full_path
stringlengths
31
232
filename
stringlengths
4
167
content
stringlengths
0
48.3M
combined_dataset/train/non-malicious/sample_63_21.ps1
sample_63_21.ps1
# # Module manifest for module 'OCI.PSModules.Integration' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Integration.dll' # Version number of this module. ModuleVersion = '85.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '5ec25c15-0aff-44af-9aaa-8441460571eb' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Integration Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '85.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Integration.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Enable-OCIIntegrationProcessAutomation', 'Get-OCIIntegrationInstance', 'Get-OCIIntegrationInstancesList', 'Get-OCIIntegrationWorkRequest', 'Get-OCIIntegrationWorkRequestErrorsList', 'Get-OCIIntegrationWorkRequestLogsList', 'Get-OCIIntegrationWorkRequestsList', 'Move-OCIIntegrationInstanceCompartment', 'Move-OCIIntegrationInstanceNetworkEndpoint', 'Move-OCIIntegrationPrivateEndpointOutboundConnection', 'New-OCIIntegrationInstance', 'Remove-OCIIntegrationInstance', 'Start-OCIIntegrationInstance', 'Stop-OCIIntegrationInstance', 'Update-OCIIntegrationInstance' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Integration' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_23_45.ps1
sample_23_45.ps1
########################################################### # # 'ExtensionService' module # ########################################################### $ErrorActionPreference = 'Stop' Set-StrictMode -Version Latest Import-Module "$PSScriptRoot\ServiceHelper.psm1" $script:GCInstallPath = "$PSScriptRoot\..\..\.." $script:GCBinariesFolderName = "GC" $script:GCBinariesPath = Join-Path $script:GCInstallPath $script:GCBinariesFolderName $script:OperationRetryCount = 5 <# .SYNOPSIS Install Guest Configuration Extension Service. .Example Install-ExtensionService #> Function Install-ExtensionService { [CmdletBinding()] Param() Write-Verbose -Message "In Install-ExtensionService" $ServiceType = "Extension" $gcConfigPath = Join-Path $script:GCBinariesPath 'gc.config' '{ "ServiceType": "Extension" }' | Out-File $gcConfigPath -Encoding utf8 New-Item $(Get-GuestConfigDataPath) -Force -ItemType Directory Set-AclPermissions -ServiceType $ServiceType -Path $(Get-GuestConfigDataPath) $packagesPath = Join-Path $env:SystemDrive 'Packages' $extensionInstallPath = Join-Path $packagesPath 'Plugins' if (!(Test-Path -Path $extensionInstallPath)) { # Create extension install directory if it doesn't exist New-Item $extensionInstallPath -Force -ItemType Directory } Set-AclPermissions -ServiceType $ServiceType -Path $extensionInstallPath Invoke-ScriptWithRetry -Script { [CmdletBinding()] Param() # Install GC Service and verify it is installed correctly. Install-ServiceInternal -ServiceType "Extension" } -RetryCount $script:OperationRetryCount -Verbose:($PSBoundParameters['Verbose'] -eq $true) } <# .SYNOPSIS Enable and start Guest Configuration Extension Service. .Example Enable-ExtensionService #> Function Enable-ExtensionService { [CmdletBinding()] Param() Invoke-ScriptWithRetry -Script { [CmdletBinding()] Param() Write-Verbose -Message "In Enable-ExtensionService" $ServiceType = "Extension" Start-ServiceInternal -ServiceType $ServiceType } -RetryCount $script:OperationRetryCount -Verbose:($PSBoundParameters['Verbose'] -eq $true) } <# .SYNOPSIS Uninstall Guest Configuration Extension Service. .Example Uninstall-ExtensionService #> Function Uninstall-ExtensionService { [CmdletBinding()] Param() Write-Verbose -Message "In Uninstall-ExtensionService" $ServiceType = "Extension" # Unregister GC Service Uninstall-ServiceInternal -ServiceType $ServiceType } <# .SYNOPSIS Update Guest Configuration Extension service. .Example Update-ExtensionService #> Function Update-ExtensionService{ [CmdletBinding()] Param() Write-Verbose -Message "In Update-ExtensionService" } Export-ModuleMember -Function @( 'Install-ExtensionService', 'Enable-ExtensionService', 'Uninstall-ExtensionService', 'Update-ExtensionService' ) # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCALlNBTkFMvQNzJ # babyhzSqcfsu9XXh3hKpjS5zPO2U2KCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICd6lDcaMbiGzvIuiPF29+5B # 15kGK6LA3sYRwkqpr26SMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAX/Z0rRzoMjIK8uSVZqBy0N4z5WzzSSk1K2I37De0Y5BEV4zIx5J9GOwy # RHQc3PZqC15aHtUnpccsAKT0Jmf4oQeXjmzctbuDvVQzNsA2nXtYenTZgQU5lN+V # Pv+VVC0KaVCA0AYKbesCQZDjqeo/asiQ+HSqgklqwVVXxPCYRRbz6LUWvDWlppeA # ZrlrO1UKhvRoxS9LqgpobsYtEWPLWQPfpsVxqZ9szgL9KMUfdfQpL5deH03X1sqw # klLxF2jk4+5ObmRvjnnoS6CasCnvrwnA0H47mvVWHpbhP7f5pw0sg5j1v9O/ev09 # OSa4Dp4KT5k67dAU6XJfhQ6IHYpCE6GCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBbgV3hyr+Ds8663VeFbPcQqSKULEy7HvRV+sO+/UuaOQIGZdX8MFKB # GBMyMDI0MDIyNjAzMDQwOC44MTFaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzM1WhcNMjUwMTEwMTkwNzM1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjozQkQ0LTRC # ODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKl74Drau2O6LLrJO3HyTvO9 # aXai//eNyP5MLWZrmUGNOJMPwMI08V9zBfRPNcucreIYSyJHjkMIUGmuh0rPV5/2 # +UCLGrN1P77n9fq/mdzXMN1FzqaPHdKElKneJQ8R6cP4dru2Gymmt1rrGcNe800C # cD6d/Ndoommkd196VqOtjZFA1XWu+GsFBeWHiez/PllqcM/eWntkQMs0lK0zmCfH # +Bu7i1h+FDRR8F7WzUr/7M3jhVdPpAfq2zYCA8ZVLNgEizY+vFmgx+zDuuU/GChD # K7klDcCw+/gVoEuSOl5clQsydWQjJJX7Z2yV+1KC6G1JVqpP3dpKPAP/4udNqpR5 # HIeb8Ta1JfjRUzSv3qSje5y9RYT/AjWNYQ7gsezuDWM/8cZ11kco1JvUyOQ8x/JD # kMFqSRwj1v+mc6LKKlj//dWCG/Hw9ppdlWJX6psDesQuQR7FV7eCqV/lfajoLpPN # x/9zF1dv8yXBdzmWJPeCie2XaQnrAKDqlG3zXux9tNQmz2L96TdxnIO2OGmYxBAA # ZAWoKbmtYI+Ciz4CYyO0Fm5Z3T40a5d7KJuftF6CToccc/Up/jpFfQitLfjd71cS # +cLCeoQ+q0n0IALvV+acbENouSOrjv/QtY4FIjHlI5zdJzJnGskVJ5ozhji0YRsc # v1WwJFAuyyCMQvLdmPddAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQU3/+fh7tNczEi # fEXlCQgFOXgMh6owHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBADP6whOFjD1ad8Gk # EJ9oLBuvfjndMyGQ9R4HgBKSlPt3pa0XVLcimrJlDnKGgFBiWwI6XOgw82hdolDi # MDBLLWRMTJHWVeUY1gU4XB8OOIxBc9/Q83zb1c0RWEupgC48I+b+2x2VNgGJUsQI # yPR2PiXQhT5PyerMgag9OSodQjFwpNdGirna2rpV23EUwFeO5+3oSX4JeCNZvgyU # OzKpyMvqVaubo+Glf/psfW5tIcMjZVt0elswfq0qJNQgoYipbaTvv7xmixUJGTbi # xYifTwAivPcKNdeisZmtts7OHbAM795ZvKLSEqXiRUjDYZyeHyAysMEALbIhdXgH # Eh60KoZyzlBXz3VxEirE7nhucNwM2tViOlwI7EkeU5hudctnXCG55JuMw/wb7c71 # RKimZA/KXlWpmBvkJkB0BZES8OCGDd+zY/T9BnTp8si36Tql84VfpYe9iHmy7Pqq # xqMF2Cn4q2a0mEMnpBruDGE/gR9c8SVJ2ntkARy5SfluuJ/MB61yRvT1mUx3lypp # O22ePjBjnwoEvVxbDjT1jhdMNdevOuDeJGzRLK9HNmTDC+TdZQlj+VMgIm8ZeEIR # NF0oaviF+QZcUZLWzWbYq6yDok8EZKFiRR5otBoGLvaYFpxBZUE8mnLKuDlYobjr # xh7lnwrxV/fMy0F9fSo2JxFmtLgtMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjoz # QkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUA942iGuYFrsE4wzWDd85EpM6RiwqggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOmGaL4wIhgPMjAyNDAyMjYwOTMyNDZaGA8yMDI0MDIyNzA5MzI0NlowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6YZovgIBADAHAgEAAgIQEzAHAgEAAgIRZTAKAgUA # 6Ye6PgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAGwmKek3XcI95mxvJ/ie # o7HFtGPU3M2MszGxf0tFYuTnFViTxvNO8DtdgbxciqEp6wkRRsZMenW90IZVhLMC # FqlMdZ74H9FixCusLU8u5X9wuV4vAikMe2QhQoXbNXleLoAyR+Ep4BSMZdLym9bg # AfqfqZGp70rQ4zvUyFhToI2RMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHlj2rA8z20C6MAAQAAAeUwDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgCQ0Smhh2SPJYKU97FMmnWHcm7GgdrqQpzb3Ycon4uu8wgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAVqdP//qjxGFhe2YboEXeb8I/pAof01CwhbxUH9U69 # 7TCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB5Y9q # wPM9tAujAAEAAAHlMCIEIGgmCF4LH/m3u4pOGeSXYlC78LfR16hR5SyL2BiKHdIp # MA0GCSqGSIb3DQEBCwUABIICAJund8Q+QxpC9S2OuAc9N0szO25TNF3WeUDe/ijY # XbKTasaEG/jHeDA+WNG3khGJYGCZ/LjZiL1nGubaU5Ao8rskk2FUV7MkojQlo4PU # GZLk0XOSiNCFDaoQ4xM5mgvqnsKJ+rwq7uuJdZfrr/S0cgc2xNkkk3Ic8pv6a/5i # O4PX/lEU3lO8ctywX2JlBxbpA0Pdi/HwM9CyT5Es2VHKTh5wGQ83IkatZ98cbqNA # F+zHRX8IEgkPXFqVC0DEL4g05JmSd4T4SOK/etkxTn4g70e5FG7fk4bCnR+2Qy+s # OqBy7zOq1TfGzTgC1YrS/JNwCoZZphZKMyx3Z0Gsx8Fr/C8r5A5EBn/hVOvM20nD # 7IwHAX8UMB1QS2JkSFWrH5tM7skDQ8LN6B2lkk+5YF9Hh4z27ga+TBhqIj2rsyK1 # 3mKhmoHjSrXjzVM8eswWQMG4G+xntmZkJ8F99MHsWfWLUsC84KjTUFgRk/S+eSH7 # g9hOzxhGYGaw6KB3ciWmfo0KR/I4amv0qiSpdwmQTRUZEslslhNUgGocVpfEi70Z # 2e92A/p5GCWkrNG0Y6Ms5Mhj+WBHJ6HYz8O8Y3EoNb5Pwg1vUrWwB5W2JJVz1vJA # ahgerfs9Db04HoKskejoQojlCw01cQmmudZi/X5sS0sWhf+QDOvotIsmf73kKpsx # NoMG # SIG # End signature block
combined_dataset/train/non-malicious/Protect-Variable.ps1
Protect-Variable.ps1
function Protect-Variable { param( [Parameter(Mandatory=$true,Position=0)][String]$Name, [Int]$Scope = 1, [Parameter(ParameterSetName="ValidateScriptBlock")][ScriptBlock]$ScriptBlock, [Parameter(ParameterSetName="ValidateCount")][Int]$MinCount, [Parameter(ParameterSetName="ValidateCount")][Int]$MaxCount, [Parameter(ParameterSetName="ValidateLength")][Int]$MinLength, [Parameter(ParameterSetName="ValidateLength")][Int]$MaxLength, [Parameter(ParameterSetName="ValidatePattern")][Regex]$Pattern, [Parameter(ParameterSetName="ValidateRange")][Int]$MinValue, [Parameter(ParameterSetName="ValidateRange")][Int]$MaxValue, [Parameter(ParameterSetName="ValidateSet")][String[]]$Set, [Parameter(ParameterSetName="ValidateNotNull")][Switch]$NotNull, [Parameter(ParameterSetName="ValidateNotNullOrEmpty")][Switch]$NotEmpty ) $Variable = Get-Variable $Name -Scope 1 if($ScriptBlock) { $Attribute = new-object System.Management.Automation.ValidateScriptAttribute $ScriptBlock $Variable.Attributes.Add($Attribute) } if($MinCount -or $MaxCount) { if(!$MinCount) { $MinCount = [Int]::MinValue } if(!$MaxCount) { $MaxCount = [Int]::MaxValue } $Attribute = new-object System.Management.Automation.ValidateCountAttribute $MinCount, $MaxCount $Variable.Attributes.Add($Attribute) } if($MinLength -or $MaxLength) { $Attribute = new-object System.Management.Automation.ValidateLengthAttribute $MinLength, $MaxLength $Variable.Attributes.Add($Attribute) } if($Pattern) { $Attribute = new-object System.Management.Automation.ValidatePatternAttribute $Pattern $Variable.Attributes.Add($Attribute) } if($MinValue -or $MaxValue) { $Attribute = new-object System.Management.Automation.ValidateRangeAttribute $MinValue, $MaxValue $Variable.Attributes.Add($Attribute) } if($Set) { $Attribute = new-object System.Management.Automation.ValidateSetAttribute $Set $Variable.Attributes.Add($Attribute) } if($NotNull) { $Attribute = new-object System.Management.Automation.ValidateNotNullAttribute $Variable.Attributes.Add($Attribute) } if($NotEmpty) { $Attribute = new-object System.Management.Automation.ValidateNotNullOrEmptyAttribute $Variable.Attributes.Add($Attribute) } }
combined_dataset/train/non-malicious/sample_20_99.ps1
sample_20_99.ps1
# # Module manifest for module 'OCI.PSModules.Ocvp' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Ocvp.dll' # Version number of this module. ModuleVersion = '77.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '05a069dc-62d0-41ee-b47b-3fe73fff277d' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Ocvp Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '77.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Ocvp.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIOcvpCluster', 'Get-OCIOcvpClustersList', 'Get-OCIOcvpEsxiHost', 'Get-OCIOcvpEsxiHostsList', 'Get-OCIOcvpSddc', 'Get-OCIOcvpSddcsList', 'Get-OCIOcvpSupportedCommitmentsList', 'Get-OCIOcvpSupportedHostShapesList', 'Get-OCIOcvpSupportedVmwareSoftwareVersionsList', 'Get-OCIOcvpWorkRequest', 'Get-OCIOcvpWorkRequestErrorsList', 'Get-OCIOcvpWorkRequestLogsList', 'Get-OCIOcvpWorkRequestsList', 'Invoke-OCIOcvpDowngradeHcx', 'Invoke-OCIOcvpInplaceUpgrade', 'Invoke-OCIOcvpRefreshHcxLicenseStatus', 'Invoke-OCIOcvpReplaceHost', 'Invoke-OCIOcvpRetrievePassword', 'Invoke-OCIOcvpSwapBilling', 'Invoke-OCIOcvpUpgradeHcx', 'Move-OCIOcvpSddcCompartment', 'New-OCIOcvpCluster', 'New-OCIOcvpEsxiHost', 'New-OCIOcvpSddc', 'Remove-OCIOcvpCluster', 'Remove-OCIOcvpEsxiHost', 'Remove-OCIOcvpSddc', 'Stop-OCIOcvpDowngradeHcx', 'Update-OCIOcvpCluster', 'Update-OCIOcvpEsxiHost', 'Update-OCIOcvpSddc' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Ocvp' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_11_12.ps1
sample_11_12.ps1
#************************************************ # TS_UnableToAddNetworkPrintersErrorCheck.ps1 # Version 1.0.1 # Date: 7/19/2013 # Author: v-kaw # Description: [KSE Rule] [ Windows V3] Presence of lots of folders inside \spool\prtprocs\ causes failure to install print queues # Rule number: d4047602-196c-443f-934c-75bd2ee855c1 # Rule URL: https://kse.microsoft.com/Contribute/Idea/cf91ba77-df0b-4b11-8c0c-9df9bff5c1e7 #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Display-DefaultActivity -Rule -RuleNumber d4047602-196c-443f-934c-75bd2ee855c1 $RuleApplicable = $false $RootCauseDetected = $false $RootCauseName = "RC_PrtprocsSubfolderBloat" $InformationCollected = new-object PSObject # *************************** # Data Gathering # *************************** Function AppliesToSystem { #Windows server 2008 \2008 r2 if(($OSVersion.Major -eq 6) -and (($OSVersion.Minor -eq 0)-or ($OSVersion.Minor -eq 1))) { if((Get-CimInstance Win32_OperatingSystem).ProductType -gt 1) { return $true } } return $false } # ************** # Detection Logic # ************** Function CheckEventAndRecordEventInfo($EventLogName,$EventId) { trap [Exception] { WriteTo-ErrorDebugReport -ErrorRecord $_ -ScriptErrorText "Error occurs while querying event log" $Error.Clear() continue } $EventInfo = "" if(($null -ne $EventLogName) -and ($null -ne $EventId)) { $strQuery = "*[System[(EventID=$EventId) and TimeCreated[timediff(@SystemTime) <= 604800000]]]" $CommandToRun = "wevtutil.exe qe `"$EventLogName`" /q:`"$strQuery`" /c:1" $EventInfo = Invoke-Expression $CommandToRun -ErrorAction Continue } if (($Error.Count -eq 0) -and ($null -ne $EventInfo)) { add-member -inputobject $InformationCollected -membertype noteproperty -name "Event Log Name" -value $EventLogName add-member -inputobject $InformationCollected -membertype noteproperty -name "Event Number" -value $EventId $EventDate = ([xml]$EventInfo).Event.System.TimeCreated.SystemTime add-member -inputobject $InformationCollected -membertype noteproperty -name "Event Date" -value ([DateTime]::Parse($EventDate).ToLocalTime()) return $true } return $false } Function CheckNumberOfSubFolderForPrtprocs { if($OSArchitecture.EndsWith("64")) { $FolderToBeCheck = Join-Path -Path $Env:windir "System32\spool\prtprocs\x64" } else { $FolderToBeCheck = Join-Path -Path $Env:windir "System32\spool\prtprocs\w32x86" } if(Test-Path $FolderToBeCheck) { $numberOfSubforders = ([System.IO.Directory]::GetDirectories($FolderToBeCheck)).Count if($numberOfSubforders -gt 10) { add-member -inputobject $InformationCollected -membertype noteproperty -name "Folder Name" -value ($FolderToBeCheck.Substring($FolderToBeCheck.IndexOf("\spool"))) add-member -inputobject $InformationCollected -membertype noteproperty -name "Number of Subfolder" -value $numberOfSubforders return $true } } return $false } #Check to see if rule is applicable to this computer if (AppliesToSystem) { $RuleApplicable = $true if (CheckNumberOfSubFolderForPrtprocs) { if(CheckEventAndRecordEventInfo -EventId 215 -EventLogName "Microsoft-Windows-PrintService/Admin") { $RootCauseDetected = $true } else { if(CheckEventAndRecordEventInfo -EventId 213 -EventLogName "Microsoft-Windows-PrintService/Operational") { $RootCauseDetected = $true } } } } # ********************* # Root Cause processing # ********************* if ($RuleApplicable) { if ($RootCauseDetected) { # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true Add-GenericMessage -Id $RootCauseName -InformationCollected $InformationCollected } else { # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } } # SIG # Begin signature block # MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCARy7+rSmqlv5If # zGjWiMqKJZ1pUwOPLLy0GjMP8oi1A6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIEQRcDbBuVmc6Q7xiNV4BYYv # VOFbBTxBvzj8QtcWjAYTMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAXwyHJGPH4e1xIfdLdEPEM0tuMUW+1i2rCYowpiflj13zUbMaysMoxDCy # FDHxt6GBFBoFmNNf8c3l311Xc4TAFSssxJtFqfqj60Xv5iKjNtsgAsAnlpDvgUsk # czpe7pZHiNv2S252pT295gmocFfu1gHJX8cUarB3n/0E6HQn3twn6JV2Wyq+61zj # cLSaosQqUnlt6DQKcB0nlp8YBTyLlqhqPXwckUAydWMXosspQnfsCtUufhgrp0cd # uGG13HzWWmm1dR34vb/CabWAfI26pw/T291tvVA2HSNKgtaz/G//dxl0RV7XlUUz # 9N8tw2W28c/Lrao6/E5e2wEGpStv0aGCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC # F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDoHKQk8/PEsMkhxrqOpRKt0GYcNFDrLF0yj8f2MuWOVgIGZut+oGFF # GBMyMDI0MTAyODExNDAzOS43ODlaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB/Bigr8xpWoc6AAEAAAH8MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzExNFoXDTI1MTAyMjE4MzExNFowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjZGMUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAp1DAKLxpbQcPVYPHlJHy # W7W5lBZjJWWDjMfl5WyhuAylP/LDm2hb4ymUmSymV0EFRQcmM8BypwjhWP8F7x4i # O88d+9GZ9MQmNh3jSDohhXXgf8rONEAyfCPVmJzM7ytsurZ9xocbuEL7+P7EkIwo # OuMFlTF2G/zuqx1E+wANslpPqPpb8PC56BQxgJCI1LOF5lk3AePJ78OL3aw/Ndlk # vdVl3VgBSPX4Nawt3UgUofuPn/cp9vwKKBwuIWQEFZ837GXXITshd2Mfs6oYfxXE # tmj2SBGEhxVs7xERuWGb0cK6afy7naKkbZI2v1UqsxuZt94rn/ey2ynvunlx0R6/ # b6nNkC1rOTAfWlpsAj/QlzyM6uYTSxYZC2YWzLbbRl0lRtSz+4TdpUU/oAZSB+Y+ # s12Rqmgzi7RVxNcI2lm//sCEm6A63nCJCgYtM+LLe9pTshl/Wf8OOuPQRiA+stTs # g89BOG9tblaz2kfeOkYf5hdH8phAbuOuDQfr6s5Ya6W+vZz6E0Zsenzi0OtMf5RC # a2hADYVgUxD+grC8EptfWeVAWgYCaQFheNN/ZGNQMkk78V63yoPBffJEAu+B5xlT # PYoijUdo9NXovJmoGXj6R8Tgso+QPaAGHKxCbHa1QL9ASMF3Os1jrogCHGiykfp1 # dKGnmA5wJT6Nx7BedlSDsAkCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSY8aUrsUaz # hxByH79dhiQCL/7QdjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAT7ss/ZAZ0bTa # FsrsiJYd//LQ6ImKb9JZSKiRw9xs8hwk5Y/7zign9gGtweRChC2lJ8GVRHgrFkBx # ACjuuPprSz/UYX7n522JKcudnWuIeE1p30BZrqPTOnscD98DZi6WNTAymnaS7it5 # qAgNInreAJbTU2cAosJoeXAHr50YgSGlmJM+cN6mYLAL6TTFMtFYJrpK9TM5Ryh5 # eZmm6UTJnGg0jt1pF/2u8PSdz3dDy7DF7KDJad2qHxZORvM3k9V8Yn3JI5YLPuLs # o2J5s3fpXyCVgR/hq86g5zjd9bRRyyiC8iLIm/N95q6HWVsCeySetrqfsDyYWStw # L96hy7DIyLL5ih8YFMd0AdmvTRoylmADuKwE2TQCTvPnjnLk7ypJW29t17Yya4V+ # Jlz54sBnPU7kIeYZsvUT+YKgykP1QB+p+uUdRH6e79Vaiz+iewWrIJZ4tXkDMmL2 # 1nh0j+58E1ecAYDvT6B4yFIeonxA/6Gl9Xs7JLciPCIC6hGdliiEBpyYeUF0ohZF # n7NKQu80IZ0jd511WA2bq6x9aUq/zFyf8Egw+dunUj1KtNoWpq7VuJqapckYsmvm # mYHZXCjK1Eus7V1I+aXjrBYuqyM9QpeFZU4U01YG15uWwUCaj0uZlah/RGSYMd84 # y9DCqOpfeKE6PLMk7hLnhvcOQrnxP6kwggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo2RjFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUATkEpJXOaqI2wfqBsw4NLVwqYqqqggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJZP4wIhgPMjAyNDEwMjgwMTE4NTRaGA8yMDI0MTAyOTAxMTg1NFowdzA9 # BgorBgEEAYRZCgQBMS8wLTAKAgUA6slk/gIBADAKAgEAAgIj+QIB/zAHAgEAAgIV # OjAKAgUA6sq2fgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow # CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAqtLGFlstr # sb+SvUvbr1hLCetkINEwDxfniiboUQVt4GeQLoY14M6leM9y61oAgIF33fHJalc0 # m6hRYHUUukHmnf8OOSaTiiX/nslEh3oTsZMRPqzR1k5LfvMp3a2pIDntcYlMbl2o # yGD7wib38kMuMk5xFDVhvCk9VkAOFUb8IsBonqOwm32MCwxu4PiML3KP595ks9mt # 6PxX1auBQ1gIcLfYEno+8vVKQpYBwZyizAA8LlxCwE+atWpPKH7AHBCaUnoWAwdk # m5NtHKLBGrmDUjlyWtaRXvWXYJdFC3R4GSvWAAdmbfao2+coyd9IdOXkz3f7u7vY # B3P4HYG5NEz1MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAH8GKCvzGlahzoAAQAAAfwwDQYJYIZIAWUDBAIBBQCgggFKMBoG # CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgLkGH28AS # BLUqRks+VPEzIoIQyEcQFo1GzeUbQRFLK3kwgfoGCyqGSIb3DQEJEAIvMYHqMIHn # MIHkMIG9BCCVQq+Qu+/h/BOVP4wweUwbHuCUhh+T7hq3d5MCaNEtYjCBmDCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB/Bigr8xpWoc6AAEA # AAH8MCIEINOFZp4mWvilNmu2oP8JaiDsbYhML+c3SwBUR/vJ4UAWMA0GCSqGSIb3 # DQEBCwUABIICAEtmId4d+pKAuxsnnoHcDpoWxmRCpyxtcIOld3ZPthhLaOxqt8C9 # fi1wb7wANkMTH62cDKDimsdzNin8ddMHfOY1yW1d/0/mZBvX3wto3YwfBgei/ACW # e/EQRTss5lsFzf/Tde2PbhZr6bAsqyr8n6vktU/CVn3K75nmV0+t3S4gpz+zm+Zj # 2jxPBF2ubbKQlXwfTg6+WdllBKjxIoP3XKjllA11d31ibkv4z64HlVtMHs+YlOqk # 6EpqJLtrqpza8MuZ2EWhw3v8uddlccpTzlTXJo7z4QCBC80e+iWMmymfRCDykvyu # aDSTUIzoR5GF0iiq9kfuWP9mXoH8uUFuodVq/8IWeu9+MjgEIhvUsOBsU4MGJlDm # mcXfj8U/I1K1RgFtDnA/LNIMfA86Uh23I+6fiRBSYte3r7+hpihVit296KEOJJus # gPKeae/ngX69RPbQ3z7QaE4N23rR2POkzyVZLwl0/Fw3Kvozxxdodz2NHd5xRovL # vaTSwHo7Y7tzhCgcsvAXZo3o7W21NNJkg4DgJ6Xq0oPl1A7jmWPiYJpiC0+KK/um # KUkH9FKyX9SkwYDlVt3ZO/4iFgBOHz+wjDjf8tf6jH0VQ2h7tUtFlONoswXcE9oW # nRk2BFhGUPS5sY/IfiqqAIA5FizjdTw4YnKz7IRLn2kXMqIkq4uOtdnx # SIG # End signature block
combined_dataset/train/non-malicious/Get-FailingDrive.ps1
Get-FailingDrive.ps1
Function Get-FailingDrive { <# .SYNOPSIS Checks for any potentially failing drives and reports back drive information. .DESCRIPTION Checks for any potentially failing drives and reports back drive information. This only works against local hard drives using SMART technology. Reason values and their meanings can be found here: http://en.wikipedia.org/wiki/S.M.A.R.T#Known_ATA_S.M.A.R.T._attributes .PARAMETER Computer Remote or local computer to check for possible failed hard drive. .PARAMETER Credential Provide alternate credential to perform query. .NOTES Author: Boe Prox Version: 1.0 http://learn-powershell.net .EXAMPLE Get-FailingDrive WARNING: ST9320320AS ATA Device may fail! MediaType : Fixed hard disk media InterFace : IDE DriveName : ST9320320AS ATA Device Reason : 1 SerialNumber : 202020202020202020202020533531584e5a4d50 FailureImminent : True Description ----------- Command ran against the local computer to check for potential failed hard drive. #> [cmdletbinding()] Param ( [parameter(ValueFromPipeline=$True,ValueFromPipelineByPropertyName=$True)] [string[]]$Computername, [parameter()] [System.Management.Automation.PSCredential]$Credential ) Begin { $queryhash = @{} $BadDriveHash = @{} } Process { ForEach ($Computer in $Computername) { If ($PSBoundParameters['Computer']) { $queryhash['Computername'] = $Computer $BadDriveHash['Computername'] = $Computer } Else { $queryhash['Computername'] = $Env:Computername $BadDriveHash['Computername'] = $Env:Computername } If ($PSBoundParameters['Credential']) { $queryhash['Credential'] = $Credential $BadDriveHash['Credential'] = $Credential } Write-Verbose "Creating SplatTable" $queryhash['NameSpace'] = 'root\\wmi' $queryhash['Class'] = 'MSStorageDriver_FailurePredictStatus' $queryhash['Filter'] = "PredictFailure='False'" $queryhash['ErrorAction'] = 'Stop' $BadDriveHash['Class'] = 'win32_diskdrive' $BadDriveHash['ErrorAction'] = 'Stop' [regex]$regex = "(?<DriveName>\\w+\\\\[A-Za-z0-9_]*)\\w+" Try { Write-Verbose "Checking for failed drives" Get-WmiObject @queryhash | ForEach { $drive = $regex.Matches($_.InstanceName) | ForEach {$_.Groups['DriveName'].value} Write-Verbose "Gathering more information about failing drive" $BadDrive = gwmi @BadDriveHash | Where {$_.PNPDeviceID -like "$drive*"} If ($BadDrive) { Write-Warning "$($BadDriveHash['Computername']): $($BadDrive.Model) may fail!" New-Object PSObject -Property @{ DriveName = $BadDrive.Model FailureImminent = $_.PredictFailure Reason = $_.Reason MediaType = $BadDrive.MediaType SerialNumber = $BadDrive.SerialNumber InterFace = $BadDrive.InterfaceType Partitions = $BadDrive.Partitions Size = $BadDrive.Size Computer = $BadDriveHash['Computername'] } } } } Catch { Write-Warning "$($Error[0])" } } } }
combined_dataset/train/non-malicious/sample_13_39.ps1
sample_13_39.ps1
# # Module manifest for module 'OCI.PSModules.Loggingingestion' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Loggingingestion.dll' # Version number of this module. ModuleVersion = '75.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'ed6ebc41-8c84-4a4f-aaec-c687cb3245b5' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Loggingingestion Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '75.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Loggingingestion.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Write-OCILoggingingestionLogs' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Loggingingestion' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_55_4.ps1
sample_55_4.ps1
import{T as s}from"./index-DktkJoV1.js";/*!----------------------------------------------------------------------------- * Copyright (c) Microsoft Corporation. All rights reserved. * Version: 0.47.0(69991d66135e4a1fc1cf0b1ac4ad25d429866a0d) * Released under the MIT license * https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt *-----------------------------------------------------------------------------*/var c=Object.defineProperty,l=Object.getOwnPropertyDescriptor,d=Object.getOwnPropertyNames,p=Object.prototype.hasOwnProperty,i=(t,e,o,n)=>{if(e&&typeof e=="object"||typeof e=="function")for(let r of d(e))!p.call(t,r)&&r!==o&&c(t,r,{get:()=>e[r],enumerable:!(n=l(e,r))||n.enumerable});return t},h=(t,e,o)=>(i(t,e,"default"),o&&i(o,e,"default")),a={};h(a,s);var m=["area","base","br","col","embed","hr","img","input","keygen","link","menuitem","meta","param","source","track","wbr"],b={wordPattern:/(-?\d*\.\d\w*)|([^\`\~\!\@\$\^\&\*\(\)\-\=\+\[\{\]\}\\\|\;\:\'\"\,\.\<\>\/\s]+)/g,comments:{blockComment:["<!--","-->"]},brackets:[["<!--","-->"],["<",">"],["{","}"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}],surroundingPairs:[{open:'"',close:'"'},{open:"'",close:"'"},{open:"<",close:">"}],onEnterRules:[{beforeText:new RegExp(`<(?!(?:${m.join("|")}))(\\w[\\w\\d]*)([^/>]*(?!/)>)[^<]*$`,"i"),afterText:/^<\/(\w[\w\d]*)\s*>$/i,action:{indentAction:a.languages.IndentAction.IndentOutdent}},{beforeText:new RegExp(`<(?!(?:${m.join("|")}))(\\w[\\w\\d]*)([^/>]*(?!/)>)[^<]*$`,"i"),action:{indentAction:a.languages.IndentAction.Indent}}]},y={defaultToken:"",tokenPostfix:"",tokenizer:{root:[[/@@@@/],[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.root"}],[/<!DOCTYPE/,"metatag.html","@doctype"],[/<!--/,"comment.html","@comment"],[/(<)([\w\-]+)(\/>)/,["delimiter.html","tag.html","delimiter.html"]],[/(<)(script)/,["delimiter.html",{token:"tag.html",next:"@script"}]],[/(<)(style)/,["delimiter.html",{token:"tag.html",next:"@style"}]],[/(<)([:\w\-]+)/,["delimiter.html",{token:"tag.html",next:"@otherTag"}]],[/(<\/)([\w\-]+)/,["delimiter.html",{token:"tag.html",next:"@otherTag"}]],[/</,"delimiter.html"],[/[ \t\r\n]+/],[/[^<@]+/]],doctype:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.comment"}],[/[^>]+/,"metatag.content.html"],[/>/,"metatag.html","@pop"]],comment:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.comment"}],[/-->/,"comment.html","@pop"],[/[^-]+/,"comment.content.html"],[/./,"comment.content.html"]],otherTag:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.otherTag"}],[/\/?>/,"delimiter.html","@pop"],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/[ \t\r\n]+/]],script:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.script"}],[/type/,"attribute.name","@scriptAfterType"],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.text/javascript",nextEmbedded:"text/javascript"}],[/[ \t\r\n]+/],[/(<\/)(script\s*)(>)/,["delimiter.html","tag.html",{token:"delimiter.html",next:"@pop"}]]],scriptAfterType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.scriptAfterType"}],[/=/,"delimiter","@scriptAfterTypeEquals"],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.text/javascript",nextEmbedded:"text/javascript"}],[/[ \t\r\n]+/],[/<\/script\s*>/,{token:"@rematch",next:"@pop"}]],scriptAfterTypeEquals:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.scriptAfterTypeEquals"}],[/"([^"]*)"/,{token:"attribute.value",switchTo:"@scriptWithCustomType.$1"}],[/'([^']*)'/,{token:"attribute.value",switchTo:"@scriptWithCustomType.$1"}],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.text/javascript",nextEmbedded:"text/javascript"}],[/[ \t\r\n]+/],[/<\/script\s*>/,{token:"@rematch",next:"@pop"}]],scriptWithCustomType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.scriptWithCustomType.$S2"}],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.$S2",nextEmbedded:"$S2"}],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/[ \t\r\n]+/],[/<\/script\s*>/,{token:"@rematch",next:"@pop"}]],scriptEmbedded:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInEmbeddedState.scriptEmbedded.$S2",nextEmbedded:"@pop"}],[/<\/script/,{token:"@rematch",next:"@pop",nextEmbedded:"@pop"}]],style:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.style"}],[/type/,"attribute.name","@styleAfterType"],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/>/,{token:"delimiter.html",next:"@styleEmbedded.text/css",nextEmbedded:"text/css"}],[/[ \t\r\n]+/],[/(<\/)(style\s*)(>)/,["delimiter.html","tag.html",{token:"delimiter.html",next:"@pop"}]]],styleAfterType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.styleAfterType"}],[/=/,"delimiter","@styleAfterTypeEquals"],[/>/,{token:"delimiter.html",next:"@styleEmbedded.text/css",nextEmbedded:"text/css"}],[/[ \t\r\n]+/],[/<\/style\s*>/,{token:"@rematch",next:"@pop"}]],styleAfterTypeEquals:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.styleAfterTypeEquals"}],[/"([^"]*)"/,{token:"attribute.value",switchTo:"@styleWithCustomType.$1"}],[/'([^']*)'/,{token:"attribute.value",switchTo:"@styleWithCustomType.$1"}],[/>/,{token:"delimiter.html",next:"@styleEmbedded.text/css",nextEmbedded:"text/css"}],[/[ \t\r\n]+/],[/<\/style\s*>/,{token:"@rematch",next:"@pop"}]],styleWithCustomType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.styleWithCustomType.$S2"}],[/>/,{token:"delimiter.html",next:"@styleEmbedded.$S2",nextEmbedded:"$S2"}],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/[ \t\r\n]+/],[/<\/style\s*>/,{token:"@rematch",next:"@pop"}]],styleEmbedded:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInEmbeddedState.styleEmbedded.$S2",nextEmbedded:"@pop"}],[/<\/style/,{token:"@rematch",next:"@pop",nextEmbedded:"@pop"}]],razorInSimpleState:[[/@\*/,"comment.cs","@razorBlockCommentTopLevel"],[/@[{(]/,"metatag.cs","@razorRootTopLevel"],[/(@)(\s*[\w]+)/,["metatag.cs",{token:"identifier.cs",switchTo:"@$S2.$S3"}]],[/[})]/,{token:"metatag.cs",switchTo:"@$S2.$S3"}],[/\*@/,{token:"comment.cs",switchTo:"@$S2.$S3"}]],razorInEmbeddedState:[[/@\*/,"comment.cs","@razorBlockCommentTopLevel"],[/@[{(]/,"metatag.cs","@razorRootTopLevel"],[/(@)(\s*[\w]+)/,["metatag.cs",{token:"identifier.cs",switchTo:"@$S2.$S3",nextEmbedded:"$S3"}]],[/[})]/,{token:"metatag.cs",switchTo:"@$S2.$S3",nextEmbedded:"$S3"}],[/\*@/,{token:"comment.cs",switchTo:"@$S2.$S3",nextEmbedded:"$S3"}]],razorBlockCommentTopLevel:[[/\*@/,"@rematch","@pop"],[/[^*]+/,"comment.cs"],[/./,"comment.cs"]],razorBlockComment:[[/\*@/,"comment.cs","@pop"],[/[^*]+/,"comment.cs"],[/./,"comment.cs"]],razorRootTopLevel:[[/\{/,"delimiter.bracket.cs","@razorRoot"],[/\(/,"delimiter.parenthesis.cs","@razorRoot"],[/[})]/,"@rematch","@pop"],{include:"razorCommon"}],razorRoot:[[/\{/,"delimiter.bracket.cs","@razorRoot"],[/\(/,"delimiter.parenthesis.cs","@razorRoot"],[/\}/,"delimiter.bracket.cs","@pop"],[/\)/,"delimiter.parenthesis.cs","@pop"],{include:"razorCommon"}],razorCommon:[[/[a-zA-Z_]\w*/,{cases:{"@razorKeywords":{token:"keyword.cs"},"@default":"identifier.cs"}}],[/[\[\]]/,"delimiter.array.cs"],[/[ \t\r\n]+/],[/\/\/.*$/,"comment.cs"],[/@\*/,"comment.cs","@razorBlockComment"],[/"([^"]*)"/,"string.cs"],[/'([^']*)'/,"string.cs"],[/(<)([\w\-]+)(\/>)/,["delimiter.html","tag.html","delimiter.html"]],[/(<)([\w\-]+)(>)/,["delimiter.html","tag.html","delimiter.html"]],[/(<\/)([\w\-]+)(>)/,["delimiter.html","tag.html","delimiter.html"]],[/[\+\-\*\%\&\|\^\~\!\=\<\>\/\?\;\:\.\,]/,"delimiter.cs"],[/\d*\d+[eE]([\-+]?\d+)?/,"number.float.cs"],[/\d*\.\d+([eE][\-+]?\d+)?/,"number.float.cs"],[/0[xX][0-9a-fA-F']*[0-9a-fA-F]/,"number.hex.cs"],[/0[0-7']*[0-7]/,"number.octal.cs"],[/0[bB][0-1']*[0-1]/,"number.binary.cs"],[/\d[\d']*/,"number.cs"],[/\d/,"number.cs"]]},razorKeywords:["abstract","as","async","await","base","bool","break","by","byte","case","catch","char","checked","class","const","continue","decimal","default","delegate","do","double","descending","explicit","event","extern","else","enum","false","finally","fixed","float","for","foreach","from","goto","group","if","implicit","in","int","interface","internal","into","is","lock","long","nameof","new","null","namespace","object","operator","out","override","orderby","params","private","protected","public","readonly","ref","return","switch","struct","sbyte","sealed","short","sizeof","stackalloc","static","string","select","this","throw","true","try","typeof","uint","ulong","unchecked","unsafe","ushort","using","var","virtual","volatile","void","when","while","where","yield","model","inject"],escapes:/\\(?:[abfnrtv\\"']|x[0-9A-Fa-f]{1,4}|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})/};export{b as conf,y as language};
combined_dataset/train/non-malicious/sample_47_50.ps1
sample_47_50.ps1
# # Module manifest for module 'Az.LoadTesting' # # Generated by: Microsoft Corporation # # Generated on: 23/04/2024 # @{ # Script module or binary module file associated with this manifest. RootModule = 'Az.LoadTesting.psm1' # Version number of this module. ModuleVersion = '1.0.1' # Supported PSEditions CompatiblePSEditions = 'Core', 'Desktop' # ID used to uniquely identify this module GUID = '739ddedf-3d49-40e0-bc84-00bedfe6b2ec' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = 'Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'Microsoft Azure PowerShell: LoadTesting cmdlets' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '5.1' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. DotNetFrameworkVersion = '4.7.2' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @() # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'LoadTesting.Autorest/bin/Az.LoadTesting.private.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module FormatsToProcess = 'LoadTesting.Autorest\Az.LoadTesting.format.ps1xml' # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @('LoadTesting.Autorest/Az.LoadTesting.psm1') # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = 'Get-AzLoad', 'New-AzLoad', 'Remove-AzLoad', 'Update-AzLoad' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = @() # Variables to export from this module # VariablesToExport = @() # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'Azure','ResourceManager','ARM','PSModule','LoadTesting' # A URL to the license for this module. LicenseUri = 'https://aka.ms/azps-license' # A URL to the main website for this project. ProjectUri = 'https://github.com/Azure/azure-powershell' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module ReleaseNotes = '* Introduced secrets detection feature to safeguard sensitive data.' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIIn0QYJKoZIhvcNAQcCoIInwjCCJ74CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDQgNNTuw9q4wDK # lEEpvnsXIJ47dxLPh4/FyVVWJoSD0KCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOxc # RVlNPnp4370AN65v4NVPKROMg+wdqwZeTII+Z2/7MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEA713PSMfx7LLdBIUebykyQ2/TIIKPMJ4TBLEs # a/yEIYBGiJkg4NCzmHFXhdynBLl3bLU3wi5GD1liG2Ag75vRXZjn1XGN04cMS4/3 # ACW+utV5Ee42p1AGOc0s5a5ujXpzilGuA1RG7v+S+WJG1nrivPPnv2QbxJ3EY8Sf # USPZxf8wsLVN96cOBnIuH902U1B1MRX6tKoV7K6DS4Xxgg2ie3WRIXJX5V1ZglR2 # uAd7dQxUxqjVOZOrzvTOxTm8cFTyNNoXFOpvcYJTwDQAFZLzrqI1XFLJsBFOBohi # U+Jge7/f+t7A0GTP5Wa0b+tK6zIa10nQDV8zQwGrfgcEvtqnQqGCFywwghcoBgor # BgEEAYI3AwMBMYIXGDCCFxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCC03/0heEdE5nyjdbUPEDEoW0yYg1M1LJvc # 2gtZ+sFxEQIGZiAgt1OxGBMyMDI0MDQyMzE0MTExNy40ODNaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHimZmV # 8dzjIOsAAQAAAeIwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjpGQzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVj # tZhV+kFmb8cKQpg2mzisDlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC # 7jS03JkcrPsWi9WpVwsIckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJ # bsE3wMmpmJasPWpgF05zZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmU # Xs7ICxDJr5a39SSePAJRIyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwne # tSePg88EmRezr2T3HTFElneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfF # cS4XElf3GSERnlzJsK7s/ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4 # eQszYxq4c4HqPnUu4hT4aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdth # FCBepxfb6nbsp3fcZaPBfTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCW # ACoj78XUwYqy1HyYnStTme4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKv # NNsTVm4QbqphCyknrwByqorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3u # fASdPrgPhsQIRFkHZGuihL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQURIQOEdq+7QdslptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBAORURDGrVRTbnulfsg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3 # ka76Yz0t/6lxuczI6w7tXq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwL # hP1PGC5tvXK0xYomU1nU+lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrX # a2daCOGnxuaD1IO+65E7qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0gan # hFzzHAnWjtNWneU11WQ6Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVl # UE3zIikoSed+8s61NDP+x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIo # ycVTvBQpv/drRJD68eo401mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iO # aKZ75vuQg7hCiBA5xIm5ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqv # E8Aq38QmKgTiBnWSS/uVPcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhS # gCIGJUZDA7336nQD8fn4y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv # 1ug7dS/Dfrcd1sn2E4gk4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjpGQzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhf # iB1d8pTohm+ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOnR3vgwIhgPMjAyNDA0MjMxNTE3MTJaGA8yMDI0MDQy # NDE1MTcxMlowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA6dHe+AIBADAKAgEAAgID # FQIB/zAHAgEAAgITGDAKAgUA6dMweAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUA # A4GBANIiA17LpM6vqyo+h2Gy7jS/plK5btuepzPH69HaSSLQgmyHGJti3T4/40Qv # /pD1kqx4aZmxSYhfghQxG6+5xQrMjXUGVkvkHlGDaCB5PkTFkhEadoG/M8OiSF2z # 6t1t+B5+UpZHn/ZqMCje0hGMGpF+It3BhOadbdLMLmv1S+e5MYIEDTCCBAkCAQEw # gZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsA # AQAAAeIwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0B # CRABBDAvBgkqhkiG9w0BCQQxIgQgmwggiDzTDKvROVR0aP21eYt1UxZSRYY1Mun9 # LWUXbYQwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETO # DoL4d5LU6I/bjucIZkOJCI9//zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwAhMzAAAB4pmZlfHc4yDrAAEAAAHiMCIEIFI9jHTsM+FSP6FMwP2O # 6Yu7/zJ0dHmtmWF4o2meBeYsMA0GCSqGSIb3DQEBCwUABIICAJA+0oYSfROpflb6 # oW0iOATrgr6RoMB2i4SpktN/X2V0r7e6BFwiLs3bA1H3j6FpVilb6QTl7UHYZ1CH # yj0TjYqoUvFdVdxWJIpOE4wtprLkCfJYf94blhDJghdRzyWJmCr4MVXcZptJ0D9N # kwfKR/yJrk2r81IwIDzpf9d/YEVCAKD0z2lChZCq+oqxGINyR3CPmo79R0/S42EN # 0uUVJvMOkfSZ8KrPNzMk6sDqYO5Nw9LRWkmEYTSm8dtOcfnVOGr1coo92XU7t2mn # b9r8q7f7kq1G78UFM29ZB3SoIquxcfeQu2yhypQR1xpZgBjTKM9KKeUarB3YGnfN # Qwj44Pkrs3y9mrPBUALT0f3ftaebISOcKRyCdr3qwRTNKyBhfsZRrpFGt1jRZmi6 # HfePdDFKiKo6GXmPo/D6qSNBmnzXOrf/8WZpXok0ZBc6dPb4kr2JyECARgt7dd2i # U112RQJTvDcTaCC8uun5NnPCN5Mr7JD/T/gmSE3+IU740pFDt1Y1W5hAT1scYHHM # wgtnJ9WEIJ+68aW8OzbrtnuYmzH7cajRwGhr2B9DpagDgo44gn6hA9UMz2IReRbi # 0uyOjuXX/A7vnUcCsZjE0V2kKh4s7V4P8MXEcawdNlQIvShv8u2IAM0jugN9qQKy # mqZevwHmelL6X3rW6yeRnyT+Dtxv # SIG # End signature block
combined_dataset/train/non-malicious/387.ps1
387.ps1
function BeTrueForAny { [CmdletBinding()] param ( $ActualValue, [scriptblock] $TestScript, [switch] $Negate ) end { $succeeded = $false foreach ($value in $ActualValue) { $variables = [System.Collections.Generic.List[psvariable]]( [psvariable]::new('_', $value)) $succeeded = $TestScript.InvokeWithContext( @{ }, $variables, $value) if ($Negate.IsPresent) { $succeeded = -not $succeeded } if ($succeeded) { break } } if (-not $succeeded) { if ($Negate.IsPresent) { $failureMessage = 'Expected: Any value to fail the evaluation script, ' + 'but no value returned false. (ActualValue: {0})' -f ($ActualValue -join ', ') } else { $failureMessage = 'Expected: Any value to pass the evaluation script, ' + 'but no value returned true. (ActualValue: {0})' -f ($ActualValue -join ', ') } } [PSCustomObject]@{ Succeeded = $succeeded FailureMessage = $failureMessage } } } Add-AssertionOperator -Name BeTrueForAny -Test $function:BeTrueForAny -Alias Any -SupportsArrayInput
combined_dataset/train/non-malicious/2633.ps1
2633.ps1
function Restore-SqlDbWithMove{ [cmdletbinding()] param([string]$ServerInstance = 'localhost' ,[string]$BackupFile ,[string]$NewDataPath ,[string]$NewLogPath = $NewDataPath ,[string]$OutputPath = 'NoPath' ) $relocate = @() $dbname = (Invoke-Sqlcmd -ServerInstance $ServerInstance -Database tempdb -Query "RESTORE HEADERONLY FROM DISK='$BackupFile';").DatabaseName $dbfiles = Invoke-Sqlcmd -ServerInstance $ServerInstance -Database tempdb -Query "RESTORE FILELISTONLY FROM DISK='$BackupFile';" foreach($dbfile in $dbfiles){ $DbFileName = $dbfile.PhysicalName | Split-Path -Leaf if($dbfile.Type -eq 'L'){ $newfile = Join-Path -Path $NewLogPath -ChildPath $DbFileName } else { $newfile = Join-Path -Path $NewDataPath -ChildPath $DbFileName } $relocate += New-Object Microsoft.SqlServer.Management.Smo.RelocateFile ($dbfile.LogicalName,$newfile) } If($OutputPath -ne 'NoPath'){ $OutputFile = Join-Path $OutputPath -ChildPath "$dbname`_restore.sql" Restore-SqlDatabase -ServerInstance $ServerInstance -Database $dbname -RelocateFile $relocate -BackupFile "$BackupFile" -RestoreAction Database -Script | Out-File $OutputFile } else { Restore-SqlDatabase -ServerInstance $ServerInstance -Database $dbname -RelocateFile $relocate -BackupFile "$BackupFile" -RestoreAction Database } }
combined_dataset/train/non-malicious/Re-IP VMs.ps1
Re-IP VMs.ps1
foreach ($entry in (import-csv "spreadsheet.csv")) { $ipScript = @" `$NetworkConfig = Get-WmiObject -Class Win32_NetworkAdapterConfiguration `$NicAdapter = `$NetworkConfig | where {`$_.DHCPEnabled -eq "True"} `$NicAdapter.EnableStatic('$entry.IP','$entry.Netmask') `$NicAdapter.SetGateways('$entry.Gateway') "@ Get-VM $entry.VMName | Invoke-VMScript -HostUser $entry.HU -HostPassword $entry.HP -GuestUser $gu -GuestPassword $gp $ipScript }
combined_dataset/train/non-malicious/Compare-TwitterNames_2.ps1
Compare-TwitterNames_2.ps1
#This script will compare the names of the people you follow on Twitter #and the people following you. It returns a comparison object consisting #of the Twitter name of a subject and a side indicator - #"<=" means that you are following a subject who is not following you, #"=>" means that you are followed by someone who you are not following. function GetTwitterNames([string]$query) { $wc = new-object System.Net.WebClient $wc.Credentials = $script:credential.GetNetworkCredential() $nbrofpeople = 0 $page = "&page=" $names = @() do { $url = $query if ($nbrofpeople -gt 0) { $url = $url+$page+($nbrofpeople/100 +1) } [xml]$nameslist = $wc.DownloadString($url) $names += $nameslist.users.user | select name $nbrofpeople += 100 } while ($names.count -eq $nbrofpeople) return $names } $twitter = "http://twitter.com/statuses/" $friends = $twitter + "friends.xml?lite=true" $followers = $twitter + "followers.xml?lite=true" $credential = Get-Credential $friendslist = GetTwitterNames($friends) $followerslist = GetTwitterNames($followers) $sync = 0 if ($friendslist.count -gt $followerslist.count) { $sync = ($friendslist.count)/2 } else { $sync = ($followerslist.count)/2 } $Status = @{Name='Status';Expression={if ($_.sideindicator -like '=>') {'Followed By'} else {'Following'}}} compare-object $friendslist $followerslist -SyncWindow ($sync) -Property name | Select-Object Name, $Status
combined_dataset/train/non-malicious/3543.ps1
3543.ps1
function Test-MabGetContainers { $vault = Get-AzRecoveryServicesVault -ResourceGroupName "pstestrg" -Name "pstestrsvault"; $containers = Get-AzRecoveryServicesBackupContainer ` -VaultId $vault.ID ` -ContainerType "Windows" ` -BackupManagementType "MARS"; Assert-AreEqual $containers[0].FriendlyName "ADIT-PC.FAREAST.CORP.MICROSOFT.COM"; $namedContainer = Get-AzRecoveryServicesBackupContainer ` -VaultId $vault.ID ` -ContainerType "Windows" ` -BackupManagementType "MARS" ` -FriendlyName "ADIT-PC.FAREAST.CORP.MICROSOFT.COM"; Assert-AreEqual $namedContainer.FriendlyName "ADIT-PC.FAREAST.CORP.MICROSOFT.COM"; } function Test-MabUnregisterContainer { $vault = Get-AzRecoveryServicesVault -ResourceGroupName "pstestrg" -Name "pstestrsvault"; $container = Get-AzRecoveryServicesBackupContainer ` -VaultId $vault.ID ` -ContainerType "Windows" ` -BackupManagementType "MARS" ` -FriendlyName "ADIT-PC.FAREAST.CORP.MICROSOFT.COM"; Assert-AreEqual $container.FriendlyName "ADIT-PC.FAREAST.CORP.MICROSOFT.COM"; Unregister-AzRecoveryServicesBackupContainer -VaultId $vault.ID -Container $container; $container = Get-AzRecoveryServicesBackupContainer ` -VaultId $vault.ID ` -ContainerType "Windows" ` -BackupManagementType "MARS" ` -FriendlyName "ADIT-PC.FAREAST.CORP.MICROSOFT.COM"; Assert-Null $container; }
combined_dataset/train/non-malicious/2302.ps1
2302.ps1
[CmdletBinding()] param ( [Parameter(Mandatory)] [ValidateScript({Test-Connection -ComputerName $_ -Quiet -Count 1 })] [string[]]$Computername, [string]$LogFilePath = 'C:\MyLog.log', [string]$SmtpServer = 'mail.domain.com', [string]$EmailFrom = 'notifications@domain.local', [string]$EmailSubject = 'New Local Administrator Detected', [string]$EmailRecipient = 'securityguy@domain.local' ) begin { function Write-Log ($Computer,$Members,$NewMembers) { $MyDateTime = Get-Date -Format 'MM-dd-yyyy H:mm:ss' [pscustomobject]@{ 'Computer' = $Computer; 'Date' = $MyDateTime; 'Members' = ($Members -join ','); 'NewMembers' = $NewMembers } | Export-Csv -Path $LogFilePath -Append -NoTypeInformation } } process { try { foreach ($Computer in $Computername) { Write-Verbose "Finding members of local administrators group on computer '$Computer'" $Group = [ADSI]"WinNT://$Computer/Administrators" $Members = $Group.Invoke("Members") | foreach { $_.GetType().InvokeMember("Name", 'GetProperty', $null, $_, $null) } if (!(Test-Path -Path $LogFilePath)) { Write-Verbose "The log file '$LogFilePath' does not exist on computer '$Computer'. Creating and appending member list" Write-Log -Computer $Computer -Members $Members } else { Write-Verbose 'Comparing last local administrator members with most current administrator members' $LastMembers = Import-Csv -Path $LogFilePath | Where-Object { $_.Computer -eq $Computer } if (!$LastMembers) { Write-Verbose "No members exist in log file on computer '$Computer'. Appending new results" Write-Log -Computer $Computer -Members $Members } else { $LastMembers = ($LastMembers | Select-Object -Last 1).Members.Split(',') Write-Verbose "Found $($LastMembers.Count) total local administrator members last time" $Diff = Compare-Object -ReferenceObject $LastMembers -DifferenceObject $Members | Where-Object { $_.SideIndicator -eq '=>' } if ($Diff) { $NewMembers = $Diff.InputObject Write-Log -Computer $Computer -Members $Members -NewMembers $NewMembers Write-Verbose "Found $($NewMembers.Count) new members in the local administrator group on computer '$Computer'. Emailing notification." $Params = @{ 'From' = $EmailFrom 'To' = $EmailRecipient 'Subject' = $EmailSubject 'SmtpServer' = $SmtpServer 'Body' = "The following new local administrator accounts were found on the computer $Computer`: $($NewMembers -join ',')" } } else { Write-Verbose "No additional members added to administrator group membership detected for computer '$Computer'" Write-Log -Computer $Computer -Members $Members } } } } } catch { Write-Error $_.Exception.Message } } end { try { } catch { Write-Error $_.Exception.Message } }
combined_dataset/train/non-malicious/sample_40_26.ps1
sample_40_26.ps1
# # Module manifest for module 'OCI.PSModules.Dataflow' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Dataflow.dll' # Version number of this module. ModuleVersion = '83.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '60441277-1663-4d77-af11-39ab99c7ac41' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Dataflow Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Dataflow.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIDataflowApplication', 'Get-OCIDataflowApplicationsList', 'Get-OCIDataflowPool', 'Get-OCIDataflowPoolsList', 'Get-OCIDataflowPrivateEndpoint', 'Get-OCIDataflowPrivateEndpointsList', 'Get-OCIDataflowRun', 'Get-OCIDataflowRunLog', 'Get-OCIDataflowRunLogsList', 'Get-OCIDataflowRunsList', 'Get-OCIDataflowSqlEndpoint', 'Get-OCIDataflowSqlEndpointsList', 'Get-OCIDataflowStatement', 'Get-OCIDataflowStatementsList', 'Get-OCIDataflowWorkRequest', 'Get-OCIDataflowWorkRequestErrorsList', 'Get-OCIDataflowWorkRequestLogsList', 'Get-OCIDataflowWorkRequestsList', 'Move-OCIDataflowApplicationCompartment', 'Move-OCIDataflowPoolCompartment', 'Move-OCIDataflowPrivateEndpointCompartment', 'Move-OCIDataflowRunCompartment', 'Move-OCIDataflowSqlEndpointCompartment', 'New-OCIDataflowApplication', 'New-OCIDataflowPool', 'New-OCIDataflowPrivateEndpoint', 'New-OCIDataflowRun', 'New-OCIDataflowSqlEndpoint', 'New-OCIDataflowStatement', 'Remove-OCIDataflowApplication', 'Remove-OCIDataflowPool', 'Remove-OCIDataflowPrivateEndpoint', 'Remove-OCIDataflowRun', 'Remove-OCIDataflowSqlEndpoint', 'Remove-OCIDataflowStatement', 'Start-OCIDataflowPool', 'Stop-OCIDataflowPool', 'Update-OCIDataflowApplication', 'Update-OCIDataflowPool', 'Update-OCIDataflowPrivateEndpoint', 'Update-OCIDataflowRun', 'Update-OCIDataflowSqlEndpoint' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Dataflow' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/sample_56_67.ps1
sample_56_67.ps1
# --------------------------------------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License. See License.txt in the project root for license information. # --------------------------------------------------------------------------------------------- # Prevent installing more than once per session if (Test-Path variable:global:__VSCodeOriginalPrompt) { return; } # Disable shell integration when the language mode is restricted if ($ExecutionContext.SessionState.LanguageMode -ne "FullLanguage") { return; } $Global:__VSCodeOriginalPrompt = $function:Prompt $Global:__LastHistoryId = -1 # Store the nonce in script scope and unset the global $Nonce = $env:VSCODE_NONCE $env:VSCODE_NONCE = $null $isStable = $env:VSCODE_STABLE $env:VSCODE_STABLE = $null $osVersion = [System.Environment]::OSVersion.Version $isWindows10 = $IsWindows -and $osVersion.Major -eq 10 -and $osVersion.Minor -eq 0 -and $osVersion.Build -lt 22000 if ($env:VSCODE_ENV_REPLACE) { $Split = $env:VSCODE_ENV_REPLACE.Split(":") foreach ($Item in $Split) { $Inner = $Item.Split('=', 2) [Environment]::SetEnvironmentVariable($Inner[0], $Inner[1].Replace('\x3a', ':')) } $env:VSCODE_ENV_REPLACE = $null } if ($env:VSCODE_ENV_PREPEND) { $Split = $env:VSCODE_ENV_PREPEND.Split(":") foreach ($Item in $Split) { $Inner = $Item.Split('=', 2) [Environment]::SetEnvironmentVariable($Inner[0], $Inner[1].Replace('\x3a', ':') + [Environment]::GetEnvironmentVariable($Inner[0])) } $env:VSCODE_ENV_PREPEND = $null } if ($env:VSCODE_ENV_APPEND) { $Split = $env:VSCODE_ENV_APPEND.Split(":") foreach ($Item in $Split) { $Inner = $Item.Split('=', 2) [Environment]::SetEnvironmentVariable($Inner[0], [Environment]::GetEnvironmentVariable($Inner[0]) + $Inner[1].Replace('\x3a', ':')) } $env:VSCODE_ENV_APPEND = $null } function Global:__VSCode-Escape-Value([string]$value) { # NOTE: In PowerShell v6.1+, this can be written `$value -replace '…', { … }` instead of `[regex]::Replace`. # Replace any non-alphanumeric characters. [regex]::Replace($value, "[$([char]0x00)-$([char]0x1f)\\\n;]", { param($match) # Encode the (ascii) matches as `\x<hex>` -Join ( [System.Text.Encoding]::UTF8.GetBytes($match.Value) | ForEach-Object { '\x{0:x2}' -f $_ } ) }) } function Global:Prompt() { $FakeCode = [int]!$global:? # NOTE: We disable strict mode for the scope of this function because it unhelpfully throws an # error when $LastHistoryEntry is null, and is not otherwise useful. Set-StrictMode -Off $LastHistoryEntry = Get-History -Count 1 $Result = "" # Skip finishing the command if the first command has not yet started if ($Global:__LastHistoryId -ne -1) { if ($LastHistoryEntry.Id -eq $Global:__LastHistoryId) { # Don't provide a command line or exit code if there was no history entry (eg. ctrl+c, enter on no command) $Result += "$([char]0x1b)]633;D`a" } else { # Command finished exit code # OSC 633 ; D [; <ExitCode>] ST $Result += "$([char]0x1b)]633;D;$FakeCode`a" } } # Prompt started # OSC 633 ; A ST $Result += "$([char]0x1b)]633;A`a" # Current working directory # OSC 633 ; <Property>=<Value> ST $Result += if ($pwd.Provider.Name -eq 'FileSystem') { "$([char]0x1b)]633;P;Cwd=$(__VSCode-Escape-Value $pwd.ProviderPath)`a" } # Before running the original prompt, put $? back to what it was: if ($FakeCode -ne 0) { Write-Error "failure" -ea ignore } # Run the original prompt $OriginalPrompt += $Global:__VSCodeOriginalPrompt.Invoke() $Result += $OriginalPrompt # Prompt # OSC 633 ; <Property>=<Value> ST if ($isStable -eq "0") { $Result += "$([char]0x1b)]633;P;Prompt=$(__VSCode-Escape-Value $OriginalPrompt)`a" } # Write command started $Result += "$([char]0x1b)]633;B`a" $Global:__LastHistoryId = $LastHistoryEntry.Id return $Result } # Only send the command executed sequence when PSReadLine is loaded, if not shell integration should # still work thanks to the command line sequence if (Get-Module -Name PSReadLine) { $__VSCodeOriginalPSConsoleHostReadLine = $function:PSConsoleHostReadLine function Global:PSConsoleHostReadLine { $CommandLine = $__VSCodeOriginalPSConsoleHostReadLine.Invoke() # Command line # OSC 633 ; E ; <CommandLine?> ; <Nonce?> ST $Result = "$([char]0x1b)]633;E;" $Result += $(__VSCode-Escape-Value $CommandLine) # Only send the nonce if the OS is not Windows 10 as it seems to echo to the terminal # sometimes if ($IsWindows10 -eq $false) { $Result += ";$Nonce" } $Result += "`a" # Command executed # OSC 633 ; C ST $Result += "$([char]0x1b)]633;C`a" # Write command executed sequence directly to Console to avoid the new line from Write-Host [Console]::Write($Result) $CommandLine } } # Set IsWindows property if ($PSVersionTable.PSVersion -lt "6.0") { # Windows PowerShell is only available on Windows [Console]::Write("$([char]0x1b)]633;P;IsWindows=$true`a") } else { [Console]::Write("$([char]0x1b)]633;P;IsWindows=$IsWindows`a") } # Set ContinuationPrompt property if ($isStable -eq "0") { $ContinuationPrompt = (Get-PSReadLineOption).ContinuationPrompt if ($ContinuationPrompt) { [Console]::Write("$([char]0x1b)]633;P;ContinuationPrompt=$(__VSCode-Escape-Value $ContinuationPrompt)`a") } } # Set always on key handlers which map to default VS Code keybindings function Set-MappedKeyHandler { param ([string[]] $Chord, [string[]]$Sequence) try { $Handler = Get-PSReadLineKeyHandler -Chord $Chord | Select-Object -First 1 } catch [System.Management.Automation.ParameterBindingException] { # PowerShell 5.1 ships with PSReadLine 2.0.0 which does not have -Chord, # so we check what's bound and filter it. $Handler = Get-PSReadLineKeyHandler -Bound | Where-Object -FilterScript { $_.Key -eq $Chord } | Select-Object -First 1 } if ($Handler) { Set-PSReadLineKeyHandler -Chord $Sequence -Function $Handler.Function } } function Set-MappedKeyHandlers { Set-MappedKeyHandler -Chord Ctrl+Spacebar -Sequence 'F12,a' Set-MappedKeyHandler -Chord Alt+Spacebar -Sequence 'F12,b' Set-MappedKeyHandler -Chord Shift+Enter -Sequence 'F12,c' Set-MappedKeyHandler -Chord Shift+End -Sequence 'F12,d' # Enable suggestions if the environment variable is set and Windows PowerShell is not being used # as APIs are not available to support this feature if ($env:VSCODE_SUGGEST -eq '1' -and $PSVersionTable.PSVersion -ge "6.0") { Remove-Item Env:VSCODE_SUGGEST # VS Code send completions request (may override Ctrl+Spacebar) Set-PSReadLineKeyHandler -Chord 'F12,e' -ScriptBlock { Send-Completions } # TODO: When does this invalidate? Installing a new module could add new commands. We could expose a command to update? Track `(Get-Module).Count`? # Get commands, convert to string array to reduce the payload size and send as JSON $commands = [System.Management.Automation.CompletionCompleters]::CompleteCommand('') $mappedCommands = $commands | ForEach-Object { ,@($_.CompletionText, $_.listItemText, $_.ResultType, $_.tooltip) } $result = "$([char]0x1b)]633;CompletionsPwshCommands;commands;" $result += $mappedCommands | ConvertTo-Json -Compress $result += "`a" Write-Host -NoNewLine $result } } function Send-Completions { $commandLine = "" $cursorIndex = 0 [Microsoft.PowerShell.PSConsoleReadLine]::GetBufferState([ref]$commandLine, [ref]$cursorIndex) $completionPrefix = $commandLine # Start completions sequence $result = "$([char]0x1b)]633;Completions" # If there is a space in the input, defer to TabExpansion2 as it's more complicated to # determine what type of completions to use # `[` is included here as namespace commands are not included in CompleteCommand(''), # additionally for some reason CompleteVariable('[') causes the prompt to clear and reprint # multiple times if ($completionPrefix.Contains(' ') -or $completionPrefix.Contains('[') -or $PSVersionTable.PSVersion -lt "6.0") { $completions = TabExpansion2 -inputScript $completionPrefix -cursorColumn $cursorIndex if ($null -ne $completions.CompletionMatches) { $result += ";$($completions.ReplacementIndex);$($completions.ReplacementLength);$($cursorIndex);" if ($completions.CompletionMatches.Count -gt 0 -and $completions.CompletionMatches.Where({ $_.ResultType -eq 3 -or $_.ResultType -eq 4 })) { $json = [System.Collections.ArrayList]@($completions.CompletionMatches) # Add . and .. to the completions list $json.Add([System.Management.Automation.CompletionResult]::new( '.', '.', [System.Management.Automation.CompletionResultType]::ProviderContainer, (Get-Location).Path) ) $json.Add([System.Management.Automation.CompletionResult]::new( '..', '..', [System.Management.Automation.CompletionResultType]::ProviderContainer, (Split-Path (Get-Location) -Parent)) ) $mappedCommands = $json | ForEach-Object { ,@($_.CompletionText, $_.listItemText, $_.ResultType, $_.tooltip) } $result += $mappedCommands | ConvertTo-Json -Compress } else { $mappedCommands = $completions.CompletionMatches | ForEach-Object { ,@($_.CompletionText, $_.listItemText, $_.ResultType, $_.tooltip) } $result += $mappedCommands | ConvertTo-Json -Compress } } } # If there is no space, get completions using CompletionCompleters as it gives us more # control and works on the empty string else { # Note that CompleteCommand isn't included here as it's expensive $completions = $( ([System.Management.Automation.CompletionCompleters]::CompleteFilename($completionPrefix)); ([System.Management.Automation.CompletionCompleters]::CompleteVariable($completionPrefix)); ) if ($null -ne $completions) { $result += ";$($completions.ReplacementIndex);$($completions.ReplacementLength);$($cursorIndex);" $mappedCommands = $completions | ForEach-Object { ,@($_.CompletionText, $_.listItemText, $_.ResultType, $_.tooltip) } $result += $mappedCommands | ConvertTo-Json -Compress } else { $result += ";0;$($completionPrefix.Length);$($completionPrefix.Length);[]" } } # End completions sequence $result += "`a" Write-Host -NoNewLine $result } # Register key handlers if PSReadLine is available if (Get-Module -Name PSReadLine) { Set-MappedKeyHandlers }
combined_dataset/train/non-malicious/Get-PDC09Videos_1.ps1
Get-PDC09Videos_1.ps1
#requires -version 2.0 PARAM ( [Parameter(Position=1, Mandatory=$true)] [ValidateSet("wmv","wmvhigh","ppt")] # the "mp4" files aren't there yet [String]$MediaType, [string]$Destination = $PWD ) Import-Module BitsTransfer Push-Location $Destination $Extension = $(switch -wildcard($MediaType){"wmv*"{"wmv"} "mp4"{"mp4"} "ppt"{"pptx"}}) $BaseUrl = "http://ecn.channel9.msdn.com/o9/pdc09/{0}/{2}.{1}" Start-BitsTransfer -TransferType Download -Source @( "CL09","CL18","FT02","FT06","FT11","PR05","SVC01","SVC10","SVC20","SVR03","CL30","CL33","FT30", "FT31","PR31","SVC30","SVC37","SVR33","VTL30","VTL32","CL04","CL14","CL25","FT18","FT19","FT25", "PR02","SVC13","SVR01","SVR14","CL13","CL29","FT10","FT28","FT57","PR11","SVC52","SVR15","SVR17", "CL11","CL17","CL23","FT03","FT08","PR10","SVR16","VTL01","CL01","FT50","FT52","FT55","FT59","PR13", "SVC02","SVC03","SVC15","CL31","CL34","FT32","FT34","FT36","SVC31","SVC32","SVR31","VTL31","CL15", "FT12","FT17","FT58","SVC16","SVC28","SVC53","SVR11","VTL05","CL06","FT04","FT07","FT29","PR06", "SVC09","SVC17","SVR13","VTL04","CL12","CL22","FT22","FT23","FT26","SVC04","SVC14","SVC19","SVC54", "SVR12","CL02","CL05","CL16","FT21","FT56","PR03","SVC08","SVC18","SVR10","VTL03","CL10","FT13", "FT53","FT60","PR07","SVC06","SVC25","SVR07","SVR18","VTL02","CL03","CL21","CL27","FT14","FT20", "FT24","PR09","SVC12","SVR09","SVR19","CL32","CL35","CL36","FT33","FT35","PR30","PR33","SVC33", "SVC36","SVR32","CL07","CL24","CL28","FT09","FT16","FT27","PR12","SVC27","SVR02","SVR06","CL26", "FT05","FT54","PR01","PR14","SVC23","SVC26","SVR08","KYN01-PGM","KYN02-PGM" | ForEach { $BaseUrl -f $MediaType, $Extension, $_ } ) Pop-Location
combined_dataset/train/non-malicious/4375.ps1
4375.ps1
function Resolve-Location { [CmdletBinding()] [OutputType([string])] Param ( [Parameter(Mandatory=$true)] [string] $Location, [Parameter(Mandatory=$true)] [string] $LocationParameterName, [Parameter()] $Credential, [Parameter()] $Proxy, [Parameter()] $ProxyCredential, [Parameter()] [System.Management.Automation.PSCmdlet] $CallerPSCmdlet ) if(-not (Test-WebUri -uri $Location)) { if(Microsoft.PowerShell.Management\Test-Path -LiteralPath $Location) { return $Location } elseif($CallerPSCmdlet) { $message = $LocalizedData.PathNotFound -f ($Location) ThrowError -ExceptionName "System.ArgumentException" ` -ExceptionMessage $message ` -ErrorId "PathNotFound" ` -CallerPSCmdlet $CallerPSCmdlet ` -ErrorCategory InvalidArgument ` -ExceptionObject $Location } } else { $pingResult = Ping-Endpoint -Endpoint $Location -Credential $Credential -Proxy $Proxy -ProxyCredential $ProxyCredential $statusCode = $null $exception = $null $resolvedLocation = $null if($pingResult -and $pingResult.ContainsKey($Script:ResponseUri)) { $resolvedLocation = $pingResult[$Script:ResponseUri] } if($pingResult -and $pingResult.ContainsKey($Script:StatusCode)) { $statusCode = $pingResult[$Script:StatusCode] } Write-Debug -Message "Ping-Endpoint: location=$Location, statuscode=$statusCode, resolvedLocation=$resolvedLocation" if((($statusCode -eq 200) -or ($statusCode -eq 401) -or ($statusCode -eq 407)) -and $resolvedLocation) { return $resolvedLocation } elseif($CallerPSCmdlet) { $message = $LocalizedData.InvalidWebUri -f ($Location, $LocationParameterName) ThrowError -ExceptionName "System.ArgumentException" ` -ExceptionMessage $message ` -ErrorId "InvalidWebUri" ` -CallerPSCmdlet $CallerPSCmdlet ` -ErrorCategory InvalidArgument ` -ExceptionObject $Location } } }
combined_dataset/train/non-malicious/sophos_mrupdate.ps1
sophos_mrupdate.ps1
<# .SYNOPSIS Updates the Sophos Message Relay configuration. .DESCRIPTION Points the local Message Router service to a new parent relay server. .PARAMETER mrinit The mrinit.conf file to use. .PARAMETER loglevel The current loglevel (used by the Log function). Defaults to 'information' (debug messages will not be printed). Valid values are 'debug', 'information', 'warning', and 'error'. .EXAMPLE # Update settings using the configuration in the file AMW_mrinit.conf sophos_mrupdate.ps1 -mrinit AMW_mrinit.conf #> param([Parameter(Mandatory=$true)][string]$mrinit, [Parameter(Mandatory=$false)][string]$loglevel=1) # LOGGING ##################################################################### # Set severity constants $MSG_DEBUG = 0 $MSG_INFORMATION = 1 $MSG_WARNING = 2 $MSG_ERROR = 3 $MSG_SEVERITY = @('debug', 'information', 'warning', 'error') if ($MSG_SEVERITY -notcontains $loglevel.ToLower()) { Write-Error ('Invalid loglevel! ' + 'Must be debug, information, warning, or error.') exit 1 } else { foreach ($index in (0..($MSG_SEVERITY.Count - 1))) { if ($MSG_SEVERITY[$index] -eq $loglevel) { $loglevel = $index } } } # Set configurable settings for logging $LOG_FILE = 'c:\\windows\\temp\\sophos_mrupdate.log' $SMTP_TO = 'sophos-virusalerts@company.com' $SMTP_SERVER = 'smtp.company.com' $SMTP_SUBJECT = 'Sophos MRUpdate Error' $SMTP_FROM = 'sophos-mrupdate@company.com' function Log { <# .SYNOPSIS Writes a message to the Log. .DESCRIPTION Logs a message to the logfile if the severity is higher than $loglevel. .PARAMETER severity The severity of the message. Can be Information, Warning, or Error. Use the $MSG_XXXX constants. Note that Error will halt the script and send an email. .PARAMETER message A string to be printed to the log. .EXAMPLE Log $MSG_ERROR "Something has gone terribly wrong!" #> param([Parameter(Mandatory=$true)][int]$severity, [Parameter(Mandatory=$true)][string]$message, [Parameter()][switch]$sendmail) if ($severity -ge $loglevel) { $timestamp = Get-Date -Format 'yyyy-MM-dd hh:mm:ss' $output = ("$timestamp`t$($env:computername)`t" + "$($MSG_SEVERITY[$severity])`t$message") Write-Output $output >> $LOG_FILE if (($severity -ge $MSG_ERROR) -or $sendmail) { Send-MailMessage -To $SMTP_TO ` -SmtpServer $SMTP_SERVER ` -Subject "$SMTP_SUBJECT on $($env:computername)" ` -Body $output ` -From $SMTP_FROM exit 1 } } } # MAIN ######################################################################## # The path to the Remote Management System files $CURRENT_PATH = $pwd $RMS_PATH = 'C:\\Program Files (x86)\\Sophos\\Remote Management System\\' if (-not (Test-Path $RMS_PATH)) { $RMS_PATH = 'C:\\Program Files\\Sophos\\Remote Management System\\' if (-not (Test-Path $RMS_PATH)) { Log $MSG_ERROR "The path '$RMS_PATH' could not be found!" } } #Copy over the new mrinit.conf file Log $MSG_DEBUG "Copying file '$mrinit'..." if (Test-Path ".\\$mrinit") { try { Copy-Item -Path ".\\$mrinit" -Destination ($RMS_PATH + 'mrinit.conf') -Force } catch { LOG $MSG_ERROR "Unable to copy $mrinit to the RMS directory!" } } else { LOG $MSG_ERROR "File '$mrinit' missing! Check the SCCM package." exit 1 } Log $MSG_DEBUG "Changing directory to $RMS_PATH..." cd $RMS_PATH # Get the backup copies of mrinit.conf out of the way. For some reason # RMS will inexplicably use the backup copy instead of the new one if you don't Log $MSG_DEBUG 'Renaming mrinit.conf.orig to mrinit.conf.orig.old' try { Rename-Item '.\\mrinit.conf.orig' '.\\mrinit.conf.orig.old' ` -Force ` -ea SilentlyContinue } catch { Log $MSG_ERROR "Unable to rename the file 'mrinit.orig'!" } # This is the command that actually grabs the new mrinit.conf file and makes # the important updates to the system. .\\ClientMRInit.exe # Let's restart the Message Router net stop "Sophos Message Router" net start "Sophos Message Router" cd $CURRENT_PATH # Voila! We're done.
