell" -ErrorAction SilentlyContinue)){Add-PSSnapin "Microsoft.SharePoint.PowerShell"}
$SPSites = $SPWebApp | Get-SPsite -Limit all
if(!(Test-Path -path $Path)){New-Item $Path -Type Directory}
foreach($SPSite in $SPSites){
Write-Progress -Activity "Backup SharePoint sites" -status $SPSite.HostName -percentComplete ([int]([array]::IndexOf($SPSites, $SPSite)/$SPSites.Count*100))
[uri]$SPSiteUrl = $SPSite.Url
$Name = $SPSiteUrl.Host + $(if($SPSiteUrl.LocalPath -ne "/"){$SPSiteUrl.LocalPath -replace "/","."})
$BackupPath = Join-Path -Path $Path -ChildPath $Name
if(!(Test-Path -path $BackupPath)){New-Item $BackupPath -Type Directory}
$FileName = $Name + "
$FilePath = Join-Path -Path $BackupPath -ChildPath $FileName
Write-host "Backup SharePoint Site: "$Name
Backup-SPSite -Identity $SPSite.Url -Path $FilePath -Force -ErrorAction SilentlyContinue
}
}
|
combined_dataset/train/non-malicious/sample_56_58.ps1
|
sample_56_58.ps1
|
#
# Copyright (c) Microsoft Corporation.
#
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
# THE SOFTWARE.
#
ConvertFrom-StringData @'
###PSLOC
StartGetPackageSource=Begin invoking Get-packageSource {0}
StartRegisterPackageSource=Begin invoking Register-Packagesource {0}
StartUnRegisterPackageSource=Begin invoking UnRegister-Packagesource {0}
PackageSourceFound=Package source '{0}' found
PackageSourceNotFound=Package source '{0}' not found
RegisteredSuccess=Successfully registered the package source {0}
UnRegisteredSuccess=Successfully unregistered the package source {0}
RegisterFailed=Failed to register the package source {0}. Message:{1}
UnRegisterFailed=Failed to register the package source {0}. Message:{1}
InDesiredState=Resource {0} is in the desired state. Required Ensure is {1} and actual Ensure is {2}
NotInDesiredState=Resource {0} is not in the desired state. Required Ensure is {1} and actual Ensure is {2}
NotInDesiredStateDuetoLocationMismatch=Resource {0} is not in the desired state. Required location is {1} and registered is {2}
NotInDesiredStateDuetoPolicyMismatch=Resource {0} is not in the desired state. Required installation policy is {1} and registered is {2}
InstallationPolicyWarning=Begin registering '{0}' to source location '{1}' with '{2}' policy"
###PSLOC
'@
# SIG # Begin signature block
# MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDFuym1v/NtoXxJ
# gjHj6HUj0SEsN/GPakQw8oc6hd5e16CCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIATZ
# A7LJPyCoN3GjbGxrPSVpT74sycop1NpRf9jCRv8CMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEACtoqy/WWybBNUCLlw1u6DqG2Fu+EEeRQW1JQ
# Zdr9OMJYuxRVMAxHUq8xQDps2gsnU1Z+Qh4/i6BCYy8uCHCe4DWvSelIK1O9kCbp
# DRgnK17saCkkFt2eLZkH+FkHFoI9bSbxS7kat2KkgkXeSytDi8rMDDnfTmBaolty
# sjb3fgnxlVmyxGYdRRcXb2aHxN7JMBfe2PGKy7NpIJMQrOSuXo7QicSAPGh8BUtl
# 21zVD8mGRm0YEiMDdm/jUZJG6w8G5HjzetPQaBx2QCye9w9ylH7RVi0X3Dwkrihi
# +Zp4iOoEdm5jKxc5rdx0LtTDxjUgdPU2a43xTjl1z5lNf6LsAaGCFykwghclBgor
# BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCClNLBeLvK+C3k4sPMPIoWhHibw8zcDrI2H
# Eyi/ga+gdgIGZnMTOJOzGBMyMDI0MDcxMTIxMjQ0MS4wNDhaMASAAgH0oIHYpIHV
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCM
# wl9YXo4AAQAAAdwwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjMxMDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvI
# syA1sjg9kSKJzelrUWF5ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0Ra
# GrU8EHydF8NxPMR2KVNiAtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYn
# iwKLPQLJ00EkXw5TSwfmJXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdF
# LKwo4BTlEgnvzeTfXukzX8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8Xl
# BQDVDX5JeMEsx7jgJDdEnK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7
# rSFvcLnwAqMdqcy/iqQPMlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg
# 8oWwXyiv3+bGB6dmdM61ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/Db
# USqW2RqTUa2O2KuvsyRGMEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+f
# dTw+geRn6Mo2S6+/bZEwS/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGV
# PRqkmz5UYz+R5ybMJWj+mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0ph
# jUTH2GChHIvE4SDSk2hwWP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNV
# HQ4EFgQU6HPSBd0OfEX3uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D
# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l
# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD
# ggIBANnrb8Ewr8eX/H1sKt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g
# 6Tf7tNx1q0NpKk1JTupUJfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXT
# MzxiewfErVLt8WefebncST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz
# /zEA1AbZL/viXtHmryA0CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+d
# h+UsFi0d4lkdcE+Zq5JNjIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YW
# zhP/5XQnYl03AfXErn+1Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1
# qy4y4vlVKaShtbdfgPyGeeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3h
# sHzG8n5u5CQajPwx9PzpsZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4Q
# wGf5B71x57OjaX53gxT4vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ06
# 2nyIZKnsXxzuKFb0TjXWw6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0
# bSrAlVeihcaG5F74SZT8FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIB
# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1
# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O
# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn
# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t
# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq
# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP
# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW
# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv
# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb
# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc
# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a
# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB
# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw
# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E
# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB
# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/
# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ
# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v
# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h
# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x
# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p
# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A
# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC
# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB
# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt
# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3
# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV
# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw
# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB
# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJf
# SbL3djnQEqaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAOo6kEcwIhgPMjAyNDA3MTIwMTA5MjdaGA8yMDI0MDcx
# MzAxMDkyN1owdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6jqQRwIBADAHAgEAAgIJ
# 8TAHAgEAAgIRsTAKAgUA6jvhxwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE
# AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB
# AJsO/FkzAGmyjaXQXVY6d7bJ+KD/cbM9U3gdMgi0O44Bd7Pd2Ue+M77nGnqcfJs4
# nspC/Gsf7plwrYHTP4TB6sQ1PEs8xTOZg9WUyTQCOAZycjsRACGmLAEFlicKdk2F
# lG0KDM2QEgOJe/vmpbJfSMKLi199Q5/7LO89sRGKVHW+MYIEDTCCBAkCAQEwgZMw
# fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
# TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAA
# AdwwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB
# BDAvBgkqhkiG9w0BCQQxIgQg27wo9UaDu6YcTM+JShpEeAKDVXHkWrnrAB/A0ef5
# 4y8wgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0
# Ou0IqxELDhX2TLylxIINNzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
# QSAyMDEwAhMzAAAB3MHgjMJfWF6OAAEAAAHcMCIEIF5qZr7hW7c1395SRXPLnPeJ
# NOFMpKYw9fXOhmlaWzpMMA0GCSqGSIb3DQEBCwUABIICAE4PsIFlyMEX9ic6gzXi
# VviShma6o35WjwR/yL+4mb1RGofi55gv+K4CIEuT0Bhnq+7Mhms6GcdJ8bCoAWRq
# PeV/HE6AyCdXqlTQIYsle2OtvwsKkDjLRwxA6npuREHzuukAgtUVI1WiRgdFRgsf
# QqiPGYsu1u86+6PT/OYyGU5cZQhvyl/pBRopRo6T5uY278ds4FAkg01GOU2nUUI0
# IhxH6HLku7EeCqscpCwxDUAm5iQicEKlZvGgyV7PbMe98dLTTaPaYKGn+rbt9OMG
# ktXnh6U0xikkPrdqUeBf0rI2Mf1hlrmb7v4qA0o7EJ9sunhWg8x9lyCJTuIfo0Mn
# czO+B2RzT/j3ZXo73Dek+qOscRIysL3uGR4SuVV/bzotI/7+agws3vAeBj9udbGH
# AMa2iwLatTNssrqHprU5IfCg7uuHTn8a3czJ3QUb0mOehfyVfgoeEOIgry0bIHsh
# EN3Na8B5W3w6exDHSezfBbjVvx4OELw+PxnUa3N7/e9mlMr8RojEsFmXXZBeDCBN
# Ib/gHvk+5swDBlx9vdqcOdERncQzXf+K05D2j9mxdlUto+0NUmwRImodQqiXddEB
# Jr9ZAur103BwuZjdjhFqW3C6+isfdMsQdd2XYU+nTZ6Joi6BFE2Q2umcDeIzavbD
# K7HpH/HfqRmyIh1O7h/4ebbp
# SIG # End signature block
|
combined_dataset/train/non-malicious/sample_48_66.ps1
|
sample_48_66.ps1
|
#
# Copyright (c) Microsoft Corporation.
#
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
# THE SOFTWARE.
#
ConvertFrom-StringData @'
###PSLOC
StartGetPackage=Begin invoking Get-package {0} using PSModulePath {1}.
PackageFound=Package '{0}' found.
PackageNotFound=Package '{0}' not found.
MultiplePackagesFound=More than one package found for package '{0}'.
StartTestPackage=Test-TargetResource calling Get-TargetResource using {0}.
InDesiredState=Resource {0} is in the desired state. Required Ensure is {1} and actual Ensure is {2}
NotInDesiredState=Resource {0} is not in the desired state. Required Ensure is {1} and actual Ensure is {2}
StartSetPackage=Set-TargetResource calling Test-TargetResource using {0}.
InstallPackageInSet=Calling Install-Package using {0}.
###PSLOC
'@
# SIG # Begin signature block
# MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDifaxdRJwwG4/T
# mYoBrfnu8FwGQbWKwvgWla/w4Db0OaCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPd8
# kkpzFIATEcTADMObzlhJCBAJSfQTq8SMXNqGe9g4MEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAiLavxAGZr1DkD/0dLruOrYZr1kw9q7UgI1gb
# 4vC+eVc8yMhUAjaW6Z0lPjKdYwfVmXyfIVxhoMwkNEBazfTZLAfz7P/8T0zTv1RH
# BrEsl5KsWQCzRMZZ+fFmrNCO3E0lFwxFVPfZ9b+Bl8lum5ik7x71uxhGTNgk5DPJ
# Nf9e89xVNe83cWp/AINyUlCvK6eXJpTKDn2J6tc3QelaRsgYdBlRR6YgcHXgCpP/
# hP4XEQ7ZoGiVJkOqUR6WLZ//C+V9jPr9jS4+N/wAHNSOJFrEsWyWLMvRpEHUKi74
# SGxrXNjQdKnZ/T134Kp1dwmnETaYix7AeCpw1gZGYFjrRtdOm6GCF5cwgheTBgor
# BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCCcYTOHxHWv0Jood+sflyNg9tH+QEHSffJ2
# PPSlPyrIiQIGZbwTcyL2GBMyMDI0MDIxNDIxMDAzNi4xMTdaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgAB
# AAAB6TANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w
# M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yr
# APJnV6A7aZYnTw/yx90u1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZ
# Y5O8PCBu7Gq+x5Xe6plQt4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7L
# MpKwIKQMwXDctYKvCyQy6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5Mx
# ylRdTS7E1Jocl30NgcBiJfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9d
# xsyvng0lUVY+urq/G8QRFoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTp
# w2I6ZWaIhPwMu5DvdkEGzV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0
# VJBSGV+h66ZcaUJOxpbSIjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDC
# xHG4mW3mpNQopM/U1WJnjssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOa
# mGfwvkIe7dkylzm8BeAUQC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKF
# I30u9YlxDTzAuLDK073cndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022
# +yPwclmykssk30a4Rp3v9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYj
# uIj0Wuv+jcjtB+xOMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe6
# 1AE90Ken2XPgQHJDiS4SbLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz
# /HciZooyeoAvkHQaHmLhwBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20
# QpHDEukwKR8kfaBEX83AyvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQg
# eEBr8E4K2wQ2WXI/ZJxZS/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/Jnj
# XMChnm9bLDD1waJ7TPp5wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6
# QjegHzndX/tZrY792dfRAXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWG
# XYJL5H6LNnKyXJVEw/1FbO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsH
# ptAvREqCc+/YxzhIKkA88Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFv
# NRhh8ZBAenn1pW+5UBGYz2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMl
# PG3YjuqFxidiIsoAw2+MhI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2j
# JWgq7VlBuP1BuXjZ3qgym9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQCraYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XcLnDAi
# GA8yMDI0MDIxNDA5NTEyNFoYDzIwMjQwMjE1MDk1MTI0WjB3MD0GCisGAQQBhFkK
# BAExLzAtMAoCBQDpdwucAgEAMAoCAQACAjugAgH/MAcCAQACAhPbMAoCBQDpeF0c
# AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh
# CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBALP8omWb2PQh+iKdjHCuhWSY
# BciaTIqlPVp7qxfy3heHKWWHKNBhTL5tuuPgyfG5295NKAeZDVpXDUeEb6eg+wnD
# 9XhjcF9B2CagwN52uHkIAbeKUHGBwRIcKlgjol1tBDTkc2MduEcx0WmbDyhZH/Fn
# 3kZL2+tKJrMndfg3RFvqlzfgAUr/zjgDE+6dzsVBjfoDR91seAAWbcRS5FfxlUEQ
# 72rpN2k0l8PDDDlgVp7wG0luoUObjqZzTtyM6BS4KeaFYh3sDT1N44T9uMQ5cgJe
# 00I1Xu0LPXjIKTG/m5CnAjPJUr5/7D/ZuN+SXkTVq7hifzqyr0v1DMw6UD43mfAx
# ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv
# bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0
# aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA
# AekPcTB+XfESNgABAAAB6TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD
# MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCB9dzBdbob35X8EGPWhUhoX
# /++1XBhXpOa7DEKlWyyXJTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQ
# kniXaTcmj1TKQWF+x2U4riVorGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQgvLAc
# pNo3AhZu10zp1tlBlpR/6AD373eKHr+IsbyFNiwwDQYJKoZIhvcNAQELBQAEggIA
# fnUcD3/zvg2z+Mjd1A9AHS4SX41AadTRO67XFZC9NKtqByAUY9ttV6FNBJly9U+T
# ju7mBoJmzXE5iZxHtMdOVYXmTY80G9lBLrPVNaOwQelKTJpOcfuAWWEfBR7jYdI7
# hZzIWuiCErepjufHrXOPrUj6lu93jLlT9/WYbV+zQzJWaKGEYaTJytakuuSUoYeb
# Ej7Hb4ZyablW7IBkmIywZfgpBxpn+W3obzMhkuiTrgbl01ljmlC6UO23kZI4Ash4
# 7E0QGmBvt7NjrR2ArzsH/1Aga/KKvphVr9nb/6lkwwKFne+FHX9E8v157SVyP3Vp
# y1IQ+xS/qTIqwDRxF5n6uMRy7u6fVk4gvFsrRpJqKDgmCyqs5oJTBBufj868tx2b
# rWIhrG1aBW8b0TCDye3ttgFuJoSL/X9OTes/linyMnns4JJ7knAE9IRt9hAfC7h6
# 3Svt4qRiQbtF7sV6IjWn23DtPQ0YDSS8VgGV5EPcCEd8oSRyYJzBa63xLvp0Elzo
# scdhFFGyXHoJhKFp2ODRlrYn2QMATe+u8cruQoxBcpxswsGz8/TUEeUBywqy/WeI
# qdDll7XA8Y8PEap6OR+Af4j6dQGPsf9gE2cfmvf6Y7d9opZiyuxjzrF0ti0cm4YM
# IHnIk0LLX5ygCBmmDpl4WE6VGF9+LVv5q7rBmv1xq/k=
# SIG # End signature block
|
combined_dataset/train/non-malicious/589.ps1
|
589.ps1
|
function Connect-PSS{
param (
[parameter(Mandatory=$true)]
[string[]]$Name,
[parameter(Mandatory=$false)]
[System.Management.Automation.Credential()]
$Credential = [System.Management.Automation.PSCredential]::Empty
)
$Servers = Get-RemoteConnection -Name $Name
foreach($Server in $Servers){
Remove-PSSession -ComputerName $Server.Name -ErrorAction SilentlyContinue
if($Credential.UserName -eq $null){
$Credential = Get-Credential $Server.User
}
$s = New-PSSession -Name $Server.Name -ComputerName $Server.Name -Credential $Credential
if ($Server.SnapIns -ne ""){
foreach($SnapIn in $Server.SnapIns){
Invoke-Command -Session $s -ScriptBlock {param ($Name) Add-PSSnapin -Name $Name} -ArgumentList $SnapIn
}
}
$Sessions += $s
}
$Sessions
}
|
combined_dataset/train/non-malicious/3646.ps1
|
3646.ps1
|
function Test-CreateJob
{
try
{
$a1 = Create-ElasticJobAgentTestEnvironment
Test-CreateJobWithDefaultParam $a1
Test-CreateJobWithParentObject $a1
Test-CreateJobWithParentResourceId $a1
Test-CreateJobWithPiping $a1
}
finally
{
Remove-ResourceGroupForTest $a1
}
}
function Test-GetJob
{
try
{
$a1 = Create-ElasticJobAgentTestEnvironment
Test-GetJobWithDefaultParam $a1
Test-GetJobWithParentObject $a1
Test-GetJobWithParentResourceId $a1
Test-GetJobWithPiping $a1
}
finally
{
Remove-ResourceGroupForTest $a1
}
}
function Test-UpdateJob
{
try
{
$a1 = Create-ElasticJobAgentTestEnvironment
Test-UpdateJobWithDefaultParam $a1
Test-UpdateJobWithInputObject $a1
Test-UpdateJobWithResourceId $a1
Test-UpdateJobWithPiping $a1
}
finally
{
Remove-ResourceGroupForTest $a1
}
}
function Test-RemoveJob
{
try
{
$a1 = Create-ElasticJobAgentTestEnvironment
Test-RemoveJobWithDefaultParam $a1
Test-RemoveJobWithInputObject $a1
Test-RemoveJobWithResourceId $a1
Test-RemoveJobWithPiping $a1
}
finally
{
Remove-ResourceGroupForTest $a1
}
}
function Test-CreateJobWithDefaultParam($a1)
{
$startTime = Get-Date "2018-05-31T23:58:57"
$endTime = $startTime.AddHours(5)
$startTimeIso8601 = Get-Date $startTime -format s
$endTimeIso8601 = Get-Date $endTime -format s
$jn1 = Get-JobName
$resp = New-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $jn1
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Description ""
$jn1 = Get-JobName
$resp = New-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $jn1 -Enable
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $true
Assert-AreEqual $resp.Description ""
$jn1 = Get-JobName
$resp = New-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $jn1 -Description $jn1 -RunOnce
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.Description $jn1
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $false
$jn1 = Get-JobName
$resp = New-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $jn1 -Description $jn1 -IntervalType Minute -IntervalCount 1
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.Description $jn1
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Interval "PT1M"
$jn1 = Get-JobName
$resp = New-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $jn1 -Description $jn1 -IntervalType Hour -IntervalCount 1
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.Description $jn1
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "PT1H"
Assert-AreEqual $resp.Enabled $false
$jn1 = Get-JobName
$resp = New-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $jn1 -Description $jn1 -IntervalType Day -IntervalCount 1
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.Description $jn1
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "P1D"
Assert-AreEqual $resp.Enabled $false
$jn1 = Get-JobName
$resp = New-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $jn1 -Description $jn1 -IntervalType Week -IntervalCount 1
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.Description $jn1
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "P1W"
Assert-AreEqual $resp.Enabled $false
$jn1 = Get-JobName
$resp = New-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $jn1 -Description $jn1 -IntervalType Month -IntervalCount 1
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.Description $jn1
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "P1M"
Assert-AreEqual $resp.Enabled $false
}
function Test-CreateJobWithParentObject($a1)
{
$startTime = Get-Date "2018-05-31T23:58:57"
$endTime = $startTime.AddHours(5)
$startTimeIso8601 = Get-Date $startTime -format s
$endTimeIso8601 = Get-Date $endTime -format s
$jn1 = Get-JobName
$resp = New-AzSqlElasticJob -ParentObject $a1 -Name $jn1
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Description ""
$jn1 = Get-JobName
$resp = New-AzSqlElasticJob -ParentObject $a1 -Name $jn1 -Enable
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $true
Assert-AreEqual $resp.Description ""
$jn1 = Get-JobName
$resp = New-AzSqlElasticJob -ParentObject $a1 -Name $jn1 -Description $jn1 -RunOnce
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.Description $jn1
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $false
$jn1 = Get-JobName
$resp = New-AzSqlElasticJob -ParentObject $a1 -Name $jn1 -Description $jn1 -IntervalType Minute -IntervalCount 1
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.Description $jn1
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Interval "PT1M"
$jn1 = Get-JobName
$resp = New-AzSqlElasticJob -ParentObject $a1 -Name $jn1 -Description $jn1 -IntervalType Hour -IntervalCount 1
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.Description $jn1
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "PT1H"
Assert-AreEqual $resp.Enabled $false
$jn1 = Get-JobName
$resp = New-AzSqlElasticJob -ParentObject $a1 -Name $jn1 -Description $jn1 -IntervalType Day -IntervalCount 1
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.Description $jn1
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "P1D"
Assert-AreEqual $resp.Enabled $false
$jn1 = Get-JobName
$resp = New-AzSqlElasticJob -ParentObject $a1 -Name $jn1 -Description $jn1 -IntervalType Week -IntervalCount 1
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.Description $jn1
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "P1W"
Assert-AreEqual $resp.Enabled $false
$jn1 = Get-JobName