combined_dataset/train/non-malicious/sample_58_62.ps1
sample_58_62.ps1
# ------------------------------------------------------------ # Copyright (c) Microsoft Corporation. All rights reserved. # Licensed under the MIT License (MIT). See License.txt in the repo root for license information. # ------------------------------------------------------------ [CmdletBinding(DefaultParametersetName="Unsecure")] param ( [Parameter(ParameterSetName="Unsecure", Mandatory=$true)] [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)] [string] $NodeName, [Parameter(ParameterSetName="Unsecure", Mandatory=$true)] [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)] [string] $NodeType, [Parameter(ParameterSetName="Unsecure", Mandatory=$true)] [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)] [string] $NodeIpAddressOrFQDN, [Parameter(ParameterSetName="Unsecure", Mandatory=$true)] [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)] [string] $ExistingClientConnectionEndpoint, [Parameter(ParameterSetName="Unsecure", Mandatory=$true)] [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)] [string] $UpgradeDomain, [Parameter(ParameterSetName="Unsecure", Mandatory=$true)] [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)] [string] $FaultDomain, [Parameter(ParameterSetName="Unsecure", Mandatory=$false)] [Parameter(ParameterSetName="Certificate", Mandatory=$false)] [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)] [switch] $AcceptEULA, [Parameter(ParameterSetName="Unsecure", Mandatory=$false)] [Parameter(ParameterSetName="Certificate", Mandatory=$false)] [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)] [switch] $Force, [Parameter(ParameterSetName="Unsecure", Mandatory=$false)] [Parameter(ParameterSetName="Certificate", Mandatory=$false)] [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)] [switch] $NoCleanupOnFailure, [Parameter(ParameterSetName="Unsecure", Mandatory=$false)] [Parameter(ParameterSetName="Certificate", Mandatory=$false)] [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)] [switch] $BypassUpgradeStateValidation, [Parameter(ParameterSetName="Unsecure", Mandatory=$false)] [Parameter(ParameterSetName="Certificate", Mandatory=$false)] [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)] [switch] $FabricIsPreInstalled, [Parameter(ParameterSetName="Unsecure", Mandatory=$false)] [Parameter(ParameterSetName="Certificate", Mandatory=$false)] [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)] [string] $FabricRuntimePackagePath, [Parameter(ParameterSetName="Unsecure", Mandatory=$false)] [Parameter(ParameterSetName="Certificate", Mandatory=$false)] [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$false)] [int] $TimeoutInSeconds, [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [switch] $X509Credential, [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [string] $ServerCertThumbprint, [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [string] $StoreLocation, [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [string] $StoreName, [Parameter(ParameterSetName="Certificate", Mandatory=$true)] [string] $FindValueThumbprint, [Parameter(ParameterSetName="WindowsSecurity", Mandatory=$true)] [switch] $WindowsCredential ) $Identity = [System.Security.Principal.WindowsIdentity]::GetCurrent() $Principal = New-Object System.Security.Principal.WindowsPrincipal($Identity) $IsAdmin = $Principal.IsInRole([System.Security.Principal.WindowsBuiltInRole]::Administrator) if(!$IsAdmin) { Write-Host "Please run the script with administrative privileges." -ForegroundColor "Red" exit 1 } if(!$AcceptEULA.IsPresent) { $EulaAccepted = Read-Host 'Do you accept the license terms for using Microsoft Azure Service Fabric located in the root of your package download? If you do not accept the license terms you may not use the software. [Y] Yes [N] No [?] Help (default is "N")' if($EulaAccepted -ne "y" -and $EulaAccepted -ne "Y") { Write-host "You need to accept the license terms for using Microsoft Azure Service Fabric located in the root of your package download before you can use the software." -ForegroundColor "Red" exit 1 } } $ThisScriptPath = $(Split-Path -parent $MyInvocation.MyCommand.Definition) $DeployerBinPath = Join-Path $ThisScriptPath -ChildPath "DeploymentComponents" if(!(Test-Path $DeployerBinPath)) { $DCAutoExtractorPath = Join-Path $ThisScriptPath "DeploymentComponentsAutoextractor.exe" if(!(Test-Path $DCAutoExtractorPath)) { Write-Host "Standalone package DeploymentComponents and DeploymentComponentsAutoextractor.exe are not present local to the script location." exit 1 } #Extract DeploymentComponents $DCAutoExtractorCommand = "`"$DCAutoExtractorPath`" /E /Y /L `"$ThisScriptPath`"" # special case for older powershell versions < 5 if ($PSVersionTable.PSVersion.Major -lt 5) { $DCAutoExtractorCommand = "`"`"$DCAutoExtractorPath`" /E /Y /L `"$ThisScriptPath`"`"" } Write-Host "running autoextractor command: $DCAutoExtractorCommand" $DCExtractOutput = cmd.exe /c "$DCAutoExtractorCommand && exit 0 || exit 1" if($LASTEXITCODE -eq 1) { Write-Host "Extracting DeploymentComponents Cab ran into an issue." Write-Host $DCExtractOutput exit 1 } else { Write-Host "DeploymentComponents extracted." } } $SystemFabricModulePath = Join-Path $DeployerBinPath -ChildPath "System.Fabric.dll" if(!(Test-Path $SystemFabricModulePath)) { Write-Host "Run the script local to the Standalone package directory." exit 1 } $MicrosoftServiceFabricCabFileAbsolutePath = $null if ((Test-Path variable:FabricRuntimePackagePath) ` -and ![string]::IsNullOrEmpty($FabricRuntimePackagePath)) { $MicrosoftServiceFabricCabFileAbsolutePath = Resolve-Path $FabricRuntimePackagePath if(!(Test-Path $MicrosoftServiceFabricCabFileAbsolutePath)) { Write-Host "Microsoft Service Fabric Runtime package not found in the specified directory : $FabricRuntimePackagePath" exit 1 } Write-Verbose "Using runtime package $MicrosoftServiceFabricCabFileAbsolutePath" } else { $RuntimeBinPath = Join-Path $ThisScriptPath -ChildPath "DeploymentRuntimePackages" if(!(Test-Path $RuntimeBinPath)) { Write-Host "No directory exists for Runtime packages. Creating a new directory." md $RuntimeBinPath | Out-Null Write-Host "Done creating $RuntimeBinPath" } Write-Verbose "Will use downloaded runtime package for deployment from $RuntimeBinPath" } $ServiceFabricPowershellModulePath = Join-Path $DeployerBinPath -ChildPath "ServiceFabric.psd1" if (!(Test-Path variable:TimeoutInSeconds) ` -or ($TimeoutInSeconds -le 0)) { $TimeoutInSeconds = 300 Write-Verbose "TimeoutInSeconds was not set. Defaulting to $TimeoutInSeconds seconds." } $parentVerbosePreference = $VerbosePreference # Invoke in separate AppDomain if($X509Credential) { Write-Verbose "X509Credential: $X509Credential" $argList = @{ "DeployerBinPath" = $DeployerBinPath; "ExistingClientConnectionEndpoint" = $ExistingClientConnectionEndpoint; "ServiceFabricPowershellModulePath" = $ServiceFabricPowershellModulePath; "NodeName" = $NodeName; "NodeType" = $NodeType; "NodeIpAddressOrFQDN" = $NodeIpAddressOrFQDN; "UpgradeDomain" = $UpgradeDomain; "FaultDomain" = $FaultDomain; "Force" = $Force.IsPresent; "NoCleanupOnFailure" = $NoCleanupOnFailure.IsPresent; "BypassUpgradeStateValidation" = $BypassUpgradeStateValidation.IsPresent; "FabricIsPreInstalled" = $FabricIsPreInstalled.IsPresent; "MicrosoftServiceFabricCabFileAbsolutePath" = $MicrosoftServiceFabricCabFileAbsolutePath; "TimeoutInSeconds" = $TimeoutInSeconds; "parentVerbosePreference" = $parentVerbosePreference; "WindowsCredential" = $false; "X509Credential" = $true; "ServerCertThumbprint" = $ServerCertThumbprint; "StoreLocation" = $StoreLocation; "StoreName" = $StoreName; "FindValueThumbprint" = $FindValueThumbprint; } } else { if($WindowsCredential) { Write-Verbose "WindowsCredential: $WindowsCredential" $argList = @{ "DeployerBinPath" = $DeployerBinPath; "ExistingClientConnectionEndpoint" = $ExistingClientConnectionEndpoint; "ServiceFabricPowershellModulePath" = $ServiceFabricPowershellModulePath; "NodeName" = $NodeName; "NodeType" = $NodeType; "NodeIpAddressOrFQDN" = $NodeIpAddressOrFQDN; "UpgradeDomain" = $UpgradeDomain; "FaultDomain" = $FaultDomain; "Force" = $Force.IsPresent; "NoCleanupOnFailure" = $NoCleanupOnFailure.IsPresent; "BypassUpgradeStateValidation" = $BypassUpgradeStateValidation.IsPresent; "FabricIsPreInstalled" = $FabricIsPreInstalled.IsPresent; "MicrosoftServiceFabricCabFileAbsolutePath" = $MicrosoftServiceFabricCabFileAbsolutePath; "TimeoutInSeconds" = $TimeoutInSeconds; "parentVerbosePreference" = $parentVerbosePreference; "WindowsCredential" = $true; } } else { Write-Verbose "Not X509Credential nor WindowsCredential." $argList = @{ "DeployerBinPath" = $DeployerBinPath; "ExistingClientConnectionEndpoint" = $ExistingClientConnectionEndpoint; "ServiceFabricPowershellModulePath" = $ServiceFabricPowershellModulePath; "NodeName" = $NodeName; "NodeType" = $NodeType; "NodeIpAddressOrFQDN" = $NodeIpAddressOrFQDN; "UpgradeDomain" = $UpgradeDomain; "FaultDomain" = $FaultDomain; "Force" = $Force.IsPresent; "NoCleanupOnFailure" = $NoCleanupOnFailure.IsPresent; "BypassUpgradeStateValidation" = $BypassUpgradeStateValidation.IsPresent; "FabricIsPreInstalled" = $FabricIsPreInstalled.IsPresent; "MicrosoftServiceFabricCabFileAbsolutePath" = $MicrosoftServiceFabricCabFileAbsolutePath; "TimeoutInSeconds" = $TimeoutInSeconds; "parentVerbosePreference" = $parentVerbosePreference; } } } if ($parentVerbosePreference -ne "SilentlyContinue") { $argList.Keys | ForEach-Object { Write-Verbose "$($_)=$($argList.$_)" } } $standaloneArgsFilepath=Join-Path $([System.IO.Path]::GetTempPath()) "SFStandaloneArgs.txt" if (Test-Path $standaloneArgsFilepath) { Remove-Item $standaloneArgsFilepath -Force 2> $null } $argList.Keys | ForEach-Object { Add-Content $standaloneArgsFilepath "$($_)=$($argList.$_)" } $standaloneArgsFilepath = Resolve-Path $standaloneArgsFilepath $shelloutArgs = @( $standaloneArgsFilepath ) Powershell -Command { param ( [Parameter(Mandatory=$true)] [string] $ParamFilepath ) Get-Content $ParamFilepath | Where-Object {$_.length -gt 0} | Where-Object {!$_.StartsWith("#")} | ForEach-Object { $var = $_.Split('=') if ($var.Length -eq 2) { New-Variable -Name $var[0] -Value $var[1] -Force } } Remove-Item $ParamFilepath -Force 2> $null if (![string]::IsNullOrEmpty($Force)) { $Force = [Convert]::ToBoolean($Force); } else { $Force = $false} if (![string]::IsNullOrEmpty($NoCleanupOnFailure)) { $NoCleanupOnFailure = [Convert]::ToBoolean($NoCleanupOnFailure); } else { $NoCleanupOnFailure = $false} if (![string]::IsNullOrEmpty($BypassUpgradeStateValidation)) { $BypassUpgradeStateValidation = [Convert]::ToBoolean($BypassUpgradeStateValidation); } else { $BypassUpgradeStateValidation = $false} if (![string]::IsNullOrEmpty($FabricIsPreInstalled)) { $FabricIsPreInstalled = [Convert]::ToBoolean($FabricIsPreInstalled); } else { $FabricIsPreInstalled = $false} if (![string]::IsNullOrEmpty($WindowsCredential)) { $WindowsCredential = [Convert]::ToBoolean($WindowsCredential); } else { $WindowsCredential = $false} if (![string]::IsNullOrEmpty($X509Credential)) { $X509Credential = [Convert]::ToBoolean($X509Credential); } else { $X509Credential = $false} if (![string]::IsNullOrEmpty($TimeoutInSeconds)) { $TimeoutInSeconds = [Convert]::ToInt32($TimeoutInSeconds); } #Add FabricCodePath Environment Path $env:path = "$($DeployerBinPath);" + $env:path #Import Service Fabric Powershell Module Import-Module $ServiceFabricPowershellModulePath Try { # Connect to the existing cluster Write-Verbose "Connecting to the cluster at $ExistingClientConnectionEndpoint" if($X509Credential) { Connect-ServiceFabricCluster -ConnectionEndpoint $ExistingClientConnectionEndpoint -X509Credential -ServerCertThumbprint $ServerCertThumbprint -StoreLocation $StoreLocation -StoreName $StoreName -FindValue $FindValueThumbprint -FindType FindByThumbprint } else { if($WindowsCredential) { Connect-ServiceFabricCluster $ExistingClientConnectionEndpoint -WindowsCredential } else { Connect-ServiceFabricCluster $ExistingClientConnectionEndpoint } } } Catch { Write-Host "Cannot form client connection to cluster. Check your ClientConnectionEndpoint and security credentials. Exception thrown : $($_.Exception.ToString())" -ForegroundColor Red exit 1 } if ($ClusterConnection -eq $null) { Write-Host "Could not form client connection to cluster. Check your ClientConnectionEndpoint and security credentials." -ForegroundColor Red exit 1 } if ($FabricIsPreInstalled) { Write-Host "Switch FabricIsPreInstalled is set, so assuming Fabric runtime is already installed on the machine." } elseif (!(Test-Path variable:MicrosoftServiceFabricCabFileAbsolutePath) ` -or [string]::IsNullOrEmpty($MicrosoftServiceFabricCabFileAbsolutePath)) { Try { # Get runtime package details $UpgradeStatus = Get-ServiceFabricClusterUpgrade } Catch { Write-Host "Could not query current cluster version. Check your ClientConnectionEndpoint and security credentials." -ForegroundColor Red exit 1 } if ($UpgradeStatus.UpgradeState -ne "RollingForwardCompleted" -And $UpgradeStatus.UpgradeState -ne "RollingBackCompleted") { if ($BypassUpgradeStateValidation) { Write-Host "BypassUpgradeStateValidation is set but cannot be used without FabricRuntimePackagePath when cluster version cannot be automatically inferred from the upgrade state." -ForegroundColor Red } Write-Host "New node cannot be added to the cluster while upgrade is in progress or before cluster has finished bootstrapping. To monitor upgrade state run Get-ServiceFabricClusterUpgrade and wait until UpgradeState switches to either RollingForwardCompleted or RollingBackCompleted." -ForegroundColor Red exit 1 } Try { $RuntimeCabFilename = "MicrosoftAzureServiceFabric." + $UpgradeStatus.TargetCodeVersion + ".cab" $DeploymentPackageRoot = Split-Path -parent $DeployerBinPath $RuntimeBinPath = Join-Path $DeploymentPackageRoot -ChildPath "DeploymentRuntimePackages" $MicrosoftServiceFabricCabFilePath = Join-Path $RuntimeBinPath -ChildPath $RuntimeCabFilename if (!(Test-Path $MicrosoftServiceFabricCabFilePath)) { $RuntimePackageDetails = Get-ServiceFabricRuntimeSupportedVersion $RequiredPackage = $RuntimePackageDetails.RuntimePackages | where { $_.Version -eq $UpgradeStatus.TargetCodeVersion } if ($RequiredPackage -eq $null) { Write-Host "The required runtime version is no longer supported. Please upgrade your cluster to the latest version before adding a node." -ForegroundColor Red exit 1 } $Version = $UpgradeStatus.TargetCodeVersion Write-Host "Runtime package version $Version was not found in DeploymentRuntimePackages folder and needed to be downloaded." (New-Object System.Net.WebClient).DownloadFile($RuntimePackageDetails.GoalRuntimeLocation, $MicrosoftServiceFabricCabFilePath) Write-Host "Runtime package has been successfully downloaded to $MicrosoftServiceFabricCabFilePath." } $MicrosoftServiceFabricCabFileAbsolutePath = Resolve-Path $MicrosoftServiceFabricCabFilePath } Catch { Write-Host "Runtime package cannot be downloaded. Check your internet connectivity. If the cluster is not connected to the internet run Get-ServiceFabricClusterUpgrade and note the TargetCodeVersion. Run Get-ServiceFabricRuntimeSupportedVersion from a machine connected to the internet to get the download links for all supported fabric versions. Download the package corresponding to your TargetCodeVersion. Pass -FabricRuntimePackageOutputDirectory <Path to runtime package> to AddNode.ps1 in addition to other parameters. Exception thrown : $($_.Exception.ToString())" -ForegroundColor Red exit 1 } } #Add Node to an existing cluster Try { $AddNodeTimeoutDuration=[System.TimeSpan]::FromSeconds($TimeoutInSeconds) $AddNodeTimeout=[System.DateTime]::UtcNow + $AddNodeTimeoutDuration Get-ServiceFabricNode | ft $VerbosePreference = $parentVerbosePreference $params = @{ 'NodeName' = $NodeName; 'NodeType' = $NodeType; 'IpAddressOrFQDN' = $NodeIpAddressOrFQDN; 'UpgradeDomain' = $UpgradeDomain; 'FaultDomain' = $FaultDomain; 'FabricRuntimePackagePath' = $MicrosoftServiceFabricCabFileAbsolutePath; 'NoCleanupOnFailure' = $NoCleanupOnFailure; 'Force' = $Force; 'BypassUpgradeStateValidation' = $BypassUpgradeStateValidation; 'FabricIsPreInstalled' = $FabricIsPreInstalled; } if ((Test-Path variable:TimeoutInSeconds) ` -and ($TimeoutInSeconds -gt 0)) { $params += @{'TimeoutSec' = $TimeoutInSeconds;} } Write-Host "Adding Node $NodeName" Add-ServiceFabricNode @params Write-Host "Waiting for node to join cluster." -NoNewline $nodeJoined=$false $firstRun=$true do { if (!$nodeJoined -and !$firstRun) { Write-Host "." -NoNewline Start-Sleep -s 10 } $result=Get-ServiceFabricNode | Where-Object { [System.String]::Compare($_.NodeName, $NodeName, [System.StringComparison]::InvariantCulture) -eq 0 } $nodeJoined=$result.Count -gt 0 $firstRun=$false } while(!$nodeJoined -and ([System.DateTime]::UtcNow -lt $AddNodeTimeout)) Write-Host "" # Newline if(-not $nodeJoined) { Write-Host "Node did not join within timeout of $TimeoutInSeconds seconds." -ForegroundColor Red exit 1 } Get-ServiceFabricNode | ft Write-Host "Node $NodeName joined the cluster!" -ForegroundColor Green } Catch { if($VerbosePreference -eq "SilentlyContinue") { Write-Host "Add Node failed. Call with -Verbose for more details" -ForegroundColor Red } Write-Host "Add node to existing cluster failed with exception: $($_.Exception.ToString())" -ForegroundColor Red exit 1 } } -args $shelloutArgs -OutputFormat Text $env:Path = [System.Environment]::GetEnvironmentVariable("path","Machine") # SIG # Begin signature block # MIInoQYJKoZIhvcNAQcCoIInkjCCJ44CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAaWS1eDTImCPqr # XkXx+JOiU509Id8D94uRE9I3NDASNqCCDXYwggX0MIID3KADAgECAhMzAAACURR2 # zMWFg24LAAAAAAJRMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjEwOTAyMTgzMjU5WhcNMjIwOTAxMTgzMjU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDBIpXR3b1IYAMunV9ZYBVYsaA7S64mqacKy/OJUf0Lr/LW/tWlJDzJH9nFAhs0 # zzSdQQcLhShOSTUxtlwZD9dnfIcx4pZgu0VHkqQw2dVc8Ob21GBo5sVrXgEAQxZo # rlEuAl20KpSIFLUBwoZFGFSQNSMcqPudXOw+Mhvn6rXYv/pjXIjgBntn6p1f+0+C # 2NXuFrIwjJIJd0erGefwMg//VqUTcRaj6SiCXSY6kjO1J9P8oaRQBHIOFEfLlXQ3 # a1ATlM7evCUvg3iBprpL+j1JMAUVv+87NRApprPyV75U/FKLlO2ioDbb69e3S725 # XQLW+/nJM4ihVQ0BHadh74/lAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUMLgM7NX5EnpPfK5uU6FPvn2g/Ekw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzQ2NzU5NjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIVJlff+Fp0ylEJhmvap # NVv1bYLSWf58OqRRIDnXbHQ+FobsOwL83/ncPC3xl8ySR5uK/af4ZDy7DcDw0yEd # mKbRLzHIfcztZVSrlsg0GKwZuaB2MEI1VizNCoZlN+HlFZa4DNm3J0LhTWrZjVR0 # M6V57cFW0GsV4NlqmtelT9JFEae7PomwgAV9xOScz8HzvbZeERcoSRp9eRsQwOw7 # 8XeCLeglqjUnz9gFM7RliCYP58Fgphtkht9LNEcErLOVW17m6/Dj75zg/IS+//6G # FEK2oXnw5EIIWZraFHqSaee+NMgOw/R6bwB8qLv5ClOJEpGKA3XPJvS9YgOpF920 # Vu4Afqa5Rv5UJKrsxA7HOiuH4TwpkP3XQ801YLMp4LavXnvqNkX5lhFcITvb01GQ # lcC5h+XfCv0L4hUum/QrFLavQXJ/vtirCnte5Bediqmjx3lswaTRbr/j+KX833A1 # l9NIJmdGFcVLXp1en3IWG/fjLIuP7BqPPaN7A1tzhWxL+xx9yw5vQiT1Yn14YGmw # OzBYYLX0H9dKRLWMxMXGvo0PWEuXzYyrdDQExPf66Fq/EiRpZv2EYl2gbl9fxc3s # qoIkyNlL1BCrvmzunkwt4cwvqWremUtqTJ2B53MbBHlf4RfvKz9NVuh5KHdr82AS # MMjU4C8KNTqzgisqQdCy8unTMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGYEwghl9AgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAJRFHbMxYWDbgsAAAAAAlEwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFV94myVv8uodI4+8m0NDbyF # cRyY34Apv8ogTu5v5GZjMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAkDPnC9UfuakL3K8pvfxYlJaFuGA5eBzL1Spo7vr/lLOJrRD3T15/qkg2 # hXyWykPUCAli/V5Nw1TmC4WUpkQA9RfTM6/lDaB1ZeQoCnOU4pLrR+ovPvmCTe/7 # g+TCsvZyIvfd283RMGelrClyB/3OMzleHu6KZq3+G568Hw8xgKAq/7/33iEc2Fqb # Ns7BSCdTGMsQUhsDFbCxw0oksYx0LpCwkXuXnLH4YcDCQ0LElSwMUm6cdTWq5hnG # eFaeW5iwkVy3iX82VheBFXCcHl1ruTN5Ma0IfbdirAA1V5RuFVlmGlm+kRJv/SxR # G6x+ylYpmZrxhyr0d+PdfkfECY5fLKGCFwswghcHBgorBgEEAYI3AwMBMYIW9zCC # FvMGCSqGSIb3DQEHAqCCFuQwghbgAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFUBgsq # hkiG9w0BCRABBKCCAUMEggE/MIIBOwIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCD8ee+6HDFvmyKVlVjCdI+H08B8Dp/kni6leOHySHOxKAIGYrG4lRsX # GBIyMDIyMDYyNjIxMTAxMS4yOVowBIACAfSggdSkgdEwgc4xCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVy # YXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowQTU2 # LUUzMjktNEQ0RDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vydmlj # ZaCCEV8wggcQMIIE+KADAgECAhMzAAABpzW7LsJkhVApAAEAAAGnMA0GCSqGSIb3 # DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYD # VQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAk # BgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTIyMDMwMjE4 # NTEyMloXDTIzMDUxMTE4NTEyMlowgc4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX # YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg # Q29ycG9yYXRpb24xKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1ZXJ0 # byBSaWNvMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowQTU2LUUzMjktNEQ0RDEl # MCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCCAiIwDQYJKoZI # hvcNAQEBBQADggIPADCCAgoCggIBAO0jOMYdUAXecCWm5V6TRoQZ4hsPLe0Vp6Cw # xFiTA5l867fAbDyxnKzdfBsf/0XJVXzIkcvzCESXoklvMDBDa97SEv+CuLEIooMb # FBH1WeYgmLVO9TbbLStJilNITmQQQ4FB5qzMEsDfpmaZZMWWgdOjoSQed9Urjjmc # uWsSskntiaUD/VQdQcLMnpeUGc7CQsAYo9HcIMb1H8DTcZ7yAe3aOYf766P2OT55 # 3/4hdnJ9Kbp/FfDeUAVYuEc1wZlmbPdRa/uCx4iKXpt80/5woAGSDl8vSNFxi4um # XKCkwWHm8GeDZ3tOKzMIcIY/64FtpdqpNwbqGa3GkJToEFPR6D6XJ0WyqebZvOZj # MQEeLCJIrSnF4LbkkfkX4D4scjKz92lI9LRurhMPTBEQ6pw3iGsEPY+Jrcx/DJmy # QWqbpN3FskWu9xhgzYoYsRuisCb5FIMShiallzEzum5xLE4U5fuxEbwk0uY9ZVDN # VfEhgiQedcSAd3GWvVM36gtYy6QJfixD7ltwjSm5sVa1voBf2WZgCC3r4RE7Vnov # lqbCd3nHyXv5+8UGTLq7qRdRQQaBQXekT9UjUubcNS8ZYeZwK8d2etD98mSI4MqX # cMySRKUJ9OZVQNWzI3LyS5+CjIssBHdv19aM6CjXQuZkkmlZOtMqkLRg1tmhgI61 # yFC+jxB3AgMBAAGjggE2MIIBMjAdBgNVHQ4EFgQUH2y4fwWYLjCFb+EOQgPz9Ppa # RYMwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBU # oFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jcmwvTWljcm9z # b2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEB # BGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9w # cy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5j # cnQwDAYDVR0TAQH/BAIwADATBgNVHSUEDDAKBggrBgEFBQcDCDANBgkqhkiG9w0B # AQsFAAOCAgEATxL6MfPZOhR91DHShlzal7B8vOCUvzlvbVha0UzhZfvIcZA/bT3X # TXbQPLnIDWlRdjQX7PGkORhX/mpjZCC5J7fD3TJMn9ZQQ8MXnJ0sx3/QJIlNgPVa # Opk9Yk1YEqyItOyPHr3Om3v/q9h5f5qDk0IMV2taosze0JGlM3M5z7bGkDly+Tfh # H9lI03D/FzLjjzW8EtvcqmmH68QHdTsl84NWGkd2dUlVF2aBWMUprb8H9EhPUQcB # cpf11IAj+f04yB3ncQLh+P+PSS2kxNLLeRg9CWbmsugplYP1D5wW+aH2mdyBlPXZ # MIaERJFvZUZyD8RfJ8AsE3uU3JSd408QBDaXDUf94Ki3wEXTtl8JQItGc3ixRYWN # IghraI4h3d/+266OB6d0UM2iBXSqwz8tdj+xSST6G7ZYqxatEzt806T1BBHe9tZ/ # mr2S52UjJgAVQBgCQiiiixNO27g5Qy4CDS94vT4nfC2lXwLlhrAcNqnAJKmRqK8e # hI50TTIZGONhdhGcM5xUVeHmeRy9G6ufU6B6Ob0rW6LXY2qTLXvgt9/x/XEh1Crn # uWeBWa9E307AbePaBopu8+WnXjXy6N01j/AVBq1TyKnQX1nSMjU9gZ3EaG8oS/zN # M59HK/IhnAzWeVcdBYrq/hsu9JMvBpF+ZEQY2ZWpbEJm7ELl/CuRIPAwggdxMIIF # WaADAgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNy # b3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAx # ODIyMjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX # YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg # Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy # MDEwMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL # 1yR5vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5K # Wv64NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTeg # Cjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv62 # 6GIl3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SH # JMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss25 # 4o2I5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/Nme # Rd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afo # mXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLi # Mxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb # 0f2y1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W2 # 9R6HXtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQF # AgMBAAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1Ud # DgQWBBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdM # g30BATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtp # b3BzL0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJ # KwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQF # MAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8w # TTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVj # dHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBK # BggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9N # aWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1V # ffwqreEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1 # OW27DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce57 # 32pvvinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihV # J9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZ # UnWKNsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW # 9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k # +SS+c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pF # EUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L # +DvktxW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1 # ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6 # CGJ/2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIC0jCCAjsCAQEwgfyhgdSk # gdEwgc4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNV # BAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjowQTU2LUUzMjktNEQ0RDElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAwH7vHimSAzeDLN0q # zWNb2p2vRH+ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOZizmUwIhgPMjAyMjA2MjYxNjI0MDVaGA8yMDIyMDYy # NzE2MjQwNVowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA5mLOZQIBADAKAgEAAgIW # wgIB/zAHAgEAAgIRWzAKAgUA5mQf5QIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUA # A4GBAG8PWgPcg3Vf1TJMpEiItFNUYT9u87Wr413yCWNJDhIyDps/LnxBJTbcoXcK # vxtubeoqM/SLAEGxsBhrZRz5zyZiaXRqA8Po0WSbcQwduN9IZ9BV7b8k/9ZaSa5r # 5BtGb97W5ceR90k4iM0w0rmT12K2+9SPi4Or645ArVjwwsivMYIEDTCCBAkCAQEw # gZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAGnNbsuwmSFUCkA # AQAAAacwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0B # CRABBDAvBgkqhkiG9w0BCQQxIgQgsrrhup5PXRnsRDFM7QIv/nqb3+S7TFWLWAIc # bGJ8P9YwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBH8H/nCZUC4L0Yqbz3 # sH3w5kzhwJ4RqCkXXKxNPtqOGzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwAhMzAAABpzW7LsJkhVApAAEAAAGnMCIEIDJ1j7HQ/YntCFG6CdAM # 4/ddjCJu/EswnXCRGiWIUaoaMA0GCSqGSIb3DQEBCwUABIICAE/YeyxPajq5PUOd # GYXBg3Tf5tTvtv7H7h7ShYi6Pji11JB8e9KOketae2qPVtvxl518fI9atD2ybLrg # tNT5ei35VWDQU0/2jXBjVeVHSx/miAHF5JNeERdmgTKqgT8IKE2x0qnA6+VyRvcM # yLdzy0zdwLBZlGvG4itUcOiJiy6BadKehMOYvCKwEeaNWpAKlyxm2bVctGktjvU0 # OzJ9kE58IFqgZ/aHtENszL2EzOwHsu7KYbC+nybClW2VOimRPRmjANEtRf+4GYJt # 00F+8Oycy9mWf2oT0uHjn7iWTG810ApmrD5WJTsckMfx9c5qISw+BwnEkHJrMcio # OHyFlotY6rkI2TJFd90w6+pnNhI+P/USc1DBoOcpdajji4NZQy3HNuyA0K6zHArF # mQrTclwrERG7PKu+aPPUv6xnLUGFqECMOTA4LGH2ZejDGvu60BNnc4LXU2DW9C/U # FBfb1jLPEJeaP7Zbx+TbvrQTzqHdadP7a1BI9Mc+iam2/PetqBfHpIXq66nKAE35 # g/wjDDy+tGc0CyZmzvsU/5paseO3yXq8TcaS+x67mBl9yCEk2fRnPTIXFZxMhjN7 # PdPT18GqnK3a36j8qF2t3k9KaN0S7GmjeASdkicK6ek4HYtENEzu4RryYRJiY0tg # gR2wCB/7cVS33YhZ3UqE5q2k/tw+ # SIG # End signature block
combined_dataset/train/non-malicious/4338.ps1
4338.ps1
function Get-ScriptSourceLocation { [CmdletBinding()] Param ( [Parameter()] [String] $Location, [Parameter()] $Credential, [Parameter()] $Proxy, [Parameter()] $ProxyCredential ) $scriptLocation = $null if($Location) { if(Microsoft.PowerShell.Management\Test-Path -Path $Location) { $scriptLocation = $Location } else { $tempScriptLocation = $null if($Location.EndsWith('/api/v2', [System.StringComparison]::OrdinalIgnoreCase)) { $tempScriptLocation = $Location + '/items/psscript/' } elseif($Location.EndsWith('/api/v2/', [System.StringComparison]::OrdinalIgnoreCase)) { $tempScriptLocation = $Location + 'items/psscript/' } if($tempScriptLocation) { $scriptLocation = Resolve-Location -Location $tempScriptLocation ` -LocationParameterName 'ScriptSourceLocation' ` -Credential $Credential ` -Proxy $Proxy ` -ProxyCredential $ProxyCredential ` -ErrorAction SilentlyContinue ` -WarningAction SilentlyContinue } } } return $scriptLocation }
combined_dataset/train/non-malicious/sample_10_66.ps1
sample_10_66.ps1
#************************************************ # TS_SDPHTTPTests.ps1 # Version 1.0.1 # Date: 01/18/2013 # Author: andret # Description: Test HTTP connectivity to URLs used in SDP Workflow #************************************************ Import-LocalizedData -BindingVariable ScriptStrings #Networking Information - NIC Cards $NIC_Configs = Get-CimInstance Win32_NetworkAdapterConfiguration -Filter "IPEnabled = true" $NetworkAdapter_Summary = New-Object PSObject Foreach ($NIC_Config in $NIC_Configs) { $NIC_Config_Summary = New-Object PSObject $NetworkAdapter = Get-CimInstance Win32_NetworkAdapter -Filter ("DeviceID = " + $NIC_Config.Index) if ($null -ne $NetworkAdapter) { $NIC_Config_Summary | Add-Member -MemberType NoteProperty -Name $ScriptStrings.ID_MATS_NetworkAdapter -Value $NetworkAdapter.Name #$NIC_Config_Summary | Add-Member -MemberType NoteProperty -Name $ScriptStrings.ID_MATS_NetworkAdapterType -Value ($NetworkAdapter.AdapterType) $NIC_Config_Summary | Add-Member -MemberType NoteProperty -Name $ScriptStrings.ID_MATS_NetworkAdapterSpeed -Value ("{0:N0}" -f $NetworkAdapter.Speed) $ConnectionID = $NetworkAdapter.NetConnectionID } else { $ConnectionID = $NIC_Config.Description } $NIC_Config_Summary | Add-Member -MemberType NoteProperty -Name $ScriptStrings.ID_MATS_IPAddresses -Value ([string]::Join("<br/>", $NIC_Config.IPAddress)) $NIC_Config_Summary | Add-Member -MemberType NoteProperty -Name $ScriptStrings.ID_MATS_DefaultGateway -Value ([string]::Join("<br/>", $NIC_Config.DefaultIPGateway)) $NIC_Config_Summary | Add-Member -MemberType NoteProperty -Name $ScriptStrings.ID_MATS_DNSServers -Value ([string]::Join("<br/>", $NIC_Config.DNSServerSearchOrder)) $NetworkAdapter_Summary | Add-Member -MemberType NoteProperty -Name $ConnectionID -Value (Convert-PSObjectToHTMLTable -PSObject $NIC_Config_Summary) } $NetworkAdapter_Summary | ConvertTo-Xml2 | update-diagreport -id 11_Nic -name "Network Adapter Configuration" -verbosity informational $IESettings_Summary = New-Object PSObject $IESettings = (get-itemproperty 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet Settings') if ($IESettings.ProxyEnable -eq 1) { $IESettings_Summary | Add-Member -MemberType NoteProperty -Name $ScriptStrings.ID_MATS_ProxyEnabled -Value $ScriptStrings.ID_Enabled $IESettings_Summary | Add-Member -MemberType NoteProperty -Name $ScriptStrings.ID_MATS_ProxyServerAdd -Value $IESettings.ProxyServer if ($null -ne $IESettings.ProxyOverride) { $IESettings_Summary | Add-Member -MemberType NoteProperty -Name $ScriptStrings.ID_MATS_ProxyOverride -Value (Replace-XMLChars $IESettings.ProxyOverride) } } else { $IESettings_Summary | Add-Member -MemberType NoteProperty -Name $ScriptStrings.ID_MATS_ProxyEnabled -Value $ScriptStrings.ID_Disabled } $IESettingsConnections = (get-itemproperty 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections') if ($null -ne $IESettingsConnections.DefaultConnectionSettings) { #Possible Values #01 - neither of those 2 auto config boxes are checked #05 - just the Use automatic configuration script is checked #09 - just the Automatically detect settings is checked #0d - both of them are checked $DefaultConnectionSetting = $IESettingsConnections.DefaultConnectionSettings[8] $AutoEnabledValues = @(9, 11, 13, 15) if ($AutoEnabledValues -contains $DefaultConnectionSetting) { $IESettings_Summary | Add-Member -MemberType NoteProperty -Name $ScriptStrings.ID_MATS_ProxyAutoSettings -Value $ScriptStrings.ID_Enabled } elseif ($DefaultConnectionSetting -eq 1) { $IESettings_Summary | Add-Member -MemberType NoteProperty -Name $ScriptStrings.ID_MATS_ProxyAutoSettings -Value $ScriptStrings.ID_Disabled } } if ($null -ne $IESettings.AutoConfigURL) { $IESettings_Summary | Add-Member -MemberType NoteProperty -Name $ScriptStrings.ID_MATS_ProxyAutoScript -Value $IESettings.AutoConfigURL } $IESettings_Summary | ConvertTo-Xml2 | update-diagreport -id 11_IE -name "Internet Explorer Configuration" -verbosity informational # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBfAK46K7IR+1jz # 9ocEOyYkhbE5plHhm+NlQ0o25MD0bqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKfTp0NRx4Er5opLqECkkj6p # nZdUuYj3asJho6sFenNOMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAHVnGABid6l3nDwBN61MpbWP9Ij1Hgj5ww2wTCEdtvRRzTyglTSmN19iF # 5O3kppngYUDZd2xgkpKlQVbPb2QXFDrnMwTA9bZmJ6HRkr7LGU+jMf838gAdbPYW # HUQc1uMyLywwIlhu3uC8Jeng0hTnLq9vOkTmMB55NTWJBzUhWZq8njiih2CYl5VF # b4c2t+sRxtAex7B/IE0VfHuT5tpEd4JUgDgI5yf2PTnI6cGA7fWUtf+lTmbt7diI # kQftXnYZGi3FnjuJVG73zI8tmc5F4XbOEVdR1MjYiI0JoufSy1oqE+7M9cwDK9q3 # 5mb1YPYaYPQsgx330zt+hXH/VwSJY6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAjAEBhbu8PArzB0L1hULPtU0hBa385fS/1tdBLJ0Bh9QIGZxp1kNxf # GBMyMDI0MTAyODExNDA0NS41MzJaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w # M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgABAAAB6TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yrAPJnV6A7aZYnTw/yx90u # 1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZY5O8PCBu7Gq+x5Xe6plQ # t4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7LMpKwIKQMwXDctYKvCyQy # 6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5MxylRdTS7E1Jocl30NgcBi # JfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9dxsyvng0lUVY+urq/G8QR # FoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTpw2I6ZWaIhPwMu5DvdkEG # zV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0VJBSGV+h66ZcaUJOxpbS # IjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDCxHG4mW3mpNQopM/U1WJn # jssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOamGfwvkIe7dkylzm8BeAU # QC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKFI30u9YlxDTzAuLDK073c # ndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022+yPwclmykssk30a4Rp3v # 9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYjuIj0Wuv+jcjtB+xOMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe61AE90Ken2XPgQHJDiS4S # bLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz/HciZooyeoAvkHQaHmLh # wBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20QpHDEukwKR8kfaBEX83A # yvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQgeEBr8E4K2wQ2WXI/ZJxZ # S/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/JnjXMChnm9bLDD1waJ7TPp5 # wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6QjegHzndX/tZrY792dfR # AXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWGXYJL5H6LNnKyXJVEw/1F # bO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsHptAvREqCc+/YxzhIKkA8 # 8Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFvNRhh8ZBAenn1pW+5UBGY # z2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMlPG3YjuqFxidiIsoAw2+M # hI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2jJWgq7VlBuP1BuXjZ3qgy # m9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCr # aYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smRDzAiGA8yMDI0MTAyODA0MjY1 # NVoYDzIwMjQxMDI5MDQyNjU1WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyZEP # AgEAMAcCAQACAhTEMAcCAQACAhPHMAoCBQDqyuKPAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAHKM99UwoPSM+XhXj9JQE0j3fiHtBHop/3nnFpjQj8V83hqU # 5S4zNupqga4qWf4ER6xtR+I8qqmZvqZ6vV8e+IqzOJ9xvEgbrAR5K6X+m/0UulYt # n4mNtjFswU0pnvvDMRJ0z5k68F8c0jh94jLA5XDWpS9MpP5gv2jcKAx6bUdU1GWp # un+uoXQ2wajPrQVTjdnnIihSkPFnaSAZ9v5Wl5peuAnC5l3l2pWNTP/uI425dd/q # lyg95Ug5B1eiceCbJS5ASgJyIA//msCuwJM8p5HX4cRcvA2b/9gGyJGQQ0VcBEld # HI8hfTAAtAbbG76IFJa/SubdiXplDokIkex/GRIxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAekPcTB+XfESNgABAAAB6TAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCAqO5fPON/oQnn2+st5mnc3s0a/RgInOWBfYglsciZP9TCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQkniXaTcmj1TKQWF+x2U4riVo # rGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQgSBS8Q6r5BbZ0l6HNgYtnviUBT9Vn # cdigzcIj/qNKQaIwDQYJKoZIhvcNAQELBQAEggIADUOnXIPYPTw5MI60eAzt0/nT # 5jGC4X2+tSarRBMoS8+rFcEN/PEeTF/epUvxg4wEPTf5UOjIkCxqFCfMK9RjUglp # Lw0NNJ24iKG0uS1NTHNq74HxBHvEKzhc6j9/6RXIpXrhWPP391kJhTOcFw02Ybwc # sbSjyVpoMKsZ5Nnn8NW+ngrqgr1JMKpz8LgQoUGCe8SRTiwSETw22tgtMUptbphn # hCCpeb5pMtohSL2zvER5OpuaoTWXuVubKS9uhlZjufzG+1G2rb5XM8b2V0vagkrJ # kOhKVqNA4MGLxzAmH9i7cTcrqL4GxEETPI12oUSD3c63eq0V6/tCFR0fl+oBPHUO # wGZ6SuCDEjFavi6zqyUYVzYkmrWX3T7yl8lh3uyje6Fe36xArPuphk6GHMGTQrKJ # P6BwKP5xVKEvXFsx/X89s+/zWnfrxMLFLzc02oKB1tx0/13ZShSzlm8Vyl8dTh75 # 13Eg2sh06LFssw2+0JBNeGijmHokShEBod+CynSebuN1n73qqOuJHp0DpTUQNUYv # PTk0l1kqDOxDvyJ5FT6BccH2UVm2wNA39I+6o5bbLOpD4fHuIbxXCKyHtgzA6pJn # u9S59zmcze7hp99Bk56aDMTx7NSSyAS/5Vi4ujHTcnBVQFRQ+EyaIfm626j7KviK # gz3yOz+gcglP5wwpdEo= # SIG # End signature block
combined_dataset/train/non-malicious/List AD Computers XLS.ps1
List AD Computers XLS.ps1
# Create a new Excel object using COM $Excel = New-Object -ComObject Excel.Application $Excel.visible = $True # WMI Class variables $WMI_CSP = "Win32_ComputerSystemProduct" $WMI_CS = "Win32_ComputerSystem" $WMI_Disk = "Win32_LogicalDisk" $WMI_OS = "Win32_OperatingSystem" $WMI_Proc = "Win32_Processor" # Set up a directory search for all computer objects in the current domain $objDomain = New-Object System.DirectoryServices.DirectoryEntry [string]$DomainName = $objDomain.name $objSearcher = New-Object System.DirectoryServices.DirectorySearcher $objSearcher.SearchRoot = $objDomain $objSearcher.Filter = ("(objectCategory=computer)") $Results = $objSearcher.FindAll() # Counter variable for rows $intRow = 1 $Excel = $Excel.Workbooks.Add() $Sheet = $Excel.Worksheets.Item(1) #Create column headers $Sheet.Cells.Item($intRow,1) = "UUID" $Sheet.Cells.Item($intRow,1).Font.Bold = $True $Sheet.Columns.Item('a').ColumnWidth = 42 $Sheet.Cells.Item($intRow,2) = "Hostname" $Sheet.Cells.Item($intRow,2).Font.Bold = $True $Sheet.Columns.Item('b').ColumnWidth = 14 $Sheet.Cells.Item($intRow,3) = "IP Address" $Sheet.Cells.Item($intRow,3).Font.Bold = $True $Sheet.Columns.Item('c').ColumnWidth = 11 $Sheet.Cells.Item($intRow,4) = "Domain" $Sheet.Cells.Item($intRow,4).Font.Bold = $True $Sheet.Columns.Item('d').ColumnWidth = 10 $Sheet.Cells.Item($intRow,5) = "OS" $Sheet.Cells.Item($intRow,5).Font.Bold = $True $Sheet.Columns.Item('e').ColumnWidth = 42 $Sheet.Cells.Item($intRow,6) = "OS Version" $Sheet.Cells.Item($intRow,6).Font.Bold = $True $Sheet.Columns.Item('f').ColumnWidth = 13 $Sheet.Cells.Item($intRow,7) = "OS Release" $Sheet.Cells.Item($intRow,7).Font.Bold = $True $Sheet.Columns.Item('g').ColumnWidth = 11 $Sheet.Cells.Item($intRow,8) = "Manufacturer" $Sheet.Cells.Item($intRow,8).Font.Bold = $True $Sheet.Columns.Item('h').ColumnWidth = 17 $Sheet.Cells.Item($intRow,9) = "Model" $Sheet.Cells.Item($intRow,9).Font.Bold = $True $Sheet.Columns.Item('i').ColumnWidth = 34 $Sheet.Cells.Item($intRow,10) = "Platform" $Sheet.Cells.Item($intRow,10).Font.Bold = $True $Sheet.Columns.Item('j').ColumnWidth = 12 $Sheet.Cells.Item($intRow,11) = "Memory (MB)" $Sheet.Cells.Item($intRow,11).Font.Bold = $True $Sheet.Columns.Item('k').ColumnWidth = 13 $Sheet.Cells.Item($intRow,12) = "Processors" $Sheet.Cells.Item($intRow,12).Font.Bold = $True $Sheet.Columns.Item('l').ColumnWidth = 10 $Sheet.Cells.Item($intRow,13) = "Disk Usage (KB)" $Sheet.Cells.Item($intRow,13).Font.Bold = $True $Sheet.Columns.Item('m').ColumnWidth = 15 foreach ($objResult in $Results) { $intRow++ $objComputer = $objResult.Properties [string]$computer = $objComputer.name $pingStatus = Get-WMIObject Win32_PingStatus -Filter "Address = '$computer'" $ipAddress = $pingStatus.ProtocolAddress if($pingStatus.StatusCode -eq 0) { $UUID = Get-WMIObject $WMI_CSP -ComputerName $computer | Select UUID $_UUID = $UUID.UUID $OS = Get-WMIObject $WMI_OS -ComputerName $computer | Select Caption $_OS = $OS.Caption if($_OS) {if($_OS.Contains(",")) {$_OS = $_OS.Replace(",","")} if($_OS.Contains("(R)")) {$_OS = $_OS.Replace("(R)","")}} $CSDVer = Get-WMIObject $WMI_OS -ComputerName $computer | Select CSDVersion $_CSDVer = $CSDVer.CSDVersion $Ver = Get-WMIObject $WMI_OS -ComputerName $computer | Select Version $_Ver = $Ver.Version $Mfr = Get-WMIObject $WMI_CSP -ComputerName $computer | Select Vendor $_Mfr = $Mfr.Vendor if($_Mfr) {if($_Mfr.Contains("HP")) {$_Mfr = $_Mfr.Replace("HP","Hewlett-Packard")}} $HW = Get-WMIObject $WMI_CSP -ComputerName $computer | Select Name $_HW = $HW.Name $Platform = Get-WMIObject $WMI_Proc -ComputerName $computer -filter "DeviceID = 'CPU0'" | Select Manufacturer $_Platform = $Platform.Manufacturer $RAMKB = Get-WMIObject $WMI_CS -ComputerName $computer | Select TotalPhysicalMemory [int64]$_RAMKB = $RAMKB.TotalPhysicalMemory [int64]$_RAMMB = $_RAMKB / 1kb $Processors = Get-WMIObject $WMI_CS -ComputerName $computer | Select NumberOfProcessors [int64]$NumOfProcs = $Processors.NumberOfProcessors $Space = Get-WMIObject $WMI_Disk -ComputerName $computer -filter "DeviceID = 'c:'" | Select FreeSpace [int64]$DiskFree = $Space.FreeSpace $Size = Get-WMIObject $WMI_Disk -ComputerName $computer -filter "DeviceID = 'c:'" | Select Size [int64]$DiskSize = $Size.Size [int64]$DiskUsage = ($DiskSize - $DiskFree) / 1kb # Output minimal information to Console & Complete information to XLS file (Successful Ping) Write-Host -ForegroundColor Green "Reply received from $computer ($ipAddress)" $Sheet.Cells.Item($intRow,1) = $_UUID $Sheet.Cells.Item($intRow,2) = $computer $Sheet.Cells.Item($intRow,3) = $ipAddress $Sheet.Cells.Item($intRow,4) = $DomainName $Sheet.Cells.Item($intRow,5) = $_OS $Sheet.Cells.Item($intRow,6) = $_CSDVer $Sheet.Cells.Item($intRow,7) = $_Ver $Sheet.Cells.Item($intRow,8) = $_Mfr $Sheet.Cells.Item($intRow,9) = $_HW $Sheet.Cells.Item($intRow,10) = $_Platform $Sheet.Cells.Item($intRow,11) = $_RAMMB $Sheet.Cells.Item($intRow,12) = $NumOfProcs $Sheet.Cells.Item($intRow,13) = $DiskUsage } else { # Output minimal information to Console & Minimal information to XLS file (Unsucccessful Ping) Write-Host -ForegroundColor Red "No Reply received from $computer ....................[SKIPPED]" $Sheet.Cells.Item($intRow, 1) = "HOST NOT ONLINE" $Sheet.Cells.Item($intRow, 2) = $computer $Sheet.Cells.Item($intRow, 3) = "---" $Sheet.Cells.Item($intRow, 4) = $DomainName $Sheet.Cells.Item($intRow, 5) = "---" $Sheet.Cells.Item($intRow, 6) = "---" $Sheet.Cells.Item($intRow, 7) = "---" $Sheet.Cells.Item($intRow, 8) = "---" $Sheet.Cells.Item($intRow, 9) = "---" $Sheet.Cells.Item($intRow, 10) = "---" $Sheet.Cells.Item($intRow, 11) = "---" $Sheet.Cells.Item($intRow, 12) = "---" $Sheet.Cells.Item($intRow, 13) = "---" } } $Sheet.UsedRange.EntireColumn.AutoFit() Clear
combined_dataset/train/non-malicious/sample_59_59.ps1
sample_59_59.ps1
########################################################################## # DELL PROPRIETARY INFORMATION # # This software is confidential. Dell Inc., or one of its subsidiaries, has supplied this # software to you under the terms of a license agreement,nondisclosure agreement or both. # You may not copy, disclose, or use this software except in accordance with those terms. # # Copyright 2020 Dell Inc. or its subsidiaries. All Rights Reserved. # # DELL INC. MAKES NO REPRESENTATIONS OR WARRANTIES ABOUT THE SUITABILITY OF THE SOFTWARE, # EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF # MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. # DELL SHALL NOT BE LIABLE FOR ANY DAMAGES SUFFERED BY LICENSEE AS A RESULT OF USING, # MODIFYING OR DISTRIBUTING THIS SOFTWARE OR ITS DERIVATIVES. # # # ########################################################################## <# This is a Resource designer script which generates a mof schema for DCPP_POSTBehavior resource in DellBIOSProvider module. #> $category = New-xDscResourceProperty -name Category -Type String -Attribute Key $assettag = New-xDscResourceProperty -name AssetTag -Type String -Attribute Write $ownershiptag = New-xDscResourceProperty -name OwnershipTag -Type String -Attribute Write $Password = New-xDscResourceProperty -Name Password -Type string -Attribute Write -Description "Password" $SecurePassword = New-xDscResourceProperty -Name SecurePassword -Type string -Attribute Write -Description "SecurePassword" $PathToKey = New-xDscResourceProperty -Name PathToKey -Type string -Attribute Write $properties = @($category,$assettag,$ownershiptag,$Password,$SecurePassword,$PathToKey) New-xDscResource -ModuleName DellBIOSProviderX86 -Name DCPP_SystemInformation -Property $properties -Path 'C:\Program Files\WindowsPowerShell\Modules' -FriendlyName "SystemInformation" -Force -Verbose # SIG # Begin signature block # MIIutAYJKoZIhvcNAQcCoIIupTCCLqECAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDa1j+fdJrywx7k # tNLjufTkt9PO68sU9kQZlNRDjr+4zaCCEugwggXfMIIEx6ADAgECAhBOQOQ3VO3m # jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE # ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s # ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv # ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy # dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx # MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu # MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp # b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK # AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq # gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l # OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr # +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d # vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 # HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn # DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig # nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z # HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK # Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u # DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC # AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw # FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG # AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn # MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp # MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O # BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp # UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 # BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ # LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv # 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF # VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX # bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG # ejCCBGKgAwIBAgIQXppEwdVMjAFyZoUhC+DGojANBgkqhkiG9w0BAQsFADBjMQsw # CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjE8MDoGA1UEAxMzRW50 # cnVzdCBFeHRlbmRlZCBWYWxpZGF0aW9uIENvZGUgU2lnbmluZyBDQSAtIEVWQ1My # MB4XDTI0MDIxNDIwNTQ0MloXDTI1MDIyNzIwNTQ0MVowgdUxCzAJBgNVBAYTAlVT # MQ4wDAYDVQQIEwVUZXhhczETMBEGA1UEBxMKUm91bmQgUm9jazETMBEGCysGAQQB # gjc8AgEDEwJVUzEZMBcGCysGAQQBgjc8AgECEwhEZWxhd2FyZTEfMB0GA1UEChMW # RGVsbCBUZWNobm9sb2dpZXMgSW5jLjEdMBsGA1UEDxMUUHJpdmF0ZSBPcmdhbml6 # YXRpb24xEDAOBgNVBAUTBzUyODAzOTQxHzAdBgNVBAMTFkRlbGwgVGVjaG5vbG9n # aWVzIEluYy4wggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDDo1XKkZwW # xJ2HF9BoBTYk8SHvDp3z2FVdLQay6VKOSz+Xrohhe56UrKQOW/pePeBC+bj+GM0j # R7bCZCx0X26sh6SKz3RgIRgc+QP3TRKu6disqSWIjIMKFmNegyQPJbDLaDMhvrVk # j7qobtphs0OB/8N+hSkcTRmiphzDvjwTiYh6Bgt37pPDEvhz1tkZ/fhWWhp355lW # FWYBPmxVS2vTKDRSQnLtJ31dltNBXalMW0ougqtJNVJTm1m9m8ZgkBtm2a2Ydgdg # tYbgye5A0udl0HwcImgiDG1eAKNR1W4eG353UsS7n6IWG93QpF5L++2o7DDcDtBr # 9qtVy3RjzWuzgYW5/wIvLkWS7UolX65tFfwKai617FikhrrqcgWcwfbKVrUA4nL3 # i4OL4718Y9T/8N39Knwp1+ZJx9hMiFVVCr6XteO0LQg18/NFjDzbuRXzX2adEzxm # Fdbw3ZGLUfCYN2LQTa+ssOc2hAEumaiVRdntd2d5TaOHwXhsSaBMnh8CAwEAAaOC # ATUwggExMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFHcDtMS/dbtrhMpavR1yYhFn # +k1vMB8GA1UdIwQYMBaAFM6JT4JRqhWihGLKMSNh0mH7+P54MGcGCCsGAQUFBwEB # BFswWTAjBggrBgEFBQcwAYYXaHR0cDovL29jc3AuZW50cnVzdC5uZXQwMgYIKwYB # BQUHMAKGJmh0dHA6Ly9haWEuZW50cnVzdC5uZXQvZXZjczItY2hhaW4ucDdjMDEG # A1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZXZjczIuY3Js # MA4GA1UdDwEB/wQEAwIHgDATBgNVHSUEDDAKBggrBgEFBQcDAzAgBgNVHSAEGTAX # MAcGBWeBDAEDMAwGCmCGSAGG+mwKAQIwDQYJKoZIhvcNAQELBQADggIBABB9FgN1 # YzMm05EhuGuTIEQNOwq4VoETYArSR88RLDN9Dr8lu45+WghxE7MigaGKF8AEi6Z3 # diDeN+5TJOiBd6Zv2LDa3UfMpqf8GZm/L1pd5TF19s44NLbxlIad/yq/NbXFcWsc # VNu4TtM/PdCg7E0ggh044pNllpR/Ofqqu2D/kV6TBMw2cgL24l5YZxat+hxfWBuw # Rhtwu/kWiSIe0ad/vB4ChVPY7PvNuU/jCU7PlgXOUiIsPbLsheAoWjxAK+Vl/NYX # 91T/eXBZ7A4McMoprqPeVkKti0OpC2zhb+3NFHjR/gSkVLkmwEh48ebsip6uqEBY # KS9zj6P6g0P8HHlwNZMkQ4llOzjIsQriORfayBAmjDpsgHr0r3Q362+svyI//k1V # HjX3WTTYO1tFfOl0LYVzcfOUj5OY04kH35Y+yi30DGJy2mG0qwlRSAfiDr1a8OpL # eaxkwvN2R2Ml0s6Oiqq0lTuLNFRnl/tCxahaT8liOzFd2WU7I3L5IL0ufRMlbezA # S453qkkX4Xtd7KtRDQnWU5IbzBg8Yswwv+DLNm2Ep7PHTU3t4GiF0O+oaDq83QaM # ovN80wPcCce1PkUB9iSvOuBbbrODjlSFa6OVpLHnvDesW1L99YS8sOitcRnXoNXw # HST4XAO+86tKYUw2XtjBapV1ND20AMhuaZ5KMIIGgzCCBGugAwIBAgIQNa+3e500 # H2r8j4RGqzE1KzANBgkqhkiG9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UE # CgwNRW50cnVzdCwgSW5jLjFCMEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcg # Um9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5 # MTk1MloXDTQwMTIyOTIzNTkwMFowYzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVu # dHJ1c3QsIEluYy4xPDA6BgNVBAMTM0VudHJ1c3QgRXh0ZW5kZWQgVmFsaWRhdGlv # biBDb2RlIFNpZ25pbmcgQ0EgLSBFVkNTMjCCAiIwDQYJKoZIhvcNAQEBBQADggIP # ADCCAgoCggIBAL69pznJpX3sXWXx9Cuph9DnrRrFGjsYzuGhUY1y+s5YH1y4JEIP # RtUxl9BKTeObMMm6l6ic/kU2zyeA53u4bsEkt9+ndNyF8qMkWEXMlJQ7AuvEjXxG # 9VxmguOkwdMfrG4MUyMO1Dr62kLxg1RfNTJW8rV4m1cASB6pYWEnDnMDQ7bWcJL7 # 1IWaMMaz5ppeS+8dKthmqxZG/wvYD6aJSgJRV0E8QThOl8dRMm1njmahXk2fNSKv # 1Wq3f0BfaDXMafrxBfDqhabqMoXLwcHKg2lFSQbcCWy6SWUZjPm3NyeMZJ414+Xs # 5wegnahyvG+FOiymFk49nM8I5oL1RH0owL2JrWwv3C94eRHXHHBL3Z0ITF4u+o29 # p91j9n/wUjGEbjrY2VyFRJ5jBmnQhlh4iZuHu1gcpChsxv5pCpwerBFgal7JaWUu # 7UMtafF4tzstNfKqT+If4wFvkEaq1agNBFegtKzjbb2dGyiAJ0bH2qpnlfHRh3vH # yCXphAyPiTbSvjPhhcAz1aA8GYuvOPLlk4C/xsOre5PEPZ257kV2wNRobzBePLQ2 # +ddFQuASBoDbpSH85wV6KI20jmB798i1SkesFGaXoFppcjFXa1OEzWG6cwcVcDt7 # AfynP4wtPYeM+wjX5S8Xg36Cq08J8inhflV3ZZQFHVnUCt2TfuMUXeK7AgMBAAGj # ggErMIIBJzASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBTOiU+CUaoVooRi # yjEjYdJh+/j+eDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAzBggr # BgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0 # MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3NicjEu # Y3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzBEBgNVHSAE # PTA7MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0Lm5l # dC9ycGEwBwYFZ4EMAQMwDQYJKoZIhvcNAQENBQADggIBAD4AVLgq849mr2EWxFiT # ZPRBi2RVjRs1M6GbkdirRsqrX7y+fnDk0tcHqJYH14bRVwoI0NB4Tfgq37IE85rh # 13zwwQB6wUCh34qMt8u0HQFh8piapt24gwXKqSwW3JwtDv6nl+RQqZeVwUsqjFHj # xALga3w1TVO8S5QTi1MYFl6mCqe4NMFssess5DF9DCzGfOGkVugtdtWyE3XqgwCu # AHfGb6k97mMUgVAW/FtPEhkOWw+N6kvOBkyJS64gzI5HpnXWZe4vMOhdNI8fgk1c # QqbyFExQIJwJonQkXDnYiTKFPK+M5Wqe5gQ6pRP/qh3NR0suAgW0ao/rhU+B7wrb # fZ8pj6XCP1I4UkGVO7w+W1QwQiMJY95QjYk1RfqruA+Poq17ehGT8Y8ohHtoeUdq # 6GQpTR/0HS9tHsiUhjzTWpl6a3yrNfcrOUtPuT8Wku8pjI2rrAEazHFEOctAPiAS # zghw40f+3IDXCADRC2rqIbV5ZhfpaqpW3c0VeLEDwBStPkcYde0KU0syk83/gLGQ # 1hPl5EF4Iu1BguUO37DOlSFF5osB0xn39CtVrNlWc2MQ4LigbctUlpigmSFRBqqm # DDorY8t52kO50hLM3o9VeukJ8+Ka0yXBezaS2uDlUmfN4+ZUCqWd1HOj0y9dBmSF # A3d/YNjCvHTJlZFot7d+YRl1MYIbIjCCGx4CAQEwdzBjMQswCQYDVQQGEwJVUzEW # MBQGA1UEChMNRW50cnVzdCwgSW5jLjE8MDoGA1UEAxMzRW50cnVzdCBFeHRlbmRl # ZCBWYWxpZGF0aW9uIENvZGUgU2lnbmluZyBDQSAtIEVWQ1MyAhBemkTB1UyMAXJm # hSEL4MaiMA0GCWCGSAFlAwQCAQUAoIGaMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3 # AgEEMBwGCisGAQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC4GCisGAQQBgjcCAQwx # IDAeoByAGgBEAGUAbABsACAAUwBvAGwAdQB0AGkAbwBuMC8GCSqGSIb3DQEJBDEi # BCCtnUhQINstuosFBGMy2R6b/JhiXFFkzxpca/LWwwzp7TANBgkqhkiG9w0BAQEF # AASCAYC35SjdxDwU6xemBByuuKTJqM9zbiD/051BxvlD4knEaRfoPmmie4Z51alR # ItTg4yJLYIzOy1RTUBBULu63rx5is0G1IE8qaJBwTvp3yIsuHKBzZy0okWrdIfve # sXvK+gyumJ0wQ8mDz4ARPYmXPSyyORZJ9hOZh+CghlOd1RfLPl0sRuk+aegGpalC # Ue/Xbue40TFMc+Yx26ZvD9QmyKfdTjliFaiDQhyyiCgPb1tIs+adq23yZqM6huIf # YkYmjvBjIdMMsohrrnRRsBGM/+ogNiAVtL0WqHh+mlK9oZqY2L3TVBTqzdl2ewcM # JmAp6yqx8/Pncmhgm9Dm5IO27FyTIEsjEK3qK55OqRxaGzqIXn1NO0XPyttQQh97 # 0iRVx4LUMuozSneMmaYHF2TbtyW2Cgj7e0EXyRBflTFsGfXq+VMGDadKMiIoTmJ9 # nHd2Dep/Lhp22sDQPf/KrA0nN1yLR6XJ/z/hL5BJ2Z4hP5sICp4jty2F6ZGLngY5 # z5p+olqhghhfMIIYWwYKKwYBBAGCNwMDATGCGEswghhHBgkqhkiG9w0BBwKgghg4 # MIIYNAIBAzENMAsGCWCGSAFlAwQCAzCB8wYLKoZIhvcNAQkQAQSggeMEgeAwgd0C # AQEGCmCGSAGG+mwKAwUwMTANBglghkgBZQMEAgEFAAQgdO34B/J2+7d6IiMgzLgb # isDZsRe50bDr40ukXZptjR8CCG877yVlGAE7GA8yMDI0MDQxODA3MzI0OVowAwIB # AaB5pHcwdTELMAkGA1UEBhMCQ0ExEDAOBgNVBAgTB09udGFyaW8xDzANBgNVBAcT # Bk90dGF3YTEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjErMCkGA1UEAxMiRW50cnVz # dCBUaW1lc3RhbXAgQXV0aG9yaXR5IC0gVFNBMqCCEw4wggXfMIIEx6ADAgECAhBO # QOQ3VO3mjAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEW # MBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0 # Lm5ldC9sZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5j # LiAtIGZvciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJv # b3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVa # Fw0zMDExMDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0 # LCBJbmMuMUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRp # ZmljYXRpb24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4IC # DwAwggIKAoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSm # Gl33VFFqgCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHcc # Uk15iF+lOhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBN # CFYVb5Cr+0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoT # SeOQm3/dvfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpV # EoScRCV1HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUf # e5SmS1dnDH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM # 4OEAwjignPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7I # H9Vybu5ZHFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHAp # OBGAYGuKQ6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FL # XxLq/f0uDodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQAB # o4IBKzCCAScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYD # VR0lBBYwFAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAo # MCYGCCsGAQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEF # BQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAG # A1UdHwQpMCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmww # HQYDVR0OBBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQ # Hu995ztpUdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMd # ZTrA7LR7BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU # +5J+Nzg+LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chql # z3t57jpv3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1G # w87kVlHFVuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFi # e1jpUJuXbheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6 # yK81MIIGbzCCBFegAwIBAgIQJbwr8ynKEH8eqbqIhdSdOzANBgkqhkiG9w0BAQ0F # ADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFCMEAGA1UE # Aww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhv # cml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjIxNFoXDTQwMTIyOTIzNTkwMFowTjEL # MAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xJzAlBgNVBAMTHkVu # dHJ1c3QgVGltZSBTdGFtcGluZyBDQSAtIFRTMjCCAiIwDQYJKoZIhvcNAQEBBQAD # ggIPADCCAgoCggIBALUDKga2hE80zJ4xvuqOxntuICQPA9e9gTYz5m/SPrvEnqqg # zGZdQmA0UeItYYO6PJ5ouEvDZo6l3iu6my1Bpd7Qy1cFLYjZwEaIbTw1DRmQrLgM # GfBMxdtFW9w7wryNRADgOP//XcjPCJo91LLre5XDxKUA4GIBZFlfjON7i6n5RbfG # sKIKN0O4RoGrhn5/L97wX+vNIMylLTHjqC6Zm+B43fTbXYJjfTA5iH4kBuZ8YIR4 # yFwp5ZXL9XtPz1jckM+nonsUVMTgN5gwwZu2rpwp9mslQ+cSaj4Zi77A54HXSjAI # fnyN3zzzSJMh3oGDap0APtdgutGzYgiW6bZJADj0XHYN2ndqPaCV3h6hzFl6Xp/P # 6XZdQPK1FbVgaCzzWskjg9j1GmtpKKS21K5iBt4mRb3e6VZ3qtxksEHNzBPxXXF0 # spQIS08ybn5wuHfp1TI3wnreQhLocRzi2GK/qmtBhgZb5mm+Jgn0l8L+TPSAcoRu # 297FB6mOFaJt4RvgCQ/1oAegu8R3cwk8B5ONAbUSZy1NGbW4xckQq3DPQv+lJx3W # EtbkGERg+zldhLtmtVMSnQMUgmUptOxJcv2zQ+XDAikkuh/4uL5do7cuqfzPYtn6 # l8QTeONVuVp6hOv/u89piMC2+YtghUEQUMcFENJedp0+Nez2T4r5Ens/rws3AgMB # AAGjggEsMIIBKDASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBQmD/DESAgb # zd2R9VRUtrOz/JnxCDAfBgNVHSMEGDAWgBSCutY9l86fz3Hokjev/bO1aTVXzzAz # BggrBgEFBQcBAQQnMCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3Qu # bmV0MDEGA1UdHwQqMCgwJqAkoCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvY3Ni # cjEuY3JsMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDCDBFBgNV # HSAEPjA8MDAGBFUdIAAwKDAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5lbnRydXN0 # Lm5ldC9ycGEwCAYGZ4EMAQQCMA0GCSqGSIb3DQEBDQUAA4ICAQB2PUZohV8JwM7J # +Me4136nXDsLRnPOIlOLOPYRunfEwochjyfZDJXr6EvlXNeQFW+oKiyKauAiETR5 # +r2Wech2Fs2xROpxUQ+bVckYfNWCeZzzpreTqQU4cgIGl6Gosnl+Xgjibmx5mqiH # lM5/j1U2QA+fP1HVZr57q4bmboe6TmNdsdiOH8tnww1w2nrrk7IUhNI+fZM/Fgw2 # oFx5AJ8LbuWEKtiIwW0Etzfzkppw4DsD/c27J4LOL/yN5LLKvvglhcbtdMg9NV84 # CT15T+sb4EFepXSBP1EVwPhJiI+6uwXUrUWCM3nBJY1fVD2R5LifF5gAXa0o5U9f # G/v4VLWlxCT88HY7+A1ezEewyqq7blHfU7VJGvFgh7f5/WkGdV9z1hGQ8oBYjuXD # DwOYjARTsymH3z/3sOlMV4EkRHlo/hs2B9ZlPexv1sK1qmF8Zgbs0uVpgPhxki5c # 4hFGGEVL1voFZO+73gbKQyW9343JAXRhiNvwx6Y94wxxvH9L58jgbuDagPkAnsBr # JdWjulwr/sRgIBRKByMx5RrLkUSymntD8VuYtSFLuDE7IlTueWH3mpQbZicqxt/h # ZV3vcTnmUCX9hzS5rl18JzvnZZP4KISxb4aTLJOTtnCvoe7IpGGphDv7Crf4uG0m # 7kdO9V4F+pwPEX3Xy5GuQyD3FVljvDCCBrQwggScoAMCAQICEFtwJsyW9ngau4X2 # EfVtu24wDQYJKoZIhvcNAQENBQAwTjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVu # dHJ1c3QsIEluYy4xJzAlBgNVBAMTHkVudHJ1c3QgVGltZSBTdGFtcGluZyBDQSAt # IFRTMjAeFw0yNDAxMTkxNjQ3NDdaFw0zNTA0MTgwMDAwMDBaMHUxCzAJBgNVBAYT # AkNBMRAwDgYDVQQIEwdPbnRhcmlvMQ8wDQYDVQQHEwZPdHRhd2ExFjAUBgNVBAoT # DUVudHJ1c3QsIEluYy4xKzApBgNVBAMTIkVudHJ1c3QgVGltZXN0YW1wIEF1dGhv # cml0eSAtIFRTQTIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCqhgQ4 # Xo9ov4P1Wv1Um8V9OnWdxKctT23p0AUfUeMzuy9fOrGWVIrpCHw0rYmDVaSfAswj # C9gbekCkzJ9C6hN/fLjgt0oCBeKDSQRvBobNc0Gpg9SYZ/r0Uhl640pZKIdWF11I # 8YaRC7giZNtB+V1UtTWkbjjcCA0aVhhAw36YPEIzhA3FpWFRziBtTwDLQvCodRvb # Rv4p3Bue1/gYBVF2MJt0vZUfGVNlFUcsVmNr6bpIrAo4tsFy/SAKo3Qaawd/0d2s # F861HMd6iQzsbRwwjQXwrz2XzDW0tQUDZrqedvw52sia1hIS5EHChSJA8Mu6iOnS # h8KrxjQ75asNAAYOBrWLe9ELIto8qMlWe/A1BJbqWUaMj9SgtamDsM6E+0tE5UGo # FvOv2tGgJ3DfB+83866RztQhf4aY3F7uj8DaR9tpyhC5kZWAFWPxKxrClqEfwvc8 # 1PZ9JAclqFSUbwpV29skQ24uO6J7Sbu11hiP2QSzvurHtWSaS85SYR4rBR5jN0ad # scnVXoek6tc0siFCF7g6KDpepe0+/TcXf2Mg8nvWX8rzFD/hzv+Kd5RmbYnB4Ox/ # BHA4ZCf1pxd9TcoMgRvF5fE2xXqufSmkRzU4+g30UwMpBfxvoYvJzfG4iEDT0tue # JTGt1+Za2AS0hLsERmFm/10y3vzTPnxOGO9+3wIDAQABo4IBZTCCAWEwDAYDVR0T # AQH/BAIwADAdBgNVHQ4EFgQU9XYa+BCYkqEbd6kALPGVYgILeScwHwYDVR0jBBgw # FoAUJg/wxEgIG83dkfVUVLazs/yZ8QgwaAYIKwYBBQUHAQEEXDBaMCMGCCsGAQUF # BzABhhdodHRwOi8vb2NzcC5lbnRydXN0Lm5ldDAzBggrBgEFBQcwAoYnaHR0cDov # L2FpYS5lbnRydXN0Lm5ldC90czItY2hhaW4yNTYucDdjMDEGA1UdHwQqMCgwJqAk # oCKGIGh0dHA6Ly9jcmwuZW50cnVzdC5uZXQvdHMyY2EuY3JsMA4GA1UdDwEB/wQE # AwIHgDAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDBMBgNVHSAERTBDMDcGCmCGSAGG # +mwKAQcwKTAnBggrBgEFBQcCARYbaHR0cHM6Ly93d3cuZW50cnVzdC5uZXQvcnBh # MAgGBmeBDAEEAjANBgkqhkiG9w0BAQ0FAAOCAgEAqat9vxoAhVvc7XEmXpSCr1yC # S/ocOcVTtcMG3QNgfvlhmkEgwq5BFy6lQgiRCV6XMJiBRdaytYQ9i+mHB9oBP+AI # WGcRIJQewBaOY3e9m2wFjT21y5oxqUpcYjKiE86QnA3HkE9nw+Cof4eES9fywSEP # EOcXufu9Ccy+iqYB/k2CT2kgmnVr5A33UCZT/DP3/huup2rAqOseryLTPWAVn7rk # 1SmktVefsWX2sUxh1dLI2resqhgfIBiKpvj1B/lyK/Zj2CWcFv77lN+GdKIgtPII # 3xbvOYB2OpKx0JaDatp8U4lZGw1c8bsp8iFPYSwkifh2CX/ZaJCOVwxk1XYAcVnz # 1ITIPKGIf6hv871uf7CojuaTbOkUxXUcDCvO8gf7ta7UQTG/wcxpmBiuWwiPq1xk # uYRqvVw4od9PQrdLW1LT3vc7y59vwllCIk4LGLciyC/8agmF7VApUXrElEu2cWWK # SoaaS3hLVoqh3i+Lk1syzKG576m2DNgGCxcwvw1vj5OsyxH18ccAntAZ15xfjlR8 # a6lDO2PcwUSrvYw6Q/ByPySVzYSRXSEADXhrDVwjJJ9MrzTLFFreseRFUP2vb6cF # gqdzz8/pkupzKrHh3aID5iC8HWcaVsIu9qxfyk6BsOZaHXPP0hTzUHgoBU4VboUk # +DOoiK90bfRSzoyohJ4xggQWMIIEEgIBATBiME4xCzAJBgNVBAYTAlVTMRYwFAYD # VQQKEw1FbnRydXN0LCBJbmMuMScwJQYDVQQDEx5FbnRydXN0IFRpbWUgU3RhbXBp # bmcgQ0EgLSBUUzICEFtwJsyW9ngau4X2EfVtu24wCwYJYIZIAWUDBAIDoIIBiTAa # BgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkFMQ8XDTI0MDQx # ODA3MzI0OVowKQYJKoZIhvcNAQk0MRwwGjALBglghkgBZQMEAgOhCwYJKoZIhvcN # AQENME8GCSqGSIb3DQEJBDFCBEDuWsOI0c334RH7yIUPV1ywBokFFzYz2vwBvHt6 # 41FakPhVqIsgQjmjBGUGD9RJEJBOrHQ+805Kf1aZjOmovXd2MIHQBgsqhkiG9w0B # CRACLzGBwDCBvTCBujCBtzALBglghkgBZQMEAgMEQDkRQi4XAj6qmSSZdA4OyOjS # ctNV/Fz2bPkRVq+XVTTkgK/TvHxMW1fv0f+823UUZeDUBVqFTpsROdn37FXV/iQw # ZjBSpFAwTjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xJzAl # BgNVBAMTHkVudHJ1c3QgVGltZSBTdGFtcGluZyBDQSAtIFRTMgIQW3AmzJb2eBq7 # hfYR9W27bjALBgkqhkiG9w0BAQ0EggIAWq6WT5a6RrJsGwXI1TgtIIPsaAo+oLD7 # DjnLlH+vj57qZ8fEy7FJJZz0DxLHEOsXGrK//lhJnM5Z2RWB63muQeAyAeR4cWrJ # Lz4JgsxrkP3FI9XbreXaUOXk1NgJdkYliEtPzri/a9uR+xO+Z5NClSAP317H5KZm # wWjOs0oCkmUITCBvv5NO/w0/jHoFI7JQiKGP8UdaJGc+LPk4l7WMQXH5/+1XZwFH # cT5i06tLBdybdtGHXI3oxCx4tIrSwaMLNxyaQNqOTnxUEvPB1W29kN8uH7tcQ1Y/ # atqpOlpu0T2fsK8czJbqTSV2LC/cIWDGZoy2KXIkaEbYzKxsqoDfDiF4ENib+qDm # Ku0rdqEGjQMuJ0JWTOeoARHDb5TdozyIMfCIWkb0O+p71X38wY/BL8cQcp7e649F # miuAD0Rn58Z+yQiyfXfNVdXsLNQOcWragrmZz/tPv8ZXCPuGbQOl2lCoLoY62aoK # 9i37lqlKKKfwLpsqbCBWti5s6r91k5CeYLHbm1l3TjcWs472KYFhLeOS7pHN6heL # Oyq/D7R2PKhPKUHegen075e7lAULoPkaJ0bOOUclOtyjRCd7GxhPUgcZGy7QfUzO # jRo2BMwV+QGCdarP9doTGlZX47vXN8EY+piiTWbnSaREASXrOixPUzm5rYGMbUFn # DErcUmAkLyQ= # SIG # End signature block
combined_dataset/train/non-malicious/4444.ps1
4444.ps1
function Get-DynamicOptions { param ( [Microsoft.PackageManagement.MetaProvider.PowerShell.OptionCategory] $category ) Write-Debug ($LocalizedData.ProviderApiDebugMessage -f ('Get-DynamicOptions')) Write-Output -InputObject (New-DynamicOption -Category $category -Name $script:PackageManagementProviderParam -ExpectedType String -IsRequired $false) switch($category) { Package { Write-Output -InputObject (New-DynamicOption -Category $category ` -Name $script:PSArtifactType ` -ExpectedType String ` -IsRequired $false ` -PermittedValues @($script:PSArtifactTypeModule,$script:PSArtifactTypeScript, $script:All)) Write-Output -InputObject (New-DynamicOption -Category $category -Name $script:Filter -ExpectedType String -IsRequired $false) Write-Output -InputObject (New-DynamicOption -Category $category -Name $script:Tag -ExpectedType StringArray -IsRequired $false) Write-Output -InputObject (New-DynamicOption -Category $category -Name Includes -ExpectedType StringArray -IsRequired $false -PermittedValues $script:IncludeValidSet) Write-Output -InputObject (New-DynamicOption -Category $category -Name DscResource -ExpectedType StringArray -IsRequired $false) Write-Output -InputObject (New-DynamicOption -Category $category -Name RoleCapability -ExpectedType StringArray -IsRequired $false) Write-Output -InputObject (New-DynamicOption -Category $category -Name 'AllowPrereleaseVersions' -ExpectedType Switch -IsRequired $false) Write-Output -InputObject (New-DynamicOption -Category $category -Name Command -ExpectedType StringArray -IsRequired $false) Write-Output -InputObject (New-DynamicOption -Category $category -Name 'AcceptLicense' -ExpectedType Switch -IsRequired $false) } Source { Write-Output -InputObject (New-DynamicOption -Category $category -Name $script:PublishLocation -ExpectedType String -IsRequired $false) Write-Output -InputObject (New-DynamicOption -Category $category -Name $script:ScriptSourceLocation -ExpectedType String -IsRequired $false) Write-Output -InputObject (New-DynamicOption -Category $category -Name $script:ScriptPublishLocation -ExpectedType String -IsRequired $false) } Install { Write-Output -InputObject (New-DynamicOption -Category $category ` -Name $script:PSArtifactType ` -ExpectedType String ` -IsRequired $false ` -PermittedValues @($script:PSArtifactTypeModule,$script:PSArtifactTypeScript, $script:All)) Write-Output -InputObject (New-DynamicOption -Category $category -Name "Scope" -ExpectedType String -IsRequired $false -PermittedValues @("CurrentUser","AllUsers")) Write-Output -InputObject (New-DynamicOption -Category $category -Name 'AllowClobber' -ExpectedType Switch -IsRequired $false) Write-Output -InputObject (New-DynamicOption -Category $category -Name 'SkipPublisherCheck' -ExpectedType Switch -IsRequired $false) Write-Output -InputObject (New-DynamicOption -Category $category -Name "InstallUpdate" -ExpectedType Switch -IsRequired $false) Write-Output -InputObject (New-DynamicOption -Category $category -Name 'NoPathUpdate' -ExpectedType Switch -IsRequired $false) Write-Output -InputObject (New-DynamicOption -Category $category -Name 'AllowPrereleaseVersions' -ExpectedType Switch -IsRequired $false) } } }
combined_dataset/train/non-malicious/sample_30_64.ps1
sample_30_64.ps1
# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. function ConvertTo-ScriptExtent { <# .EXTERNALHELP ..\PowerShellEditorServices.Commands-help.xml #> [CmdletBinding()] [OutputType([System.Management.Automation.Language.IScriptExtent])] param( [Parameter(Mandatory, ValueFromPipelineByPropertyName, ParameterSetName = 'ByOffset')] [Alias('StartOffset', 'Offset')] [int] $StartOffsetNumber, [Parameter(ValueFromPipelineByPropertyName, ParameterSetName = 'ByOffset')] [Alias('EndOffset')] [int] $EndOffsetNumber, [Parameter(ValueFromPipelineByPropertyName, ParameterSetName = 'ByPosition')] [Alias('StartLine', 'Line')] [int] $StartLineNumber, [Parameter(ValueFromPipelineByPropertyName, ParameterSetName = 'ByPosition')] [Alias('StartColumn', 'Column')] [int] $StartColumnNumber, [Parameter(ValueFromPipelineByPropertyName, ParameterSetName = 'ByPosition')] [Alias('EndLine')] [int] $EndLineNumber, [Parameter(ValueFromPipelineByPropertyName, ParameterSetName = 'ByPosition')] [Alias('EndColumn')] [int] $EndColumnNumber, [Parameter(ValueFromPipelineByPropertyName, ParameterSetName = 'ByPosition')] [Parameter(ValueFromPipelineByPropertyName, ParameterSetName = 'ByOffset')] [Parameter(ValueFromPipelineByPropertyName, ParameterSetName = 'ByBuffer')] [Alias('File', 'FileName')] [string] $FilePath = $psEditor.GetEditorContext().CurrentFile.Path, [Parameter(ValueFromPipelineByPropertyName, ParameterSetName = 'ByBuffer')] [Alias('Start')] [Microsoft.PowerShell.EditorServices.Extensions.IFilePosition, Microsoft.PowerShell.EditorServices] $StartBuffer, [Parameter(ValueFromPipelineByPropertyName, ParameterSetName = 'ByBuffer')] [Alias('End')] [Microsoft.PowerShell.EditorServices.Extensions.IFilePosition, Microsoft.PowerShell.EditorServices] $EndBuffer, [Parameter(Mandatory, ValueFromPipeline, ValueFromPipelineByPropertyName, ParameterSetName = 'ByExtent')] [System.Management.Automation.Language.IScriptExtent] $Extent ) begin { $fileContext = $psEditor.GetEditorContext().CurrentFile $emptyExtent = [Microsoft.PowerShell.EditorServices.Extensions.FileScriptExtent, Microsoft.PowerShell.EditorServices]::Empty } process { # Already a InternalScriptExtent, FileScriptExtent or is empty. $returnAsIs = $Extent -and ($Extent.StartOffset -or $Extent.EndOffset -or $Extent -eq $emptyExtent) if ($returnAsIs) { return $Extent } if ($StartOffsetNumber) { $startOffset = $StartOffsetNumber $endOffset = $EndOffsetNumber # Allow creating a single position extent with just the offset parameter. if (-not $EndOffsetNumber) { $endOffset = $startOffset } return [Microsoft.PowerShell.EditorServices.Extensions.FileScriptExtent, Microsoft.PowerShell.EditorServices]::FromOffsets( $fileContext, $startOffset, $endOffset) } if ($StartBuffer) { if (-not $EndBuffer) { $EndBuffer = $StartBuffer } return [Microsoft.PowerShell.EditorServices.Extensions.FileScriptExtent, Microsoft.PowerShell.EditorServices]::FromPositions( $fileContext, $StartBuffer.Line, $StartBuffer.Column, $EndBuffer.Line, $EndBuffer.Column) } # Allow piping a single line and column to get a zero length script extent. if ($PSBoundParameters.ContainsKey('StartColumnNumber') -and -not $PSBoundParameters.ContainsKey('EndColumnNumber')) { $EndColumnNumber = $StartColumnNumber } if ($PSBoundParameters.ContainsKey('StartLineNumber') -and -not $PSBoundParameters.ContainsKey('EndLineNumber')) { $EndLineNumber = $StartLineNumber } # Protect against zero as a value since lines and columns start at 1 if (-not $StartColumnNumber) { $StartColumnNumber = 1 } if (-not $StartLineNumber) { $StartLineNumber = 1 } if (-not $EndLineNumber) { $EndLineNumber = 1 } if (-not $EndColumnNumber) { $EndColumnNumber = 1 } return [Microsoft.PowerShell.EditorServices.Extensions.FileScriptExtent, Microsoft.PowerShell.EditorServices]::FromPositions( $fileContext, $StartLineNumber, $StartColumnNumber, $EndLineNumber, $EndColumnNumber) } } # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCArNi6HQ5eMUAz9 # cXhU8YSv7SRI9434IV7YYDMjrPkUZaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPdDfua2HoHSC+WsA9Kd4vwx # /69pMrly3wNqXl3Q9Zb6MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAQscY9ZMmaRPyU7Cq7OYqjIIeCFPcvIGo7XEzxIsFNxnClICRRrRboivn # U55fmYMWp4N2/2mM0d/E0ImuOaVIbcZpVIL+suejQR3MHzaEqbGNq4U1Op/OQnfh # dsWZ5/IfX3U4bv+ZNoOiyNRLSxNRwOQWFIfWTP9cyIsdcsNnnsPeZgsd3zATqTpQ # JCiN0ynTxrr7MhYqkSLgPjMmhS6UHRJqxABwgb7+mWSfTmr/YAFIW+fSGsoQz4SD # 4qXs+JCKDmEQ68Xid7MeuWi505WRZ1cr0IgMVfN90L6SEB4QXqYT8TJpnlUGaxPN # GwuELS+kxOE7I/+WLDdRUgkRYoqMQKGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCArZE4XtxXT+JpwqBzkv+HHobKmDxj1V+pEBZ20/8WG8gIGZfye1OkJ # GBMyMDI0MDQxNjIxMDg0My4yNTZaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC # RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis # DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI # ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z # ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR # IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE # lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s # /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4 # aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB # fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT # me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy # qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui # hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds # lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf # sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t # Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU # +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7 # qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6 # Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+ # x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4 # 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5 # ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV # PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4 # y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk # 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG # QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnIuFAwIhgPMjAyNDA0MTYxNjQxNTJaGA8yMDI0MDQxNzE2NDE1MlowdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6ci4UAIBADAKAgEAAgIQpQIB/zAHAgEAAgIUHDAK # AgUA6coJ0AIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAAX5Od8BudZPJpLu # QqGaEsE0zQsYcOEXVwO6MArilcyRwMNodtffyq32QXJSP7gw1Ol9v8n5vx6IL0Xd # PV7c+ndDjia3J9jqOGaxonTLVyNJew5XLi4SQGPWl0p/7PLKZ2SLNjWjUMm7+sh9 # aJfgHFNdSkEEnnGRGXYcPamteduMMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgtdrW2tOwlZUj1Pyc/uC0Oj6rkJOOBNnajcKJkekYEhEwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJ # CI9//zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 4pmZlfHc4yDrAAEAAAHiMCIEIH+NMGISrYh2rIJ0NX9sTkqjrTeMVIPR2ZGuPcoo # cNiZMA0GCSqGSIb3DQEBCwUABIICAAQKn5wL6Gi2ofXRfLA26D7yCdUaRvraVRKD # 8Z+ai8vXNAXAznDV9JROh/iozNuB8X23z+tqrtEtr3NEimJzVMwFVvHpzdT0LSRM # IuoO1KSSaUGNMqN0rjD1euAbxLEaNXDV5oJniNJ55kOIS5M80wJ8JIhTly2zoI8c # 7bEg2gxcswoD/bWT70aVqE5d+RbYwX5FO/pIuPs+1RcPk0+G0q4b+BsVmJpR5CrP # PuCrHbfOZLSu5P0IyqXFBtGDjOv5ee0RELaQG0oPf8HkLVbCA3S2UGNpIJIvD/OO # w8UKU3pZL8gFReYOHdrfehKSFIJs0PDBn7ffZXCHXI3rfKadUuzrvAx8Nt7+4Tu6 # WVGODmhP3uud6NFX+nY0ZvY2gWGV6d5ibe6m/25ty/bRzNtgRjwCYD41hNTF0WSb # gQ0KL5KHo1N/p1/qb5oAFaRCBFrIWt8gQ4GujYu2/3H5kbK2JQf2jsE3yq/EMUYK # QBjXOg+5EJbCtuaQfVwgVMEpigwwFJcAH1nRj6WcvIJlmZxLUakXWNN0nkAlvXmc # skbUhBfTAGvf1QzsJLO7Ngqi9h0igWFcBaMBbEGDou0QoGNg4PBBlpcibBz6R7d+ # NjJ50P1/vZXhCs12dADpnMd41UVKY/w1OJpi0tFoJwGgaTtWFr9bBOV0jgs1qlZS # 35AQflBD # SIG # End signature block
combined_dataset/train/non-malicious/sample_1_29.ps1
sample_1_29.ps1
[dynamic, provider("dcismprovider"), Description( "DCIM_PresenceAndStatusSensor is a derivation of " "CIM_Sensor, and represents a sensor.")] class DCIM_PresenceAndStatusSensor : CIM_Sensor { [ Description ("The current state indicated by the Sensor. This is always one of the \"PossibleStates\"."), Maxlen (128), Override ("CurrentState"), Required ] string CurrentState; [ Description ("The user-friendly name for the class instance. This value does not have to be unique within its namespace."), Override ("ElementName"), Required ] string ElementName; [ Description ("This property represents the type of the sensor, for example Voltage or Temperature Sensor. If the type is set to \"Other\", the OtherSensorType Description can be used to further identify the type. If the sensor has numeric readings, the type of the sensor can be implicitly determined by the Units. A description of the different Sensor types is as follows: A Temperature Sensor measures the environmental temperature. Voltage and Current Sensors measure electrical voltage and current readings. A Tachometer measures the speed or revolutions of a device. For example, a Fan Device can have an associated Tachometer which measures its speed. A Counter is a general-purpose Sensor that measures some numerical property of a Device. A Counter value can be cleared but it never decreases. A Switch Sensor has states like Open/Close, On/Off, or Up/Down. A Lock has states of Locked/Unlocked. Humidity, Smoke Detection, and Air Flow Sensors measure the equivalent environmental characteristics. A Presence Sensor detects the presence of a PhysicalElement. A Power Consumption Sensor measures the instantaneous power consumed by a managed element. A Power Production Sensor measures the instantaneous power produced by a managed element such as a power supply or a voltage regulator. A pressure sensor is used to report pressure. Intrusion sensor reports an intrusion of an enclosure regardless whether it was authorized or not."), Modelcorrespondence { "CIM_Sensor.OtherSensorTypeDescription" }, Override ("SensorType"), Valuemap { "0", "1", "2", "3", "4", "5", "6", "7", "8", "9", "10", "11", "12", "13", "14", "15", "16" }, Values { "Unknown", "Other", "Temperature", "Voltage", "Current", "Tachometer", "Counter", "Switch", "Lock", "Humidity", "Smoke Detection", "Presence", "Air Flow", "Power Consumption", "Power Production", "Pressure", "Intrusion" } ] uint16 SensorType; [ Description ("A string that describes the sensor type. This property is used when the SensorType property is set to \"Other\"."), Maxlen (128), Modelcorrespondence { "CIM_Sensor.SensorType" }, Override ("OtherSensorTypeDescription") ] string OtherSensorTypeDescription; [ Description ("PossibleStates enumerates the string outputs of the Sensor. For example, a \"Switch\" Sensor may output the states \"On\", or \"Off\"."), Maxlen (128), Override ("PossibleStates[]") ] string PossibleStates[]; [ Description ("CreationClassName indicates the name of the class or the subclass that is used while creating an instance. When used with the other key properties of this class, this property uniquely identifies all instances of this class and its subclasses."), Key, Maxlen (256), Override ("CreationClassName") ] string CreationClassName; [ Description ("An address or other identifying information to uniquely name the LogicalDevice."), Key, Maxlen (64), Override ("DeviceID") ] string DeviceID; [ Description ("The CreationClassName of the scoping System."), Key, Maxlen (256), Override ("SystemCreationClassName"), Propagated ("CIM_System.CreationClassName") ] string SystemCreationClassName; [ Description ("The Name of the scoping System."), Key, Maxlen (256), Override ("SystemName"), Propagated ("CIM_System.Name") ] string SystemName; }; /* SIG # Begin signature block */ /* MIItDgYJKoZIhvcNAQcCoIIs/zCCLPsCAQExDzANBglghkgBZQMEAgEFADB5Bgor */ /* BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG */ /* KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDmjsf890R2gXOR */ /* h+SPHrDivj74snP9cHuHWpCH/QwNOaCCEmMwggXfMIIEx6ADAgECAhBOQOQ3VO3m */ /* jAAAAABR05R/MA0GCSqGSIb3DQEBCwUAMIG+MQswCQYDVQQGEwJVUzEWMBQGA1UE */ /* ChMNRW50cnVzdCwgSW5jLjEoMCYGA1UECxMfU2VlIHd3dy5lbnRydXN0Lm5ldC9s */ /* ZWdhbC10ZXJtczE5MDcGA1UECxMwKGMpIDIwMDkgRW50cnVzdCwgSW5jLiAtIGZv */ /* ciBhdXRob3JpemVkIHVzZSBvbmx5MTIwMAYDVQQDEylFbnRydXN0IFJvb3QgQ2Vy */ /* dGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMjAeFw0yMTA1MDcxNTQzNDVaFw0zMDEx */ /* MDcxNjEzNDVaMGkxCzAJBgNVBAYTAlVTMRYwFAYDVQQKDA1FbnRydXN0LCBJbmMu */ /* MUIwQAYDVQQDDDlFbnRydXN0IENvZGUgU2lnbmluZyBSb290IENlcnRpZmljYXRp */ /* b24gQXV0aG9yaXR5IC0gQ1NCUjEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK */ /* AoICAQCngY/3FEW2YkPy2K7TJV5IT1G/xX2fUBw10dZ+YSqUGW0nRqSmGl33VFFq */ /* gCLGqGZ1TVSDyV5oG6v2W2Swra0gvVTvRmttAudFrnX2joq5Mi6LuHccUk15iF+l */ /* OhjJUCyXJy2/2gB9Y3/vMuxGh2Pbmp/DWiE2e/mb1cqgbnIs/OHxnnBNCFYVb5Cr */ /* +0i6udfBgniFZS5/tcnA4hS3NxFBBuKK4Kj25X62eAUBw2DtTwdBLgoTSeOQm3/d */ /* vfqsv2RR0VybtPVc51z/O5uloBrXfQmywrf/bhy8yH3m6Sv8crMU6UpVEoScRCV1 */ /* HfYq8E+lID1oJethl3wP5bY9867DwRG8G47M4EcwXkIAhnHjWKwGymUfe5SmS1dn */ /* DH5erXhnW1XjXuvH2OxMbobL89z4n4eqclgSD32m+PhCOTs8LOQyTUmM4OEAwjig */ /* nPqEPkHcblauxhpb9GdoBQHNG7+uh7ydU/Yu6LZr5JnexU+HWKjSZR7IH9Vybu5Z */ /* HFc7CXKd18q3kMbNe0WSkUIDTH0/yvKquMIOhvMQn0YupGaGaFpoGHApOBGAYGuK */ /* Q6NzbOOzazf/5p1nAZKG3y9I0ftQYNVc/iHTAUJj/u9wtBfAj6ju08FLXxLq/f0u */ /* DodEYOOp9MIYo+P9zgyEIg3zp3jak/PbOM+5LzPG/wc8Xr5F0wIDAQABo4IBKzCC */ /* AScwDgYDVR0PAQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0lBBYw */ /* FAYIKwYBBQUHAwMGCCsGAQUFBwMIMDsGA1UdIAQ0MDIwMAYEVR0gADAoMCYGCCsG */ /* AQUFBwIBFhpodHRwOi8vd3d3LmVudHJ1c3QubmV0L3JwYTAzBggrBgEFBQcBAQQn */ /* MCUwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDAGA1UdHwQp */ /* MCcwJaAjoCGGH2h0dHA6Ly9jcmwuZW50cnVzdC5uZXQvZzJjYS5jcmwwHQYDVR0O */ /* BBYEFIK61j2Xzp/PceiSN6/9s7VpNVfPMB8GA1UdIwQYMBaAFGpyJnrQHu995ztp */ /* UdRsjZ+QEmarMA0GCSqGSIb3DQEBCwUAA4IBAQAfXkEEtoNwJFMsVXMdZTrA7LR7 */ /* BJheWTgTCaRZlEJeUL9PbG4lIJCTWEAN9Rm0Yu4kXsIBWBUCHRAJb6jU+5J+Nzg+ */ /* LxR9jx1DNmSzZhNfFMylcfdbIUvGl77clfxwfREc0yHd0CQ5KcX+Chqlz3t57jpv */ /* 3ty/6RHdFoMI0yyNf02oFHkvBWFSOOtg8xRofcuyiq3AlFzkJg4sit1Gw87kVlHF */ /* VuOFuE2bRXKLB/GK+0m4X9HyloFdaVIk8Qgj0tYjD+uL136LwZNr+vFie1jpUJuX */ /* bheIDeHGQ5jXgWG2hZ1H7LGerj8gO0Od2KIc4NR8CMKvdgb4YmZ6tvf6yK81MIIG */ /* CDCCA/CgAwIBAgIQBu9mzEaGqLK0hNoZKy1rYTANBgkqhkiG9w0BAQ0FADBPMQsw */ /* CQYDVQQGEwJVUzEWMBQGA1UEChMNRW50cnVzdCwgSW5jLjEoMCYGA1UEAxMfRW50 */ /* cnVzdCBDb2RlIFNpZ25pbmcgQ0EgLSBPVkNTMjAeFw0yNDA0MTkwOTE2MDlaFw0y */ /* NTA1MTIwOTE2MDhaMIGEMQswCQYDVQQGEwJVUzEOMAwGA1UECBMFVGV4YXMxEzAR */ /* BgNVBAcTClJvdW5kIFJvY2sxEjAQBgNVBAoTCURlbGwgSW5jLjEoMCYGA1UECxMf */ /* U2VydmVyIFN5c3RlbXMgTWdtdCBFbmdpbmVlcmluZzESMBAGA1UEAxMJRGVsbCBJ */ /* bmMuMIIBojANBgkqhkiG9w0BAQEFAAOCAY8AMIIBigKCAYEAvFatHoJS1lbvBD4U */ /* x/jt6hrhOHlGpntV/TPJbKwAdvG6SCT6MfdFasEGShyzypfx8adv3v+sFWo84yYB */ /* GqnqH/Kkj48BTKNREXjN3x/jLZrv+rVRQJYG79us7u3vQVSBX0ds0Jcd9f7u2REE */ /* aLBKrd7ZwxmsHoiAaqKYBm8nMo4kmH4xOw6cOXxUW6mkYxNQxn60nxV5A2ZJvUKn */ /* YvanuULo5jGrl+t2A5jInOLyxSmNU62DdLbyhtE3B6cEhe5yQ54hi7d6c5IM2fNH */ /* FNrQkRavAWUyAxPPBpTSsR0g/IkNymbNPCTjgvDQOIJBcMp0C+q158RIBiE+IMwq */ /* QGi7aUvUUhzTQG9NcSDQan3hMmYfevU3RLQMw4OcoGIT/jOSYmgtcLHiB6lnOG/h */ /* iJ8EsQgW1s2yJ7vG2Fo/IHvQjbfFxefO+gluw4UjcLZgIqACIlFNYGaq4rzKtTeF */ /* 1NNy6DjjbJV2nt/JlD68YlFg0pU9rGDKglZFWvfWiLId8IJnAgMBAAGjggEoMIIB */ /* JDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBRFrXrMchlvXUnwqKV0rQOPRSgzqzAf */ /* BgNVHSMEGDAWgBTvn7p5sHPyJR54nANSnBtThN6N7TBnBggrBgEFBQcBAQRbMFkw */ /* IwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLmVudHJ1c3QubmV0MDIGCCsGAQUFBzAC */ /* hiZodHRwOi8vYWlhLmVudHJ1c3QubmV0L292Y3MyLWNoYWluLnA3YzAxBgNVHR8E */ /* KjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3QubmV0L292Y3MyLmNybDAOBgNV */ /* HQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwEwYDVR0gBAwwCjAIBgZn */ /* gQwBBAEwDQYJKoZIhvcNAQENBQADggIBACoeAWs2aV9gf+TF4AGOKc454/E55mVR */ /* Yz42M1ksqASl2j+ulObFIWcuy/paLjWhMSulehEA8Zb+YQ89fR6Y0TgJ0Eh09aK5 */ /* +GARB7q/+a+gRIw7nfrwmjMkXAwL+9lmbc1X64fEUuKY2NVdksjKC7xRKNMb5i50 */ /* NQyVN9neCJKIVSQDiBMXGgtDkAqPe1sH7/NGGQZKCXhIg3f3caq7dr/mZoiVAIOB */ /* XtHr++65DqG61aWyZV5tCfzSvXFvLpL0dbu14gH6gEo5Zvlp226Vk+HKr/cQ2Ynj */ /* /xXw/5UWHvmKwDOAkA/ld64jA4m466aoP2tKse8z1kSa/zw1wRSp0bwPn23gj2IO */ /* NmEG9dM9Lv3c5FH+oBKNuqJ2Vj5viCHVZEcw40UDQqdfboVK+Y1XSkNfa1CUjzCu */ /* Q2J3XMrfVK9ZCecopoCAXzYem7e/G/Md3rTQky2PTf7Z1hgYlqxisPoGEV3nguIg */ /* ooMbBkHbl/4iWAB237woZFlX0imdO5se7el67/nx58CSLYjNmj82Y4cthnFOrwP4 */ /* mUW7zVXlq9sZP9fCcrdrNMUF4KYS2x7/IIgHURKvOTjyT6f+ZRedEfwOlM1D12/l */ /* eL1OX+dPZq5BGGHal3r1xbLdLxHUlMg+IJJk0wmMwmSF3kzbqbMUTaM1FX9x0+E8 */ /* 4YVlsJB1ttLHMIIGcDCCBFigAwIBAgIQce9VdK81VMNaLGn2b0trzTANBgkqhkiG */ /* 9w0BAQ0FADBpMQswCQYDVQQGEwJVUzEWMBQGA1UECgwNRW50cnVzdCwgSW5jLjFC */ /* MEAGA1UEAww5RW50cnVzdCBDb2RlIFNpZ25pbmcgUm9vdCBDZXJ0aWZpY2F0aW9u */ /* IEF1dGhvcml0eSAtIENTQlIxMB4XDTIxMDUwNzE5MjA0NVoXDTQwMTIyOTIzNTkw */ /* MFowTzELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNV */ /* BAMTH0VudHJ1c3QgQ29kZSBTaWduaW5nIENBIC0gT1ZDUzIwggIiMA0GCSqGSIb3 */ /* DQEBAQUAA4ICDwAwggIKAoICAQCemXYXGp5WFwhjLJNNg2GEMzQCttlioN7CDrkg */ /* TMhXnQ/dVFsNDNYB3S9I4ZEJ4dvIFQSCtnvw2NYwOxlxcPuoppf2KV2kDKn0Uz5X */ /* 2wxObvx2218k6apfQ+OT5w7PyiW8xEwwC1oP5gb05W4MmWZYT4NhwnN8XCJvAUXF */ /* D/dAT2RL0BcKqQ4eAi+hj0zyZ1DbPuSfwk8/dOsxpNCU0Jm8MJIJasskzaLYdlLQ */ /* TnWYT2Ra0l6D9FjAXWp1xNg/ZDqLFA3YduHquWvnEXBJEThjE27xxvq9EEU1B+Z2 */ /* FdB1FqrCQ1f+q/5jc0YioLjz5MdwRgn5qTdBmrNLbB9wcqMH9jWSdBFkbvkC1cCS */ /* lfGXWX4N7qIl8nFVuJuNv83urt37DOeuMk5QjaHf0XO/wc5/ddqrv9CtgjjF54jt */ /* om06hhG317DhqIs7DEEXml/kW5jInQCf93PSw+mfBYd5IYPWC+3RzAif4PHFyVi6 */ /* U1/Uh7GLWajSXs1p0D76xDkJr7S17ec8+iKH1nP5F5Vqwxz1VXhf1PoLwFs/jHgV */ /* DlpMOm7lJpjQJ8wg38CGO3qNZUZ+2WFeqfSuPtT8r0XHOrOFBEqLyAlds3sCKFnj */ /* hn2AolhAZmLgOFWDq58pQSa6u+nYZPi2uyhzzRVK155z42ZMsVGdgSOLyIZ3srYs */ /* NyJwIQIDAQABo4IBLDCCASgwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQU */ /* 75+6ebBz8iUeeJwDUpwbU4Teje0wHwYDVR0jBBgwFoAUgrrWPZfOn89x6JI3r/2z */ /* tWk1V88wMwYIKwYBBQUHAQEEJzAlMCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5l */ /* bnRydXN0Lm5ldDAxBgNVHR8EKjAoMCagJKAihiBodHRwOi8vY3JsLmVudHJ1c3Qu */ /* bmV0L2NzYnIxLmNybDAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUH */ /* AwMwRQYDVR0gBD4wPDAwBgRVHSAAMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly93d3cu */ /* ZW50cnVzdC5uZXQvcnBhMAgGBmeBDAEEATANBgkqhkiG9w0BAQ0FAAOCAgEAXvOG */ /* mTXBee7wEK/XkkPShdBb4Jig4HFRyRTLUJpgDrAEJkmxz+m6mwih2kNd1G8jorn4 */ /* QMdH/k0BC0iQP8jcarQ+UzUovkBKR4VqHndAzIB/YbQ8T3mo5qOmoH5EhnG/EhuV */ /* gXL3DaXQ3mefxqK48Wr5/P50ZsZk5nk9agNhTksfzCBiywIY7GPtfnE/lroLXmgi */ /* Z+wfwNIFFmaxsqTq/MWVo40SpfWN7xsgzZn35zLzWXEf3ZTmeeVSIxBWKvxZOL+/ */ /* eSWSasf9q2d3cbEEfTWtFME+qPwjF1YIGHzXeiJrkWrMNUVtTzudQ50FuJ3z/DQh */ /* XAQYMlc4NMHKgyNGpogjIcZ+FICrse+7C6wJP+5TkTGz4lREqrV9MDwsI5zoP6NY */ /* 6kAIF6MgX3rADNuq/wMWAw10ZCKalF4wNXYT9dPh4+AHytnqRYhGnFTVEOLzMglA */ /* tudcFzL+zK/rbc9gPHXz7lxgQFUbtVmvciNoTZx0BAwQya9QW6cNZg+W5ZqV4CCi */ /* GtCw7jhJnipnnpGWbJjbxBBtYHwebkjntn6vMwcSce+9lTu+qYPUQn23pzTXX4aR */ /* ta9WWNpVfRe927zNZEEVjTFRBk+0LrKLPZzzTeNYA1TMrIj4UjxOS0YJJRn/Feen */ /* mEYufbrq4+N8//m5GZW+drkNebICURpKyJ+IwkMxghoBMIIZ/QIBATBjME8xCzAJ */ /* BgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQDEx9FbnRy */ /* dXN0IENvZGUgU2lnbmluZyBDQSAtIE9WQ1MyAhAG72bMRoaosrSE2hkrLWthMA0G */ /* CWCGSAFlAwQCAQUAoIGsMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisG */ /* AQQBgjcCAQsxDjAMBgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCDVcVx7N2Kj */ /* NlR2wp+VRPJy1Buj1JGTKY40Nb1AfH/BSjBABgorBgEEAYI3AgEMMTIwMKAWgBQA */ /* RABlAGwAbAAsACAASQBuAGMALqEWgBRodHRwOi8vd3d3LmRlbGwuY29tIDANBgkq */ /* hkiG9w0BAQEFAASCAYCUA5rQOcTUyfwQT/H+3hPVFXAgtTlpZrGwd2M3q0LFTxHV */ /* gg92FFhw09HFUolcX9HHOO/w9i/kYD9T2/7ynSWhqjF/AIDb1dD1qjBTIeoz7j1D */ /* KT5Asrb6gqkc7Ct7W4+DSDcru43J2AAKlLFKkCeg1OQ+L5JFEuzim9KtxSZfotTh */ /* P+kKEeK299GJ8OflIuVNwM2LzpJx/kJRuqSUzF4IM5FA6nuVgjFIQlyz2bxEMWv5 */ /* MfFEvDoIp3Zn8mf9/LEBhTzSw6x2nHrd+seNzJT3T24iD81eXzkOOCKBMi42njIS */ /* LlvsFS8wNKw94A6WAQQL2dFvPyAcuf2iNCWGsn1b4lT+EMvZoBJtoG+F2w3DUFJB */ /* BxLU5BqaXrVTEvigKQHXw+nLOwls/BoRKqmD7lntNBjLmK4T6rRIiATGmhuyyMH2 */ /* Jj+NH4pX0XC5kmWTuC/XPVs3UGiLjXrVNPUBpdps39NkxZlZhq1xW4O0HkHzPMdP */ /* 2dllKow2A6SmZPtnah6hghdAMIIXPAYKKwYBBAGCNwMDATGCFywwghcoBgkqhkiG */ /* 9w0BBwKgghcZMIIXFQIBAzEPMA0GCWCGSAFlAwQCAQUAMHgGCyqGSIb3DQEJEAEE */ /* oGkEZzBlAgEBBglghkgBhv1sBwEwMTANBglghkgBZQMEAgEFAAQgeLZ5hEv2lBzr */ /* Fl16wYl/nJ2AAwDDXz2fES/UWtXWJEUCEQDWCIzwkNKXUmRli93FWx0RGA8yMDI0 */ /* MDkyMDA3MDEyNVqgghMJMIIGwjCCBKqgAwIBAgIQBUSv85SdCDmmv9s/X+VhFjAN */ /* BgkqhkiG9w0BAQsFADBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQs */ /* IEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEy */ /* NTYgVGltZVN0YW1waW5nIENBMB4XDTIzMDcxNDAwMDAwMFoXDTM0MTAxMzIzNTk1 */ /* OVowSDELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMSAwHgYD */ /* VQQDExdEaWdpQ2VydCBUaW1lc3RhbXAgMjAyMzCCAiIwDQYJKoZIhvcNAQEBBQAD */ /* ggIPADCCAgoCggIBAKNTRYcdg45brD5UsyPgz5/X5dLnXaEOCdwvSKOXejsqnGfc */ /* YhVYwamTEafNqrJq3RApih5iY2nTWJw1cb86l+uUUI8cIOrHmjsvlmbjaedp/lvD */ /* 1isgHMGXlLSlUIHyz8sHpjBoyoNC2vx/CSSUpIIa2mq62DvKXd4ZGIX7ReoNYWyd */ /* /nFexAaaPPDFLnkPG2ZS48jWPl/aQ9OE9dDH9kgtXkV1lnX+3RChG4PBuOZSlbVH */ /* 13gpOWvgeFmX40QrStWVzu8IF+qCZE3/I+PKhu60pCFkcOvV5aDaY7Mu6QXuqvYk */ /* 9R28mxyyt1/f8O52fTGZZUdVnUokL6wrl76f5P17cz4y7lI0+9S769SgLDSb495u */ /* ZBkHNwGRDxy1Uc2qTGaDiGhiu7xBG3gZbeTZD+BYQfvYsSzhUa+0rRUGFOpiCBPT */ /* aR58ZE2dD9/O0V6MqqtQFcmzyrzXxDtoRKOlO0L9c33u3Qr/eTQQfqZcClhMAD6F */ /* aXXHg2TWdc2PEnZWpST618RrIbroHzSYLzrqawGw9/sqhux7UjipmAmhcbJsca8+ */ /* uG+W1eEQE/5hRwqM/vC2x9XH3mwk8L9CgsqgcT2ckpMEtGlwJw1Pt7U20clfCKRw */ /* o+wK8REuZODLIivK8SgTIUlRfgZm0zu++uuRONhRB8qUt+JQofM604qDy0B7AgMB */ /* AAGjggGLMIIBhzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADAWBgNVHSUB */ /* Af8EDDAKBggrBgEFBQcDCDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1s */ /* BwEwHwYDVR0jBBgwFoAUuhbZbU2FL3MpdpovdYxqII+eyG8wHQYDVR0OBBYEFKW2 */ /* 7xPn783QZKHVVqllMaPe1eNJMFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwz */ /* LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZUaW1l */ /* U3RhbXBpbmdDQS5jcmwwgZAGCCsGAQUFBwEBBIGDMIGAMCQGCCsGAQUFBzABhhho */ /* dHRwOi8vb2NzcC5kaWdpY2VydC5jb20wWAYIKwYBBQUHMAKGTGh0dHA6Ly9jYWNl */ /* cnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFJTQTQwOTZTSEEyNTZU */ /* aW1lU3RhbXBpbmdDQS5jcnQwDQYJKoZIhvcNAQELBQADggIBAIEa1t6gqbWYF7xw */ /* jU+KPGic2CX/yyzkzepdIpLsjCICqbjPgKjZ5+PF7SaCinEvGN1Ott5s1+FgnCvt */ /* 7T1IjrhrunxdvcJhN2hJd6PrkKoS1yeF844ektrCQDifXcigLiV4JZ0qBXqEKZi2 */ /* V3mP2yZWK7Dzp703DNiYdk9WuVLCtp04qYHnbUFcjGnRuSvExnvPnPp44pMadqJp */ /* ddNQ5EQSviANnqlE0PjlSXcIWiHFtM+YlRpUurm8wWkZus8W8oM3NG6wQSbd3lqX */ /* TzON1I13fXVFoaVYJmoDRd7ZULVQjK9WvUzF4UbFKNOt50MAcN7MmJ4ZiQPq1JE3 */ /* 701S88lgIcRWR+3aEUuMMsOI5ljitts++V+wQtaP4xeR0arAVeOGv6wnLEHQmjNK */ /* qDbUuXKWfpd5OEhfysLcPTLfddY2Z1qJ+Panx+VPNTwAvb6cKmx5AdzaROY63jg7 */ /* B145WPR8czFVoIARyxQMfq68/qTreWWqaNYiyjvrmoI1VygWy2nyMpqy0tg6uLFG */ /* hmu6F/3Ed2wVbK6rr3M66ElGt9V/zLY4wNjsHPW2obhDLN9OTH0eaHDAdwrUAuBc */ /* YLso/zjlUlrWrBciI0707NMX+1Br/wd3H3GXREHJuEbTbDJ8WC9nR2XlG3O2mflr */ /* LAZG70Ee8PBf4NvZrZCARK+AEEGKMIIGrjCCBJagAwIBAgIQBzY3tyRUfNhHrP0o */ /* ZipeWzANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGln */ /* aUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhE */ /* aWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjIwMzIzMDAwMDAwWhcNMzcwMzIy */ /* MjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x */ /* OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt */ /* ZVN0YW1waW5nIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxoY1 */ /* BkmzwT1ySVFVxyUDxPKRN6mXUaHW0oPRnkyibaCwzIP5WvYRoUQVQl+kiPNo+n3z */ /* nIkLf50fng8zH1ATCyZzlm34V6gCff1DtITaEfFzsbPuK4CEiiIY3+vaPcQXf6sZ */ /* Kz5C3GeO6lE98NZW1OcoLevTsbV15x8GZY2UKdPZ7Gnf2ZCHRgB720RBidx8ald6 */ /* 8Dd5n12sy+iEZLRS8nZH92GDGd1ftFQLIWhuNyG7QKxfst5Kfc71ORJn7w6lY2zk */ /* psUdzTYNXNXmG6jBZHRAp8ByxbpOH7G1WE15/tePc5OsLDnipUjW8LAxE6lXKZYn */ /* LvWHpo9OdhVVJnCYJn+gGkcgQ+NDY4B7dW4nJZCYOjgRs/b2nuY7W+yB3iIU2YIq */ /* x5K/oN7jPqJz+ucfWmyU8lKVEStYdEAoq3NDzt9KoRxrOMUp88qqlnNCaJ+2RrOd */ /* OqPVA+C/8KI8ykLcGEh/FDTP0kyr75s9/g64ZCr6dSgkQe1CvwWcZklSUPRR8zZJ */ /* TYsg0ixXNXkrqPNFYLwjjVj33GHek/45wPmyMKVM1+mYSlg+0wOI/rOP015LdhJR */ /* k8mMDDtbiiKowSYI+RQQEgN9XyO7ZONj4KbhPvbCdLI/Hgl27KtdRnXiYKNYCQEo */ /* AA6EVO7O6V3IXjASvUaetdN2udIOa5kM0jO0zbECAwEAAaOCAV0wggFZMBIGA1Ud */ /* EwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFLoW2W1NhS9zKXaaL3WMaiCPnshvMB8G */ /* A1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIBhjAT */ /* BgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUHMAGG */ /* GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDovL2Nh */ /* Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQwQwYD */ /* VR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0 */ /* VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9 */ /* bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQB9WY7Ak7ZvmKlEIgF+ZtbYIULhsBguEE0T */ /* zzBTzr8Y+8dQXeJLKftwig2qKWn8acHPHQfpPmDI2AvlXFvXbYf6hCAlNDFnzbYS */ /* lm/EUExiHQwIgqgWvalWzxVzjQEiJc6VaT9Hd/tydBTX/6tPiix6q4XNQ1/tYLaq */ /* T5Fmniye4Iqs5f2MvGQmh2ySvZ180HAKfO+ovHVPulr3qRCyXen/KFSJ8NWKcXZl */ /* 2szwcqMj+sAngkSumScbqyQeJsG33irr9p6xeZmBo1aGqwpFyd/EjaDnmPv7pp1y */ /* r8THwcFqcdnGE4AJxLafzYeHJLtPo0m5d2aR8XKc6UsCUqc3fpNTrDsdCEkPlM05 */ /* et3/JWOZJyw9P2un8WbDQc1PtkCbISFA0LcTJM3cHXg65J6t5TRxktcma+Q4c6um */ /* AU+9Pzt4rUyt+8SVe+0KXzM5h0F4ejjpnOHdI/0dKNPH+ejxmF/7K9h+8kaddSwe */ /* Jywm228Vex4Ziza4k9Tm8heZWcpw8De/mADfIBZPJ/tgZxahZrrdVcA6KYawmKAr */ /* 7ZVBtzrVFZgxtGIJDwq9gdkT/r+k0fNX2bwE+oLeMt8EifAAzV3C+dAjfwAL5HYC */ /* JtnwZXZCpimHCUcr5n8apIUP/JiW9lVUKx+A+sDyDivl1vupL0QVSucTDh3bNzga */ /* oSv27dZ8/DCCBY0wggR1oAMCAQICEA6bGI750C3n79tQ4ghAGFowDQYJKoZIhvcN */ /* AQEMBQAwZTELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcG */ /* A1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEkMCIGA1UEAxMbRGlnaUNlcnQgQXNzdXJl */ /* ZCBJRCBSb290IENBMB4XDTIyMDgwMTAwMDAwMFoXDTMxMTEwOTIzNTk1OVowYjEL */ /* MAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3 */ /* LmRpZ2ljZXJ0LmNvbTEhMB8GA1UEAxMYRGlnaUNlcnQgVHJ1c3RlZCBSb290IEc0 */ /* MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAv+aQc2jeu+RdSjwwIjBp */ /* M+zCpyUuySE98orYWcLhKac9WKt2ms2uexuEDcQwH/MbpDgW61bGl20dq7J58soR */ /* 0uRf1gU8Ug9SH8aeFaV+vp+pVxZZVXKvaJNwwrK6dZlqczKU0RBEEC7fgvMHhOZ0 */ /* O21x4i0MG+4g1ckgHWMpLc7sXk7Ik/ghYZs06wXGXuxbGrzryc/NrDRAX7F6Zu53 */ /* yEioZldXn1RYjgwrt0+nMNlW7sp7XeOtyU9e5TXnMcvak17cjo+A2raRmECQecN4 */ /* x7axxLVqGDgDEI3Y1DekLgV9iPWCPhCRcKtVgkEy19sEcypukQF8IUzUvK4bA3Vd */ /* eGbZOjFEmjNAvwjXWkmkwuapoGfdpCe8oU85tRFYF/ckXEaPZPfBaYh2mHY9WV1C */ /* doeJl2l6SPDgohIbZpp0yt5LHucOY67m1O+SkjqePdwA5EUlibaaRBkrfsCUtNJh */ /* besz2cXfSwQAzH0clcOP9yGyshG3u3/y1YxwLEFgqrFjGESVGnZifvaAsPvoZKYz */ /* 0YkH4b235kOkGLimdwHhD5QMIR2yVCkliWzlDlJRR3S+Jqy2QXXeeqxfjT/JvNNB */ /* ERJb5RBQ6zHFynIWIgnffEx1P2PsIV/EIFFrb7GrhotPwtZFX50g/KEexcCPorF+ */ /* CiaZ9eRpL5gdLfXZqbId5RsCAwEAAaOCATowggE2MA8GA1UdEwEB/wQFMAMBAf8w */ /* HQYDVR0OBBYEFOzX44LScV1kTN8uZz/nupiuHA9PMB8GA1UdIwQYMBaAFEXroq/0 */ /* ksuCMS1Ri6enIZ3zbcgPMA4GA1UdDwEB/wQEAwIBhjB5BggrBgEFBQcBAQRtMGsw */ /* JAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBDBggrBgEFBQcw */ /* AoY3aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElE */ /* Um9vdENBLmNydDBFBgNVHR8EPjA8MDqgOKA2hjRodHRwOi8vY3JsMy5kaWdpY2Vy */ /* dC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3JsMBEGA1UdIAQKMAgwBgYE */ /* VR0gADANBgkqhkiG9w0BAQwFAAOCAQEAcKC/Q1xV5zhfoKN0Gz22Ftf3v1cHvZqs */ /* oYcs7IVeqRq7IviHGmlUIu2kiHdtvRoU9BNKei8ttzjv9P+Aufih9/Jy3iS8UgPI */ /* TtAq3votVs/59PesMHqai7Je1M/RQ0SbQyHrlnKhSLSZy51PpwYDE3cnRNTnf+hZ */ /* qPC/Lwum6fI0POz3A8eHqNJMQBk1RmppVLC4oVaO7KTVPeix3P0c2PR3WlxUjG/v */ /* oVA9/HYJaISfb8rbII01YBwCA8sgsKxYoA5AY8WYIsGyWfVVa88nq2x2zm8jLfR+ */ /* cWojayL/ErhULSd+2DrZ8LaHlv1b0VysGMNNn3O3AamfV6peKOK5lDGCA3YwggNy */ /* AgEBMHcwYzELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMTsw */ /* OQYDVQQDEzJEaWdpQ2VydCBUcnVzdGVkIEc0IFJTQTQwOTYgU0hBMjU2IFRpbWVT */ /* dGFtcGluZyBDQQIQBUSv85SdCDmmv9s/X+VhFjANBglghkgBZQMEAgEFAKCB0TAa */ /* BgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkFMQ8XDTI0MDky */ /* MDA3MDEyNVowKwYLKoZIhvcNAQkQAgwxHDAaMBgwFgQUZvArMsLCyQ+CXc6qisnG */ /* Txmcz0AwLwYJKoZIhvcNAQkEMSIEIEBRDchhHSXH1Ea5ProamxykhukHRtCQfhVK */ /* sxEbETLlMDcGCyqGSIb3DQEJEAIvMSgwJjAkMCIEINL25G3tdCLM0dRAV2hBNm+C */ /* itpVmq4zFq9NGprUDHgoMA0GCSqGSIb3DQEBAQUABIICABr5kuHuv33fyjRfVdZe */ /* ZkaNvOI/uQ27E1ZeYsdtsrCnnrisQh5dfahWG5Ym6ekk4VUdbQrHfegbyR3VkDmL */ /* DNTn0H2kz3NM/LkLTuqmqTexfkHJAMaNa/Rq+kErag3jTZt2AyhJxL8mqwB7VunW */ /* ao476OAsSuUBqR4NOpI0EoGoOO1zUdN+dyHLhKesomAj16rL14Pdw5EIXaTBLimK */ /* 3XDFiqFe/aVFmEtlf/PRlaHKBYUXNOC/NHFg0RZlhXzU4Aberbvq66iePtvnUMub */ /* 9aM1ebxa1BcTlRMcqItA9Kld+ig6dNRIeSLXhm3H0rWFlyJ9JJNs4amWyi21hkjp */ /* DCLaSOasr99b7uZLgR4IPqXL367WjQupMo8LvlrVKrm+NAfj/sEZkJwwAx41d8xn */ /* 1eXwtFLjiSuAtoqlgHiyfXQNtZby93zn37vOYVtqd7wtzNE5DeSC/3v0D/KyI/DI */ /* IIy1Tf46PuhTavjy0zm3YyzoiGN0S36VPAgDnqInejqJG1iS4+50XvMy0qHxCIiU */ /* T0A4wCxbBUwEShp/WjDimopen73H2lHlXz3W8nv81LDVxW2yW6SaJEfikBGznt49 */ /* LyYAjUg4BeDU9TyoiRYg+2FBEfURfsqCsgJTJTV92zrIHKToLS+SifTvVVy7KBDz */ /* ckm5jBtd4pnol/CwnwVpfpsU */ /* SIG # End signature block */