$resp = New-AzSqlElasticJob -ParentObject $a1 -Name $jn1 -Description $jn1 -IntervalType Month -IntervalCount 1
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.Description $jn1
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "P1M"
Assert-AreEqual $resp.Enabled $false
}
function Test-CreateJobWithParentResourceId($a1)
{
$startTime = Get-Date "2018-05-31T23:58:57"
$endTime = $startTime.AddHours(5)
$startTimeIso8601 = Get-Date $startTime -format s
$endTimeIso8601 = Get-Date $endTime -format s
$jn1 = Get-JobName
$resp = New-AzSqlElasticJob -ParentResourceId $a1.ResourceId -Name $jn1
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Description ""
$jn1 = Get-JobName
$resp = New-AzSqlElasticJob -ParentResourceId $a1.ResourceId -Name $jn1 -Enable
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $true
Assert-AreEqual $resp.Description ""
$jn1 = Get-JobName
$resp = New-AzSqlElasticJob -ParentResourceId $a1.ResourceId -Name $jn1 -Description $jn1 -RunOnce
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.Description $jn1
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $false
$jn1 = Get-JobName
$resp = New-AzSqlElasticJob -ParentResourceId $a1.ResourceId -Name $jn1 -Description $jn1 -IntervalType Minute -IntervalCount 1
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.Description $jn1
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Interval "PT1M"
$jn1 = Get-JobName
$resp = New-AzSqlElasticJob -ParentResourceId $a1.ResourceId -Name $jn1 -Description $jn1 -IntervalType Hour -IntervalCount 1
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.Description $jn1
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "PT1H"
Assert-AreEqual $resp.Enabled $false
$jn1 = Get-JobName
$resp = New-AzSqlElasticJob -ParentResourceId $a1.ResourceId -Name $jn1 -Description $jn1 -IntervalType Day -IntervalCount 1
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.Description $jn1
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "P1D"
Assert-AreEqual $resp.Enabled $false
$jn1 = Get-JobName
$resp = New-AzSqlElasticJob -ParentResourceId $a1.ResourceId -Name $jn1 -Description $jn1 -IntervalType Week -IntervalCount 1
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.Description $jn1
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "P1W"
Assert-AreEqual $resp.Enabled $false
$jn1 = Get-JobName
$resp = New-AzSqlElasticJob -ParentResourceId $a1.ResourceId -Name $jn1 -Description $jn1 -IntervalType Month -IntervalCount 1
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.Description $jn1
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "P1M"
Assert-AreEqual $resp.Enabled $false
}
function Test-CreateJobWithPiping($a1)
{
$startTime = Get-Date "2018-05-31T23:58:57"
$endTime = $startTime.AddHours(5)
$startTimeIso8601 = Get-Date $startTime -format s
$endTimeIso8601 = Get-Date $endTime -format s
$jn1 = Get-JobName
$resp = $a1 | New-AzSqlElasticJob -Name $jn1
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Description ""
$jn1 = Get-JobName
$resp = $a1 | New-AzSqlElasticJob -Name $jn1 -Enable
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $true
Assert-AreEqual $resp.Description ""
$jn1 = Get-JobName
$resp = $a1 | New-AzSqlElasticJob -Name $jn1 -Description $jn1 -RunOnce
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.Description $jn1
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $false
$jn1 = Get-JobName
$resp = $a1 | New-AzSqlElasticJob -Name $jn1 -Description $jn1 -IntervalType Minute -IntervalCount 1
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.Description $jn1
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Interval "PT1M"
$jn1 = Get-JobName
$resp = $a1 | New-AzSqlElasticJob -Name $jn1 -Description $jn1 -IntervalType Hour -IntervalCount 1
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.Description $jn1
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "PT1H"
Assert-AreEqual $resp.Enabled $false
$jn1 = Get-JobName
$resp = $a1 | New-AzSqlElasticJob -Name $jn1 -Description $jn1 -IntervalType Day -IntervalCount 1
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.Description $jn1
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "P1D"
Assert-AreEqual $resp.Enabled $false
$jn1 = Get-JobName
$resp = $a1 | New-AzSqlElasticJob -Name $jn1 -Description $jn1 -IntervalType Week -IntervalCount 1
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.Description $jn1
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "P1W"
Assert-AreEqual $resp.Enabled $false
$jn1 = Get-JobName
$resp = $a1 | New-AzSqlElasticJob -Name $jn1 -Description $jn1 -IntervalType Month -IntervalCount 1
Assert-AreEqual $resp.JobName $jn1
Assert-AreEqual $resp.Description $jn1
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "P1M"
Assert-AreEqual $resp.Enabled $false
}
function Test-GetJobWithDefaultParam($a1)
{
$j1 = Create-JobForTest $a1
$j2 = Create-JobForTest $a1
$resp = Get-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $j1.JobName
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.ScheduleType "Once"
Assert-Null $resp.Interval
$resp = Get-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName
Assert-True { $resp.Count -ge 2 }
}
function Test-GetJobWithParentObject($a1)
{
$j1 = Create-JobForTest $a1
$j2 = Create-JobForTest $a1
$resp = Get-AzSqlElasticJob -ParentObject $a1 -Name $j1.JobName
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.ScheduleType "Once"
Assert-Null $resp.Interval
$resp = Get-AzSqlElasticJob -ParentObject $a1
Assert-True { $resp.Count -ge 2 }
}
function Test-GetJobWithParentResourceId($a1)
{
$j1 = Create-JobForTest $a1
$j2 = Create-JobForTest $a1
$j2 = Create-JobForTest $a1
$resp = Get-AzSqlElasticJob -ParentResourceId $a1.ResourceId -Name $j1.JobName
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.ScheduleType "Once"
Assert-Null $resp.Interval
$resp = Get-AzSqlElasticJob -ParentResourceId $a1.ResourceId
Assert-True { $resp.Count -ge 2 }
}
function Test-GetJobWithPiping($a1)
{
$j1 = Create-JobForTest $a1
$j2 = Create-JobForTest $a1
$resp = $a1 | Get-AzSqlElasticJob -Name $j1.JobName
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.ScheduleType "Once"
Assert-Null $resp.Interval
$resp = $a1 | Get-AzSqlElasticJob
Assert-True { $resp.Count -ge 2 }
}
function Test-UpdateJobWithDefaultParam($a1)
{
$startTime = Get-Date "2018-05-31T23:58:57"
$endTime = $startTime.AddHours(5)
$startTimeIso8601 = Get-Date $startTime -format s
$endTimeIso8601 = Get-Date $endTime -format s
$j1 = Create-JobForTest $a1
$resp = Set-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $j1.JobName -Enable
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $true
Assert-AreEqual $resp.Description ""
$resp = Set-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $j1.JobName
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Description ""
$resp = Set-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $j1.JobName -StartTime $startTimeIso8601 -EndTime $endTimeIso8601
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.ScheduleType "Once"
$respStartTimeIso8601 = Get-Date $resp.StartTime -format s
$respEndTimeIso8601 = Get-Date $resp.EndTime -format s
Assert-AreEqual $respStartTimeIso8601 $startTimeIso8601
Assert-AreEqual $respEndTimeIso8601 $endTimeIso8601
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Description ""
$resp = Set-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $j1.JobName -Description $j1.JobName
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Description $j1.JobName
$resp = Set-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $j1.JobName -RunOnce
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Description $j1.JobName
$resp = Set-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $j1.JobName -IntervalType Minute -IntervalCount 1
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Description $j1.JobName
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "PT1M"
$resp = Set-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $j1.JobName -Description $j1.JobName -IntervalType Hour -IntervalCount 1
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Description $j1.JobName
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "PT1H"
$resp = Set-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $j1.JobName -Description $j1.JobName -IntervalType Day -IntervalCount 1
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Description $j1.JobName
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "P1D"
$resp = Set-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $j1.JobName -Description $j1.JobName -IntervalType Week -IntervalCount 1
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Description $j1.JobName
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "P1W"
$resp = Set-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $j1.JobName -Description $j1.JobName -IntervalType Month -IntervalCount 1
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Description $j1.JobName
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "P1M"
}
function Test-UpdateJobWithInputObject($a1)
{
$startTime = Get-Date "2018-05-31T23:58:57"
$endTime = $startTime.AddHours(5)
$startTimeIso8601 = Get-Date $startTime -format s
$endTimeIso8601 = Get-Date $endTime -format s
$j1 = Create-JobForTest $a1
$resp = Set-AzSqlElasticJob -InputObject $j1 -Enable
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $true
Assert-AreEqual $resp.Description ""
$resp = Set-AzSqlElasticJob -InputObject $j1
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Description ""
$resp = Set-AzSqlElasticJob -InputObject $j1 -StartTime $startTimeIso8601 -EndTime $endTimeIso8601
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.ScheduleType "Once"
$respStartTimeIso8601 = Get-Date $resp.StartTime -format s
$respEndTimeIso8601 = Get-Date $resp.EndTime -format s
Assert-AreEqual $respStartTimeIso8601 $startTimeIso8601
Assert-AreEqual $respEndTimeIso8601 $endTimeIso8601
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Description ""
$resp = Set-AzSqlElasticJob -InputObject $j1 -Description $j1.JobName
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Description $j1.JobName
$resp = Set-AzSqlElasticJob -InputObject $j1 -RunOnce
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Description $j1.JobName
$resp = Set-AzSqlElasticJob -InputObject $j1 -IntervalType Minute -IntervalCount 1
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Description $j1.JobName
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "PT1M"
$resp = Set-AzSqlElasticJob -InputObject $j1 -Description $j1.JobName -IntervalType Hour -IntervalCount 1
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Description $j1.JobName
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "PT1H"
$resp = Set-AzSqlElasticJob -InputObject $j1 -Description $j1.JobName -IntervalType Day -IntervalCount 1
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Description $j1.JobName
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "P1D"
$resp = Set-AzSqlElasticJob -InputObject $j1 -Description $j1.JobName -IntervalType Week -IntervalCount 1