combined_dataset/train/non-malicious/1c3a8f71-b8a5-455c-bc04-31657019f3d5.ps1
1c3a8f71-b8a5-455c-bc04-31657019f3d5.ps1
#Params is file or folder param([string] $PSUnitTestFile, [string] $Category ="All", [switch] $ShowReportInBrowser) Write-Debug "PSUnit.Run.ps1: Parameter `$PSUnitTestFile=`"$PSUnitTestFile`"" Write-Debug "PSUnit.Run.ps1: Parameter `$Category=`"$Category`"" #Don't run the script with an empty path to test file if ([String]::IsNullOrEmpty($PSUnitTestFile)) { Throw "The `$PSUnitTestFile parameter is required!" } #Make sure the test file exists if( ! (Test-Path -Path $PSUnitTestFile) ) { Throw "`$PSUnitTestFile: $PSUnitTestFile is not a valid file!" } #This is there to prevent this script from running itself as a test $PSUnitTestFileInfo = Get-Item -Path $PSUnitTestFile if ($PSUnitTestFileInfo.Name -eq "PSUnit.Run.ps1") { Throw "This script can't run itself as a test!" } #Data Model for the test result report $TestEnvironment = @{} $TestStatistics = @{} $TestResults = New-Object -TypeName "System.Collections.ArrayList" $Statistics = @{} $TestStartTime = [DateTime]::Now $TestEndTime = [DateTime]::Now #Deleting test functions from global scope $TestFunctions = Get-Item function:Test.* If ($TestFunctions) { Write-Debug "PSUnit.Run.ps1: Deleting test functions from global scope!" $TestFunctions | Remove-Item } #Loading test functions into global scope $ScriptLines = Get-Content -Path $PSUnitTestFile -Encoding "UTF8" $ScriptText = [String]::Join("`n`r", $ScriptLines) Invoke-Expression $ScriptText #Make sure that the $PSTestScript has tests defined if (! (Test-Path -Path function:Test.*)) { Throw "Script `"$PSUnitTestFile`" doesn't have any test functions defined!" } #Get all Test. functions. This will get every function in global scope, even the ones that we didn't explicitly load $TestFunctions = Get-Item function:Test.* function Execute-Test([System.Management.Automation.FunctionInfo] $Test) { Try { Write-Debug "Execute-Test: Executing: $($Test.Name)" & $Test } Catch { Write-Debug "Execute-Test: Caught exception: $($_.Exception.GetType().FullName)" Throw $_ } } function Report-TestResult([System.Management.Automation.FunctionInfo] $Test, [string] $Result, [System.Management.Automation.ErrorRecord] $Reason) { #Creating test results object collection $TestResult = New-Object -TypeName "System.Management.Automation.PSObject" $TestResult = Add-Member -passthru -InputObject $TestResult -MemberType NoteProperty -Name "Test" -Value $Test $TestResult = Add-Member -passthru -InputObject $TestResult -MemberType NoteProperty -Name "Result" -Value $Result $TestResult = Add-Member -passthru -InputObject $TestResult -MemberType NoteProperty -Name "Reason" -Value $Reason $null = $TestResults.Add($TestResult); #Writing Console output if($Test.Name.Length -ge 99) { $TestNameString = $Test.Name.Substring(0, 95) + "..." } else { $TestNameString = $Test.Name } switch ($Result) { "PASS" { Write-Host "$($TestNameString.PadRight(100, ' '))" -foregroundcolor "blue" -backgroundcolor "white" -nonewline Write-Host "PASS" -foregroundcolor "black" -backgroundcolor "green" -nonewline Write-Host $(" N/A".PadRight(100, ' ')) -foregroundcolor "blue" -backgroundcolor "white" } "FAIL" { if($Reason.ToString().Length -ge 99) { $ReasonString = $Reason.ToString().Substring(0, 95) + "..." } else { $ReasonString = $Reason.ToString() } Write-Host "$($TestNameString.PadRight(100, ' '))" -foregroundcolor "blue" -backgroundcolor "white" -nonewline Write-Host "FAIL" -foregroundcolor "white" -backgroundcolor "red" -nonewline Write-Host $(" $ReasonString".PadRight(100, ' ')) -foregroundcolor "red" -backgroundcolor "white" } "SKIP" { Write-Host "$($TestNameString.PadRight(100, ' '))" -foregroundcolor "blue" -backgroundcolor "white" -nonewline Write-Host "SKIP" -foregroundcolor "black" -backgroundcolor "yellow" -nonewline Write-Host $(" N/A".PadRight(100, ' ')) -foregroundcolor "blue" -backgroundcolor "white" } } } function Get-ExpectedExceptionTypeName([System.Management.Automation.FunctionInfo] $Test) { $ExpectedExceptionTypeName = "ExpectedException Parameter is not defined in function $($Test.Name)" $ExpectedExceptionParameter = $Test.Parameters["ExpectedException"] if( $ExpectedExceptionParameter -ne $Null) { $ExpectedExceptionTypeName = $ExpectedExceptionParameter.ParameterType.FullName } else { Write-Debug "Get-ExpectedExceptionTypeName: $($Test.Name) doesn't use ExpectedException parameter" } return $ExpectedExceptionTypeName } function Get-TestFunctionCategory([System.Management.Automation.FunctionInfo] $Test) { $TestFunctionCategory = "All" $Test.Parameters.GetEnumerator() | ForEach-Object ` { if($_.Key -match '^Category_(?<CATEGORY>.*)$') { $TestFunctionCategory = $Matches["CATEGORY"] } } Write-Debug "Get-TestFunctionCategory: Found Category=`"$TestFunctionCategory`"" return $TestFunctionCategory } function Get-TestFunctionSkip([System.Management.Automation.FunctionInfo] $Test) { $IsSkipSet = $false $SkipParameter = $Test.Parameters["Skip"] if( $SkipParameter -ne $Null) { $IsSkipSet = $true Write-Debug "Get-TestFunctionSkip: $($Test.Name) uses Skip parameter" } else { Write-Debug "Get-TestFunctionSkip: $($Test.Name) doesn't use Skip parameter" } return $IsSkipSet } if ($TestFunctions -eq $Null) { Write-Error "No function that starts with test.* was found in function: drive. Make sure that $PSUnitTestFile is in the correct path." } else { $TestStartTime = [DateTime]::Now #Execute each function $TestFunctions | ForEach-Object ` { $CurrentFunction = $_ $ExpectedExceptionTypeName = Get-ExpectedExceptionTypeName -Test $CurrentFunction $TestFunctionCategory = Get-TestFunctionCategory -Test $CurrentFunction $TestFunctionSkip = Get-TestFunctionSkip -Test $CurrentFunction if ($TestFunctionSkip) { Report-TestResult -Test $CurrentFunction -Result "SKIP" return } if (($TestFunctionCategory -ne $Category) -and ($Category -ne "All")) { Write-Debug "PSUnit.Run.ps1: Not running `"$($CurrentFunction.Name)`". Its category is `"$TestFunctionCategory`", but the required category is `"$Category`"" return } Try { $FunctionOutput = Execute-Test $_ Report-TestResult -Test $CurrentFunction -Result "PASS" } Catch { $ActualExceptionTypeName = $_.Exception.GetType().FullName Write-Debug "PSUnit.Run.ps1: Execution of `"$CurrentFunction`" caused following Exception `"$($_.Exception.GetType().FullName)`"" Write-Debug "PSUnit.Run.ps1: ExpectedException = `"$ExpectedExceptionTypeName`"" if ($ActualExceptionTypeName -eq $ExpectedExceptionTypeName) { Report-TestResult -Test $CurrentFunction -Result "PASS" } else { Report-TestResult -Test $CurrentFunction -Result "FAIL" -Reason $_ } } } $TestEndTime = [DateTime]::Now } function Get-TestResultStatistics([System.Collections.ArrayList] $Results) { $Stats = @{} $Stats["Total"] =0 $Stats["Passed"] = 0 $Stats["Failed"] = 0 $Stats["Skipped"] = 0 if(!$Results -or $Results.Count -eq 0) { return $Stats } $Stats["Total"] = $Results.Count $Results | Foreach-Object ` { switch ( $_.Result ) { "PASS" {$Stats["Passed"]++} "FAIL" {$Stats["Failed"]++} "SKIP" {$Stats["Skipped"]++} } } return $Stats } function Get-TestReportFileName([System.Collections.HashTable] $EnvironmentData, [System.Collections.HashTable] $Stats ) { $StatsTotal = 0 $StatsPassed = 0 $StatsFailed = 0 $StatsSkipped = 0 If($Stats.Total) {$StatsTotal = $Stats.Total} If($Stats.Passed) {$StatsPassed = $Stats.Passed} If($Stats.Failed) {$StatsFailed = $Stats.Failed} If($Stats.Skipped) {$StatsSkipped = $Stats.Skipped} $StatsFileNamePart = "T{0}P{1}F{2}S{3}" -f $StatsTotal, $StatsPassed, $StatsFailed, $StatsSkipped $StartDateString = $EnvironmentData.StartTime.ToString("yyyy-MM-dd-HH-mm-ss") $TestFile = dir $($EnvironmentData.TestFilename) $FileName = $TestFile.Name $TestReportFileName = "PSUnitTestReport_{0}_{1}_{2}.html" -f $FileName, $StartDateString, $StatsFileNamePart Write-Debug "Get-TestReportFileName: `$TestReportFileName = $TestReportFileName" return $TestReportFileName } function Get-TestReportTitleAsHtml([System.Collections.HashTable] $EnvironmentData) { $TestReportTitle = "PSUnit Test Report - {0} - {1}" -f $EnvironmentData.TestFilename, $EnvironmentData.StartTime $TestReportTitle = Encode-Html -StringToEncode $TestReportTitle return $TestReportTitle } function Compile-TestResultReport() { $TestFile = dir $PSUnitTestFile $TestEnvironment["TestFileName"] = $TestFile.FullName $TestEnvironment["SourceCodeRevision"] = "Not yet implemeted!" $TestEnvironment["Category"] = $Category $TestEnvironment["StartTime"] = $TestEndTime $TestEnvironment["EndTime"] = $TestEndTime $TestEnvironment["Duration"] = ($TestEnvironment.EndTime - $TestEnvironment.StartTime).TotalSeconds $TestEnvironment["UserName"] = $env:username $TestEnvironment["MachineName"] = $env:computername $TestEnvironment["PowerShellVersion"] = $host.version.ToString() $OSProperties = get-wmiobject -class "Win32_OperatingSystem" -namespace "root\\CIMV2" -computername $env:computername $OperatingSystem = "{0} {1} Build {2}" -f $OSProperties.Caption, $OSProperties.CSDVersion, $OSProperties.BuildNumber $TestEnvironment["OperatingSystem"] = $OperatingSystem $Statistics = Get-TestResultStatistics -Results $TestResults $TestReportFileName = Get-TestReportFileName -EnvironmentData $TestEnvironment -Stats $Statistics $TestEnvironment["TestReportFileName"] = $TestReportFileName $TestReportTitle = Get-TestReportTitleAsHtml -EnvironmentData $TestEnvironment $TestEnvironment["TestReportTitle"] = $TestReportTitle $ReportHtml = Render-TestResultReport -Results $TestResults -HeaderData $TestEnvironment -Statistics $Statistics #Get PSUNIT_HOME folder $PSUnitHome = dir env:PSUNIT_HOME Write-Debug "PSUNIT_HOME: $PSUnitHome" $TestReportFile = Join-Path -Path $($PSUnitHome.Value) -ChildPath $TestReportFileName #Save report as file in PSUnit Home folder $ReportHtml > $TestReportFile if ($ShowReportInBrowser) {#Open Report File & ($TestReportFile) } } Compile-TestResultReport
combined_dataset/train/non-malicious/Get-MailAttachment.ps1
Get-MailAttachment.ps1
param([Microsoft.Exchange.WebServices.Data.FileAttachment]$attachment) "Downloading Attachment" $attachment.Load() "Done" $path = "C:\\temp\\"+$attachment.Name "Writing to $path" set-content -value $mm[1].Attachments[0].Content -enc byte -path $path "Done" ii $path
combined_dataset/train/non-malicious/3272.ps1
3272.ps1
class BotConfiguration { [string]$Name = 'PoshBot' [string]$ConfigurationDirectory = $script:defaultPoshBotDir [string]$LogDirectory = $script:defaultPoshBotDir [string]$PluginDirectory = $script:defaultPoshBotDir [string[]]$PluginRepository = @('PSGallery') [string[]]$ModuleManifestsToLoad = @() [LogLevel]$LogLevel = [LogLevel]::Verbose [int]$MaxLogSizeMB = 10 [int]$MaxLogsToKeep = 5 [bool]$LogCommandHistory = $true [int]$CommandHistoryMaxLogSizeMB = 10 [int]$CommandHistoryMaxLogsToKeep = 5 [hashtable]$BackendConfiguration = @{} [hashtable]$PluginConfiguration = @{} [string[]]$BotAdmins = @() [char]$CommandPrefix = '!' [string[]]$AlternateCommandPrefixes = @('poshbot') [char[]]$AlternateCommandPrefixSeperators = @(':', ',', ';') [string[]]$SendCommandResponseToPrivate = @() [bool]$MuteUnknownCommand = $false [bool]$AddCommandReactions = $true [bool]$DisallowDMs = $false [int]$FormatEnumerationLimitOverride = -1 [ChannelRule[]]$ChannelRules = @([ChannelRule]::new()) [ApprovalConfiguration]$ApprovalConfiguration = [ApprovalConfiguration]::new() [MiddlewareConfiguration]$MiddlewareConfiguration = [MiddlewareConfiguration]::new() [BotConfiguration] SerializeInstance([PSObject]$DeserializedObject) { return [BotConfiguration]::Serialize($DeserializedObject) } [hashtable] ToHash() { $propertyNames = $this | Get-Member -MemberType Property | Select-Object -ExpandProperty Name $hash = @{} foreach ($property in $propertyNames) { if ($this.$property | Get-Member -MemberType Method -Name ToHash) { $hash.$property = $this.$property.ToHash() } else { $hash.$property = $this.$property } } return $hash } [BotConfiguration] Serialize([hashtable]$Hash) { $propertyNames = $this | Get-Member -MemberType Property | Select-Object -ExpandProperty Name $bc = [BotConfiguration]::new() foreach ($key in $Hash.keys) { if ($key -in $propertyNames) { $bc.Name = $hash.Name $bc.ConfigurationDirectory = $hash.ConfigurationDirectory $bc.LogDirectory = $hash.LogDirectory $bc.PluginDirectory = $hash.PluginDirectory $bc.PluginRepository = $hash.PluginRepository $bc.ModuleManifestsToLoad = $hash.ModuleManifestsToLoad $bc.LogLevel = $hash.LogLevel $bc.MaxLogSizeMB = $hash.MaxLogSizeMB $bc.MaxLogsToKeep = $hash.MaxLogsToKeep $bc.LogCommandHistory = $hash.LogCommandHistory $bc.CommandHistoryMaxLogSizeMB = $hash.CommandHistoryMaxLogSizeMB $bc.CommandHistoryMaxLogsToKeep = $hash.CommandHistoryMaxLogsToKeep $bc.BackendConfiguration = $hash.BackendConfiguration $bc.PluginConfiguration = $hash.PluginConfiguration $bc.BotAdmins = $hash.BotAdmins $bc.CommandPrefix = $hash.CommandPrefix $bc.AlternateCommandPrefixes = $hash.AlternateCommandPrefixes $bc.AlternateCommandPrefixSeperators = $hash.AlternateCommandPrefixSeperators $bc.SendCommandResponseToPrivate = $hash.SendCommandResponseToPrivate $bc.MuteUnknownCommand = $hash.MuteUnknownCommand $bc.AddCommandReactions = $hash.AddCommandReactions $bc.DisallowDMs = $hash.DisallowDMs $bc.FormatEnumerationLimitOverride = $hash.FormatEnumerationLimitOverride $bc.ChannelRules = $hash.ChannelRules.ForEach({[ChannelRule]::Serialize($_)}) $bc.ApprovalConfiguration = [ApprovalConfiguration]::Serialize($hash.ApprovalConfiguration) $bc.MiddlewareConfiguration = [MiddlewareConfiguration]::Serialize($hash.MiddlewareConfiguration) } else { throw "Hash key [$key] is not a property in BotConfiguration" } } return $bc } static [BotConfiguration] Serialize([PSObject]$DeserializedObject) { $bc = [BotConfiguration]::new() $bc.Name = $DeserializedObject.Name $bc.ConfigurationDirectory = $DeserializedObject.ConfigurationDirectory $bc.LogDirectory = $DeserializedObject.LogDirectory $bc.PluginDirectory = $DeserializedObject.PluginDirectory $bc.PluginRepository = $DeserializedObject.PluginRepository $bc.ModuleManifestsToLoad = $DeserializedObject.ModuleManifestsToLoad $bc.LogLevel = $DeserializedObject.LogLevel $bc.MaxLogSizeMB = $DeserializedObject.MaxLogSizeMB $bc.MaxLogsToKeep = $DeserializedObject.MaxLogsToKeep $bc.LogCommandHistory = $DeserializedObject.LogCommandHistory $bc.CommandHistoryMaxLogSizeMB = $DeserializedObject.CommandHistoryMaxLogSizeMB $bc.CommandHistoryMaxLogsToKeep = $DeserializedObject.CommandHistoryMaxLogsToKeep $bc.BackendConfiguration = $DeserializedObject.BackendConfiguration $bc.PluginConfiguration = $DeserializedObject.PluginConfiguration $bc.BotAdmins = $DeserializedObject.BotAdmins $bc.CommandPrefix = $DeserializedObject.CommandPrefix $bc.AlternateCommandPrefixes = $DeserializedObject.AlternateCommandPrefixes $bc.AlternateCommandPrefixSeperators = $DeserializedObject.AlternateCommandPrefixSeperators $bc.SendCommandResponseToPrivate = $DeserializedObject.SendCommandResponseToPrivate $bc.MuteUnknownCommand = $DeserializedObject.MuteUnknownCommand $bc.AddCommandReactions = $DeserializedObject.AddCommandReactions $bc.DisallowDMs = $DeserializedObject.DisallowDMs $bc.FormatEnumerationLimitOverride = $DeserializedObject.FormatEnumerationLimitOverride $bc.ChannelRules = $DeserializedObject.ChannelRules.Foreach({[ChannelRule]::Serialize($_)}) $bc.ApprovalConfiguration = [ApprovalConfiguration]::Serialize($DeserializedObject.ApprovalConfiguration) $bc.MiddlewareConfiguration = [MiddlewareConfiguration]::Serialize($DeserializedObject.MiddlewareConfiguration) return $bc } }
combined_dataset/train/non-malicious/2861.ps1
2861.ps1
function Invoke-Task { [CmdletBinding()] param( [Parameter(Mandatory = $true)] [string]$taskName ) Assert $taskName ($msgs.error_invalid_task_name) $taskKey = $taskName.ToLower() $currentContext = $psake.context.Peek() if ($currentContext.aliases.Contains($taskKey)) { $taskName = $currentContext.aliases.$taskKey.Name $taskKey = $taskName.ToLower() } Assert ($currentContext.tasks.Contains($taskKey)) ($msgs.error_task_name_does_not_exist -f $taskName) if ($currentContext.executedTasks.Contains($taskKey)) { return } Assert (!$currentContext.callStack.Contains($taskKey)) ($msgs.error_circular_reference -f $taskName) $currentContext.callStack.Push($taskKey) $task = $currentContext.tasks.$taskKey $precondition_is_valid = & $task.Precondition if (!$precondition_is_valid) { WriteColoredOutput ($msgs.precondition_was_false -f $taskName) -foregroundcolor Cyan } else { if ($taskKey -ne 'default') { if ($task.PreAction -or $task.PostAction) { Assert ($null -ne $task.Action) ($msgs.error_missing_action_parameter -f $taskName) } if ($task.Action) { $stopwatch = new-object System.Diagnostics.Stopwatch try { foreach($childTask in $task.DependsOn) { Invoke-Task $childTask } $stopwatch.Start() $currentContext.currentTaskName = $taskName try { & $currentContext.taskSetupScriptBlock @($task) try { if ($task.PreAction) { & $task.PreAction } if ($currentContext.config.taskNameFormat -is [ScriptBlock]) { $taskHeader = & $currentContext.config.taskNameFormat $taskName } else { $taskHeader = $currentContext.config.taskNameFormat -f $taskName } WriteColoredOutput $taskHeader -foregroundcolor Cyan foreach ($variable in $task.requiredVariables) { Assert ((Test-Path "variable:$variable") -and ($null -ne (Get-Variable $variable).Value)) ($msgs.required_variable_not_set -f $variable, $taskName) } & $task.Action } finally { if ($task.PostAction) { & $task.PostAction } } } catch { $task.Success = $false $task.ErrorMessage = $_ $task.ErrorDetail = $_ | Out-String $task.ErrorFormatted = FormatErrorMessage $_ throw $_ } finally { & $currentContext.taskTearDownScriptBlock $task } } catch { if ($task.ContinueOnError) { "-"*70 WriteColoredOutput ($msgs.continue_on_error -f $taskName,$_) -foregroundcolor Yellow "-"*70 [void]$currentContext.callStack.Pop() } else { throw $_ } } finally { $task.Duration = $stopwatch.Elapsed } } else { foreach($childTask in $task.DependsOn) { Invoke-Task $childTask } } } else { foreach($childTask in $task.DependsOn) { Invoke-Task $childTask } } Assert (& $task.Postcondition) ($msgs.postcondition_failed -f $taskName) } $poppedTaskKey = $currentContext.callStack.Pop() Assert ($poppedTaskKey -eq $taskKey) ($msgs.error_corrupt_callstack -f $taskKey,$poppedTaskKey) $currentContext.executedTasks.Push($taskKey) }
combined_dataset/train/non-malicious/sample_40_64.ps1
sample_40_64.ps1
# ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Regenerates an access key for a Redis Enterprise database. .Description Regenerates an access key for a Redis Enterprise database. .Example PS C:\> New-AzRedisEnterpriseCacheKey -Name "MyCache" -ResourceGroupName "MyGroup" -KeyType "Primary" PrimaryKey SecondaryKey ---------- ------------ new-primary-key secondary-key .Example PS C:\> New-AzRedisEnterpriseCacheKey -Name "MyCache" -ResourceGroupName "MyGroup" -KeyType "Secondary" PrimaryKey SecondaryKey ---------- ------------ primary-key new-secondary-key .Outputs Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Models.Api20230301Preview.IAccessKeys .Link https://learn.microsoft.com/powershell/module/az.redisenterprisecache/new-azredisenterprisecachekey #> function New-AzRedisEnterpriseCacheKey { [Alias('New-AzRedisEnterpriseCacheDatabaseKey', 'New-AzRedisEnterpriseCacheAccessKey')] [OutputType([Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Models.Api20230301Preview.IAccessKeys])] [CmdletBinding(DefaultParameterSetName='RegenerateExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] param( [Parameter(Mandatory)] [Alias('Name')] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Path')] [System.String] # The name of the Redis Enterprise cluster. ${ClusterName}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Path')] [System.String] # The name of the resource group. # The name is case insensitive. ${ResourceGroupName}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] [System.String] # The ID of the target subscription. ${SubscriptionId}, [Parameter(Mandatory)] [ArgumentCompleter([Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Support.AccessKeyType])] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Support.AccessKeyType] # Which access key to regenerate. ${KeyType}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command as a job ${AsJob}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Run the command asynchronously ${NoWait}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.RedisEnterpriseCache.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { $null = $PSBoundParameters.Add("DatabaseName", "default") Az.RedisEnterpriseCache.internal\New-AzRedisEnterpriseCacheKey @PSBoundParameters } } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDuL+IXizJgr/gy # VBQ+4ZRMqNHyi0b7OGSpoHC2lJTXwaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIG9R0yKbeuZH9MXJzWEe5DzO # WVOf2VD/mvqZf3uS29WqMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAYAG7zctAuzNsFfnoJYw6fda7sBnlgk8Q8HbMRhNad4CV3E5iax2GYFxE # UgegilL1z77MWnSx5heRqJUSQxiueDw7aoH5VmhYK6K2QN+b8xkDmdDeizVJpvHU # ky/qg+5DDVfTqRdPPYIhfhk0kMQM4IUkiHi6osf4BIapm6Xf4YUpFZqMGYbIopA+ # upw9uOiTGp2rRngb+s2Q9Pt0FWm1552k8oPba1KDWgr/wd0ZEaT7fCVP3xqLMU3y # wKw6siRac9IDvgCITL2SA2q5B8SGbxT+3bqPcI19egYVBTfhIHvYRRGmzCz77Xr9 # jKQ1d99gGt4mzZUAOrZ5mMWAcp7deaGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCNGVEQ/3Dm+2MvNRcaq9U6pN+p3iUGestR/Ti8c8hoSAIGZhfNGBDz # GBMyMDI0MDQyMzEzMTUxMi4xNThaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w # M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgABAAAB6TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yrAPJnV6A7aZYnTw/yx90u # 1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZY5O8PCBu7Gq+x5Xe6plQ # t4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7LMpKwIKQMwXDctYKvCyQy # 6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5MxylRdTS7E1Jocl30NgcBi # JfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9dxsyvng0lUVY+urq/G8QR # FoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTpw2I6ZWaIhPwMu5DvdkEG # zV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0VJBSGV+h66ZcaUJOxpbS # IjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDCxHG4mW3mpNQopM/U1WJn # jssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOamGfwvkIe7dkylzm8BeAU # QC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKFI30u9YlxDTzAuLDK073c # ndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022+yPwclmykssk30a4Rp3v # 9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYjuIj0Wuv+jcjtB+xOMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe61AE90Ken2XPgQHJDiS4S # bLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz/HciZooyeoAvkHQaHmLh # wBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20QpHDEukwKR8kfaBEX83A # yvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQgeEBr8E4K2wQ2WXI/ZJxZ # S/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/JnjXMChnm9bLDD1waJ7TPp5 # wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6QjegHzndX/tZrY792dfR # AXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWGXYJL5H6LNnKyXJVEw/1F # bO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsHptAvREqCc+/YxzhIKkA8 # 8Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFvNRhh8ZBAenn1pW+5UBGY # z2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMlPG3YjuqFxidiIsoAw2+M # hI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2jJWgq7VlBuP1BuXjZ3qgy # m9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCr # aYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6dIcTDAiGA8yMDI0MDQyMzExMzg1 # MloYDzIwMjQwNDI0MTEzODUyWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp0hxM # AgEAMAoCAQACAghFAgH/MAcCAQACAhNpMAoCBQDp023MAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAK8eH3rZdn1zSVWz/62/4QXWc469a0821JsUCszUNQE7 # zofGTI2pXfcLRkid5HDMoyzHaxFyQd7BlB9RiWflQDCbmJDXi+gQvIkxjCTCRBlC # ur00RnLzUEmS1uJPOLOL/bOqar9Ef8dldb6m5FXynuOMavaqfurd40q4GBqB6frP # +NXQ2XPKm+yNQ9eFgWq4QfuetnD8+P6G4T+Mv6nxbUeZURvBPR5FA9fsJpjoKDc9 # w9ekBTznBDZfbQ5BcayMyUd+K0eOSstGOQ0kwrQkFJUjB+EDHoNJVO3T4Migd36w # R6XnZTD4GG7mwxX0i8EYxg0lKounpH1hw7E6P5VgX74xggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAekPcTB+XfESNgABAAAB # 6TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCB6RhFtX+dO/I6n3H5EHy3gTMKxqEOa6Hp0X5e6qNmx # iDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQkniXaTcmj1TKQWF+x2U4 # riVorGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQgfEHm2ExKtPF0slQuA53nCHBP # mRCZtnL9CXNnAqBr+34wDQYJKoZIhvcNAQELBQAEggIAo4E0l+WSXsa1pStuDz/e # iBURaUGeDfK69QzymWKchW0OYD8XxvHU4XGTgqUA/gDnF5/oBjcdqDVqWFvfM0UO # 5T4TqrlzbGVY2cAfzo8WcKZfE1275KCB2dadVveMjWRK0aBj/3AIoMai5zX7v318 # 8ZqmZv4SmcnkeJ1brKkysayXZ0g/MFUEnzdg8dKb5jMQBqMd18xt0wSloHt8FSuV # EtPL2tMVNF4WVE+PHOXg6COuDv0NhdVmRivku9A0NsKxiRtuWAi40v2kxDw7N1f2 # f/RshFq0zxRA4DT7T3u7nOLL2LJQEoRn8E0KnAH3eAE9man21r2BVgAwxRWY6SVA # SVgxXxFa65DahzatweVHW1ef3tIDbSVwi1hAzSz81LhggTQr0W5ZU80IXTu0ulAx # 2Z03Z879asyoXbkJOUDEBh0GpZSdRBNwZxaGzcbSdmxa4l6kiQguTOxtsHT/lcYJ # aq+q7/+FKF1Imz6+REc8gfBomCjuzcpSzUPOXxPEBseIS85XJgFcWm6+mNCLqqkE # j2lwvUkZkzUBDJoMyqXwCPhWzQBG97E/RtKO4QU1KJ5EChCb9bxI6x2Qt5UF08mW # VomiZ51BsHADDUaaMHc0LoEE/oNX9ZhJYUYUe4wqHdxV2iKX4XCv1pUDCn/1W1yx # oGwp7jSbU/4wWXfYdZN4uMM= # SIG # End signature block
combined_dataset/train/non-malicious/sample_47_77.ps1
sample_47_77.ps1
try { $ScriptsFolder = "$env:SystemDrive\CloudDeployment\Setup\Common" Set-Location -Path $ScriptsFolder Import-Module "$env:SystemDrive\CloudDeployment\Setup\Common\RegistrationHelpers.psm1" $registrationParameters = Get-RegistrationParametersFromEce Validate-GetAccessToken -TokenCacheCred $registrationParameters.RegistrationTokenCacheCred -ClientId $registrationParameters.RegistrationClientId -AzureEnvironment $registrationParameters.RegistrationCloudName -TenantId $registrationParameters.RegistrationTenantId } catch { Write-Error $_.Exception.message } # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDd4xtsO0OuxtJw # uFkF2DRD9uIL5gzi5gVACE3fntr+VqCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIML/ # dG/5dC7Ysht8Da5eVMfBAfr/3Zgr2z/DlY5etK+SMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAuSgJKr80yKaaWw+lDDZ58TuJH/3PHv/YhGUz # z5xQhoh+pXW3wJCakPLOvIqqwdtkY+t5IfLUNm1MC3r39BeDg8/6KRJ/irZSh0h6 # cWwo+i1Ny8YrYBwbWVEcDdO/uTNifr54847WcaDZOml1soilc2eQgb/ZJmI3Ez62 # ynLs/l4UKah0W4eLgyli2RfzFdT93e00X3qwIlTiQ8LVys+sUhKrJBkBZYl2o1d4 # iy3lAqaT9pdZsR5a3eACuf2BJPrTV3t1sMKJpw5C4DD6DcHArdAd0XsvLibqSWLu # fI/ZMjh39RVef5nBA3CTRHbMsGjiQPF4mp73Y4tVzKKcwf13BqGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBhsjbJbySYSLHJ0YqOgo3UXpdvPvKJxSnX # fGDQ0uD2rwIGZeen5BngGBMyMDI0MDMwODEwMDMxNy42NjZaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwAB # AAAB6jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rW # b2ksqaF65QtJkbQpmsc6G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T # 0KfylTulrzKtgxnxZh7q1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGo # n/4VDHnZhdas22svSC5GHywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB # +KHCy08ds36an7IcOGfRmhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjA # lsBBHD1TdGBucrGC3TQXSTp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1f # xYk2nY6SCKsV+VmtV5aiPzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEU # TBPXME/ia+t8jrT2y3ug15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM # 3HPVJJ19vOSvrCP9lsEcEwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp # 081X5RQ6HGVUz6ZdgQ0jcT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc # 9KHKTWfXpAVj1Syqt5X4nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8 # HUVMp+mAA4rXjOw42vkHfQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebp # F0BU1MTIcosFblleMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxV # bX3G37KgvyoNAnuu2w3HoWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI5 # 3kOWSaWCaV3xCznpRt3c4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqe # kZb4ivMR6LoPb5HNlq0WbBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8Cx # iAg2KlbPyMwBOPcr9hJT8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzE # GafPUwLmoETihOGLqIQlCpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3Qd # iNS8u9ujYh1B7NLr6t3IglfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2 # JG5BYu/XitRE8cdzaJmDVBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dix # UxE4qlfUPMixGr0Ft4/S0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi # 5auiqB6xQBADUf+F7hSKZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Q # bt45Cz/QMa7EmMGNn7a8MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5D # r5m3T4bDj9WTNLgP8SFe3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCJ2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6ZTJPjAi # GA8yMDI0MDMwNzIzMTYxNFoYDzIwMjQwMzA4MjMxNjE0WjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDplMk+AgEAMAcCAQACAiFwMAcCAQACAhPwMAoCBQDplhq+AgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAEcZqCgNi5wrNAaiwoKb+12iNpWP # koUm2/W5e3DhU8YMisoO5TdwKkGlVYpy6NmWHAzIbo9AB6w9iB3fxOmAVsowep66 # EyPeG0rOauJQIshVQ8HSz1NJL0V7g7c9WFssNMOEnHcUHF/4mn1o8GiWeO85Q+Tw # pf6fV+kQtVrXyf6wckmrGrCI4RWjX894KL+H6yUWtpl5ZWFPXbHvfeccpJkaJzgj # fB1Be4LA8C1Hms1OkgxPIestKpbDpVj7japBnbBosd1wvFkH0r1e5mJYqGJp8zSW # M5Vk/k7jG1BYy9MjY4KrZzQ1bkpzE07ROxjdWNdP8SzaDktQZrFrebnAonYxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqa # JHLVWT9hYwABAAAB6jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCBI0cnun95s7O81HUyzt6aG60Px # 0OLeWc7pWWjNUyVNBTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXj # ZDR4iwg0ltLANXBh5G1uKqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQgqE5KOWzg # bvK/SZFcAoEfJ2NR3UdSgbM2mODux/iF2+EwDQYJKoZIhvcNAQELBQAEggIATWh8 # wvnzRnCxJF+d7ctDLnf57aBUmsFAKveyvpPFCPSMIJIafgxY8WkyT6VRElCE8XNe # uBeQJXcLMbev/1NVRhFhpl6h15CEjbyxkNNaV8KgGrYSOEc2Ikj8UYey/KcJhuEr # 2V5JRSOYkMST9DtGX8SzFr/B+8q9Qy5zC4MdqcSWz+xqJ7BTSC2GMTH3n6jz5SAY # UCQuGsfufSRRuDiDLBt+BaBBf9Rb0XqZFOfmYsRYZW8v5Im3JvqTYYmSgqF15XwB # BwiVIq9Y0wiVQr+0DjkwTFNW+vuAMV5/HTsCpM0R0Ac6i0IBoIwpSl8554rKhAQt # 1tclVZE8ZIpeLsR1cAL1oRCUXxPL+Z6U2HptsrOgTY88q1i4+dQngkJvqqXtOyhg # L4kJIZe6cgw8NADZm0kyFp2jNwjlqOgrUrqHUkcUc+q6CL2LAStkxyKjxyNwHrHZ # FwiZ7D7F7ubY8JvL6+TCGsrd8x09lMlZ7tYM//GBs0W+C310bT/MXM+T2WrEM4fu # OdzMlCi/MePnbV2NyTOuSspkS7XcLfCE0jp9gU7AmOfeW0O1iQTUda0DqYt80L3n # dXmxIZaFB9EdF44EF3FwoutXV/YZ0vJ/uViZ5zzjRT4aikqSDtvAE198EVP7vQRT # P2XHp3kB2hmtsfGyHx9lJ3WjpzUTGuv/9v0xQ3U= # SIG # End signature block
combined_dataset/train/non-malicious/2801.ps1
2801.ps1
if (Get-Command logparser.exe) { $lpquery = @" SELECT COUNT(CommandLine) as Cnt, CommandLine, Hash FROM *ProcsWMI.tsv GROUP BY CommandLine, Hash ORDER BY Cnt ASC "@ & logparser -stats:off -i:csv -dtlines:0 -fixedsep:on -rtp:-1 "$lpquery" } else { $ScriptName = [System.IO.Path]::GetFileName($MyInvocation.ScriptName) "${ScriptName} requires logparser.exe in the path." }
combined_dataset/train/non-malicious/3194.ps1
3194.ps1
Function Wait-Path { [cmdletbinding()] param ( [string[]]$Path, [int]$Timeout = 5, [int]$Interval = 1, [switch]$Passthru ) $StartDate = Get-Date $First = $True Do { if($First -eq $True) { $First = $False } else { Start-Sleep -Seconds $Interval } [bool[]]$Tests = foreach($PathItem in $Path) { Try { if(Test-Path $PathItem -ErrorAction stop) { Write-Verbose "'$PathItem' exists" $True } else { Write-Verbose "Waiting for '$PathItem'" $False } } Catch { Write-Error "Error testing path '$PathItem': $_" $False } } $Return = $Tests -notcontains $False -and $Tests -contains $True if ( ((Get-Date) - $StartDate).TotalSeconds -gt $Timeout) { if( $Passthru ) { $False break } else { Throw "Timed out waiting for paths $($Path -join ", ")" } } elseif($Return) { if( $Passthru ) { $True } break } } Until( $False ) }
combined_dataset/train/non-malicious/sample_65_86.ps1
sample_65_86.ps1
# # Module manifest for module 'OCI.PSModules.Globallydistributeddatabase' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Globallydistributeddatabase.dll' # Version number of this module. ModuleVersion = '88.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '31a94d9b-5cc3-4808-88f0-6b82ed090ffe' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Globallydistributeddatabase Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '88.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Globallydistributeddatabase.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Confirm-OCIGloballydistributeddatabaseNetwork', 'Get-OCIGloballydistributeddatabasePrivateEndpoint', 'Get-OCIGloballydistributeddatabasePrivateEndpointsList', 'Get-OCIGloballydistributeddatabaseShardedDatabase', 'Get-OCIGloballydistributeddatabaseShardedDatabasesList', 'Get-OCIGloballydistributeddatabaseWorkRequest', 'Get-OCIGloballydistributeddatabaseWorkRequestErrorsList', 'Get-OCIGloballydistributeddatabaseWorkRequestLogsList', 'Get-OCIGloballydistributeddatabaseWorkRequestsList', 'Invoke-OCIGloballydistributeddatabaseConfigureShardedDatabaseGsms', 'Invoke-OCIGloballydistributeddatabaseConfigureSharding', 'Invoke-OCIGloballydistributeddatabaseDownloadGsmCertificateSigningRequest', 'Invoke-OCIGloballydistributeddatabaseFetchConnectionString', 'Invoke-OCIGloballydistributeddatabaseFetchShardableCloudAutonomousVmClusters', 'Invoke-OCIGloballydistributeddatabasePatchShardedDatabase', 'Invoke-OCIGloballydistributeddatabasePrevalidateShardedDatabase', 'Invoke-OCIGloballydistributeddatabaseReinstateProxyInstance', 'Move-OCIGloballydistributeddatabasePrivateEndpointCompartment', 'Move-OCIGloballydistributeddatabaseShardedDatabaseCompartment', 'New-OCIGloballydistributeddatabaseGsmCertificateSigningRequest', 'New-OCIGloballydistributeddatabasePrivateEndpoint', 'New-OCIGloballydistributeddatabaseShardedDatabase', 'New-OCIGloballydistributeddatabaseWallet', 'Remove-OCIGloballydistributeddatabasePrivateEndpoint', 'Remove-OCIGloballydistributeddatabaseShardedDatabase', 'Start-OCIGloballydistributeddatabaseShardedDatabase', 'Stop-OCIGloballydistributeddatabaseShardedDatabase', 'Update-OCIGloballydistributeddatabasePrivateEndpoint', 'Update-OCIGloballydistributeddatabaseShardedDatabase', 'Write-OCIGloballydistributeddatabaseSignedCertificateAndGenerateWallet' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Globallydistributeddatabase' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/Hostprofile Update GUI.ps1
Hostprofile Update GUI.ps1
################################################################################################################ # # Purpose: Host Profile Update # Author: David Chung # # Ver 1.0 - 09/22/2011 Initial Script # Ver 1.1 - 09/26/2011 Added Full GUI support (Primal Forms) # Ver 1.2 - 09/26/2011 Enabled User and Password Field # Added Login Fail-safe feature. # Added Compliance Check Only Box # Search for Powered On Hosts only # Windows Resize Disabled # Removed Progress Bar # Ver 1.3 - 09/28/2011 Added hosts in maintenace mode in cluster check # -stops host profile update if any host in the cluster is in mainteance mode prior to the update # Ver 1.4 09/29/2011 Added checks that if the cluster is not selected, the script does not proceed. # ################################################################################################################ #Generated Form Function function GenerateForm { #region Import the Assemblies [reflection.assembly]::loadwithpartialname("System.Drawing") | Out-Null [reflection.assembly]::loadwithpartialname("System.Windows.Forms") | Out-Null #endregion #region Generated Form Objects $form1 = New-Object System.Windows.Forms.Form $button4 = New-Object System.Windows.Forms.Button $groupBox3 = New-Object System.Windows.Forms.GroupBox $ComplianceBox1 = New-Object System.Windows.Forms.CheckBox $label4 = New-Object System.Windows.Forms.Label $ClusterName = New-Object System.Windows.Forms.ListBox $BeginButton = New-Object System.Windows.Forms.Button $CloseButton = New-Object System.Windows.Forms.Button $groupBox2 = New-Object System.Windows.Forms.GroupBox $ProgressLog = New-Object System.Windows.Forms.ListBox $groupBox1 = New-Object System.Windows.Forms.GroupBox $LoginButton = New-Object System.Windows.Forms.Button $Password = New-Object System.Windows.Forms.TextBox $User = New-Object System.Windows.Forms.TextBox $vCenter = New-Object System.Windows.Forms.TextBox $label3 = New-Object System.Windows.Forms.Label $label2 = New-Object System.Windows.Forms.Label $label1 = New-Object System.Windows.Forms.Label $InitialFormWindowState = New-Object System.Windows.Forms.FormWindowState #endregion Generated Form Objects #---------------------------------------------- #Generated Event Script Blocks #---------------------------------------------- #Provide Custom Code for events specified in PrimalForms. $BeginButton_OnClick= { #TODO: Place custom script here $scluster = $ClusterName.SelectedItem if ($scluster -eq $null) { $ProgressLog.items.add("") $ProgressLog.items.add("Please select a cluster from the cluster list") [Windows.Forms.Application]::DoEvents() } Else { $vcluster = Get-Cluster $scluster $ProgressLog.items.add("Collecting Powered On Hosts in $vcluster...") [Windows.Forms.Application]::DoEvents() $VMhosts = $vcluster| Get-VMHost | where {$_.PowerState -eq "PoweredOn"} | sort name $ProgressLog.items.add("....completed") $ProgressLog.items.add("") [Windows.Forms.Application]::DoEvents() If ($ComplianceBox1.Checked) { $ProgressLog.items.add("Checking Hosts in $vcluster...") [Windows.Forms.Application]::DoEvents() ForEach ($VMhost in $VMhosts) { $profile = Test-VMHostProfileCompliance -VMHost $VMhost If ($PROFILE -ne $null) { $hostprofile = Get-vmhostprofile -entity $VMhost $ProgressLog.items.add("$VMHost is NOT Compliant.") [Windows.Forms.Application]::DoEvents() } Else { $ProgressLog.items.add("$vmhost is Compliant.") [Windows.Forms.Application]::DoEvents() } } $ProgressLog.items.add("") $ProgressLog.items.add("Compliance Check is Completed") $ProgressLog.items.add("") } Else { $ProgressLog.items.add("Checking Hosts in $vcluster...") [Windows.Forms.Application]::DoEvents() $VMhosts = $vcluster| Get-VMHost | where {$_.PowerState -eq "PoweredOn"} | sort name $ClusterHostCount = @($VMhosts).Count $ClusterConnectedCount = @($VMhosts | where {$_.ConnectionState -eq "Connected"}).Count If ($ClusterHostCount -ne $ClusterConnectedCount){ $ProgressLog.items.add("WARNING: One or more hosts in $vcluster in Maint. mode.") $ProgressLog.items.add("Please try to remediate before updating the host profile.") [Windows.Forms.Application]::DoEvents() } Else { ForEach ($VMhost in $VMhosts) { $profile = Test-VMHostProfileCompliance -VMHost $VMhost If ($PROFILE -ne $null) { $hostprofile = Get-vmhostprofile -entity $VMhost $ProgressLog.items.add("$VMHost is NOT Compliant.") [Windows.Forms.Application]::DoEvents() if ($vcluster.DrsAutomationLevel -ne "FullyAutomated"){ $ProgressLog.items.add("WARNING: DRS FullyAutomated not set on $vcluster") $ProgressLog.items.add("WARNING: Enabling DRS FullyAutomated") [Windows.Forms.Application]::DoEvents() Set-Cluster -Cluster $vcluster -DrsAutomationLevel FullyAutomated -Confirm:$false } foreach ($vm in ($VMHost | get-vm)){ if ((get-cddrive -VM $vm).ConnectionState.Connected -eq "true"){ $ProgressLog.items.add("WARNING: $VM has a CDROM drive attached, detaching.") $ProgressLog.items.add("WARNING: Detaching CDROM.") [Windows.Forms.Application]::DoEvents() Set-CDDrive -CD (get-cddrive -VM $vm) -StartConnected:$false -Connected:$False -Confirm:$false } } $ProgressLog.items.add("Setting $VMhost to Maintenance Mode...") [Windows.Forms.Application]::DoEvents() Set-VMHost -State 'Maintenance' -VMHost $VMhost -Evacuate:$true -Confirm:$false $ProgressLog.items.add("Applying Host Profilie...") [Windows.Forms.Application]::DoEvents() Apply-VMHostProfile -Entity $VMHost -Profile $hostprofile -ErrorAction SilentlyContinue -Confirm:$false $ProgressLog.items.add("Taking the Host out of maintenance mode....") [Windows.Forms.Application]::DoEvents() Set-VMHost -VMHost $VMhost -State 'Connected' Test-VMHostProfileCompliance -VMHost $VMhost } Else { $ProgressLog.items.add("$vmhost is Compliant.") $ProgressLog.items.add("") [Windows.Forms.Application]::DoEvents() } } $ProgressLog.items.add("Compliance Update is Completed") } } } } $CloseButton_OnClick= { #TODO: Place custom script here $form1.Close() } $LoginButton_OnClick= { #TODO: Place custom script here if ($VCenter.text -like "" -or $Password.text -like "" -or $User.text -like "") { $ProgressLog.items.add("Field can not be empty. Try Again") [Windows.Forms.Application]::DoEvents() } Else { $LoginButton.Enabled = $false $V = $vCenter.text $PSW = $Password.text $iUser = $User.text #$BSTR = [System.Runtime.InteropServices.marshal]::SecureStringToBSTR($PSW) #$PSW = [System.Runtime.InteropServices.marshal]::PtrToStringAuto($BSTR) $ProgressLog.items.add("Connecting to $V...") [Windows.Forms.Application]::DoEvents() #Connect-VIServer -Server $V -User $iUser -Password $PSW -WarningAction:SilentlyContinue $connection = Connect-VIServer $V -User $iuser -Password $PSW -WarningAction:SilentlyContinue if ($connection.Port -notlike "*443*") { $ProgressLog.items.add("....Failed!") $ProgressLog.items.add("Failed to connect. Check vCenter and credentials.") $LoginButton.Enabled = $true [Windows.Forms.Application]::DoEvents() } Else { $ProgressLog.items.add("....connected") $ProgressLog.items.add("") $ProgressLog.items.add("Getting Cluster Name from $V...") [Windows.Forms.Application]::DoEvents() $Clusters = Get-Cluster | sort name Foreach ($Cluster in $Clusters){ $ClusterName.items.add($Cluster.Name) [Windows.Forms.Application]::DoEvents() } $ProgressLog.items.add("....completed") [Windows.Forms.Application]::DoEvents() $BeginButton.Enabled = $True } } } $button4_OnClick= { #TODO: Place custom script here $vCenter.Text = $null $User.Text = $null $Password.Text = $null $ClusterName.items.clear() $ProgressLog.items.clear() [Windows.Forms.Application]::DoEvents() $BeginButton.Enabled = $false $LoginButton.Enabled = $true Disconnect-VIServer * -ErrorAction:SilentlyContinue -Confirm:$false } $OnLoadForm_StateCorrection= {#Correct the initial state of the form to prevent the .Net maximized form issue $form1.WindowState = $InitialFormWindowState } #region Generated Form Code $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 583 $System_Drawing_Size.Width = 452 $form1.ClientSize = $System_Drawing_Size $form1.DataBindings.DefaultDataSourceUpdateMode = 0 $form1.FormBorderStyle = 1 $form1.Name = "form1" $form1.Text = "Host Profile Update by David Chung" $button4.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 277 $System_Drawing_Point.Y = 548 $button4.Location = $System_Drawing_Point $button4.Name = "button4" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 23 $System_Drawing_Size.Width = 75 $button4.Size = $System_Drawing_Size $button4.TabIndex = 5 $button4.Text = "Reset Form" $button4.UseVisualStyleBackColor = $True $button4.add_Click($button4_OnClick) $form1.Controls.Add($button4) $groupBox3.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 13 $System_Drawing_Point.Y = 124 $groupBox3.Location = $System_Drawing_Point $groupBox3.Name = "groupBox3" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 66 $System_Drawing_Size.Width = 427 $groupBox3.Size = $System_Drawing_Size $groupBox3.TabIndex = 4 $groupBox3.TabStop = $False $groupBox3.Text = "Profile Update" $form1.Controls.Add($groupBox3) $ComplianceBox1.CheckAlign = 64 $ComplianceBox1.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 262 $System_Drawing_Point.Y = 42 $ComplianceBox1.Location = $System_Drawing_Point $ComplianceBox1.Name = "ComplianceBox1" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 18 $System_Drawing_Size.Width = 150 $ComplianceBox1.Size = $System_Drawing_Size $ComplianceBox1.TabIndex = 3 $ComplianceBox1.Text = "Compliance Check Only" $ComplianceBox1.UseVisualStyleBackColor = $True $groupBox3.Controls.Add($ComplianceBox1) $label4.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 7 $System_Drawing_Point.Y = 29 $label4.Location = $System_Drawing_Point $label4.Name = "label4" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 23 $System_Drawing_Size.Width = 100 $label4.Size = $System_Drawing_Size $label4.TabIndex = 2 $label4.Text = "Select Cluster" $groupBox3.Controls.Add($label4) $ClusterName.DataBindings.DefaultDataSourceUpdateMode = 0 $ClusterName.FormattingEnabled = $True $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 113 $System_Drawing_Point.Y = 19 $ClusterName.Location = $System_Drawing_Point $ClusterName.Name = "ClusterName" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 30 $System_Drawing_Size.Width = 122 $ClusterName.Size = $System_Drawing_Size $ClusterName.Sorted = $True $ClusterName.TabIndex = 0 $groupBox3.Controls.Add($ClusterName) $BeginButton.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 345 $System_Drawing_Point.Y = 13 $BeginButton.Location = $System_Drawing_Point $BeginButton.Name = "BeginButton" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 23 $System_Drawing_Size.Width = 75 $BeginButton.Size = $System_Drawing_Size $BeginButton.TabIndex = 2 $BeginButton.Text = "Begin" $BeginButton.UseVisualStyleBackColor = $True $BeginButton.add_Click($BeginButton_OnClick) $BeginButton.Enabled = $False # $groupBox3.Controls.Add($BeginButton) $CloseButton.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 358 $System_Drawing_Point.Y = 548 $CloseButton.Location = $System_Drawing_Point $CloseButton.Name = "CloseButton" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 23 $System_Drawing_Size.Width = 75 $CloseButton.Size = $System_Drawing_Size $CloseButton.TabIndex = 3 $CloseButton.Text = "Close" $CloseButton.UseVisualStyleBackColor = $True $CloseButton.add_Click($CloseButton_OnClick) $form1.Controls.Add($CloseButton) $groupBox2.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 13 $System_Drawing_Point.Y = 196 $groupBox2.Location = $System_Drawing_Point $groupBox2.Name = "groupBox2" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 345 $System_Drawing_Size.Width = 427 $groupBox2.Size = $System_Drawing_Size $groupBox2.TabIndex = 1 $groupBox2.TabStop = $False $groupBox2.Text = "Progress Log" $form1.Controls.Add($groupBox2) $ProgressLog.DataBindings.DefaultDataSourceUpdateMode = 0 $ProgressLog.FormattingEnabled = $True $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 6 $System_Drawing_Point.Y = 20 $ProgressLog.Location = $System_Drawing_Point $ProgressLog.Name = "ProgressLog" $ProgressLog.SelectionMode = 0 $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 316 $System_Drawing_Size.Width = 414 $ProgressLog.Size = $System_Drawing_Size $ProgressLog.TabIndex = 3 $groupBox2.Controls.Add($ProgressLog) $groupBox1.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 13 $System_Drawing_Point.Y = 12 $groupBox1.Location = $System_Drawing_Point $groupBox1.Name = "groupBox1" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 106 $System_Drawing_Size.Width = 427 $groupBox1.Size = $System_Drawing_Size $groupBox1.TabIndex = 0 $groupBox1.TabStop = $False $groupBox1.Text = "vCenter Login" $form1.Controls.Add($groupBox1) $LoginButton.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 345 $System_Drawing_Point.Y = 41 $LoginButton.Location = $System_Drawing_Point $LoginButton.Name = "LoginButton" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 23 $System_Drawing_Size.Width = 75 $LoginButton.Size = $System_Drawing_Size $LoginButton.TabIndex = 6 $LoginButton.Text = "Login" $LoginButton.UseVisualStyleBackColor = $True $LoginButton.add_Click($LoginButton_OnClick) $groupBox1.Controls.Add($LoginButton) $Password.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 113 $System_Drawing_Point.Y = 71 $Password.Location = $System_Drawing_Point $Password.Name = "Password" $Password.PasswordChar = '*' $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 20 $System_Drawing_Size.Width = 122 $Password.Size = $System_Drawing_Size $Password.TabIndex = 5 $groupBox1.Controls.Add($Password) $User.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 113 $System_Drawing_Point.Y = 44 $User.Location = $System_Drawing_Point $User.Name = "User" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 20 $System_Drawing_Size.Width = 122 $User.Size = $System_Drawing_Size $User.TabIndex = 4 $groupBox1.Controls.Add($User) $vCenter.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 113 $System_Drawing_Point.Y = 17 $vCenter.Location = $System_Drawing_Point $vCenter.Name = "vCenter" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 20 $System_Drawing_Size.Width = 122 $vCenter.Size = $System_Drawing_Size $vCenter.TabIndex = 3 $groupBox1.Controls.Add($vCenter) $label3.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 7 $System_Drawing_Point.Y = 74 $label3.Location = $System_Drawing_Point $label3.Name = "label3" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 23 $System_Drawing_Size.Width = 100 $label3.Size = $System_Drawing_Size $label3.TabIndex = 2 $label3.Text = "Password" $groupBox1.Controls.Add($label3) $label2.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 7 $System_Drawing_Point.Y = 47 $label2.Location = $System_Drawing_Point $label2.Name = "label2" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 23 $System_Drawing_Size.Width = 100 $label2.Size = $System_Drawing_Size $label2.TabIndex = 1 $label2.Text = "User Name" $groupBox1.Controls.Add($label2) $label1.DataBindings.DefaultDataSourceUpdateMode = 0 $System_Drawing_Point = New-Object System.Drawing.Point $System_Drawing_Point.X = 7 $System_Drawing_Point.Y = 20 $label1.Location = $System_Drawing_Point $label1.Name = "label1" $System_Drawing_Size = New-Object System.Drawing.Size $System_Drawing_Size.Height = 23 $System_Drawing_Size.Width = 100 $label1.Size = $System_Drawing_Size $label1.TabIndex = 0 $label1.Text = "VI Server" $groupBox1.Controls.Add($label1) #endregion Generated Form Code #Save the initial state of the form $InitialFormWindowState = $form1.WindowState #Init the OnLoad event to correct the initial state of the form $form1.add_Load($OnLoadForm_StateCorrection) #Show the Form $form1.ShowDialog()| Out-Null } #End Function #Call the Function GenerateForm
combined_dataset/train/non-malicious/1036.ps1
1036.ps1
[CmdletBinding()] param( ) $silkJsonPath = Join-Path -Path $PSScriptRoot -ChildPath 'silk.json' -Resolve $silkJson = Get-Content -Path $silkJsonPath -Raw | ConvertFrom-Json if( -not (Get-Member -InputObject $silkJson -Name 'Navigation') ) { Add-Member -InputObject $silkJson -MemberType NoteProperty -Name 'Navigation' -Value @{ } } $silkJson.Navigation = [ordered]@{ } $moduleRoot = Join-Path -Path $PSScriptRoot -ChildPath 'Carbon' $categories = Get-ChildItem -Path $moduleRoot -Directory -Exclude 'bin' | Sort-Object -Property 'BaseName' $dirNameTitleNameMap = @{ 'ActiveDirectory' = 'Active Directory'; 'DotNet' = '.NET'; 'FileSystem' = 'File System'; 'HostsFile' = 'Hosts File'; 'InternetExplorer' = 'Internet Explorer'; 'PerformanceCounters' = 'Performance Counters'; 'UsersAndGroups' = 'Users and Groups'; 'WindowsFeatures' = 'Windows Features'; } foreach( $category in $categories ) { $categoryName = $category.Name if( $dirNameTitleNameMap.ContainsKey($categoryName) ) { $categoryName = $dirNameTitleNameMap.$categoryName } [object[]]$categoryTopics = Get-ChildItem -Path $category.FullName -Filter '*.ps1' | Sort-Object -Property BaseName | Select-Object -ExpandProperty BaseName $silkJson.Navigation.$categoryName = $categoryTopics } $silkJson | ConvertTo-Json | Set-Content -Path $silkJsonPath
combined_dataset/train/non-malicious/3936.ps1
3936.ps1
function Test-LoadBalancerCRUD-Public { $rgname = Get-ResourceGroupName $vnetName = Get-ResourceName $subnetName = Get-ResourceName $publicIpName = Get-ResourceName $domainNameLabel = Get-ResourceName $lbName = Get-ResourceName $frontendName = Get-ResourceName $backendAddressPoolName = Get-ResourceName $probeName = Get-ResourceName $inboundNatRuleName = Get-ResourceName $lbruleName = Get-ResourceName $rglocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/loadBalancers" $location = Get-ProviderLocation $resourceTypeParent try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"} $subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24 $vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet $publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel $frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -PublicIpAddress $publicip $backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName $probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2 $inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP $lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP $job = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule -AsJob $job | Wait-Job $actualLb = $job | Receive-Job $expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName Assert-AreEqual $expectedLb.Name $actualLb.Name Assert-AreEqual $expectedLb.Location $actualLb.Location Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState Assert-NotNull $expectedLb.ResourceGuid Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name Assert-AreEqual $publicip.Id $expectedLb.FrontendIPConfigurations[0].PublicIpAddress.Id Assert-Null $expectedLb.FrontendIPConfigurations[0].PrivateIpAddress Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name Assert-AreEqual $probeName $expectedLb.Probes[0].Name Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath Assert-AreEqual $inboundNatRuleName $expectedLb.InboundNatRules[0].Name Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.InboundNatRules[0].FrontendIPConfiguration.Id Assert-AreEqual $lbruleName $expectedLb.LoadBalancingRules[0].Name Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.LoadBalancingRules[0].FrontendIPConfiguration.Id Assert-AreEqual $expectedLb.BackendAddressPools[0].Id $expectedLb.LoadBalancingRules[0].BackendAddressPool.Id $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 1 @($list).Count Assert-AreEqual $expectedLb.Etag $list[0].Etag Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Etag $list[0].FrontendIPConfigurations[0].Etag Assert-AreEqual $expectedLb.BackendAddressPools[0].Etag $list[0].BackendAddressPools[0].Etag Assert-AreEqual $expectedLb.InboundNatRules[0].Etag $list[0].InboundNatRules[0].Etag Assert-AreEqual $expectedLb.Probes[0].Etag $list[0].Probes[0].Etag Assert-AreEqual $expectedLb.LoadBalancingRules[0].Etag $list[0].LoadBalancingRules[0].Etag $list = Get-AzLoadBalancer -ResourceGroupName "*" Assert-True { @($list).Count -ge 0 } $list = Get-AzLoadBalancer -Name "*" Assert-True { @($list).Count -ge 0 } $list = Get-AzLoadBalancer -ResourceGroupName "*" -Name "*" Assert-True { @($list).Count -ge 0 } $job = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force -AsJob $job | Wait-Job $deleteLb = $job | Receive-Job Assert-AreEqual true $deleteLb $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 0 @($list).Count } finally { Clean-ResourceGroup $rgname } } function Test-LoadBalancerCRUD-PublicTcpReset { $rgname = Get-ResourceGroupName $vnetName = Get-ResourceName $subnetName = Get-ResourceName $publicIpName = Get-ResourceName $domainNameLabel = Get-ResourceName $lbName = Get-ResourceName $frontendName = Get-ResourceName $backendAddressPoolName = Get-ResourceName $probeName = Get-ResourceName $inboundNatRuleName = Get-ResourceName $lbruleName = Get-ResourceName $rglocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/loadBalancers" $location = Get-ProviderLocation $resourceTypeParent try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"} $subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24 $vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet $publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Static -DomainNameLabel $domainNameLabel -Sku Standard $frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -PublicIpAddress $publicip $backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName $probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol https -Port 80 -IntervalInSeconds 15 -ProbeCount 2 $inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP -EnableTcpReset $lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -EnableTcpReset -LoadDistribution SourceIP -DisableOutboundSNAT $actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule -Sku Standard $expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName Assert-AreEqual $expectedLb.Name $actualLb.Name Assert-AreEqual $expectedLb.Location $actualLb.Location Assert-AreEqualObjectProperties $expectedLb.Sku $actualLb.Sku Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState Assert-NotNull $expectedLb.ResourceGuid Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name Assert-AreEqual $publicip.Id $expectedLb.FrontendIPConfigurations[0].PublicIpAddress.Id Assert-Null $expectedLb.FrontendIPConfigurations[0].PrivateIpAddress Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name Assert-AreEqual $probeName $expectedLb.Probes[0].Name Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath Assert-AreEqual "https" $expectedLb.Probes[0].Protocol Assert-AreEqual $inboundNatRuleName $expectedLb.InboundNatRules[0].Name Assert-AreEqual true $expectedLb.InboundNatRules[0].EnableTcpReset Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.InboundNatRules[0].FrontendIPConfiguration.Id Assert-AreEqual $lbruleName $expectedLb.LoadBalancingRules[0].Name Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.LoadBalancingRules[0].FrontendIPConfiguration.Id Assert-AreEqual $expectedLb.BackendAddressPools[0].Id $expectedLb.LoadBalancingRules[0].BackendAddressPool.Id Assert-AreEqual true $expectedLb.LoadBalancingRules[0].EnableTcpReset $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 1 @($list).Count Assert-AreEqual $expectedLb.Etag $list[0].Etag Assert-AreEqualObjectProperties $expectedLb.Sku $list[0].Sku Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Etag $list[0].FrontendIPConfigurations[0].Etag Assert-AreEqual $expectedLb.BackendAddressPools[0].Etag $list[0].BackendAddressPools[0].Etag Assert-AreEqual $expectedLb.InboundNatRules[0].Etag $list[0].InboundNatRules[0].Etag Assert-AreEqual $expectedLb.Probes[0].Etag $list[0].Probes[0].Etag Assert-AreEqual $expectedLb.LoadBalancingRules[0].Etag $list[0].LoadBalancingRules[0].Etag $deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force Assert-AreEqual true $deleteLb $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 0 @($list).Count } finally { Clean-ResourceGroup $rgname } } function Test-LoadBalancerCRUD-InternalDynamic { $rgname = Get-ResourceGroupName $vnetName = Get-ResourceName $subnetName = Get-ResourceName $publicIpName = Get-ResourceName $domainNameLabel = Get-ResourceName $lbName = Get-ResourceName $frontendName = Get-ResourceName $backendAddressPoolName = Get-ResourceName $probeName = Get-ResourceName $inboundNatRuleName = Get-ResourceName $lbruleName = Get-ResourceName $rglocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/loadBalancers" $location = Get-ProviderLocation $resourceTypeParent try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"} $subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24 $vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet $publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel $frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -Subnet $vnet.Subnets[0] $backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName $probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2 $inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP $lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP $actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule $expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName Assert-AreEqual $expectedLb.Name $actualLb.Name Assert-AreEqual $expectedLb.Location $actualLb.Location Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name Assert-AreEqual $vnet.Subnets[0].Id $expectedLb.FrontendIPConfigurations[0].Subnet.Id Assert-NotNull $expectedLb.FrontendIPConfigurations[0].PrivateIpAddress Assert-AreEqual "IPv4" $expectedLb.FrontendIPConfigurations[0].PrivateIpAddressVersion Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name Assert-AreEqual $probeName $expectedLb.Probes[0].Name Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath Assert-AreEqual $inboundNatRuleName $expectedLb.InboundNatRules[0].Name Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.InboundNatRules[0].FrontendIPConfiguration.Id Assert-AreEqual $lbruleName $expectedLb.LoadBalancingRules[0].Name Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.LoadBalancingRules[0].FrontendIPConfiguration.Id Assert-AreEqual $expectedLb.BackendAddressPools[0].Id $expectedLb.LoadBalancingRules[0].BackendAddressPool.Id $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 1 @($list).Count Assert-AreEqual $expectedLb.Etag $list[0].Etag Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Etag $list[0].FrontendIPConfigurations[0].Etag Assert-AreEqual $expectedLb.BackendAddressPools[0].Etag $list[0].BackendAddressPools[0].Etag Assert-AreEqual $expectedLb.InboundNatRules[0].Etag $list[0].InboundNatRules[0].Etag Assert-AreEqual $expectedLb.Probes[0].Etag $list[0].Probes[0].Etag Assert-AreEqual $expectedLb.LoadBalancingRules[0].Etag $list[0].LoadBalancingRules[0].Etag $deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force Assert-AreEqual true $deleteLb $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 0 @($list).Count } finally { Clean-ResourceGroup $rgname } } function Test-LoadBalancerCRUD-InternalStatic { $rgname = Get-ResourceGroupName $vnetName = Get-ResourceName $subnetName = Get-ResourceName $publicIpName = Get-ResourceName $domainNameLabel = Get-ResourceName $lbName = Get-ResourceName $frontendName = Get-ResourceName $backendAddressPoolName = Get-ResourceName $probeName = Get-ResourceName $inboundNatRuleName = Get-ResourceName $lbruleName = Get-ResourceName $rglocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/loadBalancers" $location = Get-ProviderLocation $resourceTypeParent try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"} $subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24 $vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet $publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel $frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -Subnet $vnet.Subnets[0] -PrivateIpAddress "10.0.1.5" -PrivateIpAddressVersion "IPv4" $backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName $probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2 $inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP $lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP $actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule $expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName Assert-AreEqual $expectedLb.Name $actualLb.Name Assert-AreEqual $expectedLb.Location $actualLb.Location Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name Assert-AreEqual $vnet.Subnets[0].Id $expectedLb.FrontendIPConfigurations[0].Subnet.Id Assert-AreEqual "10.0.1.5" $expectedLb.FrontendIPConfigurations[0].PrivateIpAddress Assert-AreEqual "IPv4" $expectedLb.FrontendIPConfigurations[0].PrivateIpAddressVersion Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name Assert-AreEqual $probeName $expectedLb.Probes[0].Name Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath Assert-AreEqual $inboundNatRuleName $expectedLb.InboundNatRules[0].Name Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.InboundNatRules[0].FrontendIPConfiguration.Id Assert-AreEqual $lbruleName $expectedLb.LoadBalancingRules[0].Name Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.LoadBalancingRules[0].FrontendIPConfiguration.Id Assert-AreEqual $expectedLb.BackendAddressPools[0].Id $expectedLb.LoadBalancingRules[0].BackendAddressPool.Id $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 1 @($list).Count Assert-AreEqual $expectedLb.Etag $list[0].Etag Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Etag $list[0].FrontendIPConfigurations[0].Etag Assert-AreEqual $expectedLb.BackendAddressPools[0].Etag $list[0].BackendAddressPools[0].Etag Assert-AreEqual $expectedLb.InboundNatRules[0].Etag $list[0].InboundNatRules[0].Etag Assert-AreEqual $expectedLb.Probes[0].Etag $list[0].Probes[0].Etag Assert-AreEqual $expectedLb.LoadBalancingRules[0].Etag $list[0].LoadBalancingRules[0].Etag $deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force Assert-AreEqual true $deleteLb $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 0 @($list).Count } finally { Clean-ResourceGroup $rgname } } function Test-LoadBalancerCRUD-InternalHighlyAvailableBasicSku { $rgname = Get-ResourceGroupName $vnetName = Get-ResourceName $subnetName = Get-ResourceName $publicIpName = Get-ResourceName $domainNameLabel = Get-ResourceName $lbName = Get-ResourceName $frontendName = Get-ResourceName $backendAddressPoolName = Get-ResourceName $probeName = Get-ResourceName $inboundNatRuleName = Get-ResourceName $lbruleName = Get-ResourceName $rglocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/loadBalancers" $location = Get-ProviderLocation $resourceTypeParent try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"} $subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24 $vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet $publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel $frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -Subnet $vnet.Subnets[0] $backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName $probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2 $lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol All -FrontendPort 0 -BackendPort 0 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP $actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -LoadBalancingRule $lbrule -Sku Basic $expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName Assert-AreEqual $expectedLb.Name $actualLb.Name Assert-AreEqual $expectedLb.Location $actualLb.Location Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name Assert-AreEqual $vnet.Subnets[0].Id $expectedLb.FrontendIPConfigurations[0].Subnet.Id Assert-NotNull $expectedLb.FrontendIPConfigurations[0].PrivateIpAddress Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name Assert-AreEqual $probeName $expectedLb.Probes[0].Name Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath Assert-AreEqual $lbruleName $expectedLb.LoadBalancingRules[0].Name Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.LoadBalancingRules[0].FrontendIPConfiguration.Id Assert-AreEqual $expectedLb.BackendAddressPools[0].Id $expectedLb.LoadBalancingRules[0].BackendAddressPool.Id Assert-AreEqual 0 $expectedLb.LoadBalancingRules[0].FrontendPort Assert-AreEqual 0 $expectedLb.LoadBalancingRules[0].BackendPort Assert-AreEqual All $expectedLb.LoadBalancingRules[0].Protocol $deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force Assert-AreEqual true $deleteLb $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 0 @($list).Count } finally { Clean-ResourceGroup $rgname } } function Test-LoadBalancerCRUD-InternalHighlyAvailableStandardSku { $rgname = Get-ResourceGroupName $vnetName = Get-ResourceName $subnetName = Get-ResourceName $publicIpName = Get-ResourceName $domainNameLabel = Get-ResourceName $lbName = Get-ResourceName $frontendName = Get-ResourceName $backendAddressPoolName = Get-ResourceName $probeName = Get-ResourceName $inboundNatRuleName = Get-ResourceName $lbruleName = Get-ResourceName $rglocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/loadBalancers" $location = Get-ProviderLocation $resourceTypeParent try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"} $subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24 $vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet $publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel $frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -Subnet $vnet.Subnets[0] $backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName $probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2 $lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol All -FrontendPort 0 -BackendPort 0 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP $actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -LoadBalancingRule $lbrule -Sku Standard $expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName Assert-AreEqual $expectedLb.Name $actualLb.Name Assert-AreEqual $expectedLb.Location $actualLb.Location Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name Assert-AreEqual $vnet.Subnets[0].Id $expectedLb.FrontendIPConfigurations[0].Subnet.Id Assert-NotNull $expectedLb.FrontendIPConfigurations[0].PrivateIpAddress Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name Assert-AreEqual $probeName $expectedLb.Probes[0].Name Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath Assert-AreEqual $lbruleName $expectedLb.LoadBalancingRules[0].Name Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.LoadBalancingRules[0].FrontendIPConfiguration.Id Assert-AreEqual $expectedLb.BackendAddressPools[0].Id $expectedLb.LoadBalancingRules[0].BackendAddressPool.Id Assert-AreEqual 0 $expectedLb.LoadBalancingRules[0].FrontendPort Assert-AreEqual 0 $expectedLb.LoadBalancingRules[0].BackendPort Assert-AreEqual All $expectedLb.LoadBalancingRules[0].Protocol $deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force Assert-AreEqual true $deleteLb $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 0 @($list).Count } finally { Clean-ResourceGroup $rgname } } function Test-LoadBalancerCRUD-PublicNoInboundNATRule { $rgname = Get-ResourceGroupName $vnetName = Get-ResourceName $subnetName = Get-ResourceName $publicIpName = Get-ResourceName $domainNameLabel = Get-ResourceName $lbName = Get-ResourceName $frontendName = Get-ResourceName $backendAddressPoolName = Get-ResourceName $probeName = Get-ResourceName $inboundNatRuleName = Get-ResourceName $lbruleName = Get-ResourceName $rglocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/loadBalancers" $location = Get-ProviderLocation $resourceTypeParent try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"} $subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24 $vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet $publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel $frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -PublicIpAddress $publicip $backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName $probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2 $lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP $actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -LoadBalancingRule $lbrule $expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName Assert-AreEqual $expectedLb.Name $actualLb.Name Assert-AreEqual $expectedLb.Location $actualLb.Location Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name Assert-AreEqual $publicip.Id $expectedLb.FrontendIPConfigurations[0].PublicIpAddress.Id Assert-Null $expectedLb.FrontendIPConfigurations[0].PrivateIpAddress Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name Assert-AreEqual $probeName $expectedLb.Probes[0].Name Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath Assert-AreEqual $lbruleName $expectedLb.LoadBalancingRules[0].Name Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.LoadBalancingRules[0].FrontendIPConfiguration.Id Assert-AreEqual $expectedLb.BackendAddressPools[0].Id $expectedLb.LoadBalancingRules[0].BackendAddressPool.Id $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 1 @($list).Count Assert-AreEqual $expectedLb.Etag $list[0].Etag Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Etag $list[0].FrontendIPConfigurations[0].Etag Assert-AreEqual $expectedLb.BackendAddressPools[0].Etag $list[0].BackendAddressPools[0].Etag Assert-AreEqual $expectedLb.Probes[0].Etag $list[0].Probes[0].Etag Assert-AreEqual $expectedLb.LoadBalancingRules[0].Etag $list[0].LoadBalancingRules[0].Etag $deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force Assert-AreEqual true $deleteLb $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 0 @($list).Count } finally { Clean-ResourceGroup $rgname } } function Test-LoadBalancerCRUD-InternalUsingId { $rgname = Get-ResourceGroupName $vnetName = Get-ResourceName $subnetName = Get-ResourceName $publicIpName = Get-ResourceName $domainNameLabel = Get-ResourceName $lbName = Get-ResourceName $frontendName = Get-ResourceName $backendAddressPoolName = Get-ResourceName $probeName = Get-ResourceName $inboundNatRuleName = Get-ResourceName $lbruleName = Get-ResourceName $rglocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/loadBalancers" $location = Get-ProviderLocation $resourceTypeParent try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"} $subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24 $vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet $publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel $frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -SubnetId $vnet.Subnets[0].Id $backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName $probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2 $inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfigurationId $frontend.Id -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP $lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfigurationId $frontend.Id -BackendAddressPoolId $backendAddressPool.Id -ProbeId $probe.Id -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP $actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule $expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName Assert-AreEqual $expectedLb.Name $actualLb.Name Assert-AreEqual $expectedLb.Location $actualLb.Location Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name Assert-AreEqual $vnet.Subnets[0].Id $expectedLb.FrontendIPConfigurations[0].Subnet.Id Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name Assert-AreEqual $probeName $expectedLb.Probes[0].Name Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath Assert-AreEqual $inboundNatRuleName $expectedLb.InboundNatRules[0].Name Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.InboundNatRules[0].FrontendIPConfiguration.Id Assert-AreEqual $lbruleName $expectedLb.LoadBalancingRules[0].Name Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.LoadBalancingRules[0].FrontendIPConfiguration.Id Assert-AreEqual $expectedLb.BackendAddressPools[0].Id $expectedLb.LoadBalancingRules[0].BackendAddressPool.Id $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 1 @($list).Count Assert-AreEqual $expectedLb.Etag $list[0].Etag Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Etag $list[0].FrontendIPConfigurations[0].Etag Assert-AreEqual $expectedLb.BackendAddressPools[0].Etag $list[0].BackendAddressPools[0].Etag Assert-AreEqual $expectedLb.InboundNatRules[0].Etag $list[0].InboundNatRules[0].Etag Assert-AreEqual $expectedLb.Probes[0].Etag $list[0].Probes[0].Etag Assert-AreEqual $expectedLb.LoadBalancingRules[0].Etag $list[0].LoadBalancingRules[0].Etag $deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force Assert-AreEqual true $deleteLb $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 0 @($list).Count } finally { Clean-ResourceGroup $rgname } } function Test-LoadBalancerCRUD-PublicUsingId { $rgname = Get-ResourceGroupName $vnetName = Get-ResourceName $subnetName = Get-ResourceName $publicIpName = Get-ResourceName $domainNameLabel = Get-ResourceName $lbName = Get-ResourceName $frontendName = Get-ResourceName $backendAddressPoolName = Get-ResourceName $probeName = Get-ResourceName $inboundNatRuleName = Get-ResourceName $lbruleName = Get-ResourceName $rglocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/loadBalancers" $location = Get-ProviderLocation $resourceTypeParent try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"} $subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24 $vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet $publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel $frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -PublicIpAddressId $publicip.Id $backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName $probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2 $inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfigurationId $frontend.Id -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP $lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfigurationId $frontend.Id -BackendAddressPoolId $backendAddressPool.Id -ProbeId $probe.Id -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP $actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule $expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName Assert-AreEqual $expectedLb.Name $actualLb.Name Assert-AreEqual $expectedLb.Location $actualLb.Location Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name Assert-AreEqual $publicip.Id $expectedLb.FrontendIPConfigurations[0].PublicIpAddress.Id Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name Assert-AreEqual $probeName $expectedLb.Probes[0].Name Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath Assert-AreEqual $inboundNatRuleName $expectedLb.InboundNatRules[0].Name Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.InboundNatRules[0].FrontendIPConfiguration.Id Assert-AreEqual $lbruleName $expectedLb.LoadBalancingRules[0].Name Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.LoadBalancingRules[0].FrontendIPConfiguration.Id Assert-AreEqual $expectedLb.BackendAddressPools[0].Id $expectedLb.LoadBalancingRules[0].BackendAddressPool.Id $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 1 @($list).Count Assert-AreEqual $expectedLb.Etag $list[0].Etag Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Etag $list[0].FrontendIPConfigurations[0].Etag Assert-AreEqual $expectedLb.BackendAddressPools[0].Etag $list[0].BackendAddressPools[0].Etag Assert-AreEqual $expectedLb.InboundNatRules[0].Etag $list[0].InboundNatRules[0].Etag Assert-AreEqual $expectedLb.Probes[0].Etag $list[0].Probes[0].Etag Assert-AreEqual $expectedLb.LoadBalancingRules[0].Etag $list[0].LoadBalancingRules[0].Etag $deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force Assert-AreEqual true $deleteLb $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 0 @($list).Count } finally { Clean-ResourceGroup $rgname } } function Test-LoadBalancerCRUD-PublicNoLbRule { $rgname = Get-ResourceGroupName $vnetName = Get-ResourceName $subnetName = Get-ResourceName $publicIpName = Get-ResourceName $domainNameLabel = Get-ResourceName $lbName = Get-ResourceName $frontendName = Get-ResourceName $backendAddressPoolName = Get-ResourceName $probeName = Get-ResourceName $inboundNatRuleName = Get-ResourceName $lbruleName = Get-ResourceName $rglocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/loadBalancers" $location = Get-ProviderLocation $resourceTypeParent try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"} $subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24 $vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet $publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel $frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -PublicIpAddress $publicip $backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName $probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2 $inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP $actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule $expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName Assert-AreEqual $expectedLb.Name $actualLb.Name Assert-AreEqual $expectedLb.Location $actualLb.Location Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name Assert-AreEqual $publicip.Id $expectedLb.FrontendIPConfigurations[0].PublicIpAddress.Id Assert-Null $expectedLb.FrontendIPConfigurations[0].PrivateIpAddress Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name Assert-AreEqual $probeName $expectedLb.Probes[0].Name Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath Assert-AreEqual $inboundNatRuleName $expectedLb.InboundNatRules[0].Name Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.InboundNatRules[0].FrontendIPConfiguration.Id $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 1 @($list).Count Assert-AreEqual $expectedLb.Etag $list[0].Etag Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Etag $list[0].FrontendIPConfigurations[0].Etag Assert-AreEqual $expectedLb.BackendAddressPools[0].Etag $list[0].BackendAddressPools[0].Etag Assert-AreEqual $expectedLb.InboundNatRules[0].Etag $list[0].InboundNatRules[0].Etag Assert-AreEqual $expectedLb.Probes[0].Etag $list[0].Probes[0].Etag $deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force Assert-AreEqual true $deleteLb $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 0 @($list).Count } finally { Clean-ResourceGroup $rgname } } function Test-LoadBalancerChildResource { $rgname = Get-ResourceGroupName $vnetName = Get-ResourceName $subnetName = Get-ResourceName $publicIpName = Get-ResourceName $domainNameLabel = Get-ResourceName $lbName = Get-ResourceName $frontendName = Get-ResourceName $backendAddressPoolName = Get-ResourceName $probeName = Get-ResourceName $inboundNatRuleName = Get-ResourceName $lbruleName = Get-ResourceName $rglocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/loadBalancers" $location = Get-ProviderLocation $resourceTypeParent try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"} $subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24 $vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet $publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel $frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -SubnetId $vnet.Subnets[0].Id $backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName $probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2 $inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfigurationId $frontend.Id -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP $lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfigurationId $frontend.Id -BackendAddressPoolId $backendAddressPool.Id -ProbeId $probe.Id -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname $frontendName2 = Get-ResourceName $lb = $lb | Add-AzLoadBalancerFrontendIpConfig -Name $frontendName2 -Subnet $vnet.Subnets[0] Assert-AreEqual 2 @($lb.FrontendIPConfigurations).Count Assert-AreEqual $frontendName2 $lb.FrontendIPConfigurations[1].Name Assert-AreEqual "Dynamic" $lb.FrontendIPConfigurations[1].PrivateIPAllocationMethod Assert-AreEqual $vnet.Subnets[0].Id $lb.FrontendIPConfigurations[1].Subnet.Id $lb = $lb | Set-AzLoadBalancerFrontendIpConfig -Name $frontendName2 -Subnet $vnet.Subnets[0] -PrivateIpAddress "10.0.1.5" Assert-AreEqual 2 @($lb.FrontendIPConfigurations).Count Assert-AreEqual $frontendName2 $lb.FrontendIPConfigurations[1].Name Assert-AreEqual "Static" $lb.FrontendIPConfigurations[1].PrivateIPAllocationMethod Assert-AreEqual $vnet.Subnets[0].Id $lb.FrontendIPConfigurations[1].Subnet.Id Assert-AreEqual "10.0.1.5" $lb.FrontendIPConfigurations[1].PrivateIpAddress $frontendIpconfig = $lb | Get-AzLoadBalancerFrontendIpConfig -Name $frontendName2 $frontendIpconfigList = $lb | Get-AzLoadBalancerFrontendIpConfig Assert-AreEqual 2 @($frontendIpconfigList).Count Assert-AreEqual $frontendName $frontendIpconfigList[0].Name Assert-AreEqual $frontendName2 $frontendIpconfigList[1].Name Assert-AreEqual $frontendIpconfig.Name $frontendIpconfigList[1].Name $lb = $lb | Remove-AzLoadBalancerFrontendIpConfig -Name $frontendName2 Assert-AreEqual 1 @($lb.FrontendIPConfigurations).Count Assert-AreEqual $frontendName $lb.FrontendIPConfigurations[0].Name $backendAddressPoolName2 = Get-ResourceName $job = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Add-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName2 | Set-AzLoadBalancer -AsJob $job | Wait-Job $lb = $job | Receive-Job Assert-AreEqual 2 @($lb.BackendAddressPools).Count Assert-AreEqual $backendAddressPoolName2 $lb.BackendAddressPools[1].Name $backendAddressPoolConfig = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname| Get-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName2 $backendAddressPoolConfigList = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerBackendAddressPoolConfig Assert-AreEqual 2 @($backendAddressPoolconfigList).Count Assert-AreEqual $backendAddressPoolName $backendAddressPoolConfigList[0].Name Assert-AreEqual $backendAddressPoolName2 $backendAddressPoolConfigList[1].Name Assert-AreEqual $backendAddressPoolConfig.Name $backendAddressPoolConfigList[1].Name $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Remove-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName2 | Set-AzLoadBalancer Assert-AreEqual 1 @($lb.BackendAddressPools).Count Assert-AreEqual $backendAddressPoolName $lb.BackendAddressPools[0].Name $probeName2 = Get-ResourceName $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Add-AzLoadBalancerProbeConfig -Name $probeName2 -RequestPath healthcheck2.aspx -Protocol http -Port 81 -IntervalInSeconds 16 -ProbeCount 3 | Set-AzLoadBalancer Assert-AreEqual 2 @($lb.Probes).Count Assert-AreEqual $probeName2 $lb.Probes[1].Name Assert-AreEqual "healthcheck2.aspx" $lb.Probes[1].RequestPath Assert-AreEqual 81 $lb.Probes[1].Port $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Set-AzLoadBalancerProbeConfig -Name $probeName2 -RequestPath healthcheck2.aspx -Protocol http -Port 85 -IntervalInSeconds 16 -ProbeCount 3 | Set-AzLoadBalancer Assert-AreEqual 2 @($lb.Probes).Count Assert-AreEqual $probeName2 $lb.Probes[1].Name Assert-AreEqual "healthcheck2.aspx" $lb.Probes[1].RequestPath Assert-AreEqual 85 $lb.Probes[1].Port $probeConfig = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerProbeConfig -Name $probeName2 $probeConfigList = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerProbeConfig Assert-AreEqual 2 @($probeConfigList).Count Assert-AreEqual $probeName $probeConfigList[0].Name Assert-AreEqual $probeName2 $probeConfigList[1].Name Assert-AreEqual $probeConfig.Name $probeConfigList[1].Name $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Remove-AzLoadBalancerProbeConfig -Name $probeName2 | Set-AzLoadBalancer Assert-AreEqual 1 @($lb.Probes).Count Assert-AreEqual $probeName $lb.Probes[0].Name $inboundNatRuleName2 = Get-ResourceName $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Add-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName2 -FrontendIPConfigurationId $lb.FrontendIPConfigurations[0].Id -Protocol Tcp -FrontendPort 3350 -BackendPort 3350 -IdleTimeoutInMinutes 17 -EnableFloatingIP | Set-AzLoadBalancer Assert-AreEqual 2 @($lb.InboundNatRules).Count Assert-AreEqual $inboundNatRuleName2 $lb.InboundNatRules[1].Name Assert-AreEqual 3350 $lb.InboundNatRules[1].FrontendPort Assert-AreEqual 3350 $lb.InboundNatRules[1].BackendPort Assert-AreEqual true $lb.InboundNatRules[1].EnableFloatingIP $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Set-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName2 -FrontendIPConfigurationId $lb.FrontendIPConfigurations[0].Id -Protocol Tcp -FrontendPort 3352 -BackendPort 3351 -IdleTimeoutInMinutes 17 | Set-AzLoadBalancer Assert-AreEqual 2 @($lb.InboundNatRules).Count Assert-AreEqual $inboundNatRuleName2 $lb.InboundNatRules[1].Name Assert-AreEqual 3352 $lb.InboundNatRules[1].FrontendPort Assert-AreEqual 3351 $lb.InboundNatRules[1].BackendPort Assert-AreEqual false $lb.InboundNatRules[1].EnableFloatingIP $inboundNatRuleConfig = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName2 $inboundNatRuleConfigList = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerInboundNatRuleConfig Assert-AreEqual 2 @($inboundNatRuleConfigList).Count Assert-AreEqual $inboundNatRuleName $inboundNatRuleConfigList[0].Name Assert-AreEqual $inboundNatRuleName2 $inboundNatRuleConfigList[1].Name Assert-AreEqual $inboundNatRuleConfig.Name $inboundNatRuleConfigList[1].Name $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Remove-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName2 | Set-AzLoadBalancer Assert-AreEqual 1 @($lb.InboundNatRules).Count Assert-AreEqual $inboundNatRuleName $lb.InboundNatRules[0].Name $lbruleName2 = Get-ResourceName $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Add-AzLoadBalancerRuleConfig -Name $lbruleName2 -FrontendIPConfigurationId $lb.FrontendIPConfigurations[0].Id -BackendAddressPoolId $lb.BackendAddressPools[0].Id -ProbeId $lb.Probes[0].Id -Protocol Tcp -FrontendPort 82 -BackendPort 83 -IdleTimeoutInMinutes 15 -LoadDistribution SourceIP| Set-AzLoadBalancer Assert-AreEqual 2 @($lb.LoadBalancingRules).Count Assert-AreEqual $lbruleName2 $lb.LoadBalancingRules[1].Name Assert-AreEqual 82 $lb.LoadBalancingRules[1].FrontendPort Assert-AreEqual 83 $lb.LoadBalancingRules[1].BackendPort Assert-AreEqual false $lb.LoadBalancingRules[1].EnableFloatingIP Assert-AreEqual "SourceIP" $lb.LoadBalancingRules[1].LoadDistribution $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Set-AzLoadBalancerRuleConfig -Name $lbruleName2 -FrontendIPConfigurationId $lb.FrontendIPConfigurations[0].Id -BackendAddressPoolId $lb.BackendAddressPools[0].Id -ProbeId $lb.Probes[0].Id -Protocol Tcp -FrontendPort 84 -BackendPort 84 -IdleTimeoutInMinutes 17 -EnableFloatingIP | Set-AzLoadBalancer Assert-AreEqual 2 @($lb.LoadBalancingRules).Count Assert-AreEqual $lbruleName2 $lb.LoadBalancingRules[1].Name Assert-AreEqual 84 $lb.LoadBalancingRules[1].FrontendPort Assert-AreEqual 84 $lb.LoadBalancingRules[1].BackendPort Assert-AreEqual true $lb.LoadBalancingRules[1].EnableFloatingIP Assert-AreEqual "Default" $lb.LoadBalancingRules[1].LoadDistribution $lbruleConfig = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerRuleConfig -Name $lbruleName2 $lbruleConfigList = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerRuleConfig Assert-AreEqual 2 @($inboundNatRuleConfigList).Count Assert-AreEqual $lbruleName $lbruleConfigList[0].Name Assert-AreEqual $lbruleName2 $lbruleConfigList[1].Name Assert-AreEqual $lbruleConfig.Name $lbruleConfigList[1].Name $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Remove-AzLoadBalancerRuleConfig -Name $lbruleName2 | Set-AzLoadBalancer Assert-AreEqual 1 @($lb.LoadBalancingRules).Count Assert-AreEqual $lbruleName $lb.LoadBalancingRules[0].Name $deleteLb = $lb | Remove-AzLoadBalancer -PassThru -Force Assert-AreEqual true $deleteLb $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 0 @($list).Count } finally { Clean-ResourceGroup $rgname } } function Test-LoadBalancerSet { $rgname = Get-ResourceGroupName $vnetName = Get-ResourceName $subnetName = Get-ResourceName $publicIpName = Get-ResourceName $domainNameLabel = Get-ResourceName $lbName = Get-ResourceName $frontendName = Get-ResourceName $backendAddressPoolName = Get-ResourceName $probeName = Get-ResourceName $inboundNatRuleName = Get-ResourceName $lbruleName = Get-ResourceName $rglocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/loadBalancers" $location = Get-ProviderLocation $resourceTypeParent try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"} $subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24 $vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet $publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel $frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -SubnetId $vnet.Subnets[0].Id $backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName $probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2 $inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfigurationId $frontend.Id -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP $lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfigurationId $frontend.Id -BackendAddressPoolId $backendAddressPool.Id -ProbeId $probe.Id -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname $probeName2 = Get-ResourceName $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Add-AzLoadBalancerProbeConfig -Name $probeName2 -RequestPath healthcheck2.aspx -Protocol http -Port 81 -IntervalInSeconds 16 -ProbeCount 3 | Set-AzLoadBalancer Assert-AreEqual 2 @($lb.Probes).Count Assert-AreEqual $probeName2 $lb.Probes[1].Name Assert-AreEqual "healthcheck2.aspx" $lb.Probes[1].RequestPath Assert-AreEqual 81 $lb.Probes[1].Port $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Set-AzLoadBalancer Assert-AreEqual 2 @($lb.Probes).Count Assert-AreEqual $probeName2 $lb.Probes[1].Name Assert-AreEqual "healthcheck2.aspx" $lb.Probes[1].RequestPath Assert-AreEqual 81 $lb.Probes[1].Port $deleteLb = $lb | Remove-AzLoadBalancer -PassThru -Force Assert-AreEqual true $deleteLb $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 0 @($list).Count } finally { Clean-ResourceGroup $rgname } } function Test-CreateEmptyLoadBalancer { $rgname = Get-ResourceGroupName $lbName = Get-ResourceName $rglocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/loadBalancers" $location = Get-ProviderLocation $resourceTypeParent try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"} New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname Assert-AreEqual $lbName $lb.Name Assert-AreEqual 0 @($lb.FrontendIpConfigurations).Count Assert-AreEqual 0 @($lb.BackendAddressPools).Count Assert-AreEqual 0 @($lb.Probes).Count Assert-AreEqual 0 @($lb.InboundNatRules).Count Assert-AreEqual 0 @($lb.LoadBalancingRules).Count $deleteLb = $lb | Remove-AzLoadBalancer -PassThru -Force Assert-AreEqual true $deleteLb $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 0 @($list).Count } finally { Clean-ResourceGroup $rgname } } function Test-LoadBalancer-NicAssociation { $rgname = Get-ResourceGroupName $vnetName = Get-ResourceName $subnetName = Get-ResourceName $publicIpName = Get-ResourceName $lbName = Get-ResourceName $frontendName = Get-ResourceName $backendAddressPoolName = Get-ResourceName $probeName = Get-ResourceName $inboundNatRuleName1 = Get-ResourceName $inboundNatRuleName2 = Get-ResourceName $lbruleName = Get-ResourceName $nicname1 = Get-ResourceName $nicname2 = Get-ResourceName $nicname3 = Get-ResourceName $rglocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/loadBalancers" $location = Get-ProviderLocation $resourceTypeParent try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" } $subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24 $vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet $publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic $frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -PublicIpAddress $publicip $backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName $probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2 $inboundNatRule1 = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName1 -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP $inboundNatRule2 = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName2 -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3391 -BackendPort 3392 $lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP $lb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule1,$inboundNatRule2 -LoadBalancingRule $lbrule Assert-AreEqual $rgname $lb.ResourceGroupName Assert-AreEqual $lbName $lb.Name Assert-NotNull $lb.Location Assert-AreEqual "Succeeded" $lb.ProvisioningState Assert-AreEqual 1 @($lb.FrontendIPConfigurations).Count Assert-Null $lb.InboundNatRules[0].BackendIPConfiguration Assert-Null $lb.InboundNatRules[1].BackendIPConfiguration Assert-AreEqual 0 @($lb.BackendAddressPools[0].BackendIpConfigurations).Count $nic1 = New-AzNetworkInterface -Name $nicname1 -ResourceGroupName $rgname -Location $location -Subnet $vnet.Subnets[0] $nic2 = New-AzNetworkInterface -Name $nicname2 -ResourceGroupName $rgname -Location $location -Subnet $vnet.Subnets[0] $nic3 = New-AzNetworkInterface -Name $nicname3 -ResourceGroupName $rgname -Location $location -Subnet $vnet.Subnets[0] $nic1.IpConfigurations[0].LoadBalancerBackendAddressPools.Add($lb.BackendAddressPools[0]); $nic1.IpConfigurations[0].LoadBalancerInboundNatRules.Add($lb.InboundNatRules[0]); $nic2.IpConfigurations[0].LoadBalancerBackendAddressPools.Add($lb.BackendAddressPools[0]); $nic3.IpConfigurations[0].LoadBalancerInboundNatRules.Add($lb.InboundNatRules[1]); $nic1 = $nic1 | Set-AzNetworkInterface $nic2 = $nic2 | Set-AzNetworkInterface $nic3 = $nic3 | Set-AzNetworkInterface $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname Assert-AreEqual $nic1.IpConfigurations[0].Id $lb.InboundNatRules[0].BackendIPConfiguration.Id Assert-AreEqual $nic3.IpConfigurations[0].Id $lb.InboundNatRules[1].BackendIPConfiguration.Id Assert-AreEqual 2 @($lb.BackendAddressPools[0].BackendIpConfigurations).Count $deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force Assert-AreEqual true $deleteLb $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 0 @($list).Count } finally { Clean-ResourceGroup $rgname } } function Test-LoadBalancer-NicAssociationDuringCreate { $rgname = Get-ResourceGroupName $vnetName = Get-ResourceName $subnetName = Get-ResourceName $publicIpName = Get-ResourceName $lbName = Get-ResourceName $frontendName = Get-ResourceName $backendAddressPoolName = Get-ResourceName $probeName = Get-ResourceName $inboundNatRuleName1 = Get-ResourceName $inboundNatRuleName2 = Get-ResourceName $lbruleName = Get-ResourceName $nicname1 = Get-ResourceName $nicname2 = Get-ResourceName $nicname3 = Get-ResourceName $rglocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/loadBalancers" $location = Get-ProviderLocation $resourceTypeParent try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" } $subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24 $vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet $publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic $frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -PublicIpAddress $publicip $backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName $probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2 $inboundNatRule1 = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName1 -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP $inboundNatRule2 = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName2 -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3391 -BackendPort 3392 $lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP $lb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule1,$inboundNatRule2 -LoadBalancingRule $lbrule Assert-AreEqual $rgname $lb.ResourceGroupName Assert-AreEqual $lbName $lb.Name Assert-NotNull $lb.Location Assert-AreEqual "Succeeded" $lb.ProvisioningState Assert-AreEqual 1 @($lb.FrontendIPConfigurations).Count Assert-Null $lb.InboundNatRules[0].BackendIPConfiguration Assert-Null $lb.InboundNatRules[1].BackendIPConfiguration Assert-AreEqual 0 @($lb.BackendAddressPools[0].BackendIpConfigurations).Count $nic1 = New-AzNetworkInterface -Name $nicname1 -ResourceGroupName $rgname -Location $location -Subnet $vnet.Subnets[0] -LoadBalancerBackendAddressPool $lb.BackendAddressPools[0] -LoadBalancerInboundNatRule $lb.InboundNatRules[0] $nic2 = New-AzNetworkInterface -Name $nicname2 -ResourceGroupName $rgname -Location $location -SubnetId $vnet.Subnets[0].Id -LoadBalancerBackendAddressPoolId $lb.BackendAddressPools[0].Id $nic3 = New-AzNetworkInterface -Name $nicname3 -ResourceGroupName $rgname -Location $location -SubnetId $vnet.Subnets[0].Id -LoadBalancerInboundNatRuleId $lb.InboundNatRules[1].Id $nic1 = $nic1 | Set-AzNetworkInterface $nic2 = $nic2 | Set-AzNetworkInterface $nic3 = $nic3 | Set-AzNetworkInterface $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname Assert-AreEqual $nic1.IpConfigurations[0].Id $lb.InboundNatRules[0].BackendIPConfiguration.Id Assert-AreEqual $nic3.IpConfigurations[0].Id $lb.InboundNatRules[1].BackendIPConfiguration.Id Assert-AreEqual 2 @($lb.BackendAddressPools[0].BackendIpConfigurations).Count $deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force Assert-AreEqual true $deleteLb $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 0 @($list).Count } finally { Clean-ResourceGroup $rgname } } function Test-LoadBalancerInboundNatPoolConfigCRUD-InternalLB { $rgname = Get-ResourceGroupName $vnetName = Get-ResourceName $subnetName = Get-ResourceName $publicIpName = Get-ResourceName $domainNameLabel = Get-ResourceName $lbName = Get-ResourceName $frontendName = Get-ResourceName $rglocation = Get-ProviderLocation ResourceManagement "West US" $location = Get-ProviderLocation "Microsoft.Network/loadBalancers" "West US" try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" } $subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24 $vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet $publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel $frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -SubnetId $vnet.Subnets[0].Id New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname $inboundNatPoolName = Get-ResourceName $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname $lb = $lb | Add-AzLoadBalancerInboundNatPoolConfig -Name $inboundNatPoolName -FrontendIPConfigurationId $lb.FrontendIPConfigurations[0].Id -Protocol Tcp -FrontendPortRangeStart 3360 -FrontendPortRangeEnd 3362 -BackendPort 3370 | Set-AzLoadBalancer Assert-AreEqual 1 @($lb.InboundNatPools).Count Assert-AreEqual $inboundNatPoolName $lb.InboundNatPools[0].Name Assert-AreEqual 3360 $lb.InboundNatPools[0].FrontendPortRangeStart Assert-AreEqual 3362 $lb.InboundNatPools[0].FrontendPortRangeEnd Assert-AreEqual 3370 $lb.InboundNatPools[0].BackendPort Assert-AreEqual Tcp $lb.InboundNatPools[0].Protocol $inboundNatPoolName2 = Get-ResourceName $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Add-AzLoadBalancerInboundNatPoolConfig -Name $inboundNatPoolName2 -FrontendIPConfigurationId $lb.FrontendIPConfigurations[0].Id -Protocol Udp -FrontendPortRangeStart 3366 -FrontendPortRangeEnd 3368 -BackendPort 3376 | Set-AzLoadBalancer Assert-AreEqual 2 @($lb.InboundNatPools).Count Assert-AreEqual $inboundNatPoolName2 $lb.InboundNatPools[1].Name Assert-AreEqual 3366 $lb.InboundNatPools[1].FrontendPortRangeStart Assert-AreEqual 3368 $lb.InboundNatPools[1].FrontendPortRangeEnd Assert-AreEqual 3376 $lb.InboundNatPools[1].BackendPort Assert-AreEqual Udp $lb.InboundNatPools[1].Protocol $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Set-AzLoadBalancerInboundNatPoolConfig -Name $inboundNatPoolName2 -FrontendIPConfigurationId $lb.FrontendIPConfigurations[0].Id -Protocol Tcp -FrontendPortRangeStart 3363 -FrontendPortRangeEnd 3364 -BackendPort 3373 | Set-AzLoadBalancer Assert-AreEqual 2 @($lb.InboundNatPools).Count Assert-AreEqual $inboundNatPoolName2 $lb.InboundNatPools[1].Name Assert-AreEqual 3363 $lb.InboundNatPools[1].FrontendPortRangeStart Assert-AreEqual 3364 $lb.InboundNatPools[1].FrontendPortRangeEnd Assert-AreEqual 3373 $lb.InboundNatPools[1].BackendPort Assert-AreEqual Tcp $lb.InboundNatPools[1].Protocol $inboundNatPoolConfig = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerInboundNatPoolConfig -Name $inboundNatPoolName2 $inboundNatPoolConfigList = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerInboundNatPoolConfig Assert-AreEqual 2 @($inboundNatPoolConfigList).Count Assert-AreEqual $inboundNatPoolName $inboundNatPoolConfigList[0].Name Assert-AreEqual $inboundNatPoolName2 $inboundNatPoolConfigList[1].Name Assert-AreEqual $inboundNatPoolConfig.Name $inboundNatPoolConfigList[1].Name $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Remove-AzLoadBalancerInboundNatPoolConfig -Name $inboundNatPoolName2 | Set-AzLoadBalancer Assert-AreEqual 1 @($lb.InboundNatPools).Count Assert-AreEqual $inboundNatPoolName $lb.InboundNatPools[0].Name $deleteLb = $lb | Remove-AzLoadBalancer -PassThru -Force Assert-AreEqual true $deleteLb $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 0 @($list).Count } finally { Clean-ResourceGroup $rgname } } function Test-LoadBalancerInboundNatPoolConfigCRUD-PublicLB { $rgname = Get-ResourceGroupName $vnetName = Get-ResourceName $subnetName = Get-ResourceName $publicIpName = Get-ResourceName $domainNameLabel = Get-ResourceName $lbName = Get-ResourceName $frontendName = Get-ResourceName $inboundNatPoolName = Get-ResourceName $rglocation = Get-ProviderLocation ResourceManagement "West US" $location = Get-ProviderLocation "Microsoft.Network/loadBalancers" "West US" try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" } $publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel $frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -PublicIpAddress $publicip $inboundNatPool = New-AzLoadBalancerInboundNatPoolConfig -Name $inboundNatPoolName -FrontendIPConfigurationId $frontend.Id -Protocol Tcp -FrontendPortRangeStart 3360 -FrontendPortRangeEnd 3362 -BackendPort 3370 $actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -InboundNatPool $inboundNatPool $expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName Assert-AreEqual $expectedLb.Name $actualLb.Name Assert-AreEqual $expectedLb.Location $actualLb.Location Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState Assert-NotNull $expectedLb.ResourceGuid Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count Assert-AreEqual 1 @($expectedLb.InboundNatPools).Count Assert-AreEqual $inboundNatPoolName $expectedLb.InboundNatPools[0].Name Assert-AreEqual 3360 $expectedLb.InboundNatPools[0].FrontendPortRangeStart Assert-AreEqual 3362 $expectedLb.InboundNatPools[0].FrontendPortRangeEnd Assert-AreEqual 3370 $expectedLb.InboundNatPools[0].BackendPort Assert-AreEqual Tcp $expectedLb.InboundNatPools[0].Protocol Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.InboundNatPools[0].FrontendIPConfiguration.Id $inboundNatPoolName2 = Get-ResourceName $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname $lb = Add-AzLoadBalancerInboundNatPoolConfig -LoadBalancer $lb -Name $inboundNatPoolName2 -FrontendIPConfiguration $lb.FrontendIPConfigurations[0] -Protocol Udp -FrontendPortRangeStart 3366 -FrontendPortRangeEnd 3368 -BackendPort 3376 | Set-AzLoadBalancer Assert-AreEqual 2 @($lb.InboundNatPools).Count Assert-AreEqual $inboundNatPoolName2 $lb.InboundNatPools[1].Name Assert-AreEqual 3366 $lb.InboundNatPools[1].FrontendPortRangeStart Assert-AreEqual 3368 $lb.InboundNatPools[1].FrontendPortRangeEnd Assert-AreEqual 3376 $lb.InboundNatPools[1].BackendPort Assert-AreEqual Udp $lb.InboundNatPools[1].Protocol $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Set-AzLoadBalancerInboundNatPoolConfig -Name $inboundNatPoolName2 -FrontendIPConfigurationId $lb.FrontendIPConfigurations[0].Id -Protocol Tcp -FrontendPortRangeStart 3363 -FrontendPortRangeEnd 3364 -BackendPort 3373 | Set-AzLoadBalancer Assert-AreEqual 2 @($lb.InboundNatPools).Count Assert-AreEqual $inboundNatPoolName2 $lb.InboundNatPools[1].Name Assert-AreEqual 3363 $lb.InboundNatPools[1].FrontendPortRangeStart Assert-AreEqual 3364 $lb.InboundNatPools[1].FrontendPortRangeEnd Assert-AreEqual 3373 $lb.InboundNatPools[1].BackendPort Assert-AreEqual Tcp $lb.InboundNatPools[1].Protocol $inboundNatPoolConfig = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerInboundNatPoolConfig -Name $inboundNatPoolName2 $inboundNatPoolConfigList = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerInboundNatPoolConfig Assert-AreEqual 2 @($inboundNatPoolConfigList).Count Assert-AreEqual $inboundNatPoolName $inboundNatPoolConfigList[0].Name Assert-AreEqual $inboundNatPoolName2 $inboundNatPoolConfigList[1].Name Assert-AreEqual $inboundNatPoolConfig.Name $inboundNatPoolConfigList[1].Name $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Remove-AzLoadBalancerInboundNatPoolConfig -Name $inboundNatPoolName2 | Set-AzLoadBalancer Assert-AreEqual 1 @($lb.InboundNatPools).Count Assert-AreEqual $inboundNatPoolName $lb.InboundNatPools[0].Name $deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force Assert-AreEqual true $deleteLb $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 0 @($list).Count } finally { Clean-ResourceGroup $rgname } } function Test-LoadBalancerMultiVip-Public { $rgname = Get-ResourceGroupName $publicIp1Name = Get-ResourceName $publicIp2Name = Get-ResourceName $publicIp3Name = Get-ResourceName $publicIp4Name = Get-ResourceName $lbName = Get-ResourceName $frontend1Name = Get-ResourceName $frontend2Name = Get-ResourceName $frontend3Name = Get-ResourceName $frontend4Name = Get-ResourceName $backendAddressPoolName = Get-ResourceName $probeName = Get-ResourceName $inboundNatRuleName = Get-ResourceName $lbruleName = Get-ResourceName $rglocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/loadBalancers" $location = Get-ProviderLocation $resourceTypeParent try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" } $publicip1 = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIp1Name -location $location -AllocationMethod Dynamic $publicip2 = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIp2Name -location $location -AllocationMethod Dynamic $publicip3 = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIp3Name -location $location -AllocationMethod Dynamic $publicip4 = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIp4Name -location $location -AllocationMethod Dynamic $frontend1 = New-AzLoadBalancerFrontendIpConfig -Name $frontend1Name -PublicIpAddress $publicip1 $frontend2 = New-AzLoadBalancerFrontendIpConfig -Name $frontend2Name -PublicIpAddressId $publicip2.Id $backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName $probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2 $inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfiguration $frontend1 -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP $lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend2 -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP $lb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend1,$frontend2 -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule Assert-AreEqual $rgname $lb.ResourceGroupName Assert-AreEqual $lbName $lb.Name Assert-NotNull $lb.Location Assert-AreEqual "Succeeded" $lb.ProvisioningState Assert-NotNull $lb.ResourceGuid Assert-AreEqual 2 @($lb.FrontendIPConfigurations).Count Assert-AreEqual $frontend1Name $lb.FrontendIPConfigurations[0].Name Assert-AreEqual $publicip1.Id $lb.FrontendIPConfigurations[0].PublicIpAddress.Id Assert-Null $lb.FrontendIPConfigurations[0].Subnet Assert-AreEqual $frontend2Name $lb.FrontendIPConfigurations[1].Name Assert-AreEqual $publicip2.Id $lb.FrontendIPConfigurations[1].PublicIpAddress.Id Assert-Null $lb.FrontendIPConfigurations[1].Subnet Assert-AreEqual $backendAddressPoolName $lb.BackendAddressPools[0].Name Assert-AreEqual $probeName $lb.Probes[0].Name Assert-NotNull $lb.Probes[0].RequestPath Assert-AreEqual $inboundNatRuleName $lb.InboundNatRules[0].Name Assert-AreEqual $lb.FrontendIPConfigurations[0].Id $lb.InboundNatRules[0].FrontendIPConfiguration.Id Assert-AreEqual $lbruleName $lb.LoadBalancingRules[0].Name Assert-AreEqual $lb.FrontendIPConfigurations[1].Id $lb.LoadBalancingRules[0].FrontendIPConfiguration.Id Assert-AreEqual $lb.BackendAddressPools[0].Id $lb.LoadBalancingRules[0].BackendAddressPool.Id $publicip1 = Get-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIp1Name Assert-AreEqual $lb.FrontendIPConfigurations[0].Id $publicip1.IpConfiguration.Id $publicip2 = Get-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIp2Name Assert-AreEqual $lb.FrontendIPConfigurations[1].Id $publicip2.IpConfiguration.Id $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Add-AzLoadBalancerFrontendIpConfig -Name $frontend3Name -PublicIpAddress $publicip3 | Set-AzLoadBalancer Assert-AreEqual 3 @($lb.FrontendIPConfigurations).Count Assert-AreEqual $frontend3Name $lb.FrontendIPConfigurations[2].Name Assert-AreEqual $publicip3.Id $lb.FrontendIPConfigurations[2].PublicIpAddress.Id Assert-Null $lb.FrontendIPConfigurations[2].Subnet $publicip3 = Get-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIp3Name Assert-AreEqual $lb.FrontendIPConfigurations[2].Id $publicip3.IpConfiguration.Id $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Set-AzLoadBalancerFrontendIpConfig -Name $frontend3Name -PublicIpAddress $publicip4 | Set-AzLoadBalancer Assert-AreEqual 3 @($lb.FrontendIPConfigurations).Count Assert-AreEqual $frontend3Name $lb.FrontendIPConfigurations[2].Name Assert-AreEqual $publicip4.Id $lb.FrontendIPConfigurations[2].PublicIpAddress.Id Assert-Null $lb.FrontendIPConfigurations[2].Subnet $publicip3 = Get-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIp3Name Assert-Null $publicip3.IpConfiguration $publicip4 = Get-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIp4Name Assert-AreEqual $lb.FrontendIPConfigurations[2].Id $publicip4.IpConfiguration.Id $frontendip = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerFrontendIpConfig -Name $frontend3Name Assert-AreEqual $frontend3Name $frontendip.Name Assert-AreEqual $publicip4.Id $frontendip.PublicIpAddress.Id Assert-Null $frontendip.Subnet $frontendips = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerFrontendIpConfig Assert-AreEqual 3 @($frontendips).Count $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Remove-AzLoadBalancerFrontendIpConfig -Name $frontend3Name | Set-AzLoadBalancer Assert-AreEqual 2 @($lb.FrontendIPConfigurations).Count Assert-AreEqual $frontend1Name $lb.FrontendIPConfigurations[0].Name Assert-AreEqual $publicip1.Id $lb.FrontendIPConfigurations[0].PublicIpAddress.Id Assert-Null $lb.FrontendIPConfigurations[0].Subnet Assert-AreEqual $frontend2Name $lb.FrontendIPConfigurations[1].Name Assert-AreEqual $publicip2.Id $lb.FrontendIPConfigurations[1].PublicIpAddress.Id Assert-Null $lb.FrontendIPConfigurations[1].Subnet $deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force Assert-AreEqual true $deleteLb $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 0 @($list).Count $publicip1 = Get-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIp1Name Assert-Null $publicip1.IpConfiguration $publicip2 = Get-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIp2Name Assert-Null $publicip2.IpConfiguration } finally { Clean-ResourceGroup $rgname } } function Test-LoadBalancerMultiVip-Internal { $rgname = Get-ResourceGroupName $subnet1Name = Get-ResourceName $subnet2Name = Get-ResourceName $vnetName = Get-ResourceName $lbName = Get-ResourceName $frontend1Name = Get-ResourceName $frontend2Name = Get-ResourceName $frontend3Name = Get-ResourceName $frontend4Name = Get-ResourceName $backendAddressPoolName = Get-ResourceName $probeName = Get-ResourceName $inboundNatRuleName = Get-ResourceName $lbruleName = Get-ResourceName $rglocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/loadBalancers" $location = Get-ProviderLocation $resourceTypeParent try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation $subnet1 = New-AzVirtualNetworkSubnetConfig -Name $subnet1Name -AddressPrefix 10.0.0.0/24 $subnet2 = New-AzVirtualNetworkSubnetConfig -Name $subnet2Name -AddressPrefix 10.0.1.0/24 $vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet1,$subnet2 $frontend1 = New-AzLoadBalancerFrontendIpConfig -Name $frontend1Name -Subnet $vnet.Subnets[0] $frontend2 = New-AzLoadBalancerFrontendIpConfig -Name $frontend2Name -SubnetId $vnet.Subnets[1].Id $backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName $probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2 $inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfiguration $frontend1 -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP $lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend2 -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP $lb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend1,$frontend2 -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule Assert-AreEqual $rgname $lb.ResourceGroupName Assert-AreEqual $lbName $lb.Name Assert-NotNull $lb.Location Assert-AreEqual "Succeeded" $lb.ProvisioningState Assert-NotNull $lb.ResourceGuid Assert-AreEqual 2 @($lb.FrontendIPConfigurations).Count Assert-AreEqual $frontend1Name $lb.FrontendIPConfigurations[0].Name Assert-AreEqual $vnet.Subnets[0].Id $lb.FrontendIPConfigurations[0].Subnet.Id Assert-Null $lb.FrontendIPConfigurations[0].PublicIpAddress Assert-AreEqual $frontend2Name $lb.FrontendIPConfigurations[1].Name Assert-AreEqual $vnet.Subnets[1].Id $lb.FrontendIPConfigurations[1].Subnet.Id Assert-Null $lb.FrontendIPConfigurations[1].PublicIpAddress Assert-AreEqual $backendAddressPoolName $lb.BackendAddressPools[0].Name Assert-AreEqual $probeName $lb.Probes[0].Name Assert-NotNull $lb.Probes[0].RequestPath Assert-AreEqual $inboundNatRuleName $lb.InboundNatRules[0].Name Assert-AreEqual $lb.FrontendIPConfigurations[0].Id $lb.InboundNatRules[0].FrontendIPConfiguration.Id Assert-AreEqual $lbruleName $lb.LoadBalancingRules[0].Name Assert-AreEqual $lb.FrontendIPConfigurations[1].Id $lb.LoadBalancingRules[0].FrontendIPConfiguration.Id Assert-AreEqual $lb.BackendAddressPools[0].Id $lb.LoadBalancingRules[0].BackendAddressPool.Id $vnet = Get-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname Assert-AreEqual 1 @($vnet.Subnets[0].IpConfigurations).Count Assert-AreEqual $lb.FrontendIPConfigurations[0].Id $vnet.Subnets[0].IpConfigurations[0].Id Assert-AreEqual 1 @($vnet.Subnets[1].IpConfigurations).Count Assert-AreEqual $lb.FrontendIPConfigurations[1].Id $vnet.Subnets[1].IpConfigurations[0].Id $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Add-AzLoadBalancerFrontendIpConfig -Name $frontend3Name -Subnet $vnet.Subnets[1] | Set-AzLoadBalancer Assert-AreEqual 3 @($lb.FrontendIPConfigurations).Count Assert-AreEqual $frontend3Name $lb.FrontendIPConfigurations[2].Name Assert-AreEqual $vnet.Subnets[1].Id $lb.FrontendIPConfigurations[2].Subnet.Id Assert-Null $lb.FrontendIPConfigurations[2].PublicIpAddress $vnet = Get-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname Assert-AreEqual 1 @($vnet.Subnets[0].IpConfigurations).Count Assert-AreEqual $lb.FrontendIPConfigurations[0].Id $vnet.Subnets[0].IpConfigurations[0].Id Assert-AreEqual 2 @($vnet.Subnets[1].IpConfigurations).Count Assert-AreEqual $lb.FrontendIPConfigurations[1].Id $vnet.Subnets[1].IpConfigurations[0].Id Assert-AreEqual $lb.FrontendIPConfigurations[2].Id $vnet.Subnets[1].IpConfigurations[1].Id $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Set-AzLoadBalancerFrontendIpConfig -Name $frontend3Name -SubnetId $vnet.Subnets[0].Id | Set-AzLoadBalancer Assert-AreEqual 3 @($lb.FrontendIPConfigurations).Count Assert-AreEqual $frontend3Name $lb.FrontendIPConfigurations[2].Name Assert-AreEqual $vnet.Subnets[0].Id $lb.FrontendIPConfigurations[2].Subnet.Id Assert-Null $lb.FrontendIPConfigurations[2].PublicIpAddress $vnet = Get-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname Assert-AreEqual 2 @($vnet.Subnets[0].IpConfigurations).Count Assert-AreEqual $lb.FrontendIPConfigurations[0].Id $vnet.Subnets[0].IpConfigurations[0].Id Assert-AreEqual $lb.FrontendIPConfigurations[2].Id $vnet.Subnets[0].IpConfigurations[1].Id Assert-AreEqual 1 @($vnet.Subnets[1].IpConfigurations).Count Assert-AreEqual $lb.FrontendIPConfigurations[1].Id $vnet.Subnets[1].IpConfigurations[0].Id $frontendip = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerFrontendIpConfig -Name $frontend3Name Assert-AreEqual $frontend3Name $frontendip.Name Assert-AreEqual $vnet.Subnets[0].Id $frontendip.Subnet.Id Assert-Null $frontendip.PublicIpAddress $frontendips = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Get-AzLoadBalancerFrontendIpConfig Assert-AreEqual 3 @($frontendips).Count $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname | Remove-AzLoadBalancerFrontendIpConfig -Name $frontend3Name | Set-AzLoadBalancer Assert-AreEqual 2 @($lb.FrontendIPConfigurations).Count Assert-AreEqual $frontend1Name $lb.FrontendIPConfigurations[0].Name Assert-AreEqual $vnet.Subnets[0].Id $lb.FrontendIPConfigurations[0].Subnet.Id Assert-Null $lb.FrontendIPConfigurations[0].PublicIpAddress Assert-AreEqual $frontend2Name $lb.FrontendIPConfigurations[1].Name Assert-AreEqual $vnet.Subnets[1].Id $lb.FrontendIPConfigurations[1].Subnet.Id Assert-Null $lb.FrontendIPConfigurations[1].PublicIpAddress $deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force Assert-AreEqual true $deleteLb $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 0 @($list).Count $vnet = Get-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname Assert-AreEqual 0 @($vnet.Subnets[0].IpConfigurations).Count Assert-AreEqual 0 @($vnet.Subnets[1].IpConfigurations).Count } finally { Clean-ResourceGroup $rgname } } function Test-SetLoadBalancerObjectAssignment { $rgname = Get-ResourceGroupName $vnetName = Get-ResourceName $subnetName = Get-ResourceName $publicIpName = Get-ResourceName $domainNameLabel = Get-ResourceName $lbName = Get-ResourceName $frontendName = Get-ResourceName $backendAddressPoolName = Get-ResourceName $probeName = Get-ResourceName $inboundNatRuleName = Get-ResourceName $lbruleName = Get-ResourceName $rglocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/loadBalancers" $location = Get-ProviderLocation $resourceTypeParent try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" } $publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel $frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -PublicIpAddress $publicip $backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName $probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2 $inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP $lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP $lb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule Assert-AreEqual $rgname $lb.ResourceGroupName Assert-AreEqual $lbName $lb.Name Assert-NotNull $lb.Location Assert-AreEqual "Succeeded" $lb.ProvisioningState Assert-NotNull $lb.ResourceGuid Assert-AreEqual 1 @($lb.FrontendIPConfigurations).Count Assert-AreEqual $frontendName $lb.FrontendIPConfigurations[0].Name Assert-AreEqual $publicip.Id $lb.FrontendIPConfigurations[0].PublicIpAddress.Id Assert-Null $lb.FrontendIPConfigurations[0].PrivateIpAddress Assert-AreEqual $backendAddressPoolName $lb.BackendAddressPools[0].Name Assert-AreEqual $probeName $lb.Probes[0].Name Assert-AreEqual $probe.RequestPath $lb.Probes[0].RequestPath Assert-AreEqual $inboundNatRuleName $lb.InboundNatRules[0].Name Assert-AreEqual $lb.FrontendIPConfigurations[0].Id $lb.InboundNatRules[0].FrontendIPConfiguration.Id Assert-AreEqual $lbruleName $lb.LoadBalancingRules[0].Name Assert-AreEqual $lb.FrontendIPConfigurations[0].Id $lb.LoadBalancingRules[0].FrontendIPConfiguration.Id Assert-AreEqual $lb.BackendAddressPools[0].Id $lb.LoadBalancingRules[0].BackendAddressPool.Id Assert-Null $lb.LoadBalancingRules[0].Probe $lb.LoadBalancingRules[0].Probe = $lb.Probes[0] $lb = $lb | Set-AzLoadBalancer Assert-NotNull $lb.LoadBalancingRules[0].Probe Assert-AreEqual $lb.LoadBalancingRules[0].Probe.Id $lb.Probes[0].Id $deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force Assert-AreEqual true $deleteLb $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 0 @($list).Count } finally { Clean-ResourceGroup $rgname } } function Test-LoadBalancerCRUD-PublicBasicSku { $rgname = Get-ResourceGroupName $vnetName = Get-ResourceName $subnetName = Get-ResourceName $publicIpName = Get-ResourceName $domainNameLabel = Get-ResourceName $lbName = Get-ResourceName $frontendName = Get-ResourceName $backendAddressPoolName = Get-ResourceName $probeName = Get-ResourceName $inboundNatRuleName = Get-ResourceName $lbruleName = Get-ResourceName $rglocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/loadBalancers" $location = Get-ProviderLocation $resourceTypeParent try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"} $subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24 $vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet $publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel $frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -PublicIpAddress $publicip $backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName $probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2 $inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP $lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP $actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule -Sku Basic $expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName Assert-AreEqual $expectedLb.Name $actualLb.Name Assert-AreEqual $expectedLb.Location $actualLb.Location Assert-AreEqualObjectProperties $expectedLb.Sku $actualLb.Sku Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState Assert-NotNull $expectedLb.ResourceGuid Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name Assert-AreEqual $publicip.Id $expectedLb.FrontendIPConfigurations[0].PublicIpAddress.Id Assert-Null $expectedLb.FrontendIPConfigurations[0].PrivateIpAddress Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name Assert-AreEqual $probeName $expectedLb.Probes[0].Name Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath Assert-AreEqual $inboundNatRuleName $expectedLb.InboundNatRules[0].Name Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.InboundNatRules[0].FrontendIPConfiguration.Id Assert-AreEqual $lbruleName $expectedLb.LoadBalancingRules[0].Name Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.LoadBalancingRules[0].FrontendIPConfiguration.Id Assert-AreEqual $expectedLb.BackendAddressPools[0].Id $expectedLb.LoadBalancingRules[0].BackendAddressPool.Id $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 1 @($list).Count Assert-AreEqual $expectedLb.Etag $list[0].Etag Assert-AreEqualObjectProperties $expectedLb.Sku $list[0].Sku Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Etag $list[0].FrontendIPConfigurations[0].Etag Assert-AreEqual $expectedLb.BackendAddressPools[0].Etag $list[0].BackendAddressPools[0].Etag Assert-AreEqual $expectedLb.InboundNatRules[0].Etag $list[0].InboundNatRules[0].Etag Assert-AreEqual $expectedLb.Probes[0].Etag $list[0].Probes[0].Etag Assert-AreEqual $expectedLb.LoadBalancingRules[0].Etag $list[0].LoadBalancingRules[0].Etag $deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force Assert-AreEqual true $deleteLb $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 0 @($list).Count } finally { Clean-ResourceGroup $rgname } } function Test-LoadBalancerCRUD-InternalBasicSku { $rgname = Get-ResourceGroupName $vnetName = Get-ResourceName $subnetName = Get-ResourceName $publicIpName = Get-ResourceName $domainNameLabel = Get-ResourceName $lbName = Get-ResourceName $frontendName = Get-ResourceName $backendAddressPoolName = Get-ResourceName $probeName = Get-ResourceName $inboundNatRuleName = Get-ResourceName $lbruleName = Get-ResourceName $rglocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/loadBalancers" $location = Get-ProviderLocation $resourceTypeParent try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"} $subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24 $vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet $publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Dynamic -DomainNameLabel $domainNameLabel $frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -Subnet $vnet.Subnets[0] $backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName $probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2 $inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP $lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP $actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule -Sku Basic $expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName Assert-AreEqual $expectedLb.Name $actualLb.Name Assert-AreEqual $expectedLb.Location $actualLb.Location Assert-AreEqualObjectProperties $expectedLb.Sku $actualLb.Sku Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name Assert-AreEqual $vnet.Subnets[0].Id $expectedLb.FrontendIPConfigurations[0].Subnet.Id Assert-NotNull $expectedLb.FrontendIPConfigurations[0].PrivateIpAddress Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name Assert-AreEqual $probeName $expectedLb.Probes[0].Name Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath Assert-AreEqual $inboundNatRuleName $expectedLb.InboundNatRules[0].Name Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.InboundNatRules[0].FrontendIPConfiguration.Id Assert-AreEqual $lbruleName $expectedLb.LoadBalancingRules[0].Name Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.LoadBalancingRules[0].FrontendIPConfiguration.Id Assert-AreEqual $expectedLb.BackendAddressPools[0].Id $expectedLb.LoadBalancingRules[0].BackendAddressPool.Id $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 1 @($list).Count Assert-AreEqual $expectedLb.Etag $list[0].Etag Assert-AreEqualObjectProperties $expectedLb.Sku $list[0].Sku Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Etag $list[0].FrontendIPConfigurations[0].Etag Assert-AreEqual $expectedLb.BackendAddressPools[0].Etag $list[0].BackendAddressPools[0].Etag Assert-AreEqual $expectedLb.InboundNatRules[0].Etag $list[0].InboundNatRules[0].Etag Assert-AreEqual $expectedLb.Probes[0].Etag $list[0].Probes[0].Etag Assert-AreEqual $expectedLb.LoadBalancingRules[0].Etag $list[0].LoadBalancingRules[0].Etag $deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force Assert-AreEqual true $deleteLb $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 0 @($list).Count } finally { Clean-ResourceGroup $rgname } } function Test-LoadBalancerCRUD-PublicStandardSku { $rgname = Get-ResourceGroupName $vnetName = Get-ResourceName $subnetName = Get-ResourceName $publicIpName = Get-ResourceName $domainNameLabel = Get-ResourceName $lbName = Get-ResourceName $frontendName = Get-ResourceName $backendAddressPoolName = Get-ResourceName $probeName = Get-ResourceName $inboundNatRuleName = Get-ResourceName $lbruleName = Get-ResourceName $rglocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/loadBalancers" $location = Get-ProviderLocation $resourceTypeParent try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"} $subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24 $vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet $publicip = New-AzPublicIpAddress -ResourceGroupName $rgname -name $publicIpName -location $location -AllocationMethod Static -DomainNameLabel $domainNameLabel -Sku Standard $frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -PublicIpAddress $publicip $backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName $probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2 $inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP $lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP -DisableOutboundSNAT $actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule -Sku Standard $expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName Assert-AreEqual $expectedLb.Name $actualLb.Name Assert-AreEqual $expectedLb.Location $actualLb.Location Assert-AreEqualObjectProperties $expectedLb.Sku $actualLb.Sku Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState Assert-NotNull $expectedLb.ResourceGuid Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name Assert-AreEqual $publicip.Id $expectedLb.FrontendIPConfigurations[0].PublicIpAddress.Id Assert-Null $expectedLb.FrontendIPConfigurations[0].PrivateIpAddress Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name Assert-AreEqual $probeName $expectedLb.Probes[0].Name Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath Assert-AreEqual $inboundNatRuleName $expectedLb.InboundNatRules[0].Name Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.InboundNatRules[0].FrontendIPConfiguration.Id Assert-AreEqual $lbruleName $expectedLb.LoadBalancingRules[0].Name Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.LoadBalancingRules[0].FrontendIPConfiguration.Id Assert-AreEqual $expectedLb.BackendAddressPools[0].Id $expectedLb.LoadBalancingRules[0].BackendAddressPool.Id $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 1 @($list).Count Assert-AreEqual $expectedLb.Etag $list[0].Etag Assert-AreEqualObjectProperties $expectedLb.Sku $list[0].Sku Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Etag $list[0].FrontendIPConfigurations[0].Etag Assert-AreEqual $expectedLb.BackendAddressPools[0].Etag $list[0].BackendAddressPools[0].Etag Assert-AreEqual $expectedLb.InboundNatRules[0].Etag $list[0].InboundNatRules[0].Etag Assert-AreEqual $expectedLb.Probes[0].Etag $list[0].Probes[0].Etag Assert-AreEqual $expectedLb.LoadBalancingRules[0].Etag $list[0].LoadBalancingRules[0].Etag $deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force Assert-AreEqual true $deleteLb $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 0 @($list).Count } finally { Clean-ResourceGroup $rgname } } function Test-LoadBalancerCRUD-InternalStandardSku { $rgname = Get-ResourceGroupName $vnetName = Get-ResourceName $subnetName = Get-ResourceName $lbName = Get-ResourceName $frontendName = Get-ResourceName $backendAddressPoolName = Get-ResourceName $probeName = Get-ResourceName $inboundNatRuleName = Get-ResourceName $lbruleName = Get-ResourceName $rglocation = Get-ProviderLocation ResourceManagement $resourceTypeParent = "Microsoft.Network/loadBalancers" $location = Get-ProviderLocation $resourceTypeParent try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval"} $subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24 $vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/16 -Subnet $subnet $frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -Subnet $vnet.Subnets[0] $backendAddressPool = New-AzLoadBalancerBackendAddressPoolConfig -Name $backendAddressPoolName $probe = New-AzLoadBalancerProbeConfig -Name $probeName -RequestPath healthcheck.aspx -Protocol http -Port 80 -IntervalInSeconds 15 -ProbeCount 2 $inboundNatRule = New-AzLoadBalancerInboundNatRuleConfig -Name $inboundNatRuleName -FrontendIPConfiguration $frontend -Protocol Tcp -FrontendPort 3389 -BackendPort 3389 -IdleTimeoutInMinutes 15 -EnableFloatingIP $lbrule = New-AzLoadBalancerRuleConfig -Name $lbruleName -FrontendIPConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -Protocol Tcp -FrontendPort 80 -BackendPort 80 -IdleTimeoutInMinutes 15 -EnableFloatingIP -LoadDistribution SourceIP -DisableOutboundSNAT $actualLb = New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location -FrontendIpConfiguration $frontend -BackendAddressPool $backendAddressPool -Probe $probe -InboundNatRule $inboundNatRule -LoadBalancingRule $lbrule -Sku Standard $expectedLb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname Assert-AreEqual $expectedLb.ResourceGroupName $actualLb.ResourceGroupName Assert-AreEqual $expectedLb.Name $actualLb.Name Assert-AreEqual $expectedLb.Location $actualLb.Location Assert-AreEqualObjectProperties $expectedLb.Sku $actualLb.Sku Assert-AreEqual "Succeeded" $expectedLb.ProvisioningState Assert-AreEqual 1 @($expectedLb.FrontendIPConfigurations).Count Assert-AreEqual $frontendName $expectedLb.FrontendIPConfigurations[0].Name Assert-AreEqual $vnet.Subnets[0].Id $expectedLb.FrontendIPConfigurations[0].Subnet.Id Assert-NotNull $expectedLb.FrontendIPConfigurations[0].PrivateIpAddress Assert-AreEqual $backendAddressPoolName $expectedLb.BackendAddressPools[0].Name Assert-AreEqual $probeName $expectedLb.Probes[0].Name Assert-AreEqual $probe.RequestPath $expectedLb.Probes[0].RequestPath Assert-AreEqual $inboundNatRuleName $expectedLb.InboundNatRules[0].Name Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.InboundNatRules[0].FrontendIPConfiguration.Id Assert-AreEqual $lbruleName $expectedLb.LoadBalancingRules[0].Name Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Id $expectedLb.LoadBalancingRules[0].FrontendIPConfiguration.Id Assert-AreEqual $expectedLb.BackendAddressPools[0].Id $expectedLb.LoadBalancingRules[0].BackendAddressPool.Id Assert-AreEqual true $expectedlb.LoadBalancingRules[0].DisableOutboundSNAT Assert-AreEqual true $actualLb.LoadBalancingRules[0].DisableOutboundSNAT $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 1 @($list).Count Assert-AreEqual $expectedLb.Etag $list[0].Etag Assert-AreEqualObjectProperties $expectedLb.Sku $list[0].Sku Assert-AreEqual $expectedLb.FrontendIPConfigurations[0].Etag $list[0].FrontendIPConfigurations[0].Etag Assert-AreEqual $expectedLb.BackendAddressPools[0].Etag $list[0].BackendAddressPools[0].Etag Assert-AreEqual $expectedLb.InboundNatRules[0].Etag $list[0].InboundNatRules[0].Etag Assert-AreEqual $expectedLb.Probes[0].Etag $list[0].Probes[0].Etag Assert-AreEqual $expectedLb.LoadBalancingRules[0].Etag $list[0].LoadBalancingRules[0].Etag Assert-AreEqual $expectedlb.LoadBalancingRules[0].DisableOutboundSNAT $actualLb.LoadBalancingRules[0].DisableOutboundSNAT $deleteLb = Remove-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -PassThru -Force Assert-AreEqual true $deleteLb $list = Get-AzLoadBalancer -ResourceGroupName $rgname Assert-AreEqual 0 @($list).Count } finally { Clean-ResourceGroup $rgname } } function Test-LoadBalancerZones { $rgname = Get-ResourceGroupName $rname = Get-ResourceName $subnetName = Get-ResourceName $vnetName = Get-ResourceName $frontendName = Get-ResourceName $zones = "1"; $rglocation = Get-ProviderLocation ResourceManagement $location = Get-ProviderLocation "Microsoft.Network/loadBalancers" "Central US" try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $rglocation -Tags @{ testtag = "testval" } $subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24 $vnet = New-AzVirtualNetwork -Name $vnetName -ResourceGroupName $rgname -Location $location -AddressPrefix 10.0.0.0/8 -Subnet $subnet $subnet = Get-AzVirtualNetworkSubnetConfig -Name $subnetName -VirtualNetwork $vnet $frontend = New-AzLoadBalancerFrontendIpConfig -Name $frontendName -Subnet $subnet -Zone $zones $actual = New-AzLoadBalancer -ResourceGroupName $rgname -name $rname -location $location -frontendIpConfiguration $frontend; $expected = Get-AzLoadBalancer -ResourceGroupName $rgname -name $rname Assert-AreEqual $expected.ResourceGroupName $actual.ResourceGroupName Assert-AreEqual $expected.Name $actual.Name Assert-AreEqual $expected.Location $actual.Location Assert-NotNull $expected.ResourceGuid Assert-AreEqual "Succeeded" $expected.ProvisioningState Assert-NotNull $expected.frontendIpConfigurations Assert-NotNull $expected.frontendIpConfigurations[0] Assert-NotNull $expected.frontendIpConfigurations[0].zones Assert-AreEqual $zones $expected.frontendIpConfigurations[0].zones[0] } finally { Clean-ResourceGroup $rgname } } function Test-CreateSubresourcesOnEmptyLoadBalancer { $rgname = Get-ResourceGroupName $lbName = Get-ResourceName $location = Get-ProviderLocation "Microsoft.Network/loadBalancers" $poolName = Get-ResourceName $ipConfigName = Get-ResourceName $natPoolName = Get-ResourceName $natRuleName = Get-ResourceName $probeName = Get-ResourceName $ruleName = Get-ResourceName $subnetName = Get-ResourceName $vnetName = Get-ResourceName try { $resourceGroup = New-AzResourceGroup -Name $rgname -Location $location $subnet = New-AzVirtualNetworkSubnetConfig -Name $subnetName -AddressPrefix 10.0.1.0/24 $vnet = New-AzVirtualNetwork -ResourceGroupName $rgname -Location $location -Name $vnetName -Subnet $subnet -AddressPrefix 10.0.0.0/8 $subnet = Get-AzVirtualNetworkSubnetConfig -Name $subnetName -VirtualNetwork $vnet New-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname -Location $location $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname Assert-AreEqual $lbName $lb.Name Assert-AreEqual 0 @($lb.FrontendIpConfigurations).Count Assert-AreEqual 0 @($lb.BackendAddressPools).Count Assert-AreEqual 0 @($lb.Probes).Count Assert-AreEqual 0 @($lb.LoadBalancingRules).Count Assert-AreEqual 0 @($lb.InboundNatRules).Count Assert-AreEqual 0 @($lb.InboundNatPools).Count Assert-AreEqual 0 @($lb.OutboundRules).Count $lb = Add-AzLoadBalancerFrontendIpConfig -Name $ipConfigName -LoadBalancer $lb -Subnet $subnet $ipConfig = $lb.FrontendIpConfigurations[0] Assert-NotNull $ipConfig $lb = Add-AzLoadBalancerBackendAddressPoolConfig -Name $poolName -LoadBalancer $lb $lb = Add-AzLoadBalancerProbeConfig -Name $probeName -LoadBalancer $lb -Port 2000 -IntervalInSeconds 60 -ProbeCount 3 $lb = Add-AzLoadBalancerRuleConfig -Name $ruleName -LoadBalancer $lb -FrontendIpConfiguration $ipConfig -Protocol Tcp -FrontendPort 1024 -BackendPort 2048 $lb = Add-AzLoadBalancerInboundNatRuleConfig -Name $natRuleName -LoadBalancer $lb -FrontendIpConfiguration $ipConfig -FrontendPort 128 -BackendPort 256 $lb = Set-AzLoadBalancer -LoadBalancer $lb $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname Assert-AreEqual 1 @($lb.FrontendIpConfigurations).Count Assert-AreEqual 1 @($lb.BackendAddressPools).Count Assert-AreEqual 1 @($lb.Probes).Count Assert-AreEqual 1 @($lb.LoadBalancingRules).Count Assert-AreEqual 1 @($lb.InboundNatRules).Count $lb = Remove-AzLoadBalancerInboundNatRuleConfig -LoadBalancer $lb -Name $natRuleName $lb = Add-AzLoadBalancerInboundNatPoolConfig -Name $natPoolName -LoadBalancer $lb -FrontendIpConfiguration $ipConfig -Protocol Tcp -FrontendPortRangeStart 444 -FrontendPortRangeEnd 445 -BackendPort 8080 $lb = Set-AzLoadBalancer -LoadBalancer $lb $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname Assert-AreEqual 0 @($lb.InboundNatRules).Count Assert-AreEqual 1 @($lb.InboundNatPools).Count $lb = Remove-AzLoadBalancerBackendAddressPoolConfig -LoadBalancer $lb -Name $poolName $lb = Remove-AzLoadBalancerProbeConfig -LoadBalancer $lb -Name $probeName $lb = Remove-AzLoadBalancerRuleConfig -LoadBalancer $lb -Name $ruleName $lb = Remove-AzLoadBalancerInboundNatPoolConfig -LoadBalancer $lb -Name $natPoolName $lb = Set-AzLoadBalancer -LoadBalancer $lb $lb = Get-AzLoadBalancer -Name $lbName -ResourceGroupName $rgname Assert-AreEqual 1 @($lb.FrontendIpConfigurations).Count Assert-AreEqual 0 @($lb.BackendAddressPools).Count Assert-AreEqual 0 @($lb.Probes).Count Assert-AreEqual 0 @($lb.LoadBalancingRules).Count Assert-AreEqual 0 @($lb.InboundNatRules).Count Assert-AreEqual 0 @($lb.InboundNatPools).Count Assert-AreEqual 0 @($lb.OutboundRules).Count $lb = Remove-AzLoadBalancerFrontendIpConfig -LoadBalancer $lb -Name $ipConfigName $lb = Remove-AzLoadBalancerFrontendIpConfig -LoadBalancer $lb -Name $ipConfigName Assert-ThrowsContains { Set-AzLoadBalancer -LoadBalancer $lb } "Deleting all frontendIPConfigs" $deleteLb = $lb | Remove-AzLoadBalancer -PassThru -Force Assert-AreEqual true $deleteLb $list = Get-AzLoadBalancer | Where-Object { $_.ResourceGroupName -eq $rgname } Assert-AreEqual 0 @($list).Count } finally { Clean-ResourceGroup $rgname } }
combined_dataset/train/non-malicious/sample_63_26.ps1
sample_63_26.ps1
# # Module manifest for module 'OCI.PSModules.Opensearch' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Opensearch.dll' # Version number of this module. ModuleVersion = '84.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'b54b41d9-dd21-465f-ac14-72727ada540b' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Opensearch Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '84.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Opensearch.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Backup-OCIOpensearchCluster', 'Get-OCIOpensearchCluster', 'Get-OCIOpensearchClusterBackup', 'Get-OCIOpensearchClusterBackupsList', 'Get-OCIOpensearchClustersList', 'Get-OCIOpensearchVersionsList', 'Get-OCIOpensearchWorkRequest', 'Get-OCIOpensearchWorkRequestErrorsList', 'Get-OCIOpensearchWorkRequestLogsList', 'Get-OCIOpensearchWorkRequestsList', 'Invoke-OCIOpensearchOpensearchClusterRestore', 'Invoke-OCIOpensearchResizeOpensearchClusterHorizontal', 'Invoke-OCIOpensearchResizeOpensearchClusterVertical', 'New-OCIOpensearchCluster', 'Remove-OCIOpensearchCluster', 'Remove-OCIOpensearchClusterBackup', 'Update-OCIOpensearchCluster', 'Update-OCIOpensearchClusterBackup' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Opensearch' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/1598.ps1
1598.ps1
filter propmatch ([string]$match='') { $props = @() $obj = $_ $obj | gm -m *property | % { if ($obj.$($_.name) -match $match) {$props += [string]$_.name} } $obj | select $props }
combined_dataset/train/non-malicious/Get-Scope_1.ps1
Get-Scope_1.ps1
function Get-Scope{ $rtnScope = 0 $global:scope = $false $scope = $true while($($ErrorActionPreference = "silentlycontinue"; switch((get-Variable -Name scope -Scope $rtnScope).value){$null{$true} $true{$true} $false{$ErrorActionPreference = "continue"; return ($rtnScope - 1)}})){ $rtnScope++ } } Example. function gg{ Get-Scope }; function iii{ gg }; iii ==> result is 2
combined_dataset/train/non-malicious/sample_38_2.ps1
sample_38_2.ps1
# # Module manifest for module 'OCI.PSModules.Usage' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Usage.dll' # Version number of this module. ModuleVersion = '81.0.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = '9ad21498-2007-42f7-9492-bacc9b5b532f' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Usage Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '81.0.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Usage.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIUsageLimitsList', 'Get-OCIUsageProductsList', 'Get-OCIUsageRedeemableUsersList', 'Get-OCIUsageRedemptionsList', 'Get-OCIUsageResourceQuotaList', 'Get-OCIUsageResourcesList', 'Get-OCIUsageRewardsList', 'New-OCIUsageRedeemableUser', 'Remove-OCIUsageRedeemableUser' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Usage' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/4194.ps1
4194.ps1
Set-Variable -Name Body -Force Set-Variable -Name EmailAddress -Force Set-Variable -Name EmailAddresses -Force Set-Variable -Name Exclusions -Force Set-Variable -Name LocalAdmin -Force Set-Variable -Name LocalAdmins -Force Set-Variable -Name LogFile -Value $env:windir"\Logs\LocalAdministrators.log" -Force Set-Variable -Name LogFileEmailed -Value $env:windir"\Logs\LocalAdministrators_Emailed.log" -Force Set-Variable -Name Member -Force Set-Variable -Name Members -Force Set-Variable -Name Output -Force Set-Variable -Name Prof -Force Set-Variable -Name Profiles -Force Set-Variable -Name RelativePath -Force cls $RelativePath = (split-path $SCRIPT:MyInvocation.MyCommand.Path -parent) + "\" $Body = "Local Administrator(s)" + [char]13 + "---------------------------" + [char]13 $EmailAddresses = @() $EmailAddresses = Get-Content -Path $RelativePath"EmailAddresses.txt" $LocalAdmins = @() $Members = net localgroup administrators | where { $_ -AND $_ -notmatch "command completed successfully" } | select -skip 4 $Profiles = Get-ChildItem -Path $env:SystemDrive"\users" -Force $Exclusions = Get-Content -Path $RelativePath"Exclusions.txt" Foreach ($Member in $Members) { $Member = $Member.Split("\") If ($Member.Count -gt 1) { [string]$Member = $Member[1] If ($Member -notin $Exclusions) { Foreach ($Prof in $Profiles) { If ($Member -eq $Prof) { $LocalAdmins += $Member } } } } Remove-Variable -Name Member } if ((Test-Path $LogFileEmailed) -eq $true) { Remove-Item -Path $LogFileEmailed -Force } if ((Test-Path $LogFile) -eq $true) { Remove-Item -Path $LogFile -Force } if ($LocalAdmins.Count -gt 0) { if ((Test-Path $LogFile) -eq $false) { New-Item -Path $LogFile -ItemType file -Force } foreach ($LocalAdmin in $LocalAdmins) { Add-Content -Path $LogFile -Value $LocalAdmin -Force $Body = $Body + $LocalAdmin + [char]13 } } If ($LocalAdmins.count -eq 1) { $Output = $LocalAdmin + [char]32 + "is a local administrator on" + [char]32 + $env:COMPUTERNAME foreach ($EmailAddress in $EmailAddresses) { Send-MailMessage -To $EmailAddress -From "IT@acme.com" -Subject "Local Administrator Report" -Body $Output -SmtpServer "smtp.acme.com" } Rename-Item -Path $LogFile -NewName $LogFileEmailed -Force } else { $Output = "The attached file lists all local administrators on" + [char]32 + $env:COMPUTERNAME foreach ($EmailAddress in $EmailAddresses) { Send-MailMessage -To $EmailAddress -From "IT@acme.com" -Subject "Local Administrator Report" -Body $Output -Attachments $LogFile -SmtpServer "smtp.acme.com" } Rename-Item -Path $LogFile -NewName $LogFileEmailed -Force } $LocalAdmins = $null Remove-Variable -Name Body -Force Remove-Variable -Name EmailAddress -Force Remove-Variable -Name EmailAddresses -Force Remove-Variable -Name Exclusions -Force Remove-Variable -Name LocalAdmin -Force Remove-Variable -Name LocalAdmins -Force Remove-Variable -Name LogFile -Force Remove-Variable -Name LogFileEmailed -Force Remove-Variable -Name Members -Force Remove-Variable -Name Output -Force Remove-Variable -Name Prof -Force Remove-Variable -Name Profiles -Force
combined_dataset/train/non-malicious/sample_33_85.ps1
sample_33_85.ps1
# # Script module for module 'Az.HealthcareApis' that is executed when 'Az.HealthcareApis' is imported in a PowerShell session. # # Generated by: Microsoft Corporation # # Generated on: 04/23/2024 13:01:41 # $PSDefaultParameterValues.Clear() Set-StrictMode -Version Latest function Test-DotNet { try { if ((Get-PSDrive 'HKLM' -ErrorAction Ignore) -and (-not (Get-ChildItem 'HKLM:\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\' -ErrorAction Stop | Get-ItemPropertyValue -ErrorAction Stop -Name Release | Where-Object { $_ -ge 461808 }))) { throw ".NET Framework versions lower than 4.7.2 are not supported in Az. Please upgrade to .NET Framework 4.7.2 or higher." } } catch [System.Management.Automation.DriveNotFoundException] { Write-Verbose ".NET Framework version check failed." } } function Preload-Assembly { param ( [string] $AssemblyDirectory ) if($PSEdition -eq 'Desktop' -and (Test-Path $AssemblyDirectory -ErrorAction Ignore)) { try { Get-ChildItem -ErrorAction Stop -Path $AssemblyDirectory -Filter "*.dll" | ForEach-Object { try { Add-Type -Path $_.FullName -ErrorAction Ignore | Out-Null } catch { Write-Verbose $_ } } } catch {} } } if ($true -and ($PSEdition -eq 'Desktop')) { if ($PSVersionTable.PSVersion -lt [Version]'5.1') { throw "PowerShell versions lower than 5.1 are not supported in Az. Please upgrade to PowerShell 5.1 or higher." } Test-DotNet } if ($true -and ($PSEdition -eq 'Core')) { if ($PSVersionTable.PSVersion -lt [Version]'6.2.4') { throw "Current Az version doesn't support PowerShell Core versions lower than 6.2.4. Please upgrade to PowerShell Core 6.2.4 or higher." } } if (Test-Path -Path "$PSScriptRoot\StartupScripts" -ErrorAction Ignore) { Get-ChildItem "$PSScriptRoot\StartupScripts" -ErrorAction Stop | ForEach-Object { . $_.FullName } } # [windows powershell] preload assemblies # [windows powershell] preload module alc assemblies $preloadPath = (Join-Path $PSScriptRoot -ChildPath "ModuleAlcAssemblies") Preload-Assembly -AssemblyDirectory $preloadPath if (Get-Module AzureRM.profile -ErrorAction Ignore) { Write-Warning ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.") throw ("AzureRM.Profile already loaded. Az and AzureRM modules cannot be imported in the same session or used in the same script or runbook. If you are running PowerShell in an environment you control you can use the 'Uninstall-AzureRm' cmdlet to remove all AzureRm modules from your machine. " + "If you are running in Azure Automation, take care that none of your runbooks import both Az and AzureRM modules. More information can be found here: https://aka.ms/azps-migration-guide.") } $module = Get-Module Az.Accounts if ($module -ne $null -and $module.Version -lt [System.Version]"2.19.0") { Write-Error "This module requires Az.Accounts version 2.19.0. An earlier version of Az.Accounts is imported in the current PowerShell session. Please open a new session before importing this module. This error could indicate that multiple incompatible versions of the Azure PowerShell cmdlets are installed on your system. Please see https://aka.ms/azps-version-error for troubleshooting information." -ErrorAction Stop } elseif ($module -eq $null) { Import-Module Az.Accounts -MinimumVersion 2.19.0 -Scope Global } if (Test-Path -Path "$PSScriptRoot\PostImportScripts" -ErrorAction Ignore) { Get-ChildItem "$PSScriptRoot\PostImportScripts" -ErrorAction Stop | ForEach-Object { . $_.FullName } } $FilteredCommands = @() if ($Env:ACC_CLOUD -eq $null) { $FilteredCommands | ForEach-Object { $existingDefault = $false foreach ($key in $global:PSDefaultParameterValues.Keys) { if ($_ -like "$key") { $existingDefault = $true } } if (!$existingDefault) { $global:PSDefaultParameterValues.Add($_, { if ((Get-Command Get-AzContext -ErrorAction Ignore) -eq $null) { $context = Get-AzureRmContext } else { $context = Get-AzContext } if (($context -ne $null) -and $context.ExtendedProperties.ContainsKey("Default Resource Group")) { $context.ExtendedProperties["Default Resource Group"] } }) } } } # SIG # Begin signature block # MIInwgYJKoZIhvcNAQcCoIInszCCJ68CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDP7OdMwKL8acL9 # T9e/GFDBGWlI6U1Ph17PVLS76dG46KCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGaIwghmeAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEII8PTYR1p32i/sEcL8+eUS9D # 4qaRwPX+tWPXoLoJMp+DMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAyaI050WYQcQI83eisqwmWIyiJ+5dOBX4sMd0tG/mz75K6G4Wwu+/aFwy # C/ZbB2mTHsMMZAbtzoOe6M+BZgwrMbu/oJthAI7u4hWag3vKrhrpe2QBTeGiQ4xI # 5ZoeWS7Zc8L80sVPwY/hZZ93Th80A8mK/f66rBs53dTMeoTRI5MJI/jpkfl6Qogc # F4eVL8VA4j/88A1iWkTiBJfmVLytxvqCoy7C9I2BuQZG/lwHhQwmDoTIJO//2/+y # PvkA5ah1Gsg+ve+XDtKk5eLKEF5x66AZGP+sVw6cwtxEx5i4ko/dp92cPfEcZ+LF # GUdRGq/5s7WVf/hnaTQnI9Sf467iFKGCFywwghcoBgorBgEEAYI3AwMBMYIXGDCC # FxQGCSqGSIb3DQEHAqCCFwUwghcBAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCD4BQCk1zoqyaTihirbL/6emVEythplLbdNpFvkHDrWGQIGZiAgthUM # GBMyMDI0MDQyMzEzMTUyMi40ODVaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIRezCCBycwggUPoAMCAQICEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNzI1WhcNMjUwMTEwMTkwNzI1WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGQzQxLTRC # RDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALVjtZhV+kFmb8cKQpg2mzis # DlRI978Gb2amGvbAmCd04JVGeTe/QGzM8KbQrMDol7DC7jS03JkcrPsWi9WpVwsI # ckRQ8AkX1idBG9HhyCspAavfuvz55khl7brPQx7H99UJbsE3wMmpmJasPWpgF05z # ZlvpWQDULDcIYyl5lXI4HVZ5N6MSxWO8zwWr4r9xkMmUXs7ICxDJr5a39SSePAJR # IyznaIc0WzZ6MFcTRzLLNyPBE4KrVv1LFd96FNxAzwnetSePg88EmRezr2T3HTFE # lneJXyQYd6YQ7eCIc7yllWoY03CEg9ghorp9qUKcBUfFcS4XElf3GSERnlzJsK7s # /ZGPU4daHT2jWGoYha2QCOmkgjOmBFCqQFFwFmsPrZj4eQszYxq4c4HqPnUu4hT4 # aqpvUZ3qIOXbdyU42pNL93cn0rPTTleOUsOQbgvlRdthFCBepxfb6nbsp3fcZaPB # fTbtXVa8nLQuMCBqyfsebuqnbwj+lHQfqKpivpyd7KCWACoj78XUwYqy1HyYnStT # me4T9vK6u2O/KThfROeJHiSg44ymFj+34IcFEhPogaKvNNsTVm4QbqphCyknrwBy # qorBCLH6bllRtJMJwmu7GRdTQsIx2HMKqphEtpSm1z3ufASdPrgPhsQIRFkHZGui # hL1Jjj4Lu3CbAmha0lOrAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQURIQOEdq+7Qds # lptJiCRNpXgJ2gUwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBAORURDGrVRTbnulf # sg2cTsyyh7YXvhVU7NZMkITAQYsFEPVgvSviCylr5ap3ka76Yz0t/6lxuczI6w7t # Xq8n4WxUUgcj5wAhnNorhnD8ljYqbck37fggYK3+wEwLhP1PGC5tvXK0xYomU1nU # +lXOy9ZRnShI/HZdFrw2srgtsbWow9OMuADS5lg7okrXa2daCOGnxuaD1IO+65E7 # qv2O0W0sGj7AWdOjNdpexPrspL2KEcOMeJVmkk/O0ganhFzzHAnWjtNWneU11WQ6 # Bxv8OpN1fY9wzQoiycgvOOJM93od55EGeXxfF8bofLVlUE3zIikoSed+8s61NDP+ # x9RMya2mwK/Ys1xdvDlZTHndIKssfmu3vu/a+BFf2uIoycVTvBQpv/drRJD68eo4 # 01mkCRFkmy/+BmQlRrx2rapqAu5k0Nev+iUdBUKmX/iOaKZ75vuQg7hCiBA5xIm5 # ZIXDSlX47wwFar3/BgTwntMq9ra6QRAeS/o/uYWkmvqvE8Aq38QmKgTiBnWSS/uV # PcaHEyArnyFh5G+qeCGmL44MfEnFEhxc3saPmXhe6MhSgCIGJUZDA7336nQD8fn4 # y6534Lel+LuT5F5bFt0mLwd+H5GxGzObZmm/c3pEWtHv1ug7dS/Dfrcd1sn2E4gk # 4W1L1jdRBbK9xwkMmwY+CHZeMSvBMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtcwggJAAgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpG # QzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAFpuZafp0bnpJdIhfiB1d8pTohm+ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnR3vgwIhgPMjAyNDA0MjMxNTE3MTJaGA8yMDI0MDQyNDE1MTcxMlowdzA9Bgor # BgEEAYRZCgQBMS8wLTAKAgUA6dHe+AIBADAKAgEAAgIDFQIB/zAHAgEAAgITGDAK # AgUA6dMweAIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB # AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBANIiA17LpM6vqyo+ # h2Gy7jS/plK5btuepzPH69HaSSLQgmyHGJti3T4/40Qv/pD1kqx4aZmxSYhfghQx # G6+5xQrMjXUGVkvkHlGDaCB5PkTFkhEadoG/M8OiSF2z6t1t+B5+UpZHn/ZqMCje # 0hGMGpF+It3BhOadbdLMLmv1S+e5MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHimZmV8dzjIOsAAQAAAeIwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgI+IHGeoHYkUXTZQoKYzp+wPOlYTqk5KFy3IOqjhJ5OEwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCAriSpKEP0muMbBUETODoL4d5LU6I/bjucIZkOJ # CI9//zCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 4pmZlfHc4yDrAAEAAAHiMCIEIFI9jHTsM+FSP6FMwP2O6Yu7/zJ0dHmtmWF4o2me # BeYsMA0GCSqGSIb3DQEBCwUABIICAGwfiWBwLFVQjHuABe5MBTP82FLM9nDfiOd2 # ZCT1vatU/es0Pe7MesExgxG10YPDa3AKjZ6oz9pD/fJp4MeQW+vu8gUG5dVEpA31 # soSaCxSMQyeoQ6hJfsZVTJqiY4yhe44BMUHwy0sgcdg4FhQmSPmesQB4Ng3nZDJ/ # 7xBb1wii7TJiuNC40eXmXdy58vSpSrXawPSgI+EEEF+KZR6Jt+ywcuZTHjVxElqr # ckaiP8Q/Cbf97qMwwIBkoIBBtD+DWWvfvSmSWYaMEdhIN8sms8+opkfYMG+S5g6N # zXYvSzJ6YtMS7gA4nLwiSJ/VIkxEyGMq/R+P3iWlEN0IVcTkWH4tE8McmIVClhdZ # GQP5UcrwdqEppONmMkUQMJmRq/YSEZRNIMyZ6EybPHiqdkjfn90Ln0MA2C7sKKst # AvTQzE5Mjl4YB939pX+oece1b9Fw6ZF2aOi3wmMMumKA9GvZ11gNl3ca9/Co18OC # gNyNnqwpjddONC+fsQDnBqomG1/6DlkphNjV463FkcX4gXz/YgVlGAjA05FtsDXR # O6Qqmfgl20UaiVPhGL0hBvADCk/6F5uuQApQNjdOGPldJXaZ9JD7yWYxcwgB2WFF # OJxDosF72eiCu15o1gMniPsdDz8YTT1nfXQFYOIlxJEfVBYVcUkQNrFQrk4o01A+ # yqCkMfoC # SIG # End signature block
combined_dataset/train/non-malicious/sample_20_43.ps1
sample_20_43.ps1
#************************************************ # TS_SelectClusterNodes.ps1 # Version 1.0.1 # Date: 02-09-2011 # Author: Andre Teixeira - andret@microsoft.com # Description: This script asks customer to select the cluster nodes on which the diagnostic will obtain data from #************************************************ Import-LocalizedData -BindingVariable ScriptStrings Function GetWin32OSFromRemoteSystem([string] $RemoteMachine) { $Error.Clear() trap [Exception] { WriteTo-ErrorDebugReport -ErrorRecord $Error[0] -ScriptErrorText ("[GetWin32OSFromRemoteSystem] Remote Machine: $RemoteMachine") continue } Write-DiagProgress -Activity ($ScriptStrings.ID_EPSConnectingTo.Replace("%Machine%", $RemoteMachine)) -Status $ScriptStrings.ID_EPSConnectingToDesc $Win32OS = Get-CimInstance -Class Win32_OperatingSystem -ComputerName $RemoteMachine -ErrorAction SilentlyContinue if ($Error.Count -gt 0) { if ($Error[0].Exception.ErrorCode -eq -2147023174) #The RPC server is unavailable. (Exception from HRESULT: 0x800706BA) { get-diaginput -id "ErrorContactingNode" -Parameter @{"Machine"=$RemoteMachine; "Error"=$ScriptStrings.ID_EPSConnectingRCPError} $Error.Clear() } else { get-diaginput -id "ErrorContactingNode" -Parameter @{"Machine"=$RemoteMachine; "Error"= $Error[0].Exception.Message} $Error.Clear() } return $null } else { Return $Win32OS } } Function isClusterNode([string] $RemoteMachine) { $Error.Clear() trap [Exception] { WriteTo-ErrorDebugReport -ErrorRecord $_ -ScriptErrorText ("[isClusterNode] Check if machine $RemoteMachine has ClusSvc service") continue } Write-DiagProgress -Activity ($ScriptStrings.ID_EPSConnectingTo.Replace("%Machine%", $RemoteMachine)) -Status $ScriptStrings.ID_EPSSelectNodesObtainingCluster "[isClusterNode] Detecting if $RemoteMachine is a cluster node..." | WriteTo-StdOut -ShortFormat $CluSvc = Get-Service -ComputerName $RemoteMachine | Where-Object {$_.Name -eq "ClusSvc"} if ($null -ne $CluSvc.Status) { "[isClusterNode] $RemoteMachine is a cluster node. Cluster Service is currently " + $CluSvc.Status.ToString() | WriteTo-StdOut -ShortFormat return $true } else { "[isClusterNode] Error obtaining status of cluster service of machine $RemoteMachine" | WriteTo-StdOut -ShortFormat get-diaginput -id "ErrorContactingNode" -Parameter @{"Machine"=$RemoteMachine; "Error"= $ScriptStrings.ID_EPSSelectNodesUnableService} return $false } } #Step 1: Check if machine is a cluster machine - fastest way: Check if HKLM\Cluster exists trap [Exception] { WriteTo-ErrorDebugReport -ErrorRecord $Error[0] -ScriptErrorText ("[isClusterNode] Remote Machine: $RemoteMachine") $Error.Clear() continue } $ClusterKey = "HKLM:\SYSTEM\CurrentControlSet\services\ClusSvc" $RemoteScriptExecuted = $false do { $IsClusterNode = $false $NodeName = $null if (Test-Path -Path $ClusterKey) { "Machine is cluster node: True" | WriteTo-StdOut -ShortFormat $IsClusterNode = $true $NodeName = $COMPUTERNAME } else { "Machine is cluster node: False" | WriteTo-StdOut -ShortFormat #$NodeName = $COMPUTERNAME #_# $NodeName = Get-DiagInput -Id ClusterNode -Parameter @{"Machine"=$COMPUTERNAME} if (-not (($NodeName[0] -eq 0) -or ($null -eq $NodeName[0]))) { $NodeName = $NodeName[0].ToUpper() } else { $NodeName = $null } if ($null -ne $NodeName) { "Customer selected cluster node: $NodeName" | WriteTo-StdOut -ShortFormat $RemoteMachineOS = GetWin32OSFromRemoteSystem $NodeName "Remote Machine OS Build: " + $RemoteMachineOS.BuildNumber | WriteTo-StdOut -ShortFormat if ($null -ne $RemoteMachineOS) { if (($RemoteMachineOS.BuildNumber -lt 3790) -or ($RemoteMachineOS.ProductType -eq 1)) { "Error: $NodeName is not a supported OS version. OS version of $NodeName is " + $RemoteMachineOS.Caption | WriteTo-StdOut get-diaginput -id "ErrorContactingNode" -Parameter @{"Machine"=$NodeName; "Error"=($ScriptStrings.ID_EPSSelectNodesNotSupported.Replace("%Machine%",$NodeName).Replace("%OSName%",$RemoteMachineOS.Caption))} } else { if (isClusterNode $NodeName) { $IsClusterNode = $true } else { "Error: $NodeName is not a cluster node." | WriteTo-StdOut get-diaginput -id "ErrorContactingNode" -Parameter @{"Machine"=$NodeName; "Error"=$ScriptStrings.ID_MachineIsNotaCluster.Replace("%Machine%", $NodeName)} $IsClusterNode = $false } } } } } } while (-not $IsClusterNode) #Now obtain the names of nodes by querying the cluster key if ($IsClusterNode) { $Error.Clear() trap [Exception] { WriteTo-ErrorDebugReport -ErrorRecord $_ -ScriptErrorText ("Querying remote registry on [" + $NodeName + "]") continue } #Connect to remote Registry $RemoteReg = [Microsoft.Win32.RegistryKey]::OpenRemoteBaseKey('LocalMachine', $NodeName) if ($Error.Count -eq 0) { trap [Exception] { WriteTo-ErrorDebugReport -ErrorRecord $_ -ScriptErrorText ("Querying cluster information [" + $NodeName + "]") continue } $RemoteNodesKey = $RemoteReg.OpenSubKey("Cluster\Nodes") if ($RemoteNodesKey.SubKeyCount -gt 0) { $ClusterName = $RemoteReg.OpenSubKey("Cluster", $false).GetValue("ClusterName").ToUpper() $Choices = @() foreach ($SubKey in $RemoteNodesKey.GetSubKeyNames()) { $NodeMachineName = $RemoteReg.OpenSubKey("Cluster\Nodes\$SubKey", $false).GetValue("NodeName").ToUpper() if ($NodeName -ne $NodeMachineName) { $ExtensionPoint = "" } else { #Set the node local machine (or machine indicated by customer) the default $ExtensionPoint = "<Default/>" } $Choices += @{"Name"=$NodeMachineName;"Value"=$NodeMachineName;"Description"=$NodeMachineName;"ExtensionPoint"=$ExtensionPoint} } $TroubleshootingNodeNames = @() "ClusterName: $ClusterName - Choices: " | WriteTo-StdOut $Choices | WriteTo-StdOut if ($Choices.Count -gt 0) { do { $TroubleshootingNodeNames += Get-DiagInput -Id "SelectNodes" -Parameter (@{"Cluster"=$ClusterName}) -Choice $Choices } while ($TroubleshootingNodeNames.Count -eq 0) if (($TroubleshootingNodeNames[0] -ne 0) -and ($TroubleshootingNodeNames.Count -ne 0)) { if ($TroubleshootingNodeNames -contains "All") { foreach ($MachinName in $ClusterValues) { $MachineNames = $MachinName.Value } } else { $MachineNames = $TroubleshootingNodeNames } Return $MachineNames } } else { get-diaginput -id "ErrorContactingNode" -Parameter @{"Machine"=$NodeName; "Error"=$ScriptStrings.ID_EPSSelectNodesUnableObtainNames} } } else { #Machine is a cluster node, but HKLM\Cluster does not exist. In this case proceed collecting information only from local machine. return @($Env:COMPUTERNAME) } } else { get-diaginput -id "ErrorContactingNode" -Parameter @{"Machine"=$NodeName; "Error"=$ScriptStrings.ID_UnableQueryRegistry.Replace("%ErrorMessage%", $Error[0].Exception.Message).Replace("%NodeName%", $NodeName)} } } # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAGsOR8IAyxIk+/ # gazI8LyUT19m2SUiCPADBXfOw2MoFqCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKR8 # t459TPYtRIGkkQOD44aq/W+pF9mkPIm3cW9B3d6KMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAjTkN/m98UIbZy5x2KdxjB6yQNDpF/+xpFTLD # 7hYgQN3neBxTktnl+RM5yUPGtY9sNZWvbElWXMrfaDlvn6+YGX3trwHS5Bq8X2WI # UiqUigxRm4jKHvQypJHQiSy1fCBCn/g8uouapdEMnU6q1uEnxHpl3loTvISCuied # c2hRRMQM1QUEwmCZPHABhMXNG+Wgmrry0evfZXjXbV1nD7sW3a8jsWR/AyxbJx/q # J07Sm2RZKp2Z0X436wt493shjw2at55GEa3UXukKbLPwWyAsYRo57445AVfIBe4W # c0Ih9iNjyozCZofM9rYrdOQeKVibAbut8+MOppPTvUAJ1zpqVqGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCD1F539drT1O+I7o8rL6mpIO+1o0FTUtAij # c+RapMoVwwIGZv8ZfhGCGBMyMDI0MTAyODExNDAzOS41MTdaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9oMv # JmpUXSLBAAEAAAH2MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzEwNFoXDTI1MTAyMjE4MzEwNFowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjZCMDUtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # 0UJeLMR/N9WPBZhuKVFF+eWJZ68Wujdj4X6JR05cxO5CepNXo17rVazwWLkm5Aja # Vh19ZVjDChHzimxsoaXxNu8IDggKwpXvpAAItv4Ux50e9S2uVwfKv57p9JKG+Q7V # ONShujl1NCMkcgSrPdmd/8zcsmhzcNobLomrCAIORZ8IwhYy4siVQlf1NKhlyAzm # kWJD0N+60IiogFBzg3yISsvroOx0x1xSi2PiRIQlTXE74MggZDIDKqH/hb9FT2kK # /nV/aXjuo9LMrrRmn44oYYADe/rO95F+SG3uuuhf+H4IriXr0h9ptA6SwHJPS2Vm # bNWCjQWq5G4YkrcqbPMax7vNXUwu7T65E8fFPd1IuE9RsG4TMAV7XkXBopmPNfvL # 0hjxg44kpQn384V46o+zdQqy5K9dDlWm/J6vZtp5yA1PyD3w+HbGubS0niEQ1L6w # GOrPfzIm0FdOn+xFo48ERl+Fxw/3OvXM5CY1EqnzEznPjzJc7OJwhJVR3VQDHjBc # EFTOvS9E0diNu1eocw+ZCkz4Pu/oQv+gqU+bfxL8e7PFktfRDlM6FyOzjP4zuI25 # gD8tO9zJg6g6fRpaZc439mAbkl3zCVzTLDgchv6SxQajJtvvoQaZxQf0tRiPcbr2 # HWfMoqqd9uiQ0hTUEhG44FBSTeUPZeEenRCWadCW4G8CAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBRIwZsJuOcJfScPWcXZuBA4B89K8jAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEA13kBirH1cHu1WYR1ysj125omGtQ0PaQkEzwGb70xtqSoI+svQihsgdTY # xaPfp2IVFdgjaMaBi81wB8/nu866FfFKKdhdp3wnMZ91PpP4Ooe7Ncf6qICkgSuw # gdIdQvqE0h8VQ5QW5sDV4Q0Jnj4f7KHYx4NiM8C4jTw8SQtsuxWiTH2Hikf3QYB7 # 1a7dB9zgHOkW0hgUEeWO9mh2wWqYS/Q48ASjOqYw/ha54oVOff22WaoH+/Hxd9NT # EU/4vlvsRIMWT0jsnNI71jVArT4Q9Bt6VShWzyqraE6SKUoZrEwBpVsI0LMg2X3h # OLblC1vxM3+wMyOh97aFOs7sFnuemtI2Mfj8qg16BZTJxXlpPurWrG+OBj4BoTDk # C9AxXYB3yEtuwMs7pRWLyxIxw/wV9THKUGm+x+VE0POLwkrSMgjulSXkpfELHWWi # CVslJbFIIB/4Alv+jQJSKAJuo9CErbm2qeDk/zjJYlYaVGMyKuYZ+uSRVKB2qkEP # cEzG1dO9zIa1Mp32J+zzW3P7suJfjw62s3hDOLk+6lMQOR04x+2o17G3LceLkkxJ # m41ErdiTjAmdClen9yl6HgMpGS4okjFCJX+CpOFX7gBA3PVxQWubisAQbL5HgTFB # tQNEzcCdh1GYw/6nzzNNt+0GQnnobBddfOAiqkzvItqXjvGyK1QwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFU9eSpdxs0a0 # 6JFIuGFHIj/I+36ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJ4u8wIhgPMjAyNDEwMjgxMDE2MTVaGA8yMDI0 # MTAyOTEwMTYxNVowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6sni7wIBADAHAgEA # AgIV+jAHAgEAAgISoDAKAgUA6ss0bwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQBpUFU4+vZJFyUmVb+WZWIYm85wWkaqUQMIXDa89AJRdEINZBYYuKJZHwGX # evIycaqI5McGg28UnXlT85+VLHcRb2BqTBqlUDfyWMDDSi4/Ny1o+ihFohhs/ujQ # uxkh2lsfu3f8RO+rHyvyoc6aVYoXpbsYsPsvWhlP5VIY3yXO7ztB9TdvoXXfsSMI # GgIOURNjC5+mH+r4R0gkgrO/9ZkBSWax/DoAQGEOAQy9s6WfhPW9PTxIBkjbYnEx # w84j1PW/7aPVhavzoHfT0fP7eh9eCNY9ax+AXoa/pOOruFzpjML3/3o9VRglqy6j # vcBxO0h6Uf9FkqnHwg7BsMcIWiqvMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH2gy8malRdIsEAAQAAAfYwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgJkLqoPMJmuH/grzTxsEQYLdwH+7Zhtv8FCkk4Or2+EQwgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCArYUzxlF6m5USLS4f8NXL/8aoNEVdsCZRmF+Ll # QjG2ojCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 9oMvJmpUXSLBAAEAAAH2MCIEIFraBgk4xXajMAI68rUQCySUOKGDReEAQUOAuvhI # wwAlMA0GCSqGSIb3DQEBCwUABIICAHY2QaSxLf8oXONTCIVQ+zG7tXo1tmk8/4yF # EIdF5ZN4xBh/E18R7IKMOuNl59JjJArmFH2EhP3dwXamPauOo566AARN8muVWGoP # K6f8cd6JGuDAGOGC0TlFclltLYuZROFPAgge1sbSLZzZKV/wgAuA1FxV9UFfsaAu # fSxqAUE6vf6unJKWh965c77GyVvSNBF5cnW59NJHDupw13PjHqpty9LtpEGmJcli # tZE/x13E5Wil+HC+C0lUyL5CM/Rg3xKwtViKE+CXQ9Og+SUaLuZ0LG/ZlIbh9KDs # a3URIvbhZrC7geQrnEkylZ0dZH9hTj53uN8bjsIu/QQyW999NSue+EOZPttsyFwz # 9mXAIOkL4UCz+f0SStjlMXVVjdOnixt0tl7KUGqSSWuOy+fuPIoFp0ILE6DUxzEE # g2LSaeYwaJSrDNQsClKNsUHQi6zrCtEC/XqvfytjJ9BnzWoANaI2PFPESinrjwNO # EG2yYYf8hdk1PLrK1vpf/d/GKObHcbwJ/LHYPBQ0aCkw1im+g2oqKS49UhFq+yCu # kGFbBJI+o+MfVlFQDCI+EaaHNZaf+SrXx1lbKree+2AdXcfxSf8p7MYTM+o2a+qF # xfgpGAIbV1aaRTxZIs69SXZzHk/g/N/YjU8mVUhsMrYAeF5UIB8bFHmSovE6ztlM # fMFvFfU3 # SIG # End signature block
combined_dataset/train/non-malicious/Get-DatastoreMostFree.ps1
Get-DatastoreMostFree.ps1
#Parameter- Name of the VMware cluster the VM will be assigned to function Get-DatastoreMostFree ($Cluster, [switch] $Second) { <# .SYNOPSIS Return the datastore in the cluster with the most unprovisioned disk space. This takes thin provisioning into account. .DESCRIPTION Queries all the datastores in the cluster and returns the datastore with the most free disk space. Used in conjunction with a mass cloning of virtual machines script. (Clone_Template_fromCSV.ps1) .NOTES 1- You will need to modify the 2nd to last line's with criteria for your own environment. I'm filtering out anything that's designed to hold guest VMs, like any datastores hosting ISO files and template VMs. 2- Error and constraint checking need to be added. If you try to put a VM a full LUN it will fail. .LINK .EXAMPLE Get-DatastoreMostFree.ps1 clustername #> # Prep Set-Variable -Name ScriptDir -Value "\\\\vmscripthost201\\repo" -Scope Local . $ScriptDir\\Get-mDataStoreList.ps1 # Amount of free space on a LUN for it to be an eligible target $LUNSizeFreeMB = 300*1024 $DSTs = Get-mDataStoreList $Cluster if (!$Second) { $DST = $DSTs | Where-Object { $_.FreeSpaceMB -gt $LUNSizeFreeMB } | Select Name,@{n="Provisioned";e={($_.extensiondata.summary.capacity - $_.extensiondata.summary.freespace + $_.extensiondata.summary.Uncommitted)}} | Sort Provisioned -Descending | Select-Object -Last 1 -Property Name } else { $DST = $DSTs | Where-Object { $_.FreeSpaceMB -gt $LUNSizeFreeMB } | Select Name,@{n="Provisioned";e={($_.extensiondata.summary.capacity - $_.extensiondata.summary.freespace + $_.extensiondata.summary.Uncommitted)}} | Sort Provisioned -Descending | Select-Object -Last 2 | Select-Object -First 1 -Property Name } write-output $dst }
combined_dataset/train/non-malicious/1454.ps1
1454.ps1
function Install-CFileShare { [CmdletBinding()] param( [Parameter(Mandatory=$true)] [string] $Name, [Parameter(Mandatory=$true)] [string] $Path, [string] $Description = '', [string[]] $FullAccess = @(), [string[]] $ChangeAccess = @(), [string[]] $ReadAccess = @(), [Switch] $Force ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState function New-ShareAce { param( [Parameter(Mandatory=$true)] [AllowEmptyCollection()] [string[]] $Identity, [Carbon.Security.ShareRights] $ShareRight ) Set-StrictMode -Version 'Latest' foreach( $identityName in $Identity ) { $trustee = ([wmiclass]'Win32_Trustee').CreateInstance() [Security.Principal.SecurityIdentifier]$sid = Resolve-CIdentity -Name $identityName | Select-Object -ExpandProperty 'Sid' if( -not $sid ) { continue } $sidBytes = New-Object 'byte[]' $sid.BinaryLength $sid.GetBinaryForm( $sidBytes, 0) $trustee.Sid = $sidBytes $ace = ([wmiclass]'Win32_Ace').CreateInstance() $ace.AccessMask = $ShareRight $ace.AceFlags = 0 $ace.AceType = 0 $ace.Trustee = $trustee $ace } } $errors = @{ [uint32]2 = 'Access Denied'; [uint32]8 = 'Unknown Failure'; [uint32]9 = 'Invalid Name'; [uint32]10 = 'Invalid Level'; [uint32]21 = 'Invalid Parameter'; [uint32]22 = 'Duplicate Share'; [uint32]23 = 'Restricted Path'; [uint32]24 = 'Unknown Device or Directory'; [uint32]25 = 'Net Name Not Found'; } $Path = Resolve-CFullPath -Path $Path $Path = $Path.Trim('\\') if( $Path -eq (Split-Path -Qualifier -Path $Path ) ) { $Path = Join-Path -Path $Path -ChildPath '\' } if( (Test-CFileShare -Name $Name) ) { $share = Get-CFileShare -Name $Name [bool]$delete = $false if( $Force ) { $delete = $true } if( $share.Path -ne $Path ) { Write-Verbose -Message ('[SHARE] [{0}] Path {1} -> {2}.' -f $Name,$share.Path,$Path) $delete = $true } if( $delete ) { Uninstall-CFileShare -Name $Name } } $shareAces = Invoke-Command -ScriptBlock { New-ShareAce -Identity $FullAccess -ShareRight FullControl New-ShareAce -Identity $ChangeAccess -ShareRight Change New-ShareAce -Identity $ReadAccess -ShareRight Read } if( -not $shareAces ) { $shareAces = New-ShareAce -Identity 'Everyone' -ShareRight Read } $shareSecurityDescriptor = ([wmiclass] "Win32_SecurityDescriptor").CreateInstance() $shareSecurityDescriptor.DACL = $shareAces $shareSecurityDescriptor.ControlFlags = "0x4" if( -not (Test-CFileShare -Name $Name) ) { if( -not (Test-Path -Path $Path -PathType Container) ) { New-Item -Path $Path -ItemType Directory -Force | Out-String | Write-Verbose } $shareClass = Get-WmiObject -Class 'Win32_Share' -List Write-Verbose -Message ('[SHARE] [{0}] Sharing {1}' -f $Name,$Path) $result = $shareClass.Create( $Path, $Name, 0, $null, $Description, $null, $shareSecurityDescriptor ) if( $result.ReturnValue ) { Write-Error ('Failed to create share ''{0}'' (Path: {1}). WMI returned error code {2} which means: {3}.' -f $Name,$Path,$result.ReturnValue,$errors[$result.ReturnValue]) return } } else { $share = Get-CFileShare -Name $Name $updateShare = $false if( $share.Description -ne $Description ) { Write-Verbose -Message ('[SHARE] [{0}] Description {1} -> {2}' -f $Name,$share.Description,$Description) $updateShare = $true } foreach( $ace in $shareAces ) { $identityName = Resolve-CIdentityName -SID $ace.Trustee.SID $permission = Get-CFileSharePermission -Name $Name -Identity $identityName if( -not $permission ) { Write-Verbose -Message ('[SHARE] [{0}] Access {1}: -> {2}' -f $Name,$identityName,([Carbon.Security.ShareRights]$ace.AccessMask)) $updateShare = $true } elseif( [int]$permission.ShareRights -ne $ace.AccessMask ) { Write-Verbose -Message ('[SHARE] [{0}] Access {1}: {2} -> {3}' -f $Name,$identityName,$permission.ShareRights,([Carbon.Security.ShareRights]$ace.AccessMask)) $updateShare = $true } } $existingAces = Get-CFileSharePermission -Name $Name foreach( $ace in $existingAces ) { $identityName = $ace.IdentityReference.Value $existingAce = $ace if( $shareAces ) { $existingAce = $shareAces | Where-Object { $newIdentityName = Resolve-CIdentityName -SID $_.Trustee.SID return ( $newIdentityName -eq $ace.IdentityReference.Value ) } } if( -not $existingAce ) { Write-Verbose -Message ('[SHARE] [{0}] Access {1}: {2} ->' -f $Name,$identityName,$ace.ShareRights) $updateShare = $true } } if( $updateShare ) { $result = $share.SetShareInfo( $share.MaximumAllowed, $Description, $shareSecurityDescriptor ) if( $result.ReturnValue ) { Write-Error ('Failed to create share ''{0}'' (Path: {1}). WMI returned error code {2} which means: {3}' -f $Name,$Path,$result.ReturnValue,$errors[$result.ReturnValue]) return } } } } Set-Alias -Name 'Install-SmbShare' -Value 'Install-CFileShare'
combined_dataset/train/non-malicious/Out-Html_2.ps1
Out-Html_2.ps1
################################################################################ # Out-HTML - converts cmdlets help to HTML format # Based on Out-wiki by Dimitry Sotnikov (http://dmitrysotnikov.wordpress.com/2008/08/18/out-wiki-convert-powershell-help-to-wiki-format/) # # Modify the invocation line at the bottom of the script if you want to document # fewer command, subsets or snapins # Open default.htm to view in frameset or index.htm for index page with links. ################################################################################ # Created By: Vegard Hamar ################################################################################ param($outputDir = "./help") function FixString { param($in = "") if ($in -eq $null) { $in = "" } return $in.Replace("&", "&amp;").Replace("<", "&lt;").Replace(">", "&gt;") } function Out-HTML { param($commands = $null, $outputDir = "./help") $commandsHelp = $commands | sort-object PSSnapIn, noun | get-help -full #create an output directory if ( -not (Test-Path $outputDir)) { md $outputDir | Out-Null } #Generate frame page $indexFileName = $outputDir + "/index.htm" #Generate frameset @' <html> <head> <title>PowerShell Help</title> </head> <frameset cols="250,*"> <frame src="./index.htm" /> <frame src="" name="display"/> </frameset> </html> '@ | Out-File "$outputDir/default.htm" #Generate index @' <html> <head> <title>PowerShell Help</title> </head> <body> '@ | out-file $indexFileName $SnapIn = "" foreach ($c in $commandsHelp) { if ($SnapIn -ne $c.PSSnapIn.Name) { "<a href='#" + $c.PSSnapIn.name + "'>* " + $c.PSSnapIn.Name.Replace(".", " ") + "</a></br>" | out-file $indexFileName -Append $SnapIn = $c.PSSnapIn.Name } } $SnapIn = "" foreach ($c in $commandsHelp) { if ($SnapIn -ne $c.PSSnapIn.Name) { "<h3><a name='$($c.PSSnapIn.Name)'>" +$c.PSSnapIn.Name.Replace(".", " ") + "</a></h3>" | Out-File $indexFileName -Append $SnapIn = $c.PSSnapIn.Name } "<a href='" + $c.name + ".htm' target='display'>* $($c.Name)</a></br>" | out-file $indexFileName -Append } #Generate all single help files $outputText = $null foreach ($c in $commandsHelp) { $fileName = ( $outputDir + "/" + $c.Name + ".htm" ) @" <html> <head> <title>$($c.Name)</title> </head> <body> <h1>$($c.Name)</h1> <div>$($c.synopsis)</div> <h2> Syntax </h2> <code>$(FixString($c.syntax | out-string -width 2000).Trim())</code> <h2> Detailed Description </h2> <div>$(FixString($c.Description | out-string -width 2000))</div> <h2> Related Commands </h2> <div> "@ | out-file $fileName foreach ($relatedLink in $c.relatedLinks.navigationLink) { if($relatedLink.linkText -ne $null -and $relatedLink.linkText.StartsWith("about") -eq $false){ " * <a href='$($relatedLink.linkText).htm'>$($relatedLink.linkText)</a><br/>" | out-file $fileName -Append } } @" </div> <h2> Parameters </h2> <table border='1'> <tr> <th>Name</th> <th>Description</th> <th>Required?</th> <th>Pipeline Input</th> <th>Default Value</th> </tr> "@ | out-file $fileName -Append $paramNum = 0 foreach ($param in $c.parameters.parameter ) { @" <tr valign='top'> <td>$($param.Name)&nbsp;</td> <td>$(FixString(($param.Description | out-string -width 2000).Trim()))&nbsp;</td> <td>$(FixString($param.Required))&nbsp;</td> <td>$(FixString($param.PipelineInput))&nbsp;</td> <td>$(FixString($param.DefaultValue))&nbsp;</td> </tr> "@ | out-file $fileName -Append } " </table>}" | out-file $fileName -Append # Input Type if (($c.inputTypes | Out-String ).Trim().Length -gt 0) { @" <h2> Input Type </h2> <div>$(FixString($c.inputTypes | out-string -width 2000).Trim())</div> "@ | out-file $fileName -Append } # Return Type if (($c.returnValues | Out-String ).Trim().Length -gt 0) { @" <h2> Return Values </h2> <div>$(FixString($c.returnValues | out-string -width 2000).Trim())</div> "@ | out-file $fileName -Append } # Notes if (($c.alertSet | Out-String).Trim().Length -gt 0) { @" <h2> Notes </h2> "<div>$(FixString($c.alertSet | out-string -Width 2000).Trim())</div> "@ | out-file $fileName -Append } # Examples if (($c.examples | Out-String).Trim().Length -gt 0) { " <h2> Examples </h2>" | out-file $fileName -Append foreach ($example in $c.examples.example) { @" <h3> $(FixString($example.title.Trim(('-',' '))))</h3> <pre>$(FixString($example.code | out-string ).Trim())</pre> <div>$(FixString($example.remarks | out-string -Width 2000).Trim())</div> "@ | out-file $fileName -Append } } @" </body> </html> "@ | out-file $fileName -Append } @" </body> </html> "@ | out-file $indexFileName -Append } Out-HTML (Get-Command ) $outputDir
combined_dataset/train/non-malicious/sample_65_77.ps1
sample_65_77.ps1
# Input plugin to collect Windows Event Log messages # This plugin ONLY supports Windows [[inputs.win_eventlog]] ## Telegraf should have Administrator permissions to subscribe for some ## Windows Events channels (e.g. System log) ## LCID (Locale ID) for event rendering ## 1033 to force English language ## 0 to use default Windows locale # locale = 0 ## Name of eventlog, used only if xpath_query is empty ## Example: "Application" # eventlog_name = "" ## xpath_query can be in defined short form like "Event/System[EventID=999]" ## or you can form a XML Query. Refer to the Consuming Events article: ## https://docs.microsoft.com/en-us/windows/win32/wes/consuming-events ## XML query is the recommended form, because it is most flexible ## You can create or debug XML Query by creating Custom View in Windows Event Viewer ## and then copying resulting XML here xpath_query = ''' <QueryList> <Query Id="0" Path="Security"> <Select Path="Security">*</Select> <Suppress Path="Security">*[System[( (EventID &gt;= 5152 and EventID &lt;= 5158) or EventID=5379 or EventID=4672)]]</Suppress> </Query> <Query Id="1" Path="Application"> <Select Path="Application">*[System[(Level &lt; 4)]]</Select> </Query> <Query Id="2" Path="Windows PowerShell"> <Select Path="Windows PowerShell">*[System[(Level &lt; 4)]]</Select> </Query> <Query Id="3" Path="System"> <Select Path="System">*</Select> </Query> <Query Id="4" Path="Setup"> <Select Path="Setup">*</Select> </Query> </QueryList> ''' ## When true, event logs are read from the beginning; otherwise only future ## events will be logged. # from_beginning = false ## Number of events to fetch in one batch # event_batch_size = 5 # Process UserData XML to fields, if this node exists in Event XML # process_userdata = true # Process EventData XML to fields, if this node exists in Event XML # process_eventdata = true ## Separator character to use for unrolled XML Data field names # separator = "_" ## Get only first line of Message field. For most events first line is ## usually more than enough # only_first_line_of_message = true ## Parse timestamp from TimeCreated.SystemTime event field. ## Will default to current time of telegraf processing on parsing error or if ## set to false # timestamp_from_event = true ## System field names: ## "Source", "EventID", "Version", "Level", "Task", "Opcode", "Keywords", ## "TimeCreated", "EventRecordID", "ActivityID", "RelatedActivityID", ## "ProcessID", "ThreadID", "ProcessName", "Channel", "Computer", "UserID", ## "UserName", "Message", "LevelText", "TaskText", "OpcodeText" ## ## In addition to System, Data fields can be unrolled from additional XML ## nodes in event. Human-readable representation of those nodes is formatted ## into event Message field, but XML is more machine-parsable ## Event fields to include as tags ## The values below are included by default. ## Globbing supported (e.g. "Level*" matches both "Level" and "LevelText") # event_tags = ["Source", "EventID", "Level", "LevelText", "Task", "TaskText", "Opcode", "OpcodeText", "Keywords", "Channel", "Computer"] ## Event fields to include ## All fields are sent by default. ## Globbing supported (e.g. "Level*" matches both "Level" and "LevelText") # event_fields = ["*"] ## Event fields to exclude ## Note that if you exclude all fields then no metrics are produced. A valid ## metric includes at least one field. ## Globbing supported (e.g. "Level*" matches both "Level" and "LevelText") # exclude_fields = [] ## Event fields to exclude if their value is empty or equals to zero ## The values below are included by default. ## Globbing supported (e.g. "Level*" matches both "Level" and "LevelText") # exclude_empty = ["Task", "Opcode", "*ActivityID", "UserID"]
combined_dataset/train/non-malicious/sample_13_9.ps1
sample_13_9.ps1
PARAM ( [string] $SiteToCheck = $null ) #************************************************ # DCSiteInfo.ps1 # Version 1.0 # Date: 1/14/2014 # Author: Tim Springston [MS] # Description: This script queries for the computers domain # and returns details about all domain controllers which are in # the same site. #************************************************ Trap [Exception] { # Handle exception and throw it to the stdout log file. Then continue with function and script. $Script:ExceptionMessage = $_ "[info]: Exception occurred." | WriteTo-StdOut "[info]: Exception.Message $ExceptionMessage." | WriteTo-StdOut $Error.Clear() continue } Import-LocalizedData -BindingVariable ADInfoStrings Write-DiagProgress -Activity $AdInfoStrings.ID_ADInfo_Status -Status $AdInfoStrings.ID_ADInfo_Wait #| WriteTo-StdOut -shortformat $global:FormatEnumerationLimit = -1 #Define output file. if ($SiteToCheck.Length -eq 0) {$FileDescription = "Text File containing a list of domain controllers in the Active Directory site of the computer."} else {$FileDescription = "Text File containing a list of domain controllers in the Active Directory site of $SiteToCheck."} $SectionDescription = "Active Directory Site Domain Controller List (TXT)" $ExportFile = Join-Path $Pwd.Path ($ComputerName + "_SiteDCList.txt") $SiteName = [System.DirectoryServices.ActiveDirectory.ActiveDirectorySite]::GetComputerSite() "Listing domain controllers in site." | Out-File $ExportFile -Append "AD Site for the computer is $SiteName" | Out-File $ExportFile -Append "*********************************************************"| Out-File $ExportFile -Append $DCCounter = 0 if ($SiteToCheck.Length -eq 0) { $SiteName = [System.DirectoryServices.ActiveDirectory.ActiveDirectorySite]::GetComputerSite() $SiteName = $SiteName.ToString() "Checking the computer's current Active Directory site of $SiteName" | Out-File $ExportFile -Append $ForestInfo = [System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest() $Domains = $ForestInfo.get_Domains() $SiteDCs = New-Object PSObject ForEach ($Domain in $Domains) { $DCsInSite = $Domain.FindAllDomainControllers($SiteName) ForEach ($DCInSite in $DCsInSite) { $DCObject = New-object PSObject Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'DC Name' -Value $DCInSite.Name Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'SiteName' -Value $DCInSite.SiteName Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'Domain' -Value $DCInSite.Domain Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'Forest' -Value $DCInSite.Forest Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'IP Address' -Value $DCInSite.IPAddress Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'Roles' -Value $DCInSite.Roles Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'HighestCommittedUSN' -Value $DCInSite.HighestCommittedUSN Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'OSVersion' -Value $DCInSite.OSVersion "DC details found for $DCInSite.Name" | Out-File $ExportFile -Append $DCObject | Out-File $ExportFile -Append $DCObject = $null $DCCounter++ } } } else { "Checking the user specified Active Directory site of $SiteToCheck" | Out-File $ExportFile -Append $ForestInfo = [System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest() $Domains = $ForestInfo.get_Domains() #$SiteDCs = New-Object PSObject ForEach ($Domain in $Domains) { $DCsInSite = $Domain.FindAllDomainControllers($SiteToCheck) ForEach ($DCInSite in $DCsInSite) { $DCObject = New-object PSObject Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'DC Name' -Value $DCInSite.Name Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'SiteName' -Value $DCInSite.SiteName Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'Domain' -Value $DCInSite.Domain Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'Forest' -Value $DCInSite.Forest Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'IP Address' -Value $DCInSite.IPAddress Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'Roles' -Value $DCInSite.Roles Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'HighestCommittedUSN' -Value $DCInSite.HighestCommittedUSN Add-Member -InputObject $DCObject -MemberType NoteProperty -Name 'OSVersion' -Value $DCInSite.OSVersion "DC details found for $DCInSite.Name" | Out-File $ExportFile -Append $DCObject | Out-File $ExportFile -Append $DCObject = $null $DCCounter++ } } } if ($DCCounter -eq 0) { "The local site $SiteName does not have local domain controllers." | Out-File $ExportFile -Append } CollectFiles -filesToCollect $ExportFile -fileDescription $FileDescription -sectionDescription $SectionDescription -renameOutput $false # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCEPGrnoWQ8QXC2 # 8+IrQCeO863gz4uBKR0w1SgHUXS2/KCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHmH # jHuiLbFQVCru3hOTWjQDTIYydawXMZU00f8TW5RDMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAMRy3bvukrmUkielELNoGaFfsBJC6ESy2QatS # mbm0TQDT2dLcUWx00Z2tkk1/Z790HM8A/aptn8MicyMW45guWl+B9+GgYEEcX6zK # oeoo0H9KwN6FL8r8r2FSKxUuGfnM8RZ41kG/2UlOLpeUqSakP6EgJc58VF5vTjyL # ALd6Dd7uOEqnDvJ9m4z/pJ7ZZ0KmavOxQzT1b4j81YZ9CKsZWQ6z91T2uhH1+FfS # WHRcQFl2FNnGVbO7K0Tr4YkvaLtdbUJcK2C2YcDvT2UWevi4+dBnHuLghMI0OVvZ # 7PwBcNoDceb9d2ka8KXe0ajza8qXYzwUPc8TBIKWTsOSgGURkKGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCAQ10W83xX47WR7N299cAt968Db72X7s9iJ # V6CfYjsg0gIGZxp+Oc3xGBMyMDI0MTAyODExNDA0NS41MTlaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAfGzRfUn6MAW1gAB # AAAB8TANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1NTVaFw0yNTAzMDUxODQ1NTVaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCxulCZttIf8X97rW9/J+Q4 # Vg9PiugB1ya1/DRxxLW2hwy4QgtU3j5fV75ZKa6XTTQhW5ClkGl6gp1nd5VBsx4J # b+oU4PsMA2foe8gP9bQNPVxIHMJu6TYcrrn39Hddet2xkdqUhzzySXaPFqFMk2Vi # fEfj+HR6JheNs2LLzm8FDJm+pBddPDLag/R+APIWHyftq9itwM0WP5Z0dfQyI4Wl # VeUS+votsPbWm+RKsH4FQNhzb0t/D4iutcfCK3/LK+xLmS6dmAh7AMKuEUl8i2kd # WBDRcc+JWa21SCefx5SPhJEFgYhdGPAop3G1l8T33cqrbLtcFJqww4TQiYiCkdys # CcnIF0ZqSNAHcfI9SAv3gfkyxqQNJJ3sTsg5GPRF95mqgbfQbkFnU17iYbRIPJqw # gSLhyB833ZDgmzxbKmJmdDabbzS0yGhngHa6+gwVaOUqcHf9w6kwxMo+OqG3QZIc # wd5wHECs5rAJZ6PIyFM7Ad2hRUFHRTi353I7V4xEgYGuZb6qFx6Pf44i7AjXbptU # olDcVzYEdgLQSWiuFajS6Xg3k7Cy8TiM5HPUK9LZInloTxuULSxJmJ7nTjUjOj5x # wRmC7x2S/mxql8nvHSCN1OED2/wECOot6MEe9bL3nzoKwO8TNlEStq5scd25GA0g # MQO+qNXV/xTDOBTJ8zBcGQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLy2xe59sCE0 # SjycqE5Erb4YrS1gMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDhSEjSBFSCbJyl # 3U/QmFMW2eLPBknnlsfID/7gTMvANEnhq08I9HHbbqiwqDEHSvARvKtL7j0znICY # BbMrVSmvgDxU8jAGqMyiLoM80788So3+T6IZV//UZRJqBl4oM3bCIQgFGo0VTeQ6 # RzYL+t1zCUXmmpPmM4xcScVFATXj5Tx7By4ShWUC7Vhm7picDiU5igGjuivRhxPv # bpflbh/bsiE5tx5cuOJEJSG+uWcqByR7TC4cGvuavHSjk1iRXT/QjaOEeJoOnfes # bOdvJrJdbm+leYLRI67N3cd8B/suU21tRdgwOnTk2hOuZKs/kLwaX6NsAbUy9pKs # DmTyoWnGmyTWBPiTb2rp5ogo8Y8hMU1YQs7rHR5hqilEq88jF+9H8Kccb/1ismJT # GnBnRMv68Ud2l5LFhOZ4nRtl4lHri+N1L8EBg7aE8EvPe8Ca9gz8sh2F4COTYd1P # Hce1ugLvvWW1+aOSpd8NnwEid4zgD79ZQxisJqyO4lMWMzAgEeFhUm40FshtzXud # AsX5LoCil4rLbHfwYtGOpw9DVX3jXAV90tG9iRbcqjtt3vhW9T+L3fAZlMeraWfh # 7eUmPltMU8lEQOMelo/1ehkIGO7YZOHxUqeKpmF9QaW8LXTT090AHZ4k6g+tdpZF # fCMotyG+E4XqN6ZWtKEBQiE3xL27BDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQD7n7Bk4gsM2tbU/i+M3BtRnLj096CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smZujAi # GA8yMDI0MTAyODA1MDM1NFoYDzIwMjQxMDI5MDUwMzU0WjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqyZm6AgEAMAcCAQACAgaxMAcCAQACAhPGMAoCBQDqyus6AgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAA0BaKsAtdDQTH1mQ1AYUo/KxlS4 # RtFuuuP4gPyvI62JGK76KDo1S6HM+ctaAw8utdUJxDxdBIT7YVtf3EsB6ahF9dyV # II0TJFjSP8cCJOTC5jRGlCifOuJzCDhxwQQAhSXeWAkO4VhE7gDZPP8iKAQ1S6eX # o0xnFmuVzKYGWRGUrO7HxP5nS8g4cZRiZaQEiMHRdB8GJDJLV2TUfd6Hut03mT2z # +RLogrNkAFxK/6rNsuyXu+FFy81XbveHgyGjD6chYE3AuUByswKrW/SRVmzMrGVD # /QhwaIDDpkpr3XNM9N/LMrmVoP4y9JQ4hhbVj5wZ6XL5rCe5OY1v86QJAdwxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfGz # RfUn6MAW1gABAAAB8TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCeWWBJ62A+xx0ukflXQvf2nHrH # gKd+8+6vu+OqOuREnDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINV3/T5h # S7ijwao466RosB7wwEibt0a1P5EqIwEj9hF4MIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHxs0X1J+jAFtYAAQAAAfEwIgQg8PuciiVY # Q85s2ehb7/+SpISkahbpSB/VJgG8R7IGdAkwDQYJKoZIhvcNAQELBQAEggIAXL4e # wH14cyZ/yqPiZDrQ+kaUYEQ8f6csHR6GS5du9JaHC3cOm1iXvSbffEJS2lwV4xXw # oXtqPOR3StnnZWkRffUPy2SP3uA2wLGBSYV4C8LqaByKvjkPbs8uShNFCfO/daXR # tC4bunQlkXIHUkMXXUfuQ0Jli0p7074HoWH443OoqG3P5y6sg34gXYnjx0jzzX0G # /PtxZfYt8oAVCIGbl3kLbwQqXe+c5E45St/BZm5aAonRcx3WZp17e5/m6jhHEvJu # NA4fm6fkcnp2IxUpNCCOUOAu1Mb2EX6svgXYrwvbtdrV9llGNaBZRZnvbLgPj/Ko # YeZX9ULEz9rKOuVon+y9T2QatgMAYtbU7EFZ5l9KyubtwlsRLUViwwRHg9pawb0k # 12AzzSQc3YiLL4/VhaV8969+Dvla8F14QOYyL8cLKQL4yWUWrCDmVvN3e1H33fke # 4064bHsYonlBrNOk6UemYkB1haZkx0AYNY+UQu7F7umuWwRPSAIYJSOWe5PSE17x # L9yz83hJa2hwj9RLcTd/k6XfeyfOD7Gisoy7fVVFWeclm6+eMCa6XdvD6IE6PjZV # ze7UZwQ0bI9CgMjLqX+l1Ald8CTTAjhoC0V+7gZaABtJwjRcpXM6NUqwWbNgxvpe # nP28DYwCDHJYNkb4sDJQOPQkyluJQkN1FLacWYc= # SIG # End signature block
combined_dataset/train/non-malicious/3915.ps1
3915.ps1
function Test-ListPriceSheets { $priceSheets = Get-AzConsumptionPriceSheet -Top 5 Assert-NotNull $priceSheets Assert-NotNull $priceSheets.Id Assert-NotNull $priceSheets.Name Assert-NotNull $priceSheets.Type $priceSheetProperties = $priceSheets.PriceSheets Assert-NotNull $priceSheetProperties Assert-AreEqual 5 $priceSheetProperties.Count Foreach($psp in $priceSheetProperties) { Assert-NotNull $psp.BillingPeriodId Assert-NotNull $psp.CurrencyCode Assert-NotNull $psp.IncludedQuantity Assert-Null $psp.MeterDetails Assert-NotNull $psp.MeterId Assert-NotNull $psp.PartNumber Assert-NotNull $psp.UnitOfMeasure Assert-NotNull $psp.UnitPrice } } function Test-ListPriceSheetsWithMeterDetailsExpand { $priceSheets = Get-AzConsumptionPriceSheet -ExpandMeterDetail -Top 5 Assert-NotNull $priceSheets Assert-NotNull $priceSheets.Id Assert-NotNull $priceSheets.Name Assert-NotNull $priceSheets.Type $priceSheetProperties = $priceSheets.PriceSheets Assert-NotNull $priceSheetProperties Assert-AreEqual 5 $priceSheetProperties.Count Foreach($psp in $priceSheetProperties) { Assert-NotNull $psp.BillingPeriodId Assert-NotNull $psp.CurrencyCode Assert-NotNull $psp.IncludedQuantity Assert-NotNull $psp.MeterDetails Assert-NotNull $psp.MeterId Assert-NotNull $psp.PartNumber Assert-NotNull $psp.UnitOfMeasure Assert-NotNull $psp.UnitPrice } } function Test-ListBillingPeriodPriceSheets { $priceSheets = Get-AzConsumptionPriceSheet -BillingPeriodName 201712 -Top 5 Assert-NotNull $priceSheets Assert-NotNull $priceSheets.Id Assert-NotNull $priceSheets.Name Assert-NotNull $priceSheets.Type $priceSheetProperties = $priceSheets.PriceSheets Assert-NotNull $priceSheetProperties Assert-AreEqual 5 $priceSheetProperties.Count Foreach($psp in $priceSheetProperties) { Assert-NotNull $psp.BillingPeriodId Assert-NotNull $psp.CurrencyCode Assert-NotNull $psp.IncludedQuantity Assert-Null $psp.MeterDetails Assert-NotNull $psp.MeterId Assert-NotNull $psp.PartNumber Assert-NotNull $psp.UnitOfMeasure Assert-NotNull $psp.UnitPrice } }
combined_dataset/train/non-malicious/sample_20_40.ps1
sample_20_40.ps1
ConvertFrom-StringData @' id_printsettmpsystem32check_st=One or more TMP file found under system32 folder and this may cause problems to install printer drivers '@ # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDEpubIm4uv9qRj # 9OskpCl82R8YrNVkyhclnRFJKZJZMqCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKwGPUJjR0X/U8VVRx366vuB # wYQnxucX/KB2tSt+//fKMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAHUt2s1BB/I/ngAwjwDxqcHCOw+uhE8BsajNZEvjpBQdIU9hk2YHU2JCJ # MhAnNfYLINmENW5+4WBdVwGOUrwydzfpOY1i+xTyTBIruxzMSjtYnNzxl2a900Kn # DTBbknTmF5kQgX+LqKVqb3pzX7jHRjdnalk0Dc/wjixpqUr6HDGEWgPecSI70uLL # 9DjcNvZ02VZ/pDhbfvYDYULasgYYeVvXVDPQ4tGRPj9BHnAINTvXbro37lNTFIg+ # aDOB6Axs2I5I0KwY0cFJ+RrtszigBVRZMdyomkbOsfPkFKLsqBpEv76KqUjbEQgG # WFFKHU8LYBfAqvMB6nN8Pn+TUDHa46GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCRi14LBaeQVmJ/3BuUDVvarJ6UFxg9kXHR9AYek4+y5wIGZxp9zsoL # GBMyMDI0MTAyODExNDA0MS4wNzVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfPFCkOuA8wdMQABAAAB8zANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ2 # MDJaFw0yNTAzMDUxODQ2MDJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OEQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQD+n6ba4SuB9iSO5WMhbngqYAb+z3IfzNpZIWS/sgfX # hlLYmGnsUtrGX3OVcg+8krJdixuNUMO7ZAOqCZsXUjOz8zcn1aUD5D2r2PhzVKjH # tivWGgGj4x5wqWe1Qov3vMz8WHsKsfadIlWjfBMnVKVomOybQ7+2jc4afzj2XJQQ # SmE9jQRoBogDwmqZakeYnIx0EmOuucPr674T6/YaTPiIYlGf+XV2u6oQHAkMG56x # YPQikitQjjNWHADfBqbBEaqppastxpRNc4id2S1xVQxcQGXjnAgeeVbbPbAoELhb # w+z3VetRwuEFJRzT6hbWEgvz9LMYPSbioHL8w+ZiWo3xuw3R7fJsqe7pqsnjwvni # P7sfE1utfi7k0NQZMpviOs//239H6eA6IOVtF8w66ipE71EYrcSNrOGlTm5uqq+s # yO1udZOeKM0xY728NcGDFqnjuFPbEEm6+etZKftU9jxLCSzqXOVOzdqA8O5Xa3E4 # 1j3s7MlTF4Q7BYrQmbpxqhTvfuIlYwI2AzeO3OivcezJwBj2FQgTiVHacvMQDgSA # 7E5vytak0+MLBm0AcW4IPer8A4gOGD9oSprmyAu1J6wFkBrf2Sjn+ieNq6Fx0tWj # 8Ipg3uQvcug37jSadF6q1rUEaoPIajZCGVk+o5wn6rt+cwdJ39REU43aWCwn0C+X # xwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFMNkFfalEVEMjA3ApoUx9qDrDQokMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDfxByP/NH+79vc3liO4c7nXM/UKFcAm5w6 # 1FxRxPxCXRXliNjZ7sDqNP0DzUTBU9tS5DqkqRSiIV15j7q8e6elg8/cD3bv0sW4 # Go9AML4lhA5MBg3wzKdihfJ0E/HIqcHX11mwtbpTiC2sgAUh7+OZnb9TwJE7pbEB # PJQUxxuCiS5/r0s2QVipBmi/8MEW2eIi4mJ+vHI5DCaAGooT4A15/7oNj9zyzRAB # TUICNNrS19KfryEN5dh5kqOG4Qgca9w6L7CL+SuuTZi0SZ8Zq65iK2hQ8IMAOVxe # wCpD4lZL6NDsVNSwBNXOUlsxOAO3G0wNT+cBug/HD43B7E2odVfs6H2EYCZxUS1r # gReGd2uqQxgQ2wrMuTb5ykO+qd+4nhaf/9SN3getomtQn5IzhfCkraT1KnZF8TI3 # ye1Z3pner0Cn/p15H7wNwDkBAiZ+2iz9NUEeYLfMGm9vErDVBDRMjGsE/HqqY7QT # STtDvU7+zZwRPGjiYYUFXT+VgkfdHiFpKw42Xsm0MfL5aOa31FyCM17/pPTIKTRi # KsDF370SwIwZAjVziD/9QhEFBu9pojFULOZvzuL5iSEJIcqopVAwdbNdroZi2HN8 # nfDjzJa8CMTkQeSfQsQpKr83OhBmE3MF2sz8gqe3loc05DW8JNvZ328Jps3LJCAL # t0rQPJYnOzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjhEMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBu # +gYs2LRha5pFO79g3LkfwKRnKKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smZTzAiGA8yMDI0MTAyODA1MDIw # N1oYDzIwMjQxMDI5MDUwMjA3WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqyZlP # AgEAMAoCAQACAgMdAgH/MAcCAQACAhM2MAoCBQDqyurPAgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAKdpPIdnmDurw1W3KjddEyaQMnw+EyRSLq+zprTP8t/0 # ieGI79w2e6dpTuLIeBbTED1C/5vFaZhn3mit4LVJEIdMu9b2d8cWo3hrWDMqssZA # AGH3NNXRuQwPBIwzaTXVg8edpOImVomm0IlTA6TpSFjiSAij1Vxwohz3Men9w/M4 # fV0H5QtmVhWsq9bthffWvfyFz7mf6eSXX6VsSUsp/U8wwe3Z+xy/ccjeORHi3Um6 # IgANr2SLaO4c8JKNi9YyCO450ksm8NLZx2wEh8rG5dOylqGX8SZTVNxQg8uGM0FR # AEmTVQHT+Dvp3RsLMVX2f+49GvWR4VL26Voga63vAFkxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfPFCkOuA8wdMQABAAAB # 8zANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCDWRV5Y2YBvs9I/nz+EfkgmqL6JOqQU5c73J87sljrz # OjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIBi82TSLtuG4Vkp8wBmJk/T+ # RAh841sG/aDOwxg6O2LoMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHzxQpDrgPMHTEAAQAAAfMwIgQg9GCVSbXiruUvANYshaHmkS8a # AUtp4TeTu/csllVDepIwDQYJKoZIhvcNAQELBQAEggIAOWSP3oGj9DZbX8IFhUkW # 2t3dmwokPHDNN0nCFgX3q+TWiToNsb5o5ageSSKY5FXlexwX/paFqy+7qFG2B88M # 7WtB1kxLZLNa8SKRWinMuxV+9JZpBasdxGpWHm7xVBFXMHcXS4eA9Kx4zANKB8pF # sqVvBUg/DnEo5UUYXB0os0XkzJ6LTULhf90sUtgK6Gynht7NuKf6EGKhGcBiKrce # OsHtAMpkeLqazZeBWnOmn8KhDOcSNC7xGflVE+l09JhhQRfiz2tyf+AswNIQ3gIa # LUSmJHx2a51l02vR9JQ+LXghS3OZaPSOHgHK2QchOHN1tRi2oKG/c8jQby7HlWj1 # nYZ4yOUCZkMX5yKm2Ydzd4ttSIBsEHCGz48QKpvJTM1SbognIV8H5gO4vAZi0+AL # PEyEuZQn+amhQ+TsDKcMLw4CKXqIlYwwGqr7M7JGjvXGH80zxA4gr+FRMeHyPT6m # GxxeTk63spTQbPPezsyhNR3IzFzzEiEGJddoTiaSn2XOD+hRe/UaYcmXqCLwO7vX # iR7/zTJjK0YUjWmnzeeO3fJiqqAdetZvyS7Xi1NYL8bJNyqILSq9htqU/K6J+aff # O1owdolUElw+Xb2mFkXeRMQWWu18wirptUr8VVOH8I+4S0WkBDP8AdifYgIg1CZS # /+/fbHFAmdKFP+3KNRtmWLQ= # SIG # End signature block
combined_dataset/train/non-malicious/ISE-CopyOutPutToEditor_1.ps1
ISE-CopyOutPutToEditor_1.ps1
function ISE-CopyOutPutToEditor () { $count = $psise.CurrentOpenedRunspace.OpenedFiles.count $psIse.CurrentOpenedRunspace.OpenedFiles.Add() $Newfile = $psIse.CurrentOpenedRunspace.OpenedFiles[$count] $Newfile.Editor.Text = $psIse.CurrentOpenedRunspace.output.Text $Newfile.Editor.Focus() } $null = $psIse.CustomMenu.Submenus.Add("Copy Output to Editor", {ISE-CopyOutPutToEditor}, 'Ctrl+O')
combined_dataset/train/non-malicious/sample_15_51.ps1
sample_15_51.ps1
# Copyright (c) Microsoft Corporation. # Licensed under the MIT License. Microsoft.PowerShell.Management\Get-Item function:Clear-Host | Microsoft.PowerShell.Management\Set-Item function:__clearhost function Clear-Host { [Alias('cls')] param() __clearhost if ($host.Runspace.LanguageMode -eq [System.Management.Automation.PSLanguageMode]::FullLanguage) { $psEditor.Window.Terminal.Clear() } } if (!$IsMacOS -or $IsLinux) { Microsoft.PowerShell.Utility\Set-Alias -Name clear -Value Clear-Host -Option AllScope } # SIG # Begin signature block # MIIr5wYJKoZIhvcNAQcCoIIr2DCCK9QCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAbovJceGZv5iie # oFeWBCUcylf9xUhhSdEO8vRtO0aojKCCEW4wggh+MIIHZqADAgECAhM2AAAB33OB # lxa+Mv0NAAIAAAHfMA0GCSqGSIb3DQEBCwUAMEExEzARBgoJkiaJk/IsZAEZFgNH # QkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxFTATBgNVBAMTDEFNRSBDUyBDQSAwMTAe # Fw0yNDAxMjAwMTMzNDRaFw0yNTAxMTkwMTMzNDRaMCQxIjAgBgNVBAMTGU1pY3Jv # c29mdCBBenVyZSBDb2RlIFNpZ24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK # AoIBAQDVucAmkbIWpspYysyydQyyRh2L8q5igYFcy2vDk8xGvVMRBhxwbOsJIEd0 # wY8N7WU/xgkYMnSsM4vmc2B49DGdrAjSJqbsx0zf+DLFjrBITUecdRhlq0VKGX8U # bVOkg0aIfFNLRs4DSrCZYh26zyB8qkL/jUmB7DhcBEhhgOlXRQ4LHnUv7qf+iXqD # uwFz9tUTAh8JGsgLRBK0oSsRfUB+FJF2KyUxzmeFXJKiEynsWz4kqoM91ag1Yw0U # 8d0e+RgAKi3Ft1cXA+3qKM6I1H11e/NdIjh7oThvrBtfEngwlwbTF3KZOHdhLBFZ # 18U4v8VeTlb4r94346CY2+SKnQa7AgMBAAGjggWKMIIFhjApBgkrBgEEAYI3FQoE # HDAaMAwGCisGAQQBgjdbAQEwCgYIKwYBBQUHAwMwPQYJKwYBBAGCNxUHBDAwLgYm # KwYBBAGCNxUIhpDjDYTVtHiE8Ys+hZvdFs6dEoFgg93NZoaUjDICAWQCAQ4wggJ2 # BggrBgEFBQcBAQSCAmgwggJkMGIGCCsGAQUFBzAChlZodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F # JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDEu # YW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUy # MDAxKDIpLmNydDBSBggrBgEFBQcwAoZGaHR0cDovL2NybDIuYW1lLmdibC9haWEv # QlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBS # BggrBgEFBQcwAoZGaHR0cDovL2NybDMuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAx # LkFNRS5HQkxfQU1FJTIwQ1MlMjBDQSUyMDAxKDIpLmNydDBSBggrBgEFBQcwAoZG # aHR0cDovL2NybDQuYW1lLmdibC9haWEvQlkyUEtJQ1NDQTAxLkFNRS5HQkxfQU1F # JTIwQ1MlMjBDQSUyMDAxKDIpLmNydDCBrQYIKwYBBQUHMAKGgaBsZGFwOi8vL0NO # PUFNRSUyMENTJTIwQ0ElMjAwMSxDTj1BSUEsQ049UHVibGljJTIwS2V5JTIwU2Vy # dmljZXMsQ049U2VydmljZXMsQ049Q29uZmlndXJhdGlvbixEQz1BTUUsREM9R0JM # P2NBQ2VydGlmaWNhdGU/YmFzZT9vYmplY3RDbGFzcz1jZXJ0aWZpY2F0aW9uQXV0 # aG9yaXR5MB0GA1UdDgQWBBSO7i0qme7tjtjFjyuIjlmGM6cbCTAOBgNVHQ8BAf8E # BAMCB4AwRQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEWMBQGA1UEBRMNMjM2MTY3KzUwMTk3MDCCAeYGA1UdHwSCAd0wggHZMIIB # 1aCCAdGgggHNhj9odHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ1JM # L0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwxLmFtZS5nYmwv # Y3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwyLmFtZS5n # YmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmwzLmFt # ZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGMWh0dHA6Ly9jcmw0 # LmFtZS5nYmwvY3JsL0FNRSUyMENTJTIwQ0ElMjAwMSgyKS5jcmyGgb1sZGFwOi8v # L0NOPUFNRSUyMENTJTIwQ0ElMjAwMSgyKSxDTj1CWTJQS0lDU0NBMDEsQ049Q0RQ # LENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZp # Z3VyYXRpb24sREM9QU1FLERDPUdCTD9jZXJ0aWZpY2F0ZVJldm9jYXRpb25MaXN0 # P2Jhc2U/b2JqZWN0Q2xhc3M9Y1JMRGlzdHJpYnV0aW9uUG9pbnQwHwYDVR0jBBgw # FoAUllGE4Gtve/7YBqvD8oXmKa5q+dQwHwYDVR0lBBgwFgYKKwYBBAGCN1sBAQYI # KwYBBQUHAwMwDQYJKoZIhvcNAQELBQADggEBAJe/YXNSCoXitLf/X5pfJZpep3cs # jdqmBgg+8Kr++8XMjWwdm4tiLasJMUPCgmp5NYn3wC4GefGYwfF7Xm2FMSR2i6QU # HjigGu6BjdWQh4EwGaNqXLkXlUM7Ww2Z0KrRtpCL16DCOTNZuCFPAytSHFskPWrr # 6q3EBuiM6P5VLgFSKiAxcunldJorbrBrvZSZib1OINzFGAQszUR0ytovW6FOp+uo # VhiQCqnOheC1ppnZPss7vnXoogyO0xgSW40bRlltGfwnlOd3IZ/43ZOj5XeeShg5 # 2SzVEiyYrZjD17MSNzQM1JKI07+mtAC7D+eZ/+g2pM/91oHcrDq9Nq4QrS0wggjo # MIIG0KADAgECAhMfAAAAUeqP9pxzDKg7AAAAAABRMA0GCSqGSIb3DQEBCwUAMDwx # EzARBgoJkiaJk/IsZAEZFgNHQkwxEzARBgoJkiaJk/IsZAEZFgNBTUUxEDAOBgNV # BAMTB2FtZXJvb3QwHhcNMjEwNTIxMTg0NDE0WhcNMjYwNTIxMTg1NDE0WjBBMRMw # EQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQD # EwxBTUUgQ1MgQ0EgMDEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDJ # mlIJfQGejVbXKpcyFPoFSUllalrinfEV6JMc7i+bZDoL9rNHnHDGfJgeuRIYO1LY # /1f4oMTrhXbSaYRCS5vGc8145WcTZG908bGDCWr4GFLc411WxA+Pv2rteAcz0eHM # H36qTQ8L0o3XOb2n+x7KJFLokXV1s6pF/WlSXsUBXGaCIIWBXyEchv+sM9eKDsUO # LdLTITHYJQNWkiryMSEbxqdQUTVZjEz6eLRLkofDAo8pXirIYOgM770CYOiZrcKH # K7lYOVblx22pdNawY8Te6a2dfoCaWV1QUuazg5VHiC4p/6fksgEILptOKhx9c+ia # piNhMrHsAYx9pUtppeaFAgMBAAGjggTcMIIE2DASBgkrBgEEAYI3FQEEBQIDAgAC # MCMGCSsGAQQBgjcVAgQWBBQSaCRCIUfL1Gu+Mc8gpMALI38/RzAdBgNVHQ4EFgQU # llGE4Gtve/7YBqvD8oXmKa5q+dQwggEEBgNVHSUEgfwwgfkGBysGAQUCAwUGCCsG # AQUFBwMBBggrBgEFBQcDAgYKKwYBBAGCNxQCAQYJKwYBBAGCNxUGBgorBgEEAYI3 # CgMMBgkrBgEEAYI3FQYGCCsGAQUFBwMJBggrBgEFBQgCAgYKKwYBBAGCN0ABAQYL # KwYBBAGCNwoDBAEGCisGAQQBgjcKAwQGCSsGAQQBgjcVBQYKKwYBBAGCNxQCAgYK # KwYBBAGCNxQCAwYIKwYBBQUHAwMGCisGAQQBgjdbAQEGCisGAQQBgjdbAgEGCisG # AQQBgjdbAwEGCisGAQQBgjdbBQEGCisGAQQBgjdbBAEGCisGAQQBgjdbBAIwGQYJ # KwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMBIGA1UdEwEB/wQI # MAYBAf8CAQAwHwYDVR0jBBgwFoAUKV5RXmSuNLnrrJwNp4x1AdEJCygwggFoBgNV # HR8EggFfMIIBWzCCAVegggFToIIBT4YxaHR0cDovL2NybC5taWNyb3NvZnQuY29t # L3BraWluZnJhL2NybC9hbWVyb290LmNybIYjaHR0cDovL2NybDIuYW1lLmdibC9j # cmwvYW1lcm9vdC5jcmyGI2h0dHA6Ly9jcmwzLmFtZS5nYmwvY3JsL2FtZXJvb3Qu # Y3JshiNodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9hbWVyb290LmNybIaBqmxkYXA6 # Ly8vQ049YW1lcm9vdCxDTj1BTUVSb290LENOPUNEUCxDTj1QdWJsaWMlMjBLZXkl # MjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPUFNRSxE # Qz1HQkw/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVjdENsYXNz # PWNSTERpc3RyaWJ1dGlvblBvaW50MIIBqwYIKwYBBQUHAQEEggGdMIIBmTBHBggr # BgEFBQcwAoY7aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL2NlcnRz # L0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6Ly9jcmwyLmFt # ZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUHMAKGK2h0dHA6 # Ly9jcmwzLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQwNwYIKwYBBQUH # MAKGK2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0FNRVJvb3RfYW1lcm9vdC5jcnQw # gaIGCCsGAQUFBzAChoGVbGRhcDovLy9DTj1hbWVyb290LENOPUFJQSxDTj1QdWJs # aWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9u # LERDPUFNRSxEQz1HQkw/Y0FDZXJ0aWZpY2F0ZT9iYXNlP29iamVjdENsYXNzPWNl # cnRpZmljYXRpb25BdXRob3JpdHkwDQYJKoZIhvcNAQELBQADggIBAFAQI7dPD+jf # XtGt3vJp2pyzA/HUu8hjKaRpM3opya5G3ocprRd7vdTHb8BDfRN+AD0YEmeDB5HK # QoG6xHPI5TXuIi5sm/LeADbV3C2q0HQOygS/VT+m1W7a/752hMIn+L4ZuyxVeSBp # fwf7oQ4YSZPh6+ngZvBHgfBaVz4O9/wcfw91QDZnTgK9zAh9yRKKls2bziPEnxeO # ZMVNaxyV0v152PY2xjqIafIkUjK6vY9LtVFjJXenVUAmn3WCPWNFC1YTIIHw/mD2 # cTfPy7QA1pT+GPARAKt0bKtq9aCd/Ym0b5tPbpgCiRtzyb7fbNS1dE740re0COE6 # 7YV2wbeo2sXixzvLftH8L7s9xv9wV+G22qyKt6lmKLjFK1yMw4Ni5fMabcgmzRvS # jAcbqgp3tk4a8emaaH0rz8MuuIP+yrxtREPXSqL/C5bzMzsikuDW9xH10graZzSm # PjilzpRfRdu20/9UQmC7eVPZ4j1WNa1oqPHfzET3ChIzJ6Q9G3NPCB+7KwX0OQmK # yv7IDimj8U/GlsHD1z+EF/fYMf8YXG15LamaOAohsw/ywO6SYSreVW+5Y0mzJutn # BC9Cm9ozj1+/4kqksrlhZgR/CSxhFH3BTweH8gP2FEISRtShDZbuYymynY1un+Ry # fiK9+iVTLdD1h/SxyxDpZMtimb4CgJQlMYIZzzCCGcsCAQEwWDBBMRMwEQYKCZIm # iZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRUwEwYDVQQDEwxBTUUg # Q1MgQ0EgMDECEzYAAAHfc4GXFr4y/Q0AAgAAAd8wDQYJYIZIAWUDBAIBBQCgga4w # GQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisG # AQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIANJ0YnRQMG0nOCoBWeq736xqzn1ybGz # lb/yzwInv3qpMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8AcwBvAGYA # dKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEBBQAEggEA # pkbr1yTMO3bjKvXcXS1tIThjxOyAXN33x367JOEf+v5BN8/Wi0dqb2l2sBPKcDQl # uDhxv+047cfn1AUwcExCmoIRTKoE65HHLOdllkTeqmx6a+GRHfv8lxIq3dLuvVWf # FM/0DjFvNOUzyQpYkmKvh0dGGlaIVY6KYpJ8q5PiO7iTt/0ocHmVG4BsqS+24AXm # VStsi6n6/3zqghC+TQkZg6FJER9qGfK7AZDnRjVdONyU6xJshxB3yidoZyu0LuVX # OLeKRyRvNWuTbKSSKE3RdtJ1fSnSOqWVfbGIv5riKr0T7yOzQNdJLPEsWgetdonM # 7yjzGDWFCq6HjTOu3KXJz6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCCF38GCSqG # SIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsqhkiG9w0B # CRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFlAwQCAQUA # BCAy5fjQM+2rNKT/xtjyy2gRqFKB1wDkSOGKJPV5wQwFrwIGZfxpJR9WGBMyMDI0 # MDQwMzIxMzM0MC4wNTlaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBP # cGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0wNUUwLUQ5 # NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2WgghHtMIIH # IDCCBQigAwIBAgITMwAAAe3hX8vV96VdcwABAAAB7TANBgkqhkiG9w0BAQsFADB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1NDFaFw0y # NTAzMDUxODQ1NDFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYD # VQQLEx5uU2hpZWxkIFRTUyBFU046ODkwMC0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4IC # DwAwggIKAoICAQCoMMJskrrqapycLxPC1H7zD7g88NpbEaQ6SjcTIRbzCVyYQNsz # 8TaL1pqFTEAPL1X7ojL4/EaEW+UjNqZs/ayMyW4YIpFPZP2x4FBMVCddseF2i+aM # MjDHi0LcTQZxM2s3mFMrCZAWSfLYXYDIimFBz8j0oLWGy3VgLmBTKM4xLqv7DZUz # 8B2SoAmbEtp62ngSl0hOoN73SFwE+Y24SvGQMWhykpG+vXDwcpWvwDe+TgnrLR7A # TRFXN5JS26dm2yy6SYFMRYnME3dMHCQ/UQIQQNC8nLmIvdKkAoWEMXtJsGEo3QrM # 2S2SBv4PpHRzRukzTtP+UAceGxM9JyrwUQP5OCEmW6YchEyRDSwP4hU9f7B0Ayh1 # 4Pw9vJo7jewNjeMPIkmneyLSi0ruv2ox/xRGtcJ9yBNC5BaRktjz7stPaojR+PDA # 2fuBtCo8xKlkt53mUb7AY+CZHHqhLm76pdMF6BHv2TvwlVBeQRN22XjaVVRwCgjg # JnNewt7PejcrpUn0qHLgLq+1BN1DzYukWkTr7wT0zl0iXr+NtqUkWSOnWRfe8N21 # tB6uv3VkW8nFdChtbbZZz24peLtJEZuNrN8Xf9PTPMzZXDJBI1EciR/91QcGoZFm # VbFVb2rUIAs01+ZkewvbhmGVDefX9oZG4/K4gGUsTvTW+r1JZMxUT2MwqQIDAQAB # o4IBSTCCAUUwHQYDVR0OBBYEFM4b8Oz33hAqBEfKlAZf0NKh4CIZMB8GA1UdIwQY # MBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6 # Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUt # U3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYB # BQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWlj # cm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB # /wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0G # CSqGSIb3DQEBCwUAA4ICAQCd1gK2Rd+eGL0eHi+iE6/qDY8sbbsO4emancp6KPN+ # xq5ZAatiBR4jmRRhm+9Vik0Fo0DLWi/N28bFI7dXYw09p3vCipbjy4Eoifm0Nud7 # /4U30i9+7RvW7XOQ3rx37+U7vq9lk6yYpGCNp0jlJ188/CuRPgqJnfq5EdeafH2A # oG46hKWTeB7DuXasGt6spJOenGedSre34MWZqeTIQ0raOItZnFuGDy4+xoD1qRz2 # QW+u2gCHaG8AQjhYUM4uTi9t6kttj6c7Xamr2zrWuceDhz7sKLttLTJ7ws5YrA2I # 8cTlbMAf2KW0GVjKbYGd+LZGduEK7/7fs4GUkMqc51FsNdG1n+zgc7zHu2oGGeCB # g4s8ZR0ZFyx7jsgm9sSFCKQ5CsbAvlr/60Ndk5TeMR8Js2kNUicu2CqZ03833Tsv # Tgk7iD1KLgfS16HEvjN6m4VKJKgjJ7OJJzabtS4JQgUnJrIZfyosk4D18rZni9pU # wN03WgTmd10WTwiZOu4g8Un6iKcPMY/iFqTu4ntkzFUxBBpbFG6k1CINZmoirEWm # CtG3lyZ2IddmjtIefTkIvGWb4Jxzz7l2m/E2kGOixDJHsahZVmwsoNvhy5ku/inU # ++dXHzw+hlvqTSFT89rIFVhcmsWPDJPNRSSpMhoJ33V2Za/lkKcbkUM0SbQgS9qs # dzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQEL # BQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNV # BAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4X # DTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzAR # BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p # Y3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3Rh # bXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM # 57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm # 95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzB # RMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBb # fowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCO # Mcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYw # XE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW # /aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/w # EPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPK # Z6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2 # BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfH # CBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYB # BAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8v # BO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYM # KwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEF # BQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBW # BgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUH # AQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtp # L2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsF # AAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518Jx # Nj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+ # iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2 # pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefw # C2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7 # T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFO # Ry3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhL # mm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3L # wUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5 # m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE # 0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQMIICOAIB # ATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEnMCUGA1UE # CxMeblNoaWVsZCBUU1MgRVNOOjg5MDAtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNy # b3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDuHayKTCaY # sYxJh+oWTx6uVPFw+aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpX # YXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQg # Q29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAy # MDEwMA0GCSqGSIb3DQEBCwUAAgUA6bgJ9jAiGA8yMDI0MDQwMzE3MDE0MloYDzIw # MjQwNDA0MTcwMTQyWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDpuAn2AgEAMAoC # AQACAgSUAgH/MAcCAQACAhQ5MAoCBQDpuVt2AgEAMDYGCisGAQQBhFkKBAIxKDAm # MAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcN # AQELBQADggEBAD3Vla1jFcZVCUHeWybFSR/TXbfm6GGYLdMNaxcaZ4g4lneuf/Eq # Ep4fbwb8sWEF73tQFDTADNU5B/MXQ+Mi07oORkY4eXZfneDPAfcAJ1R5WFAmRzsF # EGJrz83IWcDF/fQnhIBN1glqCKxmckocX6+++QXWX04P5Tx9B+Pj9VZcayYbFH6e # F7l0BE9K+OKjNNtFYXE5RlmRTEy89btw82vdsUttKbqKwUda6W+9kpgCCUJipFxM # kGALgaRLvBTAUHfC7luPHhE2LNYj9ccBGKpzeJx5GaBeBeB8uptkYMlyO64bMmrq # XJatodVYkRR3A4Se6Tqm8LVw4KeZMB1U7VMxggQNMIIECQIBATCBkzB8MQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3Nv # ZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAe3hX8vV96VdcwABAAAB7TANBglg # hkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqG # SIb3DQEJBDEiBCCT7L7ttL6PSwtv1BbUouZKsBxY+SNxiCCzK1VFFOG2UTCB+gYL # KoZIhvcNAQkQAi8xgeowgecwgeQwgb0EII0uDWg0CFseKxK3A16l1wrIwrsSDrXZ # 6xSf0F4xbMo5MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAC # EzMAAAHt4V/L1felXXMAAQAAAe0wIgQgdGoqzWxBTvwHvsTIxYqr5oiVCTGJOeKF # nbWbhY8yNTgwDQYJKoZIhvcNAQELBQAEggIAKOcgfdFXK9XKSW9YVtxpEjlByvGp # tzT/p+J5vjo2YiFlHjclZTMG0L/FDHLPSIkrm9BCDb8WORTifxeiyEKYM/GPtMLp # XV95d3qKwY97XKkY1Zj9rObMxgYvEUeg2cgFw7RiEiE+CMijekYMbLdE7RTkMKvf # /usPjwxF1cSShGEi8ScpgwQwP0yKGbXWobnOmab1h6pn21Ri96tIl+ez/I+NYEjB # s2H90IzZXXtX91J6l8fgl6GK1LAlqdbv6FCUlCYIGsxdkfVjPNLcvJhZ+K0KARI3 # 7mKsTVK0hM0ElrczLldLK4SpO0dy2touGrz+XaLICcPB6h1NFZZt6Vpty02egLpm # y7ThvTh544exf543XDkc8btOSb4ld9hERz2yKtJFQnMRXCbiowoURXV3xfdZETwI # t2dMLwyeqPO7CsAseNVxnyMT82NcsnC9TrWE1nPCNLKGbQAs9nxZJY5JSPbpJhYg # wu9TDlL35bF9WUqsHOfjd1yNm137gwNg9fLfqt1ETuDKWINdxwOAEJm93+52I9JW # zIGIS+1u+62kQf5o1DZjmB5+23hjnwuIv4JOYG9lqr8arHu2h3qc2OnKNnEAAVM1 # CjYO3myVgv9wkaVOzY4zmHSZz0Qdg4d+f65vgrOfgYO1gpGNGuPNp5kOxtQoVRdJ # aIofI4da1vRsjwA= # SIG # End signature block
combined_dataset/train/non-malicious/264.ps1
264.ps1
Function Get-HashTableEmptyValue { PARAM([System.Collections.Hashtable]$HashTable) $HashTable.GetEnumerator().name | ForEach-Object -Process { if($HashTable[$_] -eq "" -or $HashTable[$_] -eq $null) { Write-Output $_ } } }
combined_dataset/train/non-malicious/count-object_1.ps1
count-object_1.ps1
#a function to count how many items there are, whether its an array, a collection, or actually just # a single no array/non list/non collection object in which case it would be 1 function count-object ($InputObject) { if ($inputobject -eq $Null ) { return 0} if ($inputobject -is [system.array]) { return $inputobject.length } if ($inputobject -is [system.collections.ICollection] -or $inputobject -is [system.collections.IList] -or $inputobject -is [system.collections.IDictionary] ) { return $inputobject.count } #strings are ienumerable, they also have a length, but i think we want to treat 1 string as one object if ($inputobject -is [string]) { return 1 } #-1 to show that it is enumerable, but we can't know its length, it could be infinate, #or take a long time even to enumerate without going over if ($inputobject -is [system.collections.IEnumerable]) { return -1 } #otherwise just return 1 return 1 } set-alias count count-object count (get-process) count (1,2,3) count "hello" count 3 count @{first = 1; second = 2 } $a = new-object system.collections.arraylist [void] $a.add(4); [void] $a.add("yo"); count $a
combined_dataset/train/non-malicious/sample_21_40.ps1
sample_21_40.ps1
ConvertFrom-StringData @' id_ctsgrouppolicyclient=GroupPolicy Client id_ctsgrouppolicyclientdescription=Collects information about GroupPolicy Client. '@ # SIG # Begin signature block # MIIoUgYJKoZIhvcNAQcCoIIoQzCCKD8CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAcJGsbRBXcM0ro # vTCkDXKZWmJOiQO/aT/fV9iyzCHRl6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIOY4 # 88o1nCIOQgiAZ1gO1Kwjl2rtpmIVTzGqxHMdp5jjMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAgy8K5MEl0/ormVPrY3OOqeTm3mLv4QEzTB0s # Wl33QhbLVDYypg+IEXuynE3FYo/6FifM1SdLMB7TWKP7nt0C9VO2mUDDjlqWP07n # SVWZi4lgi1hH5GilVt6e/+ZQwz6sr6tprf5rFVxpRtqecZ5lL0m0jRM4wbklY1cB # afrp5ayvbk1/MCF1AfTxVvCHx5lSYnSmBarMkM486LaJMaQPsEQeHlwElz4KcBFU # +S3lv+qIM4OvSyp7qRP75zZ81VtQK1ixNlVFfwiYMTeb0ZNnMCaPrN5iw5fev6h/ # uNGFaRwomyTpgrfQHT+otjrCFA0wHJAyUNQRSs13w6uxkNU2/KGCF60wghepBgor # BgEEAYI3AwMBMYIXmTCCF5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFaBgsqhkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCPu8MvZJErFGBywH2bzn219VD+U8eiJbvT # 2+FawpmUiwIGZutgsUnxGBMyMDI0MTAyODExNDA0Mi4wODlaMASAAgH0oIHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1OTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9BdG # hcDLPznlAAEAAAH0MA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMB4XDTI0MDcyNTE4MzA1OVoXDTI1MTAyMjE4MzA1OVowgdMxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jv # c29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVs # ZCBUU1MgRVNOOjU5MUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGlt # ZS1TdGFtcCBTZXJ2aWNlMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # pwhOE6bQgC9qq4jJGX2A1yoObfk0qetQ8kkj+5m37WBxDlsZ5oJnjfzHspqPiOEV # zZ2y2ygGgNZ3/xdZQN7f9A1Wp1Adh5qHXZZh3SBX8ABuc69Tb3cJ5KCZcXDsufwm # XeCj81EzJEIZquVdV8STlQueB/b1MIYt5RKis3uwzdlfSl0ckHbGzoO91YTKg6IE # xqKYojGreCopnIKxOvkr5VZsj2f95Bb1LGEvuhBIm/C7JysvJvBZWNtrspzyXVnu # o+kDEyZwpkphsR8Zvdi+s/pQiofmdbW1UqzWlqXQVgoYXbaYkEyaSh/heBtwj1tu # e+LcuOcHAPgbwZvQLksKaK46oktregOR4e0icsGiAWR9IL+ny4mlCUNA84F7GEEW # OEvibig7wsrTa6ZbzuMsyTi2Az4qPV3QRkFgxSbp4R4OEKnin8Jz4XLI1wXhBhIp # MGfA3BT850nqamzSiD5L5px+VtfCi0MJTS2LDF1PaVZwlyVZIVjVHK8oh2HYG9T2 # 6FjR9/I85i5ExxmhHpxM2Z+UhJeZA6Lz452m/+xrA4xrdYas5cm7FUhy24rPLVH+ # Fy+ZywHAp9c9oWTrtjfIKqLIvYtgJc41Q8WxbZPR7B1uft8BFsvz2dOSLkxPDLcX # Wy16ANy73v0ipCxAwUEC9hssi0LdB8ThiNf/4A+RZ8sCAwEAAaOCAUkwggFFMB0G # A1UdDgQWBBQrdGWhCtEsPid1LJzsTaLTKQbfmzAfBgNVHSMEGDAWgBSfpxVdAF5i # XYP05dJlpxtTNRnpcjBfBgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcmwwbAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRp # bWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsF # AAOCAgEA3cHSDxJKUDsgacIfRX60ugODShsBqwtEURUbUXeDmYYSa5oFj34RujW3 # gOeCt/ObDO45vfpnYG5OS5YowwsFw19giCI6JV+ccG/qqM08nxASbzwWtqtorzQi # Jh9upsE4TVZeKYXmbyx7WN9tdbVIrCelVj7P6ifMHTSLt6BmyoS2xlC2cfgKPPA1 # 3vS3euqUl6zwe7GAhjfjNXjKlE4SNWJvdqgrv0GURKjqmamNvhmSJane6TYzpdDC # egq8adlGH85I1EWKmfERb1lzKy5OMO2e9IkAlvydpUun0C3sNEtp0ehliT0Sraq8 # jcYVDH4A2C/MbLBIwikjwiFGQ4SlFLT2Tgb4GvvpcWVzBxwDo9IRBwpzngbyzbhh # 95UVOrQL2rbWHrHDSE3dgdL2yuaHRgY7HYYLs5Lts30wU9Ouh8N54RUta6GFZFx5 # A4uITgyJcVdWVaN0qjs0eEjwEyNUv0cRLuHWJBejkMe3qRAhvCjnhro7DGRWaIld # yfzZqln6FsnLQ3bl+ZvVJWTYJuL+IZLI2Si3IrIRfjccn29X2BX/vz2KcYubIjK6 # XfYvrZQN4XKbnvSqBNAwIPY2xJeB4o9PDEFI2rcPaLUyz5IV7JP3JRpgg3xsUqvF # HlSG6uMIWjwH0GQIIwrC2zRy+lNZsOKnruyyHMQTP7jy5U92qEEwggdxMIIFWaAD # AgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD # VQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEe # MBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3Nv # ZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIy # MjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5 # vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64 # NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhu # je3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl # 3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPg # yY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I # 5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2 # ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/ # TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy # 16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y # 1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6H # XtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMB # AAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQW # BBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30B # ATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYB # BAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMB # Af8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBL # oEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMv # TWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggr # BgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNS # b29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1Vffwq # reEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27 # DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pv # vinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9Ak # vUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWK # NsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2 # kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+ # c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep # 8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+Dvk # txW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1Zyvg # DbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/ # 2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHW # MIHTMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsT # Hm5TaGllbGQgVFNTIEVTTjo1OTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9z # b2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAv+LZ/Vg0s17X # ek4iG9R9c/7+AI6ggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDANBgkqhkiG9w0BAQsFAAIFAOrJ784wIhgPMjAyNDEwMjgxMTExMTBaGA8yMDI0 # MTAyOTExMTExMFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6snvzgIBADAHAgEA # AgIRQTAHAgEAAgITcjAKAgUA6stBTgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgor # BgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUA # A4IBAQAhvpi0fcwW36VjkxJvXWTKNHB3jvDpp2sJGsfeVTvr0wqWqBrbYtmbUuVe # 97LNopMBBaWBVq2RlfPasIxDtxHDTn5LPhbHb5DWH/NZWb+28zXE1+Y5sevsEdvs # FxcDLB5CurWs+Z+iXqcdrGqWwlcV+WX6dpuy3/dPiBzA5ZYhHiQgBr6+GCyDGjEB # 9T76pHsFqwSZHJ4+hXZB9EMgikB45MhUWxkF4tLdq1JMiZWtZmjsOTbveG4Y338S # 6Qpt3I6sMkaFL+Dn9fLJwn4WwMtfXG/6gRGDUIlgE+If7xvhMCC+iUcbAyLLjXkn # +yis2mNx8vI42scFI8SUP7qoQ0p/MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAH0F0aFwMs/OeUAAQAAAfQwDQYJYIZIAWUD # BAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0B # CQQxIgQgVb3xVISiD6MGEZvcX9GlR95pJoDCcJ5dtJQXMMX19M8wgfoGCyqGSIb3 # DQEJEAIvMYHqMIHnMIHkMIG9BCA/WMJ8biaT6njvkknB8Q7hSQIi8ys6vIBvZg60 # RBjWazCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB # 9BdGhcDLPznlAAEAAAH0MCIEIGm6buvOuOZ0hj0c+A3dmkblkgOGsbCdq3o77OaN # J5IJMA0GCSqGSIb3DQEBCwUABIICAElgrUEt5Ba005bXKPsUNnMqjSaCLJaca1O5 # Z0qTeFZ3WIQrCcuKdFgU4452/WBcff23+hq5m+tzj1cBumweB5+M2Bic/ciZxPf6 # +NI+PKHeUs3+41fL6rWHmtBmgLqgrD+zm1do1gzL+yf6j0+zlyI8xeWERq/3SyTd # oDq0kBXSmoT8qSbxyQaS5AuOsXi2EKFjRYFmqNxNkG47qKZes1RGQ7XUmN8G0vxt # zNYGBZJuG+I32Yz4kZYRa/NFW5PBjROyge02NQSGscU0Hxs/QbY2LBm9H6YsVL1G # ErUHh6GTzTdMdkz+U4VIUOIaWvZ6GJIANKPxIuUCGBLPo6n6dc2hQdKqTVBDJZtA # SY+lT9LXEYgLTfa0nD4m0Lr/6/PcHjcRKuzdHIVk7M3cQhkfjF/BJfdZ8OD4jLck # uYRA0+mCBQlGWe3wWXYl0nfs177XPTPdf6ThWf3/CEJa2LELkD4IIj1fZ1h/ej97 # +SapgP4kZZDb5x6oRDeXCRQT3CmxJnhm5h2StBtIsgevIG8HvR3rGKm1QMpw4/8g # RlvUOTYD6sdUL595porAyCjL2dXDso42UCnrQGM3ZOt/i5j3RDI7c9bmWqc2MH4U # AuoU0Msv0mF1niaA311hk4u/3aMnGsFCvL3xaheMKML5SFlYQpQsM178OBDiharI # DFM6jGXx # SIG # End signature block
combined_dataset/train/non-malicious/Get-DellWarranty_2.ps1
Get-DellWarranty_2.ps1
function Get-DellWarranty { <# .Synopsis Provides warranty information for one or more Dell service tags. .Description Queries the Dell Website for a list of service tags and returns the warranty information as a custom object. If a service tag has multiple warranties, they are returned as multiple separate objects. If no service tag is specified, it will attempt to retrieve and lookup the local system's service tag. The service tag can be provided to the command in several ways: 1. Using the -servicetag parameter 2. By passing one or more Service Tags via the pipeline 3. By passing objects that have either servicetag or serialnumber defined as a property, such as win32_bios WMI objects See examples for details. .Parameter ServiceTag ALIAS: serialnumber The Dell service tag you wish to query. Example: XYZ12A3 .Example C:\\PS> Get-DellWarranty Service Tag : XXXX123 Description : 4 Hour On-Site Service Provider : UNY Warranty Extension Notice * : No Start Date : 6/19/2009 End Date : 6/20/2011 Days Left : 140 Description ----------- If no service tags are provided, the script retrieves the local computer's serial number from WMI and queries for it. .Example C:\\PS> Get-DellWarranty -ServiceTag XXXX123 Service Tag : XXXX123 Description : 4 Hour On-Site Service Provider : UNY Warranty Extension Notice * : No Start Date : 6/19/2009 End Date : 6/20/2011 Days Left : 140 Description ----------- You can pass the service tag as a parameter, or as the first positional parameter (e.g. Get-DellWarranty XXXX123) .Example C:\\PS> "XXXX123","XXXX124","XXXX125" | get-dellwarranty Service Tag : XXXX123 Description : 4 Hour On-Site Service Provider : UNY Warranty Extension Notice * : No Start Date : 6/19/2009 End Date : 6/20/2011 Days Left : 140 Service Tag : XXXX124 Description : 4 Hour On-Site Service Provider : UNY Warranty Extension Notice * : No Start Date : 6/14/2009 End Date : 6/15/2011 Days Left : 145 Service Tag : XXXX125 Description : NBD On-Site Service Provider : DELL Warranty Extension Notice * : No Start Date : 6/14/2008 End Date : 6/15/2010 Days Left : 0 Description ----------- You can pass serial numbers via the pipeline either directly or as a variable. .Example C:\\PS> get-wmiobject win32_bios -computername "computer1","computer2","1.2.3.4" | get-dellwarranty Service Tag : XXXX123 Description : 4 Hour On-Site Service Provider : UNY Warranty Extension Notice * : No Start Date : 6/19/2009 End Date : 6/20/2011 Days Left : 140 Service Tag : XXXX124 Description : 4 Hour On-Site Service Provider : UNY Warranty Extension Notice * : No Start Date : 6/14/2009 End Date : 6/15/2011 Days Left : 145 Service Tag : XXXX125 Description : NBD On-Site Service Provider : DELL Warranty Extension Notice * : No Start Date : 6/14/2008 End Date : 6/15/2010 Days Left : 0 Description ----------- You can also pass any object that has a "serialnumber" or "servicetag" property. In this example, we query computers directly for their serial numbers, and pass those results (which are WMI objects that have a serialnumber property) via pipeline directly to the command to obtain warranty information. .Notes AUTHOR: Justin Grote <jgrote NOSPAM-AT allieddigital NOSPAM-DOT net> WARNING: Since Dell does not provide a formal API, this script works by screen-scraping the HTML from the Dell product support site. Any future change to the layout or logic of this site will break the script or cause unpredictable results. HISTORY: v1.0 [31 Jan 2011] - Initial Module Creatio .Link http://support.dell.com/support/topics/global.aspx/support/my_systems_info #> [CmdletBinding()] param( [Parameter(Mandatory=$False,Position=0,ValueFromPipeline=$True,ValueFromPipelineByPropertyName=$True)] [alias("serialnumber")] [string[]]$ServiceTag ) PROCESS { # If nothing was passed, retrieve the local system service tag if ($ServiceTag -eq $null) { write-verbose "No Service Tags provided. Using Local Computer's Service Tag" write-verbose "START Obtaining Serial number via WMI for localhost" $ServiceTag = (get-wmiobject win32_bios).SerialNumber write-verbose "SUCCESS Obtaining Serial number via WMI for localhost - $ServiceTag" } # Detect if an array of service tags were passed via parameter and unwind them. foreach ($strServicetag in $servicetag) { write-verbose "START Querying Dell for Service Tag $_" Get-DellWarrantyWorker $strServicetag write-verbose "SUCCESS Querying Dell for Service Tag $_" } } } Function Get-DellWarrantyWorker { Param( [String]$serviceTag ) #Dell Warranty URL Path $URL = "http://support.dell.com/support/topics/global.aspx/support/my_systems_info/details?c=us&l=en&s=gen&ServiceTag=$serviceTag" trap [System.FormatException] { write-error -category invalidresult "The service tag $serviceTag was not found. This is either because you entered the tag incorrectly, it is not present in Dell's database, or Dell changed the format of their website causing this search to fail." -recommendedaction "Please check that you entered the service tag correctly" return; } #Screenscrape the HTML for the warranty Table $HTML = (New-Object Net.WebClient).DownloadString($URL) If ($HTML -Match '<table[\\w\\s\\d"=%]*contract_table">.+?</table>') { $htmltable = $Matches[0] } else { throw (New-Object System.FormatException) } $HtmlLines = $htmltable -Split "<tr" | Where-Object { $_ -Match '<td' } $Header = ($HtmlLines[0] -Split '<td') -Replace '[\\w\\s\\d"=%:;\\-]*>|</.*' | Where-Object { $_ -ne '' } #Convert the warranty table fields into a powershell object For ($i = 1; $i -lt $HtmlLines.Count; $i++) { $Output = New-Object PSObject $Output | Add-Member NoteProperty "Service Tag" -value $serviceTag $Values = ($HtmlLines[$i] -Split '<td') -Replace '[\\w\\s\\d"=%:;\\-]*>|</.*|<a.+?>' For ($j = 1; $j -lt $Values.Count; $j++) { $Output | Add-Member NoteProperty $Header[$j - 1] -Value $Values[$j] } #Minor formatting fix if days remaining on warranty is zero if ($output.'Days Left' -match '<<0') {write-host -fore darkgreen "match!";$output.'Days Left' = 0} return $Output } }
combined_dataset/train/non-malicious/4103.ps1
4103.ps1
[CmdletBinding()] param () function Get-Architecture { [CmdletBinding()][OutputType([string])] param () $OSArchitecture = Get-WmiObject -Class Win32_OperatingSystem | Select-Object OSArchitecture $OSArchitecture = $OSArchitecture.OSArchitecture Return $OSArchitecture } function Get-MSIInformation { [CmdletBinding()] param ( [ValidateNotNullOrEmpty()][System.IO.FileInfo]$MSI, [ValidateSet('ProductCode', 'ProductVersion', 'ProductName', 'Manufacturer', 'ProductLanguage', 'FullVersion')][string]$Property ) $WindowsInstaller = New-Object -ComObject WindowsInstaller.Installer $MSIDatabase = $WindowsInstaller.GetType().InvokeMember("OpenDatabase", "InvokeMethod", $null, $WindowsInstaller, @($MSI.FullName, 0)) $Query = "SELECT Value FROM Property WHERE Property = '$($Property)'" $View = $MSIDatabase.GetType().InvokeMember("OpenView", "InvokeMethod", $null, $MSIDatabase, ($Query)) $View.GetType().InvokeMember("Execute", "InvokeMethod", $null, $View, $null) $Record = $View.GetType().InvokeMember("Fetch", "InvokeMethod", $null, $View, $null) $Value = $Record.GetType().InvokeMember("StringData", "GetProperty", $null, $Record, 1) $MSIDatabase.GetType().InvokeMember("Commit", "InvokeMethod", $null, $MSIDatabase, $null) $View.GetType().InvokeMember("Close", "InvokeMethod", $null, $View, $null) $MSIDatabase = $null $View = $null return $Value } function Get-RelativePath { [CmdletBinding()][OutputType([string])] param () $Path = (split-path $SCRIPT:MyInvocation.MyCommand.Path -parent) + "\" Return $Path } function Install-MSI { [CmdletBinding()] param ( [ValidateNotNullOrEmpty()][string]$MSI, [ValidateNotNullOrEmpty()][string]$Switches ) [string]$DisplayName = Get-MSIInformation -MSI $MSI -Property 'ProductName' $Executable = $Env:windir + "\system32\msiexec.exe" $Parameters = "/i" + [char]32 + [char]34 + $MSI + [char]34 + [char]32 + $Switches Write-Host "Install"$DisplayName.Trim()"....." -NoNewline $ErrCode = (Start-Process -FilePath $Executable -ArgumentList $Parameters -Wait -Passthru).ExitCode If (($ErrCode -eq 0) -or ($ErrCode -eq 3010)) { Write-Host "Success" -ForegroundColor Yellow } else { Write-Host "Failed with error code "$ErrCode -ForegroundColor Red Exit $ErrCode } } function Uninstall-MSIByName { [CmdletBinding()] param ( [ValidateNotNullOrEmpty()][String]$ApplicationName, [ValidateNotNullOrEmpty()][String]$Switches ) $Executable = $Env:windir + "\system32\msiexec.exe" $Uninstall = Get-ChildItem HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall -Recurse -ErrorAction SilentlyContinue If (((Get-WmiObject -Class Win32_OperatingSystem | Select-Object OSArchitecture).OSArchitecture) -eq "64-Bit") { $Uninstall += Get-ChildItem HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall -Recurse -ErrorAction SilentlyContinue } $Key = $uninstall | foreach-object { Get-ItemProperty REGISTRY::$_ } | where-object { $_.DisplayName -like "*$ApplicationName*" } If ($Key -ne $null) { Write-Host "Uninstall"$Key.DisplayName"....." -NoNewline $Parameters = "/x " + $Key.PSChildName + [char]32 + $Switches $ErrCode = (Start-Process -FilePath $Executable -ArgumentList $Parameters -Wait -Passthru).ExitCode If (($ErrCode -eq 0) -or ($ErrCode -eq 3010) -or ($ErrCode -eq 1605)) { Write-Host "Success" -ForegroundColor Yellow } else { Write-Host "Failed with error code "$ErrCode -ForegroundColor Red Exit $ErrCode } } } $RelativePath = Get-RelativePath Uninstall-MSIByName -ApplicationName "Google Chrome" -Switches "/qb- /norestart" Install-MSI -MSI $RelativePath"GoogleChromeStandaloneEnterprise.msi" -Switches "/qb- /norestart ALLUSERS=1"
combined_dataset/train/non-malicious/NTFS ACLs Folder Tree.ps1
NTFS ACLs Folder Tree.ps1
####################################### # TITLE: listACL.ps1 # # AUTHOR: Santiago Fernandez Mu±oz # # # # DESC: This script generate a HTML # # report show all ACLs asociated with # # a Folder tree structure starting in # # root specified by the user # ####################################### param ([string] $computer = 'localhost', [string] $path = $(if ($help -eq $false) {Throw "A path is needed."}), [int] $level = 0, [string] $scope = 'administrator', [switch] $help = $false, [switch] $debug = $false ) #region Initializations and previous checkings #region Initialization $allowedLevels = 10 $Stamp = get-date -uformat "%Y%m%d" $report = "$PWD\\$computer.html" $comparison = "" $UNCPath = "\\\\" + $computer + "\\" + $path + "\\" #endregion #region Previou chekings if ($level -gt $allowedLevels -or $level -lt 0) {Throw "Level out of range."} if ($computer -eq 'localhost' -or $computer -ieq $env:COMPUTERNAME) { $UNCPath = $path } switch ($scope) { micro { $comparison = '($acl -notlike "*administrator*" -and $acl -notlike "*BUILTIN*" -and $acl -notlike "*NT AUTHORITY*")' } user { $comparison = '($acl -notlike "*administrator*" -and $acl -notlike "*BUILTIN*" -and $acl -notlike "*IT*" -and $acl -notlike "*NT AUTHORITY*" -and $acl -notlike "*All*")' } } #endregion #endregion #region Function definitions function drawDirectory([ref] $directory) { $dirHTML = ' <div class="' if ($directory.value.level -eq 0) { $dirHTML += 'he0_expanded' } else { $dirHTML += 'he' + $directory.value.level } $dirHTML += '"><span class="sectionTitle" tabindex="0">Folder ' + $directory.value.Folder.FullName + '</span></div> <div class="container"><div class="he' + ($directory.value.level + 1) + '"><span class="sectionTitle" tabindex="0">Access Control List</span></div> <div class="container"> <div class="heACL"> <table class="info3" cellpadding="0" cellspacing="0"> <thead> <th scope="col"><b>Owner</b></th> <th scope="col"><b>Privileges</b></th> </thead> <tbody>' foreach ($itemACL in $directory.value.ACL) { $acls = $null if ($itemACL.AccessToString -ne $null) { $acls = $itemACL.AccessToString.split("`n") } $dirHTML += '<tr><td>' + $itemACL.Owner + '</td> <td> <table> <thead> <th>User</th> <th>Control</th> <th>Privilege</th> </thead> <tbody>' foreach ($acl in $acls) { $temp = [regex]::split($acl, "(?<!(,|NT))\\s{1,}") if ($debug) { write-host "ACL(" $temp.gettype().name ")[" $temp.length "]: " $temp } if ($temp.count -eq 1) { continue } if ($scope -ne 'administrator') { if ( Invoke-Expression $comparison ) { $dirHTML += "<tr><td>" + $temp[0] + "</td><td>" + $temp[1] + "</td><td>" + $temp[2] + "</td></tr>" } } else { $dirHTML += "<tr><td>" + $temp[0] + "</td><td>" + $temp[1] + "</td><td>" + $temp[2] + "</td></tr>" } } $dirHTML += '</tbody> </table> </td> </tr>' } $dirHTML += ' </tbody> </table> </div> </div> </div>' return $dirHTML } #endregion #region Printing help message if ($help) { Write-Host @" /ĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘ\\ Ę Script gather access control lists per directory Ę \\ĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘĘ/ USAGE: ./listACL -computer <machine or IP> -path <path> -level <0-10> -help:[$false] PARAMETERS: computer [OPTIONAL] - Computer name or IP addres where folder is hosted (Default: localhost) path [REQUIRED] - Folder's path to query. level [OPTIONAL] - Level of folders to go down in the query. Allowd values are between 0 and $allowedLevels. 0 show that there's no limit in the going down (Default: 0) scope [OPTIONAL] - Sets the amount of information showd in the report. Allowd values are: Ę user, show important information to the user. Ę micro, show user scope information plus important information for the IT Department. Ę administrator, show all information. help [OPTIONAL] - This help. "@ exit 0 } #endregion if (Test-Path $report) { Remove-item $report } #To normalize I check if last character in the path is the folder separator character if ($path.Substring($path.Length - 1,1) -eq "\\") { $path = $path.Substring(0,$path.Length - 1) } #region Header, style and javascript functions needed by the html report @" <html dir="ltr" xmlns:v="urn:schemas-microsoft-com:vml" gpmc_reportInitialized="false"> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-16" /> <title>Access Control List for $path in $computer</title> <!-- Styles --> <style type="text/css"> body{ background-color:#FFFFFF; border:1px solid #666666; color:#000000; font-size:68%; font-family:MS Shell Dlg; margin:0px 0px 10px 0px; } table{ font-size:100%; table-layout:fixed; width:100%; } td,th{ overflow:visible; text-align:left; vertical-align:top; white-space:normal; } .title{ background:#FFFFFF; border:none; color:#333333; display:block; height:24px; margin:0px 0px -1px 0px; padding-top:4px; position:relative; table-layout:fixed; width:100%; z-index:5; } .he0_expanded{ background-color:#FEF7D6; border:1px solid #BBBBBB; color:#3333CC; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:0px; margin-right:0px; padding-left:8px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .he1_expanded{ background-color:#A0BACB; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:10px; margin-right:0px; padding-left:8px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .he1{ background-color:#A0BACB; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:10px; margin-right:0px; padding-left:8px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .he2{ background-color:#C0D2DE; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:20px; margin-right:0px; padding-left:8px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .he3{ background-color:#D9E3EA; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:30px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .he4{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:40px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .he4h{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:45px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .he4i{ background-color:#F9F9F9; border:1px solid #BBBBBB; color:#000000; display:block; font-family:MS Shell Dlg; font-size:100%; margin-bottom:-1px; margin-left:45px; margin-right:0px; padding-bottom:5px; padding-left:21px; padding-top:4px; position:relative; width:100%; } .he5{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:50px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .he5h{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; padding-left:11px; padding-right:5em; padding-top:4px; margin-bottom:-1px; margin-left:55px; margin-right:0px; position:relative; width:100%; } .he5i{ background-color:#F9F9F9; border:1px solid #BBBBBB; color:#000000; display:block; font-family:MS Shell Dlg; font-size:100%; margin-bottom:-1px; margin-left:55px; margin-right:0px; padding-left:21px; padding-bottom:5px; padding-top: 4px; position:relative; width:100%; } .he6{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:55px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .he7{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:60px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .he8{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:65px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .he9{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:70px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .he10{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:75px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .he11{ background-color:#E8E8E8; border:1px solid #BBBBBB; color:#000000; cursor:pointer; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:80px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; } .heACL { background-color:#ECFFD7; border:1px solid #BBBBBB; color:#000000; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; height:2.25em; margin-bottom:-1px; margin-left:90px; margin-right:0px; padding-left:11px; padding-right:5em; padding-top:4px; position:relative; width:100%; } DIV .expando{ color:#000000; text-decoration:none; display:block; font-family:MS Shell Dlg; font-size:100%; font-weight:normal; position:absolute; right:10px; text-decoration:underline; z-index: 0; } .he0 .expando{ font-size:100%; } .info, .info3, .info4, .disalign{ line-height:1.6em; padding:0px 0px 0px 0px; margin:0px 0px 0px 0px; } .disalign TD{ padding-bottom:5px; padding-right:10px; } .info TD{ padding-right:10px; width:50%; } .info3 TD{ padding-right:10px; width:33%; } .info4 TD, .info4 TH{ padding-right:10px; width:25%; } .info5 TD, .info5 TH{ padding-right:0px; width:20%; } .info TH, .info3 TH, .info4 TH, .disalign TH{ border-bottom:1px solid #CCCCCC; padding-right:10px; } .subtable, .subtable3{ border:1px solid #CCCCCC; margin-left:0px; background:#FFFFFF; margin-bottom:10px; } .subtable TD, .subtable3 TD{ padding-left:10px; padding-right:5px; padding-top:3px; padding-bottom:3px; line-height:1.1em; width:10%; } .subtable TH, .subtable3 TH{ border-bottom:1px solid #CCCCCC; font-weight:normal; padding-left:10px; line-height:1.6em; } .subtable .footnote{ border-top:1px solid #CCCCCC; } .subtable3 .footnote, .subtable .footnote{ border-top:1px solid #CCCCCC; } .subtable_frame{ background:#D9E3EA; border:1px solid #CCCCCC; margin-bottom:10px; margin-left:15px; } .subtable_frame TD{ line-height:1.1em; padding-bottom:3px; padding-left:10px; padding-right:15px; padding-top:3px; } .subtable_frame TH{ border-bottom:1px solid #CCCCCC; font-weight:normal; padding-left:10px; line-height:1.6em; } .subtableInnerHead{ border-bottom:1px solid #CCCCCC; border-top:1px solid #CCCCCC; } .explainlink{ color:#000000; text-decoration:none; cursor:pointer; } .explainlink:hover{ color:#0000FF; text-decoration:underline; } .spacer{ background:transparent; border:1px solid #BBBBBB; color:#FFFFFF; display:block; font-family:MS Shell Dlg; font-size:100%; height:10px; margin-bottom:-1px; margin-left:43px; margin-right:0px; padding-top: 4px; position:relative; } .filler{ background:transparent; border:none; color:#FFFFFF; display:block; font:100% MS Shell Dlg; line-height:8px; margin-bottom:-1px; margin-left:43px; margin-right:0px; padding-top:4px; position:relative; } .container{ display:block; position:relative; } .rsopheader{ background-color:#A0BACB; border-bottom:1px solid black; color:#333333; font-family:MS Shell Dlg; font-size:130%; font-weight:bold; padding-bottom:5px; text-align:center; } .rsopname{ color:#333333; font-family:MS Shell Dlg; font-size:130%; font-weight:bold; padding-left:11px; } .gponame{ color:#333333; font-family:MS Shell Dlg; font-size:130%; font-weight:bold; padding-left:11px; } .gpotype{ color:#333333; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; padding-left:11px; } #uri { color:#333333; font-family:MS Shell Dlg; font-size:100%; padding-left:11px; } #dtstamp{ color:#333333; font-family:MS Shell Dlg; font-size:100%; padding-left:11px; text-align:left; width:30%; } #objshowhide { color:#000000; cursor:pointer; font-family:MS Shell Dlg; font-size:100%; font-weight:bold; margin-right:0px; padding-right:10px; text-align:right; text-decoration:underline; z-index:2; } #gposummary { display:block; } #gpoinformation { display:block; } </style> </head> <body> <table class="title" cellpadding="0" cellspacing="0"> <tr><td colspan="2" class="gponame">Access Control List for $path on machine $computer</td></tr> <tr> <td id="dtstamp">Data obtained on: $(Get-Date)</td> <td><div id="objshowhide" tabindex="0"></div></td> </tr> </table> <div class="filler"></div> "@ | Set-Content $report #endregion #region Information gathering $colFiles = Get-ChildItem -path $UNCPath -Filter *. -Recurse -force -Verbose | Sort-Object FullName $colACLs = @() #We start going through the path pointed out by the user foreach($file in $colFiles) { #To control the current level in the tree we are in it's needed to count the number of separator characters #contained in the path. However in order to make the count correctly it's needed to delete the path #provided by the user (the parent). Once the parent has been deleted, the rest of the full name will be #string used to do the level count. #It's needed to use a REGEX object to get ALL separator character matches. $matches = (([regex]"\\\\").matches($file.FullName.substring($path.length, $file.FullName.length - $path.length))).count if ($level -ne 0 -and ($matches - 1) -gt $level) { continue } if ($debug) { Write-Host $file.FullName "->" $file.Mode } if ($file.Mode -notlike "d*") { continue } $myobj = "" | Select-Object Folder,ACL,level $myobj.Folder = $file $myobj.ACL = Get-Acl $file.FullName $myobj.level = $matches - 1 $colACLs += $myobj } #endregion #region Setting up the report '<div class="gposummary">' | Add-Content $report for ($i = 0; $i -lt $colACLs.count; $i++) { drawDirectory ([ref] $colACLs[$i]) | Add-Content $report } '</div></body></html>' | Add-Content $report #endregion
combined_dataset/train/non-malicious/3076.ps1
3076.ps1
$global:ValidatorRoot = Split-Path $MyInvocation.MyCommand.Path BeforeEachFeature { New-Module -Name ValidatorTestDe { . $global:ValidatorRoot\ValidatorDe.ps1 -Verbose } | Import-Module -Global } AfterEachFeature { Remove-Module ValidatorTestDe } Given 'MeinValidator gibt vor, True zurückzugeben' { Mock MeinValidator -Module ValidatorTestDe -MockWith { return $true } } When 'jemand etwas aufruft, das MeinValidator benutzt' { Invoke-SomethingThatUsesMeinValidator "false" } Then 'wurde MeinValidator einmal aufgerufen' { Assert-MockCalled -Module ValidatorTestDe MeinValidator 1 } When 'MeinValidator mit (?<word>\w+) aufgerufen wird' { param($word) $Validation = MeinValidator $word } Then 'sollte MeinValidator (?<expected>\w+) zurückgeben' { param($expected) $expected = $expected -eq "true" $Validation | Should -Be $expected }
combined_dataset/train/non-malicious/sample_48_32.ps1
sample_48_32.ps1
# # Module manifest for module 'Az.DataBoxEdge' # # Generated by: Microsoft Corporation # # Generated on: 5/16/2024 # @{ # Script module or binary module file associated with this manifest. RootModule = 'Az.DataBoxEdge.psm1' # Version number of this module. ModuleVersion = '1.1.1' # Supported PSEditions CompatiblePSEditions = 'Core', 'Desktop' # ID used to uniquely identify this module GUID = '3c11ef12-c79f-45fe-acdf-a2c784d99c97' # Author of this module Author = 'Microsoft Corporation' # Company or vendor of this module CompanyName = 'Microsoft Corporation' # Copyright statement for this module Copyright = 'Microsoft Corporation. All rights reserved.' # Description of the functionality provided by this module Description = 'Microsoft Azure PowerShell - DataBoxEdge service cmdlets for Azure Resource Manager in Windows PowerShell and PowerShell Core. For more information on DataBoxEdge, please visit the following: https://learn.microsoft.com/en-us/azure/databox-online/' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '5.1' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. DotNetFrameworkVersion = '4.7.2' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @() # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'Microsoft.Azure.Management.DataBoxEdge.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module FormatsToProcess = 'Microsoft.Azure.PowerShell.Cmdlets.DataBoxEdge.generated.format.ps1xml' # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = @() # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-AzDataBoxEdgeBandwidthSchedule', 'Get-AzDataBoxEdgeDevice', 'Get-AzDataBoxEdgeJob', 'Get-AzDataBoxEdgeOrder', 'Get-AzDataBoxEdgeRole', 'Get-AzDataBoxEdgeShare', 'Get-AzDataBoxEdgeStorageAccount', 'Get-AzDataBoxEdgeStorageAccountCredential', 'Get-AzDataBoxEdgeStorageContainer', 'Get-AzDataBoxEdgeTrigger', 'Get-AzDataBoxEdgeUser', 'Invoke-AzDataBoxEdgeDevice', 'Invoke-AzDataBoxEdgeShare', 'Invoke-AzDataBoxEdgeStorageContainer', 'New-AzDataBoxEdgeBandwidthSchedule', 'New-AzDataBoxEdgeDevice', 'New-AzDataBoxEdgeOrder', 'New-AzDataBoxEdgeRole', 'New-AzDataBoxEdgeShare', 'New-AzDataBoxEdgeStorageAccount', 'New-AzDataBoxEdgeStorageAccountCredential', 'New-AzDataBoxEdgeStorageContainer', 'New-AzDataBoxEdgeTrigger', 'New-AzDataBoxEdgeUser', 'Remove-AzDataBoxEdgeBandwidthSchedule', 'Remove-AzDataBoxEdgeDevice', 'Remove-AzDataBoxEdgeOrder', 'Remove-AzDataBoxEdgeRole', 'Remove-AzDataBoxEdgeShare', 'Remove-AzDataBoxEdgeStorageAccount', 'Remove-AzDataBoxEdgeStorageAccountCredential', 'Remove-AzDataBoxEdgeStorageContainer', 'Remove-AzDataBoxEdgeTrigger', 'Remove-AzDataBoxEdgeUser', 'Set-AzDataBoxEdgeBandwidthSchedule', 'Set-AzDataBoxEdgeRole', 'Set-AzDataBoxEdgeShare', 'Set-AzDataBoxEdgeStorageAccountCredential', 'Set-AzDataBoxEdgeUser' # Variables to export from this module # VariablesToExport = @() # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = @() # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'Azure','ResourceManager','ARM','DataBoxEdge' # A URL to the license for this module. LicenseUri = 'https://aka.ms/azps-license' # A URL to the main website for this project. ProjectUri = 'https://github.com/Azure/azure-powershell' # A URL to an icon representing this module. # IconUri = '' # ReleaseNotes of this module ReleaseNotes = '* Removed the outdated deps.json file.' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' } # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDgeSCBHi8PdRD4 # Gf76KvDSkDiFLujVrD5m+9GDlmaYlaCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIH/o9MhE5TgAyM2XfSYdPrVs # fwU/T7cwp4rxCzL5zyDEMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAOrOc9GYVwZwgSTCOzHYy9vjMqJCyteP2Gl/mLma72XUm+vAPZ0lW6N+P # uueKDRmVoa3zWJH9xzRyN9+xHpWeFvphXZ1t1/IInzD80sfroXd/Yw/qOmRoMwGo # LKQZYhRtleGFk0izrcLVMFc7k6xssJ2crWBb3aYJt50xizcTIub2AW85cUkL5DVX # 3GI5XhhNPsRATDUpLuSpC98qrHidv9tezAUQpVuqeuGc9Yo/zDkWgAP9shN2RyLD # jd/v7HVSEgybqeNFbQq/iAFIqH79xzcIXtpgOftg4xmxVj2d0WibpwoF0ujxll0k # UyT8CuIVTrbKt+DOeJeIDTkrnhvhZ6GCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCZ5q8ByS3MfuVM21sF32YIW8d1u2FIZbYdfBTkn2NcGwIGZjOaebNz # GBMyMDI0MDUxNjA3MjMzMy42MTFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAfI+MtdkrHCRlAABAAAB8jANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # NThaFw0yNTAzMDUxODQ1NThaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQC85fPLFwppYgxwYxkSEeYvQBtnYJTtKKj2FKxzHx0f # gV6XgIIrmCWmpKl9IOzvOfJ/k6iP0RnoRo5F89Ad29edzGdlWbCj1Qyx5HUHNY8y # u9ElJOmdgeuNvTK4RW4wu9iB5/z2SeCuYqyX/v8z6Ppv29h1ttNWsSc/KPOeuhzS # AXqkA265BSFT5kykxvzB0LxoxS6oWoXWK6wx172NRJRYcINfXDhURvUfD70jioE9 # 2rW/OgjcOKxZkfQxLlwaFSrSnGs7XhMrp9TsUgmwsycTEOBdGVmf1HCD7WOaz5EE # cQyIS2BpRYYwsPMbB63uHiJ158qNh1SJXuoL5wGDu/bZUzN+BzcLj96ixC7wJGQM # BixWH9d++V8bl10RYdXDZlljRAvS6iFwNzrahu4DrYb7b8M7vvwhEL0xCOvb7WFM # sstscXfkdE5g+NSacphgFfcoftQ5qPD2PNVmrG38DmHDoYhgj9uqPLP7vnoXf7j6 # +LW8Von158D0Wrmk7CumucQTiHRyepEaVDnnA2GkiJoeh/r3fShL6CHgPoTB7oYU # /d6JOncRioDYqqRfV2wlpKVO8b+VYHL8hn11JRFx6p69mL8BRtSZ6dG/GFEVE+fV # mgxYfICUrpghyQlETJPITEBS15IsaUuW0GvXlLSofGf2t5DAoDkuKCbC+3VdPmlY # VQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJVbhwAm6tAxBM5cH8Bg0+Y64oZ5MB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQA9S6eO4HsfB00XpOgPabcN3QZeyipgilcQ # SDZ8g6VCv9FVHzdSq9XpAsljZSKNWSClhJEz5Oo3Um/taPnobF+8CkAdkcLQhLdk # Shfr91kzy9vDPrOmlCA2FQ9jVhFaat2QM33z1p+GCP5tuvirFaUWzUWVDFOpo/O5 # zDpzoPYtTr0cFg3uXaRLT54UQ3Y4uPYXqn6wunZtUQRMiJMzxpUlvdfWGUtCvnW3 # eDBikDkix1XE98VcYIz2+5fdcvrHVeUarGXy4LRtwzmwpsCtUh7tR6whCrVYkb6F # udBdWM7TVvji7pGgfjesgnASaD/ChLux66PGwaIaF+xLzk0bNxsAj0uhd6QdWr6T # T39m/SNZ1/UXU7kzEod0vAY3mIn8X5A4I+9/e1nBNpURJ6YiDKQd5YVgxsuZCWv4 # Qwb0mXhHIe9CubfSqZjvDawf2I229N3LstDJUSr1vGFB8iQ5W8ZLM5PwT8vtsKEB # wHEYmwsuWmsxkimIF5BQbSzg9wz1O6jdWTxGG0OUt1cXWOMJUJzyEH4WSKZHOx53 # qcAvD9h0U6jEF2fuBjtJ/QDrWbb4urvAfrvqNn9lH7gVPplqNPDIvQ8DkZ3lvbQs # Yqlz617e76ga7SY0w71+QP165CPdzUY36et2Sm4pvspEK8hllq3IYcyX0v897+X9 # YeecM1Pb1jCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQBr # i943cFLH2TfQEfB05SLICg74CKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6e/kdzAiGA8yMDI0MDUxNjAxNDgz # OVoYDzIwMjQwNTE3MDE0ODM5WjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDp7+R3 # AgEAMAoCAQACAhdjAgH/MAcCAQACAhPkMAoCBQDp8TX3AgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAGgUSBK7uVURyU4HK/dJr1vVD5ZLQF2IVTBpgme2LkAy # RNPOKxKPE5Ryfb8O9qjgD8qFoiA1ozsu7EFE0Z9/Rqk84cbeSEfs3ona7Atp4Vjb # 6SxQgYFjGDlB43H0tjt6UrRKDp7ulM/Hpx9N96oEvr+sFS9/5M9THX/JkjED/UJ+ # Ow3mjJ+TZHdAn+/N0bYvK61QpGQeV3lgEa7Xx8hzYx0VaMYL7Zwea7M7OuTf1U0J # tHqhpE4iAMv/UePbfUzs3zF3kt0adYNWzXmf1pdu4KO2ssdUPFHWHCJ3gTkcOB6y # FOZidY/WZAQAG5gZWAUqBxPDLoUWk+QuDrzBDwv9igUxggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfI+MtdkrHCRlAABAAAB # 8jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCBaeIPzg34wD4RO8ZLeHahRy2GxoTi/BB7pheidSFQm # XDCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIPjaPh0uMVJc04+Y4Ru5BUUb # HE4suZ6nRHSUu0XXSkNEMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHyPjLXZKxwkZQAAQAAAfIwIgQggJX3U7IzUMEK7mnRzIEEZ3gJ # GNt/5ZfESO4QGjDmG2swDQYJKoZIhvcNAQELBQAEggIAlpAoc4PJ79VEE5WTUgqH # Kccc7bpDHK8L+htjkQK2s1SSurmMuYM//iJmOGmOx9iieRW3dKo0DjHdmu1XfuyL # pktuWJAEPvh/MF7I7x5HAWRc+2YoHbN+q/249eVDs1K5SxbXXrRJHiUPw6snRdfj # 0QNX1StRUkCGYExN6lD+r9ekQTU4q6ybdJ5qIV/F+eitE3p/g5Bh4aWkvnSlbZlN # Mqf57gs4N12hI2XAamfebiLP3oL08fADx9OMLb7WWy6C/n1eHx+U36SMt1bjTxEk # e9XA5qFlGnnfnuc/GqJA7NJKh5earCGWeTj9g21hOa13l0hwR/jn8GhRIy/5/OdI # D1gwJ/XWIk0OKjjjFXuokmwA4wkpP46NIct7G8JjOLNE4sx/hQmnYD0vYd7quXQQ # rAgTJDJirZpRoJ+Wkcx/dEcXhzmYCUiatpNGB8bRAIiZfrMerqhlQy5dxxBoB0Rn # 7J7zXAH8u52AZ1EvxlWX1U+fHwxhW1jVyf1UVvslL/9bIa4DRdB6QsfIiL6FIwi0 # HLU6mF+Db7qgL3QZiAO0rUV56EOgE/qTFwYbqKUuQ8irvhrPWD1tHGom834kkON0 # 6JPSxFNF4yKYL9Fv4f3ZjbYkZCK0gwZ971/4+c2HU8ETbBOCwUsNa/daCjB30H5l # LKBDSvYu2ovMZHNmsNR3Yjg= # SIG # End signature block
combined_dataset/train/non-malicious/New-SelfRestartingTask_1.ps1
New-SelfRestartingTask_1.ps1
function New-SelfRestartingTask { <# .Notes For production use you should consider investigating more specific matching in the Query clause. There are many possibilities here: you could watch for instances of a process with specific command-line parameters, or a certain caption, etc. Or, you could match against one process, but fire off a different one when it crashes. Have a look at the Win32_Process class to see all the properties available for matching. .Link Win32_Process Class http://msdn.microsoft.com/en-us/library/aa394372%28VS.85%29.aspx .Link __InstanceDeletionEvent http://msdn.microsoft.com/en-us/library/aa394652%28VS.85%29.aspx .Link ScriptCenter article on Events http://www.microsoft.com/technet/scriptcenter/topics/winpsh/events.mspx .Synopsis Restarts an application when it exits or crashes .Description Create a WMIEvent handler to watch for the termination of a specific executable and restart it. .Parameter Application The path to an application you want to restart when it crashes .Parameter Parameters Parameters to be passed to the application when we (re)start it .Parameter Start Automatically start the process (even if it's already running) .Parameter Interval Polling interval to check whether the application has exited or not .Example New-SelfRestartingTask notepad -Start Description ----------- Starts notepad right away and monitors for crash or exit and restarts it. .Example New-SelfRestartingTask C:\\Program` Files\\Internet` Explorer\\IExplore.exe http://HuddledMasses.org Description ----------- Monitors for the termination of Internet Explorer and restarts it pointed at my blog. Note that this does NOT start IE, so it could already be running, or you should start it by hand later... #> param( [Parameter(Mandatory=$true, Position=0)] [string]$Application , [Parameter(Mandatory=$false)] [double]$Interval = 5.0 , [Parameter(Mandatory=$false)] [switch]$Start , [Parameter(ValueFromRemainingArguments=$true)] [string[]]$Parameters ) $ExecutablePath = gcm $Application -type application | select -expand definition -first 1 | %{ $_ -replace '\\\\','\\\\' } if($Parameters) { $Parameters = "-ArgumentList `"$($Parameters -join '", "')`"" } $sb = Invoke-Expression "{ Start-Process `"$ExecutablePath`" $Parameters }" Register-WMIEvent -Action $sb -Query "Select * From __InstanceDeletionEvent Within $Interval Where TargetInstance ISA 'Win32_Process' And TargetInstance.ExecutablePath='$ExecutablePath'" | Out-Null if($Start){ sleep -milli 500 &$sb } }
combined_dataset/train/non-malicious/sample_21_57.ps1
sample_21_57.ps1
ConvertFrom-StringData @' id_kb2655998_inactivetsportstitle=Checking for Inactive TS Ports id_kb2655998_inactivetsportsdesc=Checking for the presence of a large number of inactive Terminal Server ports. id_kb2655998_inactivetsportsst=Large number of Inactive Terminal Services ports detected '@ # SIG # Begin signature block # MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDIJ082Hg1gwOnt # f/B2bxPudXEfuXh2Wtp1gu/6KpqZ/6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEII20XO+oNonDKQ/3JNbo4drI # lZiZRi37cmU0AAiNuhuSMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAQ3NysGa2cBAaExcllD6GgMvaD3OldYiodoAPeIxkElrlCXPPzCEgSfr/ # sZKVP1Tc7DQPbq6CGY2rchfDBcluKbv4qU896v3VSVwfVL1mbmkvqmI9bPEkhAAZ # 4F9F6aukqgdTXutz4p5QjJxdCdiVotlMgonLqaRtywLzxoB4DhOLNxRLAA6xLnrJ # mEK7pyzbK0/Y6SRn/7NXOuJPP+/2FJKzia6EE+y7MPVxgbSoxZDCvEV8bHGFEjPF # hl7nHt8AacislqR3jQtfa+fh2siK935f1nI9rh5gXnwQRymus+wUcQdjnBC0s6bc # mhfo5XnpzPNIY1ZD+yUbCGZrrv+LQaGCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC # F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAJCvYnIr4RaWOS5KXfyVCk5sUEr0PeGcwO7MI45kx/BwIGZuto66IJ # GBMyMDI0MTAyODExNDAzOS43MjZaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB+8vLbDdn5TCVAAEAAAH7MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzExM1oXDTI1MTAyMjE4MzExM1owgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjU3MUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAqMJWQeWAq4LwvSjYsjP0 # Uvhvm0j0aAOJiMLg0sLfxKoTXAdKD6oMuq5rF5oEiOxV+9ox0H95Q8fhoZq3x9lx # guZyTOK4l2xtcgtJCtjXRllM2bTpjOg35RUrBy0cAloBU9GJBs7LBNrcbH6rBiOv # qDQNicPRZwq16xyjMidU1J1AJuat9yLn7taifoD58blYEcBvkj5dH1la9zU846QD # eOoRO6NcqHLsDx8/zVKZxP30mW6Y7RMsqtB8cGCgGwVVurOnaNLXs31qTRTyVHX8 # ppOdoSihCXeqebgJCRzG8zG/e/k0oaBjFFGl+8uFELwCyh4wK9Z5+azTzfa2GD4p # 6ihtskXs3lnW05UKfDJhAADt6viOc0Rk/c8zOiqzh0lKpf/eWUY2o/hvcDPZNgLa # HvyfDqb8AWaKvO36iRZSXqhSw8SxJo0TCpsbCjmtx0LpHnqbb1UF7cq09kCcfWTD # PcN12pbYLqck0bIIfPKbc7HnrkNQks/mSbVZTnDyT3O8zF9q4DCfWesSr1akycDd # uGxCdKBvgtJh1YxDq1skTweYx5iAWXnB7KMyls3WQZbTubTCLLt8Xn8t+slcKm5D # kvobubmHSriuTA3wTyIy4FxamTKm0VDu9mWds8MtjUSJVwNVVlBXaQ3ZMcVjijyV # oUNVuBY9McwYcIQK62wQ20ECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRHVSGYUNQ3 # RwOl71zIAuUjIKg1KjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAwzoIKOY2dnUj # fWuMiGoz/ovoc1e86VwWaZNFdgRmOoQuRe4nLdtZONtTHNk3Sj3nkyBszzxSbZEQ # 0DduyKHHI5P8V87jFttGnlR0wPP22FAebbvAbutkMMVQMFzhVBWiWD0VAnu9x0fj # ifLKDAVXLwoun5rCFqwbasXFc7H/0DPiC+DBn3tUxefvcxUCys4+DC3s8CYp7WWX # pZ8Wb/vdBhDliHmB7pWcmsB83uc4/P2GmAI3HMkOEu7fCaSYoQhouWOr07l/KM4T # ndylIirm8f2WwXQcFEzmUvISM6ludUwGlVNfTTJUq2bTDEd3tlDKtV9AUY3rrnFw # HTwJryLtT4IFhvgBfND3mL1eeSakKf7xTII4Jyt15SXhHd5oI/XGjSgykgJrWA57 # rGnAC7ru3/ZbFNCMK/Jj6X8X4L6mBOYa2NGKwH4A37YGDrecJ/qXXWUYvfLYqHGf # 8ThYl12Yg1rwSKpWLolA/B1eqBw4TRcvVY0IvNNi5sm+//HJ9Aw6NJuR/uDR7X7v # DXicpXMlRNgFMyADb8AFIvQPdHqcRpRorY+YUGlvzeJx/2gNYyezAokbrFhACsJ2 # BfyeLyCEo6AuwEHn511PKE8dK4JvlmLSoHj7VFR3NHDk3zRkx0ExkmF8aOdpvoKh # uwBCxoZ/JhbzSzrvZ74GVjKKIyt5FA0wggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1NzFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUABHHn7NCGusZz2RfVbyuwYwPykBWggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOrJT0swIhgPMjAyNDEwMjcyMzQ2MTlaGA8yMDI0MTAyODIzNDYxOVowdzA9 # BgorBgEEAYRZCgQBMS8wLTAKAgUA6slPSwIBADAKAgEAAgINvAIB/zAHAgEAAgIU # vzAKAgUA6sqgywIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow # CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQCt9+78tOBk # 3G7InFWNeSnv+gNf7827NofcCXCIrLQa834+WZOE6YjVcA8B4zRZWYQt61ryjsP7 # nO4QK9AT7twzBe+cVhqFCO+umtt9HILo/02fBvZqGhC0aABNMEKKtN5mHLc0RqyR # jYVeyJJgW3o+AuIAomNefMMnMlPFbCzeVx+VWfowu6aZGIf20olcJr1Udx5TxmnY # dsKjQyDDl6Lmtl54TbeWFF6Uai0RRHKqDZXeiYK0nnazQchF9LlhnVpwArQ160lu # nLrYsrAoYdqLC+X0Bz+PmzShMHudHvUpm9HSYaJSjBDw/SBZA3RVy2I0EMGwb608 # ErihFwOktb8UMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAH7y8tsN2flMJUAAQAAAfswDQYJYIZIAWUDBAIBBQCgggFKMBoG # CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgUVG21Z9T # 1Y+xXWng7vz9lR1mq7kN4A+RHOqy4dRxAvcwgfoGCyqGSIb3DQEJEAIvMYHqMIHn # MIHkMIG9BCA52wKr/KCFlVNYiWsCLsB4qhjEYEP3xHqYqDu1SSTlGDCBmDCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+8vLbDdn5TCVAAEA # AAH7MCIEIOcOJM95z1rtLRPImI9GcCxcLV/lXPRviSc4qDRq2ZeFMA0GCSqGSIb3 # DQEBCwUABIICAHhFiB4wN1naj9odUdmt8cL8esBqMPCLxkQp5LPcdwvK7WJWqjBK # atNyZSHGt70eG/taWZAOH2zWbS1SePvH/0fJxgfJvY4bXWDYW1RQ5D1MtJxzZQyb # Crll/nJ7j9tD/PS4TLGit9D69iLcCSPUJF8sAgzORKtrgIbvjFGvPi1HF/NzKBmC # 8hauqw40FzVEfD61f0dlwD34b+YWkikcG55pyXH3pEVsxayFxRcLWv7t6YygO0Wh # EmdcwvDfom3uY8BMnTWzoaI/8To/TzNeUUcC3ymCmXt1nysYK0rLIbZBScpIMPCM # eUFpbpjBWN+aGqYD7DJciDJzslz12SGUBJljTaunS9/fyCjMlhs3wul8GTqt/wNS # 7kgtCd2Vf+/9nHodgQDtBl1bUHUMswSi0iy55K3vu/Ut/K6boRyGum6BSrgH45KO # APIpAMVSQbDwIkCI/syl5BjKgvFQzpkqrV9o907EXAKd/Vlemd79kaSCc27X4BF/ # OzGXyZgltjCxVBqOfl2ccOgew5Oqgk+dIpwHjqTVTxwVgMoi5M6yvieO7ecual6C # CQisntv1G880ESKwOzAoPkMtQA1R8awn2Z7g9vI4QKjcysbnBQGe/PDKSCcDkqYn # Fbpea/4JwZkS3Xh6qwGzcZZAfeU2yyi3RMC2Q2vDheCDl4NgvtzWHRlL # SIG # End signature block