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Description $j1.JobName
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "P1W"
$resp = Set-AzSqlElasticJob -InputObject $j1 -Description $j1.JobName -IntervalType Month -IntervalCount 1
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Description $j1.JobName
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "P1M"
}
function Test-UpdateJobWithResourceId($a1)
{
$startTime = Get-Date "2018-05-31T23:58:57"
$endTime = $startTime.AddHours(5)
$startTimeIso8601 = Get-Date $startTime -format s
$endTimeIso8601 = Get-Date $endTime -format s
$j1 = Create-JobForTest $a1
$resp = $j1 | Set-AzSqlElasticJob -Enable
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $true
Assert-AreEqual $resp.Description ""
$resp = $j1 | Set-AzSqlElasticJob
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Description ""
$resp = $j1 | Set-AzSqlElasticJob -StartTime $startTimeIso8601 -EndTime $endTimeIso8601
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.ScheduleType "Once"
$respStartTimeIso8601 = Get-Date $resp.StartTime -format s
$respEndTimeIso8601 = Get-Date $resp.EndTime -format s
Assert-AreEqual $respStartTimeIso8601 $startTimeIso8601
Assert-AreEqual $respEndTimeIso8601 $endTimeIso8601
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Description ""
$resp = $j1 | Set-AzSqlElasticJob -Description $j1.JobName
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Description $j1.JobName
$resp = $j1 | Set-AzSqlElasticJob -RunOnce
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Description $j1.JobName
$resp = $j1 | Set-AzSqlElasticJob -IntervalType Minute -IntervalCount 1
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Description $j1.JobName
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "PT1M"
$resp = $j1 | Set-AzSqlElasticJob -Description $j1.JobName -IntervalType Hour -IntervalCount 1
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Description $j1.JobName
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "PT1H"
$resp = $j1 | Set-AzSqlElasticJob -Description $j1.JobName -IntervalType Day -IntervalCount 1
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Description $j1.JobName
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "P1D"
$resp = $j1 | Set-AzSqlElasticJob -Description $j1.JobName -IntervalType Week -IntervalCount 1
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Description $j1.JobName
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "P1W"
$resp = $j1 | Set-AzSqlElasticJob -Description $j1.JobName -IntervalType Month -IntervalCount 1
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Description $j1.JobName
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "P1M"
}
function Test-UpdateJobWithPiping($a1)
{
$startTime = Get-Date "2018-05-31T23:58:57"
$endTime = $startTime.AddHours(5)
$startTimeIso8601 = Get-Date $startTime -format s
$endTimeIso8601 = Get-Date $endTime -format s
$j1 = Create-JobForTest $a1
$resp = $j1 | Set-AzSqlElasticJob -Enable
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $true
Assert-AreEqual $resp.Description ""
$resp = $j1 | Set-AzSqlElasticJob
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Description ""
$resp = $j1 | Set-AzSqlElasticJob -StartTime $startTimeIso8601 -EndTime $endTimeIso8601
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.ScheduleType "Once"
$respStartTimeIso8601 = Get-Date $resp.StartTime -format s
$respEndTimeIso8601 = Get-Date $resp.EndTime -format s
Assert-AreEqual $respStartTimeIso8601 $startTimeIso8601
Assert-AreEqual $respEndTimeIso8601 $endTimeIso8601
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Description ""
$resp = $j1 | Set-AzSqlElasticJob -Description $j1.JobName
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Description $j1.JobName
$resp = $j1 | Set-AzSqlElasticJob -RunOnce
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.ScheduleType "Once"
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Description $j1.JobName
$resp = $j1 | Set-AzSqlElasticJob -IntervalType Minute -IntervalCount 1
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.Description $j1.JobName
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "PT1M"
$resp = $j1 | Set-AzSqlElasticJob -Description $j1.JobName -IntervalType Hour -IntervalCount 1
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Description $j1.JobName
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "PT1H"
$resp = $j1 | Set-AzSqlElasticJob -Description $j1.JobName -IntervalType Day -IntervalCount 1
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Description $j1.JobName
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "P1D"
$resp = $j1 | Set-AzSqlElasticJob -Description $j1.JobName -IntervalType Week -IntervalCount 1
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Description $j1.JobName
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "P1W"
$resp = $j1 | Set-AzSqlElasticJob -Description $j1.JobName -IntervalType Month -IntervalCount 1
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Description $j1.JobName
Assert-AreEqual $resp.ScheduleType "Recurring"
Assert-AreEqual $resp.Interval "P1M"
}
function Test-RemoveJobWithDefaultParam($a1)
{
$j1 = Create-JobForTest $a1
$resp = Remove-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $j1.JobName -Force
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.ScheduleType "Once"
Assert-Null $resp.Interval
}
function Test-RemoveJobWithInputObject($a1)
{
$j1 = Create-JobForTest $a1
$resp = Remove-AzSqlElasticJob -InputObject $j1 -Force
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.ScheduleType "Once"
Assert-Null $resp.Interval
}
function Test-RemoveJobWithResourceId($a1)
{
$j1 = Create-JobForTest $a1
$resp = Remove-AzSqlElasticJob -ResourceId $j1.ResourceId -Force
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.ScheduleType "Once"
Assert-Null $resp.Interval
}
function Test-RemoveJobWithPiping($a1)
{
$j1 = Create-JobForTest $a1
$resp = $j1 | Remove-AzSqlElasticJob -Force
Assert-AreEqual $resp.JobName $j1.JobName
Assert-AreEqual $resp.Enabled $false
Assert-AreEqual $resp.ScheduleType "Once"
Assert-Null $resp.Interval
Assert-Throws { $a1 | Get-AzSqlElasticJob -Name $j1.JobName }
}
|
combined_dataset/train/non-malicious/sample_60_88.ps1
|
sample_60_88.ps1
|
#
# Module manifest for module 'OCI.PSModules.Servicecatalog'
#
# Generated by: Oracle Cloud Infrastructure
#
#
@{
# Script module or binary module file associated with this manifest.
RootModule = 'assemblies/OCI.PSModules.Servicecatalog.dll'
# Version number of this module.
ModuleVersion = '83.3.0'
# Supported PSEditions
CompatiblePSEditions = 'Core'
# ID used to uniquely identify this module
GUID = 'a52480f0-e7d7-4302-871e-ae7f3a42fc02'
# Author of this module
Author = 'Oracle Cloud Infrastructure'
# Company or vendor of this module
CompanyName = 'Oracle Corporation'
# Copyright statement for this module
Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.'
# Description of the functionality provided by this module
Description = 'This modules provides Cmdlets for OCI Servicecatalog Service'
# Minimum version of the PowerShell engine required by this module
PowerShellVersion = '6.0'
# Name of the PowerShell host required by this module
# PowerShellHostName = ''
# Minimum version of the PowerShell host required by this module
# PowerShellHostVersion = ''
# Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# DotNetFrameworkVersion = ''
# Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only.
# ClrVersion = ''
# Processor architecture (None, X86, Amd64) required by this module
# ProcessorArchitecture = ''
# Modules that must be imported into the global environment prior to importing this module
RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.3.0'; })
# Assemblies that must be loaded prior to importing this module
RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Servicecatalog.dll'
# Script files (.ps1) that are run in the caller's environment prior to importing this module.
# ScriptsToProcess = @()
# Type files (.ps1xml) to be loaded when importing this module
# TypesToProcess = @()
# Format files (.ps1xml) to be loaded when importing this module
# FormatsToProcess = @()
# Modules to import as nested modules of the module specified in RootModule/ModuleToProcess
# NestedModules = @()
# Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export.
FunctionsToExport = '*'
# Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export.
CmdletsToExport = 'Get-OCIServicecatalog', 'Get-OCIServicecatalogApplicationsList',
'Get-OCIServicecatalogAssociation',
'Get-OCIServicecatalogAssociationsList',
'Get-OCIServicecatalogPrivateApplication',
'Get-OCIServicecatalogPrivateApplicationActionDownloadLogo',
'Get-OCIServicecatalogPrivateApplicationPackage',
'Get-OCIServicecatalogPrivateApplicationPackageActionDownloadConfig',
'Get-OCIServicecatalogPrivateApplicationPackagesList',
'Get-OCIServicecatalogPrivateApplicationsList',
'Get-OCIServicecatalogsList', 'Get-OCIServicecatalogWorkRequest',
'Get-OCIServicecatalogWorkRequestErrorsList',
'Get-OCIServicecatalogWorkRequestLogsList',
'Get-OCIServicecatalogWorkRequestsList',
'Invoke-OCIServicecatalogBulkReplaceServiceCatalogAssociations',
'Move-OCIServicecatalogCompartment',
'Move-OCIServicecatalogPrivateApplicationCompartment',
'New-OCIServicecatalog', 'New-OCIServicecatalogAssociation',
'New-OCIServicecatalogPrivateApplication',
'Remove-OCIServicecatalog', 'Remove-OCIServicecatalogAssociation',
'Remove-OCIServicecatalogPrivateApplication',
'Update-OCIServicecatalog',
'Update-OCIServicecatalogPrivateApplication'
# Variables to export from this module
VariablesToExport = '*'
# Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export.
AliasesToExport = '*'
# DSC resources to export from this module
# DscResourcesToExport = @()
# List of all modules packaged with this module
# ModuleList = @()
# List of all files packaged with this module
# FileList = @()
# Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell.
PrivateData = @{
PSData = @{
# Tags applied to this module. These help with module discovery in online galleries.
Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Servicecatalog'
# A URL to the license for this module.
LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt'
# A URL to the main website for this project.
ProjectUri = 'https://github.com/oracle/oci-powershell-modules/'
# A URL to an icon representing this module.
IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png'
# ReleaseNotes of this module
ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md'
# Prerelease string of this module
# Prerelease = ''
# Flag to indicate whether the module requires explicit user acceptance for install/update/save
# RequireLicenseAcceptance = $false
# External dependent modules of this module
# ExternalModuleDependencies = @()
} # End of PSData hashtable
} # End of PrivateData hashtable
# HelpInfo URI of this module
# HelpInfoURI = ''
# Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix.