combined_dataset/train/non-malicious/3515.ps1
3515.ps1
function Get-ResourceGroupName { return getAssetName } function Get-ResourceName { return getAssetName } function Get-VirtualNetworkName { return getAssetName } function TestSetup-CreateResourceGroup { $resourceGroupName = Get-ResourceGroupName $rglocation = "West US" $resourceGroup = New-AzResourceGroup -Name $resourceGroupName -location $rglocation return $resourceGroup } function TestSetup-CreateVirtualNetwork($resourceGroup) { $virtualNetworkName = Get-VirtualNetworkName $location = Get-Location -ProviderNamespace "microsoft.network" -ResourceType "virtualNetworks" -PreferredLocation "West US" $virtualNetwork = New-AzVirtualNetwork -Name $virtualNetworkName -ResourceGroupName $resourceGroup.ResourceGroupName -Location $location -AddressPrefix "10.0.0.0/8" return $virtualNetwork } function Get-RandomZoneName { $prefix = getAssetName; return $prefix + ".pstest.test" ; } function Get-RandomLinkName { $prefix = getAssetName; return $prefix + ".testlink" ; } function Get-TxtOfSpecifiedLength([int] $length) { $returnValue = ""; for ($i = 0; $i -lt $length ; $i++) { $returnValue += "a"; } return $returnValue; } function Create-VirtualNetworkLink([bool] $registrationEnabled) { $zoneName = Get-RandomZoneName $linkName = Get-RandomLinkName $resourceGroup = TestSetup-CreateResourceGroup $createdZone = New-AzPrivateDnsZone -Name $zoneName -ResourceGroupName $resourceGroup.ResourceGroupName -Tag @{tag1="value1"} $createdVirtualNetwork = TestSetup-CreateVirtualNetwork $resourceGroup if($registrationEnabled) { $createdLink = New-AzPrivateDnsVirtualNetworkLink -ZoneName $zoneName -ResourceGroupName $resourceGroup.ResourceGroupName -Name $linkName -Tag @{tag1="value1"} -VirtualNetworkId $createdVirtualNetwork.Id -EnableRegistration } else { $createdLink = New-AzPrivateDnsVirtualNetworkLink -ZoneName $zoneName -ResourceGroupName $resourceGroup.ResourceGroupName -Name $linkName -Tag @{tag1="value1"} -VirtualNetworkId $createdVirtualNetwork.Id } return $createdLink }
combined_dataset/train/non-malicious/sample_66_70.ps1
sample_66_70.ps1
# Web Deploy: Powershell script which contains common functionality for other scripts to reference. # Copyright (C) Microsoft Corp. 2010 # # Requirements: IIS 7, Windows Server 2008 (or higher) # Import-LocalizedData -BindingVariable Resources -FileName Resources.psd1 #constants $Global:ScriptError = 0 $Global:Warning = 1 $Global:Info = 2 $Global:RegistryPath = "HKLM:\SOFTWARE\Microsoft\IIS Extensions\MSDeploy" # this function does logging function write-log([int]$type, [string]$info) { $message = $info -f $args $logMessage = get-date -format HH:mm:ss Switch($type){ $Global:ScriptError{ $logMessage = $logMessage + "`t" + $Resources.Error + "`t" + $message write-host -foregroundcolor white -backgroundcolor red $logMessage } $Global:Warning{ $logMessage = $logMessage + "`t" + $Resources.Warning + "`t" + $message write-host -foregroundcolor black -backgroundcolor yellow $logMessage } default{ $logMessage = $logMessage + "`t" + $Resources.Info + "`t" + $message write-host -foregroundcolor black -backgroundcolor green $logMessage } } } function Initialize { try { [System.Reflection.Assembly]::LoadFrom( ${env:windir} + "\system32\inetsrv\Microsoft.Web.Administration.dll" ) > $null } catch [System.Reflection.Assembly] { write-log $Global:ScriptError $Resources.CheckIIS7Installed throw } LoadLatestDeploymentDll } # Loads latest Web Deploy into session function LoadLatestDeploymentDll { try { push-location . set-location "HKLM:" $vers = @(Get-ChildItem $Global:RegistryPath) $i = $vers.Count-1 $ver = $null for($i; $i -ge 0; $i--) { $regPath = $vers[$i].Name $properties = Get-ItemProperty -LiteralPath $regPath if(($properties.Install -ne $null) -and $properties.Install -eq 1) { $v = New-Object Version -ArgumentList $properties.Version $ver = "$($v.Major).$($v.Minor).0.0" break } } if($ver -ne $null) { Add-Type -AssemblyName "microsoft.web.deployment, Version=$ver, Culture=neutral, PublicKeyToken=31bf3856ad364e35" } else { write-log $Global:ScriptError $Resources.CouldNotLoadDeploymentDll } } catch [Exception] { write-log $Global:ScriptError $Resources.CouldNotLoadDeploymentDll throw } finally { pop-location } if($e -ne $null) { throw $e } } # Verifies ExcludedProviders with providers that are installed. function VerifyAndDeleteExcludedProviders { param( [string] $SiteName, [System.Collections.ArrayList] $ExcludedProviders = $null, [Parameter(Mandatory=$true)] [string] $SectionName ) try { $serverManager = New-Object Microsoft.Web.Administration.ServerManager $appHostConfig = $serverManager.GetApplicationHostConfiguration() if($null -ne $ExcludedProviders) { if([string]::IsNullOrEmpty($SiteName)) { $configSection = $appHostConfig.GetSection($BackupSectionName) } else { $configSection = $appHostConfig.GetSection($BackupSectionName, $SiteName) } # Find the ExcludedProviders Element $configSection.ChildElements | out-null foreach($child in $configSection.ChildElements) { $excludedProvidersElem = $null if($child.Schema -is [Microsoft.Web.Administration.ConfigurationCollectionSchema] -and ` $child.Schema.AddElementNames -eq "provider") { $excludedProvidersElem = $child break } } $factories = [microsoft.web.deployment.deploymentmanager]::AvailableProviderFactories $duplicateProviders = @() $globalProviders = @(GetGlobalExcludedProviders -AppHostConfig $appHostConfig -SectionName $sectionName) $existingProvCollection = $excludedProvidersElem.GetCollection() $existingProviders = @() foreach($provider in $existingProvCollection) { $existingProviders += $provider.GetAttributeValue("name") } foreach($provider in $ExcludedProviders) { # Checking to see if provider is a valid provider that exists on this server $factory = $null foreach($f in $factories) { if($f.Name -like $provider) { $factory = $f break } } if($factory -eq $null) { $mesg = $Resources.ProviderDoesNotExist -f $provider write-log $Global:ScriptError $mesg throw new-object System.ArgumentException -ArgumentList $mesg } # Figure out if you should add the provider or not $globalOccurancesOfProvider = CountOccurancesOfStringInList -List $globalProviders -StringToCheck $provider # Check to see if the provider already exists at the global level if([string]::IsNullOrEmpty($SiteName)) { if($globalOccurancesOfProvider -gt 0) { $duplicateProviders += $provider } } else { # Check to see if the global list is the same as site list. Need to do this because config API's only # return the entire inherited list of providers. So we compare the list of global providers against the # list of site providers and figure out the difference. $siteOccurancesOfProvider = CountOccurancesOfStringInList -List $existingProviders -StringToCheck $provider if($siteOccurancesOfProvider -gt $globalOccurancesOfProvider) { $duplicateProviders += $provider } } } # Remove duplicate providers if necessary foreach($provider in $duplicateProviders) { $ExcludedProviders.Remove($provider) } } } finally { if($serverManager -ne $null) { $serverManager.Dispose() } } return $ExcludedProviders } function GetGlobalExcludedProviders { param( $appHostConfig, $sectionName ) $configSection = $appHostConfig.GetSection($sectionName) $existingProvCollection = @(GetExcludedProvidersColletion -configSection $configSection) $existingProviders = @() foreach($provider in $existingProvCollection) { $existingProviders += $provider.GetAttributeValue("name") } return $existingProviders } function RemoveDuplicatesFromList { param( [string[]] $list ) $hash = @{} foreach($s in $list) { $hash[$s] = $null } $arrayList = new-object -Type System.Collections.ArrayList -ArgumentList $hash.Keys return $arrayList } function CountOccurancesOfStringInList { param( [string[]] $list, [string] $stringToCheck ) $num = 0 foreach($s in $list) { if($s -like $stringToCheck) { $num++ } } return $num } function GetExcludedProvidersColletion { param( [Microsoft.Web.Administration.ConfigurationSection] $configSection ) # Find the ExcludedProviders Element $configSection.ChildElements | out-null foreach($child in $configSection.ChildElements) { $excludedProvidersElem = $null if($child.Schema -is [Microsoft.Web.Administration.ConfigurationCollectionSchema] -and ` $child.Schema.AddElementNames -eq "provider") { $excludedProvidersElem = $child break } } return $excludedProvidersElem.GetCollection() } function GetBackupSettingsProviderElem { param( [Microsoft.Web.Administration.ConfigurationSection] $configSection ) # Find the backupSettingsProvider Element $configSection.ChildElements | out-null foreach($child in $configSection.ChildElements) { if($child.Schema.Name -like $BackupSettingsProviderElemName) { $backupProviderElem = $child break } } return $backupProviderElem } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA9sy+QDs9w1sqR # UQaShDSMfeF9fS+amxsYhGclB0vLLqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIHXdm8Gf5RHQmPtKJOAqEgGk # r/6+rmV9Y2eAgZW6OZ8/MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAg2zczBP+mm6h2N+jqZECzrG+xLkqbEVdwE1r8LMB4l/O5TUr+NG/BF9g # ULCzN1HsroRPN2Trt0V97S98DtVOmHYS4dv69Pp0VZoymVYiZGVaDZhH+mHoRHk5 # REceUk43HhZuOJPuf25VBiHX76TFFOxENcCUSFP28+GIVWRCviVrPc3DiXwlQBBu # OyRFPpxJQchimBsxNkIV4PDAYC6R1BRnKkSh6bSn6/tp2+hbJC55EF2Gl7E/tV+C # nJlP8BcAIw9aN8ZHFv5mOGiHrCvaHfx3j78J/P5PHRBeCfp5K5BcsyzsB4qMVYjy # 9hVbcTv0UnbGzW+9EaLwR1ar8/a6d6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCCFew/yxZF8TG/eU3vd9oLl8QDaoKPCeVG5XZ5r56yLygIGZc4cJzPz # GBMyMDI0MDIyODIxMTAzOC44MDRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAehQsIDPK3KZTQABAAAB6DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MjJaFw0yNTAzMDUxODQ1MjJaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046REMwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDhQXdE0WzXG7wzeC9SGdH6eVwdGlF6YgpU7weOFBkp # W9yuEmJSDE1ADBx/0DTuRBaplSD8CR1QqyQmxRDD/CdvDyeZFAcZ6l2+nlMssmZy # C8TPt1GTWAUt3GXUU6g0F0tIrFNLgofCjOvm3G0j482VutKS4wZT6bNVnBVsChr2 # AjmVbGDN/6Qs/EqakL5cwpGel1te7UO13dUwaPjOy0Wi1qYNmR8i7T1luj2JdFdf # ZhMPyqyq/NDnZuONSbj8FM5xKBoar12ragC8/1CXaL1OMXBwGaRoJTYtksi9njuq # 4wDkcAwitCZ5BtQ2NqPZ0lLiQB7O10Bm9zpHWn9x1/HmdAn4koMWKUDwH5sd/zDu # 4vi887FWxm54kkWNvk8FeQ7ZZ0Q5gqGKW4g6revV2IdAxBobWdorqwvzqL70Wdsg # DU/P5c0L8vYIskUJZedCGHM2hHIsNRyw9EFoSolDM+yCedkz69787s8nIp55icLf # DoKw5hak5G6MWF6d71tcNzV9+v9RQKMa6Uwfyquredd5sqXWCXv++hek4A15WybI # c6ufT0ilazKYZvDvoaswgjP0SeLW7mvmcw0FELzF1/uWaXElLHOXIlieKF2i/YzQ # 6U50K9dbhnMaDcJSsG0hXLRTy/LQbsOD0hw7FuK0nmzotSx/5fo9g7fCzoFjk3tD # EwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPo5W8o980kMfRVQba6T34HwelLaMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCWfcJm2rwXtPi74km6PKAkni9+BWotq+Qt # DGgeT5F3ro7PsIUNKRkUytuGqI8thL3Jcrb03x6DOppYJEA+pb6o2qPjFddO1TLq # vSXrYm+OgCLL+7+3FmRmfkRu8rHvprab0O19wDbukgO8I5Oi1RegMJl8t5k/UtE0 # Wb3zAlOHnCjLGSzP/Do3ptwhXokk02IvD7SZEBbPboGbtw4LCHsT2pFakpGOBh+I # SUMXBf835CuVNfddwxmyGvNSzyEyEk5h1Vh7tpwP7z7rJ+HsiP4sdqBjj6Avopuf # 4rxUAfrEbV6aj8twFs7WVHNiIgrHNna/55kyrAG9Yt19CPvkUwxYK0uZvPl2WC39 # nfc0jOTjivC7s/IUozE4tfy3JNkyQ1cNtvZftiX3j5Dt+eLOeuGDjvhJvYMIEkpk # V68XLNH7+ZBfYa+PmfRYaoFFHCJKEoRSZ3PbDJPBiEhZ9yuxMddoMMQ19Tkyftot # 6Ez0XhSmwjYBq39DvBFWhlyDGBhrU3GteDWiVd9YGSB2WnxuFMy5fbAK6o8PWz8Q # RMiptXHK3HDBr2wWWEcrrgcTuHZIJTqepNoYlx9VRFvj/vCXaAFcmkW1nk7VE+ow # aXr5RJjryDq9ubkyDq1mdrF/geaRALXcNZbfNXIkhXzXA6a8CiamcQW/DgmLJpiV # QNriZYCHIDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkRDMDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCM # JG4vg0juMOVn2BuKACUvP80FuqCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6Ym9yTAiGA8yMDI0MDIyODE0MTIy # NVoYDzIwMjQwMjI5MTQxMjI1WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDpib3J # AgEAMAcCAQACAgGBMAcCAQACAhKzMAoCBQDpiw9JAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAGXv4vlLO8gzWrOxDmbfTaiLQdoUzc54XV1m12w3DdLflfXI # UQ/ipLh6j0CPVroo2rQAUJM/zt+UoYMna6gA53YAth/8qwSODwNMVbDBvLo5Ausv # 8YqOdAVby4zB3f9gCyl1FO3BWeAH8jvOhoQI2hZ7+MtstJLPSLlMEsUAcYnaDUcR # GAzhDpv8h3xjwjY0sdnL/mR9bfXbGvYHipfodCqYFH2vLz1xFysAGnb3thuOxv4M # gynG96bXn9+SAthPn+iDad7DyHb+D/QfpRfi6Ry7+GLWS6AVvwFAvKms8WuIzWF2 # Yxk0tmoFAHDHuB225n8j/nQ8x6vK9Xeot5Dsb8ExggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAehQsIDPK3KZTQABAAAB6DAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCBCS8U61uBx4mjdaQ+zGdjGmgNqFVmh0i8EvmzPhLYnsDCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICrS2sTVAoQggkHR59pNqige0xfJ # T2J3U8W1Sc8H+OsdMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHoULCAzytymU0AAQAAAegwIgQgI/4QSxpcLlAnZ/i2tkiLuo2UWAAO # NNtqaQGv/b8JbO4wDQYJKoZIhvcNAQELBQAEggIAJW1rTTwQt9x/8/At6RjiH4uZ # UyUQR80GBgy8oKEUHkFIc7iGqSKqket+mmNwWk8nJtcvs0zGbHdc7tRB3J+Uxt9i # eMNjcI/Zea0cJwtrSi2eCb3uGW/nipFsdAQozDAy0YzOoy3gnQ/fNmrhT4rVaW6Y # da2awQkQnaQzJFMMZr6tSTigL+/tR6iMFgk1Z/WQNJiM5VT9b0UjhNZcUGr5aG7F # Q/PjSHvRsf8o8Hv/qWnu1WVwhjhqcL5dQllNzhaQoMqb0bozDscqiDpIObAAdZLQ # BqO9evMpGhuCnMPXtqYdaO1CCarzv59gJae1G15WB/Rk778/g0Umoml03sY9MIwu # /wHY2Df7CclMkFqXAI0rmPPp7s3TZDRBO3Tp1zaDUOUQdiW4LRi+1ZYNz8OwCsBX # yPtI71OhsvKkIS4Xq3sA30OHIPysWWVzJJ2C5L2y130/nDyNhquPULTkaRSSvypK # p9SGJcmgxLH0Hiu4bY2NZ4dq4l22Z0d3TDMafwKcNiEnFJVD/terjz8q1aEAcTFj # /dw6eWQr/F/ahpr8VAy8TfIrFQYSC1zEFiWL4nBrelLQT0SiHoJxOWZ0KLhhue64 # 5FrE2T86juKxYT0U5kBlqJZTSA6hXjnxiYWna+9GKc9hjSu6YFF6iQOK/aFosVc1 # 43a1on3vaRoF6hWn/q0= # SIG # End signature block
combined_dataset/train/non-malicious/2147.ps1
2147.ps1
Describe 'conversion syntax' -Tags "CI" { It 'converts array of single enum to bool' { [bool]@([ConsoleColor]::Black) | Should -BeFalse [bool]@([ConsoleColor]::Yellow) | Should -BeTrue } It 'calls virtual method non-virtually' { ([object]"abc").ToString() | Should -Be "System.String" $r = [guid]::NewGuid().Guid ([object]($r + "a")).Equals(($r + "a")) | Should -BeFalse } It 'calls method on a super-type, when conversion syntax used' { ([System.Management.Automation.ActionPreference]"Stop").ToString() | Should -Be "Stop" } Context "Cast object[] to more narrow generic collection" { BeforeAll { $testCases1 = @( @{ Command = {$result = [Collections.Generic.List[int]]@(1)}; CollectionType = 'List`1'; ElementType = "Int32"; Elements = @(1) } @{ Command = {$result = [Collections.Generic.List[int]]@(1,2)}; CollectionType = 'List`1'; ElementType = "Int32"; Elements = @(1,2) } @{ Command = {$result = [Collections.Generic.List[int]]"4"}; CollectionType = 'List`1'; ElementType = "Int32"; Elements = @(4) } @{ Command = {$result = [Collections.Generic.List[int]]@("4","5")}; CollectionType = 'List`1'; ElementType = "Int32"; Elements = @(4,5) } @{ Command = {$result = [Collections.Generic.List[string]]@(1)}; CollectionType = 'List`1'; ElementType = "String"; Elements = @("1") } @{ Command = {$result = [Collections.Generic.List[string]]@(1,2)}; CollectionType = 'List`1'; ElementType = "String"; Elements = @("1","2") } @{ Command = {$result = [Collections.Generic.List[string]]1}; CollectionType = 'List`1'; ElementType = "String"; Elements = @("1") } @{ Command = {$result = [Collections.Generic.List[string]]@("4")}; CollectionType = 'List`1'; ElementType = "String"; Elements = @("4") } @{ Command = {$result = [System.Collections.ObjectModel.Collection[int]]@(1)}; CollectionType = 'Collection`1'; ElementType = "Int32"; Elements = @(1) } @{ Command = {$result = [System.Collections.ObjectModel.Collection[int]]@(1,2)}; CollectionType = 'Collection`1'; ElementType = "Int32"; Elements = @(1,2) } @{ Command = {$result = [System.Collections.ObjectModel.Collection[int]]"4"}; CollectionType = 'Collection`1'; ElementType = "Int32"; Elements = @(4) } @{ Command = {$result = [System.Collections.ObjectModel.Collection[int]]@("4","5")}; CollectionType = 'Collection`1'; ElementType = "Int32"; Elements = @(4,5) } @{ Command = {$result = [Collections.Generic.List[System.IO.FileInfo]]@('TestFile')}; CollectionType = 'List`1'; ElementType = "FileInfo"; Elements = @('TestFile') } @{ Command = {$result = [Collections.Generic.List[System.IO.FileInfo]]@('TestFile1', 'TestFile2')}; CollectionType = 'List`1'; ElementType = "FileInfo"; Elements = @('TestFile1', 'TestFile2') } @{ Command = {$result = [Collections.Generic.List[System.IO.FileInfo]]'TestFile'}; CollectionType = 'List`1'; ElementType = "FileInfo"; Elements = @('TestFile') } ) } It "<Command>" -TestCases $testCases1 { param($Command, $CollectionType, $ElementType, $Elements) $result = $null . $Command $result | Should -Not -BeNullOrEmpty $result.GetType().Name | Should -Be $CollectionType $genericArgs = $result.GetType().GetGenericArguments() $genericArgs.Length | Should -Be 1 $genericArgs[0].Name | Should -Be $ElementType $result.Count | Should -Be $Elements.Length $result -join ";" | Should -Be ($Elements -join ";") } } } Describe "Type resolution should prefer assemblies in powershell assembly cache" -Tags "Feature" { BeforeAll { $cmdletCode = @' namespace TestTypeResolution { using System.Management.Automation; [Cmdlet("Test", "TypeResolution")] public class TestTypeResolutionCommand : PSCmdlet { [Parameter()] public string Name { get; set; } protected override void BeginProcessing() { WriteObject(Name); } } public class TestTypeFoo { public string Foo { get; set; } } } '@ $dupTypeCode = @' namespace TestTypeResolution { public class TestTypeFoo { public string Bar { get; set; } } } '@ $cmdletDllDir = Join-Path $TestDrive "cmdlet" $dupTypeDllDir = Join-Path $TestDrive "dupType" $null = New-Item -Path $cmdletDllDir, $dupTypeDllDir -ItemType Directory -Force $cmdletDllPath = Join-Path $cmdletDllDir "TestCmdlet.dll" $dupTypeDllPath = Join-Path $dupTypeDllDir "TestType.dll" Add-Type $cmdletCode -OutputAssembly $cmdletDllPath Add-Type $dupTypeCode -OutputAssembly $dupTypeDllPath $powershell = Join-Path $PSHOME "pwsh" } It "validate Type resolution should prefer the assembly loaded by Import-Module" { $command = @" Add-Type -Path $dupTypeDllPath Import-Module $cmdletDllPath [TestTypeResolution.TestTypeFoo].Assembly.Location "@ $location = & $powershell -noprofile -command $command $location | Should -Be $cmdletDllPath } } Describe 'method conversion' -Tags 'CI' { class M { [int] Twice([int] $value) { return 2 * $value } [int] ThriceInstance([int] $value) { return 3 * $value } static [int] Thrice([int] $value) { return 3 * $value } static [int] Add([int] $i, [int16] $j) { return $i + $j } static [int] Apply([int] $value, [Func[int, int]] $function) { return $function.Invoke($value) } static [int] Apply([int] $v1, [Int16] $v2, [Func[int, int16, int]] $function) { return $function.Invoke($v1, $v2) } static [char] Foo([char] $i) {return $i} static [char] Foo([char] $i, [char] $j) {return $i} static [char] Foo([char] $i, [char] $j, [char] $k) {return $i} static [char] Foo([char] $i, [char] $j, [char] $k, [char] $l) {return $i} static [char] Foo([char] $i, [char] $j, [char] $k, [char] $l, [char] $m) {return $i} static [char] Foo([char] $i, [char] $j, [char] $k, [char] $l, [char] $m, [char] $n) {return $i} static [char] Foo([char] $i, [char] $j, [char] $k, [char] $l, [char] $m, [char] $n, [char] $o) {return $i} static [char] Foo([char] $i, [char] $j, [char] $k, [char] $l, [char] $m, [char] $n, [char] $o, [char] $p) {return $i} static [int16] Foo([int16] $i) {return $i} static [int16] Foo([int16] $i, [int16] $j) {return $i} static [int16] Foo([int16] $i, [int16] $j, [int16] $k) {return $i} static [int16] Foo([int16] $i, [int16] $j, [int16] $k, [int16] $l) {return $i} static [int16] Foo([int16] $i, [int16] $j, [int16] $k, [int16] $l, [int16] $m) {return $i} static [int16] Foo([int16] $i, [int16] $j, [int16] $k, [int16] $l, [int16] $m, [int16] $n) {return $i} static [int16] Foo([int16] $i, [int16] $j, [int16] $k, [int16] $l, [int16] $m, [int16] $n, [int16] $o) {return $i} static [int16] Foo([int16] $i, [int16] $j, [int16] $k, [int16] $l, [int16] $m, [int16] $n, [int16] $o, [int16] $p) {return $i} static [int] Foo([int] $i) {return $i} static [int] Foo([int] $i, [int] $j) {return $i} static [int] Foo([int] $i, [int] $j, [int] $k) {return $i} static [int] Foo([int] $i, [int] $j, [int] $k, [int] $l) {return $i} static [int] Foo([int] $i, [int] $j, [int] $k, [int] $l, [int] $m) {return $i} static [int] Foo([int] $i, [int] $j, [int] $k, [int] $l, [int] $m, [int] $n) {return $i} static [int] Foo([int] $i, [int] $j, [int] $k, [int] $l, [int] $m, [int] $n, [int] $o) {return $i} static [int] Foo([int] $i, [int] $j, [int] $k, [int] $l, [int] $m, [int] $n, [int] $o, [int] $p) {return $i} static [UInt32] Foo([UInt32] $i) {return $i} static [UInt32] Foo([UInt32] $i, [UInt32] $j) {return $i} static [UInt32] Foo([UInt32] $i, [UInt32] $j, [UInt32] $k) {return $i} static [UInt32] Foo([UInt32] $i, [UInt32] $j, [UInt32] $k, [UInt32] $l) {return $i} static [UInt32] Foo([UInt32] $i, [UInt32] $j, [UInt32] $k, [UInt32] $l, [UInt32] $m) {return $i} static [UInt32] Foo([UInt32] $i, [UInt32] $j, [UInt32] $k, [UInt32] $l, [UInt32] $m, [UInt32] $n) {return $i} static [UInt32] Foo([UInt32] $i, [UInt32] $j, [UInt32] $k, [UInt32] $l, [UInt32] $m, [UInt32] $n, [UInt32] $o) {return $i} static [UInt32] Foo([UInt32] $i, [UInt32] $j, [UInt32] $k, [UInt32] $l, [UInt32] $m, [UInt32] $n, [UInt32] $o, [UInt32] $p) {return $i} static [UInt64] Foo([UInt64] $i) {return $i} static [UInt64] Foo([UInt64] $i, [UInt64] $j) {return $i} static [UInt64] Foo([UInt64] $i, [UInt64] $j, [UInt64] $k) {return $i} static [UInt64] Foo([UInt64] $i, [UInt64] $j, [UInt64] $k, [UInt64] $l) {return $i} static [UInt64] Foo([UInt64] $i, [UInt64] $j, [UInt64] $k, [UInt64] $l, [UInt64] $m) {return $i} static [UInt64] Foo([UInt64] $i, [UInt64] $j, [UInt64] $k, [UInt64] $l, [UInt64] $m, [UInt64] $n) {return $i} static [UInt64] Foo([UInt64] $i, [UInt64] $j, [UInt64] $k, [UInt64] $l, [UInt64] $m, [UInt64] $n, [UInt64] $o) {return $i} static [UInt64] Foo([UInt64] $i, [UInt64] $j, [UInt64] $k, [UInt64] $l, [UInt64] $m, [UInt64] $n, [UInt64] $o, [UInt64] $p) {return $i} static [float] Foo([float] $i) {return $i} static [float] Foo([float] $i, [float] $j) {return $i} static [float] Foo([float] $i, [float] $j, [float] $k) {return $i} static [float] Foo([float] $i, [float] $j, [float] $k, [float] $l) {return $i} static [float] Foo([float] $i, [float] $j, [float] $k, [float] $l, [float] $m) {return $i} static [float] Foo([float] $i, [float] $j, [float] $k, [float] $l, [float] $m, [float] $n) {return $i} static [float] Foo([float] $i, [float] $j, [float] $k, [float] $l, [float] $m, [float] $n, [float] $o) {return $i} static [float] Foo([float] $i, [float] $j, [float] $k, [float] $l, [float] $m, [float] $n, [float] $o, [float] $p) {return $i} static [double] Foo([double] $i) {return $i} static [double] Foo([double] $i, [double] $j) {return $i} static [double] Foo([double] $i, [double] $j, [double] $k) {return $i} static [double] Foo([double] $i, [double] $j, [double] $k, [double] $l) {return $i} static [double] Foo([double] $i, [double] $j, [double] $k, [double] $l, [double] $m) {return $i} static [double] Foo([double] $i, [double] $j, [double] $k, [double] $l, [double] $m, [double] $n) {return $i} static [double] Foo([double] $i, [double] $j, [double] $k, [double] $l, [double] $m, [double] $n, [double] $o) {return $i} static [double] Foo([double] $i, [double] $j, [double] $k, [double] $l, [double] $m, [double] $n, [double] $o, [double] $p) {return $i} static [IntPtr] Foo([IntPtr] $i) {return $i} static [IntPtr] Foo([IntPtr] $i, [IntPtr] $j) {return $i} static [IntPtr] Foo([IntPtr] $i, [IntPtr] $j, [IntPtr] $k) {return $i} static [IntPtr] Foo([IntPtr] $i, [IntPtr] $j, [IntPtr] $k, [IntPtr] $l) {return $i} static [IntPtr] Foo([IntPtr] $i, [IntPtr] $j, [IntPtr] $k, [IntPtr] $l, [IntPtr] $m) {return $i} static [IntPtr] Foo([IntPtr] $i, [IntPtr] $j, [IntPtr] $k, [IntPtr] $l, [IntPtr] $m, [IntPtr] $n) {return $i} static [IntPtr] Foo([IntPtr] $i, [IntPtr] $j, [IntPtr] $k, [IntPtr] $l, [IntPtr] $m, [IntPtr] $n, [IntPtr] $o) {return $i} static [IntPtr] Foo([IntPtr] $i, [IntPtr] $j, [IntPtr] $k, [IntPtr] $l, [IntPtr] $m, [IntPtr] $n, [IntPtr] $o, [IntPtr] $p) {return $i} static [timespan] Foo([timespan] $i) {return $i} static [timespan] Foo([timespan] $i, [timespan] $j) {return $i} static [timespan] Foo([timespan] $i, [timespan] $j, [timespan] $k) {return $i} static [timespan] Foo([timespan] $i, [timespan] $j, [timespan] $k, [timespan] $l) {return $i} static [timespan] Foo([timespan] $i, [timespan] $j, [timespan] $k, [timespan] $l, [timespan] $m) {return $i} static [timespan] Foo([timespan] $i, [timespan] $j, [timespan] $k, [timespan] $l, [timespan] $m, [timespan] $n) {return $i} static [timespan] Foo([timespan] $i, [timespan] $j, [timespan] $k, [timespan] $l, [timespan] $m, [timespan] $n, [timespan] $o) {return $i} static [timespan] Foo([timespan] $i, [timespan] $j, [timespan] $k, [timespan] $l, [timespan] $m, [timespan] $n, [timespan] $o, [timespan] $p) {return $i} } It 'converts static method as Func does not throw' { {[Func[int, int]] [M]::Thrice} | Should -Not -Throw } It 'converts static method as Func is non null' { ([Func[int, int]] [M]::Thrice) | Should -Not -BeNullOrEmpty } It 'calls static method as Func' { $f = [Func[int, int]] [M]::Thrice [M]::Apply(1, $f) | Should -Be 3 } It 'calls static method as Func' { $f = [Func[int, int16, int]] [M]::Add [M]::Apply(3, 4, $f) | Should -Be 7 } It 'calls static method as Func no cast' { [M]::Apply(3, 4, [M]::Add) | Should -Be 7 } It 'converts instance psmethodinfo to Func' { $m = [M]::new() {[Func[int, int]] $m.Twice} | Should -Not -Throw $f = [Func[int, int16, int]] [M]::Add $f.Invoke(2, 6) | Should -Be 8 } It "can call all overloads of M::Foo" { [Func[char, char]] $f1 = [M]::Foo $f1.Invoke(10) | Should -Be 10 [Func[char, char, char]] $f2 = [M]::Foo $f2.Invoke(10, 1) | Should -Be 10 [Func[char, char, char, char]] $f3 = [M]::Foo $f3.Invoke(10, 1, 2) | Should -Be 10 [Func[char, char, char, char, char]] $f4 = [M]::Foo $f4.Invoke(10, 1, 2, 3) | Should -Be 10 [Func[char, char, char, char, char, char]] $f5 = [M]::Foo $f5.Invoke(10, 1, 2, 3, 4) | Should -Be 10 [Func[char, char, char, char, char, char, char]] $f6 = [M]::Foo $f6.Invoke(10, 1, 2, 3, 4, 5) | Should -Be 10 [Func[char, char, char, char, char, char, char, char]] $f7 = [M]::Foo $f7.Invoke(10, 1, 2, 3, 4, 5, 6) | Should -Be 10 [Func[char, char, char, char, char, char, char, char, char]] $f8 = [M]::Foo $f8.Invoke(10, 1, 2, 3, 4, 5, 6, 7) | Should -Be 10 [Func[int16, int16]] $f9 = [M]::Foo $f9.Invoke(10) | Should -Be 10 [Func[int16, int16, int16]] $f10 = [M]::Foo $f10.Invoke(10, 1) | Should -Be 10 [Func[int16, int16, int16, int16]] $f11 = [M]::Foo $f11.Invoke(10, 1, 2) | Should -Be 10 [Func[int16, int16, int16, int16, int16]] $f12 = [M]::Foo $f12.Invoke(10, 1, 2, 3) | Should -Be 10 [Func[int16, int16, int16, int16, int16, int16]] $f13 = [M]::Foo $f13.Invoke(10, 1, 2, 3, 4) | Should -Be 10 [Func[int16, int16, int16, int16, int16, int16, int16]] $f14 = [M]::Foo $f14.Invoke(10, 1, 2, 3, 4, 5) | Should -Be 10 [Func[int16, int16, int16, int16, int16, int16, int16, int16]] $f15 = [M]::Foo $f15.Invoke(10, 1, 2, 3, 4, 5, 6) | Should -Be 10 [Func[int16, int16, int16, int16, int16, int16, int16, int16, int16]] $f16 = [M]::Foo $f16.Invoke(10, 1, 2, 3, 4, 5, 6, 7) | Should -Be 10 [Func[int, int]] $f17 = [M]::Foo $f17.Invoke(10) | Should -Be 10 [Func[int, int, int]] $f18 = [M]::Foo $f18.Invoke(10, 1) | Should -Be 10 [Func[int, int, int, int]] $f19 = [M]::Foo $f19.Invoke(10, 1, 2) | Should -Be 10 [Func[int, int, int, int, int]] $f20 = [M]::Foo $f20.Invoke(10, 1, 2, 3) | Should -Be 10 [Func[int, int, int, int, int, int]] $f21 = [M]::Foo $f21.Invoke(10, 1, 2, 3, 4) | Should -Be 10 [Func[int, int, int, int, int, int, int]] $f22 = [M]::Foo $f22.Invoke(10, 1, 2, 3, 4, 5) | Should -Be 10 [Func[int, int, int, int, int, int, int, int]] $f23 = [M]::Foo $f23.Invoke(10, 1, 2, 3, 4, 5, 6) | Should -Be 10 [Func[int, int, int, int, int, int, int, int, int]] $f24 = [M]::Foo $f24.Invoke(10, 1, 2, 3, 4, 5, 6, 7) | Should -Be 10 [Func[UInt32, UInt32]] $f25 = [M]::Foo $f25.Invoke(10) | Should -Be 10 [Func[UInt32, UInt32, UInt32]] $f26 = [M]::Foo $f26.Invoke(10, 1) | Should -Be 10 [Func[UInt32, UInt32, UInt32, UInt32]] $f27 = [M]::Foo $f27.Invoke(10, 1, 2) | Should -Be 10 [Func[UInt32, UInt32, UInt32, UInt32, UInt32]] $f28 = [M]::Foo $f28.Invoke(10, 1, 2, 3) | Should -Be 10 [Func[UInt32, UInt32, UInt32, UInt32, UInt32, UInt32]] $f29 = [M]::Foo $f29.Invoke(10, 1, 2, 3, 4) | Should -Be 10 [Func[UInt32, UInt32, UInt32, UInt32, UInt32, UInt32, UInt32]] $f30 = [M]::Foo $f30.Invoke(10, 1, 2, 3, 4, 5) | Should -Be 10 [Func[UInt32, UInt32, UInt32, UInt32, UInt32, UInt32, UInt32, UInt32]] $f31 = [M]::Foo $f31.Invoke(10, 1, 2, 3, 4, 5, 6) | Should -Be 10 [Func[UInt32, UInt32, UInt32, UInt32, UInt32, UInt32, UInt32, UInt32, UInt32]] $f32 = [M]::Foo $f32.Invoke(10, 1, 2, 3, 4, 5, 6, 7) | Should -Be 10 [Func[UInt64, UInt64]] $f33 = [M]::Foo $f33.Invoke(10) | Should -Be 10 [Func[UInt64, UInt64, UInt64]] $f34 = [M]::Foo $f34.Invoke(10, 1) | Should -Be 10 [Func[UInt64, UInt64, UInt64, UInt64]] $f35 = [M]::Foo $f35.Invoke(10, 1, 2) | Should -Be 10 [Func[UInt64, UInt64, UInt64, UInt64, UInt64]] $f36 = [M]::Foo $f36.Invoke(10, 1, 2, 3) | Should -Be 10 [Func[UInt64, UInt64, UInt64, UInt64, UInt64, UInt64]] $f37 = [M]::Foo $f37.Invoke(10, 1, 2, 3, 4) | Should -Be 10 [Func[UInt64, UInt64, UInt64, UInt64, UInt64, UInt64, UInt64]] $f38 = [M]::Foo $f38.Invoke(10, 1, 2, 3, 4, 5) | Should -Be 10 [Func[UInt64, UInt64, UInt64, UInt64, UInt64, UInt64, UInt64, UInt64]] $f39 = [M]::Foo $f39.Invoke(10, 1, 2, 3, 4, 5, 6) | Should -Be 10 [Func[UInt64, UInt64, UInt64, UInt64, UInt64, UInt64, UInt64, UInt64, UInt64]] $f40 = [M]::Foo $f40.Invoke(10, 1, 2, 3, 4, 5, 6, 7) | Should -Be 10 [Func[float, float]] $f41 = [M]::Foo $f41.Invoke(10) | Should -Be 10 [Func[float, float, float]] $f42 = [M]::Foo $f42.Invoke(10, 1) | Should -Be 10 [Func[float, float, float, float]] $f43 = [M]::Foo $f43.Invoke(10, 1, 2) | Should -Be 10 [Func[float, float, float, float, float]] $f44 = [M]::Foo $f44.Invoke(10, 1, 2, 3) | Should -Be 10 [Func[float, float, float, float, float, float]] $f45 = [M]::Foo $f45.Invoke(10, 1, 2, 3, 4) | Should -Be 10 [Func[float, float, float, float, float, float, float]] $f46 = [M]::Foo $f46.Invoke(10, 1, 2, 3, 4, 5) | Should -Be 10 [Func[float, float, float, float, float, float, float, float]] $f47 = [M]::Foo $f47.Invoke(10, 1, 2, 3, 4, 5, 6) | Should -Be 10 [Func[float, float, float, float, float, float, float, float, float]] $f48 = [M]::Foo $f48.Invoke(10, 1, 2, 3, 4, 5, 6, 7) | Should -Be 10 [Func[double, double]] $f49 = [M]::Foo $f49.Invoke(10) | Should -Be 10 [Func[double, double, double]] $f50 = [M]::Foo $f50.Invoke(10, 1) | Should -Be 10 [Func[double, double, double, double]] $f51 = [M]::Foo $f51.Invoke(10, 1, 2) | Should -Be 10 [Func[double, double, double, double, double]] $f52 = [M]::Foo $f52.Invoke(10, 1, 2, 3) | Should -Be 10 [Func[double, double, double, double, double, double]] $f53 = [M]::Foo $f53.Invoke(10, 1, 2, 3, 4) | Should -Be 10 [Func[double, double, double, double, double, double, double]] $f54 = [M]::Foo $f54.Invoke(10, 1, 2, 3, 4, 5) | Should -Be 10 [Func[double, double, double, double, double, double, double, double]] $f55 = [M]::Foo $f55.Invoke(10, 1, 2, 3, 4, 5, 6) | Should -Be 10 [Func[double, double, double, double, double, double, double, double, double]] $f56 = [M]::Foo $f56.Invoke(10, 1, 2, 3, 4, 5, 6, 7) | Should -Be 10 [Func[IntPtr, IntPtr]] $f57 = [M]::Foo $f57.Invoke(10) | Should -Be 10 [Func[IntPtr, IntPtr, IntPtr]] $f58 = [M]::Foo $f58.Invoke(10, 1) | Should -Be 10 [Func[IntPtr, IntPtr, IntPtr, IntPtr]] $f59 = [M]::Foo $f59.Invoke(10, 1, 2) | Should -Be 10 [Func[IntPtr, IntPtr, IntPtr, IntPtr, IntPtr]] $f60 = [M]::Foo $f60.Invoke(10, 1, 2, 3) | Should -Be 10 [Func[IntPtr, IntPtr, IntPtr, IntPtr, IntPtr, IntPtr]] $f61 = [M]::Foo $f61.Invoke(10, 1, 2, 3, 4) | Should -Be 10 [Func[IntPtr, IntPtr, IntPtr, IntPtr, IntPtr, IntPtr, IntPtr]] $f62 = [M]::Foo $f62.Invoke(10, 1, 2, 3, 4, 5) | Should -Be 10 [Func[IntPtr, IntPtr, IntPtr, IntPtr, IntPtr, IntPtr, IntPtr, IntPtr]] $f63 = [M]::Foo $f63.Invoke(10, 1, 2, 3, 4, 5, 6) | Should -Be 10 [Func[IntPtr, IntPtr, IntPtr, IntPtr, IntPtr, IntPtr, IntPtr, IntPtr, IntPtr]] $f64 = [M]::Foo $f64.Invoke(10, 1, 2, 3, 4, 5, 6, 7) | Should -Be 10 $timespan = [timespan]::FromMinutes(62) [Func[timespan, timespan]] $f65 = [M]::Foo $f65.Invoke($timeSpan) | Should -Be $timeSpan [Func[timespan, timespan, timespan]] $f66 = [M]::Foo $f66.Invoke($timeSpan, [Timespan]::Zero) | Should -Be $timeSpan [Func[timespan, timespan, timespan, timespan]] $f67 = [M]::Foo $f67.Invoke($timeSpan, [Timespan]::Zero, [Timespan]::Zero) | Should -Be $timeSpan [Func[timespan, timespan, timespan, timespan, timespan]] $f68 = [M]::Foo $f68.Invoke($timeSpan, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero) | Should -Be $timeSpan [Func[timespan, timespan, timespan, timespan, timespan, timespan]] $f69 = [M]::Foo $f69.Invoke($timeSpan, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero) | Should -Be $timeSpan [Func[timespan, timespan, timespan, timespan, timespan, timespan, timespan]] $f70 = [M]::Foo $f70.Invoke($timeSpan, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero) | Should -Be $timeSpan [Func[timespan, timespan, timespan, timespan, timespan, timespan, timespan, timespan]] $f71 = [M]::Foo $f71.Invoke($timeSpan, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero) | Should -Be $timeSpan [Func[timespan, timespan, timespan, timespan, timespan, timespan, timespan, timespan, timespan]] $f72 = [M]::Foo $f72.Invoke($timeSpan, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero, [Timespan]::Zero) | Should -Be $timeSpan } enum E { Day; Week; Year; } class N { [string] GetA([int] $i, [string] $s) { return "GetA-int-string-string" } [string] GetA([System.IO.FileSystemInfo] $fsinfo, [object] $o) { return "GetA-filesysteminfo-object-string" } [string] GetA([System.IO.FileInfo] $finfo, [object] $o) { return "GetA-fileinfo-object-string" } [string] GetAPrime([int] $i, [string] $s) { return "GetAPrime-int-string-string" } [string] GetAPrime([System.IO.FileSystemInfo] $fsinfo, [object] $o) { return "GetAPrime-filesysteminfo-object-string" } [string] GetAPrime([System.IO.FileInfo] $finfo, [object] $o) { return "GetAPrime-fileinfo-object-string" } static [string] GetAStatic([int] $i, [string] $s) { return "GetAStatic-int-string-string" } static [string] GetAStatic([System.IO.FileSystemInfo] $fsinfo, [object] $o) { return "GetAStatic-filesysteminfo-object-string" } static [string] GetAStatic([System.IO.FileInfo] $finfo, [object] $o) { return "GetAStatic-fileinfo-object-string" } [string] GetB([System.IO.FileSystemInfo] $fsinfo, [object] $o) { return "GetB-filesysteminfo-object-string" } [object] GetB([System.IO.FileInfo] $finfo, [string] $s) { return "GetB-fileinfo-string-object" } [string] GetB([datetime] $d) { return "GetB-datetime-string" } [string] GetBPrime([System.IO.FileSystemInfo] $fsinfo, [object] $o) { return "GetBPrime-filesysteminfo-object-string" } [object] GetBPrime([System.IO.FileInfo] $finfo, [string] $s) { return "GetBPrime-fileinfo-string-object" } [string] GetBPrime([datetime] $d) { return "GetBPrime-datetime-string" } static [string] GetBStatic([System.IO.FileSystemInfo] $fsinfo, [object] $o) { return "GetBStatic-filesysteminfo-object-string" } static [object] GetBStatic([System.IO.FileInfo] $finfo, [string] $s) { return "GetBStatic-fileinfo-string-object" } static [string] GetBStatic([datetime] $d) { return "GetBStatic-datetime-string" } [object] GetC([E] $e) { return $e.ToString() } } It "Different method overloads with same signatures/orders should have same PSMethod type" { $n = [N]::new() $n.GetA.GetType() | Should -Be ($n.GetAPrime.GetType()) $n.GetA.GetType() | Should -Be ([N]::GetAStatic.GetType()) $n.GetB.GetType() | Should -Be ($n.GetBPrime.GetType()) $n.GetB.GetType() | Should -Be ([N]::GetBStatic.GetType()) } It "Match signature with variance and use the first match when there is no exact match" { $n = [N]::new() [Func[[System.IO.FileInfo], [string], [object]]] $f = $n.GetA $f.Invoke($null, $null) | Should -BeExactly "GetA-filesysteminfo-object-string" $f = $n.GetAPrime $f.Invoke([System.IO.FileInfo]::new("aaa"), "bbb") | Should -BeExactly "GetAPrime-filesysteminfo-object-string" $f = [N]::GetAStatic $f.Invoke($null, "") | Should -BeExactly "GetAStatic-filesysteminfo-object-string" } It "Exact match is preferred over match with variance" { $n = [N]::new() [Func[[System.IO.FileInfo], [string], [object]]] $f = $n.GetB $f.Invoke($null, $null) | Should -BeExactly "GetB-fileinfo-string-object" $f = $n.GetBPrime $f.Invoke([System.IO.FileInfo]::new("ccc"), "ddd") | Should -BeExactly "GetBPrime-fileinfo-string-object" $f = [N]::GetBStatic $f.Invoke($null, "") | Should -BeExactly "GetBStatic-fileinfo-string-object" } It "Test enum type parameter" { $n = [N]::new() [Func[[E], [object]]] $f = $n.GetC $f.Invoke([E]::Week) | Should -BeExactly "Week" } It "Test fail-to-convert code path" { $n = [N]::new() { [System.Management.Automation.LanguagePrimitives]::ConvertTo($n.GetC, [Func[[int], [object]]]) } | Should -Throw -ErrorId "PSInvalidCastException" } $TestCases = @( @{ Number = "100y"; Value = "100"; Type = [int] } @{ Number = "100uy"; Value = "100"; Type = [double] } @{ Number = "1200u"; Value = "1200"; Type = [short] } @{ Number = "1200L"; Value = "1200"; Type = [int] } @{ Number = "127ul"; Value = "127"; Type = [ulong] } @{ Number = "127d"; Value = "127"; Type = [byte] } @{ Number = "127s"; Value = "127"; Type = [sbyte] } @{ Number = "127y"; Value = "127"; Type = [uint] } ) It "Correctly casts <Number> to value <Value> as type <Type>" -TestCases $TestCases { param($Number, $Value, $Type) $Result = $Number -as $Type $Result | Should -Be $Value $Result | Should -BeOfType $Type } $TestCases = @( @{ Number = "200y" } @{ Number = "300uy" } @{ Number = "70000us" } @{ Number = "40000s" } ) It "Fails to cast invalid PowerShell-Style suffixed numeral <Number>" -TestCases $TestCases { param($Number) $Result = $Number -as [int] $Result | Should -BeNullOrEmpty } } Describe 'float/double precision when converting to string' -Tags "CI" { It "<SourceType>-to-[string] conversion in PowerShell should use the precision specifier <Format>" -TestCases @( @{ SourceType = [double]; Format = "G15"; ValueScript = { 1.1 * 3 }; StringConversionResult = "3.3"; ToStringResult = "3.3000000000000003" } @{ SourceType = [double]; Format = "G15"; ValueScript = { 1.1 * 6 }; StringConversionResult = "6.6"; ToStringResult = "6.6000000000000005" } @{ SourceType = [double]; Format = "G15"; ValueScript = { [System.Math]::E }; StringConversionResult = [System.Math]::E.ToString("G15"); ToStringResult = [System.Math]::E.ToString() } @{ SourceType = [double]; Format = "G15"; ValueScript = { [System.Math]::PI }; StringConversionResult = [System.Math]::PI.ToString("G15"); ToStringResult = [System.Math]::PI.ToString() } @{ SourceType = [float]; Format = "G7"; ValueScript = { [float]$f = 1.1; ($f * 3).ToSingle([cultureinfo]::InvariantCulture) }; StringConversionResult = "3.3"; ToStringResult = "3.3000002" } @{ SourceType = [float]; Format = "G7"; ValueScript = { [float]$f = 1.1; ($f * 6).ToSingle([cultureinfo]::InvariantCulture) }; StringConversionResult = "6.6"; ToStringResult = "6.6000004" } @{ SourceType = [float]; Format = "G7"; ValueScript = { [float]::MaxValue }; StringConversionResult = [float]::MaxValue.ToString("G7"); ToStringResult = [float]::MaxValue.ToString() } @{ SourceType = [float]; Format = "G7"; ValueScript = { [float]::MinValue }; StringConversionResult = [float]::MinValue.ToString("G7"); ToStringResult = [float]::MinValue.ToString() } ) { param($SourceType, $ValueScript, $StringConversionResult, $ToStringResult) $value = & $ValueScript $value | Should -BeOfType $SourceType $value.ToString() | Should -BeExactly $ToStringResult $value -as [string] | Should -BeExactly $StringConversionResult [string]$value | Should -BeExactly $StringConversionResult [System.Management.Automation.LanguagePrimitives]::ConvertTo($value, [string]) | Should -BeExactly $StringConversionResult "$value" | Should -BeExactly $StringConversionResult $value | Out-String | ForEach-Object -MemberName Trim | Should -BeExactly $StringConversionResult } }
combined_dataset/train/non-malicious/3107.ps1
3107.ps1
"^(254|252|248|240|224|192|128).0.0.0$|^255.(254|252|248|240|224|192|128|0).0.0$|^255.255.(254|252|248|240|224|192|128|0).0$|^255.255.255.(255|254|252|248|240|224|192|128|0)$"
combined_dataset/train/non-malicious/3747.ps1
3747.ps1
function Test_SetAzureKeyVaultManagedStorageAccountAndRawSasDefinition { $managedStorageSasDefinitionName = Get-ManagedStorageSasDefinitionName 'mngsas1' $paramatersSubCommand = '-Name $($managedStorageSasDefinitionName) -Parameter @{"sasType"="service";"serviceSasType"="blob";"signedResourceTypes"="b";"signedVersion"="2016-05-31";"signedProtocols"="https";"signedIp"="168.1.5.60-168.1.5.70";"validityPeriod"="P30D";"signedPermissions"="ra";"blobName"="blob1";"containerName"="container1";"rscd"="";"rscc"=""}' Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinition $paramatersSubCommand } function Test_SetAzureKeyVaultManagedStorageAccountAndBlobSasDefinition { $managedStorageSasDefinitionName = Get-ManagedStorageSasDefinitionName 'mngsas2' $paramatersSubCommand = "-Name $($managedStorageSasDefinitionName) -Blob 'blob1' -Container 'container1' -ValidityPeriod ([System.Timespan]::FromDays(30)) -Permission Read,Add -SharedAccessHeader CacheControl,ContentDisposition -Protocol HttpsOnly -IPAddressOrRange '168.1.5.60-168.1.5.70'" Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinition $paramatersSubCommand } function Test_SetAzureKeyVaultManagedStorageAccountAndBlobStoredPolicySasDefinition { $managedStorageSasDefinitionName = Get-ManagedStorageSasDefinitionName 'mngsas2' $paramatersSubCommand = "-Name $($managedStorageSasDefinitionName) -Blob 'blob1' -Container 'container1' -Policy 'policy1' -SharedAccessHeader CacheControl,ContentDisposition -Protocol HttpsOnly -IPAddressOrRange '168.1.5.60-168.1.5.70'" Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinition $paramatersSubCommand } function Test_SetAzureKeyVaultManagedStorageAccountAndContainerSasDefinition { $managedStorageSasDefinitionName = Get-ManagedStorageSasDefinitionName 'mngsas3' $paramatersSubCommand = "-Name $($managedStorageSasDefinitionName) -Container 'container1' -ValidityPeriod ([System.Timespan]::FromDays(30)) -Permission Read,Add -SharedAccessHeader CacheControl,ContentDisposition -Protocol HttpsOnly -IPAddressOrRange '168.1.5.60-168.1.5.70'" Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinition $paramatersSubCommand } function Test_SetAzureKeyVaultManagedStorageAccountAndShareSasDefinition { $managedStorageSasDefinitionName = Get-ManagedStorageSasDefinitionName 'mngsas4' $paramatersSubCommand = "-Name $($managedStorageSasDefinitionName) -Share 'share1' -ValidityPeriod ([System.Timespan]::FromDays(30)) -Permission Read,Add -SharedAccessHeader CacheControl,ContentDisposition -Protocol HttpsOnly -IPAddressOrRange '168.1.5.60-168.1.5.70'" Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinition $paramatersSubCommand } function Test_SetAzureKeyVaultManagedStorageAccountAndFileSasDefinition { $managedStorageSasDefinitionName = Get-ManagedStorageSasDefinitionName 'mngsas5' $paramatersSubCommand = "-Name $($managedStorageSasDefinitionName) -Share 'share1' -Path 'path1' -ValidityPeriod ([System.Timespan]::FromDays(30)) -Permission Read,Add -SharedAccessHeader CacheControl,ContentDisposition -Protocol HttpsOnly -IPAddressOrRange '168.1.5.60-168.1.5.70'" Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinition $paramatersSubCommand } function Test_SetAzureKeyVaultManagedStorageAccountAndQueueSasDefinition { $managedStorageSasDefinitionName = Get-ManagedStorageSasDefinitionName 'mngsas6' $paramatersSubCommand = "-Name $($managedStorageSasDefinitionName) -Queue 'queue1' -ValidityPeriod ([System.Timespan]::FromDays(30)) -Permission Read,Add -Protocol HttpsOnly -IPAddressOrRange '168.1.5.60-168.1.5.70'" Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinition $paramatersSubCommand } function Test_SetAzureKeyVaultManagedStorageAccountAndTableSasDefinition { $managedStorageSasDefinitionName = Get-ManagedStorageSasDefinitionName 'mngsas6' $paramatersSubCommand = "-Name $($managedStorageSasDefinitionName) -Table 'table' -ValidityPeriod ([System.Timespan]::FromDays(30)) -Permission Read,Add -Protocol HttpsOnly -IPAddressOrRange '168.1.5.60-168.1.5.70' -StartPartitionKey 'spk1' -EndPartitionKey 'epk1'" Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinition $paramatersSubCommand } function Test_SetAzureKeyVaultManagedStorageAccountAndAccountSasDefinition { $managedStorageSasDefinitionName = Get-ManagedStorageSasDefinitionName 'mngsas7' $paramatersSubCommand = "-Name $($managedStorageSasDefinitionName) -Service Queue,Blob -ResourceType Container,Object -Protocol HttpsOnly -IPAddressOrRange '168.1.5.60-168.1.5.70' -ValidityPeriod ([System.Timespan]::FromDays(30)) -Permission Add,Create" Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinition $paramatersSubCommand } function Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinition { param([string] $paramatersSubCommand) $keyVault = Get-KeyVault $managedStorageAccountName = Get-ManagedStorageAccountName 'mngSt1' $global:createdManagedStorageAccounts += $managedStorageAccountName $storageAccountResourceId = Get-KeyVaultManagedStorageResourceId $managedStorageAccount = Add-AzKeyVaultManagedStorageAccount -VaultName $keyVault -AccountName $managedStorageAccountName -AccountResourceId $storageAccountResourceId -ActiveKeyName 'key1' -DisableAutoRegenerateKey Assert-NotNull $managedStorageAccount $command = "Set-AzKeyVaultManagedStorageSasDefinition -VaultName $($keyVault) -AccountName $($managedStorageAccountName) $($paramatersSubCommand)" Write-Host $command $createdManagedStorageSasDefinition = Invoke-Expression $command Assert-NotNull $createdManagedStorageSasDefinition Assert-NotNull $managedStorageAccount.AccountName Assert-NotNull $createdManagedStorageSasDefinition.Name $secretName = "$($managedStorageAccount.AccountName)-$($createdManagedStorageSasDefinition.Name)" $secret = Get-AzKeyVaultSecret $keyVault $secretName Assert-NotNull $secret Assert-NotNull $secret.SecretValueText } function Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinitionPipeTest { $keyVault = Get-KeyVault $managedStorageAccountName1 = Get-ManagedStorageAccountName 'mngSt1' $managedStorageAccountName2 = Get-ManagedStorageAccountName 'mngSt2' $global:createdManagedStorageAccounts += $managedStorageAccountName1 $global:createdManagedStorageAccounts += $managedStorageAccountName2 $storageAccountResourceId = Get-KeyVaultManagedStorageResourceId $managedStorageAccount1 = Add-AzKeyVaultManagedStorageAccount -VaultName $keyVault -AccountName $managedStorageAccountName1 -AccountResourceId $storageAccountResourceId -ActiveKeyName 'key1' -DisableAutoRegenerateKey Assert-NotNull $managedStorageAccount1 $managedStorageAccount2 = Get-AzKeyVaultManagedStorageAccount -VaultName $keyVault -AccountName $managedStorageAccountName1 | Add-AzKeyVaultManagedStorageAccount -AccountName $managedStorageAccountName2 Assert-NotNull $managedStorageAccount2 $managedStorageSasDefinitionName1 = Get-ManagedStorageSasDefinitionName 'mngsas8' $managedStorageSasDefinitionName2 = Get-ManagedStorageSasDefinitionName 'mngsas9' $paramatersSubCommand = "-Name $($managedStorageSasDefinitionName1) -Service Queue,Blob -ResourceType Container,Object -Protocol HttpsOnly -IPAddressOrRange '168.1.5.60-168.1.5.70' -ValidityPeriod ([System.Timespan]::FromDays(30)) -Permission Add,Create" $command = "Set-AzKeyVaultManagedStorageSasDefinition -VaultName $($keyVault) -AccountName $($managedStorageAccountName1) $($paramatersSubCommand)" Write-Host $command $createdManagedStorageSasDefinition1 = Invoke-Expression $command Assert-NotNull $createdManagedStorageSasDefinition1 $createdManagedStorageSasDefinition2 = Get-AzKeyVaultManagedStorageSasDefinition -VaultName $keyVault -AccountName $managedStorageAccountName1 -Name $managedStorageSasDefinitionName1 | Set-AzKeyVaultManagedStorageSasDefinition -Name $managedStorageSasDefinitionName2 Assert-NotNull $createdManagedStorageSasDefinition2 Assert-NotNull $managedStorageAccount1.AccountName Assert-NotNull $createdManagedStorageSasDefinition1.Name Assert-NotNull $managedStorageAccount2.AccountName Assert-NotNull $createdManagedStorageSasDefinition2.Name $secretName1 = "$($managedStorageAccount1.AccountName)-$($createdManagedStorageSasDefinition1.Name)" $secretName2 = "$($managedStorageAccount1.AccountName)-$($createdManagedStorageSasDefinition2.Name)" $secret1 = Get-AzKeyVaultSecret $keyVault $secretName1 $secret2 = Get-AzKeyVaultSecret $keyVault $secretName2 Assert-NotNull $secret1 Assert-NotNull $secret2 Assert-NotNull $secret1.SecretValueText Assert-NotNull $secret2.SecretValueText } function Test_SetAzureKeyVaultManagedStorageAccountAndSasDefinitionAttribute { $keyVault = Get-KeyVault $managedStorageAccountName1 = Get-ManagedStorageAccountName 'mngSt1' $managedStorageAccountName2 = Get-ManagedStorageAccountName 'mngSt2' $global:createdManagedStorageAccounts += $managedStorageAccountName1 $global:createdManagedStorageAccounts += $managedStorageAccountName2 $storageAccountResourceId = Get-KeyVaultManagedStorageResourceId $managedStorageAccount1 = Add-AzKeyVaultManagedStorageAccount -VaultName $keyVault -AccountName $managedStorageAccountName1 -AccountResourceId $storageAccountResourceId -ActiveKeyName 'key1' -DisableAutoRegenerateKey Assert-NotNull $managedStorageAccount1 $managedStorageAccount2 = Get-AzKeyVaultManagedStorageAccount -VaultName $keyVault -AccountName $managedStorageAccountName1 | Add-AzKeyVaultManagedStorageAccount -AccountName $managedStorageAccountName2 -Tag @{"tag1"="value1";"tag2"="value2"} -Disable Assert-NotNull $managedStorageAccount2 Assert-True { $managedStorageAccount1.Attributes.Enabled } Assert-False { $managedStorageAccount2.Attributes.Enabled } Assert-True { $managedStorageAccount2.Tags.ContainsKey("tag1") } $managedStorageSasDefinitionName1 = Get-ManagedStorageSasDefinitionName 'mngsas8' $paramatersSubCommand = "-Name $($managedStorageSasDefinitionName1) -Service Queue,Blob -ResourceType Container,Object -Protocol HttpsOnly -IPAddressOrRange '168.1.5.60-168.1.5.70' -ValidityPeriod ([System.Timespan]::FromDays(30)) -Permission Add,Create" $command = "Set-AzKeyVaultManagedStorageSasDefinition -VaultName $($keyVault) -AccountName $($managedStorageAccountName1) $($paramatersSubCommand) -Tag @{'tag3'='value3';'tag4'='value4'}" Write-Host $command $createdManagedStorageSasDefinition1 = Invoke-Expression $command Assert-NotNull $createdManagedStorageSasDefinition1 Assert-True { $createdManagedStorageSasDefinition1.Tags.ContainsKey("tag3") } } function Test_UpdateAzureKeyVaultManagedStorageAccount { $keyVault = Get-KeyVault $managedStorageAccountName = Get-ManagedStorageAccountName 'mngSt1' $global:createdManagedStorageAccounts += $managedStorageAccountName $storageAccountResourceId = Get-KeyVaultManagedStorageResourceId $managedStorageAccount = Add-AzKeyVaultManagedStorageAccount -VaultName $keyVault -AccountName $managedStorageAccountName -AccountResourceId $storageAccountResourceId -ActiveKeyName 'key1' -RegenerationPeriod ([System.Timespan]::FromDays(30)) Assert-NotNull $managedStorageAccount $managedStorageAccountUpdate = Update-AzKeyVaultManagedStorageAccount -VaultName $keyVault -AccountName $managedStorageAccountName -ActiveKeyName 'key2' -Tag @{"tag3"="value3"} -PassThru Assert-NotNull $managedStorageAccountUpdate Assert-True { $managedStorageAccountUpdate.ActiveKeyName.Equals("key2") } Assert-True { $managedStorageAccountUpdate.Tags.ContainsKey("tag3") } } function Test_RegenerateAzureKeyVaultManagedStorageAccountAndSasDefinition { $keyVault = Get-KeyVault $managedStorageAccountName = Get-ManagedStorageAccountName 'mngSt1' $global:createdManagedStorageAccounts += $managedStorageAccountName $storageAccountResourceId = Get-KeyVaultManagedStorageResourceId $managedStorageAccount = Add-AzKeyVaultManagedStorageAccount -VaultName $keyVault -AccountName $managedStorageAccountName -AccountResourceId $storageAccountResourceId -ActiveKeyName 'key1' -RegenerationPeriod ([System.Timespan]::FromDays(30)) Assert-NotNull $managedStorageAccount $managedStorageAccountUpdate = Update-AzKeyVaultManagedStorageAccountKey -VaultName $keyVault -AccountName $managedStorageAccountName -KeyName 'key2' -Force -Confirm:$false -PassThru Assert-NotNull $managedStorageAccountUpdate Assert-True { $managedStorageAccountUpdate.ActiveKeyName.Equals("key2") } } function Test_ListKeyVaultAzureKeyVaultManagedStorageAccounts { $keyVault = Get-KeyVault $managedStorageAccountName01 = Get-ManagedStorageAccountName 'listmngSt1' $storageAccountResourceId = Get-KeyVaultManagedStorageResourceId $createdmanagedStorageAccountName01 = Add-AzKeyVaultManagedStorageAccount -VaultName $keyVault -AccountName $managedStorageAccountName01 -AccountResourceId $storageAccountResourceId -ActiveKeyName 'key1' -RegenerationPeriod ([System.Timespan]::FromDays(30)) Assert-NotNull $createdmanagedStorageAccountName01 $managedStorageAccountName02 = Get-ManagedStorageAccountName 'listmngSt2' $createdmanagedStorageAccountName02 = Add-AzKeyVaultManagedStorageAccount -VaultName $keyVault -AccountName $managedStorageAccountName02 -AccountResourceId $storageAccountResourceId -ActiveKeyName 'key1' -RegenerationPeriod ([System.Timespan]::FromDays(30)) Assert-NotNull $createdmanagedStorageAccountName02 $managedStorageAccounts = Get-AzKeyVaultManagedStorageAccount $keyVault Assert-NotNull $managedStorageAccounts Assert-True { $managedStorageAccounts.Count -ge 2 } $item01 = $managedStorageAccounts | where { Equal-String $_.AccountName $managedStorageAccountName01 } | Select -First 1 Assert-NotNull $item01 $item02 = $managedStorageAccounts | where { Equal-String $_.AccountName $managedStorageAccountName02 } | Select -First 1 Assert-NotNull $item02 }
combined_dataset/train/non-malicious/482.ps1
482.ps1
function Remove-PPScriptShortcut{ [CmdletBinding()] param( [Parameter(Mandatory=$true)] [String] $Name ) $ShortcutToRemove = Get-PPScript -Name $Name -Shortcut if($ShortcutToRemove){ Get-ChildItem -Path $PSconfigs.Path -Filter $PSconfigs.ScriptShortcut.DataFile -Recurse | %{ Write-Host "Remove script shorcut: $($ShortcutToRemove.Name)" $Xml = [xml](get-content $_.Fullname) $RemoveNode = Select-Xml $xml -XPath "//Content/ScriptShortcut[@Name=`"$($ShortcutToRemove.Name)`"]" $null = $RemoveNode.Node.ParentNode.RemoveChild($RemoveNode.Node) $Xml.Save($_.Fullname) } } }
combined_dataset/train/non-malicious/3816.ps1
3816.ps1
function Test-ProximityPlacementGroup { param ($loc) $rgname = Get-ComputeTestResourceName try { [string]$loc = Get-ComputeVMLocation; $loc = $loc.Replace(' ', ''); New-AzResourceGroup -Name $rgname -Location $loc -Force; $ppgname = $rgname + 'ppg' New-AzProximityPlacementGroup -ResourceGroupName $rgname -Name $ppgname -Location $loc -ProximityPlacementGroupType "Standard" -Tag @{key1 = "val1"}; $ppg = Get-AzProximityPlacementGroup -ResourceGroupName $rgname -Name $ppgname; Assert-AreEqual $rgname $ppg.ResourceGroupName; Assert-AreEqual $ppgname $ppg.Name; Assert-AreEqual $loc $ppg.Location; Assert-AreEqual "Standard" $ppg.ProximityPlacementGroupType; Assert-True { $ppg.Tags.Keys.Contains("key1") }; Assert-AreEqual "val1" $ppg.Tags["key1"]; $ppgs = Get-AzProximityPlacementGroup -ResourceGroupName $rgname; Assert-AreEqual 1 $ppgs.Count; $ppgs = Get-AzProximityPlacementGroup; Assert-True { $ppgs.Count -ge 1 }; Remove-AzProximityPlacementGroup -ResourceGroupName $rgname -Name $ppgname -Force; $ppgs = Get-AzProximityPlacementGroup -ResourceGroupName $rgname; Assert-AreEqual 0 $ppgs.Count; } finally { Clean-ResourceGroup $rgname } } function Test-ProximityPlacementGroupAvSet { param ($loc) $rgname = Get-ComputeTestResourceName try { [string]$loc = Get-ComputeVMLocation; $loc = $loc.Replace(' ', ''); New-AzResourceGroup -Name $rgname -Location $loc -Force; $ppgname = $rgname + 'ppg' New-AzProximityPlacementGroup -ResourceGroupName $rgname -Name $ppgname -Location $loc -ProximityPlacementGroupType "Standard" -Tag @{key1 = "val1"}; $ppg = Get-AzProximityPlacementGroup -ResourceGroupName $rgname -Name $ppgname; Assert-AreEqual $rgname $ppg.ResourceGroupName; Assert-AreEqual $ppgname $ppg.Name; Assert-AreEqual $loc $ppg.Location; Assert-AreEqual "Standard" $ppg.ProximityPlacementGroupType; Assert-True { $ppg.Tags.Keys.Contains("key1") }; Assert-AreEqual "val1" $ppg.Tags["key1"]; $asetName = $rgname + 'as'; New-AzAvailabilitySet -ResourceGroupName $rgname -Name $asetName -Location $loc -ProximityPlacementGroupId $ppg.Id -Sku 'Classic'; $av = Get-AzAvailabilitySet -ResourceGroupName $rgname -Name $asetName; Assert-AreEqual $ppg.Id $av.ProximityPlacementGroup.Id; $ppg = Get-AzProximityPlacementGroup -ResourceGroupName $rgname -Name $ppgname; Assert-AreEqual $av.Id $ppg.AvailabilitySets[0].Id; Remove-AzAvailabilitySet -ResourceGroupName $rgname -Name $asetName -Force; $ppg = Get-AzProximityPlacementGroup -ResourceGroupName $rgname -Name $ppgname; Assert-Null $ppg.AvailabilitySets; Remove-AzProximityPlacementGroup -ResourceGroupName $rgname -Name $ppgname -Force; } finally { Clean-ResourceGroup $rgname } } function Test-ProximityPlacementGroupVM { param ($loc) $rgname = Get-ComputeTestResourceName try { [string]$loc = Get-ComputeVMLocation; $loc = $loc.Replace(' ', ''); New-AzResourceGroup -Name $rgname -Location $loc -Force; $ppgname = $rgname + 'ppg' New-AzProximityPlacementGroup -ResourceGroupName $rgname -Name $ppgname -Location $loc -ProximityPlacementGroupType "Standard" -Tag @{key1 = "val1"}; $ppg = Get-AzProximityPlacementGroup -ResourceGroupName $rgname -Name $ppgname; Assert-AreEqual $rgname $ppg.ResourceGroupName; Assert-AreEqual $ppgname $ppg.Name; Assert-AreEqual $loc $ppg.Location; Assert-AreEqual "Standard" $ppg.ProximityPlacementGroupType; Assert-True { $ppg.Tags.Keys.Contains("key1") }; Assert-AreEqual "val1" $ppg.Tags["key1"]; $subnet = New-AzVirtualNetworkSubnetConfig -Name ('subnet' + $rgname) -AddressPrefix 192.168.1.0/24; $vnet = New-AzVirtualNetwork -ResourceGroupName $rgname -Location $loc -Name ('vnet' + $rgname) -AddressPrefix 192.168.0.0/16 -Subnet $subnet; $pip = New-AzPublicIpAddress -ResourceGroupName $rgname -Location $loc -Name ('pubip' + $rgname) -AllocationMethod Static -IdleTimeoutInMinutes 4; $nsg = New-AzNetworkSecurityGroup -ResourceGroupName $rgname -Location $loc -Name ('netsg' + $rgname); $nic = New-AzNetworkInterface -Name ('nic' + $rgname) -ResourceGroupName $rgname -Location $loc ` -SubnetId $vnet.Subnets[0].Id -PublicIpAddressId $pip.Id -NetworkSecurityGroupId $nsg.Id; $vmname = 'vm' + $rgname; $user = "Foo12"; $password = $PLACEHOLDER; $securePassword = ConvertTo-SecureString $password -AsPlainText -Force; $cred = New-Object System.Management.Automation.PSCredential ($user, $securePassword); $p = New-AzVMConfig -VMName $vmName -VMSize Standard_A1 -ProximityPlacementGroupId $ppg.Id ` | Set-AzVMOperatingSystem -Windows -ComputerName $vmName -Credential $cred ` | Add-AzVMNetworkInterface -Id $nic.Id; $imgRef = Get-DefaultCRPImage -loc $loc; $p = ($imgRef | Set-AzVMSourceImage -VM $p); New-AzVM -ResourceGroupName $rgname -Location $loc -VM $p; $vm = Get-AzVM -ResourceGroupName $rgname -Name $vmName; Assert-AreEqual $ppg.Id $vm.ProximityPlacementGroup.Id; $ppg = Get-AzProximityPlacementGroup -ResourceGroupName $rgname -Name $ppgname; Assert-AreEqual $vm.Id $ppg.VirtualMachines[0].Id; Remove-AzVM -ResourceGroupName $rgname -Name $vmName -Force; $ppg = Get-AzProximityPlacementGroup -ResourceGroupName $rgname -Name $ppgname; Assert-Null $ppg.VirtualMachines; Remove-AzProximityPlacementGroup -ResourceGroupName $rgname -Name $ppgname -Force; } finally { Clean-ResourceGroup $rgname } }
combined_dataset/train/non-malicious/Import-Asup.ps1
Import-Asup.ps1
Function Import-ASUP { param( [string] $Path ) Begin { Function ConvertTo-Bool($bool) { switch ($bool) { "yes" {return $true} "true" {return $true} "enabled" {return $true} "no" {return $False} "false" {return $False} "disabled" {return $False} } } } Process { $asup = Get-Content $Path $Storage = New-Object PSObject -Property @{SysInfo=@{};HostAdapters=@{};Disks=@();Shelves=@();SES=@{}} $process = 0 $subprocess=0 $AggrHold = @{} Foreach ($line in $asup) { switch -regex ($line) { "=====" { $Process = 0 } "===== SYSCONFIG-A =====" { $process = 1 $subprocess = 0 } "===== ENVIRONMENT =====" { $process = 2 $subprocess = 0 } "===== SYSCONFIG-R =====" { $process = 3 $subprocess = 0 } "===== STORAGE =====" { $process = 4 $subprocess = 0 } } switch ($process) { 1 { switch -regex ($Line) { "\\s+System\\sID\\:\\s(?<SystemID>\\S+)\\s\\((?<SystemName>\\S+)\\)\\;\\spartner\\sID\\:\\s(?<PartnerID>\\S+)\\s\\((?<PartnerName>\\S+)\\)" { $Storage.SysInfo.Add("SystemID",$Matches.SystemID) $Storage.SysInfo.Add("SystemName",$Matches.SystemName) $Storage.SysInfo.Add("PartnerID",$Matches.PartnerID) $Storage.SysInfo.Add("PartnerName",$Matches.PartnerName) } "\\s+System\\sSerial\\sNumber\\:\\s(?<SN>\\S+)" { $Storage.SysInfo.Add("SerialNumber",$Matches.SN) } "\\s+System\\sRev\\:\\s(?<Rev>\\S+)" { $Storage.SysInfo.Add("Rev",$Matches.Rev) } "\\s+System\\sStorage\\sConfiguration\\:\\s(?<config>.+)" { $Storage.SysInfo.Add("StorageConfiguration",$Matches.config) } "System\\sACP\\sConnectivity\\:\\s(?<ACP>.+)" { $Storage.SysInfo.Add("ACP",$Matches.ACP) } "slot\\s0\\:\\sSystem\\sBoard\\s(?<board>.+)" { $subProcess=1 $Slot = New-Object PSObject -Property @{ "Board"=$Matches.board "ModelName"="" "PartNumber"="" "Revision"="" "SerialNumber"="" "BIOSversion"="" "LoaderVersion"="" "AgentFWversion"="" "Processors"="" "ProcessorID"="" "MicrocodeVersion"="" "MemorySize"="" "CMOSRAMStatus"="" "Controller"="" } } } switch ($subProcess) { 1 { switch -regex ($Line) { "\\s+Model\\sName\\:\\s+(?<Model>.+)" { $Slot.ModelName = $Matches.Model } "\\s+Part\\sNumber\\:\\s+(?<Part>.+)" { $Slot.PartNumber = $Matches.Part } "\\s+Revision\\:\\s+(?<REV>.+)" { $Slot.Revision = $Matches.REV } "\\s+Serial\\sNumber\\:\\s+(?<SN>.+)" { $Slot.SerialNumber = $Matches.SN } "\\s+BIOS\\sversion\\:\\s+(?<BIOS>.+)" { $Slot.BIOSversion = $Matches.BIOS } "\\s+Loader\\sversion\\:\\s+(?<LV>.+)" { $Slot.LoaderVersion = $Matches.LV } "\\s+Agent\\sFW\\sversion\\:\\s+(?<FW>.+)" { $Slot.AgentFWversion = $Matches.FW } "\\s+Processors\\:\\s+(?<proc>.+)" { $Slot.Processors = $Matches.proc } "\\s+Processor\\sID\\:\\s+(?<procID>.+)" { $Slot.ProcessorID = $matches.procId } "\\s+Microcode\\sVersion\\:\\s+(?<microcode>.+)" { $Slot.MicrocodeVersion = $Matches.microcode } "\\s+Memory\\sSize\\:\\s+(?<memory>.+)" { $Slot.MemorySize = $Matches.memory } "\\s+CMOS\\sRAM\\sStatus\\:\\s+(?<CMOS>.+)" { $Slot.CMOSRAMStatus = $Matches.CMOS } "\\s+Controller\\:\\s+(?<Controller>.+)" { $Slot.Controller = $Matches.Controller $Storage.SysInfo.Add("SystemBoard",$slot) $subprocess = 0 } } } } } 2 { switch -regex ($Line) { "^Channel\\:\\s+(?<Channel>\\d\\w)\\sShelf\\:\\s+(?<Shelf>\\d)\\sShelf\\sSerial\\sNumber:\\s+(?<ShelfSN>.+)" { $Shelf = New-Object PSObject -Property @{ "Channel"=$Matches.Channel "Shelf"=$Matches.Shelf "SerialNumber"=$Matches.ShelfSN "ShelfVendor"="" "ShelfModel"="" "ShelfRevisionLevel"="" "ModelName"="" "ModuleASerialNumber"="" "ModuleAFirmware"="" "ModuleBSerialNumber"="" "ModuleBFirmware"="" "LocalAcessID"="" } } "^Shelf\\sproduct\\sid\\:\\s(?<model>.+)" { $Shelf.ModelName = $Matches.model } "Module\\sA\\sSerial\\sNumber\\:\\s(?<SN>\\S+)\\s+Firmware\\srev\\:\\s(?<Rev>\\S+)" { $Shelf.ModuleASerialNumber = $Matches.SN $Shelf.ModuleAFirmware = $Matches.Rev } "Module\\sB\\sSerial\\sNumber\\:\\s(?<SN>\\S+)\\s+Firmware\\srev\\:\\s(?<Rev>\\S+)" { $Shelf.ModuleBSerialNumber = $Matches.SN $Shelf.ModuleBFirmware = $Matches.Rev if (!$Storage.SES.Contains($Shelf.Channel)) { $Storage.SES.Add($Shelf.Channel,@{}) } ($Storage.SES[$Shelf.Channel]).add($shelf.Shelf, $shelf) } "\\s+Channel\\:\\s+(?<channel>\\d\\w)" { $_channel = $matches.channel } "\\s+shelf\\:\\s+(?<channel>\\d)$" { $_Shelf = $matches.channel $subprocess = 1 } } switch ($subProcess) { 1 { switch -regex ($Line) { "local\\saccess\\:\\s(?<Port>\\d\\w\\.\\d{2,3})$" { $Storage.SES[$_channel][$_Shelf].LocalAcessID = $Matches.Port } "^\\s+Module\\stype\\:\\s(?<Module>\\S+)\\;" { $Storage.SES[$_channel][$_Shelf].ModelName = $Matches.Module } "SES\\sConfiguration" { $subProcess = 2 } } } 2 { switch -regex ($Line) { "\\s+vendor\\sidentification\\=(?<Vendor>.+)" { $Storage.SES[$_channel][$_Shelf].ShelfVendor=$Matches.Vendor } "\\s+product\\sidentification\\=(?<ShelfModel>.+)" { $Storage.SES[$_channel][$_Shelf].ShelfModel = $Matches.ShelfModel } "\\s+product\\srevision\\slevel\\=(?<ShelfRevisionLevel>.+)" { $Storage.SES[$_channel][$_Shelf].ShelfRevisionLevel = $Matches.ShelfRevisionLevel $subprocess = 0 } } } } } 3 { Switch -regex ($line) { "^Aggregate\\s(?<aggr>\\S+)\\s" { $subprocess =1 $aggr=$matches.aggr } "^Spare\\sdisks$|^Partner\\sdisks$" { $subprocess =1 $aggr=$null } } switch -regex ($line) { "^\\s{6}(?<R>\\S+)\\s+(?<D>\\S+)(\\s+\\S+){5}\\s+(?<T>\\S+)\\s+\\S+\\s+(?<UMB>\\d+)\\/(?<UB>\\d+)\\s+(?<PMB>\\d+)\\/(?<PB>\\d+)" { $aggrHold.Add($Matches.D, @{ Aggregate=$aggr RaidType=$Matches.R DiskType=$Matches.T UsedMB=$Matches.UMB UsedBlocks=$Matches.UB PhysicalMB=$Matches.PMB PhysicalBlocks=$Matches.PB }) } "^(?<R>\\S+)\\s+(?<D>\\S+)(\\s+\\S+){5}\\s+(?<T>\\S+)\\s+\\S+\\s+(?<UMB>\\d+)\\/(?<UB>\\d+)\\s+(?<PMB>\\d+)\\/(?<PB>\\d+)" { $aggrHold.Add($Matches.D, @{ Aggregate="" RaidType=$Matches.R DiskType=$Matches.T UsedMB=$Matches.UMB UsedBlocks=$Matches.UB PhysicalMB=$Matches.PMB PhysicalBlocks=$Matches.PB }) } } } 4 { switch -regex ($line) { "^Slot\\:\\s+(?<slot>\\d\\w)$" { $subprocess = 1 $Adapter = New-Object PSObject -Property @{ Name="" Description="" FirmwareRev="" FCNodeName="" FCPacketSize="" LinkDataRate="" SRAMParity=$false ExternalGBIC=$false State="" InUse=$false Redundant=$false } } "^Shelf\\sname\\:\\s+(?<Shelf>.+)" { $subprocess = 2 $shelf = New-Object PSObject -Property @{ Name="" Channel="" Module="" ShelfID=0 ShelfUID="" ShelfSN="" TermSwitch="" ShelfState="" ModuleState="" SerialNumber="" ShelfVendor="" ShelfModel="" ShelfRevisionLevel="" ModelName="" ModuleASerialNumber="" ModuleAFirmware="" ModuleBSerialNumber="" ModuleBFirmware="" LocalAcessID="" } } "^Disk\\:\\s+(?<Shelf>.+)" { $subprocess = 3 $disk = New-Object PSObject -Property @{ "Name"="" "shelf"=0 "Bay"=0 "RaidType"="" "Aggregate"="" "DiskType"="" "SN"="" "Vendor"="" "Model"="" "Firmware"="" "RPM"=0 "WWN"="" "UID"="" "DownRev"="" "PrimaryPort"="" "Secondaryname"="" "SecondaryPort"="" "PowerOnHours"=0 "UsedMB"="" "UsedBlocks"="" "PhysicalMB"="" "PhysicalBlocks"="" "BlocksRead"=[int64]0 "BlocksWritten"=[int64]0 "TimeInterval"="" "GlistCount"=0 "ScrubLastDone"="" "ScrubCount"=0 "LipCount"=0 "DynamicallyQualified"=$false "PowerCycleCount"=0 "PowerCycleError"=0 "CurrentOwner"="" "HomeOwner"="" "ReservationOwner"="" } } "SHARED\\sSTORAGE\\sHOSTNAME\\s+SYSTEM\\sID" { $subprocess = 4 } } switch ($subprocess) { 1 { switch -regex ($line) { "^Slot\\:\\s+(?<name>\\d\\w)$" { $Adapter.name = $matches.name break } "^Description\\:\\s+(?<Description>.+)" { $Adapter.Description = $matches.Description; break } "^Firmware\\sRev\\:\\s+(?<FirmwareRev>.+)" { $Adapter.FirmwareRev = $matches.FirmwareRev break } "^FC\\sNode\\sName\\:\\s+(?<FCNodeName>.+)" { $Adapter.FCNodeName = $matches.FCNodeName break } "^FC\\sPacket\\sSize\\:\\s+(?<FCPacketSize>.+)" { $Adapter.FCPacketSize = $matches.FCPacketSize break } "^Link\\sData\\sRate\\:\\s+(?<LinkDataRate>.+)" { $Adapter.LinkDataRate = $matches.LinkDataRate break } "^SRAM\\sParity\\:\\s+(?<SRAMParity>.+)" { $Adapter.SRAMParity = ConvertTo-Bool $matches.SRAMParity break } "^External\\sGBIC\\:\\s+(?<ExternalGBIC>.+)" { $Adapter.ExternalGBIC = ConvertTo-Bool $matches.ExternalGBIC break } "^State\\:\\s+(?<State>.+)" { $Adapter.State = $matches.State break } "^In\\sUse\\:\\s+(?<InUse>.+)" { $Adapter.InUse = ConvertTo-Bool $matches.InUse break } "^Redundant\\:\\s+(?<Redundant>.+)" { $Adapter.Redundant = ConvertTo-Bool $matches.Redundant break } Default { if ($Adapter) { $Storage.HostAdapters.Add($Adapter.Name,$Adapter) } } } } 2 { switch -regex ($line) { "^Shelf\\sname\\:\\s+(?<name>.+)" { $Shelf.Name = $matches.name break } "^Channel\\:\\s+(?<Channel>.+)" { $Shelf.Channel = $matches.Channel break } "^Module\\:\\s+(?<Module>.+)" { $Shelf.Module = $matches.Module break } "Shelf\\sid\\:\\s+(?<ShelfID>.+)" { $Shelf.ShelfID = $matches.ShelfID break } "Shelf\\sUID\\:\\s+(?<ShelfUID>.+)" { $shelf.ShelfUID = $Matches.ShelfUID break } "Shelf\\sS\\/N\\:\\s+(?<ShelfSN>.+)" { $shelf.ShelfSN = $Matches.ShelfSN break } "Term\\sswitch\\:\\s+(?<TermSwitch>.+)" { $Shelf.TermSwitch = $Matches.TermSwitch break } "Shelf\\sstate\\:\\s+(?<ShelfState>.+)" { $shelf.ShelfState = $Matches.ShelfState break } "Module\\sstate\\:\\s+(?<ModuleState>.+)" { $shelf.ModuleState = $matches.ModuleState $Storage.shelves += $shelf break } } } 3 { switch -regex ($line) { "^Disk\\:\\s+(?<Name>.+)" { $Disk.name = $matches.name break } "^Shelf\\:\\s+(?<shelf>.+)" { $Disk.shelf = $matches.shelf break } "^Bay\\:\\s+(?<Bay>.+)" { $Disk.Bay = $matches.Bay break } "^Serial\\:\\s+(?<SN>.+)" { $Disk.SN = $matches.SN break } "^Vendor\\:\\s+(?<Vendor>.+)" { $Disk.Vendor = $matches.Vendor break } "^Model\\:\\s+(?<Model>.+)" { $Disk.Model = $matches.Model break } "^Rev\\:\\s+(?<Firmware>.+)" { $Disk.Firmware = $matches.Firmware break } "^RPM\\:\\s+(?<RPM>.+)" { $Disk.RPM = $matches.RPM break } "^WWN\\:\\s+(?<WWN>.+)" { $Disk.WWN = $matches.WWN break } "^UID\\:\\s+(?<UID>.+)" { $Disk.UID = $matches.UID break } "^Downrev\\:\\s+(?<DownRev>.+)" { $Disk.DownRev = $matches.DownRev break } "^Pri\\sPort\\:\\s+(?<PrimaryPort>.+)" { $Disk.PrimaryPort = $matches.PrimaryPort break } "^Sec\\sName\\:\\s+(?<Secondaryname>.+)" { $Disk.Secondaryname = $matches.Secondaryname break } "^Sec Port\\:\\s+(?<SecondaryPort>.+)" { $Disk.SecondaryPort = $matches.SecondaryPort break } "^Power-on Hours\\:\\s+(?<PowerOnHours>.+)" { $Disk.PowerOnHours = $matches.PowerOnHours break } "^Blocks read\\:\\s+(?<BlocksRead>.+)" { $Disk.BlocksRead = $matches.BlocksRead break } "^Blocks written\\:\\s+(?<BlocksWritten>.+)" { $Disk.BlocksWritten = $matches.BlocksWritten break } "^Time interval\\:\\s+(?<TimeInterval>.+)" { $Disk.TimeInterval = $matches.TimeInterval break } "^Glist count\\:\\s+(?<GlistCount>.+)" { $Disk.GlistCount = $matches.GlistCount break } "^Scrub last done\\:\\s+(?<ScrubLastDone>.+)" { $Disk.ScrubLastDone = $matches.ScrubLastDone break } "^Scrub count\\:\\s+(?<ScrubCount>.+)" { $Disk.ScrubCount = $matches.ScrubCount break } "^LIP count\\:\\s+(?<LipCount>.+)" { $Disk.LipCount = $matches.LipCount break } "^Dynamically qualified\\:\\s+(?<DynamicallyQualified>.+)" { $Disk.DynamicallyQualified = $matches.DynamicallyQualified break } "^Power\\scycle\\scount\\:\\s+(?<PowerCycleCount>.+)" { $Disk.PowerCycleCount = $matches.PowerCycleCount break } "^Power\\scycle\\son\\serror\\:\\s+(?<PowerCycleError>.+)" { $Disk.PowerCycleError = $matches.PowerCycleError break } "^Current owner\\:\\s+(?<CurrentOwner>.+)" { $Disk.CurrentOwner = $matches.CurrentOwner break } "^Home owner\\:\\s+(?<HomeOwner>.+)" { $Disk.HomeOwner = $matches.HomeOwner break } "^Reservation owner\\:\\s+(?<ReservationOwner>.+)" { $Disk.ReservationOwner = $matches.ReservationOwner break } Default { if ($Disk) { #merge this data with what we scrapped from sysconfig-r $Disk.RaidType = $aggrHold[$Disk.Name].RaidType $Disk.Aggregate = $aggrHold[$Disk.Name].Aggregate $Disk.DiskType = $aggrHold[$Disk.Name].DiskType $Disk.UsedMB = $aggrHold[$Disk.Name].UsedMB $Disk.UsedBlocks = $aggrHold[$Disk.Name].UsedBlocks $Disk.PhysicalMB = $aggrHold[$Disk.Name].PhysicalMB $Disk.PhysicalBlocks = $aggrHold[$Disk.Name].PhysicalBlocks $Storage.Disks +=$Disk } } } } } } } } Write-output $Storage } }
combined_dataset/train/non-malicious/sample_47_15.ps1
sample_47_15.ps1
# # Module manifest for module 'OCI.PSModules.Osuborganizationsubscription' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Osuborganizationsubscription.dll' # Version number of this module. ModuleVersion = '83.1.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'e98d9d2f-0e34-4cf5-b62f-660dcfdc3e34' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Osuborganizationsubscription Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.1.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Osuborganizationsubscription.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIOsuborganizationsubscriptionOrganizationSubscriptionsList' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Osuborganizationsubscription' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/AnalizeScript.ps1
AnalizeScript.ps1
<# .SYNOPSIS Analyzes script and gives starting lines & columns of script components .DESCRIPTION AnalizeScript opens a dialog box for user selection; checks that input is a powershell script; parses and agrigates the script components into the following tokens: Unknown(s) Command(s) CommandParameter(s) CommandArgument(s) Variable(s) Member(s) LoopLabel(s) Attribute(s) Keyword(s) LineContinuation(s) .LINK None .NOTES Name: AnalizeScript.ps1 Author: Paul A. Drinnon Date Created: 03/24/2011 Date Revised: - (New Release) Version: 1.0 History: 1.0 This script can be altered to output other "Types" of tokenized content Below is a complete list Types ______________________________________ Name Example / Value Comment __________________ ___________ _____ Unknown 0 Command 1 CommandParameter 2 CommandArgument 3 Number 4 String 5 Variable -$! 6 Member 7 LoopLabel 8 Attribute 9 Type 10 Operator (-+*/=|...) 11 GroupStart ({ 12 GroupEnd )} 13 Keyword 14 Comment 15 StatementSeparator 16 NewLine 17 LineContinuation 18 Position 19 requires -Version 2.0 ** Licensed under a Creative Commons Attribution 3.0 License ** #> Add-Type -TypeDefinition @" using System; using System.Windows.Forms; public class WindowWrapper : IWin32Window { private IntPtr _hWnd; public WindowWrapper(IntPtr handle) { _hWnd = handle; } public IntPtr Handle { get { return _hWnd; } } } "@ -ReferencedAssemblies "System.Windows.Forms.dll" [System.Reflection.Assembly]::LoadWithPartialName("System.Windows.Forms") | Out-Null $handle = [System.Diagnostics.Process]::GetCurrentProcess().MainWindowHandle $owner = New-Object WindowWrapper -ArgumentList $handle function Select-File { param ( [String]$Title = "Enter a Windows PowerShell script", [String]$InitialDirectory = $home, [String]$Filter = "All Files(*.*)|*.*" ) $dialog = New-Object System.Windows.Forms.OpenFileDialog $dialog.Filter = $filter $dialog.InitialDirectory = $initialDirectory $dialog.ShowHelp = $true $dialog.Title = $title $result = $dialog.ShowDialog($owner) if ($result -eq "OK") { return $dialog.FileName } else { Write-Error "Operation cancelled by user." } } function TokenName-Count ($file, $str) { $content = gc $file $a = [System.Management.Automation.PsParser]::Tokenize($content, [ref] $null) | ? { $_.Type -eq $str } | Measure-Object | select Count $su = $str.ToUpper() + "S" "$su`t`t$a" } function CustomTable ($file, $str) { $content = gc $file [System.Management.Automation.PsParser]::Tokenize($content, [ref] $null) | ? { $_.Type -eq $str } | ft content, startline, startcolumn -auto } $selectPSfile = "" while (-!($selectPSfile -match ".ps1|.psm1|.psd1|.ps1xml")) { $selectPSfile = Select-File } $TokenNames = ` "Unknown", ` "Command", ` "CommandParameter", ` "CommandArgument", ` "Variable", ` "Member", ` "LoopLabel",` "Attribute",` "Keyword", ` "LineContinuation" $date = (Get-Date).ToShortDateString() "`n$selectPSfile`t`t`t`t$date`n" $TokenNames | foreach { [string]$s = $_ TokenName-Count $selectPSfile $s CustomTable $selectPSfile $s }
combined_dataset/train/non-malicious/Get-NestedGroups_2.ps1
Get-NestedGroups_2.ps1
<# .SYNOPSIS Enumerate all AD group memberships of an account (including nested membership). .DESCRIPTION This script will return all the AD groups an account is member of. .PARAMETER UserName The username whose group memberships to find. .EXAMPLE .\\Get-NestedGroups.ps1 'johndoe' Name DistinguishedName ---- ----------------- Domain Users CN=Domain Users,CN=Users,DC=contoso,DC=com Finance CN=Finance,OU=Department,OU=Groups,DC=contos... .NOTES ScriptName : Get-NestedGroups Created By : Gilbert van Griensven Date Coded : 06/17/2012 The script iterates through all nested groups and skips circular nested groups. .LINK #> Param ( [Parameter(Mandatory=$true)]$UserName ) Begin { Function LoadADModule { If (!(Get-Module ActiveDirectory)) { If (Get-Module -ListAvailable | ? {$_.Name -eq "ActiveDirectory"}) { Import-Module ActiveDirectory Return $True } Else { Return $False } } Else { Return $True } } Function GetNestedGroups ($strGroupDN) { $currentGroupmemberships = (Get-ADGroup $strGroupDN -Properties MemberOf | Select-Object MemberOf).MemberOf foreach ($groupDN in $currentGroupmemberships) { if (!(($Script:UserGroupMembership | Select-Object -ExpandProperty DistinguishedName) -contains $groupDN)) { $arrProps = @{ Name = (Get-ADGroup $groupDN).Name DistinguishedName = $groupDN } $Script:UserGroupMembership += (New-Object psobject -Property $arrProps) GetNestedGroups $groupDN } } } Function FindGroupMembership ($strUsername) { $Script:UserGroupMembership = @() $arrProps = @{ Name = "Domain Users" DistinguishedName = (Get-ADGroup "Domain Users").DistinguishedName } $Script:UserGroupMembership += (New-Object psobject -Property $arrProps) GetNestedGroups (Get-ADGroup "Domain Users").DistinguishedName $directMembershipGroups = (Get-ADUser $strUsername -Properties MemberOf | Select-Object MemberOf).MemberOf foreach ($groupDN in $directMembershipGroups) { $arrProps = @{ Name = (Get-ADGroup $groupDN).Name DistinguishedName = $groupDN } $Script:UserGroupMembership += (New-Object psobject -Property $arrProps) GetNestedGroups $groupDN } } } Process { If (!(LoadADModule)) { Write-Host "Could not load module ActiveDirectory!" Return } If ($UserName) { FindGroupMembership $UserName Return $Script:UserGroupMembership } } End { Remove-Module ActiveDirectory -ErrorAction SilentlyContinue }
combined_dataset/train/non-malicious/sample_0_68.ps1
sample_0_68.ps1
# <copyright> # INTEL CONFIDENTIAL # # Copyright 2021 Intel Corporation # # This software and the related documents are Intel copyrighted materials, and your use of # them is governed by the express license under which they were provided to you ("License"). # Unless the License provides otherwise, you may not use, modify, copy, publish, distribute, # disclose or transmit this software or the related documents without Intel's prior written # permission. # # This software and the related documents are provided as is, with no express or implied # warranties, other than those that are expressly stated in the License. # # <copyright> #.ExternalHelp IntelEthernetCmdlets.dll-Help.xml function Get-IntelEthernet { [CmdletBinding()] Param( [parameter(Mandatory = $false)] [SupportsWildcards()] [ValidateNotNullOrEmpty()] [String[]] $Name = '', [parameter(Mandatory = $false, Position = 0, ValueFromPipeline = $true)] [ValidateNotNullOrEmpty()] [object[]] $Adapter = $null ) Begin { $AdapterName = $Name $script:ErrorMessagesGet = @() $script:WarningMessagesGet = @() $FinalObject = @() GetIntelEthernetDevices @('icei*', 'i40ei*') if ($script:SupportedAdapters) { $script:MSNetAdapters = @(Get-NetAdapter -InterfaceDescription $script:SupportedAdapters.Name -ErrorAction SilentlyContinue) } GetIntelDriverInfo $script:MSNetHwInfo = @(Get-NetAdapterHardwareInfo -ErrorAction SilentlyContinue) $script:MSNetAdvProperty = @(Get-NetAdapterAdvancedProperty -ErrorAction SilentlyContinue) } Process { $Adapters = $Adapter $PreProcessedAdapterNames = ValidateGetAdapterNameParams $AdapterName $Adapters ([ref]$script:ErrorMessagesGet) $AdapterNamesArray = @(GetSupportedAdapters $PreProcessedAdapterNames ([ref]$script:WarningMessagesGet)) foreach ($a in $AdapterNamesArray) { $TmpStatusMsg = CheckDeviceError $a if (-not [string]::IsNullOrEmpty($TmpStatusMsg)) { $script:WarningMessagesGet += $TmpStatusMsg } $SupportedSpeeds = GetAdapterSupportedSpeeds $a $AdapterStatuses = GetAdapterStatus $a $BusTypes = GetAdapterBusType $a $Capabilities = GetAdapterCapabilities $a $SupportedSpeeds $ConnectionNames = GetAdapterConnectionName $a $DDPPackageNameAndVersions = GetAdapterDDPPackageNameAndVersion $a $DDPPackageTrackIds = GetAdapterDDPPackageTrackId $a $DeviceStatuses = GetAdapterDeviceStatus $a $SupportedSpeeds $DriverVersion = GetDriverVersion $a $EEEStatuses = GetAdapterEEEStatus $a $ETrackIDs = GetAdapterETrackId $a $FullDuplex = GetFullDuplex $a $LinkSpeedDuplex = GetLinkSpeedDuplex $a $MaxSpeeds = GetAdapterMaxSpeed $a $SupportedSpeeds $MediaTypes = GetAdapterMediaType $a $MiniPortNames = GetAdapterMiniPortName $a $NVMVersions = GetAdapterNVMVersion $a $NegotiatedLinkSpeed = GetAdapterNegotiatedLinkSpeed $a $NegotiatedLinkWidth = GetAdapterNegotiatedLinkWidth $a $NetlistVersions = GetAdapterNetlistVersion $a $OemFwVersions = GetOemFwVersion $a $OriginalDisplayNames = GetOriginalDisplayName $a $PCIDeviceIDs = GetAdapterPCIDeviceID $a $PartNumbers = GetAdapterPartNumber $a $PciLocations = GetAdapterPCILocation $a $AdapterPort = GetAdapterPort $a $SanMacAddresses = GetAdapterSanMacAddress $a # Assemble it all together in PSCustomObject $FinalObject += [PsCustomObject] @{ PSTypeName = 'IntelEthernetAdapter' AdapterStatus = $AdapterStatuses BusType = $BusTypes.BusType BusTypeString = $BusTypes.BusTypeString Capabilities = $Capabilities ConnectionName = $ConnectionNames DDPPackageName = $DDPPackageNameAndVersions.Name DDPPackageTrackId = $DDPPackageTrackIds DDPPackageVersion = $DDPPackageNameAndVersions.Version DeviceStatus = $DeviceStatuses.DeviceStatus DeviceStatusString = $DeviceStatuses.DeviceStatusString DriverVersion = $DriverVersion EEE = $EEEStatuses.EEEStatus EEEString = $EEEStatuses.EEEStatusString ETrackID = $ETrackIDs FWVersion = $OemFwVersions FullDuplex = $FullDuplex Location = $PciLocations MaxSpeed = $MaxSpeeds MediaType = $MediaTypes.MediaType MediaTypeString = $MediaTypes.MediaTypeString MiniPortInstance = $MiniPortNames.Instance MiniPortName = $MiniPortNames.Name NVMVersion = $NVMVersions Name = $a NegotiatedLinkSpeed = $NegotiatedLinkSpeed.NegotiatedLinkSpeed NegotiatedLinkSpeedString = $NegotiatedLinkSpeed.NegotiatedLinkSpeedString NegotiatedLinkWidth = $NegotiatedLinkWidth.NegotiatedLinkWidth NegotiatedLinkWidthString = $NegotiatedLinkWidth.NegotiatedLinkWidthString NetlistVersion = $NetlistVersions OriginalDisplayName = $OriginalDisplayNames PCIDeviceID = $PCIDeviceIDs PartNumber = $PartNumbers PortNumber = $AdapterPort.Port PortNumberString = $AdapterPort.PortString SANMacAddress = $SanMacAddresses Speed = $LinkSpeedDuplex.Speed SpeedString = $LinkSpeedDuplex.SpeedString } } } End { $FinalObject | Sort-Object -Property Location foreach ($WarningMessage in $script:WarningMessagesGet) { Write-Warning $WarningMessage } foreach ($ErrorMessage in $script:ErrorMessagesGet) { Write-Error $ErrorMessage } } } function GetAdapterBusType($AdapterName) { $BusType = 0 $BusTypeString = $Messages.Unknown foreach ($Bus in $script:BusTypesArray) { if (($null -ne $Bus) -and ($Bus.InstanceName -eq $AdapterName)) { $BusType = [int]$Bus.BusType $BusTypeString = $BusTypeMap[[int]$Bus.BusType] break } } return [PsCustomObject] @{ BusType = $BusType BusTypeString = $BusTypeString } } function GetAdapterConnectionName($AdapterName) { return ($script:MSNetAdapters.Where({$_.InterfaceDescription -eq $AdapterName})).InterfaceAlias } function GetAdapterDDPPackageNameAndVersion($AdapterName) { $Name = $Messages.NotSupported $Version = $Messages.NotSupported foreach ($DDPPkgName in $script:DDPPkgNamesArray) { if (($null -ne $DDPPkgName) -and ($DDPPkgName.InstanceName -eq $AdapterName)) { if ($DDPPkgName.Name -and ($null -ne $DDPPkgName.Major) -and ($null -ne $DDPPkgName.Minor)) { $Name = [System.Text.Encoding]::ASCII.GetString($DDPPkgName.Name).Trim(0) $Version = $DDPPkgName.Major.ToString() + "." + $DDPPkgName.Minor.ToString() } break } } return [PsCustomObject] @{ Name = $Name Version = $Version } } function GetAdapterDDPPackageTrackId($AdapterName) { $TrackId = $Messages.NotSupported $Params = @{Version = [uint32]1; Size = [uint32]12; Type = [uint32]1;} $Result = InvokeCimMethod "IntlLan_GetTrackId" $AdapterName "WmiGetTrackId" $Params if (($null -ne $Result) -and ($Result.ReturnValue -eq $true) -and ($Result.Track_Id)) { $TrackId = '0x{0:X}' -f $Result.Track_Id } return $TrackId } function GetAdapterDeviceStatus($AdapterName, $SupportedSpeeds) { $DeviceStatus = 0 $DeviceStatusString = $Messages.Unknown $AdapterNames = $script:MSNetAdapters.Where({$_.InterfaceDescription -eq $AdapterName}) foreach($TmpAdapter in $AdapterNames) { if ("Up" -eq $TmpAdapter.Status) { $MaxSpeed = GetAdapterMaxSpeed $AdapterName $SupportedSpeeds $CurrentSpeed = (GetLinkSpeedDuplex $AdapterName).Speed if ($CurrentSpeed -lt $MaxSpeed) { $DeviceStatus = 4 $DeviceStatusString = $Messages.LinkUpNotMax } else { $DeviceStatus = 1 $DeviceStatusString = $Messages.LinkUp } } elseif ("Disconnected" -eq $TmpAdapter.Status) { $DeviceStatus = 2 $DeviceStatusString = $Messages.LinkDown } elseif ("Disabled" -eq $TmpAdapter.Status) { $DeviceStatus = 0 $DeviceStatusString = $Messages.Disabled } } return [PsCustomObject] @{ DeviceStatus = $DeviceStatus DeviceStatusString = $DeviceStatusString} } function GetAdapterETrackId($AdapterName) { $strETrackId = $Messages.NotSupported foreach ($ETrackId in $script:ETrackIdsArray) { if (($null -ne $ETrackId) -and ($ETrackId.InstanceName -eq $AdapterName)) { if ($ETrackId.Id) { $strETrackId = '0x{0:X}' -f $ETrackId.Id } break } } return $strETrackId } function GetAdapterNVMVersion($AdapterName) { $Version = $Messages.NotSupported foreach ($NVMVersion in $script:NVMVersionsArray) { if (($null -ne $NVMVersion) -and ($NVMVersion.InstanceName -eq $AdapterName)) { if ($NVMVersion.Version) { $Version = (($NVMVersion.Version -band 0xffff) -shr 8).ToString() + "." + (($NVMVersion.Version -band 0xff)).ToString("X2") } break } } return $Version } function GetAdapterNetlistVersion($AdapterName) { $NetlistVersion = $Messages.NotSupported $Params = @{Version = [uint32]1; Size = [uint32]12; Type = [uint32]1;} $Result = InvokeCimMethod "IntlLan_GetNVMNetlistInfo" $AdapterName "WmiGetNVMNetlistInfo" $params if (($null -ne $Result) -and ($Result.ReturnValue -eq $true) -and ($Result.VersionStr)) { $NetlistVersion = [System.Text.Encoding]::ASCII.GetString($Result.VersionStr).Trim(0) } return $NetlistVersion } function GetAdapterPartNumber($AdapterName) { $PartNumberString = $Messages.NotSupported foreach ($PartNumber in $script:PartNumbersArray) { if (($null -ne $PartNumber) -and ($PartNumber.InstanceName -eq $AdapterName)) { if ($PartNumber.PartNumberString) { $PartNumberString = [System.Text.Encoding]::ASCII.GetString($PartNumber.PartNumberString).Trim(0) } break } } return $PartNumberString } function GetAdapterSanMacAddress($AdapterName) { $MacAddress = $Messages.NotSupported foreach ($SanMacAddress in $script:SanMacAddressesArray) { if (($null -ne $SanMacAddress) -and ($SanMacAddress.InstanceName -eq $AdapterName)) { if ($SanMacAddress.SanMacAddr) { $MacAddress = "" for ($i = 0; $i -lt 6; $i++) { # convert to string hex representation; X - hex, 2 - add leading zeroes if needed $MacAddress += $SanMacAddress.SanMacAddr[$i].ToString("X2") } } break } } return $MacAddress } function GetAdapterMediaType($AdapterName) { $MediaType = [PsCustomObject] @{ MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_UNKNOWN MediaTypeString = $Messages.Unknown } $Service = ($script:SupportedAdapters.Where({$_.Name -eq $AdapterName})).Service switch ($Service) { {$_ -in @('icea', 'iceb', 'scea', 'sceb')} { $MediaType = GetAdapterMediaTypeIce $AdapterName; break } {$_ -in @('i40ea', 'i40eb')} { $MediaType = GetAdapterMediaTypeI40e $AdapterName; break } } return $MediaType } function GetAdapterMediaTypeIce($AdapterName) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Unknown $MediaTypeString = $Messages.Unknown foreach ($PhyInfo in $script:PhyInfoArray) { if (($null -ne $PhyInfo) -and ($PhyInfo.InstanceName -eq $AdapterName) -and ($PhyInfo.PhyInfo.Length -ge 8)) { # Interpreting PhyInfo array values: # 0 == PHY type # 1 == link info <-- Bit 0 (value of 1 means has link) # 2 == an_info # 3 == ext_info # 4 == module type [0] # 5 == module type [1] # 6 == module type [2] # 7 == media interface <-- 1=Backplane, 2=QSFP, 3=SFP $PhyType = $PhyInfo.PhyInfo[0]; $LinkInfo = $PhyInfo.PhyInfo[1]; $MediaInterface = $PhyInfo.PhyInfo[7]; if ($LinkInfo -band 0x01) { switch ($PhyType) { {$_ -in [int][CVL_PHY_TYPE]::CVL10GSFIAOC_ACC, [int][CVL_PHY_TYPE]::CVL25GAUIAOC_ACC, [int][CVL_PHY_TYPE]::CVL40GXLAUIAOC_ACC, [int][CVL_PHY_TYPE]::CVL50GLAUI2AOC_ACC, [int][CVL_PHY_TYPE]::CVL50GAUI2AOC_ACC, [int][CVL_PHY_TYPE]::CVL50GAUI1AOC_ACC, [int][CVL_PHY_TYPE]::CVL100GCAUI4AOC_ACC, [int][CVL_PHY_TYPE]::CVL100GAUI4AOC_ACC, [int][CVL_PHY_TYPE]::CVL100GAUI2AOC_ACC} { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_AOC_ACC $MediaTypeString = $Messages.AOCACC break } {$_ -in [int][CVL_PHY_TYPE]::CVL5GBaseKR, [int][CVL_PHY_TYPE]::CVL10GBaseKR, [int][CVL_PHY_TYPE]::CVL25GBaseKR} { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Backplane_KR $MediaTypeString = $Messages.BackplaneKR break } ([int][CVL_PHY_TYPE]::CVL25GBaseKR1) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Backplane_KR1 $MediaTypeString = $Messages.BackplaneKR1 break } ([int][CVL_PHY_TYPE]::CVL50GBaseKR2) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Backplane_KR2 $MediaTypeString = $Messages.BackplaneKR2 break } ([int][CVL_PHY_TYPE]::CVL100GBaseKR2PAM4) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Backplane_KR2_PAM4 $MediaTypeString = $Messages.BackplaneKR2PAM4 break } {$_ -in [int][CVL_PHY_TYPE]::CVL40GBaseKR4, [int][CVL_PHY_TYPE]::CVL100GBaseKR4} { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Backplane_KR4 $MediaTypeString = $Messages.BackplaneKR4 break } ([int][CVL_PHY_TYPE]::CVL100GBaseKR4PAM4) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Backplane_KR4_PAM4 $MediaTypeString = $Messages.BackplaneKR4PAM4 break } ([int][CVL_PHY_TYPE]::CVL50GBaseKRPAM4) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Backplane_KR_PAM4 $MediaTypeString = $Messages.BackplaneKRPAM4 break } ([int][CVL_PHY_TYPE]::CVL25GBaseKRS) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Backplane_KR_S $MediaTypeString = $Messages.BackplaneKRS break } {$_ -in [int][CVL_PHY_TYPE]::CVL1000BaseKX, [int][CVL_PHY_TYPE]::CVL2Point5GBaseKX} { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Backplane_KX $MediaTypeString = $Messages.BackplaneKX break } {$_ -in [int][CVL_PHY_TYPE]::CVL10GSFIC2C, [int][CVL_PHY_TYPE]::CVL25GAUIC2C, [int][CVL_PHY_TYPE]::CVL40GXLAUI, [int][CVL_PHY_TYPE]::CVL50GLAUI2, [int][CVL_PHY_TYPE]::CVL50GAUI2, [int][CVL_PHY_TYPE]::CVL50GAUI1, [int][CVL_PHY_TYPE]::CVL100GCAUI4, [int][CVL_PHY_TYPE]::CVL100GAUI4, [int][CVL_PHY_TYPE]::CVL100GAUI2} { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Chip_to_Chip $MediaTypeString = $Messages.ChiptoChip break } {$_ -in [int][CVL_PHY_TYPE]::CVL1000BaseT, [int][CVL_PHY_TYPE]::CVL2Point5GBaseT, [int][CVL_PHY_TYPE]::CVL5GBaseT, [int][CVL_PHY_TYPE]::CVL10GBaseT, [int][CVL_PHY_TYPE]::CVL25GBaseT} { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Copper_T $MediaTypeString = $Messages.CopperT break } ([int][CVL_PHY_TYPE]::CVL100BaseTX) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Copper_TX $MediaTypeString = $Messages.CopperTX break } ([int][CVL_PHY_TYPE]::CVL10GSFIDA) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Direct_Attach $MediaTypeString = $Messages.DirectAttach break } ([int][CVL_PHY_TYPE]::CVL100GBaseCP2) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Direct_Attach_CP2 $MediaTypeString = $Messages.DirectAttachCP2 break } ([int][CVL_PHY_TYPE]::CVL25GBaseCR) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Direct_Attach_CR $MediaTypeString = $Messages.DirectAttachCR break } ([int][CVL_PHY_TYPE]::CVL25GBaseCR1) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Direct_Attach_CR1 $MediaTypeString = $Messages.DirectAttachCR1 break } ([int][CVL_PHY_TYPE]::CVL50GBaseCR2) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Direct_Attach_CR2 $MediaTypeString = $Messages.DirectAttachCR2 break } {$_ -in [int][CVL_PHY_TYPE]::CVL40GBaseCR4, [int][CVL_PHY_TYPE]::CVL100GBaseCR4} { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Direct_Attach_CR4 $MediaTypeString = $Messages.DirectAttachCR4 break } ([int][CVL_PHY_TYPE]::CVL50GBaseCRPAM4) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Direct_Attach_CR_PAM4 $MediaTypeString = $Messages.DirectAttachCRPAM4 break } ([int][CVL_PHY_TYPE]::CVL25GBaseCRS) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Direct_Attach_CR_S $MediaTypeString = $Messages.DirectAttachCRS break } ([int][CVL_PHY_TYPE]::CVL100GBaseDR) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Fiber_DR $MediaTypeString = $Messages.FiberDR break } ([int][CVL_PHY_TYPE]::CVL50GBaseFR) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Fiber_FR $MediaTypeString = $Messages.FiberFR break } {$_ -in [int][CVL_PHY_TYPE]::CVL10GBaseLR, [int][CVL_PHY_TYPE]::CVL25GBaseLR, [int][CVL_PHY_TYPE]::CVL50GBaseLR} { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Fiber_LR $MediaTypeString = $Messages.FiberLR break } {$_ -in [int][CVL_PHY_TYPE]::CVL40GBaseLR4, [int][CVL_PHY_TYPE]::CVL100GBaseLR4} { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Fiber_LR4 $MediaTypeString = $Messages.FiberLR4 break } ([int][CVL_PHY_TYPE]::CVL1000BaseLX) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Fiber_LX $MediaTypeString = $Messages.FiberLX break } {$_ -in [int][CVL_PHY_TYPE]::CVL10GBaseSR, [int][CVL_PHY_TYPE]::CVL25GBaseSR, [int][CVL_PHY_TYPE]::CVL50GBaseSR} { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Fiber_SR $MediaTypeString = $Messages.FiberSR break } ([int][CVL_PHY_TYPE]::CVL100GBaseSR2) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Fiber_SR2 $MediaTypeString = $Messages.FiberSR2 break } {$_ -in [int][CVL_PHY_TYPE]::CVL40GBaseSR4, [int][CVL_PHY_TYPE]::CVL100GBaseSR4} { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Fiber_SR4 $MediaTypeString = $Messages.FiberSR4 break } ([int][CVL_PHY_TYPE]::CVL1000BaseSX) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Fiber_SX $MediaTypeString = $Messages.FiberSX break } ([int][CVL_PHY_TYPE]::CVL2Point5gBaseX) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Fiber_X $MediaTypeString = $Messages.FiberX break } {$_ -in [int][CVL_PHY_TYPE]::CVL100MSGMII, [int][CVL_PHY_TYPE]::CVL1GSGMII} { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_SGMII $MediaTypeString = $Messages.SGMII break } default { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Unknown $MediaTypeString = $Messages.Unknown break } } } else { switch ($MediaInterface) { ([int][CPK_PHY_INFO]::CPK_PHYINFO_MEDIA_BACKPLANE) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_INTERFACE_CVL_BACKPLANE $MediaTypeString = $Messages.Backplane break } ([int][CPK_PHY_INFO]::CPK_PHYINFO_MEDIA_QSFP) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_INTERFACE_CVL_QSFP $MediaTypeString = $Messages.QSFP break } ([int][CPK_PHY_INFO]::CPK_PHYINFO_MEDIA_SFP) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_INTERFACE_CVL_SFP $MediaTypeString = $Messages.SFP break } ([int][CPK_PHY_INFO]::CPK_PHYINFO_MEDIA_BASE_T) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_INTERFACE_CVL_BASE_T $MediaTypeString = $Messages.CopperT break } ([int][CPK_PHY_INFO]::CPK_PHYINFO_MEDIA_SGMII) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_INTERFACE_CVL_SGMII $MediaTypeString = $Messages.SGMII break } ([int][CPK_PHY_INFO]::CPK_PHYINFO_MEDIA_FIBER) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_INTERFACE_CVL_FIBER $MediaTypeString = $Messages.Fiber break } default { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_CVL_Unknown $MediaTypeString = $Messages.Unknown break } } } } } return [PsCustomObject] @{ MediaType = $MediaType MediaTypeString = $MediaTypeString } } function GetAdapterMediaTypeI40e($AdapterName) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_UNKNOWN $MediaTypeString = $Messages.Unknown foreach ($PhyInfo in $script:PhyInfoArray) { if (($null -ne $PhyInfo) -and ($PhyInfo.InstanceName -eq $AdapterName) -and ($PhyInfo.PhyInfo.Length -ge 13)) { $PhyType = $PhyInfo.PhyInfo[0]; $LinkType = ([uint32]$PhyInfo.PhyInfo[11] -shl 24) + ([uint32]$PhyInfo.PhyInfo[10] -shl 16) + ([uint32]$PhyInfo.PhyInfo[9] -shl 8) + [uint32]$PhyInfo.PhyInfo[8]; $LinkTypeExt = $PhyInfo.PhyInfo[12]; if ($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_EMPTY) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_UNKNOWN } elseif (($LinkType -band [int][LinkType]::LINK_TYPE_40GBASE_KR4) -or ($LinkType -band [int][LinkType]::LINK_TYPE_10GBASE_KR) -or ($LinkTypeExt -band [int][LinkTypeExt]::LINK_TYPE_25GBase_KR)) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_BACKPLANE $MediaTypeString = $Messages.Backplane } elseif (($LinkType -band [int][LinkType]::LINK_TYPE_10GBASE_SFP_Cu) -or ($LinkType -band [int][LinkType]::LINK_TYPE_10GBASE_CR1)) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_SFPDIRECTATTACH $MediaTypeString = $Messages.SFPDirectAttach } elseif (($LinkType -band [int][LinkType]::LINK_TYPE_40GBASE_LR4) -or ($LinkType -band [int][LinkType]::LINK_TYPE_10GBASE_LR) -or ($LinkTypeExt -band [int][LinkTypeExt]::LINK_TYPE_25GBase_LR)) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_LR_FIBER $MediaTypeString = $Messages.LRFiber } elseif (($LinkType -band [int][LinkType]::LINK_TYPE_10GBASE_SR) -or ($LinkType -band [int][LinkType]::LINK_TYPE_40GBASE_SR4) -or ($LinkTypeExt -band [int][LinkTypeExt]::LINK_TYPE_25GBase_SR)) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_SR_FIBER $MediaTypeString = $Messages.SRFiber } elseif (($LinkType -band [int][LinkType]::LINK_TYPE_10GBASE_T) -or ($LinkType -band [int][LinkType]::LINK_TYPE_1000BASE_T) -or ($LinkType -band [int][LinkType]::LINK_TYPE_100BASE_TX) -or ($LinkTypeExt -band [int][LinkTypeExt]::LINK_TYPE_2_5GBASE_T) -or ($LinkTypeExt -band [int][LinkTypeExt]::LINK_TYPE_5GBASE_T)) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_COPPER $MediaTypeString = $Messages.Copper } elseif (($LinkType -band [int][LinkType]::LINK_TYPE_10GBASE_CR1_CU) -or ($LinkType -band [int][LinkType]::LINK_TYPE_40GBASE_CR4_CU) -or ($LinkType -band [int][LinkType]::LINK_TYPE_40GBASE_CR4)) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_QSFPDIRECTATTACH $MediaTypeString = $Messages.QSFPDirectAttach } elseif (($LinkType -band [int][LinkType]::LINK_TYPE_10GBASE_KX4) -or ($LinkType -band [int][LinkType]::LINK_TYPE_1000BASE_KX)) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_KX4BACKPLANE $MediaTypeString = $Messages.KXBackplane } elseif (($LinkType -band [int][LinkType]::LINK_TYPE_XAUI) -or ($LinkType -band [int][LinkType]::LINK_TYPE_XLAUI)) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_XAUI $MediaTypeString = $Messages.XAUI } elseif (($LinkTypeExt -band [int][LinkTypeExt]::LINK_TYPE_25G_AOC) -or ($LinkTypeExt -band [int][LinkTypeExt]::LINK_TYPE_25G_ACC) -or ($LinkTypeExt -band [int][LinkTypeExt]::LINK_TYPE_25GBase_CR)) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_SFP28DIRECTATTACH $MediaTypeString = $Messages.SFP28DirectAttach } # old FW or HW different than XL710 elseif ($LinkTypeExt -eq 0 -and $LinkType -eq 0) { if (($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_40GBASE_KR4) -or ($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_10GBASE_KR) -or ($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_25GBASE_KR)) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_BACKPLANE $MediaTypeString = $Messages.Backplane } elseif (($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_10GBASE_SFPP_CU) -or ($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_10GBASE_CR1)) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_SFPDIRECTATTACH $MediaTypeString = $Messages.SFPDirectAttach } elseif (($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_40GBASE_LR4) -or ($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_10GBASE_LR) -or ($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_25GBASE_LR)) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_LR_FIBER $MediaTypeString = $Messages.LRFiber } elseif (($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_10GBASE_SR) -or ($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_40GBASE_SR4) -or ($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_25GBASE_SR)) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_SR_FIBER $MediaTypeString = $Messages.SRFiber } elseif (($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_10GBASE_T) -or ($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_1000BASE_T) -or ($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_100BASE_TX)) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_COPPER $MediaTypeString = $Messages.Copper } elseif (($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_10GBASE_CR1_CU) -or ($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_40GBASE_CR4_CU) -or ($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_40GBASE_CR4)) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_QSFPDIRECTATTACH $MediaTypeString = $Messages.QSFPDirectAttach } elseif (($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_10GBASE_KX4) -or ($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_1000BASE_KX)) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_KX4BACKPLANE $MediaTypeString = $Messages.KXBackplane } elseif (($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_XAUI) -or ($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_XLAUI)) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_XAUI $MediaTypeString = $Messages.XAUI } elseif (($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_25GBASE_AOC) -or ($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_25GBASE_ACC) -or ($PhyType -eq [int][I40E_PHY_TYPE]::I40E_PHY_TYPE_25GBASE_CR)) { $MediaType = [int][NCS_ADAPTER_MEDIA_TYPE]::NCS_MEDIA_SFP28DIRECTATTACH $MediaTypeString = $Messages.SFP28DirectAttach } } } } return [PsCustomObject] @{ MediaType = $MediaType MediaTypeString = $MediaTypeString } } function GetAdapterPCILocation($AdapterName) { $PCILocation = $Messages.NotSupported foreach ($HwInfo in $script:MSNetHwInfo) { if ($AdapterName -eq $HwInfo.ifDesc) { $PCILocation = $HwInfo.Bus.ToString() + ":" + $HwInfo.Device.ToString() + ":" + $HwInfo.Function.ToString() + ":" + $HwInfo.Segment.ToString() break } } return $PCILocation } function GetOriginalDisplayName($AdapterName) { return ($script:MSNetHwInfo.Where({$_.ifDesc -eq $AdapterName})).ifDesc } function GetOemFwVersion($AdapterName) { $Version = $Messages.NotSupported foreach ($FwVersion in $script:FwVersionsArray) { if ($FwVersion.InstanceName -eq $AdapterName) { # driver can return an array of zeroes - don't attempt to construct a string using it if (($null -ne $FwVersion.SingleNvmVersion) -and $FwVersion.SingleNvmVersion[0] -ne 0) { $Version = [System.Text.Encoding]::ASCII.GetString($FwVersion.SingleNvmVersion).Trim(0) } break } } return $Version } function GetAdapterPCIDeviceID($AdapterName) { return ($script:MSNetAdapters.Where({$_.InterfaceDescription -eq $AdapterName})).PnPDeviceID } function GetAdapterNegotiatedLinkWidth($AdapterName) { $NegotiatedLinkWidth = 0 $NegotiatedLinkWidthString = $Messages.NotAvailable $AdapterHWInfo = $script:MSNetHwInfo.Where({$_.ifDesc -eq $AdapterName}) if ($AdapterHWInfo) { $NegotiatedLinkWidth = $AdapterHWInfo.PciExpressCurrentLinkWidth $NegotiatedLinkWidthString = "x" + $NegotiatedLinkWidth.ToString() } return [PsCustomObject] @{ NegotiatedLinkWidth = $NegotiatedLinkWidth NegotiatedLinkWidthString = $NegotiatedLinkWidthString } } function GetAdapterNegotiatedLinkSpeed($AdapterName) { $NegotiatedLinkSpeed = ($script:MSNetHwInfo.Where({$_.ifDesc -eq $AdapterName})).PciExpressCurrentLinkSpeedEncoded switch ($NegotiatedLinkSpeed) { 0 {$NegotiatedLinkSpeedString = $Messages.Unknown; break} 1 {$NegotiatedLinkSpeedString = $Messages.NegLaneSpeed25; break} 2 {$NegotiatedLinkSpeedString = $Messages.NegLaneSpeed50; break} 3 {$NegotiatedLinkSpeedString = $Messages.NegLaneSpeed80; break} default {$NegotiatedLinkSpeedString = $Messages.Unknown; break} } return [PsCustomObject] @{ NegotiatedLinkSpeed = $NegotiatedLinkSpeed NegotiatedLinkSpeedString = $NegotiatedLinkSpeedString } } function GetLinkSpeedDuplex($AdapterName) { $AdapterObj = $script:MSNetAdapters.Where({$_.InterfaceDescription -eq $AdapterName}) $Speed = $AdapterObj.Speed $SpeedString = $AdapterObj.LinkSpeed $FullDuplex = $AdapterObj.FullDuplex if ("Up" -ne $AdapterObj.Status) { $Speed = 0 $SpeedString = $Messages.NotAvailable } elseif ($true -eq $FullDuplex) { $SpeedString += " " + $Messages.FullDuplex } return [PsCustomObject] @{ Speed = $Speed SpeedString = $SpeedString } } function GetFullDuplex($AdapterName) { $FullDuplex = ($script:MSNetAdapters.Where({$_.InterfaceDescription -eq $AdapterName})).FullDuplex if (-not $FullDuplex) { $FullDuplex = "" } return $FullDuplex } function GetAdapterPort($AdapterName) { $AdapterRegKey = GetAdapterPropertiesFromRegistry $AdapterName switch ($AdapterRegKey.Port) { 0 {$PortNumberString = $Messages.PortA; break} 1 {$PortNumberString = $Messages.PortB; break} 2 {$PortNumberString = $Messages.PortC; break} 3 {$PortNumberString = $Messages.PortD; break} default {$PortNumberString = $Messages.NotSupported; break} } return [PsCustomObject] @{ Port = $AdapterRegKey.Port PortString = $PortNumberString } } function GetDriverVersion($AdapterName) { $DriverVersion = ($script:MSNetAdapters.Where({$_.InterfaceDescription -eq $AdapterName})).DriverVersion return $DriverVersion } function GetAdapterMiniPortName($AdapterName) { $Name = ($script:PnpDevice.Where({$_.Name -eq $AdapterName})).Service $Instance = ($script:MSNetAdapters.Where({$_.InterfaceDescription -eq $AdapterName})).InterfaceGuid return [PsCustomObject] @{ Name = $Name Instance = $Instance } } function GetAdapterMaxSpeed($AdapterName, $SupportedSpeeds) { if ($SupportedSpeeds.Length -gt 0) { # array is sorted, so we just return the last element return $SupportedSpeeds[-1] } return 0 } function GetAdapterSupportedSpeeds($AdapterName) { $SpeedDuplex = $script:MSNetAdvProperty.Where({$_.InterfaceDescription -eq $AdapterName -and $_.RegistryKeyword -eq "*SpeedDuplex"}) if ($SpeedDuplex) { $RegistryValues = ($SpeedDuplex).ValidRegistryValues } $SupportedSpeeds = @() foreach ($i in $RegistryValues) { $SupportedSpeeds += $SupportedSpeedsMap[$i] } return $SupportedSpeeds | Sort-Object } function GetAdapterEEEStatus($AdapterName) { $EEEStatus = 0 $EEEStatusString = $Messages.NotSupported $Service = ($script:SupportedAdapters.Where({$_.Name -eq $AdapterName})).Service foreach ($EEE in $script:EEELinkStatusArray) { if (($null -ne $EEE) -and ($EEE.InstanceName -eq $AdapterName)) { if ($EEE.EEELinkStatus -eq $false) { $EEELinkAdvertisement = 0 if ($Service -in @("i40ea", "i40eb")) { $EEELinkAdvertisement = $script:MSNetAdvProperty.Where({$_.InterfaceDescription -eq $AdapterName -and $_.RegistryKeyword -eq "EEELinkAdvertisement"}) if ($EEELinkAdvertisement -and $EEELinkAdvertisement.RegistryValue) { $EEELinkAdvertisement = $EEELinkAdvertisement.RegistryValue } else { break } } if ($EEELinkAdvertisement -gt 0) { $EEEStatus = 3 #Not Negotiated $EEEStatusString = $Messages.NotNegotiated } else { $EEEStatus = 1 #Disabled $EEEStatusString = $Messages.Disabled } } else { $EEEStatus = 2 #Active $EEEStatusString = $Messages.Active } } } return [PsCustomObject] @{ EEEStatus = $EEEStatus EEEStatusString = $EEEStatusString } } function GetAdapterStatus($AdapterName) { $AdapterStatus = [ADAPTER_STATUS]::Installed -bor [ADAPTER_STATUS]::DriverLoaded -bor [ADAPTER_STATUS]::HasDiag $LinkStatus = ($script:MSNetAdapters.Where({$_.InterfaceDescription -eq $AdapterName})).Status if ($LinkStatus -eq 'Up') { $AdapterStatus = $AdapterStatus -bor [ADAPTER_STATUS]::HasLink } return $AdapterStatus } function GetAdapterCapabilities($AdapterName, $SupportedSpeeds) { $Capabilities = @([int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_VENDOR_INTEL) foreach ($SupportedSpeed in $SupportedSpeeds) { switch ($SupportedSpeed) { 10000000 {$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_SPEED_10_MBPS; break} 100000000 {$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_SPEED_100_MBPS; break} 1000000000 {$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_SPEED_1000_MBPS; break} 2500000000 {$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_SPEED_2500_MBPS; break} 5000000000 {$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_SPEED_5000_MBPS; break} 10000000000 {$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_SPEED_10000_MBPS; break} 40000000000 {$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_SPEED_40000_MBPS; break} 25000000000 {$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_SPEED_25000_MBPS; break} 50000000000 {$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_SPEED_50000_MBPS; break} 100000000000 {$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_SPEED_100000_MBPS; break} 200000000000 {$Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_SPEED_200000_MBPS; break} } } $Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_PERFORMANCE_PROFILE $Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_DIAGNOSTIC_SUPPORT $Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_FLASH_SUPPORT $Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_CYPRESS $Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_IDENTIFY_ADAPTER_SUPPORT $Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_NDIS_IOAT $Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_EXTENDED_DMIX_SUPPORT $Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_DCB $Capabilities += [int][ADAPTER_CAPABILITY]::NCS_ADAPTER_CAP_JUMBO_FRAMES return , ($Capabilities | Sort-Object) } function GetIntelDriverInfo() { $script:BusTypesArray = Get-CimInstance -Namespace "root\wmi" -ClassName IntlLan_BusType -Property BusType -ErrorAction SilentlyContinue $script:DDPPkgNamesArray = Get-CimInstance -Namespace "root\wmi" -ClassName IntlLan_GetPackageInfo -Property Name, Major, Minor -ErrorAction SilentlyContinue $script:ETrackIdsArray = Get-CimInstance -Namespace "root\wmi" -ClassName IntlLan_EetrackId -Property Id -ErrorAction SilentlyContinue $script:NVMVersionsArray = Get-CimInstance -Namespace "root\wmi" -ClassName IntlLan_EepromVersion -Property Version -ErrorAction SilentlyContinue $script:SanMacAddressesArray = Get-CimInstance -Namespace "root\wmi" -ClassName IntlLan_GetSanMacAddress -Property SanMacAddr -ErrorAction SilentlyContinue $script:PartNumbersArray = Get-CimInstance -Namespace "root\wmi" -ClassName IntlLan_PartNumberString -Property PartNumberString -ErrorAction SilentlyContinue $script:PhyInfoArray = Get-CimInstance -Namespace "root\wmi" -ClassName IntlLan_GetPhyInfo -Property PhyInfo -ErrorAction SilentlyContinue $script:FwVersionsArray = Get-CimInstance -Namespace "root\wmi" -ClassName IntlLan_GetOemProductVer -Property SingleNvmVersion -ErrorAction SilentlyContinue $script:EEELinkStatusArray = Get-CimInstance -Namespace "root\wmi" -ClassName IntlLan_EEELinkStatus -Property EEELinkStatus -ErrorAction SilentlyContinue } # SIG # Begin signature block # MIIocAYJKoZIhvcNAQcCoIIoYTCCKF0CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBoaolhvsUId6Pd # n508OwlgQP8K6/B8uDk7ehJneK92a6CCEfIwggVvMIIEV6ADAgECAhBI/JO0YFWU # jTanyYqJ1pQWMA0GCSqGSIb3DQEBDAUAMHsxCzAJBgNVBAYTAkdCMRswGQYDVQQI # DBJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcMB1NhbGZvcmQxGjAYBgNVBAoM # EUNvbW9kbyBDQSBMaW1pdGVkMSEwHwYDVQQDDBhBQUEgQ2VydGlmaWNhdGUgU2Vy # dmljZXMwHhcNMjEwNTI1MDAwMDAwWhcNMjgxMjMxMjM1OTU5WjBWMQswCQYDVQQG # EwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMS0wKwYDVQQDEyRTZWN0aWdv # IFB1YmxpYyBDb2RlIFNpZ25pbmcgUm9vdCBSNDYwggIiMA0GCSqGSIb3DQEBAQUA # A4ICDwAwggIKAoICAQCN55QSIgQkdC7/FiMCkoq2rjaFrEfUI5ErPtx94jGgUW+s # hJHjUoq14pbe0IdjJImK/+8Skzt9u7aKvb0Ffyeba2XTpQxpsbxJOZrxbW6q5KCD # J9qaDStQ6Utbs7hkNqR+Sj2pcaths3OzPAsM79szV+W+NDfjlxtd/R8SPYIDdub7 # P2bSlDFp+m2zNKzBenjcklDyZMeqLQSrw2rq4C+np9xu1+j/2iGrQL+57g2extme # me/G3h+pDHazJyCh1rr9gOcB0u/rgimVcI3/uxXP/tEPNqIuTzKQdEZrRzUTdwUz # T2MuuC3hv2WnBGsY2HH6zAjybYmZELGt2z4s5KoYsMYHAXVn3m3pY2MeNn9pib6q # RT5uWl+PoVvLnTCGMOgDs0DGDQ84zWeoU4j6uDBl+m/H5x2xg3RpPqzEaDux5mcz # mrYI4IAFSEDu9oJkRqj1c7AGlfJsZZ+/VVscnFcax3hGfHCqlBuCF6yH6bbJDoEc # QNYWFyn8XJwYK+pF9e+91WdPKF4F7pBMeufG9ND8+s0+MkYTIDaKBOq3qgdGnA2T # OglmmVhcKaO5DKYwODzQRjY1fJy67sPV+Qp2+n4FG0DKkjXp1XrRtX8ArqmQqsV/ # AZwQsRb8zG4Y3G9i/qZQp7h7uJ0VP/4gDHXIIloTlRmQAOka1cKG8eOO7F/05QID # AQABo4IBEjCCAQ4wHwYDVR0jBBgwFoAUoBEKIz6W8Qfs4q8p74Klf9AwpLQwHQYD # VR0OBBYEFDLrkpr/NZZILyhAQnAgNpFcF4XmMA4GA1UdDwEB/wQEAwIBhjAPBgNV # HRMBAf8EBTADAQH/MBMGA1UdJQQMMAoGCCsGAQUFBwMDMBsGA1UdIAQUMBIwBgYE # VR0gADAIBgZngQwBBAEwQwYDVR0fBDwwOjA4oDagNIYyaHR0cDovL2NybC5jb21v # ZG9jYS5jb20vQUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwNAYIKwYBBQUHAQEE # KDAmMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20wDQYJKoZI # hvcNAQEMBQADggEBABK/oe+LdJqYRLhpRrWrJAoMpIpnuDqBv0WKfVIHqI0fTiGF # OaNrXi0ghr8QuK55O1PNtPvYRL4G2VxjZ9RAFodEhnIq1jIV9RKDwvnhXRFAZ/ZC # J3LFI+ICOBpMIOLbAffNRk8monxmwFE2tokCVMf8WPtsAO7+mKYulaEMUykfb9gZ # pk+e96wJ6l2CxouvgKe9gUhShDHaMuwV5KZMPWw5c9QLhTkg4IUaaOGnSDip0TYl # d8GNGRbFiExmfS9jzpjoad+sPKhdnckcW67Y8y90z7h+9teDnRGWYpquRRPaf9xH # +9/DUp/mBlXpnYzyOmJRvOwkDynUWICE5EV7WtgwggYcMIIEBKADAgECAhAz1wio # kUBTGeKlu9M5ua1uMA0GCSqGSIb3DQEBDAUAMFYxCzAJBgNVBAYTAkdCMRgwFgYD # VQQKEw9TZWN0aWdvIExpbWl0ZWQxLTArBgNVBAMTJFNlY3RpZ28gUHVibGljIENv # ZGUgU2lnbmluZyBSb290IFI0NjAeFw0yMTAzMjIwMDAwMDBaFw0zNjAzMjEyMzU5 # NTlaMFcxCzAJBgNVBAYTAkdCMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLjAs # BgNVBAMTJVNlY3RpZ28gUHVibGljIENvZGUgU2lnbmluZyBDQSBFViBSMzYwggGi # MA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQC70f4et0JbePWQp64sg/GNIdMw # hoV739PN2RZLrIXFuwHP4owoEXIEdiyBxasSekBKxRDogRQ5G19PB/YwMDB/NSXl # wHM9QAmU6Kj46zkLVdW2DIseJ/jePiLBv+9l7nPuZd0o3bsffZsyf7eZVReqskmo # PBBqOsMhspmoQ9c7gqgZYbU+alpduLyeE9AKnvVbj2k4aOqlH1vKI+4L7bzQHkND # brBTjMJzKkQxbr6PuMYC9ruCBBV5DFIg6JgncWHvL+T4AvszWbX0w1Xn3/YIIq62 # 0QlZ7AGfc4m3Q0/V8tm9VlkJ3bcX9sR0gLqHRqwG29sEDdVOuu6MCTQZlRvmcBME # Jd+PuNeEM4xspgzraLqVT3xE6NRpjSV5wyHxNXf4T7YSVZXQVugYAtXueciGoWnx # G06UE2oHYvDQa5mll1CeHDOhHu5hiwVoHI717iaQg9b+cYWnmvINFD42tRKtd3V6 # zOdGNmqQU8vGlHHeBzoh+dYyZ+CcblSGoGSgg8sCAwEAAaOCAWMwggFfMB8GA1Ud # IwQYMBaAFDLrkpr/NZZILyhAQnAgNpFcF4XmMB0GA1UdDgQWBBSBMpJBKyjNRsjE # osYqORLsSKk/FDAOBgNVHQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAT # BgNVHSUEDDAKBggrBgEFBQcDAzAaBgNVHSAEEzARMAYGBFUdIAAwBwYFZ4EMAQMw # SwYDVR0fBEQwQjBAoD6gPIY6aHR0cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdv # UHVibGljQ29kZVNpZ25pbmdSb290UjQ2LmNybDB7BggrBgEFBQcBAQRvMG0wRgYI # KwYBBQUHMAKGOmh0dHA6Ly9jcnQuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0Nv # ZGVTaWduaW5nUm9vdFI0Ni5wN2MwIwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLnNl # Y3RpZ28uY29tMA0GCSqGSIb3DQEBDAUAA4ICAQBfNqz7+fZyWhS38Asd3tj9lwHS # /QHumS2G6Pa38Dn/1oFKWqdCSgotFZ3mlP3FaUqy10vxFhJM9r6QZmWLLXTUqwj3 # ahEDCHd8vmnhsNufJIkD1t5cpOCy1rTP4zjVuW3MJ9bOZBHoEHJ20/ng6SyJ6UnT # s5eWBgrh9grIQZqRXYHYNneYyoBBl6j4kT9jn6rNVFRLgOr1F2bTlHH9nv1HMePp # GoYd074g0j+xUl+yk72MlQmYco+VAfSYQ6VK+xQmqp02v3Kw/Ny9hA3s7TSoXpUr # OBZjBXXZ9jEuFWvilLIq0nQ1tZiao/74Ky+2F0snbFrmuXZe2obdq2TWauqDGIgb # MYL1iLOUJcAhLwhpAuNMu0wqETDrgXkG4UGVKtQg9guT5Hx2DJ0dJmtfhAH2KpnN # r97H8OQYok6bLyoMZqaSdSa+2UA1E2+upjcaeuitHFFjBypWBmztfhj24+xkc6Zt # CDaLrw+ZrnVrFyvCTWrDUUZBVumPwo3/E3Gb2u2e05+r5UWmEsUUWlJBl6MGAAjF # 5hzqJ4I8O9vmRsTvLQA1E802fZ3lqicIBczOwDYOSxlP0GOabb/FKVMxItt1UHeG # 0PL4au5rBhs+hSMrl8h+eplBDN1Yfw6owxI9OjWb4J0sjBeBVESoeh2YnZZ/WVim # VGX/UUIL+Efrz/jlvzCCBlswggTDoAMCAQICEDB3Np9sRenync55S1/V2zEwDQYJ # KoZIhvcNAQELBQAwVzELMAkGA1UEBhMCR0IxGDAWBgNVBAoTD1NlY3RpZ28gTGlt # aXRlZDEuMCwGA1UEAxMlU2VjdGlnbyBQdWJsaWMgQ29kZSBTaWduaW5nIENBIEVW # IFIzNjAeFw0yNDAxMTYwMDAwMDBaFw0yNTAxMTUyMzU5NTlaMIG7MRAwDgYDVQQF # EwcyMTg5MDc0MRMwEQYLKwYBBAGCNzwCAQMTAlVTMRkwFwYLKwYBBAGCNzwCAQIT # CERlbGF3YXJlMR0wGwYDVQQPExRQcml2YXRlIE9yZ2FuaXphdGlvbjELMAkGA1UE # BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExGjAYBgNVBAoMEUludGVsIENvcnBv # cmF0aW9uMRowGAYDVQQDDBFJbnRlbCBDb3Jwb3JhdGlvbjCCAaIwDQYJKoZIhvcN # AQEBBQADggGPADCCAYoCggGBALUx6h43Sbt+ZfuTa/V0GFWgAAfUIWg9ruenPoc8 # FTqJxPdbqYRlGKEK2vCSQyBTn7tGV54Y/hMGvRTBQce4dMFe7R5wL9p92J3R4jkR # MadZxJ4HuWalG13CpjQZP1Jg61Wx0KjsCPd2VdbBTpTiLRI+PKjokE6I/TLuA2bA # tqy1phe2/82SRlx/fVGuIzI1BOQCaC9Olao3kJ9JwKt6VZidIgmzXAYLpzZ2VhW9 # HTRLaqTLTKxgO2mtpMTbfqc7RR/oYHG2cbGCoW3KB5Tlgjhm85ZsMEMV48O7JWeB # wQoNy9admwqsdUzr5HdDbM7/EuiNHvP+sIauOmHEkLtqxM37sSgDBQX3V+vqiR5b # H6xTcfIceaa4ukwKuVmfWrB35TGSEkWFzZu3ZUYGKRCI9WZ8GixV/5PHm571xSrD # jbrigtkHtPahVVC8EUojnIGiDXovnm7ZG0FEXKuVybNOSpD3BzE2Pw3j/evKHuIr # hWCzdPBOkbbEoYFBxts6UtJNFwIDAQABo4IBvDCCAbgwHwYDVR0jBBgwFoAUgTKS # QSsozUbIxKLGKjkS7EipPxQwHQYDVR0OBBYEFKRLkSq7xH/Ru5kWUgmDt9ZZsJHj # MA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBMGA1UdJQQMMAoGCCsGAQUF # BwMDMEkGA1UdIARCMEAwNQYMKwYBBAGyMQECAQYBMCUwIwYIKwYBBQUHAgEWF2h0 # dHBzOi8vc2VjdGlnby5jb20vQ1BTMAcGBWeBDAEDMEsGA1UdHwREMEIwQKA+oDyG # Omh0dHA6Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0NvZGVTaWduaW5n # Q0FFVlIzNi5jcmwwewYIKwYBBQUHAQEEbzBtMEYGCCsGAQUFBzAChjpodHRwOi8v # Y3J0LnNlY3RpZ28uY29tL1NlY3RpZ29QdWJsaWNDb2RlU2lnbmluZ0NBRVZSMzYu # Y3J0MCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5zZWN0aWdvLmNvbTAuBgNVHREE # JzAloCMGCCsGAQUFBwgDoBcwFQwTVVMtREVMQVdBUkUtMjE4OTA3NDANBgkqhkiG # 9w0BAQsFAAOCAYEAI6NvLiKQmXol9qHiDAxrF41RjhawR5g4ZQuWIxU2uMkjL9Eh # NV16cKJjZ+KSPebFErInVlf/NLvKCfSUpf+2olf7Phu1pbb2p2R1mFtGYIA1Bcwa # UmIsA/XsQ+ZHYlVdqBcpJCdc/jTzfAQen0gv1hFOIfk0vOKjjAAuTIgQNkG3c5Sw # FMZjhu+wrSXx9Qvv85BhIX/xF1xYkKN4iBwqqebxAhmaE2tZUI7X/kKDx9QexONP # Wo5Vw9b3P9I9pP8pWS/Txa4AC8x5AcZ8f6FUkl5Y750Ma6XEeHJZlUGkf1d/Ph9M # c6bg5/P4wuXceTd4iqu3sK4ZxbiXWiFD+PtZ9UbzDarUNCqskSwudIzEcgwt7glZ # YUNC+gD64uddohltoXXIasQNs/LK+qzOuqZKhFkRf+v4+Q28EQYuVIcJDHspW1CV # k3Y4zhEb1dhCAPZ9jyXyz827Uji6HD5dnGO2lPCcEvM/aWEjYYM285g0CZix3LeB # XQydSyjK95klPc99MYIV1DCCFdACAQEwazBXMQswCQYDVQQGEwJHQjEYMBYGA1UE # ChMPU2VjdGlnbyBMaW1pdGVkMS4wLAYDVQQDEyVTZWN0aWdvIFB1YmxpYyBDb2Rl # IFNpZ25pbmcgQ0EgRVYgUjM2AhAwdzafbEXp8p3OeUtf1dsxMA0GCWCGSAFlAwQC # AQUAoGowGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARYwLwYJKoZIhvcNAQkEMSIEIE9yRx0XTdMrQHje0kAsGOBi # Yyw0mOEIiCgAyPQopBUaMA0GCSqGSIb3DQEBAQUABIIBgJhvGGepODeV1plLrvxe # L+Vp2gNj+m8GtXk48tpYznUTtLupXuDEMwSzAPQWMxu6dUQtEJZ0eNEYfRe5EZME # 30Sb/SxYdZfMbTGeNxYShWmUxuPwP/iyxdi0g4DFMwt++U3VstaoUZrJMnOtU8t5 # sSEebqK0FQNR046eXEdA/1krbvRWU2lqZOcuyS8lHOW8ddqAVo8t6EkthxzF4oGM # CHlZySD6YHxgBQsuttkM63uaRrjuDqzyMptztQ8vTZbhk8/UaS8W8EZPo2r+h1MK # GkU959EsTcy6max5SXS1ZI8gqHw8NqbOlhOF+pWMa/BUG3vzkpUzS9BwDd0eGILa # mPKDE6TGyiXa7KwqPr+WubSRaQFNdlpSr1T8RxeYl1DJTWKBW+JlDn6TEr286L2/ # d9HCVBBPydUNI8TtfJhMtlvYUEgjnQod2T53Db7WdprJVmJ/r8JyfR/C60OcrJbw # I0/RytgRJCKowqG20RelrVIhzRRZNVdILmBMCv2c8EqHiaGCE04wghNKBgorBgEE # AYI3AwMBMYITOjCCEzYGCSqGSIb3DQEHAqCCEycwghMjAgEDMQ8wDQYJYIZIAWUD # BAICBQAwge8GCyqGSIb3DQEJEAEEoIHfBIHcMIHZAgEBBgorBgEEAbIxAgEBMDEw # DQYJYIZIAWUDBAIBBQAEIMAkjakWALru0B/am774lNzVuGyevYfvMWFhblgwP8Zz # AhRO+RDPLaXIOVNsBVodrFT2poYGnRgPMjAyNDAzMTgxODIwNDhaoG6kbDBqMQsw # CQYDVQQGEwJHQjETMBEGA1UECBMKTWFuY2hlc3RlcjEYMBYGA1UEChMPU2VjdGln # byBMaW1pdGVkMSwwKgYDVQQDDCNTZWN0aWdvIFJTQSBUaW1lIFN0YW1waW5nIFNp # Z25lciAjNKCCDekwggb1MIIE3aADAgECAhA5TCXhfKBtJ6hl4jvZHSLUMA0GCSqG # SIb3DQEBDAUAMH0xCzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNo # ZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRl # ZDElMCMGA1UEAxMcU2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTAeFw0yMzA1 # MDMwMDAwMDBaFw0zNDA4MDIyMzU5NTlaMGoxCzAJBgNVBAYTAkdCMRMwEQYDVQQI # EwpNYW5jaGVzdGVyMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLDAqBgNVBAMM # I1NlY3RpZ28gUlNBIFRpbWUgU3RhbXBpbmcgU2lnbmVyICM0MIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEApJMoUkvPJ4d2pCkcmTjA5w7U0RzsaMsBZOSK # zXewcWWCvJ/8i7u7lZj7JRGOWogJZhEUWLK6Ilvm9jLxXS3AeqIO4OBWZO2h5YEg # ciBkQWzHwwj6831d7yGawn7XLMO6EZge/NMgCEKzX79/iFgyqzCz2Ix6lkoZE1ys # /Oer6RwWLrCwOJVKz4VQq2cDJaG7OOkPb6lampEoEzW5H/M94STIa7GZ6A3vu03l # PYxUA5HQ/C3PVTM4egkcB9Ei4GOGp7790oNzEhSbmkwJRr00vOFLUHty4Fv9Gbsf # PGoZe267LUQqvjxMzKyKBJPGV4agczYrgZf6G5t+iIfYUnmJ/m53N9e7UJ/6GCVP # E/JefKmxIFopq6NCh3fg9EwCSN1YpVOmo6DtGZZlFSnF7TMwJeaWg4Ga9mBmkFgH # gM1Cdaz7tJHQxd0BQGq2qBDu9o16t551r9OlSxihDJ9XsF4lR5F0zXUS0Zxv5F4N # m+x1Ju7+0/WSL1KF6NpEUSqizADKh2ZDoxsA76K1lp1irScL8htKycOUQjeIIISo # h67DuiNye/hU7/hrJ7CF9adDhdgrOXTbWncC0aT69c2cPcwfrlHQe2zYHS0RQlNx # dMLlNaotUhLZJc/w09CRQxLXMn2YbON3Qcj/HyRU726txj5Ve/Fchzpk8WBLBU/v # uS/sCRMCAwEAAaOCAYIwggF+MB8GA1UdIwQYMBaAFBqh+GEZIA/DQXdFKI7RNV8G # EgRVMB0GA1UdDgQWBBQDDzHIkSqTvWPz0V1NpDQP0pUBGDAOBgNVHQ8BAf8EBAMC # BsAwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDBKBgNVHSAE # QzBBMDUGDCsGAQQBsjEBAgEDCDAlMCMGCCsGAQUFBwIBFhdodHRwczovL3NlY3Rp # Z28uY29tL0NQUzAIBgZngQwBBAIwRAYDVR0fBD0wOzA5oDegNYYzaHR0cDovL2Ny # bC5zZWN0aWdvLmNvbS9TZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3JsMHQGCCsG # AQUFBwEBBGgwZjA/BggrBgEFBQcwAoYzaHR0cDovL2NydC5zZWN0aWdvLmNvbS9T # ZWN0aWdvUlNBVGltZVN0YW1waW5nQ0EuY3J0MCMGCCsGAQUFBzABhhdodHRwOi8v # b2NzcC5zZWN0aWdvLmNvbTANBgkqhkiG9w0BAQwFAAOCAgEATJtlWPrgec/vFcMy # bd4zket3WOLrvctKPHXefpRtwyLHBJXfZWlhEwz2DJ71iSBewYfHAyTKx6XwJt/4 # +DFlDeDrbVFXpoyEUghGHCrC3vLaikXzvvf2LsR+7fjtaL96VkjpYeWaOXe8vrqR # ZIh1/12FFjQn0inL/+0t2v++kwzsbaINzMPxbr0hkRojAFKtl9RieCqEeajXPawh # j3DDJHk6l/ENo6NbU9irALpY+zWAT18ocWwZXsKDcpCu4MbY8pn76rSSZXwHfDVE # Ha1YGGti+95sxAqpbNMhRnDcL411TCPCQdB6ljvDS93NkiZ0dlw3oJoknk5fTtOP # D+UTT1lEZUtDZM9I+GdnuU2/zA2xOjDQoT1IrXpl5Ozf4AHwsypKOazBpPmpfTXQ # MkCgsRkqGCGyyH0FcRpLJzaq4Jgcg3Xnx35LhEPNQ/uQl3YqEqxAwXBbmQpA+oBt # lGF7yG65yGdnJFxQjQEg3gf3AdT4LhHNnYPl+MolHEQ9J+WwhkcqCxuEdn17aE+N # t/cTtO2gLe5zD9kQup2ZLHzXdR+PEMSU5n4k5ZVKiIwn1oVmHfmuZHaR6Ej+yFUK # 7SnDH944psAU+zI9+KmDYjbIw74Ahxyr+kpCHIkD3PVcfHDZXXhO7p9eIOYJanwr # CKNI9RX8BE/fzSEceuX1jhrUuUAwggbsMIIE1KADAgECAhAwD2+s3WaYdHypRjan # eC25MA0GCSqGSIb3DQEBDAUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKTmV3 # IEplcnNleTEUMBIGA1UEBxMLSmVyc2V5IENpdHkxHjAcBgNVBAoTFVRoZSBVU0VS # VFJVU1QgTmV0d29yazEuMCwGA1UEAxMlVVNFUlRydXN0IFJTQSBDZXJ0aWZpY2F0 # aW9uIEF1dGhvcml0eTAeFw0xOTA1MDIwMDAwMDBaFw0zODAxMTgyMzU5NTlaMH0x # CzAJBgNVBAYTAkdCMRswGQYDVQQIExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNV # BAcTB1NhbGZvcmQxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDElMCMGA1UEAxMc # U2VjdGlnbyBSU0EgVGltZSBTdGFtcGluZyBDQTCCAiIwDQYJKoZIhvcNAQEBBQAD # ggIPADCCAgoCggIBAMgbAa/ZLH6ImX0BmD8gkL2cgCFUk7nPoD5T77NawHbWGgSl # zkeDtevEzEk0y/NFZbn5p2QWJgn71TJSeS7JY8ITm7aGPwEFkmZvIavVcRB5h/RG # Ks3EWsnb111JTXJWD9zJ41OYOioe/M5YSdO/8zm7uaQjQqzQFcN/nqJc1zjxFrJw # 06PE37PFcqwuCnf8DZRSt/wflXMkPQEovA8NT7ORAY5unSd1VdEXOzQhe5cBlK9/ # gM/REQpXhMl/VuC9RpyCvpSdv7QgsGB+uE31DT/b0OqFjIpWcdEtlEzIjDzTFKKc # vSb/01Mgx2Bpm1gKVPQF5/0xrPnIhRfHuCkZpCkvRuPd25Ffnz82Pg4wZytGtzWv # lr7aTGDMqLufDRTUGMQwmHSCIc9iVrUhcxIe/arKCFiHd6QV6xlV/9A5VC0m7kUa # Om/N14Tw1/AoxU9kgwLU++Le8bwCKPRt2ieKBtKWh97oaw7wW33pdmmTIBxKlyx3 # GSuTlZicl57rjsF4VsZEJd8GEpoGLZ8DXv2DolNnyrH6jaFkyYiSWcuoRsDJ8qb/ # fVfbEnb6ikEk1Bv8cqUUotStQxykSYtBORQDHin6G6UirqXDTYLQjdprt9v3GEBX # c/Bxo/tKfUU2wfeNgvq5yQ1TgH36tjlYMu9vGFCJ10+dM70atZ2h3pVBeqeDAgMB # AAGjggFaMIIBVjAfBgNVHSMEGDAWgBRTeb9aqitKz1SA4dibwJ3ysgNmyzAdBgNV # HQ4EFgQUGqH4YRkgD8NBd0UojtE1XwYSBFUwDgYDVR0PAQH/BAQDAgGGMBIGA1Ud # EwEB/wQIMAYBAf8CAQAwEwYDVR0lBAwwCgYIKwYBBQUHAwgwEQYDVR0gBAowCDAG # BgRVHSAAMFAGA1UdHwRJMEcwRaBDoEGGP2h0dHA6Ly9jcmwudXNlcnRydXN0LmNv # bS9VU0VSVHJ1c3RSU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDB2BggrBgEF # BQcBAQRqMGgwPwYIKwYBBQUHMAKGM2h0dHA6Ly9jcnQudXNlcnRydXN0LmNvbS9V # U0VSVHJ1c3RSU0FBZGRUcnVzdENBLmNydDAlBggrBgEFBQcwAYYZaHR0cDovL29j # c3AudXNlcnRydXN0LmNvbTANBgkqhkiG9w0BAQwFAAOCAgEAbVSBpTNdFuG1U4GR # dd8DejILLSWEEbKw2yp9KgX1vDsn9FqguUlZkClsYcu1UNviffmfAO9Aw63T4uRW # +VhBz/FC5RB9/7B0H4/GXAn5M17qoBwmWFzztBEP1dXD4rzVWHi/SHbhRGdtj7BD # EA+N5Pk4Yr8TAcWFo0zFzLJTMJWk1vSWVgi4zVx/AZa+clJqO0I3fBZ4OZOTlJux # 3LJtQW1nzclvkD1/RXLBGyPWwlWEZuSzxWYG9vPWS16toytCiiGS/qhvWiVwYoFz # Y16gu9jc10rTPa+DBjgSHSSHLeT8AtY+dwS8BDa153fLnC6NIxi5o8JHHfBd1qFz # VwVomqfJN2Udvuq82EKDQwWli6YJ/9GhlKZOqj0J9QVst9JkWtgqIsJLnfE5Xkze # SD2bNJaaCV+O/fexUpHOP4n2HKG1qXUfcb9bQ11lPVCBbqvw0NP8srMftpmWJvQ8 # eYtcZMzN7iea5aDADHKHwW5NWtMe6vBE5jJvHOsXTpTDeGUgOw9Bqh/poUGd/rG4 # oGUqNODeqPk85sEwu8CgYyz8XBYAqNDEf+oRnR4GxqZtMl20OAkrSQeq/eww2vGn # L8+3/frQo4TZJ577AWZ3uVYQ4SBuxq6x+ba6yDVdM3aO8XwgDCp3rrWiAoa6Ke60 # WgCxjKvj+QrJVF3UuWp0nr1IrpgxggQsMIIEKAIBATCBkTB9MQswCQYDVQQGEwJH # QjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3Jk # MRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxJTAjBgNVBAMTHFNlY3RpZ28gUlNB # IFRpbWUgU3RhbXBpbmcgQ0ECEDlMJeF8oG0nqGXiO9kdItQwDQYJYIZIAWUDBAIC # BQCgggFrMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG9w0BCQUx # DxcNMjQwMzE4MTgyMDQ4WjA/BgkqhkiG9w0BCQQxMgQwOf3K5AoYyXLj7yrxOb3I # DGNPX5n3nxk7cthLKPiTb+XNiJn3Jt7f4UBEq9nmv2RUMIHtBgsqhkiG9w0BCRAC # DDGB3TCB2jCB1zAWBBSuYq91Cgy9R9ZGH3Vo4ryM58pPlDCBvAQUAtZbleKDcMFX # AJX6iPkj3ZN/rY8wgaMwgY6kgYswgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpO # ZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwGA1UEChMVVGhlIFVT # RVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3QgUlNBIENlcnRpZmlj # YXRpb24gQXV0aG9yaXR5AhAwD2+s3WaYdHypRjaneC25MA0GCSqGSIb3DQEBAQUA # BIICADmFKoVmc4m1cqdm2ezudYQ13aDZvm+pq4bA9cSQ57RGDSjX6kpp8YehW6/v # l+BSz/GpKdzXyvWf+A5n3r4o1H+5SvabIUBajp0xSZ9s2dQMFkYaS31DoSNTzTwY # W5CtU/c+pcR91gSijUDnmajXOEup3ImvrLsY3rGEFe6OCIfshjHFEEVwryG8AEVW # 8hnLL8DiZJE+YOIDsCzarNE/fSzJVsTZ0jBNCYhXpRpI7Q2wvz/s3j6jBQf9fPL/ # TsCQkw/DoLTp24v6kpM/kkgQih/hi2jKbNeq/QgnKG3e7LPm0XfW8FukY8NbvD5X # evhy72C0p4zXm6YkRhi+L2jpeY1WpXswgMSgLREPk0UZMz7kNwycR81FN2GXfU2P # 6VM58L3OmXJS9NQS7wH32tR3SqogvhPil73HQjs7I+kYOEExwpjSFEEywfevj4NN # 0849uNRwNtDIC/NCsVSTtVFXlCilaZbXwF50gDtT/Pk42vAmJSuRyq55pg+4N197 # vBYEXKyyhbbiJSDdjp6UGb+MjxCEdDDCdUsvJQQWi6ly/XyXP4p9QL4euY6PnJwM # meLz4i0d9ZxXwHZDfEgmqIeC0cuZ9JA1chbavUMajb63zVijHBky0ooO5wHZSahs # z/6DjBazz0lMchdNmFXkdNx3dMN16EEJO7/eFyeHnSwqkCRa # SIG # End signature block
combined_dataset/train/non-malicious/2995.ps1
2995.ps1
Set-StrictMode -Version Latest InModuleScope -ModuleName Pester -ScriptBlock { Describe 'Has-Flag' -Fixture { It 'Returns true when setting and value are the same' { $setting = [Pester.OutputTypes]::Passed $value = [Pester.OutputTypes]::Passed $value | Has-Flag $setting | Should -Be $true } It 'Returns false when setting and value are the different' { $setting = [Pester.OutputTypes]::Passed $value = [Pester.OutputTypes]::Failed $value | Has-Flag $setting | Should -Be $false } It 'Returns true when setting contains value' { $setting = [Pester.OutputTypes]::Passed -bor [Pester.OutputTypes]::Failed $value = [Pester.OutputTypes]::Passed $value | Has-Flag $setting | Should -Be $true } It 'Returns false when setting does not contain the value' { $setting = [Pester.OutputTypes]::Passed -bor [Pester.OutputTypes]::Failed $value = [Pester.OutputTypes]::Summary $value | Has-Flag $setting | Should -Be $false } It 'Returns true when at least one setting is contained in value' { $setting = [Pester.OutputTypes]::Passed -bor [Pester.OutputTypes]::Failed $value = [Pester.OutputTypes]::Summary -bor [Pester.OutputTypes]::Failed $value | Has-Flag $setting | Should -Be $true } It 'Returns false when none of settings is contained in value' { $setting = [Pester.OutputTypes]::Passed -bor [Pester.OutputTypes]::Failed $value = [Pester.OutputTypes]::Summary -bor [Pester.OutputTypes]::Describe $value | Has-Flag $setting | Should -Be $false } } Describe 'Default OutputTypes' -Fixture { It 'Fails output type contains all except passed' { $expected = [Pester.OutputTypes]'Default, Failed, Pending, Skipped, Inconclusive, Describe, Context, Summary, Header' [Pester.OutputTypes]::Fails | Should -Be $expected } It 'All output type contains all flags' { $expected = [Pester.OutputTypes]'Default, Passed, Failed, Pending, Skipped, Inconclusive, Describe, Context, Summary, Header' [Pester.OutputTypes]::All | Should -Be $expected } } } $thisScriptRegex = [regex]::Escape($MyInvocation.MyCommand.Path) Describe 'ConvertTo-PesterResult' { $getPesterResult = InModuleScope Pester { ${function:ConvertTo-PesterResult} } Context 'failed tests in Tests file' { $errorRecord = $null try { $script = {}; 'something' | should -be 'nothing' } catch { $errorRecord = $_ } $result = & $getPesterResult -Time 0 -ErrorRecord $errorRecord It 'records the correct stack line number' { $result.StackTrace | should -match "${thisScriptRegex}: line $($script.startPosition.StartLine)" } It 'records the correct error record' { $result.ErrorRecord -is [System.Management.Automation.ErrorRecord] | Should -be $true $result.ErrorRecord.Exception.Message | Should -match "Expected: 'nothing'" } } It 'Does not modify the error message from the original exception' { $object = New-Object psobject $message = 'I am an error.' Add-Member -InputObject $object -MemberType ScriptMethod -Name ThrowSomething -Value { throw $message } $errorRecord = $null try { $object.ThrowSomething() } catch { $errorRecord = $_ } $pesterResult = & $getPesterResult -Time 0 -ErrorRecord $errorRecord $pesterResult.FailureMessage | Should -Be $errorRecord.Exception.Message } Context 'failed tests in another file' { $errorRecord = $null $testPath = Join-Path $TestDrive test.ps1 $escapedTestPath = [regex]::Escape($testPath) Set-Content -Path $testPath -Value "$([System.Environment]::NewLine)'One' | Should -Be 'Two'" try { & $testPath } catch { $errorRecord = $_ } $result = & $getPesterResult -Time 0 -ErrorRecord $errorRecord It 'records the correct stack line number' { $result.StackTrace | should -match "${escapedTestPath}: line 2" } It 'records the correct error record' { $result.ErrorRecord -is [System.Management.Automation.ErrorRecord] | Should -be $true $result.ErrorRecord.Exception.Message | Should -match "Expected: 'Two'" } } } InModuleScope -ModuleName Pester -ScriptBlock { Describe "Format-PesterPath" { It "Writes path correctly when it is given `$null" { Format-PesterPath -Path $null | Should -Be $null } If ( (GetPesterOS) -ne 'Windows') { It "Writes path correctly when it is provided as string" { Format-PesterPath -Path "/home/username/folder1" | Should -Be "/home/username/folder1" } It "Writes path correctly when it is provided as string[]" { Format-PesterPath -Path @("/home/username/folder1", "/home/username/folder2") -Delimiter ', ' | Should -Be "/home/username/folder1, /home/username/folder2" } It "Writes path correctly when provided through hashtable" { Format-PesterPath -Path @{ Path = "/home/username/folder1" } | Should -Be "/home/username/folder1" } It "Writes path correctly when provided through array of hashtable" { Format-PesterPath -Path @{ Path = "/home/username/folder1" }, @{ Path = "/home/username/folder2" } -Delimiter ', ' | Should -Be "/home/username/folder1, /home/username/folder2" } } Else { It "Writes path correctly when it is provided as string" { Format-PesterPath -Path "C:\path" | Should -Be "C:\path" } It "Writes path correctly when it is provided as string[]" { Format-PesterPath -Path @("C:\path1", "C:\path2") -Delimiter ', ' | Should -Be "C:\path1, C:\path2" } It "Writes path correctly when provided through hashtable" { Format-PesterPath -Path @{ Path = "C:\path" } | Should -Be "C:\path" } It "Writes path correctly when provided through array of hashtable" { Format-PesterPath -Path @{ Path = "C:\path1" }, @{ Path = "C:\path2" } -Delimiter ', ' | Should -Be "C:\path1, C:\path2" } } } Describe "Write-PesterStart" { It "uses Format-PesterPath with the provided path" { Mock Format-PesterPath if ((GetPesterOS) -ne 'Windows') { $expected = "/tmp" } else { $expected = "C:\temp" } Write-PesterStart -PesterState (New-PesterState) -Path $expected Assert-MockCalled Format-PesterPath -ParameterFilter {$Path -eq $expected} } } Describe ConvertTo-FailureLines { & { $global:PesterDebugPreference_ShowFullErrors = $false $testPath = Join-Path $TestDrive test.ps1 $escapedTestPath = [regex]::Escape($testPath) It 'produces correct message lines.' { try { throw 'message' } catch { $e = $_ } $r = $e | ConvertTo-FailureLines $r.Message[0] | Should -be 'RuntimeException: message' $r.Message.Count | Should -be 1 } It 'failed should produces correct message lines.' { try { 'One' | Should -be 'Two' } catch { $e = $_ } $r = $e | ConvertTo-FailureLines $r.Message[0] | Should -be 'Expected strings to be the same, but they were different.' $r.message[1] | Should -be 'String lengths are both 3.' $r.message[2] | Should -be 'Strings differ at index 0.' $r.Message[3] | Should -be "Expected: 'Two'" $r.Message[4] | Should -be "But was: 'One'" $r.Message[5] | Should -match "'One' | Should -be 'Two'" $r.Message.Count | Should -be 6 } Context 'exception thrown in nested functions in file' { Set-Content -Path $testPath -Value @' function f1 { throw 'f1 message' } function f2 { f1 } f2 '@ try { & $testPath } catch { $e = $_ } $r = $e | ConvertTo-FailureLines It 'produces correct message lines.' { $r.Message[0] | Should -be 'RuntimeException: f1 message' } if ( $e | Get-Member -Name ScriptStackTrace ) { if ((GetPesterOS) -ne 'Windows') { It 'produces correct trace lines.' { $r.Trace[0] | Should -be "at f1, $testPath`: line 2" $r.Trace[1] | Should -be "at f2, $testPath`: line 5" $r.Trace[2] | Should -be "at <ScriptBlock>, $testPath`: line 7" $r.Trace.Count | Should -be 4 } } else { It 'produces correct trace lines.' { $r.Trace[0] | Should -be "at f1, $testPath`: line 2" $r.Trace[1] | Should -be "at f2, $testPath`: line 5" $r.Trace[2] | Should -be "at <ScriptBlock>, $testPath`: line 7" $r.Trace.Count | Should -be 4 } } } else { It 'produces correct trace lines.' { $r.Trace[0] | Should -be "at line: 2 in $testPath" $r.Trace.Count | Should -be 1 } } } Context 'nested exceptions thrown in file' { Set-Content -Path $testPath -Value @' try { throw New-Object System.ArgumentException( 'inner message', 'param_name' ) } catch { throw New-Object System.FormatException( 'outer message', $_.Exception ) } '@ try { & $testPath } catch { $e = $_ } $r = $e | ConvertTo-FailureLines It 'produces correct message lines.' { $r.Message[0] | Should -be 'ArgumentException: inner message' $r.Message[1] | Should -be 'Parameter name: param_name' $r.Message[2] | Should -be 'FormatException: outer message' } if ( $e | Get-Member -Name ScriptStackTrace ) { if ((GetPesterOS) -ne 'Windows') { It 'produces correct trace line.' { $r.Trace[0] | Should -be "at <ScriptBlock>, $testPath`: line 10" $r.Trace.Count | Should -be 2 } } else { It 'produces correct trace line.' { $r.Trace[0] | Should -be "at <ScriptBlock>, $testPath`: line 10" $r.Trace.Count | Should -be 2 } } } else { It 'produces correct trace line.' { $r.Trace[0] | Should -be "at line: 10 in $testPath" $r.Trace.Count | Should -be 1 } } } Context 'Exceptions with no error message property set' { $powershellVersion = $($PSVersionTable.PSVersion.Major) try { $exceptionWithNullMessage = New-Object -TypeName "System.Management.Automation.ParentContainsErrorRecordException" throw $exceptionWithNullMessage } catch { $exception = $_ } $result = $exception | ConvertTo-FailureLines if ($powershellVersion -lt 3) { It 'produces correct message lines' { $result.Message.Length | Should -Be 2 } It 'produces correct trace line' { $result.Trace.Count | Should -Be 1 } } else { It 'produces correct message lines' { $result.Message.Length | Should -Be 0 } It 'produces correct trace line' { $result.Trace.Count | Should -Be 1 } } } } } }
combined_dataset/train/non-malicious/2095.ps1
2095.ps1
Describe "Tests for (error, warning, etc) action preference" -Tags "CI" { $commonActionPreferenceParameterTestCases = foreach ($commonParameterName in [System.Management.Automation.Cmdlet]::CommonParameters | Select-String Action) { @{ ActionPreferenceParameterName = $commonParameterName } } $actionPreferenceVariableTestCases = foreach ($variable in Get-Variable -Name *Preference -Scope Global | Where-Object Value -Is [System.Management.Automation.ActionPreference]) { @{ ActionPreferenceVariableName = $variable.Name StreamName = $variable.Name -replace '(Action)?Preference$' } } $actionPreferenceVariableValueTestCases = @( @{ Value = [System.Management.Automation.ActionPreference]::Suspend DisplayValue = '[System.Management.Automation.ActionPreference]::Suspend' } @{ Value = 'Suspend' DisplayValue = '''Suspend''' } ) BeforeAll { $orgin = $GLOBAL:errorActionPreference function Join-TestCase { [OutputType([Hashtable[]])] [CmdletBinding()] param( [Hashtable[]]$Set1, [Hashtable[]]$Set2 ) foreach ($ht1 in $Set1) { foreach ($ht2 in $Set2) { $ht1 + $ht2 } } } function Test-ActionPreferenceVariableSuspendValue { [CmdletBinding()] param( $Value ) if ($DebugPreference -eq $Value) { Write-Debug -Message 'A debug message' } elseif ($ErrorActionPreference -eq $Value) { Write-Error -Message 'An error message' } elseif ($InformationPreference -eq $Value) { Write-Information -MessageData 'Some information' } elseif ($ProgressPreference -eq $Value) { Write-Progress -Activity 'Some progress' } elseif ($VerbosePreference -eq $Value) { Write-Verbose -Message 'A verbose message' } elseif ($WarningPreference -eq $Value) { Write-Warning -Message 'A warning message' } } } AfterAll { if ($GLOBAL:errorActionPreference -ne $orgin) { $GLOBAL:errorActionPreference = $orgin } } Context 'Setting ErrorActionPreference to stop prevents user from getting the error exception' { $err = $null try { Get-ChildItem nosuchfile.nosuchextension -ErrorAction stop -ErrorVariable err } catch { } It '$err.Count' { $err.Count | Should -Be 1 } It '$err[0] should not be $null' { $err[0] | Should -Not -BeNullOrEmpty } It '$err[0].GetType().Name' { $err[0] | Should -BeOfType "System.Management.Automation.ActionPreferenceStopException" } It '$err[0].ErrorRecord' { $err[0].ErrorRecord | Should -Not -BeNullOrEmpty } It '$err[0].ErrorRecord.Exception.GetType().Name' { $err[0].ErrorRecord.Exception | Should -BeOfType "System.Management.Automation.ItemNotFoundException" } } It 'Action preference of Ignore can be set as a preference variable using a string value' { try { Remove-Variable -Name ErrorActionPreference -Scope Global -Force $GLOBAL:ErrorActionPreference = 'Ignore' $errorCount = $error.Count Get-Process -Name asdfasdfasdf $error.Count | Should -BeExactly $errorCount } finally { Remove-Variable -Name ErrorActionPreference -Scope Global [System.Management.Automation.ActionPreference]$GLOBAL:ErrorActionPreference = $orgin } } It 'Action preference of Ignore can be set as a preference variable using an enumerated value' { try { $GLOBAL:ErrorActionPreference = [System.Management.Automation.ActionPreference]::Ignore $errorCount = $error.Count Get-Process -Name asdfasdfasdf $error.Count | Should -BeExactly $errorCount } finally { $GLOBAL:ErrorActionPreference = $orgin } } It 'The $global:<ActionPreferenceVariableName> variable does not support Suspend' -TestCases $actionPreferenceVariableTestCases { param($ActionPreferenceVariableName) $e = { Set-Variable -Name $ActionPreferenceVariableName -Scope Global -Value ([System.Management.Automation.ActionPreference]::Suspend) } | Should -Throw -ErrorId RuntimeException -PassThru $e.CategoryInfo.Reason | Should -BeExactly 'ArgumentTransformationMetadataException' } It 'A local $<ActionPreferenceVariableName> variable does not support <DisplayValue>' -TestCases (Join-TestCase -Set1 $actionPreferenceVariableTestCases -Set2 $actionPreferenceVariableValueTestCases) { param( $ActionPreferenceVariableName, $StreamName, $Value, $DisplayValue ) $e = { Set-Variable -Name $ActionPreferenceVariableName -Value $Value Test-ActionPreferenceVariableSuspendValue -Value $Value } | Should -Throw -ErrorId "System.NotSupportedException$(if ($StreamName -ne 'Error') {",Microsoft.PowerShell.Commands.Write${StreamName}Command"})" -PassThru $e.CategoryInfo.Reason | Should -BeExactly 'NotSupportedException' } It 'enum disambiguation works' { $errorCount = $error.Count Get-Process -Name asdfasdfsadfsadf -ErrorAction Ig $error.Count | Should -BeExactly $errorCount } It 'The -<ActionPreferenceParameterName> common parameter does not support Suspend on cmdlets' -TestCases $commonActionPreferenceParameterTestCases { param($ActionPreferenceParameterName) $commonParameters = @{ "${ActionPreferenceParameterName}" = [System.Management.Automation.ActionPreference]::Suspend } { Write-Output -InputObject Test @commonParameters } | Should -Throw -ErrorId "ParameterBindingFailed,Microsoft.PowerShell.Commands.WriteOutputCommand" } It 'The -<ActionPreferenceParameterName> common parameter does not support Suspend on functions' -TestCases $commonActionPreferenceParameterTestCases { param($ActionPreferenceParameterName) function MyHelperFunction { [CmdletBinding()] param() "Hello" } $commonParameters = @{ "${ActionPreferenceParameterName}" = [System.Management.Automation.ActionPreference]::Suspend } { MyHelperFunction -ErrorAction Suspend } | Should -Throw -ErrorId "ParameterBindingFailed,MyHelperFunction" } It '<switch> does not take precedence over $ErrorActionPreference' -TestCases @( @{switch = "Verbose" }, @{switch = "Debug" } ) { param($switch) $ErrorActionPreference = "SilentlyContinue" $params = @{ ItemType = "File"; Path = "$testdrive\test.txt"; Confirm = $false } New-Item @params > $null $params += @{$switch = $true } { New-Item @params } | Should -Not -Throw $ErrorActionPreference = "Stop" { New-Item @params } | Should -Throw -ErrorId "NewItemIOError,Microsoft.PowerShell.Commands.NewItemCommand" Remove-Item "$testdrive\test.txt" -Force } } Describe 'ActionPreference.Break tests' -tag 'CI' { BeforeAll { Register-DebuggerHandler } AfterAll { Unregister-DebuggerHandler } Context '-ErrorAction Break should break on a non-terminating error' { BeforeAll { $testScript = { function Test-Break { [CmdletBinding()] param() try { Write-Error 'This is a non-terminating error.' 'This should still run' } catch { 'Do nothing' } finally { 'This finally runs' } } Test-Break -ErrorAction Break } $results = @(Test-Debugger -ScriptBlock $testScript -CommandQueue 'v', 'v') } It 'Should show 3 debugger commands were invoked' { $results.Count | Should -Be 3 } It 'The breakpoint should be the statement that generated the non-terminating error' { $results[0] | ShouldHaveExtent -Line 7 -FromColumn 25 -ToColumn 71 } It 'The second statement should be the statement after that which generated the non-terminating error' { $results[1] | ShouldHaveExtent -Line 9 -FromColumn 25 -ToColumn 48 } It 'The third statement should be the statement in the finally block' { $results[2] | ShouldHaveExtent -Line 13 -FromColumn 25 -ToColumn 44 } } Context '-ErrorAction Break should break on a terminating error' { BeforeAll { $testScript = { function Test-Break { [CmdletBinding()] param() try { Get-Process -TheAnswer 42 'This should not run' } catch { 'Do nothing' } finally { 'This finally runs' } } Test-Break -ErrorAction Break } $results = @(Test-Debugger -ScriptBlock $testScript -CommandQueue 'v', 'v') } It 'Should show 3 debugger commands were invoked' { $results.Count | Should -Be 3 } It 'The breakpoint should be the statement that generated the terminating error' { $results[0] | ShouldHaveExtent -Line 7 -FromColumn 25 -ToColumn 50 } It 'The second statement should be the statement in the catch block where the terminating error is caught' { $results[1] | ShouldHaveExtent -Line 11 -FromColumn 25 -ToColumn 37 } It 'The third statement should be the statement in the finally block' { $results[2] | ShouldHaveExtent -Line 13 -FromColumn 25 -ToColumn 44 } } Context '-ErrorAction Break should not break on a naked rethrow' { BeforeAll { $testScript = { function Test-Break { [CmdletBinding()] param() try { try { Get-Process -TheAnswer 42 } catch { throw } } catch { } } Test-Break -ErrorAction Break } $results = @(Test-Debugger -ScriptBlock $testScript) } It 'Should show 1 debugger command was invoked' { $results.Count | Should -Be 1 } It 'The breakpoint should be the statement that generated the terminating error' { $results[0] | ShouldHaveExtent -Line 8 -FromColumn 29 -ToColumn 54 } } Context '-ErrorAction Break should break when throwing a specific error or object' { BeforeAll { $testScript = { function Test-Break { [CmdletBinding()] param() try { try { Get-Process -TheAnswer 42 } catch { throw $_ } } catch { } } Test-Break -ErrorAction Break } $results = @(Test-Debugger -ScriptBlock $testScript) } It 'Should show 2 debugger commands were invoked' { $results.Count | Should -Be 2 } It 'The first breakpoint should be the statement that generated the terminating error' { $results[0] | ShouldHaveExtent -Line 8 -FromColumn 29 -ToColumn 54 } It 'The second breakpoint should be the statement that threw $_' { $results[1] | ShouldHaveExtent -Line 10 -FromColumn 29 -ToColumn 37 } } Context 'Other message types should break on their corresponding messages when requested' { BeforeAll { $testScript = { function Test-Break { [CmdletBinding()] param() Write-Warning -Message 'This is a warning message' Write-Verbose -Message 'This is a verbose message' Write-Debug -Message 'This is a debug message' Write-Information -MessageData 'This is an information message' Write-Progress -Activity 'This shows progress' } Test-Break -WarningAction Break -InformationAction Break *>$null $WarningPreference = $VerbosePreference = $DebugPreference = $InformationPreference = $ProgressPreference = [System.Management.Automation.ActionPreference]::Break Test-Break *>$null } $results = @(Test-Debugger -ScriptBlock $testScript) } It 'Should show 7 debugger commands were invoked' { $results.Count | Should -Be 7 } It 'Write-Warning should trigger a breakpoint from -WarningAction Break' { $results[0] | ShouldHaveExtent -Line 5 -FromColumn 21 -ToColumn 71 } It 'Write-Information should trigger a breakpoint from -InformationAction Break' { $results[1] | ShouldHaveExtent -Line 8 -FromColumn 21 -ToColumn 84 } It 'Write-Warning should trigger a breakpoint from $WarningPreference = [System.Management.Automation.ActionPreference]::Break' { $results[2] | ShouldHaveExtent -Line 5 -FromColumn 21 -ToColumn 71 } It 'Write-Verbose should trigger a breakpoint from $VerbosePreference = [System.Management.Automation.ActionPreference]::Break' { $results[3] | ShouldHaveExtent -Line 6 -FromColumn 21 -ToColumn 71 } It 'Write-Debug should trigger a breakpoint from $DebugPreference = [System.Management.Automation.ActionPreference]::Break' { $results[4] | ShouldHaveExtent -Line 7 -FromColumn 21 -ToColumn 67 } It 'Write-Information should trigger a breakpoint from $InformationPreference = [System.Management.Automation.ActionPreference]::Break' { $results[5] | ShouldHaveExtent -Line 8 -FromColumn 21 -ToColumn 84 } It 'Write-Progress should trigger a breakpoint from $ProgressPreference = [System.Management.Automation.ActionPreference]::Break' { $results[6] | ShouldHaveExtent -Line 9 -FromColumn 21 -ToColumn 67 } } Context 'ActionPreference.Break in jobs' { BeforeAll { $job = Start-Job { $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Break Get-Process -TheAnswer 42 } } AfterAll { Remove-Job -Job $job -Force } It 'ActionPreference.Break should break in a running job' { Wait-UntilTrue -sb { $job.State -eq 'AtBreakpoint' } -TimeoutInMilliseconds (10 * 1000) -IntervalInMilliseconds 100 | Should -BeTrue } } }
combined_dataset/train/non-malicious/379.ps1
379.ps1
Describe "Register-PSFConfig Unit Tests" -Tag "CI", "Pipeline", "Unit" { BeforeAll { Get-PSFConfig -Module Register-PSFConfig -Force | ForEach-Object { $null = [PSFramework.Configuration.ConfigurationHost]::Configurations.Remove($_.FullName) } } AfterAll { Get-PSFConfig -Module Register-PSFConfig -Force | ForEach-Object { $null = [PSFramework.Configuration.ConfigurationHost]::Configurations.Remove($_.FullName) } } It "Should have the designed for parameters & sets" { (Get-Command Register-PSFConfig).ParameterSets.Name | Should -Be 'Default', 'Name' $properties = 'Config', 'FullName', 'Module', 'Name', 'Scope', 'EnableException', 'Verbose', 'Debug', 'ErrorAction', 'WarningAction', 'InformationAction', 'ErrorVariable', 'WarningVariable', 'InformationVariable', 'OutVariable', 'OutBuffer', 'PipelineVariable' Compare-Object $properties ((Get-Command Register-PSFConfig).Parameters.Keys | Remove-PSFNull -Enumerate) | Should -BeNullOrEmpty } Context "Validating registry persistence" { $module = Get-Module PSFramework | Sort-Object Version -Descending | Select-Object -First 1 $pathRegistryUserDefault = & $module { $path_RegistryUserDefault } $pathRegistryUserEnforced = & $module { $path_RegistryUserEnforced } $pathRegistryMachineDefault = & $module { $path_RegistryMachineDefault } $pathRegistryMachineEnforced = & $module { $path_RegistryMachineEnforced } Set-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting1' -Value 24 It "Should correctly persist to the user-default registry location" { { Get-ItemPropertyValue -Path $pathRegistryUserDefault -Name 'Register-PSFConfig.Phase1.Setting1' -ErrorAction Stop } | Should -Throw Register-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting1' -Scope UserDefault Get-ItemPropertyValue -Path $pathRegistryUserDefault -Name 'Register-PSFConfig.Phase1.Setting1' | Should -Be 'int:24' Unregister-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting1' -Scope UserDefault { Get-ItemPropertyValue -Path $pathRegistryUserDefault -Name 'Register-PSFConfig.Phase1.Setting1' -ErrorAction Stop } | Should -Throw } It "Should correctly persist to the user-mandatory registry location" { { Get-ItemPropertyValue -Path $pathRegistryUserEnforced -Name 'Register-PSFConfig.Phase1.Setting1' -ErrorAction Stop } | Should -Throw Register-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting1' -Scope UserMandatory Get-ItemPropertyValue -Path $pathRegistryUserEnforced -Name 'Register-PSFConfig.Phase1.Setting1' | Should -Be 'int:24' Unregister-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting1' -Scope UserMandatory { Get-ItemPropertyValue -Path $pathRegistryUserEnforced -Name 'Register-PSFConfig.Phase1.Setting1' -ErrorAction Stop } | Should -Throw } if (Test-PSFPowerShell -Elevated) { It "Should correctly persist to the system-default registry location" { { Get-ItemPropertyValue -Path $pathRegistryMachineDefault -Name 'Register-PSFConfig.Phase1.Setting1' -ErrorAction Stop} | Should -Throw Register-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting1' -Scope SystemDefault Get-ItemPropertyValue -Path $pathRegistryMachineDefault -Name 'Register-PSFConfig.Phase1.Setting1' | Should -Be 'int:24' Unregister-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting1' -Scope SystemDefault { Get-ItemPropertyValue -Path $pathRegistryMachineDefault -Name 'Register-PSFConfig.Phase1.Setting1' -ErrorAction Stop } | Should -Throw } It "Should correctly persist to the system-mandatory registry location" { { Get-ItemPropertyValue -Path $pathRegistryMachineEnforced -Name 'Register-PSFConfig.Phase1.Setting1' -ErrorAction Stop } | Should -Throw Register-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting1' -Scope SystemMandatory Get-ItemPropertyValue -Path $pathRegistryMachineEnforced -Name 'Register-PSFConfig.Phase1.Setting1' | Should -Be 'int:24' Unregister-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting1' -Scope SystemMandatory { Get-ItemPropertyValue -Path $pathRegistryMachineEnforced -Name 'Register-PSFConfig.Phase1.Setting1' -ErrorAction Stop } | Should -Throw } } } Context "Validating file persistence" { $module = Get-Module PSFramework | Sort-Object Version -Descending | Select-Object -First 1 $pathFileUserLocal = & $module { $path_FileUserLocal } $pathFileUserShared = & $module { $path_FileUserShared } $pathFileSystem = & $module { $path_FileSystem } Set-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting2' -Value 32 It "Should correctly persist to the user-local specific file" { $tempPathRoot = $pathFileUserLocal $tempPath = Join-Path $tempPathRoot "psf_config.json" if (Test-Path $tempPath) { Rename-Item -Path $tempPath -NewName 'psf_config.json.old' } Test-Path $tempPath | Should -Be $false Register-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting2' -Scope FileUserLocal Get-Content $tempPath | Select-String 'Register-PSFConfig.Phase1.Setting2' | Should -Not -BeNullOrEmpty Unregister-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting2' -Scope FileUserLocal Test-Path $tempPath | Should -Be $false if (Test-Path (Join-Path $tempPathRoot "psf_config.json.old")) { Rename-Item -Path (Join-Path $tempPathRoot "psf_config.json.old") -NewName 'psf_config.json' -Force } } It "Should correctly persist to the user-shared specific file" { $tempPathRoot = $pathFileUserShared $tempPath = Join-Path $tempPathRoot "psf_config.json" if (Test-Path $tempPath) { Rename-Item -Path $tempPath -NewName 'psf_config.json.old' } Test-Path $tempPath | Should -Be $false Register-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting2' -Scope FileUserShared Get-Content $tempPath | Select-String 'Register-PSFConfig.Phase1.Setting2' | Should -Not -BeNullOrEmpty Unregister-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting2' -Scope FileUserShared Test-Path $tempPath | Should -Be $false if (Test-Path (Join-Path $tempPathRoot "psf_config.json.old")) { Rename-Item -Path (Join-Path $tempPathRoot "psf_config.json.old") -NewName 'psf_config.json' -Force } } if (Test-PSFPowerShell -Elevated) { It "Should correctly persist to the system-wide file" { $tempPathRoot = $pathFileSystem $tempPath = Join-Path $tempPathRoot "psf_config.json" if (Test-Path $tempPath) { Rename-Item -Path $tempPath -NewName 'psf_config.json.old' } Test-Path $tempPath | Should -Be $false Register-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting2' -Scope FileSystem Get-Content $tempPath | Select-String 'Register-PSFConfig.Phase1.Setting2' | Should -Not -BeNullOrEmpty Unregister-PSFConfig -FullName 'Register-PSFConfig.Phase1.Setting2' -Scope FileSystem Test-Path $tempPath | Should -Be $false if (Test-Path (Join-Path $tempPathRoot "psf_config.json.old")) { Rename-Item -Path (Join-Path $tempPathRoot "psf_config.json.old") -NewName 'psf_config.json' -Force } } } } Context "Ensuring Content based Data Integrity" { $module = Get-Module PSFramework | Sort-Object Version -Descending | Select-Object -First 1 $pathRegistryUserDefault = & $module { $path_RegistryUserDefault } $pathFileUserLocal = & $module { $path_FileUserLocal } Set-PSFConfig -FullName 'Register-PSFConfig.Phase2.Setting1' -Value 1 Set-PSFConfig -FullName 'Register-PSFConfig.Phase2.Setting2' -Value 2 Set-PSFConfig -FullName 'Register-PSFConfig.Phase2.Setting3' -Value 3 Set-PSFConfig -FullName 'Register-PSFConfig.Phase2.Setting4' -Value 4 Set-PSFConfig -FullName 'Register-PSFConfig.Phase2.Setting5' -Value 5 -SimpleExport Set-PSFConfig -FullName 'Register-PSFConfig.Phase2.Setting6' -Value 6 It "should export single and multiple items to registry without issues" { { Register-PSFConfig -FullName 'Register-PSFConfig.Phase2.Setting1' } | Should -Not -Throw { Register-PSFConfig -FullName 'Register-PSFConfig.Phase2.Setting2', 'Register-PSFConfig.Phase2.Setting3' } | Should -Not -Throw $hive = Get-ItemProperty -Path $pathRegistryUserDefault $hive.'Register-PSFConfig.Phase2.Setting1' | Should -Be 'Int:1' $hive.'Register-PSFConfig.Phase2.Setting2' | Should -Be 'Int:2' $hive.'Register-PSFConfig.Phase2.Setting3' | Should -Be 'Int:3' Unregister-PSFConfig -Module Register-PSFConfig $hive = Get-ItemProperty -Path $pathRegistryUserDefault $hive.'Register-PSFConfig.Phase2.Setting1' | Should -BeNullOrEmpty $hive.'Register-PSFConfig.Phase2.Setting2' | Should -BeNullOrEmpty $hive.'Register-PSFConfig.Phase2.Setting3' | Should -BeNullOrEmpty } It "should export single and multiple items to file without issues" { { Register-PSFConfig -FullName 'Register-PSFConfig.Phase2.Setting4' -Scope FileUserLocal } | Should -Not -Throw { Register-PSFConfig -FullName 'Register-PSFConfig.Phase2.Setting5', 'Register-PSFConfig.Phase2.Setting6' -Scope FileUserLocal } | Should -Not -Throw $localFile = Join-Path $pathFileUserLocal 'psf_config.json' Get-Content -Path $localFile | Select-String 'Register-PSFConfig.Phase2.Setting4' | Should -Not -BeNullOrEmpty Get-Content -Path $localFile | Select-String 'Register-PSFConfig.Phase2.Setting5' | Should -Not -BeNullOrEmpty Get-Content -Path $localFile | Select-String 'Register-PSFConfig.Phase2.Setting6' | Should -Not -BeNullOrEmpty Unregister-PSFConfig -Module Register-PSFConfig -Scope FileUserLocal if (Test-Path $localFile) { Get-Content -Path $localFile | Select-String 'Register-PSFConfig.Phase2.Setting4' | Should -BeNullOrEmpty Get-Content -Path $localFile | Select-String 'Register-PSFConfig.Phase2.Setting5' | Should -BeNullOrEmpty Get-Content -Path $localFile | Select-String 'Register-PSFConfig.Phase2.Setting6' | Should -BeNullOrEmpty } } } }
combined_dataset/train/non-malicious/sample_10_86.ps1
sample_10_86.ps1
#************************************************ # DC_DiskInfo.ps1 # Version 1.0 # Date: 09-05-2023 # Author: Edmund Spatariu # Updated: # Description: This script obtains Disk Info and associate a drive letter with corresponding LUN, saving output to a # file named $ComputerName_DC_DiskInfo.txt #************************************************ #Last Updated Date: 09-05-2023 #Updated By: #Description: #************************************************ if($debug -eq $true){[void]$shell.popup("Run DC_DiskInfo.ps1")} Import-LocalizedData -BindingVariable DiskInfoStrings -FileName DC_DiskInfo -UICulture en-us Write-DiagProgress -Activity $DiskInfoStrings.ID_DiskInfo -Status $DiskInfoStrings.ID_DiskInfoRunning $fileDescription = $DiskInfoStrings.ID_DiskInfoOutput $sectionDescription = $DiskInfoStrings.ID_DiskInfoOutputDesc $OutputFile = $ComputerName + "_DiskInfo.txt" "==============================================" | Out-File -FilePath $OutputFile "Associate Drive Letter with LUN" | Out-File -FilePath $OutputFile -append "==============================================" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append Get-CimInstance Win32_DiskDrive | ForEach-Object { $disk = $_ $partitions = "ASSOCIATORS OF " + "{Win32_DiskDrive.DeviceID='$($disk.DeviceID)'} " + "WHERE AssocClass = Win32_DiskDriveToDiskPartition" Get-CimInstance -Query $partitions | ForEach-Object { $partition = $_ $drives = "ASSOCIATORS OF " + "{Win32_DiskPartition.DeviceID='$($partition.DeviceID)'} " + "WHERE AssocClass = Win32_LogicalDiskToPartition" Get-CimInstance -Query $drives | ForEach-Object { Write-Host "" New-Object -Type PSCustomObject -Property @{ DriveLetter = $_.DeviceID VolumeName = $_.VolumeName FileSystem = $_.Filesystem Partition = $partition.Name Size = $_.Size FreeSpace = $_.FreeSpace Disk = $disk.DeviceID DiskModel = $disk.Model LUN = $disk.SCSILogicalUnit Port = $disk.SCSIPort BUS = $disk.SCSIBus } } | Sort-Object -Property DriveLetter |Select-Object DriveLetter, VolumeName, FileSystem, Partition, Size, FreeSpace, Disk, DiskModel, LUN, Port, BUS } } | Out-File $OutputFile -append "`n`n`n`n`n" | Out-File -FilePath $OutputFile -append "==============================================" | Out-File -FilePath $OutputFile -append "Get-CimInstance -Class Win32_DiskDrive" | Out-File -FilePath $OutputFile -append "==============================================" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append Get-CimInstance -Class Win32_DiskDrive -Namespace 'root\CIMV2' | Format-List -Property * | Out-File -Append $OutputFile "`n`n`n`n`n" | Out-File -FilePath $OutputFile -append "==============================================" | Out-File -FilePath $OutputFile -append "Get-CimInstance -Class Win32_LogicalDisk" | Out-File -FilePath $OutputFile -append "==============================================" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append Get-CimInstance -Class Win32_LogicalDisk -Namespace 'root\CIMV2' | Format-List -Property * | Out-File -Append $OutputFile "`n`n`n`n`n" | Out-File -FilePath $OutputFile -append "==============================================" | Out-File -FilePath $OutputFile -append "Get-CimInstance -Class Win32_DiskPartition" | Out-File -FilePath $OutputFile -append "==============================================" | Out-File -FilePath $OutputFile -append "`n" | Out-File -FilePath $OutputFile -append Get-CimInstance -Class Win32_DiskPartition -Namespace 'root\CIMV2' | Format-List -Property * | Out-File -Append $OutputFile CollectFiles -filesToCollect $OutputFile -fileDescription $fileDescription -sectionDescription $sectionDescription # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCEYyWUGOQJapkS # WT32K2spdXRX9g6KVh+pEYPLkGtU/6CCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIIQY # OKJPbbbPczZTbjZrkkpP8UPUQYBnAVL4n0YmtoabMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAYhwklvM3kFpa6hpavY8rt+81UMqiGLS0UoWA # h+arJ4v1m6eDSdreCkfKOjH+5aeh91Vo+v1s+8IYd08FXzXHmQyaM36rqDev/dHK # AS68pZrK5TTHsHIlGVsNqE7vJdWSM0J7OjyGXGPeavVUuoSIfxjeoQTk4D2DadDm # iowU82meC5XZaPyMRyoLowjBznubhqVY++NPMMsZZmfXMgGRVSY+3YQ5eKjhqedv # 6LRvXVEW2+JueZAHfemIooxUbiKulGdSnnr28SJKXj9uLaNRVhvDBOrfyvyDDsjG # qSooYm1H0G55kktpOXRIizHv4aHiK3t7YYu/OU01gF8LskfWzqGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDDakpCibdx0+QplYvqcgKhkriZCeKL+lqD # 6StK1DMzswIGZxqPzfEIGBMyMDI0MTAyODExNDA0My41MjVaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046MzMwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAebZQp7qAPh94QAB # AAAB5jANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MTVaFw0yNTAzMDUxODQ1MTVaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzMwMy0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC9vph84tgluEzm/wpNKlAj # cElGzflvKADZ1D+2d/ieYYEtF2HKMrKGFDOLpLWWG5DEyiKblYKrE2nt540OGu35 # Zx0gXJBE0zWanZEAjCjt4eGBi+uakZsk70zHTQHHyfP+B3m2BSSNFPhgsVIPp6vo # /9t6OeNezIwX5E5+VwEG37nZgEexQF2fQZYbxQ1AauqDvRdXsSpK1dh1UBt9EaMs # zuucaR5nMwQN6sDjG99FzdK9Atzbn4SmlsoLUtRAh/768sKd0Y1hMmKVHwIX8/4J # uURUBRZ0JWu0NYQBp8khku18Q8CAQ500tFB7VH3pD8zoA4lcA7JkxTGoPKrufm+l # RZAA4iMgbcLZ2P/xSdnKFxU8vL31RoNlZJiGL5MqTXvvyBLz+MRP4En9Nye1N8x/ # lJD1stdNo5wJG+mgXsE/zfzg2GaVqQczFHg0Nl8bpIqnNFUReQRq3C1jVYMCSceg # NzHeYtw5OmZ/7eVnRmjXlCsLvdsxOzc1YVn6nZLkQD5y31HYrB9iIHuswhaMv2hJ # NNjVndkpWy934PIZuWTMk360kjXPFwl2Wv1Tzm9tOrCq8+l408KIL6J+efoGNkR8 # YB3M+u1tYeVDO/TcObGHxaGFB6QZxAUpnfB5N/MmBNxMOqzG1N8QiwW8gtjjMJiF # Bf6iYYrCjtRwF7IPdQLFtQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFOUEMXntN54+ # 11ZM+Qu7Q5rg3Fc9MB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBhbuogTapRsuwS # kaFMQ6dyu8ZCYUpWQ8iIrbi40tU2hK6pHgu0hj0z/9zFRRx5DfhukjvbjA/dS5VY # fxz1EIbPlt897MJ2sBGO2YLYwYelfJpDwbB0XS9Zkrqpzq6X/lmDQDn3G5vcYpYQ # CJ55LLvyFlJ195AVo4Wy8UX5p7g9W3MgNHQMpM+EV64+cszj4Ho5aQmeKGtKy7w7 # 2eRY/vWDuptrvzruFNmKCIt12UcA5BOsXp1Ptkjx2yRsCj77DSml0zVYjqW/ISWk # rGjyeVJ+khzctxaLkklVwCxigokD6fkWby0hCEKTOTPMzhugPIAcxcHsR2sx01YR # a9pH2zvddsuBEfSFG6Cj0QSvEZ/M9mJ+h4miaQSR7AEbVGDbyRKkYn80S+3AmRlh # 3ZOe+BFqJ57OXdeIDSHbvHzJ7oTqG896l3eUhPsZg69fNgxTxlvRNmRE/+61Yj7Z # 1uB0XYQP60rsMLdTlVYEyZUl5MLTL5LvqFozZlS2Xoji4BEP6ddVTzmHJ4odOZMW # TTeQ0IwnWG98vWv/roPegCr1G61FVrdXLE3AXIft4ZN4ZkDTnoAhPw7DZNPRlSW4 # TbVj/Lw0XvnLYNwMUA9ouY/wx9teTaJ8vTkbgYyaOYKFz6rNRXZ4af6e3IXwMCff # CaspKUXC72YMu5W8L/zyTxsNUEgBbTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjMzMDMtMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQDiWNBeFJ9jvaErN64D1G86eL0mu6CBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smrUDAi # GA8yMDI0MTAyODA2MTg1NloYDzIwMjQxMDI5MDYxODU2WjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDqyatQAgEAMAcCAQACAiZmMAcCAQACAhORMAoCBQDqyvzQAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAEBxNUvMJ0O0UDu8Og9sWf208vhS # kFloumMW1RvgFdb92+THK6H4x3VJwAos7fSTrcyd3rBsbPaWsDzEE8lSpQZRl1tT # +xqJ9FN0+DhU7VbhQzFplSEQLO3ZUNQUMNltvLzXqrbJuEfQiXerQxhkutzT4Ceh # f10MosdYIq9nQ6IhxL20siq9Nudp03+xjjbZmZjrxvnqZQ1GXhucuPUTYDKdOdHa # +dU71t77KkdCeO70ybxR1x1yXXr+kaA0X/o61KSn3G2WSmzdwnX2nOuuBi5Wptv9 # NmwZTYfI/s4Qh0GVxQ1vRelr66myMkPQ75xHUd8APnZdEG/h251KOccn5yUxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAebZ # Qp7qAPh94QABAAAB5jANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCBbeJbxCh+befIzFTMBkJYs0d3G # IR2Q52+dynzXDiQEjjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIM+7o4ao # HrMJaG8gnLO1q16hIYcRnoy6FnOCbnSD0sZZMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAHm2UKe6gD4feEAAQAAAeYwIgQgTB6qQcMd # P6fMqtySduFITAgYbREF90zOkmEDwIb58bEwDQYJKoZIhvcNAQELBQAEggIAHyWo # vCt/qPKQnS9U9KNKd3vZ4nTawdZNUenmh8BiHRS1kzUhnge5wHEMa1PxqLtde0Gp # u2q7gsevwvjjG+r5sy7I612+dXOyxTZtVySR+D6iCpDbZUKvdX5p68zJm5Y0uuO+ # /RC/X480QLXbWJlcWqrRY3+3Dwm7skEp4gaR99zRDpQDbt7RYdnnNDLEahKa70KO # 5xlNIjbkKHb5UuMsA0Y3niXSYjDS7wHmw2qWBYEWcNZEFFmPj2b/rnFybRUf1m/L # M040NwIZoP/WthrT69c0WIk+kD1jCFj57nKhneSyFbzhhp3WOjnuPIUTU099sB7f # f1ZrJgwCPFpl9fkWAdkQkFwMsnJW8JIYJ8OeBGk99fR0KOoBxI9Sx3kZBb5DAKKt # t3gN/gc5j+NmkzunlHMFQyh/nOrpP4LHSSwpJQ8g+buEFFpzinVuRRYq/lsGCS8W # U9b8lAIP0JwKk1RBCX3rEPJXQ202DvSvxtPkAXBLQgD1yr8MgZsYEY8GFawjkEPD # D3fL+JEYXe5kNDnLTJOl7Syk31rK4uFV2T/erGcOba1K00Bg06L27/GUFaEFTWYp # pfFpFjaz+5DAGLp0eZmp/kik8G1/F1osuOLvIgG+aDWM1XyVxCjGmBTv3mT1MlDi # tJOoRgE4m4PpkOtxFq+gBFVdVP7pQWVdSUDJHqE= # SIG # End signature block
combined_dataset/train/non-malicious/ConvertTo-Hex_11.ps1
ConvertTo-Hex_11.ps1
# Ported from C# technique found here: http://forums.asp.net/p/1298956/2529558.aspx param ( [string]$SidString ) # Create SID .NET object using SID string provided $sid = New-Object system.Security.Principal.SecurityIdentifier $sidstring # Create a byte array of the proper length $sidBytes = New-Object byte[] $sid.BinaryLength #Convert to bytes $sid.GetBinaryForm( $sidBytes, 0 ) # Iterate through bytes, converting each to the hexidecimal equivalent $hexArr = $sidBytes | ForEach-Object { $_.ToString("X2") } # Join the hex array into a single string for output $hexArr -join ''
combined_dataset/train/non-malicious/sample_47_23.ps1
sample_47_23.ps1
# Localized 04/14/2024 08:54 PM (GMT) 303:7.1.41104 Add-AppDevPackage.psd1 # Culture = "en-US" ConvertFrom-StringData @' ###PSLOC PromptYesString=&Tak PromptNoString=&Nie BundleFound=Znaleziono pakiet: {0} PackageFound=Znaleziono pakiet: {0} EncryptedBundleFound=Znaleziono zaszyfrowany zbiór: {0} EncryptedPackageFound=Znaleziono zaszyfrowany pakiet: {0} CertificateFound=Znaleziono certyfikat: {0} DependenciesFound=Znaleziono pakiety zależności: GettingDeveloperLicense=Trwa uzyskiwanie licencji dewelopera... InstallingCertificate=Trwa instalowanie certyfikatu... InstallingPackage=\nTrwa instalowanie aplikacji... AcquireLicenseSuccessful=Pomyślnie uzyskano licencję dewelopera. InstallCertificateSuccessful=Pomyślnie zainstalowano certyfikat. Success=\nPowodzenie: pomyślnie zainstalowano aplikację. WarningInstallCert=\nZamierzasz zainstalować certyfikat cyfrowy w magazynie zaufanych osób na komputerze. Stanowi to poważne zagrożenie bezpieczeństwa. Należy to robić tylko w sytuacji, gdy ufasz nadawcy certyfikatu cyfrowego.\n\nPo zakończeniu korzystania z aplikacji usuń ręcznie skojarzony certyfikat cyfrowy. Odpowiednie instrukcje są dostępne pod tym adresem: http://go.microsoft.com/fwlink/?LinkId=243053\n\nCzy na pewno chcesz kontynuować?\n\n ElevateActions=\nPrzed zainstalowaniem tej aplikacji musisz wykonać następujące czynności: ElevateActionDevLicense=\t- Uzyskaj licencję dewelopera ElevateActionCertificate=\t- Zainstaluj certyfikat podpisywania ElevateActionsContinue=Aby móc kontynuować, musisz podać poświadczenia administratora. Zaakceptuj monit kontroli konta użytkownika i podaj hasło administratora, gdy zostanie wyświetlony odpowiedni monit. ErrorForceElevate=Aby móc kontynuować, musisz podać poświadczenia administratora. Uruchom ten skrypt bez parametru -Force lub w oknie programu PowerShell z podniesionym poziomem uprawnień. ErrorForceDeveloperLicense=Uzyskanie licencji dewelopera wymaga interakcji użytkownika. Uruchom ponownie skrypt bez parametru -Force. ErrorLaunchAdminFailed=Błąd: nie można uruchomić nowego procesu jako administrator. ErrorNoScriptPath=Błąd: musisz uruchomić ten skrypt z pliku. ErrorNoPackageFound=Błąd: nie znaleziono pakietu w katalogu skryptu. Upewnij się, że w tym samym katalogu co skrypt znajduje się pakiet, który chcesz zainstalować. ErrorManyPackagesFound=Błąd: znaleziono więcej niż jeden pakiet w katalogu skryptu. Upewnij się, że w tym samym katalogu co skrypt znajduje się tylko pakiet, który chcesz zainstalować. ErrorPackageUnsigned=Błąd: pakiet nie ma podpisu cyfrowego lub jego podpis jest uszkodzony. ErrorNoCertificateFound=Błąd: nie znaleziono certyfikatu w katalogu skryptu. Upewnij się, że w tym samym katalogu co skrypt znajduje się certyfikat używany do podpisywania instalowanego pakietu. ErrorManyCertificatesFound=Błąd: znaleziono więcej niż jeden certyfikat w katalogu skryptu. Upewnij się, że w tym samym katalogu co skrypt znajduje się tylko certyfikat używany do podpisywania instalowanego pakietu. ErrorBadCertificate=Błąd: plik „{0}” nie jest prawidłowym certyfikatem cyfrowym. Program CertUtil zwrócił kod błędu {1}. ErrorExpiredCertificate=Błąd: certyfikat dewelopera „{0}” wygasł. Jedną z możliwych przyczyn jest niepoprawna data i godzina zegara systemowego. Jeśli ustawienia systemu są poprawne, skontaktuj się z właścicielem aplikacji w celu ponownego utworzenia pakietu przy użyciu prawidłowego certyfikatu. ErrorCertificateMismatch=Błąd: certyfikat nie jest zgodny z certyfikatem, za pomocą którego podpisano pakiet. ErrorCertIsCA=Błąd: certyfikat nie może być urzędem certyfikacji. ErrorBannedKeyUsage=Błąd: certyfikat nie może mieć następującego rozszerzonego użycia klucza: {0}. Użycie klucza musi być nieokreślone lub mieć wartość „DigitalSignature”. ErrorBannedEKU=Błąd: certyfikat nie może mieć następującego rozszerzonego użycia klucza: {0}. Dozwolone są tylko rozszerzone użycia klucza podpisywania kodu i okresu istnienia. ErrorNoBasicConstraints=Błąd: certyfikat nie ma podstawowego rozszerzenia ograniczeń. ErrorNoCodeSigningEku=Błąd: certyfikat nie ma rozszerzonego klucza użycia na potrzeby podpisywania kodu. ErrorInstallCertificateCancelled=Błąd: anulowano instalację certyfikatu. ErrorCertUtilInstallFailed=Błąd: nie można zainstalować certyfikatu. Program CertUtil zwrócił kod błędu {0}. ErrorGetDeveloperLicenseFailed=Błąd: nie można uzyskać licencji dewelopera. Aby uzyskać więcej informacji, zobacz http://go.microsoft.com/fwlink/?LinkID=252740. ErrorInstallCertificateFailed=Błąd: nie można zainstalować certyfikatu. Stan: {0}. Aby uzyskać więcej informacji, zobacz http://go.microsoft.com/fwlink/?LinkID=252740. ErrorAddPackageFailed=Błąd: nie można zainstalować aplikacji. ErrorAddPackageFailedWithCert=Błąd: nie można zainstalować aplikacji. Aby zapewnić bezpieczeństwo, rozważ odinstalowanie certyfikatu podpisywania do czasu, gdy zainstalowanie aplikacji będzie możliwe. Odpowiednie instrukcje można znaleźć pod tym adresem:\nhttp://go.microsoft.com/fwlink/?LinkId=243053 '@
combined_dataset/train/non-malicious/Search-NetworkService.ps1
Search-NetworkService.ps1
#Define PreReqs $timeStamp = Get-Date -UFormat "%m-%d-%Y-%H-%M" $systemVars = Gwmi Win32_ComputerSystem -Comp "." $userName = $systemVars.UserName $compName = $systemVars.Name #User Vars $serviceName = "Spooler" # Spooler will check the Print Spooler <<< Change To Suit Your needs $errorLog = "C:\\Temp\\Log_"+$serviceName+"_"+$timeStamp+"_Errors.txt" #Service Not Installed $fullLog = "C:\\Temp\\Log_"+$serviceName+"_"+$timeStamp+"_All.txt" #Services Needed To Be Started / Running #Write Some Info To Logs "Check Service: " + $serviceName > $errorLog; Get-Date >> $errorLog; $compName >> $errorLog; $userName >> $errorLog; "_____________" >> $errorLog; "" >> $errorLog; "Check Service: " + $serviceName > $fullLog; Get-Date >> $fullLog; $compName >> $fullLog; $userName >> $fullLog; "_____________" >> $fullLog; "" >> $fullLog; # Define Functions function Get-NetView { switch -regex (NET.EXE VIEW) { "^\\\\\\\\(?<Name>\\S+)\\s+" {$matches.Name}} } function Process-PCs ($currentName) { $olStatus = Ping-Address $currentName If ($olStatus -eq "True") { Check-Service $currentName } #Else {Write-Host "PC Not Online"} Write-Host " " } function Ping-Address ($pingAddress) { $ping = new-object system.net.networkinformation.ping $pingReply = $ping.send($pingAddress) If ($pingReply.status -eq "Success") { Return "True" } Else { Return "False" } } function Check-Service ($currentName) { $currentService = Get-Service -ComputerName $currentName -Name $serviceName -ErrorAction SilentlyContinue If ($currentService.Status -eq $Null){ $currentServiceStatus = "Not Installed" $currentName >> $errorLog } ElseIf ($currentService.Status -eq "Running"){ $currentServiceStatus = "Running" } ElseIf ($currentService.Status -eq "Stopped"){ $currentServiceStatus = "Stopped" } Else { $currentServiceStatus = "Unknown" } Write-Host $serviceName " is " $currentServiceStatus " on " $currentName $serviceName + " was " + $currentServiceStatus + " on " + $currentName >> $fullLog If ($currentService.Status -eq "Stopped"){ Write-Host "Service was stoppped, trying to start it . . ." $currentService | Start-Service -ErrorAction SilentlyContinue If ($currentService.Status -eq "Running"){ " Service Successfully Started" >> $fullLog } Else { " Service Could Not Be Started" >> $fullLog } } } #Run Everything cls Get-NetView | %{Process-PCs $_} # Test a single PC, Uncomment line below change pc name and comment line above # Process-PCs "localhost" | %{Process-PCs $_}
combined_dataset/train/non-malicious/sample_8_26.ps1
sample_8_26.ps1