# DefaultCommandPrefix = ''
}
|
combined_dataset/train/non-malicious/1409.ps1
|
1409.ps1
|
filter Unprotect-CString
{
[CmdletBinding(DefaultParameterSetName='DPAPI')]
param(
[Parameter(Mandatory = $true, Position=0, ValueFromPipeline = $true)]
[string]
$ProtectedString,
[Parameter(Mandatory=$true,ParameterSetName='RSAByCertificate')]
[Security.Cryptography.X509Certificates.X509Certificate2]
$Certificate,
[Parameter(Mandatory=$true,ParameterSetName='RSAByThumbprint')]
[string]
$Thumbprint,
[Parameter(Mandatory=$true,ParameterSetName='RSAByPath')]
[string]
$PrivateKeyPath,
[Parameter(ParameterSetName='RSAByPath')]
$Password,
[Parameter(ParameterSetName='RSAByCertificate')]
[Parameter(ParameterSetName='RSAByThumbprint')]
[Parameter(ParameterSetName='RSAByPath')]
[Switch]
$UseDirectEncryptionPadding,
[Parameter(Mandatory=$true,ParameterSetName='Symmetric')]
[object]
$Key,
[Switch]
$AsSecureString
)
Set-StrictMode -Version 'Latest'
Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState
Add-Type -AssemblyName 'System.Security'
[byte[]]$encryptedBytes = [Convert]::FromBase64String($ProtectedString)
if( $PSCmdlet.ParameterSetName -eq 'DPAPI' )
{
$decryptedBytes = [Security.Cryptography.ProtectedData]::Unprotect( $encryptedBytes, $null, 0 )
}
elseif( $PSCmdlet.ParameterSetName -like 'RSA*' )
{
if( $PSCmdlet.ParameterSetName -like '*ByPath' )
{
$passwordParam = @{ }
if( $Password )
{
$passwordParam = @{ Password = $Password }
}
$Certificate = Get-CCertificate -Path $PrivateKeyPath @passwordParam
if( -not $Certificate )
{
return
}
}
elseif( $PSCmdlet.ParameterSetName -like '*ByThumbprint' )
{
$certificates = Get-ChildItem -Path ('cert:\*\*\{0}' -f $Thumbprint) -Recurse
if( -not $certificates )
{
Write-Error ('Certificate ''{0}'' not found.' -f $Thumbprint)
return
}
$Certificate = $certificates | Where-Object { $_.HasPrivateKey } | Select-Object -First 1
if( -not $Certificate )
{
Write-Error ('Certificate ''{0}'' ({1}) doesn''t have a private key.' -f $certificates[0].Subject, $Thumbprint)
return
}
}
if( -not $Certificate.HasPrivateKey )
{
Write-Error ('Certificate ''{0}'' ({1}) doesn''t have a private key. When decrypting with RSA, secrets are encrypted with the public key, and decrypted with a private key.' -f $Certificate.Subject,$Certificate.Thumbprint)
return
}
if( -not $Certificate.PrivateKey )
{
Write-Error ('Certificate ''{0}'' ({1}) has a private key, but it is currently null or not set. This usually means your certificate was imported or generated incorrectly. Make sure you''ve generated an RSA public/private key pair and are using the private key. If the private key is in the Windows certificate stores, make sure it was imported correctly (`Get-ChildItem $pathToCert | Select-Object -Expand PrivateKey` isn''t null).' -f $Certificate.Subject,$Certificate.Thumbprint)
return
}
[Security.Cryptography.RSACryptoServiceProvider]$privateKey = $null
if( $Certificate.PrivateKey -isnot [Security.Cryptography.RSACryptoServiceProvider] )
{
Write-Error ('Certificate ''{0}'' (''{1}'') is not an RSA key. Found a private key of type ''{2}'', but expected type ''{3}''.' -f $Certificate.Subject,$Certificate.Thumbprint,$Certificate.PrivateKey.GetType().FullName,[Security.Cryptography.RSACryptoServiceProvider].FullName)
return
}
try
{
$privateKey = $Certificate.PrivateKey
$decryptedBytes = $privateKey.Decrypt( $encryptedBytes, (-not $UseDirectEncryptionPadding) )
}
catch
{
if( $_.Exception.Message -match 'Error occurred while decoding OAEP padding' )
{
[int]$maxLengthGuess = ($privateKey.KeySize - (2 * 160 - 2)) / 8
Write-Error (@'
Failed to decrypt string using certificate '{0}' ({1}). This can happen when:
* The string to decrypt is too long because the original string you encrypted was at or near the maximum allowed by your key's size, which is {2} bits. We estimate the maximum string size you can encrypt is {3} bytes. You may get this error even if the original encrypted string is within a couple bytes of that maximum.
* The string was encrypted with a different key
* The string isn't encrypted
{4}: {5}
'@ -f $Certificate.Subject, $Certificate.Thumbprint,$privateKey.KeySize,$maxLengthGuess,$_.Exception.GetType().FullName,$_.Exception.Message)
return
}
elseif( $_.Exception.Message -match '(Bad Data|The parameter is incorrect)\.' )
{
Write-Error (@'
Failed to decrypt string using certificate '{0}' ({1}). This usually happens when the padding algorithm used when encrypting/decrypting is different. Check the `-UseDirectEncryptionPadding` switch is the same for both calls to `Protect-CString` and `Unprotect-CString`.
{2}: {3}
'@ -f $Certificate.Subject,$Certificate.Thumbprint,$_.Exception.GetType().FullName,$_.Exception.Message)
return
}
Write-Error -Exception $_.Exception
return
}
}
elseif( $PSCmdlet.ParameterSetName -eq 'Symmetric' )
{
$Key = ConvertTo-Key -InputObject $Key -From 'Unprotect-CString'
if( -not $Key )
{
return
}
$aes = New-Object 'Security.Cryptography.AesCryptoServiceProvider'
try
{
$aes.Padding = [Security.Cryptography.PaddingMode]::PKCS7
$aes.KeySize = $Key.Length * 8
$aes.Key = $Key
$iv = New-Object 'Byte[]' $aes.IV.Length
[Array]::Copy($encryptedBytes,$iv,16)
$encryptedBytes = $encryptedBytes[16..($encryptedBytes.Length - 1)]
$encryptedStream = New-Object 'IO.MemoryStream' (,$encryptedBytes)
try
{
$decryptor = $aes.CreateDecryptor($aes.Key, $iv)
try
{
$cryptoStream = New-Object 'Security.Cryptography.CryptoStream' $encryptedStream,$decryptor,([Security.Cryptography.CryptoStreamMode]::Read)
try
{
$decryptedBytes = New-Object 'byte[]' ($encryptedBytes.Length)
[void]$cryptoStream.Read($decryptedBytes, 0, $decryptedBytes.Length)
}
finally
{
$cryptoStream.Dispose()
}
}
finally
{
$decryptor.Dispose()
}
}
finally
{
$encryptedStream.Dispose()
}
}
finally
{
$aes.Dispose()
}
}
try
{
if( $AsSecureString )
{
$secureString = New-Object 'Security.SecureString'
[char[]]$chars = [Text.Encoding]::UTF8.GetChars( $decryptedBytes )
for( $idx = 0; $idx -lt $chars.Count ; $idx++ )
{
$secureString.AppendChar( $chars[$idx] )
$chars[$idx] = 0
}
$secureString.MakeReadOnly()
return $secureString
}
else
{
[Text.Encoding]::UTF8.GetString( $decryptedBytes )
}
}
finally
{
[Array]::Clear( $decryptedBytes, 0, $decryptedBytes.Length )
}
}
|
combined_dataset/train/non-malicious/2109.ps1
|
2109.ps1
|
Describe 'Test for cmdlet to support Ordered Attribute on hash literal nodes' -Tags "CI" {
BeforeAll {
If (-not $IsCoreCLR) {
Get-WmiObject -Query "select * from win32_environment where name='TestWmiInstance'" | Remove-WmiObject
}
}
AfterAll {
If (-not $IsCoreCLR) {
Get-WmiObject -Query "select * from win32_environment where name='TestWmiInstance'" | Remove-WmiObject
}
}
It 'New-Object - Property Parameter Must take IDictionary' {
$a = new-object psobject -property ([ordered]@{one=1;two=2})
$a | Should -Not -BeNullOrEmpty
$a.one | Should -Be 1
}
Context 'Select-Xml cmdlet - Namespace parameter must take IDictionary' {
$script:a = $null
$helpXml = @'
<?xml version="1.0" encoding="utf-8" ?>
<helpItems schema="maml">
<command:command xmlns:maml="http://schemas.microsoft.com/maml/2004/10" xmlns:command="http://schemas.microsoft.com/maml/dev/command/2004/10" xmlns:dev="http://schemas.microsoft.com/maml/dev/2004/10">
<command:details>
<command:name>
Stop-Transcript
</command:name>
</command:details>
</command:command>
</helpItems>
'@
{ $script:a = select-xml -content $helpXml -xpath "//command:name" -namespace (
[ordered]@{command="http://schemas.microsoft.com/maml/dev/command/2004/10";
maml="http://schemas.microsoft.com/maml/2004/10";
dev="http://schemas.microsoft.com/maml/dev/2004/10"}) } | Should -Not -Throw
It '$a should not be $null' { $script:a | Should -Not -BeNullOrEmpty }
}
It 'Set-WmiInstance cmdlet - Argument parameter must take IDictionary' -skip:$IsCoreCLR {
$script:a = $null
{ $script:a = set-wmiinstance -class win32_environment -argument ([ordered]@{Name="TestWmiInstance";
VariableValue="testvalu234e";
UserName="<SYSTEM>"}) } | Should -Not -Throw
$script:a | Should -Not -BeNullOrEmpty
$script:a.Name | Should -BeExactly "TestWmiInstance"
}
Context 'Select-Object cmdlet - Property parameter (Calculated properties) must take IDictionary' {
$script:a = $null
{$script:a = Get-ChildItem | select-object -property Name, (
[ordered]@{Name="IsDirectory";
Expression ={$_.PSIsContainer}})} | Should -Not -Throw
It '$a should not be $null' { $script:a | Should -Not -BeNullOrEmpty }
}
}
|
combined_dataset/train/non-malicious/sample_48_95.ps1
|
sample_48_95.ps1
|
$url = $args[0]
Write-Host "Downloading Microsoft Edge Beta"
$wc = New-Object net.webclient
$msiInstaller = "$env:temp\microsoft-edge-beta.msi"
$wc.Downloadfile($url, $msiInstaller)
Write-Host "Installing Microsoft Edge Beta"
$arguments = "/i `"$msiInstaller`" /quiet"
Start-Process msiexec.exe -ArgumentList $arguments -Wait
Remove-Item $msiInstaller
$suffix = "\\Microsoft\\Edge Beta\\Application\\msedge.exe"
if (Test-Path "${env:ProgramFiles(x86)}$suffix") {
(Get-Item "${env:ProgramFiles(x86)}$suffix").VersionInfo
} elseif (Test-Path "${env:ProgramFiles}$suffix") {
(Get-Item "${env:ProgramFiles}$suffix").VersionInfo
} else {
write-host "ERROR: failed to install Microsoft Edge"
exit 1