#************************************************ # TS_PrintHpzui4wmCheck.ps1 # Version 1.0.1 # Date: 2/29/12 # Author: jasonf # Description: KB947477 Detect the OEM HP driver hpzui4wm.DLL. This driver is known to cause the print spooler to crash or hang. #************************************************ #strings #<!-- 230,214 to 230,217 - 2335.KB947477_HPDLL --> # <string index="230214" name="ID_KB947477_HPDLLTitle">Checking Spooler Service</string> # <string index="230215" name="ID_KB947477_HPDLLDescription">Checking loaded modules in Spooler Service.</string> # <string index="230216" name="ID_KB947477_HPDLLRC" localize="false">The print spooler may crash or hang due to OEM HP print driver</string> # <string index="230217" name="ID_KB947477_HPDLL1RS" localize="false">The OEM HP driver hpzui4wm.DLL was detected. This driver is known to cause the print spooler to crash or hang. Please contact HP to find an upgrade to this driver or follow steps in KB947477 to rename the driver.</string> # Import-LocalizedData -BindingVariable ScriptStrings Write-DiagProgress -Activity $ScriptStrings.ID_KB947477_HPDLLTitle -Status $ScriptStrings.ID_KB947477_HPDLLDescription $RootCauseDetected = $false $RootCauseName = "RC_PrintHpzui4wmCheck" $PublicContent = "http://support.microsoft.com/kb/KB947477" # *************************** # Data Gathering # *************************** Function CheckForLoadedModule ($ProcessName, $ModuleFileName, $ModuleProductVersion) { # # .SYNOPSIS # Checks the modules loaded in a process to see if a specific module and version is loaded # .DESCRIPTION # .NOTES # .LINK # .EXAMPLE # CheckForLoadedModule -ProcessName "SpoolSv" -ModuleFileName "spinf.dll" -ModuleProductVersion "6.1.7600.16385" # .OUTPUTS # Boolean value: [true] if the module name and version are loaded # otherwise [false] # .PARAMETER file # if (get-process -name $ProcessName -module | where-object {$_.ModuleName -eq $ModuleFileName}) { $module = get-process -name $ProcessName -module | where-object {$_.ModuleName -eq $ModuleFileName} if ($module.ProductVersion -eq $ModuleProductVersion) { Return $true } else { Return $false } } else { Return $false } } # ************** # Detection Logic # ************** #Rule applicability #spooler service is running $SpoolerService = get-service spooler if ($spoolerService.Status -eq "Running") {$RuleApplicable = $true} #Root cause detection #hpzui4wm.dll version 61.63.461.42 is loaded in spooler if ($RuleApplicable) { if (CheckForLoadedModule -ProcessName "SpoolSv" -ModuleFileName "hpzui4wm.dll" -ModuleProductVersion "61.63.461.42") { $RootCauseDetected = $true } } # ********************* # Root Cause processing # ********************* if ($RuleApplicable) { if ($RootCauseDetected) { # Red/ Yellow Light Update-DiagRootCause -id $RootCauseName -Detected $true Write-GenericMessage -RootCauseId $RootCauseName -PublicContentURL $PublicContent -Verbosity "Error" -Visibility 4 } else { # Green Light Update-DiagRootCause -id $RootCauseName -Detected $false } } # SIG # Begin signature block # MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDob4vD8gq7fGlb # FVfEWEOq+EVfe87Wvxc9CCDFd7eHm6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIN5zkw5pU1zhiwOgFIfQFT4C # u0fLXQU1vjMIAmDDerNWMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAHFn0hrJAiSy5JPd6Iwu0vaZGSijsYUTNJz2xrBTjJJgUZ3z4bmT8Lubh # 5Z1YHENZ3vdo6GqcMdi6kuYHiH13ENydqKWrdVTSD9XdifsCQBocNx/OmEo1aacZ # lAAaIPyvcfd3lZxo0TVlf4nw8OAnquS+1ySdpX9KteceR2ShKoEW/aODrREjph7B # J7a22pJaJFX3M1Kw6UI+VAfuXzBJ0efORGMhKG1HniCXut+I3MrB55H7lvwkITGe # DjLHh9mnc8bhu35s1xA4ptB1fLCBhkudBRXqqYBFBjFSSca3vcR/u3BTMxa69jjY # gcxEMYOvKzvc7PjStM4je29Ibcbw16GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC # F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDaCWCWY8f/ALwTsJZeseeCEaXy54725TbPIMj0R4YWlAIGZxpym1vd # GBMyMDI0MTAyODExNDAzOC4zNTdaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHqMIIHIDCCBQigAwIBAgITMwAAAezgK6SC0JFSgAABAAAB7DANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MzhaFw0yNTAzMDUxODQ1MzhaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTQwMC0wNUUwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCwR/RuCTbgxUWVm/Vdul22uwdEZm0IoAFs6oIr39VK # /ItP80cn+8TmtP67iabB4DmAKJ9GH6dJGhEPJpY4vTKRSOwrRNxVIKoPPeUF3f4V # yHEco/u1QUadlwD132NuZCxbnh6Mi2lLG7pDvszZqMG7S3MCi2bk2nvtGKdeAIL+ # H77gL4r01TSWb7rsE2Jb1P/N6Y/W1CqDi1/Ib3/zRqWXt4zxvdIGcPjS4ZKyQEF3 # SEZAq4XIjiyowPHaqNbZxdf2kWO/ajdfTU85t934CXAinb0o+uQ9KtaKNLVVcNf5 # QpS4f6/MsXOvIFuCYMRdKDjpmvowAeL+1j27bCxCBpDQHrWkfPzZp/X+bt9C7E5h # PP6HVRoqBYR7u1gUf5GEq+5r1HA0jajn0Q6OvfYckE0HdOv6KWa+sAmJG7PDvTZa # e77homzx6IPqggVpNZuCk79SfVmnKu9F58UAnU58TqDHEzGsQnMUQKstS3zjn6SU # 0NLEFNCetluaKkqWDRVLEWbu329IEh3tqXPXfy6Rh/wCbwe9SCJIoqtBexBrPyQY # A2Xaz1fK9ysTsx0kA9V1JwVV44Ia9c+MwtAR6sqKdAgRo/bs/Xu8gua8LDe6KWyu # 974e9mGW7ZO8narDFrAT1EXGHDueygSKvv2K7wB8lAgMGJj73CQvr+jqoWwx6Xdy # eQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFPRa0Edk/iv1whYQsV8UgEf4TIWGMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQCSvMSkMSrvjlDPag8ARb0OFrAQtSLMDpN0 # UY3FjvPhwGKDrrixmnuMfjrmVjRq1u8IhkDvGF/bffbFTr+IAnDSeg8TB9zfG/4y # bknuopklbeGjbt7MLxpfholCERyEc20PMZKJz9SvzfuO1n5xrrLOL8m0nmv5kBcv # +y1AXJ5QcLicmhe2Ip3/D67Ed6oPqQI03mDjYaS1NQhBNtu57wPKXZ1EoNToBk8b # A6839w119b+a9WToqIskdRGoP5xjDIv+mc0vBHhZGkJVvfIhm4Ap8zptC7xVAly0 # jeOv5dUGMCYgZjvoTmgd45bqAwundmPlGur7eleWYedLQf7s3L5+qfaY/xEh/9uo # 17SnM/gHVSGAzvnreGhOrB2LtdKoVSe5LbYpihXctDe76iYtL+mhxXPEpzda3bJl # hPTOQ3KOEZApVERBo5yltWjPCWlXxyCpl5jj9nY0nfd071bemnou8A3rUZrdgKIa # utsH7SHOiOebZGqNu+622vJta3eAYsCAaxAcB9BiJPla7Xad9qrTYdT45VlCYTtB # SY4oVRsedSADv99jv/iYIAGy1bCytua0o/Qqv9erKmzQCTVMXaDc25DTLcMGJrRu # a3K0xivdtnoBexzVJr6yXqM+Ba2whIVRvGcriBkKX0FJFeW7r29XX+k0e4DnG6iB # HKQjec6VNzCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN # MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE0MDAtMDVFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCO # HPtgVdz9EW0iPNL/BXqJoqVMf6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6smOGTAiGA8yMDI0MTAyODA0MTQx # N1oYDzIwMjQxMDI5MDQxNDE3WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqyY4Z # AgEAMAcCAQACAhoOMAcCAQACAhQzMAoCBQDqyt+ZAgEAMDYGCisGAQQBhFkKBAIx # KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI # hvcNAQELBQADggEBAILIYM82Dr6OQATDiRWNUyg2wRlmEUSqsB1JFEW74Yh1oAnU # ZKTsyjkj69LBZadyOOGYRONFXVrLg2UzYpOybudC6apWF7OLJj+IzfERluG9wFcn # KZ9nQJX9wRpYQTjI+HOGDzbNDtv/AZsljeI3E8vdDX2JA5g0hP9oaR70WD/wOq0P # R+x3mN5f1zd+9DKLNdoZln/PAUaAifsQHFa1V2SlrA1vNThkBK0cQg8uhyBgCm7A # sGaKUPGTfqjRwamualhSXVVcTqzB0lgWaEJSYXahgaHSlmMTGuAFMVHbFFtVtBr3 # X8aXaLyVh40TpbLQLBYIg/b1tbXcNuF8uOw+/uIxggQNMIIECQIBATCBkzB8MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy # b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAezgK6SC0JFSgAABAAAB7DAN # BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G # CSqGSIb3DQEJBDEiBCCvbQVfB+7CAnEVFmU4ujwHne1SHNxAM8LUn+O4mAJ/XDCB # +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICcJ5vVqfTfIhx21QBBbKyo/xciQ # IXaoMWULejAE1QqDMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh # c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD # b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw # MTACEzMAAAHs4CukgtCRUoAAAQAAAewwIgQgsLR3G5TmSmMHedwiqAcbeNSpfnby # e1U8J5bYVqFB6MwwDQYJKoZIhvcNAQELBQAEggIAUaE0WuN/Rphw4IdHmcFvduDl # +1JMGnrMCDl07Wunuy8nSuWXJlcbrgAKJ6jwITbszPgiTeFdm8Yw9M5NdBqGeIF8 # MD5IpgV17Vp1E+NjfttMGnPt1BohBuOWAk3fLHVvVg40sUEmfW5/10EixrbTn0B4 # FaOOvBc4vtBFusB73bUFvNLIN8NPxPUU5xcdNBNcy44PtDZ5Ebphh2lSkbi0jrF6 # i8zwhKspUBgqvtKr1Bc+DRgmYDVEhL/lPY1YJ//ntXiVXW1IBbC+zfcRNBV66yzN # MZXt4KO/bTnFcpYHsFJdSh5n0MTm09Bh02LQOyDfP64pl9H6OMck3E94NEoboLyx # ihkOefx/IorKw/UscrPoHkEL8OZ29w/mMhrb4e6V6lKOdMcX02UQiF5N41AiFAwR # ADd+IOLvn0RJC526V9HjpSYe0anbKRb3EbVClJYYJa8OSTSozbv1yq0zJgeRFZs4 # Nxe7LuNaLFbgnyWCEnqfrO76UcXkvh84XtT/Iimuy8krn243jMveNYBGbttl990B # uY6zIdtEcCXHXeuFsAzuYzvZ5VYjOMkgsdl4onI0AzglU6suhStHWYXhFjb7D8ep # ylliIsGsItPRKoLkdEShpQuMZ+UlOAnhELapeti3I/9tBm5pd+spmXYVIG0uUFD6 # A0YgcTsCGEvEpGRyHzY= # SIG # End signature block
combined_dataset/train/non-malicious/529.ps1
529.ps1
function Backup-AllSPSites{ [CmdletBinding()] param( [Parameter(Position=0, Mandatory=$true)] [String] $Path ) if(-not (Get-PSSnapin "Microsoft.SharePoint.PowerShell" -ErrorAction SilentlyContinue)){Add-PSSnapin "Microsoft.SharePoint.PowerShell"} $SPSites = $SPWebApp | Get-SPsite -Limit all if(!(Test-Path -path $Path)){New-Item $Path -Type Directory} foreach($SPSite in $SPSites){ Write-Progress -Activity "Backup SharePoint sites" -status $SPSite.HostName -percentComplete ([int]([array]::IndexOf($SPSites, $SPSite)/$SPSites.Count*100)) [uri]$SPSiteUrl = $SPSite.Url $Name = $SPSiteUrl.Host + $(if($SPSiteUrl.LocalPath -ne "/"){$SPSiteUrl.LocalPath -replace "/","."}) $BackupPath = Join-Path -Path $Path -ChildPath $Name if(!(Test-Path -path $BackupPath)){New-Item $BackupPath -Type Directory} $FileName = $Name + " $FilePath = Join-Path -Path $BackupPath -ChildPath $FileName Write-host "Backup SharePoint Site: "$Name Backup-SPSite -Identity $SPSite.Url -Path $FilePath -Force -ErrorAction SilentlyContinue } }
combined_dataset/train/non-malicious/sample_56_58.ps1
sample_56_58.ps1
# # Copyright (c) Microsoft Corporation. # # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN # THE SOFTWARE. # ConvertFrom-StringData @' ###PSLOC StartGetPackageSource=Begin invoking Get-packageSource {0} StartRegisterPackageSource=Begin invoking Register-Packagesource {0} StartUnRegisterPackageSource=Begin invoking UnRegister-Packagesource {0} PackageSourceFound=Package source '{0}' found PackageSourceNotFound=Package source '{0}' not found RegisteredSuccess=Successfully registered the package source {0} UnRegisteredSuccess=Successfully unregistered the package source {0} RegisterFailed=Failed to register the package source {0}. Message:{1} UnRegisterFailed=Failed to register the package source {0}. Message:{1} InDesiredState=Resource {0} is in the desired state. Required Ensure is {1} and actual Ensure is {2} NotInDesiredState=Resource {0} is not in the desired state. Required Ensure is {1} and actual Ensure is {2} NotInDesiredStateDuetoLocationMismatch=Resource {0} is not in the desired state. Required location is {1} and registered is {2} NotInDesiredStateDuetoPolicyMismatch=Resource {0} is not in the desired state. Required installation policy is {1} and registered is {2} InstallationPolicyWarning=Begin registering '{0}' to source location '{1}' with '{2}' policy" ###PSLOC '@ # SIG # Begin signature block # MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDFuym1v/NtoXxJ # gjHj6HUj0SEsN/GPakQw8oc6hd5e16CCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIATZ # A7LJPyCoN3GjbGxrPSVpT74sycop1NpRf9jCRv8CMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEACtoqy/WWybBNUCLlw1u6DqG2Fu+EEeRQW1JQ # Zdr9OMJYuxRVMAxHUq8xQDps2gsnU1Z+Qh4/i6BCYy8uCHCe4DWvSelIK1O9kCbp # DRgnK17saCkkFt2eLZkH+FkHFoI9bSbxS7kat2KkgkXeSytDi8rMDDnfTmBaolty # sjb3fgnxlVmyxGYdRRcXb2aHxN7JMBfe2PGKy7NpIJMQrOSuXo7QicSAPGh8BUtl # 21zVD8mGRm0YEiMDdm/jUZJG6w8G5HjzetPQaBx2QCye9w9ylH7RVi0X3Dwkrihi # +Zp4iOoEdm5jKxc5rdx0LtTDxjUgdPU2a43xTjl1z5lNf6LsAaGCFykwghclBgor # BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCClNLBeLvK+C3k4sPMPIoWhHibw8zcDrI2H # Eyi/ga+gdgIGZnMTOJOzGBMyMDI0MDcxMTIxMjQ0MS4wNDhaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOkQwODItNEJGRC1FRUJBMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHcweCM # wl9YXo4AAQAAAdwwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjMxMDEyMTkwNzA2WhcNMjUwMTEwMTkwNzA2WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvI # syA1sjg9kSKJzelrUWF5ShqYWL83amn3SE5JyIVPUC7F6qTcLphhHZ9idf21f0Ra # GrU8EHydF8NxPMR2KVNiAtCGPJa8kV1CGvn3beGB2m2ltmqJanG71mAywrkKATYn # iwKLPQLJ00EkXw5TSwfmJXbdgQLFlHyfA5Kg+pUsJXzqumkIvEr0DXPvptAGqkdF # LKwo4BTlEgnvzeTfXukzX8vQtTALfVJuTUgRU7zoP/RFWt3WagahZ6UloI0FC8Xl # BQDVDX5JeMEsx7jgJDdEnK44Y8gHuEWRDq+SG9Xo0GIOjiuTWD5uv3vlEmIAyR/7 # rSFvcLnwAqMdqcy/iqQPMlDOcd0AbniP8ia1BQEUnfZT3UxyK9rLB/SRiKPyHDlg # 8oWwXyiv3+bGB6dmdM61ur6nUtfDf51lPcKhK4Vo83pOE1/niWlVnEHQV9NJ5/Db # USqW2RqTUa2O2KuvsyRGMEgjGJA12/SqrRqlvE2fiN5ZmZVtqSPWaIasx7a0GB+f # dTw+geRn6Mo2S6+/bZEwS/0IJ5gcKGinNbfyQ1xrvWXPtXzKOfjkh75iRuXourGV # PRqkmz5UYz+R5ybMJWj+mfcGqz2hXV8iZnCZDBrrnZivnErCMh5Flfg8496pT0ph # jUTH2GChHIvE4SDSk2hwWP/uHB9gEs8p/9Pe/mt9AgMBAAGjggFJMIIBRTAdBgNV # HQ4EFgQU6HPSBd0OfEX3uNWsdkSraUGe3dswHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB # Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD # ggIBANnrb8Ewr8eX/H1sKt3rnwTDx4AqgHbkMNQo+kUGwCINXS3y1GUcdqsK/R1g # 6Tf7tNx1q0NpKk1JTupUJfHdExKtkuhHA+82lT7yISp/Y74dqJ03RCT4Q+8ooQXT # MzxiewfErVLt8WefebncST0i6ypKv87pCYkxM24bbqbM/V+M5VBppCUs7R+cETiz # /zEA1AbZL/viXtHmryA0CGd+Pt9c+adsYfm7qe5UMnS0f/YJmEEMkEqGXCzyLK+d # h+UsFi0d4lkdcE+Zq5JNjIHesX1wztGVAtvX0DYDZdN2WZ1kk+hOMblUV/L8n1YW # zhP/5XQnYl03AfXErn+1Eatylifzd3ChJ1xuGG76YbWgiRXnDvCiwDqvUJevVRY1 # qy4y4vlVKaShtbdfgPyGeeJ/YcSBONOc0DNTWbjMbL50qeIEC0lHSpL2rRYNVu3h # sHzG8n5u5CQajPwx9PzpsZIeFTNHyVF6kujI4Vo9NvO/zF8Ot44IMj4M7UX9Za4Q # wGf5B71x57OjaX53gxT4vzoHvEBXF9qCmHRgXBLbRomJfDn60alzv7dpCVQIuQ06 # 2nyIZKnsXxzuKFb0TjXWw6OFpG1bsjXpOo5DMHkysribxHor4Yz5dZjVyHANyKo0 # bSrAlVeihcaG5F74SZT8FtyHAW6IgLc5w/3D+R1obDhKZ21WMIIHcTCCBVmgAwIB # AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0 # IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1 # WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O # 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn # hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t # 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq # D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP # frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW # rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv # 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb # r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten # IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc # xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a # j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB # MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU # n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw # QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E # b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB # gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/ # MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ # oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p # Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB # BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v # Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h # LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x # 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p # y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A # oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC # HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB # 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt # yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3 # rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV # v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24 # 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw # Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB # 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk # TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U # aGFsZXMgVFNTIEVTTjpEMDgyLTRCRkQtRUVCQTElMCMGA1UEAxMcTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAHDn/cz+3yRkIUCJf # SbL3djnQEqaggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN # BgkqhkiG9w0BAQUFAAIFAOo6kEcwIhgPMjAyNDA3MTIwMTA5MjdaGA8yMDI0MDcx # MzAxMDkyN1owdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6jqQRwIBADAHAgEAAgIJ # 8TAHAgEAAgIRsTAKAgUA6jvhxwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE # AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB # AJsO/FkzAGmyjaXQXVY6d7bJ+KD/cbM9U3gdMgi0O44Bd7Pd2Ue+M77nGnqcfJs4 # nspC/Gsf7plwrYHTP4TB6sQ1PEs8xTOZg9WUyTQCOAZycjsRACGmLAEFlicKdk2F # lG0KDM2QEgOJe/vmpbJfSMKLi199Q5/7LO89sRGKVHW+MYIEDTCCBAkCAQEwgZMw # fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl # ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd # TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHcweCMwl9YXo4AAQAA # AdwwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB # BDAvBgkqhkiG9w0BCQQxIgQg27wo9UaDu6YcTM+JShpEeAKDVXHkWrnrAB/A0ef5 # 4y8wgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBTpxeKatlEP4y8qZzjuWL0 # Ou0IqxELDhX2TLylxIINNzCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD # QSAyMDEwAhMzAAAB3MHgjMJfWF6OAAEAAAHcMCIEIF5qZr7hW7c1395SRXPLnPeJ # NOFMpKYw9fXOhmlaWzpMMA0GCSqGSIb3DQEBCwUABIICAE4PsIFlyMEX9ic6gzXi # VviShma6o35WjwR/yL+4mb1RGofi55gv+K4CIEuT0Bhnq+7Mhms6GcdJ8bCoAWRq # PeV/HE6AyCdXqlTQIYsle2OtvwsKkDjLRwxA6npuREHzuukAgtUVI1WiRgdFRgsf # QqiPGYsu1u86+6PT/OYyGU5cZQhvyl/pBRopRo6T5uY278ds4FAkg01GOU2nUUI0 # IhxH6HLku7EeCqscpCwxDUAm5iQicEKlZvGgyV7PbMe98dLTTaPaYKGn+rbt9OMG # ktXnh6U0xikkPrdqUeBf0rI2Mf1hlrmb7v4qA0o7EJ9sunhWg8x9lyCJTuIfo0Mn # czO+B2RzT/j3ZXo73Dek+qOscRIysL3uGR4SuVV/bzotI/7+agws3vAeBj9udbGH # AMa2iwLatTNssrqHprU5IfCg7uuHTn8a3czJ3QUb0mOehfyVfgoeEOIgry0bIHsh # EN3Na8B5W3w6exDHSezfBbjVvx4OELw+PxnUa3N7/e9mlMr8RojEsFmXXZBeDCBN # Ib/gHvk+5swDBlx9vdqcOdERncQzXf+K05D2j9mxdlUto+0NUmwRImodQqiXddEB # Jr9ZAur103BwuZjdjhFqW3C6+isfdMsQdd2XYU+nTZ6Joi6BFE2Q2umcDeIzavbD # K7HpH/HfqRmyIh1O7h/4ebbp # SIG # End signature block
combined_dataset/train/non-malicious/sample_48_66.ps1
sample_48_66.ps1
# # Copyright (c) Microsoft Corporation. # # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN # THE SOFTWARE. # ConvertFrom-StringData @' ###PSLOC StartGetPackage=Begin invoking Get-package {0} using PSModulePath {1}. PackageFound=Package '{0}' found. PackageNotFound=Package '{0}' not found. MultiplePackagesFound=More than one package found for package '{0}'. StartTestPackage=Test-TargetResource calling Get-TargetResource using {0}. InDesiredState=Resource {0} is in the desired state. Required Ensure is {1} and actual Ensure is {2} NotInDesiredState=Resource {0} is not in the desired state. Required Ensure is {1} and actual Ensure is {2} StartSetPackage=Set-TargetResource calling Test-TargetResource using {0}. InstallPackageInSet=Calling Install-Package using {0}. ###PSLOC '@ # SIG # Begin signature block # MIIoPAYJKoZIhvcNAQcCoIIoLTCCKCkCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDifaxdRJwwG4/T # mYoBrfnu8FwGQbWKwvgWla/w4Db0OaCCDYUwggYDMIID66ADAgECAhMzAAADri01 # UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG # yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899 # QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82 # 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV # M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd # WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W # 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY # 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV # APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37 # ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57 # xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t # Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i # 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk # 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK # 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO # zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA # A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIPd8 # kkpzFIATEcTADMObzlhJCBAJSfQTq8SMXNqGe9g4MEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAiLavxAGZr1DkD/0dLruOrYZr1kw9q7UgI1gb # 4vC+eVc8yMhUAjaW6Z0lPjKdYwfVmXyfIVxhoMwkNEBazfTZLAfz7P/8T0zTv1RH # BrEsl5KsWQCzRMZZ+fFmrNCO3E0lFwxFVPfZ9b+Bl8lum5ik7x71uxhGTNgk5DPJ # Nf9e89xVNe83cWp/AINyUlCvK6eXJpTKDn2J6tc3QelaRsgYdBlRR6YgcHXgCpP/ # hP4XEQ7ZoGiVJkOqUR6WLZ//C+V9jPr9jS4+N/wAHNSOJFrEsWyWLMvRpEHUKi74 # SGxrXNjQdKnZ/T134Kp1dwmnETaYix7AeCpw1gZGYFjrRtdOm6GCF5cwgheTBgor # BgEEAYI3AwMBMYIXgzCCF38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCCcYTOHxHWv0Jood+sflyNg9tH+QEHSffJ2 # PPSlPyrIiQIGZbwTcyL2GBMyMDI0MDIxNDIxMDAzNi4xMTdaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHtMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgAB # AAAB6TANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yMzEyMDYxODQ1MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w # M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yr # APJnV6A7aZYnTw/yx90u1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZ # Y5O8PCBu7Gq+x5Xe6plQt4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7L # MpKwIKQMwXDctYKvCyQy6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5Mx # ylRdTS7E1Jocl30NgcBiJfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9d # xsyvng0lUVY+urq/G8QRFoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTp # w2I6ZWaIhPwMu5DvdkEGzV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0 # VJBSGV+h66ZcaUJOxpbSIjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDC # xHG4mW3mpNQopM/U1WJnjssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOa # mGfwvkIe7dkylzm8BeAUQC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKF # I30u9YlxDTzAuLDK073cndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022 # +yPwclmykssk30a4Rp3v9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYj # uIj0Wuv+jcjtB+xOMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe6 # 1AE90Ken2XPgQHJDiS4SbLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz # /HciZooyeoAvkHQaHmLhwBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20 # QpHDEukwKR8kfaBEX83AyvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQg # eEBr8E4K2wQ2WXI/ZJxZS/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/Jnj # XMChnm9bLDD1waJ7TPp5wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6 # QjegHzndX/tZrY792dfRAXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWG # XYJL5H6LNnKyXJVEw/1FbO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsH # ptAvREqCc+/YxzhIKkA88Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFv # NRhh8ZBAenn1pW+5UBGYz2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMl # PG3YjuqFxidiIsoAw2+MhI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2j # JWgq7VlBuP1BuXjZ3qgym9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNQMIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQCraYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6XcLnDAi # GA8yMDI0MDIxNDA5NTEyNFoYDzIwMjQwMjE1MDk1MTI0WjB3MD0GCisGAQQBhFkK # BAExLzAtMAoCBQDpdwucAgEAMAoCAQACAjugAgH/MAcCAQACAhPbMAoCBQDpeF0c # AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh # CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBALP8omWb2PQh+iKdjHCuhWSY # BciaTIqlPVp7qxfy3heHKWWHKNBhTL5tuuPgyfG5295NKAeZDVpXDUeEb6eg+wnD # 9XhjcF9B2CagwN52uHkIAbeKUHGBwRIcKlgjol1tBDTkc2MduEcx0WmbDyhZH/Fn # 3kZL2+tKJrMndfg3RFvqlzfgAUr/zjgDE+6dzsVBjfoDR91seAAWbcRS5FfxlUEQ # 72rpN2k0l8PDDDlgVp7wG0luoUObjqZzTtyM6BS4KeaFYh3sDT1N44T9uMQ5cgJe # 00I1Xu0LPXjIKTG/m5CnAjPJUr5/7D/ZuN+SXkTVq7hifzqyr0v1DMw6UD43mfAx # ggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3Rv # bjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0 # aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAA # AekPcTB+XfESNgABAAAB6TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkD # MQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCB9dzBdbob35X8EGPWhUhoX # /++1XBhXpOa7DEKlWyyXJTCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQ # kniXaTcmj1TKQWF+x2U4riVorGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0 # IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQgvLAc # pNo3AhZu10zp1tlBlpR/6AD373eKHr+IsbyFNiwwDQYJKoZIhvcNAQELBQAEggIA # fnUcD3/zvg2z+Mjd1A9AHS4SX41AadTRO67XFZC9NKtqByAUY9ttV6FNBJly9U+T # ju7mBoJmzXE5iZxHtMdOVYXmTY80G9lBLrPVNaOwQelKTJpOcfuAWWEfBR7jYdI7 # hZzIWuiCErepjufHrXOPrUj6lu93jLlT9/WYbV+zQzJWaKGEYaTJytakuuSUoYeb # Ej7Hb4ZyablW7IBkmIywZfgpBxpn+W3obzMhkuiTrgbl01ljmlC6UO23kZI4Ash4 # 7E0QGmBvt7NjrR2ArzsH/1Aga/KKvphVr9nb/6lkwwKFne+FHX9E8v157SVyP3Vp # y1IQ+xS/qTIqwDRxF5n6uMRy7u6fVk4gvFsrRpJqKDgmCyqs5oJTBBufj868tx2b # rWIhrG1aBW8b0TCDye3ttgFuJoSL/X9OTes/linyMnns4JJ7knAE9IRt9hAfC7h6 # 3Svt4qRiQbtF7sV6IjWn23DtPQ0YDSS8VgGV5EPcCEd8oSRyYJzBa63xLvp0Elzo # scdhFFGyXHoJhKFp2ODRlrYn2QMATe+u8cruQoxBcpxswsGz8/TUEeUBywqy/WeI # qdDll7XA8Y8PEap6OR+Af4j6dQGPsf9gE2cfmvf6Y7d9opZiyuxjzrF0ti0cm4YM # IHnIk0LLX5ygCBmmDpl4WE6VGF9+LVv5q7rBmv1xq/k= # SIG # End signature block
combined_dataset/train/non-malicious/589.ps1
589.ps1
function Connect-PSS{ param ( [parameter(Mandatory=$true)] [string[]]$Name, [parameter(Mandatory=$false)] [System.Management.Automation.Credential()] $Credential = [System.Management.Automation.PSCredential]::Empty ) $Servers = Get-RemoteConnection -Name $Name foreach($Server in $Servers){ Remove-PSSession -ComputerName $Server.Name -ErrorAction SilentlyContinue if($Credential.UserName -eq $null){ $Credential = Get-Credential $Server.User } $s = New-PSSession -Name $Server.Name -ComputerName $Server.Name -Credential $Credential if ($Server.SnapIns -ne ""){ foreach($SnapIn in $Server.SnapIns){ Invoke-Command -Session $s -ScriptBlock {param ($Name) Add-PSSnapin -Name $Name} -ArgumentList $SnapIn } } $Sessions += $s } $Sessions }
combined_dataset/train/non-malicious/3646.ps1
3646.ps1
function Test-CreateJob { try { $a1 = Create-ElasticJobAgentTestEnvironment Test-CreateJobWithDefaultParam $a1 Test-CreateJobWithParentObject $a1 Test-CreateJobWithParentResourceId $a1 Test-CreateJobWithPiping $a1 } finally { Remove-ResourceGroupForTest $a1 } } function Test-GetJob { try { $a1 = Create-ElasticJobAgentTestEnvironment Test-GetJobWithDefaultParam $a1 Test-GetJobWithParentObject $a1 Test-GetJobWithParentResourceId $a1 Test-GetJobWithPiping $a1 } finally { Remove-ResourceGroupForTest $a1 } } function Test-UpdateJob { try { $a1 = Create-ElasticJobAgentTestEnvironment Test-UpdateJobWithDefaultParam $a1 Test-UpdateJobWithInputObject $a1 Test-UpdateJobWithResourceId $a1 Test-UpdateJobWithPiping $a1 } finally { Remove-ResourceGroupForTest $a1 } } function Test-RemoveJob { try { $a1 = Create-ElasticJobAgentTestEnvironment Test-RemoveJobWithDefaultParam $a1 Test-RemoveJobWithInputObject $a1 Test-RemoveJobWithResourceId $a1 Test-RemoveJobWithPiping $a1 } finally { Remove-ResourceGroupForTest $a1 } } function Test-CreateJobWithDefaultParam($a1) { $startTime = Get-Date "2018-05-31T23:58:57" $endTime = $startTime.AddHours(5) $startTimeIso8601 = Get-Date $startTime -format s $endTimeIso8601 = Get-Date $endTime -format s $jn1 = Get-JobName $resp = New-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $jn1 Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Description "" $jn1 = Get-JobName $resp = New-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $jn1 -Enable Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $true Assert-AreEqual $resp.Description "" $jn1 = Get-JobName $resp = New-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $jn1 -Description $jn1 -RunOnce Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.Description $jn1 Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $false $jn1 = Get-JobName $resp = New-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $jn1 -Description $jn1 -IntervalType Minute -IntervalCount 1 Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.Description $jn1 Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Interval "PT1M" $jn1 = Get-JobName $resp = New-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $jn1 -Description $jn1 -IntervalType Hour -IntervalCount 1 Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.Description $jn1 Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "PT1H" Assert-AreEqual $resp.Enabled $false $jn1 = Get-JobName $resp = New-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $jn1 -Description $jn1 -IntervalType Day -IntervalCount 1 Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.Description $jn1 Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "P1D" Assert-AreEqual $resp.Enabled $false $jn1 = Get-JobName $resp = New-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $jn1 -Description $jn1 -IntervalType Week -IntervalCount 1 Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.Description $jn1 Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "P1W" Assert-AreEqual $resp.Enabled $false $jn1 = Get-JobName $resp = New-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $jn1 -Description $jn1 -IntervalType Month -IntervalCount 1 Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.Description $jn1 Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "P1M" Assert-AreEqual $resp.Enabled $false } function Test-CreateJobWithParentObject($a1) { $startTime = Get-Date "2018-05-31T23:58:57" $endTime = $startTime.AddHours(5) $startTimeIso8601 = Get-Date $startTime -format s $endTimeIso8601 = Get-Date $endTime -format s $jn1 = Get-JobName $resp = New-AzSqlElasticJob -ParentObject $a1 -Name $jn1 Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Description "" $jn1 = Get-JobName $resp = New-AzSqlElasticJob -ParentObject $a1 -Name $jn1 -Enable Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $true Assert-AreEqual $resp.Description "" $jn1 = Get-JobName $resp = New-AzSqlElasticJob -ParentObject $a1 -Name $jn1 -Description $jn1 -RunOnce Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.Description $jn1 Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $false $jn1 = Get-JobName $resp = New-AzSqlElasticJob -ParentObject $a1 -Name $jn1 -Description $jn1 -IntervalType Minute -IntervalCount 1 Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.Description $jn1 Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Interval "PT1M" $jn1 = Get-JobName $resp = New-AzSqlElasticJob -ParentObject $a1 -Name $jn1 -Description $jn1 -IntervalType Hour -IntervalCount 1 Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.Description $jn1 Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "PT1H" Assert-AreEqual $resp.Enabled $false $jn1 = Get-JobName $resp = New-AzSqlElasticJob -ParentObject $a1 -Name $jn1 -Description $jn1 -IntervalType Day -IntervalCount 1 Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.Description $jn1 Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "P1D" Assert-AreEqual $resp.Enabled $false $jn1 = Get-JobName $resp = New-AzSqlElasticJob -ParentObject $a1 -Name $jn1 -Description $jn1 -IntervalType Week -IntervalCount 1 Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.Description $jn1 Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "P1W" Assert-AreEqual $resp.Enabled $false $jn1 = Get-JobName $resp = New-AzSqlElasticJob -ParentObject $a1 -Name $jn1 -Description $jn1 -IntervalType Month -IntervalCount 1 Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.Description $jn1 Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "P1M" Assert-AreEqual $resp.Enabled $false } function Test-CreateJobWithParentResourceId($a1) { $startTime = Get-Date "2018-05-31T23:58:57" $endTime = $startTime.AddHours(5) $startTimeIso8601 = Get-Date $startTime -format s $endTimeIso8601 = Get-Date $endTime -format s $jn1 = Get-JobName $resp = New-AzSqlElasticJob -ParentResourceId $a1.ResourceId -Name $jn1 Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Description "" $jn1 = Get-JobName $resp = New-AzSqlElasticJob -ParentResourceId $a1.ResourceId -Name $jn1 -Enable Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $true Assert-AreEqual $resp.Description "" $jn1 = Get-JobName $resp = New-AzSqlElasticJob -ParentResourceId $a1.ResourceId -Name $jn1 -Description $jn1 -RunOnce Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.Description $jn1 Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $false $jn1 = Get-JobName $resp = New-AzSqlElasticJob -ParentResourceId $a1.ResourceId -Name $jn1 -Description $jn1 -IntervalType Minute -IntervalCount 1 Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.Description $jn1 Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Interval "PT1M" $jn1 = Get-JobName $resp = New-AzSqlElasticJob -ParentResourceId $a1.ResourceId -Name $jn1 -Description $jn1 -IntervalType Hour -IntervalCount 1 Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.Description $jn1 Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "PT1H" Assert-AreEqual $resp.Enabled $false $jn1 = Get-JobName $resp = New-AzSqlElasticJob -ParentResourceId $a1.ResourceId -Name $jn1 -Description $jn1 -IntervalType Day -IntervalCount 1 Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.Description $jn1 Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "P1D" Assert-AreEqual $resp.Enabled $false $jn1 = Get-JobName $resp = New-AzSqlElasticJob -ParentResourceId $a1.ResourceId -Name $jn1 -Description $jn1 -IntervalType Week -IntervalCount 1 Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.Description $jn1 Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "P1W" Assert-AreEqual $resp.Enabled $false $jn1 = Get-JobName $resp = New-AzSqlElasticJob -ParentResourceId $a1.ResourceId -Name $jn1 -Description $jn1 -IntervalType Month -IntervalCount 1 Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.Description $jn1 Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "P1M" Assert-AreEqual $resp.Enabled $false } function Test-CreateJobWithPiping($a1) { $startTime = Get-Date "2018-05-31T23:58:57" $endTime = $startTime.AddHours(5) $startTimeIso8601 = Get-Date $startTime -format s $endTimeIso8601 = Get-Date $endTime -format s $jn1 = Get-JobName $resp = $a1 | New-AzSqlElasticJob -Name $jn1 Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Description "" $jn1 = Get-JobName $resp = $a1 | New-AzSqlElasticJob -Name $jn1 -Enable Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $true Assert-AreEqual $resp.Description "" $jn1 = Get-JobName $resp = $a1 | New-AzSqlElasticJob -Name $jn1 -Description $jn1 -RunOnce Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.Description $jn1 Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $false $jn1 = Get-JobName $resp = $a1 | New-AzSqlElasticJob -Name $jn1 -Description $jn1 -IntervalType Minute -IntervalCount 1 Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.Description $jn1 Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Interval "PT1M" $jn1 = Get-JobName $resp = $a1 | New-AzSqlElasticJob -Name $jn1 -Description $jn1 -IntervalType Hour -IntervalCount 1 Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.Description $jn1 Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "PT1H" Assert-AreEqual $resp.Enabled $false $jn1 = Get-JobName $resp = $a1 | New-AzSqlElasticJob -Name $jn1 -Description $jn1 -IntervalType Day -IntervalCount 1 Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.Description $jn1 Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "P1D" Assert-AreEqual $resp.Enabled $false $jn1 = Get-JobName $resp = $a1 | New-AzSqlElasticJob -Name $jn1 -Description $jn1 -IntervalType Week -IntervalCount 1 Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.Description $jn1 Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "P1W" Assert-AreEqual $resp.Enabled $false $jn1 = Get-JobName $resp = $a1 | New-AzSqlElasticJob -Name $jn1 -Description $jn1 -IntervalType Month -IntervalCount 1 Assert-AreEqual $resp.JobName $jn1 Assert-AreEqual $resp.Description $jn1 Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "P1M" Assert-AreEqual $resp.Enabled $false } function Test-GetJobWithDefaultParam($a1) { $j1 = Create-JobForTest $a1 $j2 = Create-JobForTest $a1 $resp = Get-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $j1.JobName Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.ScheduleType "Once" Assert-Null $resp.Interval $resp = Get-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName Assert-True { $resp.Count -ge 2 } } function Test-GetJobWithParentObject($a1) { $j1 = Create-JobForTest $a1 $j2 = Create-JobForTest $a1 $resp = Get-AzSqlElasticJob -ParentObject $a1 -Name $j1.JobName Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.ScheduleType "Once" Assert-Null $resp.Interval $resp = Get-AzSqlElasticJob -ParentObject $a1 Assert-True { $resp.Count -ge 2 } } function Test-GetJobWithParentResourceId($a1) { $j1 = Create-JobForTest $a1 $j2 = Create-JobForTest $a1 $j2 = Create-JobForTest $a1 $resp = Get-AzSqlElasticJob -ParentResourceId $a1.ResourceId -Name $j1.JobName Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.ScheduleType "Once" Assert-Null $resp.Interval $resp = Get-AzSqlElasticJob -ParentResourceId $a1.ResourceId Assert-True { $resp.Count -ge 2 } } function Test-GetJobWithPiping($a1) { $j1 = Create-JobForTest $a1 $j2 = Create-JobForTest $a1 $resp = $a1 | Get-AzSqlElasticJob -Name $j1.JobName Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.ScheduleType "Once" Assert-Null $resp.Interval $resp = $a1 | Get-AzSqlElasticJob Assert-True { $resp.Count -ge 2 } } function Test-UpdateJobWithDefaultParam($a1) { $startTime = Get-Date "2018-05-31T23:58:57" $endTime = $startTime.AddHours(5) $startTimeIso8601 = Get-Date $startTime -format s $endTimeIso8601 = Get-Date $endTime -format s $j1 = Create-JobForTest $a1 $resp = Set-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $j1.JobName -Enable Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $true Assert-AreEqual $resp.Description "" $resp = Set-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $j1.JobName Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Description "" $resp = Set-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $j1.JobName -StartTime $startTimeIso8601 -EndTime $endTimeIso8601 Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.ScheduleType "Once" $respStartTimeIso8601 = Get-Date $resp.StartTime -format s $respEndTimeIso8601 = Get-Date $resp.EndTime -format s Assert-AreEqual $respStartTimeIso8601 $startTimeIso8601 Assert-AreEqual $respEndTimeIso8601 $endTimeIso8601 Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Description "" $resp = Set-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $j1.JobName -Description $j1.JobName Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Description $j1.JobName $resp = Set-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $j1.JobName -RunOnce Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Description $j1.JobName $resp = Set-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $j1.JobName -IntervalType Minute -IntervalCount 1 Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Description $j1.JobName Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "PT1M" $resp = Set-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $j1.JobName -Description $j1.JobName -IntervalType Hour -IntervalCount 1 Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Description $j1.JobName Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "PT1H" $resp = Set-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $j1.JobName -Description $j1.JobName -IntervalType Day -IntervalCount 1 Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Description $j1.JobName Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "P1D" $resp = Set-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $j1.JobName -Description $j1.JobName -IntervalType Week -IntervalCount 1 Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Description $j1.JobName Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "P1W" $resp = Set-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $j1.JobName -Description $j1.JobName -IntervalType Month -IntervalCount 1 Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Description $j1.JobName Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "P1M" } function Test-UpdateJobWithInputObject($a1) { $startTime = Get-Date "2018-05-31T23:58:57" $endTime = $startTime.AddHours(5) $startTimeIso8601 = Get-Date $startTime -format s $endTimeIso8601 = Get-Date $endTime -format s $j1 = Create-JobForTest $a1 $resp = Set-AzSqlElasticJob -InputObject $j1 -Enable Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $true Assert-AreEqual $resp.Description "" $resp = Set-AzSqlElasticJob -InputObject $j1 Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Description "" $resp = Set-AzSqlElasticJob -InputObject $j1 -StartTime $startTimeIso8601 -EndTime $endTimeIso8601 Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.ScheduleType "Once" $respStartTimeIso8601 = Get-Date $resp.StartTime -format s $respEndTimeIso8601 = Get-Date $resp.EndTime -format s Assert-AreEqual $respStartTimeIso8601 $startTimeIso8601 Assert-AreEqual $respEndTimeIso8601 $endTimeIso8601 Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Description "" $resp = Set-AzSqlElasticJob -InputObject $j1 -Description $j1.JobName Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Description $j1.JobName $resp = Set-AzSqlElasticJob -InputObject $j1 -RunOnce Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Description $j1.JobName $resp = Set-AzSqlElasticJob -InputObject $j1 -IntervalType Minute -IntervalCount 1 Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Description $j1.JobName Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "PT1M" $resp = Set-AzSqlElasticJob -InputObject $j1 -Description $j1.JobName -IntervalType Hour -IntervalCount 1 Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Description $j1.JobName Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "PT1H" $resp = Set-AzSqlElasticJob -InputObject $j1 -Description $j1.JobName -IntervalType Day -IntervalCount 1 Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Description $j1.JobName Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "P1D" $resp = Set-AzSqlElasticJob -InputObject $j1 -Description $j1.JobName -IntervalType Week -IntervalCount 1 Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Description $j1.JobName Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "P1W" $resp = Set-AzSqlElasticJob -InputObject $j1 -Description $j1.JobName -IntervalType Month -IntervalCount 1 Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Description $j1.JobName Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "P1M" } function Test-UpdateJobWithResourceId($a1) { $startTime = Get-Date "2018-05-31T23:58:57" $endTime = $startTime.AddHours(5) $startTimeIso8601 = Get-Date $startTime -format s $endTimeIso8601 = Get-Date $endTime -format s $j1 = Create-JobForTest $a1 $resp = $j1 | Set-AzSqlElasticJob -Enable Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $true Assert-AreEqual $resp.Description "" $resp = $j1 | Set-AzSqlElasticJob Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Description "" $resp = $j1 | Set-AzSqlElasticJob -StartTime $startTimeIso8601 -EndTime $endTimeIso8601 Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.ScheduleType "Once" $respStartTimeIso8601 = Get-Date $resp.StartTime -format s $respEndTimeIso8601 = Get-Date $resp.EndTime -format s Assert-AreEqual $respStartTimeIso8601 $startTimeIso8601 Assert-AreEqual $respEndTimeIso8601 $endTimeIso8601 Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Description "" $resp = $j1 | Set-AzSqlElasticJob -Description $j1.JobName Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Description $j1.JobName $resp = $j1 | Set-AzSqlElasticJob -RunOnce Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Description $j1.JobName $resp = $j1 | Set-AzSqlElasticJob -IntervalType Minute -IntervalCount 1 Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Description $j1.JobName Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "PT1M" $resp = $j1 | Set-AzSqlElasticJob -Description $j1.JobName -IntervalType Hour -IntervalCount 1 Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Description $j1.JobName Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "PT1H" $resp = $j1 | Set-AzSqlElasticJob -Description $j1.JobName -IntervalType Day -IntervalCount 1 Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Description $j1.JobName Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "P1D" $resp = $j1 | Set-AzSqlElasticJob -Description $j1.JobName -IntervalType Week -IntervalCount 1 Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Description $j1.JobName Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "P1W" $resp = $j1 | Set-AzSqlElasticJob -Description $j1.JobName -IntervalType Month -IntervalCount 1 Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Description $j1.JobName Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "P1M" } function Test-UpdateJobWithPiping($a1) { $startTime = Get-Date "2018-05-31T23:58:57" $endTime = $startTime.AddHours(5) $startTimeIso8601 = Get-Date $startTime -format s $endTimeIso8601 = Get-Date $endTime -format s $j1 = Create-JobForTest $a1 $resp = $j1 | Set-AzSqlElasticJob -Enable Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $true Assert-AreEqual $resp.Description "" $resp = $j1 | Set-AzSqlElasticJob Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Description "" $resp = $j1 | Set-AzSqlElasticJob -StartTime $startTimeIso8601 -EndTime $endTimeIso8601 Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.ScheduleType "Once" $respStartTimeIso8601 = Get-Date $resp.StartTime -format s $respEndTimeIso8601 = Get-Date $resp.EndTime -format s Assert-AreEqual $respStartTimeIso8601 $startTimeIso8601 Assert-AreEqual $respEndTimeIso8601 $endTimeIso8601 Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Description "" $resp = $j1 | Set-AzSqlElasticJob -Description $j1.JobName Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Description $j1.JobName $resp = $j1 | Set-AzSqlElasticJob -RunOnce Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.ScheduleType "Once" Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Description $j1.JobName $resp = $j1 | Set-AzSqlElasticJob -IntervalType Minute -IntervalCount 1 Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.Description $j1.JobName Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "PT1M" $resp = $j1 | Set-AzSqlElasticJob -Description $j1.JobName -IntervalType Hour -IntervalCount 1 Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Description $j1.JobName Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "PT1H" $resp = $j1 | Set-AzSqlElasticJob -Description $j1.JobName -IntervalType Day -IntervalCount 1 Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Description $j1.JobName Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "P1D" $resp = $j1 | Set-AzSqlElasticJob -Description $j1.JobName -IntervalType Week -IntervalCount 1 Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Description $j1.JobName Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "P1W" $resp = $j1 | Set-AzSqlElasticJob -Description $j1.JobName -IntervalType Month -IntervalCount 1 Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Description $j1.JobName Assert-AreEqual $resp.ScheduleType "Recurring" Assert-AreEqual $resp.Interval "P1M" } function Test-RemoveJobWithDefaultParam($a1) { $j1 = Create-JobForTest $a1 $resp = Remove-AzSqlElasticJob -ResourceGroupName $a1.ResourceGroupName -ServerName $a1.ServerName -AgentName $a1.AgentName -Name $j1.JobName -Force Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.ScheduleType "Once" Assert-Null $resp.Interval } function Test-RemoveJobWithInputObject($a1) { $j1 = Create-JobForTest $a1 $resp = Remove-AzSqlElasticJob -InputObject $j1 -Force Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.ScheduleType "Once" Assert-Null $resp.Interval } function Test-RemoveJobWithResourceId($a1) { $j1 = Create-JobForTest $a1 $resp = Remove-AzSqlElasticJob -ResourceId $j1.ResourceId -Force Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.ScheduleType "Once" Assert-Null $resp.Interval } function Test-RemoveJobWithPiping($a1) { $j1 = Create-JobForTest $a1 $resp = $j1 | Remove-AzSqlElasticJob -Force Assert-AreEqual $resp.JobName $j1.JobName Assert-AreEqual $resp.Enabled $false Assert-AreEqual $resp.ScheduleType "Once" Assert-Null $resp.Interval Assert-Throws { $a1 | Get-AzSqlElasticJob -Name $j1.JobName } }
combined_dataset/train/non-malicious/sample_60_88.ps1
sample_60_88.ps1
# # Module manifest for module 'OCI.PSModules.Servicecatalog' # # Generated by: Oracle Cloud Infrastructure # # @{ # Script module or binary module file associated with this manifest. RootModule = 'assemblies/OCI.PSModules.Servicecatalog.dll' # Version number of this module. ModuleVersion = '83.3.0' # Supported PSEditions CompatiblePSEditions = 'Core' # ID used to uniquely identify this module GUID = 'a52480f0-e7d7-4302-871e-ae7f3a42fc02' # Author of this module Author = 'Oracle Cloud Infrastructure' # Company or vendor of this module CompanyName = 'Oracle Corporation' # Copyright statement for this module Copyright = '(c) Oracle Cloud Infrastructure. All rights reserved.' # Description of the functionality provided by this module Description = 'This modules provides Cmdlets for OCI Servicecatalog Service' # Minimum version of the PowerShell engine required by this module PowerShellVersion = '6.0' # Name of the PowerShell host required by this module # PowerShellHostName = '' # Minimum version of the PowerShell host required by this module # PowerShellHostVersion = '' # Minimum version of Microsoft .NET Framework required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # DotNetFrameworkVersion = '' # Minimum version of the common language runtime (CLR) required by this module. This prerequisite is valid for the PowerShell Desktop edition only. # ClrVersion = '' # Processor architecture (None, X86, Amd64) required by this module # ProcessorArchitecture = '' # Modules that must be imported into the global environment prior to importing this module RequiredModules = @(@{ModuleName = 'OCI.PSModules.Common'; GUID = 'b3061a0d-375b-4099-ae76-f92fb3cdcdae'; RequiredVersion = '83.3.0'; }) # Assemblies that must be loaded prior to importing this module RequiredAssemblies = 'assemblies/OCI.DotNetSDK.Servicecatalog.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. # ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module # TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module # FormatsToProcess = @() # Modules to import as nested modules of the module specified in RootModule/ModuleToProcess # NestedModules = @() # Functions to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no functions to export. FunctionsToExport = '*' # Cmdlets to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no cmdlets to export. CmdletsToExport = 'Get-OCIServicecatalog', 'Get-OCIServicecatalogApplicationsList', 'Get-OCIServicecatalogAssociation', 'Get-OCIServicecatalogAssociationsList', 'Get-OCIServicecatalogPrivateApplication', 'Get-OCIServicecatalogPrivateApplicationActionDownloadLogo', 'Get-OCIServicecatalogPrivateApplicationPackage', 'Get-OCIServicecatalogPrivateApplicationPackageActionDownloadConfig', 'Get-OCIServicecatalogPrivateApplicationPackagesList', 'Get-OCIServicecatalogPrivateApplicationsList', 'Get-OCIServicecatalogsList', 'Get-OCIServicecatalogWorkRequest', 'Get-OCIServicecatalogWorkRequestErrorsList', 'Get-OCIServicecatalogWorkRequestLogsList', 'Get-OCIServicecatalogWorkRequestsList', 'Invoke-OCIServicecatalogBulkReplaceServiceCatalogAssociations', 'Move-OCIServicecatalogCompartment', 'Move-OCIServicecatalogPrivateApplicationCompartment', 'New-OCIServicecatalog', 'New-OCIServicecatalogAssociation', 'New-OCIServicecatalogPrivateApplication', 'Remove-OCIServicecatalog', 'Remove-OCIServicecatalogAssociation', 'Remove-OCIServicecatalogPrivateApplication', 'Update-OCIServicecatalog', 'Update-OCIServicecatalogPrivateApplication' # Variables to export from this module VariablesToExport = '*' # Aliases to export from this module, for best performance, do not use wildcards and do not delete the entry, use an empty array if there are no aliases to export. AliasesToExport = '*' # DSC resources to export from this module # DscResourcesToExport = @() # List of all modules packaged with this module # ModuleList = @() # List of all files packaged with this module # FileList = @() # Private data to pass to the module specified in RootModule/ModuleToProcess. This may also contain a PSData hashtable with additional module metadata used by PowerShell. PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. Tags = 'PSEdition_Core','Windows','Linux','macOS','Oracle','OCI','Cloud','OracleCloudInfrastructure','Servicecatalog' # A URL to the license for this module. LicenseUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/LICENSE.txt' # A URL to the main website for this project. ProjectUri = 'https://github.com/oracle/oci-powershell-modules/' # A URL to an icon representing this module. IconUri = 'https://github.com/oracle/oci-powershell-modules/blob/master/icon.png' # ReleaseNotes of this module ReleaseNotes = 'https://github.com/oracle/oci-powershell-modules/blob/master/CHANGELOG.md' # Prerelease string of this module # Prerelease = '' # Flag to indicate whether the module requires explicit user acceptance for install/update/save # RequireLicenseAcceptance = $false # External dependent modules of this module # ExternalModuleDependencies = @() } # End of PSData hashtable } # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' # Default prefix for commands exported from this module. Override the default prefix using Import-Module -Prefix. # DefaultCommandPrefix = '' }
combined_dataset/train/non-malicious/1409.ps1
1409.ps1
filter Unprotect-CString { [CmdletBinding(DefaultParameterSetName='DPAPI')] param( [Parameter(Mandatory = $true, Position=0, ValueFromPipeline = $true)] [string] $ProtectedString, [Parameter(Mandatory=$true,ParameterSetName='RSAByCertificate')] [Security.Cryptography.X509Certificates.X509Certificate2] $Certificate, [Parameter(Mandatory=$true,ParameterSetName='RSAByThumbprint')] [string] $Thumbprint, [Parameter(Mandatory=$true,ParameterSetName='RSAByPath')] [string] $PrivateKeyPath, [Parameter(ParameterSetName='RSAByPath')] $Password, [Parameter(ParameterSetName='RSAByCertificate')] [Parameter(ParameterSetName='RSAByThumbprint')] [Parameter(ParameterSetName='RSAByPath')] [Switch] $UseDirectEncryptionPadding, [Parameter(Mandatory=$true,ParameterSetName='Symmetric')] [object] $Key, [Switch] $AsSecureString ) Set-StrictMode -Version 'Latest' Use-CallerPreference -Cmdlet $PSCmdlet -Session $ExecutionContext.SessionState Add-Type -AssemblyName 'System.Security' [byte[]]$encryptedBytes = [Convert]::FromBase64String($ProtectedString) if( $PSCmdlet.ParameterSetName -eq 'DPAPI' ) { $decryptedBytes = [Security.Cryptography.ProtectedData]::Unprotect( $encryptedBytes, $null, 0 ) } elseif( $PSCmdlet.ParameterSetName -like 'RSA*' ) { if( $PSCmdlet.ParameterSetName -like '*ByPath' ) { $passwordParam = @{ } if( $Password ) { $passwordParam = @{ Password = $Password } } $Certificate = Get-CCertificate -Path $PrivateKeyPath @passwordParam if( -not $Certificate ) { return } } elseif( $PSCmdlet.ParameterSetName -like '*ByThumbprint' ) { $certificates = Get-ChildItem -Path ('cert:\*\*\{0}' -f $Thumbprint) -Recurse if( -not $certificates ) { Write-Error ('Certificate ''{0}'' not found.' -f $Thumbprint) return } $Certificate = $certificates | Where-Object { $_.HasPrivateKey } | Select-Object -First 1 if( -not $Certificate ) { Write-Error ('Certificate ''{0}'' ({1}) doesn''t have a private key.' -f $certificates[0].Subject, $Thumbprint) return } } if( -not $Certificate.HasPrivateKey ) { Write-Error ('Certificate ''{0}'' ({1}) doesn''t have a private key. When decrypting with RSA, secrets are encrypted with the public key, and decrypted with a private key.' -f $Certificate.Subject,$Certificate.Thumbprint) return } if( -not $Certificate.PrivateKey ) { Write-Error ('Certificate ''{0}'' ({1}) has a private key, but it is currently null or not set. This usually means your certificate was imported or generated incorrectly. Make sure you''ve generated an RSA public/private key pair and are using the private key. If the private key is in the Windows certificate stores, make sure it was imported correctly (`Get-ChildItem $pathToCert | Select-Object -Expand PrivateKey` isn''t null).' -f $Certificate.Subject,$Certificate.Thumbprint) return } [Security.Cryptography.RSACryptoServiceProvider]$privateKey = $null if( $Certificate.PrivateKey -isnot [Security.Cryptography.RSACryptoServiceProvider] ) { Write-Error ('Certificate ''{0}'' (''{1}'') is not an RSA key. Found a private key of type ''{2}'', but expected type ''{3}''.' -f $Certificate.Subject,$Certificate.Thumbprint,$Certificate.PrivateKey.GetType().FullName,[Security.Cryptography.RSACryptoServiceProvider].FullName) return } try { $privateKey = $Certificate.PrivateKey $decryptedBytes = $privateKey.Decrypt( $encryptedBytes, (-not $UseDirectEncryptionPadding) ) } catch { if( $_.Exception.Message -match 'Error occurred while decoding OAEP padding' ) { [int]$maxLengthGuess = ($privateKey.KeySize - (2 * 160 - 2)) / 8 Write-Error (@' Failed to decrypt string using certificate '{0}' ({1}). This can happen when: * The string to decrypt is too long because the original string you encrypted was at or near the maximum allowed by your key's size, which is {2} bits. We estimate the maximum string size you can encrypt is {3} bytes. You may get this error even if the original encrypted string is within a couple bytes of that maximum. * The string was encrypted with a different key * The string isn't encrypted {4}: {5} '@ -f $Certificate.Subject, $Certificate.Thumbprint,$privateKey.KeySize,$maxLengthGuess,$_.Exception.GetType().FullName,$_.Exception.Message) return } elseif( $_.Exception.Message -match '(Bad Data|The parameter is incorrect)\.' ) { Write-Error (@' Failed to decrypt string using certificate '{0}' ({1}). This usually happens when the padding algorithm used when encrypting/decrypting is different. Check the `-UseDirectEncryptionPadding` switch is the same for both calls to `Protect-CString` and `Unprotect-CString`. {2}: {3} '@ -f $Certificate.Subject,$Certificate.Thumbprint,$_.Exception.GetType().FullName,$_.Exception.Message) return } Write-Error -Exception $_.Exception return } } elseif( $PSCmdlet.ParameterSetName -eq 'Symmetric' ) { $Key = ConvertTo-Key -InputObject $Key -From 'Unprotect-CString' if( -not $Key ) { return } $aes = New-Object 'Security.Cryptography.AesCryptoServiceProvider' try { $aes.Padding = [Security.Cryptography.PaddingMode]::PKCS7 $aes.KeySize = $Key.Length * 8 $aes.Key = $Key $iv = New-Object 'Byte[]' $aes.IV.Length [Array]::Copy($encryptedBytes,$iv,16) $encryptedBytes = $encryptedBytes[16..($encryptedBytes.Length - 1)] $encryptedStream = New-Object 'IO.MemoryStream' (,$encryptedBytes) try { $decryptor = $aes.CreateDecryptor($aes.Key, $iv) try { $cryptoStream = New-Object 'Security.Cryptography.CryptoStream' $encryptedStream,$decryptor,([Security.Cryptography.CryptoStreamMode]::Read) try { $decryptedBytes = New-Object 'byte[]' ($encryptedBytes.Length) [void]$cryptoStream.Read($decryptedBytes, 0, $decryptedBytes.Length) } finally { $cryptoStream.Dispose() } } finally { $decryptor.Dispose() } } finally { $encryptedStream.Dispose() } } finally { $aes.Dispose() } } try { if( $AsSecureString ) { $secureString = New-Object 'Security.SecureString' [char[]]$chars = [Text.Encoding]::UTF8.GetChars( $decryptedBytes ) for( $idx = 0; $idx -lt $chars.Count ; $idx++ ) { $secureString.AppendChar( $chars[$idx] ) $chars[$idx] = 0 } $secureString.MakeReadOnly() return $secureString } else { [Text.Encoding]::UTF8.GetString( $decryptedBytes ) } } finally { [Array]::Clear( $decryptedBytes, 0, $decryptedBytes.Length ) } }
combined_dataset/train/non-malicious/2109.ps1
2109.ps1
Describe 'Test for cmdlet to support Ordered Attribute on hash literal nodes' -Tags "CI" { BeforeAll { If (-not $IsCoreCLR) { Get-WmiObject -Query "select * from win32_environment where name='TestWmiInstance'" | Remove-WmiObject } } AfterAll { If (-not $IsCoreCLR) { Get-WmiObject -Query "select * from win32_environment where name='TestWmiInstance'" | Remove-WmiObject } } It 'New-Object - Property Parameter Must take IDictionary' { $a = new-object psobject -property ([ordered]@{one=1;two=2}) $a | Should -Not -BeNullOrEmpty $a.one | Should -Be 1 } Context 'Select-Xml cmdlet - Namespace parameter must take IDictionary' { $script:a = $null $helpXml = @' <?xml version="1.0" encoding="utf-8" ?> <helpItems schema="maml"> <command:command xmlns:maml="http://schemas.microsoft.com/maml/2004/10" xmlns:command="http://schemas.microsoft.com/maml/dev/command/2004/10" xmlns:dev="http://schemas.microsoft.com/maml/dev/2004/10"> <command:details> <command:name> Stop-Transcript </command:name> </command:details> </command:command> </helpItems> '@ { $script:a = select-xml -content $helpXml -xpath "//command:name" -namespace ( [ordered]@{command="http://schemas.microsoft.com/maml/dev/command/2004/10"; maml="http://schemas.microsoft.com/maml/2004/10"; dev="http://schemas.microsoft.com/maml/dev/2004/10"}) } | Should -Not -Throw It '$a should not be $null' { $script:a | Should -Not -BeNullOrEmpty } } It 'Set-WmiInstance cmdlet - Argument parameter must take IDictionary' -skip:$IsCoreCLR { $script:a = $null { $script:a = set-wmiinstance -class win32_environment -argument ([ordered]@{Name="TestWmiInstance"; VariableValue="testvalu234e"; UserName="<SYSTEM>"}) } | Should -Not -Throw $script:a | Should -Not -BeNullOrEmpty $script:a.Name | Should -BeExactly "TestWmiInstance" } Context 'Select-Object cmdlet - Property parameter (Calculated properties) must take IDictionary' { $script:a = $null {$script:a = Get-ChildItem | select-object -property Name, ( [ordered]@{Name="IsDirectory"; Expression ={$_.PSIsContainer}})} | Should -Not -Throw It '$a should not be $null' { $script:a | Should -Not -BeNullOrEmpty } } }
combined_dataset/train/non-malicious/sample_48_95.ps1
sample_48_95.ps1
$url = $args[0] Write-Host "Downloading Microsoft Edge Beta" $wc = New-Object net.webclient $msiInstaller = "$env:temp\microsoft-edge-beta.msi" $wc.Downloadfile($url, $msiInstaller) Write-Host "Installing Microsoft Edge Beta" $arguments = "/i `"$msiInstaller`" /quiet" Start-Process msiexec.exe -ArgumentList $arguments -Wait Remove-Item $msiInstaller $suffix = "\\Microsoft\\Edge Beta\\Application\\msedge.exe" if (Test-Path "${env:ProgramFiles(x86)}$suffix") { (Get-Item "${env:ProgramFiles(x86)}$suffix").VersionInfo } elseif (Test-Path "${env:ProgramFiles}$suffix") { (Get-Item "${env:ProgramFiles}$suffix").VersionInfo } else { write-host "ERROR: failed to install Microsoft Edge" exit 1 } # SIG # Begin signature block # MIInvwYJKoZIhvcNAQcCoIInsDCCJ6wCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDf1+3BD26c9pYb # sKMta6Lxdx8taMn7lUbKogdG2g1bIqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIJbZXIB/gM5/cPnsr8OtbKo3 # gpf9C/rBj48NvJPCvGflMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAsN2vozfsSlN5XnIWA8BSmp2/wUwYt8Vb2s8xADWarKok61/Tsf1j8DRW # O5cVl5p5A64A1jKct0QFkaF7oomtUxxVSzY7+dVCnXquG0gW0Vo3gv1eyd3A0rWA # zJcDDfa7X+iFrQvbngCHmE2OTEYqE+fPeAYPeiLlnSh5DdmPqNN322r5qUe60U0C # RIPhWuAT6V/1gZ7jGI5nl6AOyilQUmo+E/VzsSB1RwUaarn0q5iRHOQqGkXmHVfS # ycvGOQpucRfHksQn2hDWZhrqNCF/cQkV9e10Js45fQj5KuY4lFBqfpuP/4seI4Ge # Cy0RvcC0MGhiSukWpeQT6b1WJ/lFtqGCFykwghclBgorBgEEAYI3AwMBMYIXFTCC # FxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFZBgsq # hkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCAasvBmYFxS6CSdO5aBSnuP7GqSbZJAx8C8LnV5J8KLcwIGZjOp34gg # GBMyMDI0MDUxNjIwMjk1NC42NjZaMASAAgH0oIHYpIHVMIHSMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNO # OjA4NDItNEJFNi1DMjlBMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBT # ZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAHajtXJWgDREbEAAQAAAdowDQYJ # KoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcNMjMx # MDEyMTkwNjU5WhcNMjUwMTEwMTkwNjU5WjCB0jELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxhbmQgT3Bl # cmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjowODQyLTRC # RTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZTCC # AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOQBgh2tVFR1j8jQA4NDf8b # cVrXSN080CNKPSQo7S57sCnPU0FKF47w2L6qHtwm4EnClF2cruXFp/l7PpMQg25E # 7X8xDmvxr8BBE6iASAPCfrTebuvAsZWcJYhy7prgCuBf7OidXpgsW1y8p6Vs7sD2 # aup/0uveYxeXlKtsPjMCplHkk0ba+HgLho0J68Kdji3DM2K59wHy9xrtsYK+X9er # bDGZ2mmX3765aS5Q7/ugDxMVgzyj80yJn6ULnknD9i4kUQxVhqV1dc/DF6UBeuzf # ukkMed7trzUEZMRyla7qhvwUeQlgzCQhpZjz+zsQgpXlPczvGd0iqr7lACwfVGog # 5plIzdExvt1TA8Jmef819aTKwH1IVEIwYLA6uvS8kRdA6RxvMcb//ulNjIuGceyy # kMAXEynVrLG9VvK4rfrCsGL3j30Lmidug+owrcCjQagYmrGk1hBykXilo9YB8Qyy # 5Q1KhGuH65V3zFy8a0kwbKBRs8VR4HtoPYw9z1DdcJfZBO2dhzX3yAMipCGm6Smv # mvavRsXhy805jiApDyN+s0/b7os2z8iRWGJk6M9uuT2493gFV/9JLGg5YJJCJXI+ # yxkO/OXnZJsuGt0+zWLdHS4XIXBG17oPu5KsFfRTHREloR2dI6GwaaxIyDySHYOt # vIydla7u4lfnfCjY/qKTAgMBAAGjggFJMIIBRTAdBgNVHQ4EFgQUoXyNyVE9ZhOV # izEUVwhNgL8PX0UwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXwYD # VR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9j # cmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3JsMGwG # CCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIw # MjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcD # CDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQADggIBALmDVdTtuI0jAEt4 # 1O2OM8CU237TGMyhrGr7FzKCEFaXxtoqk/IObQriq1caHVh2vyuQ24nz3TdOBv7r # cs/qnPjOxnXFLyZPeaWLsNuARVmUViyVYXjXYB5DwzaWZgScY8GKL7yGjyWrh78W # JUgh7rE1+5VD5h0/6rs9dBRqAzI9fhZz7spsjt8vnx50WExbBSSH7rfabHendpeq # bTmW/RfcaT+GFIsT+g2ej7wRKIq/QhnsoF8mpFNPHV1q/WK/rF/ChovkhJMDvlqt # ETWi97GolOSKamZC9bYgcPKfz28ed25WJy10VtQ9P5+C/2dOfDaz1RmeOb27Kbeg # ha0SfPcriTfORVvqPDSa3n9N7dhTY7+49I8evoad9hdZ8CfIOPftwt3xTX2RhMZJ # CVoFlabHcvfb84raFM6cz5EYk+x1aVEiXtgK6R0xn1wjMXHf0AWlSjqRkzvSnRKz # FsZwEl74VahlKVhI+Ci9RT9+6Gc0xWzJ7zQIUFE3Jiix5+7KL8ArHfBY9UFLz4sn # boJ7Qip3IADbkU4ZL0iQ8j8Ixra7aSYfToUefmct3dM69ff4Eeh2Kh9NsKiiph58 # 9Ap/xS1jESlrfjL/g/ZboaS5d9a2fA598mubDvLD5x5PP37700vm/Y+PIhmp2fTv # uS2sndeZBmyTqcUNHRNmCk+njV3nMIIHcTCCBVmgAwIBAgITMwAAABXF52ueAptJ # mQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNh # dGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1 # WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEB # BQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O1YLT/e6cBwfSqWxOdcjK # NVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZnhUYjDLWNE893MsAQGOhg # fWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t1w/YJlN8OWECesSq/XJp # rx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxqD89d9P6OU8/W7IVWTe/d # vI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmPfrVUj9z6BVWYbWg7mka9 # 7aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSWrAFKu75xqRdbZ2De+JKR # Hh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv231fgLrbqn427DZM9itu # qBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zbr17C89XYcz1DTsEzOUyO # ArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYctenIPDC+hIK12NvDMk2ZItb # oKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6 # bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17aj54WcmnGrnu3tz5q4i6t # AgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQW # BBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacb # UzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEwQTA/BggrBgEFBQcCARYz # aHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9Eb2NzL1JlcG9zaXRvcnku # aHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIA # QwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNX2 # VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwu # bWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEw # LTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93 # d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3hLB9nATEkW+Geckv8qW/q # XBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6 # U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74py27YP0h1AdkY3m2CDPVt # I1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1AoL8ZthISEV09J+BAljis # 9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTp # kbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0 # sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNtyo4JvbMBV0lUZNlz138e # W0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJ # sWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7 # Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0 # dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lwY1NNje6CbaUFEMFxBmoQ # tB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB0jELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0IElyZWxh # bmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjow # ODQyLTRCRTYtQzI5QTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vy # dmljZaIjCgEBMAcGBSsOAwIaAxUAQqIfIYljHUbNoY0/wjhXRn/sSA2ggYMwgYCk # fjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQD # Ex1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIF # AOnwnAIwIhgPMjAyNDA1MTYyMjUxNDZaGA8yMDI0MDUxNzIyNTE0NlowdDA6Bgor # BgEEAYRZCgQBMSwwKjAKAgUA6fCcAgIBADAHAgEAAgIRpjAHAgEAAgIRbzAKAgUA # 6fHtggIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAID # B6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GBAI4pnLR+QYde5f+qZ1u4 # h+ow3MB7jtruhTIST+f8uLk1SBLm0niiqCuxdSUDAch40loud3DfBZ54rDiV7Hu2 # mhY8FHfZXI273lSdVTsgc2/aGRpFoT66b7nNxxQdgs/ULZYKHpGw6pPOhPyWkG6B # S8tSffAJU3wB7PyOmV+K12zQMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUt # U3RhbXAgUENBIDIwMTACEzMAAAHajtXJWgDREbEAAQAAAdowDQYJYIZIAWUDBAIB # BQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQx # IgQgXyw9PMUuKVWZazS/oqzjwYp3E1N4qQepIXCMsXF1S6cwgfoGCyqGSIb3DQEJ # EAIvMYHqMIHnMIHkMIG9BCAipaNpYsDvnqTe95Dj1C09020I5ljibrW/ndICOxg9 # xjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # JjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB2o7V # yVoA0RGxAAEAAAHaMCIEIMUK/484Qzmn64FWwcwP/fhtuvZmZGOkRd8YJwNgaiE8 # MA0GCSqGSIb3DQEBCwUABIICAFSeqo7a/Nwid2ZfJ9bg4YPpy9vudJH8j1OcacRr # OLef8+mRR89dwFOt2UQZ88rd+9fAGP7an+S4eXYeepqCqmyvBunIHg5xlm5kZuri # rC0eTLzJpyyvGFOqkNYH88bRY/dWhZjH7nuiTMTa3WWNU8Q8MWHarrN+DeWQusJc # 1SM4yS8rs8g494iKhRR00O3QDTtjcPe7ab8cGqtTAFKkP7tSejphYwwywvu6c18L # 7sg7aEcVDv0gdYgikAdTz3u6xEugPevMydT+5noNTrrAjE8hQS5AezkS4yENWLjH # SscwSC9N7fuPSZK7JpZ3HgvJc0ozSWQv9S5gCLejIWlcTyATihZDtHyojMNkoJQq # oHWMOAx8OMyU+CTrZnT676CRnOi+NZpu3z4aG5W+9xvr8zwpgKk6dKvMi27Fj0Ub # npvlSg5HLqxnYI4Ed/qbDFc4SjMoVNFawXcSfzUNIV4yap3UEG35NpNeRB4CPO6g # MInfhwMQEFdQORf26+m1PN+xqJB75YvsPxTXZei9KyvEflKpvwGDc8Kt6xFQ0fxb # FN+t84uJoEcooBpSPcpi1WcFONnibJ2vadHcxtcELcDwysRYUvPhdt2wNImswFke # 6mtug80DMVE456MHUhhujObKdo6myjkhPqd5HuGcUiqwuwlwukFCiwq6r3fDmxAB # ecyw # SIG # End signature block
combined_dataset/train/non-malicious/4086.ps1
4086.ps1
function Invoke-MSI { [CmdletBinding()] param ( [string] $DisplayName, [switch] $Install, [string] $LogDirectory, [switch] $Logging, [ValidateNotNullOrEmpty()][String] $MSIFileName, [string] $MSIFilePath, [ValidateNotNullOrEmpty()][String] $Switches = '/qb- /norestart', [string] $GUID, [switch] $Repair, [switch] $Uninstall, [switch] $UninstallByName ) function Get-MSIDatabase { [CmdletBinding()][OutputType([string])] param ( [ValidateNotNullOrEmpty()][string] $Property, [ValidateNotNullOrEmpty()][string] $MSI, [ValidateNotNullOrEmpty()][string] $Path ) $MSIFile = Get-Item $Path$MSI try { $WindowsInstaller = New-Object -ComObject WindowsInstaller.Installer $MSIDatabase = $WindowsInstaller.GetType().InvokeMember("OpenDatabase", "InvokeMethod", $Null, $WindowsInstaller, @($MSIFile.FullName, 0)) $Query = "SELECT Value FROM Property WHERE Property = '$($Property)'" $View = $MSIDatabase.GetType().InvokeMember("OpenView", "InvokeMethod", $null, $MSIDatabase, ($Query)) $View.GetType().InvokeMember("Execute", "InvokeMethod", $null, $View, $null) $Record = $View.GetType().InvokeMember("Fetch", "InvokeMethod", $null, $View, $null) $DataField = $Record.GetType().InvokeMember("StringData", "GetProperty", $null, $Record, 1) Return $DataField } catch { Write-Output $_.Exception.Message Exit 1 } } function Get-DisplayNameFromRegistry { [CmdletBinding()][OutputType([string])] param ( [ValidateNotNullOrEmpty()][string] $GUID ) $OSArchitecture = Get-WmiObject -Class Win32_OperatingSystem | Select-Object OSArchitecture $Registry = Get-ChildItem Registry::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall If ($OSArchitecture.OSArchitecture -eq "64-bit") { $Registry += Get-ChildItem Registry::HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall } $Registry = $Registry | Where-Object { $_.PSChildName -eq $GUID } $Registry = "Registry::" + $Registry.Name $Registry = Get-ItemProperty $Registry -ErrorAction SilentlyContinue $DisplayName = $Registry.DisplayName Return $DisplayName } $OSArchitecture = Get-WmiObject -Class Win32_OperatingSystem | Select-Object OSArchitecture $Executable = $Env:windir + "\system32\msiexec.exe" If ($MSIFilePath -eq "") { If (($GUID -eq $null) -or ($GUID -eq "")) { $MSIFilePath = (split-path $SCRIPT:MyInvocation.MyCommand.Path -parent) + "\" } } else { If ($MSIFilePath[$MSIFilePath.Length - 1] -ne '\') { $MSIFilePath += '\' } } If ($Install.IsPresent) { $Parameters = "/i" + [char]32 + [char]34 + $MSIFilePath + $MSIFileName + [char]34 $DisplayName = Get-MSIDatabase -Property "ProductName" -MSI $MSIFileName -Path $MSIFilePath Write-Host "Installing"$DisplayName"....." -NoNewline } elseif ($Uninstall.IsPresent) { If ($GUID -ne "") { $Parameters = "/x" + [char]32 + $GUID $DisplayName = Get-DisplayNameFromRegistry -GUID $GUID } else { $Parameters = "/x" + [char]32 + [char]34 + $MSIFilePath + $MSIFileName + [char]34 $DisplayName = Get-MSIDatabase -Property "ProductName" -MSI $MSIFileName -Path $MSIFilePath } If ($DisplayName -ne "") { Write-Host "Uninstalling"$DisplayName"....." -NoNewline } else { Write-Host "Uninstalling"$GUID"....." -NoNewline } } elseif ($UninstallByName.IsPresent) { $Uninstaller = Get-ChildItem "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall" -Recurse -ErrorAction SilentlyContinue If ($OSArchitecture.OSArchitecture -eq "64-Bit") { $Uninstaller += Get-ChildItem "HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall" -Recurse -ErrorAction SilentlyContinue } $SearchName = "*" + $DisplayName + "*" $IdentifyingNumber = get-wmiobject win32_product | where-object { $_.Name -like $SearchName } [string]$GUID = $IdentifyingNumber.IdentifyingNumber $Parameters = "/x" + [char]32 + $GUID $DisplayName = Get-DisplayNameFromRegistry -GUID $GUID If ($DisplayName -ne "") { Write-Host "Uninstalling"$DisplayName"....." -NoNewline } else { Write-Host "Uninstalling"$GUID"....." -NoNewline } } elseif ($Repair.IsPresent) { If ($GUID -ne "") { $Parameters = "/faumsv" + [char]32 + $GUID $DisplayName = Get-DisplayNameFromRegistry -GUID $GUID } else { $Parameters = "/faumsv" + [char]32 + [char]34 + $MSIFilePath + $MSIFileName + [char]34 $DisplayName = Get-MSIDatabase -Property "ProductName" -MSI $MSIFileName -Path $MSIFilePath } Write-Host "Repairing"$DisplayName"....." -NoNewline } else { Write-Host "Specify to install, repair, or uninstall the MSI" -ForegroundColor Red Exit 1 } If ($Logging.IsPresent) { If ($LogDirectory -eq "") { $Parameters += [char]32 + "/lvx " + [char]34 + $env:TEMP + "\" + $DisplayName + ".log" + [char]34 } else { If ($LogDirectory[$LogDirectory.count - 1] -ne "\") { $LogDirectory += "\" } $Parameters += [char]32 + "/lvx " + [char]34 + $LogDirectory + $DisplayName + ".log" + [char]34 } } $Parameters += [char]32 + $Switches $ErrCode = (Start-Process -FilePath $Executable -ArgumentList $Parameters -WindowStyle Minimized -Wait -Passthru).ExitCode If (($ErrCode -eq 0) -or ($ErrCode -eq 3010)) { If ($GUID -eq "") { [string]$ProductCode = Get-MSIDatabase -Property "ProductCode" -MSI $MSIFileName -Path $MSIFilePath } else { [string]$ProductCode = $GUID } $ProductCode = $ProductCode.Trim() $Registry = Get-ChildItem Registry::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall If ($OSArchitecture.OSArchitecture -eq "64-bit") { $Registry += Get-ChildItem Registry::HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall } If (($Install.IsPresent) -or ($Repair.IsPresent)) { If ($ProductCode -in $Registry.PSChildName) { Write-Host "Success" -ForegroundColor Yellow } else { Write-Host "Failed" -ForegroundColor Red } } elseif (($Uninstall.IsPresent) -or ($UninstallByName.IsPresent)) { If ($ProductCode -in $Registry.PSChildName) { Write-Host "Failed" -ForegroundColor Red } else { Write-Host "Success" -ForegroundColor Yellow } } } elseif ($ErrCode -eq 1605) { Write-Host "Application already uninstalled" -ForegroundColor Yellow } else { Write-Host "Failed with error code "$ErrCode -ForegroundColor Red } } Invoke-MSI -Install -MSIFileName "ndOfficeSetup.msi" -Switches "ADDLOCAL=Word,Excel,PowerPoint,Outlook,AdobeAcrobatIntegration,AdobeReaderIntegration /qb- /norestart" Invoke-MSI -Repair -GUID "{A67CA551-ADAE-4C9B-B09D-38D84044FAB8}" Invoke-MSI -UninstallByName "ndOffice" -Logging
combined_dataset/train/non-malicious/sample_39_63.ps1
sample_39_63.ps1
"use strict";(self.webpackChunk_ad_qx_lc_designer=self.webpackChunk_ad_qx_lc_designer||[]).push([[7319],{77319:function(w,i,n){n.r(i),n.d(i,{conf:function(){return y},language:function(){return k}});var l=n(90082);var d=Object.defineProperty,p=Object.getOwnPropertyDescriptor,h=Object.getOwnPropertyNames,u=Object.prototype.hasOwnProperty,m=(t,e,o,c)=>{if(e&&typeof e=="object"||typeof e=="function")for(let r of h(e))!u.call(t,r)&&r!==o&&d(t,r,{get:()=>e[r],enumerable:!(c=p(e,r))||c.enumerable});return t},b=(t,e,o)=>(m(t,e,"default"),o&&m(o,e,"default")),a={};b(a,l);var s=["area","base","br","col","embed","hr","img","input","keygen","link","menuitem","meta","param","source","track","wbr"],y={wordPattern:/(-?\d*\.\d\w*)|([^\`\~\!\@\$\^\&\*\(\)\-\=\+\[\{\]\}\\\|\;\:\'\"\,\.\<\>\/\s]+)/g,comments:{blockComment:["<!--","-->"]},brackets:[["<!--","-->"],["<",">"],["{","}"],["(",")"]],autoClosingPairs:[{open:"{",close:"}"},{open:"[",close:"]"},{open:"(",close:")"},{open:'"',close:'"'},{open:"'",close:"'"}],surroundingPairs:[{open:'"',close:'"'},{open:"'",close:"'"},{open:"<",close:">"}],onEnterRules:[{beforeText:new RegExp(`<(?!(?:${s.join("|")}))(\\w[\\w\\d]*)([^/>]*(?!/)>)[^<]*$`,"i"),afterText:/^<\/(\w[\w\d]*)\s*>$/i,action:{indentAction:a.languages.IndentAction.IndentOutdent}},{beforeText:new RegExp(`<(?!(?:${s.join("|")}))(\\w[\\w\\d]*)([^/>]*(?!/)>)[^<]*$`,"i"),action:{indentAction:a.languages.IndentAction.Indent}}]},k={defaultToken:"",tokenPostfix:"",tokenizer:{root:[[/@@@@/],[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.root"}],[/<!DOCTYPE/,"metatag.html","@doctype"],[/<!--/,"comment.html","@comment"],[/(<)([\w\-]+)(\/>)/,["delimiter.html","tag.html","delimiter.html"]],[/(<)(script)/,["delimiter.html",{token:"tag.html",next:"@script"}]],[/(<)(style)/,["delimiter.html",{token:"tag.html",next:"@style"}]],[/(<)([:\w\-]+)/,["delimiter.html",{token:"tag.html",next:"@otherTag"}]],[/(<\/)([\w\-]+)/,["delimiter.html",{token:"tag.html",next:"@otherTag"}]],[/</,"delimiter.html"],[/[ \t\r\n]+/],[/[^<@]+/]],doctype:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.comment"}],[/[^>]+/,"metatag.content.html"],[/>/,"metatag.html","@pop"]],comment:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.comment"}],[/-->/,"comment.html","@pop"],[/[^-]+/,"comment.content.html"],[/./,"comment.content.html"]],otherTag:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.otherTag"}],[/\/?>/,"delimiter.html","@pop"],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/[ \t\r\n]+/]],script:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.script"}],[/type/,"attribute.name","@scriptAfterType"],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.text/javascript",nextEmbedded:"text/javascript"}],[/[ \t\r\n]+/],[/(<\/)(script\s*)(>)/,["delimiter.html","tag.html",{token:"delimiter.html",next:"@pop"}]]],scriptAfterType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.scriptAfterType"}],[/=/,"delimiter","@scriptAfterTypeEquals"],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.text/javascript",nextEmbedded:"text/javascript"}],[/[ \t\r\n]+/],[/<\/script\s*>/,{token:"@rematch",next:"@pop"}]],scriptAfterTypeEquals:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.scriptAfterTypeEquals"}],[/"([^"]*)"/,{token:"attribute.value",switchTo:"@scriptWithCustomType.$1"}],[/'([^']*)'/,{token:"attribute.value",switchTo:"@scriptWithCustomType.$1"}],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.text/javascript",nextEmbedded:"text/javascript"}],[/[ \t\r\n]+/],[/<\/script\s*>/,{token:"@rematch",next:"@pop"}]],scriptWithCustomType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.scriptWithCustomType.$S2"}],[/>/,{token:"delimiter.html",next:"@scriptEmbedded.$S2",nextEmbedded:"$S2"}],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/[ \t\r\n]+/],[/<\/script\s*>/,{token:"@rematch",next:"@pop"}]],scriptEmbedded:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInEmbeddedState.scriptEmbedded.$S2",nextEmbedded:"@pop"}],[/<\/script/,{token:"@rematch",next:"@pop",nextEmbedded:"@pop"}]],style:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.style"}],[/type/,"attribute.name","@styleAfterType"],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/>/,{token:"delimiter.html",next:"@styleEmbedded.text/css",nextEmbedded:"text/css"}],[/[ \t\r\n]+/],[/(<\/)(style\s*)(>)/,["delimiter.html","tag.html",{token:"delimiter.html",next:"@pop"}]]],styleAfterType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.styleAfterType"}],[/=/,"delimiter","@styleAfterTypeEquals"],[/>/,{token:"delimiter.html",next:"@styleEmbedded.text/css",nextEmbedded:"text/css"}],[/[ \t\r\n]+/],[/<\/style\s*>/,{token:"@rematch",next:"@pop"}]],styleAfterTypeEquals:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.styleAfterTypeEquals"}],[/"([^"]*)"/,{token:"attribute.value",switchTo:"@styleWithCustomType.$1"}],[/'([^']*)'/,{token:"attribute.value",switchTo:"@styleWithCustomType.$1"}],[/>/,{token:"delimiter.html",next:"@styleEmbedded.text/css",nextEmbedded:"text/css"}],[/[ \t\r\n]+/],[/<\/style\s*>/,{token:"@rematch",next:"@pop"}]],styleWithCustomType:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInSimpleState.styleWithCustomType.$S2"}],[/>/,{token:"delimiter.html",next:"@styleEmbedded.$S2",nextEmbedded:"$S2"}],[/"([^"]*)"/,"attribute.value"],[/'([^']*)'/,"attribute.value"],[/[\w\-]+/,"attribute.name"],[/=/,"delimiter"],[/[ \t\r\n]+/],[/<\/style\s*>/,{token:"@rematch",next:"@pop"}]],styleEmbedded:[[/@[^@]/,{token:"@rematch",switchTo:"@razorInEmbeddedState.styleEmbedded.$S2",nextEmbedded:"@pop"}],[/<\/style/,{token:"@rematch",next:"@pop",nextEmbedded:"@pop"}]],razorInSimpleState:[[/@\*/,"comment.cs","@razorBlockCommentTopLevel"],[/@[{(]/,"metatag.cs","@razorRootTopLevel"],[/(@)(\s*[\w]+)/,["metatag.cs",{token:"identifier.cs",switchTo:"@$S2.$S3"}]],[/[})]/,{token:"metatag.cs",switchTo:"@$S2.$S3"}],[/\*@/,{token:"comment.cs",switchTo:"@$S2.$S3"}]],razorInEmbeddedState:[[/@\*/,"comment.cs","@razorBlockCommentTopLevel"],[/@[{(]/,"metatag.cs","@razorRootTopLevel"],[/(@)(\s*[\w]+)/,["metatag.cs",{token:"identifier.cs",switchTo:"@$S2.$S3",nextEmbedded:"$S3"}]],[/[})]/,{token:"metatag.cs",switchTo:"@$S2.$S3",nextEmbedded:"$S3"}],[/\*@/,{token:"comment.cs",switchTo:"@$S2.$S3",nextEmbedded:"$S3"}]],razorBlockCommentTopLevel:[[/\*@/,"@rematch","@pop"],[/[^*]+/,"comment.cs"],[/./,"comment.cs"]],razorBlockComment:[[/\*@/,"comment.cs","@pop"],[/[^*]+/,"comment.cs"],[/./,"comment.cs"]],razorRootTopLevel:[[/\{/,"delimiter.bracket.cs","@razorRoot"],[/\(/,"delimiter.parenthesis.cs","@razorRoot"],[/[})]/,"@rematch","@pop"],{include:"razorCommon"}],razorRoot:[[/\{/,"delimiter.bracket.cs","@razorRoot"],[/\(/,"delimiter.parenthesis.cs","@razorRoot"],[/\}/,"delimiter.bracket.cs","@pop"],[/\)/,"delimiter.parenthesis.cs","@pop"],{include:"razorCommon"}],razorCommon:[[/[a-zA-Z_]\w*/,{cases:{"@razorKeywords":{token:"keyword.cs"},"@default":"identifier.cs"}}],[/[\[\]]/,"delimiter.array.cs"],[/[ \t\r\n]+/],[/\/\/.*$/,"comment.cs"],[/@\*/,"comment.cs","@razorBlockComment"],[/"([^"]*)"/,"string.cs"],[/'([^']*)'/,"string.cs"],[/(<)([\w\-]+)(\/>)/,["delimiter.html","tag.html","delimiter.html"]],[/(<)([\w\-]+)(>)/,["delimiter.html","tag.html","delimiter.html"]],[/(<\/)([\w\-]+)(>)/,["delimiter.html","tag.html","delimiter.html"]],[/[\+\-\*\%\&\|\^\~\!\=\<\>\/\?\;\:\.\,]/,"delimiter.cs"],[/\d*\d+[eE]([\-+]?\d+)?/,"number.float.cs"],[/\d*\.\d+([eE][\-+]?\d+)?/,"number.float.cs"],[/0[xX][0-9a-fA-F']*[0-9a-fA-F]/,"number.hex.cs"],[/0[0-7']*[0-7]/,"number.octal.cs"],[/0[bB][0-1']*[0-1]/,"number.binary.cs"],[/\d[\d']*/,"number.cs"],[/\d/,"number.cs"]]},razorKeywords:["abstract","as","async","await","base","bool","break","by","byte","case","catch","char","checked","class","const","continue","decimal","default","delegate","do","double","descending","explicit","event","extern","else","enum","false","finally","fixed","float","for","foreach","from","goto","group","if","implicit","in","int","interface","internal","into","is","lock","long","nameof","new","null","namespace","object","operator","out","override","orderby","params","private","protected","public","readonly","ref","return","switch","struct","sbyte","sealed","short","sizeof","stackalloc","static","string","select","this","throw","true","try","typeof","uint","ulong","unchecked","unsafe","ushort","using","var","virtual","volatile","void","when","while","where","yield","model","inject"],escapes:/\\(?:[abfnrtv\\"']|x[0-9A-Fa-f]{1,4}|u[0-9A-Fa-f]{4}|U[0-9A-Fa-f]{8})/}}}]);
combined_dataset/train/non-malicious/New-Script 2.ps1
New-Script 2.ps1
## New-Script function ## Creates a new script from the most recent commands in history ################################################################################################## ## Example Usage: ## New-Script ScriptName 4 ## creates a script from the most recent four commands ## New-Script Clipboard -id 10,11,12,14 ## sends the the specified commands from the history to the clipboard ## Notepad (New-Script ScriptName 20) ## sends the most recent twenty commands to the script, and then opens the script in notepad ################################################################################################## ## As a tip, I use a prompt function something like this to get the ID into the prompt: ## ## function prompt { ## return "`[{0}]: " -f ((get-history -count 1).Id + 1) ## } ################################################################################################## ## Revision History ## 1.0 - initial release ## 1.1 - fix bug with specifying multiple IDs ## 2.0 - use the current folder as the default instead of throwing an exception ## - prompt to overwrite if not -Force ################################################################################################## #function New-Script { param( [string]$script=(Read-Host "A name for your script"), [int]$count=1, [int[]]$id=@((Get-History -count 1| Select Id).Id), [switch]$Force ) # if there's only one id, then the count counts, otherwise we just use the ids if($id.Count -eq 1) { 1..($count-1)|%{ $id += $id[-1]-1 } } # Get the CommandLines from the history items... $commands = Get-History -id $id | &{process{ $_.CommandLine }} if($script -eq "clipboard") { if( @(Get-PSSnapin -Name "pscx").Count ) { $commands | out-clipboard } elseif(@(gcm clip.exe).Count) { $commands | clip } } else { $folder = Split-Path $script if(!$folder) { # default to putting it in my "Windows PowerShell\\scripts" folder which I have in my path... $folder = Join-Path (Split-Path $Profile) "Scripts" } if(!(Test-Path $folder)) { # if that fails, put it in the current path (on the file system) $folder = Get-Location -PSProvider "FileSystem" } # add the ps1 extension if it's not already there ... $file = Join-Path $folder (Split-Path $script -leaf) if(!(([IO.FileInfo]$file).Extension)) { $file = "$file.ps1" } # write an error message if the file already exists, unless -Force if((Test-Path $file) -and (!$Force)) { Write-Error "The file already exists, do you want to overwrite?" } # and confirm before setting the content if the file already exists, unless -Force $commands | set-content $file -Confirm:((Test-Path $file) -and (!$Force)) Get-Item $file } #}
combined_dataset/train/non-malicious/1637.ps1
1637.ps1
function Get-BootConfigurationData { param ( $bcdeditpath = (Join-Path $env:SystemRoot 'system32\bcdedit.exe') ) $bootconfigurationdata = iex $bcdeditpath $bootconfigurationdata += '' $hash = $null $result = foreach ($line in $bootconfigurationdata) { if ($line -eq '') { if ($hash) { [pscustomobject]$hash } $hash = @{} continue } if ($line.startswith('-----')) { continue } if ($line.startswith('Windows Boot')) { $hash.Add('Type', $line) } else { $name = $line.Substring(0, $line.IndexOf(' ')) $value = $line.Substring($line.IndexOf(' ')).trim() $hash.Add($name, $value) } } $props = $result | % {gm -in $_ -ty *property} | % name | select -u | sort $result | select $props }
combined_dataset/train/non-malicious/2386.ps1
2386.ps1
function New-PodcastEpisode { [CmdletBinding()] param ( [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [ValidateScript({ Test-Path -Path $_ -PathType Leaf })] [string]$RssFilePath, [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [string]$Title, [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [string]$Link, [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [string]$Description, [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [string]$Guid, [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [string]$Duration, [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [string]$SubTitle, [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [string]$Summary, [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [string]$Keywords, [Parameter()] [ValidateNotNullOrEmpty()] [string]$Author = 'Todd Klindt', [Parameter()] [ValidateNotNullOrEmpty()] [string]$Explicit = 'no' ) begin { $ErrorActionPreference = 'Stop' $xRss = New-Object -TypeName System.Xml.XmlDocument $xRss.Load($RssFilePath) } process { try { $newItem = $xRss.CreateElement('Item') $subItems = @{ 'title' = $Title 'link' = $Link 'description' = $Description 'author' = $Author 'guid' = $Guid 'enclosure' = '' } $iTunesNsItems = @{ 'author' = $Author 'duration' = $Duration 'explicit' = $Explicit 'keywords' = $Keywords 'subtitle' = $SubTitle 'summary' = $Summary } foreach ($s in $subItems.GetEnumerator()) { $nodeName = $s.Key $nodeVal = $s.Value $null = $newItem.AppendChild($xRss.CreateElement($nodeName)) if ($nodeName -ne 'enclosure') { $newItem.$nodeName = $nodeVal } } $newItem.SelectSingleNode('enclosure').SetAttribute('url', 'test enc URL') $newItem.SelectSingleNode('enclosure').SetAttribute('length', '0000') $newItem.SelectSingleNode('enclosure').SetAttribute('type', 'audio/mp3') $newItem.SelectSingleNode('guid').SetAttribute('isPermaLink', 'true') $itunesNs = New-Object System.Xml.XmlNamespaceManager($xRss.nametable) $itunesNs.addnamespace('itunes', $xRss.rss.channel.GetNamespaceOfPrefix('itunes')) foreach ($s in $iTunesNsItems.GetEnumerator()) { $nodeName = "itunes:$($s.Key)" $nodeVal = $s.Value $node = $xRss.CreateElement($nodeName, $itunesNs.LookupNamespace('itunes')) $null = $node.AppendChild($xRss.CreateTextNode($nodeVal)) $null = $newItem.AppendChild($node) } $null = $xRss.SelectSingleNode('rss/channel').AppendChild($newItem) $xRss.Save($RssFilePath) } catch { Write-Error $_.Exception.Message } } }