}
# SIG # Begin signature block
# MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDf1+3BD26c9pYb
# sKMta6Lxdx8taMn7lUbKogdG2g1bIqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJbZXIB/gM5/cPnsr8OtbKo3
# gpf9C/rBj48NvJPCvGflMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAsN2vozfsSlN5XnIWA8BSmp2/wUwYt8Vb2s8xADWarKok61/Tsf1j8DRW
# O5cVl5p5A64A1jKct0QFkaF7oomtUxxVSzY7+dVCnXquG0gW0Vo3gv1eyd3A0rWA
# zJcDDfa7X+iFrQvbngCHmE2OTEYqE+fPeAYPeiLlnSh5DdmPqNN322r5qUe60U0C
# RIPhWuAT6V/1gZ7jGI5nl6AOyilQUmo+E/VzsSB1RwUaarn0q5iRHOQqGkXmHVfS
# ycvGOQpucRfHksQn2hDWZhrqNCF/cQkV9e10Js45fQj5KuY4lFBqfpuP/4seI4Ge
# Cy0RvcC0MGhiSukWpeQT6b1WJ/lFtqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC
# FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq
# hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAasvBmYFxS6CSdO5aBSnuP7GqSbZJAx8C8LnV5J8KLcwIGZjOp34gg
# GBMyMDI0MDUxNjIwMjk1NC42NjZaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO
# OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT
# ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ
# KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx
# MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl
# cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC
# RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b
# cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E
# 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2
# aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er
# bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf
# ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog
# 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy
# kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy
# 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv
# mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+
# yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt
# vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV
# izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD
# VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j
# cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG
# CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw
# MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD
# CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4
# 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r
# cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W
# JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq
# bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt
# ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg
# ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ
# CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz
# FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn
# boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58
# 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv
# uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ
# mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh
# dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1
# WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB
# BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK
# NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg
# fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp
# rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d
# vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9
# 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR
# Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu
# qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO
# ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb
# oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6
# bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t
# AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW
# BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb
# UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz
# aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku
# aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA
# QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2
# VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu
# bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw
# LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93
# d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q
# XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6
# U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt
# I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis
# 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp
# kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0
# sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e
# W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ
# sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7
# Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0
# dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ
# tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh
# bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow
# ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy
# dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk
# fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD
# Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF
# AOnwnAIwIhgPMjAyNDA1MTYyMjUxNDZaGA8yMDI0MDUxNzIyNTE0NlowdDA6Bgor
# BgEEAYRZCgQBMSwwKjAKAgUA6fCcAgIBADAHAgEAAgIRpjAHAgEAAgIRbzAKAgUA
# 6fHtggIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID
# B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAI4pnLR+QYde5f+qZ1u4
# h+ow3MB7jtruhTIST+f8uLk1SBLm0niiqCuxdSUDAch40loud3DfBZ54rDiV7Hu2
# mhY8FHfZXI273lSdVTsgc2/aGRpFoT66b7nNxxQdgs/ULZYKHpGw6pPOhPyWkG6B
# S8tSffAJU3wB7PyOmV+K12zQMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB
# BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx
# IgQgXyw9PMUuKVWZazS/oqzjwYp3E1N4qQepIXCMsXF1S6cwgfoGCyqGSIb3DQEJ
# EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9
# xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V
# yVoA0RGxAAEAAAHaMCIEIMUK/484Qzmn64FWwcwP/fhtuvZmZGOkRd8YJwNgaiE8
# MA0GCSqGSIb3DQEBCwUABIICAFSeqo7a/Nwid2ZfJ9bg4YPpy9vudJH8j1OcacRr
# OLef8+mRR89dwFOt2UQZ88rd+9fAGP7an+S4eXYeepqCqmyvBunIHg5xlm5kZuri
# rC0eTLzJpyyvGFOqkNYH88bRY/dWhZjH7nuiTMTa3WWNU8Q8MWHarrN+DeWQusJc
# 1SM4yS8rs8g494iKhRR00O3QDTtjcPe7ab8cGqtTAFKkP7tSejphYwwywvu6c18L
# 7sg7aEcVDv0gdYgikAdTz3u6xEugPevMydT+5noNTrrAjE8hQS5AezkS4yENWLjH
# SscwSC9N7fuPSZK7JpZ3HgvJc0ozSWQv9S5gCLejIWlcTyATihZDtHyojMNkoJQq
# oHWMOAx8OMyU+CTrZnT676CRnOi+NZpu3z4aG5W+9xvr8zwpgKk6dKvMi27Fj0Ub
# npvlSg5HLqxnYI4Ed/qbDFc4SjMoVNFawXcSfzUNIV4yap3UEG35NpNeRB4CPO6g
# MInfhwMQEFdQORf26+m1PN+xqJB75YvsPxTXZei9KyvEflKpvwGDc8Kt6xFQ0fxb
# FN+t84uJoEcooBpSPcpi1WcFONnibJ2vadHcxtcELcDwysRYUvPhdt2wNImswFke
# 6mtug80DMVE456MHUhhujObKdo6myjkhPqd5HuGcUiqwuwlwukFCiwq6r3fDmxAB
# ecyw
# SIG # End signature block
|
combined_dataset/train/non-malicious/4086.ps1
|
4086.ps1
|
function Invoke-MSI {
[CmdletBinding()]
param
(
[string]
$DisplayName,
[switch]
$Install,
[string]
$LogDirectory,
[switch]
$Logging,
[ValidateNotNullOrEmpty()][String]
$MSIFileName,
[string]
$MSIFilePath,
[ValidateNotNullOrEmpty()][String]
$Switches = '/qb- /norestart',
[string]
$GUID,
[switch]
$Repair,
[switch]
$Uninstall,
[switch]
$UninstallByName
)
function Get-MSIDatabase {
[CmdletBinding()][OutputType([string])]
param
(
[ValidateNotNullOrEmpty()][string]
$Property,
[ValidateNotNullOrEmpty()][string]
$MSI,
[ValidateNotNullOrEmpty()][string]
$Path
)
$MSIFile = Get-Item $Path$MSI
try {
$WindowsInstaller = New-Object -ComObject WindowsInstaller.Installer
$MSIDatabase = $WindowsInstaller.GetType().InvokeMember("OpenDatabase", "InvokeMethod", $Null, $WindowsInstaller, @($MSIFile.FullName, 0))
$Query = "SELECT Value FROM Property WHERE Property = '$($Property)'"
$View = $MSIDatabase.GetType().InvokeMember("OpenView", "InvokeMethod", $null, $MSIDatabase, ($Query))
$View.GetType().InvokeMember("Execute", "InvokeMethod", $null, $View, $null)
$Record = $View.GetType().InvokeMember("Fetch", "InvokeMethod", $null, $View, $null)
$DataField = $Record.GetType().InvokeMember("StringData", "GetProperty", $null, $Record, 1)
Return $DataField
} catch {
Write-Output $_.Exception.Message
Exit 1
}
}
function Get-DisplayNameFromRegistry {
[CmdletBinding()][OutputType([string])]
param
(
[ValidateNotNullOrEmpty()][string]
$GUID
)
$OSArchitecture = Get-WmiObject -Class Win32_OperatingSystem | Select-Object OSArchitecture
$Registry = Get-ChildItem Registry::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
If ($OSArchitecture.OSArchitecture -eq "64-bit") {
$Registry += Get-ChildItem Registry::HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall
}
$Registry = $Registry | Where-Object { $_.PSChildName -eq $GUID }
$Registry = "Registry::" + $Registry.Name
$Registry = Get-ItemProperty $Registry -ErrorAction SilentlyContinue
$DisplayName = $Registry.DisplayName
Return $DisplayName
}
$OSArchitecture = Get-WmiObject -Class Win32_OperatingSystem | Select-Object OSArchitecture
$Executable = $Env:windir + "\system32\msiexec.exe"
If ($MSIFilePath -eq "") {
If (($GUID -eq $null) -or ($GUID -eq "")) {
$MSIFilePath = (split-path $SCRIPT:MyInvocation.MyCommand.Path -parent) + "\"
}
} else {
If ($MSIFilePath[$MSIFilePath.Length - 1] -ne '\') {
$MSIFilePath += '\'
}
}
If ($Install.IsPresent) {
$Parameters = "/i" + [char]32 + [char]34 + $MSIFilePath + $MSIFileName + [char]34
$DisplayName = Get-MSIDatabase -Property "ProductName" -MSI $MSIFileName -Path $MSIFilePath
Write-Host "Installing"$DisplayName"....." -NoNewline
} elseif ($Uninstall.IsPresent) {
If ($GUID -ne "") {
$Parameters = "/x" + [char]32 + $GUID
$DisplayName = Get-DisplayNameFromRegistry -GUID $GUID
} else {
$Parameters = "/x" + [char]32 + [char]34 + $MSIFilePath + $MSIFileName + [char]34
$DisplayName = Get-MSIDatabase -Property "ProductName" -MSI $MSIFileName -Path $MSIFilePath
}
If ($DisplayName -ne "") {
Write-Host "Uninstalling"$DisplayName"....." -NoNewline
} else {
Write-Host "Uninstalling"$GUID"....." -NoNewline
}
} elseif ($UninstallByName.IsPresent) {
$Uninstaller = Get-ChildItem "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" -Recurse -ErrorAction SilentlyContinue
If ($OSArchitecture.OSArchitecture -eq "64-Bit") {
$Uninstaller += Get-ChildItem "HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall" -Recurse -ErrorAction SilentlyContinue
}
$SearchName = "*" + $DisplayName + "*"
$IdentifyingNumber = get-wmiobject win32_product | where-object { $_.Name -like $SearchName }
[string]$GUID = $IdentifyingNumber.IdentifyingNumber
$Parameters = "/x" + [char]32 + $GUID
$DisplayName = Get-DisplayNameFromRegistry -GUID $GUID
If ($DisplayName -ne "") {
Write-Host "Uninstalling"$DisplayName"....." -NoNewline
} else {
Write-Host "Uninstalling"$GUID"....." -NoNewline
}
} elseif ($Repair.IsPresent) {
If ($GUID -ne "") {
$Parameters = "/faumsv" + [char]32 + $GUID
$DisplayName = Get-DisplayNameFromRegistry -GUID $GUID
} else {
$Parameters = "/faumsv" + [char]32 + [char]34 + $MSIFilePath + $MSIFileName + [char]34
$DisplayName = Get-MSIDatabase -Property "ProductName" -MSI $MSIFileName -Path $MSIFilePath
}
Write-Host "Repairing"$DisplayName"....." -NoNewline
} else {
Write-Host "Specify to install, repair, or uninstall the MSI" -ForegroundColor Red
Exit 1
}
If ($Logging.IsPresent) {
If ($LogDirectory -eq "") {
$Parameters += [char]32 + "/lvx " + [char]34 + $env:TEMP + "\" + $DisplayName + ".log" + [char]34
} else {
If ($LogDirectory[$LogDirectory.count - 1] -ne "\") {
$LogDirectory += "\"
}
$Parameters += [char]32 + "/lvx " + [char]34 + $LogDirectory + $DisplayName + ".log" + [char]34
}
}
$Parameters += [char]32 + $Switches
$ErrCode = (Start-Process -FilePath $Executable -ArgumentList $Parameters -WindowStyle Minimized -Wait -Passthru).ExitCode
If (($ErrCode -eq 0) -or ($ErrCode -eq 3010)) {
If ($GUID -eq "") {
[string]$ProductCode = Get-MSIDatabase -Property "ProductCode" -MSI $MSIFileName -Path $MSIFilePath
} else {
[string]$ProductCode = $GUID
}
$ProductCode = $ProductCode.Trim()
$Registry = Get-ChildItem Registry::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
If ($OSArchitecture.OSArchitecture -eq "64-bit") {
$Registry += Get-ChildItem Registry::HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall
}
If (($Install.IsPresent) -or ($Repair.IsPresent)) {
If ($ProductCode -in $Registry.PSChildName) {
Write-Host "Success" -ForegroundColor Yellow
} else {
Write-Host "Failed" -ForegroundColor Red
}
} elseif (($Uninstall.IsPresent) -or ($UninstallByName.IsPresent)) {
If ($ProductCode -in $Registry.PSChildName) {
Write-Host "Failed" -ForegroundColor Red
} else {
Write-Host "Success" -ForegroundColor Yellow
}
}
} elseif ($ErrCode -eq 1605) {
Write-Host "Application already uninstalled" -ForegroundColor Yellow
} else {
Write-Host "Failed with error code "$ErrCode -ForegroundColor Red
}
}
Invoke-MSI -Install -MSIFileName "ndOfficeSetup.msi" -Switches "ADDLOCAL=Word,Excel,PowerPoint,Outlook,AdobeAcrobatIntegration,AdobeReaderIntegration /qb- /norestart"
Invoke-MSI -Repair -GUID "{A67CA551-ADAE-4C9B-B09D-38D84044FAB8}"
Invoke-MSI -UninstallByName "ndOffice" -Logging
|
combined_dataset/train/non-malicious/sample_39_63.ps1
|
sample_39_63.ps1
|
"use strict";(self.webpackChunk_ad_qx_lc_designer=self.webpackChunk_ad_qx_lc_designer||[]).push([[7319],{77319:function(w,i,n){n.r(i),n.d(i,{conf:function(){return y},language:function(){return k}});var l=n(90082);var d=Object.defineProperty,p=Object.getOwnPropertyDescriptor,h=Object.getOwnPropertyNames,u=Object.prototype.hasOwnProperty,m=(t,e,o,c)=>{if(e&&typeof e=="object"||typeof e=="function")for(let r of h(e))!u.call(t,r)&&r!==o&&d(t,r,{get:()=>e[r],enumerable:!(c=p(e,r))||c.enumerable});return t},b=(t,e,o)=>(m(t,e,"default"),o&&m(o,e,"default")),a={};b(a,l);var s=["area","base","br","col","embed","hr","img","input","keygen","link","menuitem","meta","param","source","track","wbr"],y={wordPattern:/(-?\d*\.\d\w*)|([^\`\~\!\@\$\^\&\*\(\)\-\=\+\[\{\]\}\\\|\;\:\'\"\,\.\<\>\/\s]+)/g,comments:{blockComment:["<!--","-->"]},brackets:[["<!--","-->"],["<",">"],["{","}"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}],surroundingPairs:[{open:'"',close:'"'},{open:"'",close:"'"},{open:"<",close:">"}],onEnterRules:[{beforeText:new RegExp(`<(?!(?:${s.join("|")}))(\\w[\\w\\d]*)([^/>]*(?!/)>)[^<]*$`,"i"),afterText:/^<\/(\w[\w\d]*)\s*>$/i,action:{indentAction:a.languages.IndentAction.IndentOutdent}},{beforeText:new RegExp(`<(?!(?:${s.join("|")}))(\\w[\\w\\d]*)([^/>]*(?!/)>)[^<]*$`,"i"),action:{indentAction:a.languages.IndentAction.Indent}}]},k={defaultToken:"",tokenPostfix:"",tokenizer:{root:[[/@@@@/],[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.root"}],[/<!DOCTYPE/,"metatag.html","@doctype"],[/<!--/,"comment.html","@comment"],[/(<)([\w\-]+)(\/>)/,["delimiter.html","tag.html","delimiter.html"]],[/(<)(script)/,["delimiter.html",{token:"tag.html",next:"@script"}]],[/(<)(style)/,["delimiter.html",{token:"tag.html",next:"@style"}]],[/(<)([:\w\-]+)/,["delimiter.html",{token:"tag.html",next:"@otherTag"}]],[/(<\/)([\w\-]+)/,["delimiter.html",{token:"tag.html",next:"@otherTag"}]],[/</,"delimiter.html"],[/[ \t\r\n]+/],[/[^<@]+/]],doctype:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.comment"}],[/[^>]+/,"metatag.content.html"],[/>/,"metatag.html","@pop"]],comment:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.comment"}],[/-->/,"comment.html","@pop"],[/[^-]+/,"comment.content.html"],[/./,"comment.content.html"]],otherTag:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.otherTag"}],[/\/?>/,"delimiter.html","@pop"],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/[ \t\r\n]+/]],script:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.script"}],[/type/,"attribute.name","@scriptAfterType"],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.text/javascript",nextEmbedded:"text/javascript"}],[/[ \t\r\n]+/],[/(<\/)(script\s*)(>)/,["delimiter.html","tag.html",{token:"delimiter.html",next:"@pop"}]]],scriptAfterType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.scriptAfterType"}],[/=/,"delimiter","@scriptAfterTypeEquals"],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.text/javascript",nextEmbedded:"text/javascript"}],[/[ \t\r\n]+/],[/<\/script\s*>/,{token:"@rematch",next:"@pop"}]],scriptAfterTypeEquals:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.scriptAfterTypeEquals"}],[/"([^"]*)"/,{token:"attribute.value",switchTo:"@scriptWithCustomType.$1"}],[/'([^']*)'/,{token:"attribute.value",switchTo:"@scriptWithCustomType.$1"}],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.text/javascript",nextEmbedded:"text/javascript"}],[/[ \t\r\n]+/],[/<\/script\s*>/,{token:"@rematch",next:"@pop"}]],scriptWithCustomType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.scriptWithCustomType.$S2"}],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.$S2",nextEmbedded:"$S2"}],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/[ \t\r\n]+/],[/<\/script\s*>/,{token:"@rematch",next:"@pop"}]],scriptEmbedded:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInEmbeddedState.scriptEmbedded.$S2",nextEmbedded:"@pop"}],[/<\/script/,{token:"@rematch",next:"@pop",nextEmbedded:"@pop"}]],style:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.style"}],[/type/,"attribute.name","@styleAfterType"],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/>/,{token:"delimiter.html",next:"@styleEmbedded.text/css",nextEmbedded:"text/css"}],[/[ \t\r\n]+/],[/(<\/)(style\s*)(>)/,["delimiter.html","tag.html",{token:"delimiter.html",next:"@pop"}]]],styleAfterType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.styleAfterType"}],[/=/,"delimiter","@styleAfterTypeEquals"],[/>/,{token:"delimiter.html",next:"@styleEmbedded.text/css",nextEmbedded:"text/css"}],[/[ \t\r\n]+/],[/<\/style\s*>/,{token:"@rematch",next:"@pop"}]],styleAfterTypeEquals:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.styleAfterTypeEquals"}],[/"([^"]*)"/,{token:"attribute.value",switchTo:"@styleWithCustomType.$1"}],[/'([^']*)'/,{token:"attribute.value",switchTo:"@styleWithCustomType.$1"}],[/>/,{token:"delimiter.html",next:"@styleEmbedded.text/css",nextEmbedded:"text/css"}],[/[ \t\r\n]+/],[/<\/style\s*>/,{token:"@rematch",next:"@pop"}]],styleWithCustomType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.styleWithCustomType.$S2"}],[/>/,{token:"delimiter.html",next:"@styleEmbedded.$S2",nextEmbedded:"$S2"}],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/[ \t\r\n]+/],[/<\/style\s*>/,{token:"@rematch",next:"@pop"}]],styleEmbedded:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInEmbeddedState.styleEmbedded.$S2",nextEmbedded:"@pop"}],[/<\/style/,{token:"@rematch",next:"@pop",nextEmbedded:"@pop"}]],razorInSimpleState:[[/@\*/,"comment.cs","@razorBlockCommentTopLevel"],[/@[{(]/,"metatag.cs","@razorRootTopLevel"],[/(@)(\s*[\w]+)/,["metatag.cs",{token:"identifier.cs",switchTo:"@$S2.$S3"}]],[/[})]/,{token:"metatag.cs",switchTo:"@$S2.$S3"}],[/\*@/,{token:"comment.cs",switchTo:"@$S2.$S3"}]],razorInEmbeddedState:[[/@\*/,"comment.cs","@razorBlockCommentTopLevel"],[/@[{(]/,"metatag.cs","@razorRootTopLevel"],[/(@)(\s*[\w]+)/,["metatag.cs",{token:"identifier.cs",switchTo:"@$S2.$S3",nextEmbedded:"$S3"}]],[/[})]/,{token:"metatag.cs",switchTo:"@$S2.$S3",nextEmbedded:"$S3"}],[/\*@/,{token:"comment.cs",switchTo:"@$S2.$S3",nextEmbedded:"$S3"}]],razorBlockCommentTopLevel:[[/\*@/,"@rematch","@pop"],[/[^*]+/,"comment.cs"],[/./,"comment.cs"]],razorBlockComment:[[/\*@/,"comment.cs","@pop"],[/[^*]+/,"comment.cs"],[/./,"comment.cs"]],razorRootTopLevel:[[/\{/,"delimiter.bracket.cs","@razorRoot"],[/\(/,"delimiter.parenthesis.cs","@razorRoot"],[/[})]/,"@rematch","@pop"],{include:"razorCommon"}],razorRoot:[[/\{/,"delimiter.bracket.cs","@razorRoot"],[/\(/,"delimiter.parenthesis.cs","@razorRoot"],[/\}/,"delimiter.bracket.cs","@pop"],[/\)/,"delimiter.parenthesis.cs","@pop"],{include:"razorCommon"}],razorCommon:[[/[a-zA-Z_]\w*/,{cases:{"@razorKeywords":{token:"keyword.cs"},"@default":"identifier.cs"}}],[/[\[\]]/,"delimiter.array.cs"],[/[ \t\r\n]+/],[/\/\/.*$/,"comment.cs"],[/@\*/,"comment.cs","@razorBlockComment"],[/"([^"]*)"/,"string.cs"],[/'([^']*)'/,"string.cs"],[/(<)([\w\-]+)(\/>)/,["delimiter.html","tag.html","delimiter.html"]],[/(<)([\w\-]+)(>)/,["delimiter.html","tag.html","delimiter.html"]],[/(<\/)([\w\-]+)(>)/,["delimiter.html","tag.html","delimiter.html"]],[/[\+\-\*\%\&\|\^\~\!\=\<\>\/\?\;\:\.\,]/,"delimiter.cs"],[/\d*\d+[eE]([\-+]?\d+)?/,"number.float.cs"],[/\d*\.\d+([eE][\-+]?\d+)?/,"number.float.cs"],[/0[xX][0-9a-fA-F']*[0-9a-fA-F]/,"number.hex.cs"],[/0[0-7']*[0-7]/,"number.octal.cs"],[/0[bB][0-1']*[0-1]/,"number.binary.cs"],[/\d[\d']*/,"number.cs"],[/\d/,"number.cs"]]},razorKeywords:["abstract","as","async","await","base","bool","break","by","byte","case","catch","char","checked","class","const","continue","decimal","default","delegate","do","double","descending","explicit","event","extern","else","enum","false","finally","fixed","float","for","foreach","from","goto","group","if","implicit","in","int","interface","internal","into","is","lock","long","nameof","new","null","namespace","object","operator","out","override","orderby","params","private","protected","public","readonly","ref","return","switch","struct","sbyte","sealed","short","sizeof","stackalloc","static","string","select","this","throw","true","try","typeof","uint","ulong","unchecked","unsafe","ushort","using","var","virtual","volatile","void","when","while","where","yield","model","inject"],escapes:/\\(?:[abfnrtv\\"']|x[0-9A-Fa-f]{1,4}|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})/}}}]);
|
combined_dataset/train/non-malicious/New-Script 2.ps1
|
New-Script 2.ps1
|
## New-Script function
## Creates a new script from the most recent commands in history
##################################################################################################
## Example Usage:
## New-Script ScriptName 4
## creates a script from the most recent four commands
## New-Script Clipboard -id 10,11,12,14
## sends the the specified commands from the history to the clipboard
## Notepad (New-Script ScriptName 20)
## sends the most recent twenty commands to the script, and then opens the script in notepad
##################################################################################################
## As a tip, I use a prompt function something like this to get the ID into the prompt:
##
## function prompt {
## return "`[{0}]: " -f ((get-history -count 1).Id + 1)
## }
##################################################################################################
## Revision History
## 1.0 - initial release
## 1.1 - fix bug with specifying multiple IDs
## 2.0 - use the current folder as the default instead of throwing an exception
## - prompt to overwrite if not -Force
##################################################################################################
#function New-Script {
param(
[string]$script=(Read-Host "A name for your script"),
[int]$count=1,
[int[]]$id=@((Get-History -count 1| Select Id).Id),
[switch]$Force
)
# if there's only one id, then the count counts, otherwise we just use the ids
if($id.Count -eq 1) { 1..($count-1)|%{ $id += $id[-1]-1 } }
# Get the CommandLines from the history items...
$commands = Get-History -id $id | &{process{ $_.CommandLine }}
if($script -eq "clipboard") {
if( @(Get-PSSnapin -Name "pscx").Count ) {
$commands | out-clipboard
} elseif(@(gcm clip.exe).Count) {
$commands | clip
}
} else {
$folder = Split-Path $script
if(!$folder) {
# default to putting it in my "Windows PowerShell\\scripts" folder which I have in my path...
$folder = Join-Path (Split-Path $Profile) "Scripts"
}
if(!(Test-Path $folder)) {
# if that fails, put it in the current path (on the file system)
$folder = Get-Location -PSProvider "FileSystem"
}
# add the ps1 extension if it's not already there ...
$file = Join-Path $folder (Split-Path $script -leaf)
if(!(([IO.FileInfo]$file).Extension)) {
$file = "$file.ps1"
}
# write an error message if the file already exists, unless -Force
if((Test-Path $file) -and (!$Force)) {
Write-Error "The file already exists, do you want to overwrite?"
}
# and confirm before setting the content if the file already exists, unless -Force
$commands | set-content $file -Confirm:((Test-Path $file) -and (!$Force))
Get-Item $file
}
#}
|
combined_dataset/train/non-malicious/1637.ps1
|
1637.ps1
|
function Get-BootConfigurationData {
param (
$bcdeditpath = (Join-Path $env:SystemRoot 'system32\bcdedit.exe')
)
$bootconfigurationdata = iex $bcdeditpath
$bootconfigurationdata += ''
$hash = $null
$result = foreach ($line in $bootconfigurationdata) {
if ($line -eq '') {
if ($hash) {
[pscustomobject]$hash
}
$hash = @{}
continue
}
if ($line.startswith('-----')) { continue }
if ($line.startswith('Windows Boot')) {
$hash.Add('Type', $line)
} else {
$name = $line.Substring(0, $line.IndexOf(' '))
$value = $line.Substring($line.IndexOf(' ')).trim()
$hash.Add($name, $value)
}
}
$props = $result | % {gm -in $_ -ty *property} | % name | select -u | sort
$result | select $props
}
|
combined_dataset/train/non-malicious/2386.ps1
|
2386.ps1
|
function New-PodcastEpisode
{
[CmdletBinding()]
param
(
[Parameter(Mandatory)]
[ValidateNotNullOrEmpty()]
[ValidateScript({ Test-Path -Path $_ -PathType Leaf })]
[string]$RssFilePath,
[Parameter(Mandatory)]
[ValidateNotNullOrEmpty()]
[string]$Title,
[Parameter(Mandatory)]
[ValidateNotNullOrEmpty()]
[string]$Link,
[Parameter(Mandatory)]
[ValidateNotNullOrEmpty()]
[string]$Description,
[Parameter(Mandatory)]
[ValidateNotNullOrEmpty()]
[string]$Guid,
[Parameter(Mandatory)]
[ValidateNotNullOrEmpty()]
[string]$Duration,
[Parameter(Mandatory)]
[ValidateNotNullOrEmpty()]
[string]$SubTitle,
[Parameter(Mandatory)]
[ValidateNotNullOrEmpty()]
[string]$Summary,
[Parameter(Mandatory)]
[ValidateNotNullOrEmpty()]
[string]$Keywords,
[Parameter()]
[ValidateNotNullOrEmpty()]
[string]$Author = 'Todd Klindt',
[Parameter()]
[ValidateNotNullOrEmpty()]
[string]$Explicit = 'no'
)
begin {
$ErrorActionPreference = 'Stop'
$xRss = New-Object -TypeName System.Xml.XmlDocument
$xRss.Load($RssFilePath)
}
process {
try
{
$newItem = $xRss.CreateElement('Item')
$subItems = @{
'title' = $Title
'link' = $Link
'description' = $Description
'author' = $Author
'guid' = $Guid
'enclosure' = ''
}
$iTunesNsItems = @{
'author' = $Author
'duration' = $Duration
'explicit' = $Explicit
'keywords' = $Keywords
'subtitle' = $SubTitle
'summary' = $Summary
}
foreach ($s in $subItems.GetEnumerator())
{
$nodeName = $s.Key
$nodeVal = $s.Value
$null = $newItem.AppendChild($xRss.CreateElement($nodeName))
if ($nodeName -ne 'enclosure')
{
$newItem.$nodeName = $nodeVal
}
}
$newItem.SelectSingleNode('enclosure').SetAttribute('url', 'test enc URL')
$newItem.SelectSingleNode('enclosure').SetAttribute('length', '0000')
$newItem.SelectSingleNode('enclosure').SetAttribute('type', 'audio/mp3')
$newItem.SelectSingleNode('guid').SetAttribute('isPermaLink', 'true')
$itunesNs = New-Object System.Xml.XmlNamespaceManager($xRss.nametable)
$itunesNs.addnamespace('itunes', $xRss.rss.channel.GetNamespaceOfPrefix('itunes'))
foreach ($s in $iTunesNsItems.GetEnumerator())
{
$nodeName = "itunes:$($s.Key)"
$nodeVal = $s.Value
$node = $xRss.CreateElement($nodeName, $itunesNs.LookupNamespace('itunes'))
$null = $node.AppendChild($xRss.CreateTextNode($nodeVal))
$null = $newItem.AppendChild($node)
}
$null = $xRss.SelectSingleNode('rss/channel').AppendChild($newItem)
$xRss.Save($RssFilePath)
}
catch
{
Write-Error $_.Exception.Message
}
}
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.